Guest Post: A survey reveals some of the least used functions of DNS resolvers, but does this make them obsolete? | Continue reading
The way DNS resolution is used in today's network is changing, and it has wider implications. | Continue reading
Guest Post: In some ways, IPv6 was designed as a more processor-friendly protocol than IPv4. However, its extensible nature still presents some challenges. | Continue reading
Guest Post: The slow transition to IPv6 has made for some interesting and ongoing challenges for BIND developers but there is light at the end of the tunnel. | Continue reading
Guest Post: Learn how a fascination in IPv6 and a Masters thesis led to Dibbler, DHCPv6 and ultimately, Kea. | Continue reading
Guest Post: NLnet Labs shares their experience with Rust's support for IPv6. | Continue reading
What technologies will play a prominent role in the Internet over the next decade? | Continue reading
Guest Post: Find out how how link-local addresses in IPv6, specifically the '%eth0'-part of link-local addresses, can have an impact on RIPE Atlas measurements. | Continue reading
Guest Post: Help support a community funded open-source project to enable low-cost lawful interception. | Continue reading
Guest Post: syslog-ng is an open-source log archive protection service developed by Airbus. | Continue reading
What happens when a safe containing the devices to facilitate the Root Signing Ceremony doesn't open? | Continue reading
Guest Post: Founder of the WIDE Project, Jun Murai, discusses the future of the 43/8 IPv4 address block. | Continue reading
Guest Post: Computer scientists are proposing a novel network design that could double the network capacity of low-flying satellite Internet systems. | Continue reading
Guest Post: At Salesforce, we started our DNSSEC deployment by analysing our zones and finding third-party providers that satisfied our DNSSEC requirements. | Continue reading
Submarine cable development brings together advanced physics, marine technology and engineering to create truly amazing pieces of networking infrastructure. | Continue reading
Dave Täht recounted the story of bufferbloat and the deployment challenges ahead. | Continue reading
Guest Post: While BBR is supposed to be a rate-based algorithm, when competing with other flows, BBR is window-limited. | Continue reading
Guest Post: Researchers examine whether an adversary can deduce websites visited using a set of IP addresses originating from a user’s device. | Continue reading
Guest Post: The SHAmbles prefix collision attack against SHA-1 offers a new way for attackers to spook the DNS despite DNSSEC. | Continue reading
If buffers are generally good and improve data throughput, then more (or larger) buffers are better, right? | Continue reading
Guest Post: Centralized DoH ‘by default’ is a net-negative for everyone's privacy and that even in later years it will not improve privacy outside of the most privacy hostile environments. | Continue reading
Guest Post: Researchers have set out to compare the performance of an optimized TCP stack against QUIC. | Continue reading
Can we measure the level of DNS centrality in the Internet today? | Continue reading
Guest Post: There's a lot more to an IP addresses than merely being an identifier. | Continue reading
Guest Post: Does Google's Accelerated Mobile Project (AMP) improve web performance on mobiles? | Continue reading
A decade ago, the best advice around was to use a down-adjusted TCP MSS value, such as 1300, 1380 or even 1400. What's changed? | Continue reading
Guest Post: Community White Space wireless Networks are helping to connect rural communities in developing economies such as Thailand. | Continue reading
Guest Post: The introduction of encrypted DNS has caused a considerable amount of controversy. Mark Nottingham argues that the solution is putting control in the hands of end users. | Continue reading
Guest Post: Is today’s DNS distributed, fast and secure enough for its purpose? | Continue reading
How has this critically important routing protocol fared over these 30 years and what are its future prospects? | Continue reading
Guest Post: A Swiss data centre leaked over 70,000 routes to China Telecom, some for over two hours. | Continue reading
Guest Post: It's easy to focus on critical security issues but ignore misconfigurations that could become attack vectors. | Continue reading
Guest Post: Traffic going through a public DNS in Taiwan was rerouted to an entity in Brazil for about three and a half minutes. | Continue reading
Geoff Huston shares his thoughts from DNS-OARC 30. | Continue reading
What changed in Internet addressing in 2018 and how has it changed the outlook for the Internet? | Continue reading
Guest Post: No matter how hard we try, IoT devices will always have some vulnerability. But that doesn't mean we are defenceless. | Continue reading
Guest Post: Most of the issues created by DoH derive from the fact that it promotes a basic architectural change in the way domain names are resolved by Internet users. | Continue reading
Guest Post: How the engineers behind one of Asia's most popular messaging apps redesigned its network from scratch with a focus on simplicity and capacity for growth. | Continue reading
Guest Post: Content providers are increasingly investing in new submarine cables. Are they forming a cartel? | Continue reading
Guest Post: I’ll seek to set the record straight for several of the most common misconceptions about IPv6 security. | Continue reading
Guest Post: Video and messaging has lead to the biggest behavioural change among Internet users with an unexpected decrease in one popular app. | Continue reading
Guest Post: Tobias Fiebig illustrates how stale DNS records can leave cloud-based hosts vulnerable to exploitation. | Continue reading
With an estimated Internet user population of 741 million people, China's adoption of IPv6 matters a lot to IPv6 reaching critical mass globally. | Continue reading
The LibreRouter project has developed an open source, open hardware router, customized to the needs of community-run networks. | Continue reading
Not all computer clocks are in sync and that can be cause for concern, writes Geoff Huston. | Continue reading
Guest Post: Study follows the evolution of TLS from 2012 using a dataset of 319.3 billion TLS connections collected from large universities and research centres across North America. | Continue reading
Geoff Huston shares his thoughts on the future of Internet governance ahead of a panel session at the forthcoming Internet Governance Forum seeking to discuss its past, present and future path. | Continue reading
A deeper look at the potential benefits of DNS over HTTPS, or DOH. | Continue reading