IPv6 Neighbor Discovery (2019)

Guest Post: In this post, we will look at basic Neighbor Discovery messages used in IPv6. | Continue reading


@blog.apnic.net | 1 year ago

Log4Shell – Through the scope of a reactive network telescope

Measuring the Log4jShell incident. | Continue reading


@blog.apnic.net | 1 year ago

DNS Evolution – Innovation or Fragmentation?

How should we engage with evolution and innovation in the Internet’s name space? | Continue reading


@blog.apnic.net | 1 year ago

DNS privacy software – Not only a Browser game (2019)

Guest Post: How prevalent are DoT and DoH projects, and what languages are developers using to implement them? | Continue reading


@blog.apnic.net | 1 year ago

IP fragmentation and the DNS – Vulnerable DNS servers

One in seven authoritative DNS servers found to be vulnerable to ICMP-based MTU spoofing attacks. | Continue reading


@blog.apnic.net | 1 year ago

I set up my own Autonomous System

Guest Post: What does it take to set up your own AS and keep it running? | Continue reading


@blog.apnic.net | 1 year ago

Is zero trust living up to expectations?

Guest Post: The easiest way to conceptualize zero trust is by considering what it is not. | Continue reading


@blog.apnic.net | 1 year ago

Cutting down on IP address waste

Guest Post: The IPv4 Unicast Extensions Project seeks to free up 6 to 7% of the IPv4 address space. | Continue reading


@blog.apnic.net | 1 year ago

Reducing bias of networking A/B tests

Guest Post: If we stop and think about experiments in computer networks, there is no question that interference exists! | Continue reading


@blog.apnic.net | 1 year ago

Tcpls: Modern Transport Services with TCP and TLS

Guest Post: TCPLS takes advantage of decades of performance optimizations made to TCP and has also a few other tricks up its sleeves. | Continue reading


@blog.apnic.net | 1 year ago

How effective is HTTPS/TLS usage in the consumer IoT ecosystem?

Guest Post: Study shows that most consumer IoT devices rely on TLS 1.2; few have upgraded to TLS 1.3. | Continue reading


@blog.apnic.net | 1 year ago

Testing LEO and GEO satellite services in Australia

Performance differs greatly for Sky Muster (GEO) and Starlink (LEO) satellite services in Australia based on which TCP flow control protocol you use. | Continue reading


@blog.apnic.net | 1 year ago

Rethinking submarine fibre cable projects in the South Pacific

Dreaming of a mesh utopia in the Pacific. | Continue reading


@blog.apnic.net | 2 years ago

A First Look at DNS over QUIC

Guest Post: Does DoQ outperform DoT and DoH? Results of the first study on DoQ response times. | Continue reading


@blog.apnic.net | 2 years ago

Identifying Autonomous Systems of State-Owned Internet-Operators

Guest Post: Study notes 17% of the world’s IP addresses are originated by state-owned Autonomous Systems. | Continue reading


@blog.apnic.net | 2 years ago

Measuring the benefit of egress traffic engineering with Segment Routing

Guest Post: Study of Japanese event network shows 77% of prefixes have alternate paths of shorter latency than best paths. | Continue reading


@blog.apnic.net | 2 years ago

What is SRv6 network programming?

Guest Post: SRv6 enables you to code directly into each packet header where the traffic should be sent and how it should be treated. | Continue reading


@blog.apnic.net | 2 years ago

When volcanoes go bang, submarine cables do what?

Guest Post: Insights and lessons from Tonga in the last five weeks. | Continue reading


@blog.apnic.net | 2 years ago

Small / Home Office network IPv6 wish list

Guest Post: Have a request for router IPv6 support? Add it to the list. | Continue reading


@blog.apnic.net | 2 years ago

Adoption of DNS Security Mechanisms

Study shows ease-to-deploy and cost are important factors when it comes to using DNS security mechanisms. | Continue reading


@blog.apnic.net | 2 years ago

The space between IPv6 allocations: part 2

The second post on IPv6 delegations discusses how addressing policy affects the community. How often do recipients come back, and what comes next for addressing policy? | Continue reading


@blog.apnic.net | 2 years ago

The space between IPv6 allocations

How big is the world of IPv6 when compared to IPv4? How does APNIC distribute this address space? | Continue reading


@blog.apnic.net | 2 years ago

Improving the resiliency of RPKI Relying Party software

Is it possible to disrupt RPKI Relying Party software by introducing a malicious CA/repository into the tree? | Continue reading


@blog.apnic.net | 2 years ago

Comcast reduced “working latency” 90% by deploying AQM during Covid

Guest Post: Comcast shares its work into reducing latency through Active Queue Management. | Continue reading


@blog.apnic.net | 2 years ago

What every IT person needs to know about OpenBSD Part 3: That packet filter

Useful and fun features related to the OpenBSD packet filter. | Continue reading


@blog.apnic.net | 2 years ago

What every IT person needs to know about OpenBSD Part 2: Why use OpenBSD?

What is OpenBSD like for a user or developer, and why is it better? | Continue reading


@blog.apnic.net | 2 years ago

What every IT person needs to know about OpenBSD Part 1: How it all started

OpenBSD remains a crucial yet largely unacknowledged player in the open-source field. | Continue reading


@blog.apnic.net | 2 years ago

Opinion: Regulating Big Tech?

Can current measures around the globe curtail the power of Big Tech? | Continue reading


@blog.apnic.net | 2 years ago

DNS Talk IETF 111

Geoff Huston's snapshot of current working group activities related to the DNS. | Continue reading


@blog.apnic.net | 2 years ago

Dissecting the Performance of Production QUIC

Guest Post: Study demonstrates large differences between Google, Facebook, and Cloudflare’s QUIC performance profiles. | Continue reading


@blog.apnic.net | 2 years ago

TCP Fast Open? Not so fast

As TCP becomes more important to DNS, overhead is becoming an issue. | Continue reading


@blog.apnic.net | 2 years ago

Transport Protocols and the Network

Encrypted transport headers, transport protocol meddling, and content vs carriage. | Continue reading


@blog.apnic.net | 2 years ago

IPv6 Fragmentation Loss in 2021

Measuring packet drop for IPv6 fragmented packets. Has the picture changed in the past four years? | Continue reading


@blog.apnic.net | 2 years ago

A brief history of router architecture

Here's what we've learnt about networks and the routers that interconnect them in the last 50 years. | Continue reading


@blog.apnic.net | 3 years ago

An analysis of a large-scale HTTPS interception

Guest Post: An investigation into an HTTPS interception attack using a custom root CA. | Continue reading


@blog.apnic.net | 3 years ago

Chromium reduces Root DNS traffic

Guest Post: Chromium is driving a reduction in DNS root server traffic. Let's put some numbers to it. | Continue reading


@blog.apnic.net | 3 years ago

Unpacking a Flattened Internet

Guest Post: Study seeks to measure elusive cloud-enabled connectivity that makes up large proportion of today's Internet. | Continue reading


@blog.apnic.net | 3 years ago

Scion EPIC: a path-aware clean-slate internet architecture

Guest Post: Path-aware architectures are showing potential as means to improve efficiency and solve many of the security issues of today’s Internet. | Continue reading


@blog.apnic.net | 3 years ago

BGP: Is 100% ROV Achievable?

Geoff seeks to shed light on the design trade-offs behind RPKI. | Continue reading


@blog.apnic.net | 3 years ago

DNS Flag Day 2020: what you need to know

Guest Post: This year's DNS Flag Day seeks to draw attention to IP fragmentation issues within the DNS. | Continue reading


@blog.apnic.net | 3 years ago

DNS Query Privacy Revisited

In August 2019, 3% of users passed their queries through resolvers that actively work to minimize the extent of leakage of superfluous information in DNS queries. What's changed in 12 months? | Continue reading


@blog.apnic.net | 3 years ago

DNS Query Privacy Revisited

In August 2019, 3% of users passed their queries through resolvers that actively work to minimize the extent of leakage of superfluous information in DNS queries. What's changed in 12 months? | Continue reading


@blog.apnic.net | 3 years ago

Policy prop-132 (AS0 for unallocated space) deployed in service

A policy to allow denial of access to un-delegated IPv4 and IPv6 addresses has been deployed | Continue reading


@blog.apnic.net | 3 years ago

Netflix over IPv6: A Longitudinal Study

Guest Post: Three year study of Netflix content delivery shows IPv6 performance has improved to be roughly on par with IPv4. | Continue reading


@blog.apnic.net | 3 years ago

Recent advances in IPv6 security: Addressing

Guest Post: Securing IPv6 Stateless Address Auto-configuration (SLAAC) has been ongoing since 2011. | Continue reading


@blog.apnic.net | 3 years ago

Chromium's Impact on Root DNS Traffic

Guest Post: With 70% of market share, Chromium has had a significant impact on the total root DNS traffic. | Continue reading


@blog.apnic.net | 3 years ago

Solving the expiring. X.509 root CA certificate-mageddon, partly at least

Guest Post: There are problems brewing with Root CAs reaching their end of life. | Continue reading


@blog.apnic.net | 3 years ago

Why inter-domain multicast now makes sense

Guest Post: A group within the IETF think the time has come to give inter-domain multicast another try. | Continue reading


@blog.apnic.net | 3 years ago