Guest Post: In this post, we will look at basic Neighbor Discovery messages used in IPv6. | Continue reading
Measuring the Log4jShell incident. | Continue reading
How should we engage with evolution and innovation in the Internet’s name space? | Continue reading
Guest Post: How prevalent are DoT and DoH projects, and what languages are developers using to implement them? | Continue reading
One in seven authoritative DNS servers found to be vulnerable to ICMP-based MTU spoofing attacks. | Continue reading
Guest Post: What does it take to set up your own AS and keep it running? | Continue reading
Guest Post: The easiest way to conceptualize zero trust is by considering what it is not. | Continue reading
Guest Post: The IPv4 Unicast Extensions Project seeks to free up 6 to 7% of the IPv4 address space. | Continue reading
Guest Post: If we stop and think about experiments in computer networks, there is no question that interference exists! | Continue reading
Guest Post: TCPLS takes advantage of decades of performance optimizations made to TCP and has also a few other tricks up its sleeves. | Continue reading
Guest Post: Study shows that most consumer IoT devices rely on TLS 1.2; few have upgraded to TLS 1.3. | Continue reading
Performance differs greatly for Sky Muster (GEO) and Starlink (LEO) satellite services in Australia based on which TCP flow control protocol you use. | Continue reading
Dreaming of a mesh utopia in the Pacific. | Continue reading
Guest Post: Does DoQ outperform DoT and DoH? Results of the first study on DoQ response times. | Continue reading
Guest Post: Study notes 17% of the world’s IP addresses are originated by state-owned Autonomous Systems. | Continue reading
Guest Post: Study of Japanese event network shows 77% of prefixes have alternate paths of shorter latency than best paths. | Continue reading
Guest Post: SRv6 enables you to code directly into each packet header where the traffic should be sent and how it should be treated. | Continue reading
Guest Post: Insights and lessons from Tonga in the last five weeks. | Continue reading
Guest Post: Have a request for router IPv6 support? Add it to the list. | Continue reading
Study shows ease-to-deploy and cost are important factors when it comes to using DNS security mechanisms. | Continue reading
The second post on IPv6 delegations discusses how addressing policy affects the community. How often do recipients come back, and what comes next for addressing policy? | Continue reading
How big is the world of IPv6 when compared to IPv4? How does APNIC distribute this address space? | Continue reading
Is it possible to disrupt RPKI Relying Party software by introducing a malicious CA/repository into the tree? | Continue reading
Guest Post: Comcast shares its work into reducing latency through Active Queue Management. | Continue reading
Useful and fun features related to the OpenBSD packet filter. | Continue reading
What is OpenBSD like for a user or developer, and why is it better? | Continue reading
OpenBSD remains a crucial yet largely unacknowledged player in the open-source field. | Continue reading
Can current measures around the globe curtail the power of Big Tech? | Continue reading
Geoff Huston's snapshot of current working group activities related to the DNS. | Continue reading
Guest Post: Study demonstrates large differences between Google, Facebook, and Cloudflare’s QUIC performance profiles. | Continue reading
As TCP becomes more important to DNS, overhead is becoming an issue. | Continue reading
Encrypted transport headers, transport protocol meddling, and content vs carriage. | Continue reading
Measuring packet drop for IPv6 fragmented packets. Has the picture changed in the past four years? | Continue reading
Here's what we've learnt about networks and the routers that interconnect them in the last 50 years. | Continue reading
Guest Post: An investigation into an HTTPS interception attack using a custom root CA. | Continue reading
Guest Post: Chromium is driving a reduction in DNS root server traffic. Let's put some numbers to it. | Continue reading
Guest Post: Study seeks to measure elusive cloud-enabled connectivity that makes up large proportion of today's Internet. | Continue reading
Guest Post: Path-aware architectures are showing potential as means to improve efficiency and solve many of the security issues of today’s Internet. | Continue reading
Geoff seeks to shed light on the design trade-offs behind RPKI. | Continue reading
Guest Post: This year's DNS Flag Day seeks to draw attention to IP fragmentation issues within the DNS. | Continue reading
In August 2019, 3% of users passed their queries through resolvers that actively work to minimize the extent of leakage of superfluous information in DNS queries. What's changed in 12 months? | Continue reading
In August 2019, 3% of users passed their queries through resolvers that actively work to minimize the extent of leakage of superfluous information in DNS queries. What's changed in 12 months? | Continue reading
A policy to allow denial of access to un-delegated IPv4 and IPv6 addresses has been deployed | Continue reading
Guest Post: Three year study of Netflix content delivery shows IPv6 performance has improved to be roughly on par with IPv4. | Continue reading
Guest Post: Securing IPv6 Stateless Address Auto-configuration (SLAAC) has been ongoing since 2011. | Continue reading
Guest Post: With 70% of market share, Chromium has had a significant impact on the total root DNS traffic. | Continue reading
Guest Post: There are problems brewing with Root CAs reaching their end of life. | Continue reading
Guest Post: A group within the IETF think the time has come to give inter-domain multicast another try. | Continue reading