How do you configure DNS resolvers?

Guest Post: A survey reveals some of the least used functions of DNS resolvers, but does this make them obsolete? | Continue reading


@blog.apnic.net | 3 years ago

A Deeper Dive into DNS over HTTP or TLS and Impacts on the Ecosystem

The way DNS resolution is used in today's network is changing, and it has wider implications. | Continue reading


@blog.apnic.net | 3 years ago

Modern Router Architecture and IPv6

Guest Post: In some ways, IPv6 was designed as a more processor-friendly protocol than IPv4. However, its extensible nature still presents some challenges. | Continue reading


@blog.apnic.net | 3 years ago

Overcoming the challenges of IPv6 support in BIND

Guest Post: The slow transition to IPv6 has made for some interesting and ongoing challenges for BIND developers but there is light at the end of the tunnel. | Continue reading


@blog.apnic.net | 3 years ago

A Kea developer's take on IPv6 and DHCP

Guest Post: Learn how a fascination in IPv6 and a Masters thesis led to Dibbler, DHCPv6 and ultimately, Kea. | Continue reading


@blog.apnic.net | 3 years ago

IPv6 and Rust

Guest Post: NLnet Labs shares their experience with Rust's support for IPv6. | Continue reading


@blog.apnic.net | 3 years ago

New IP and emerging communications technologies

What technologies will play a prominent role in the Internet over the next decade? | Continue reading


@blog.apnic.net | 3 years ago

What’s the deal with IPv6 link-local addresses?

Guest Post: Find out how how link-local addresses in IPv6, specifically the '%eth0'-part of link-local addresses, can have an impact on RIPE Atlas measurements. | Continue reading


@blog.apnic.net | 4 years ago

OpenLI: Open-source to comply with Lawful Interception standards

Guest Post: Help support a community funded open-source project to enable low-cost lawful interception. | Continue reading


@blog.apnic.net | 4 years ago

Protecting log records at 30k feet with syslog-ng

Guest Post: syslog-ng is an open-source log archive protection service developed by Airbus. | Continue reading


@blog.apnic.net | 4 years ago

Drilling for the KSK

What happens when a safe containing the devices to facilitate the Root Signing Ceremony doesn't open? | Continue reading


@blog.apnic.net | 4 years ago

APNIC Receives 43/8

Guest Post: Founder of the WIDE Project, Jun Murai, discusses the future of the 43/8 IPv4 address block. | Continue reading


@blog.apnic.net | 4 years ago

Network topology design at 27,000 km/hr

Guest Post: Computer scientists are proposing a novel network design that could double the network capacity of low-flying satellite Internet systems. | Continue reading


@blog.apnic.net | 4 years ago

Deploying DNSSEC in a Large Enterprise

Guest Post: At Salesforce, we started our DNSSEC deployment by analysing our zones and finding third-party providers that satisfied our DNSSEC requirements. | Continue reading


@blog.apnic.net | 4 years ago

At the bottom of the sea: a short history of submarine cables

Submarine cable development brings together advanced physics, marine technology and engineering to create truly amazing pieces of networking infrastructure. | Continue reading


@blog.apnic.net | 4 years ago

How TCP works, using people as packets

Dave Täht recounted the story of bufferbloat and the deployment challenges ahead. | Continue reading


@blog.apnic.net | 4 years ago

Modelling BBR's interactions with traditional TCP loss-based congestion control

Guest Post: While BBR is supposed to be a rate-based algorithm, when competing with other flows, BBR is window-limited. | Continue reading


@blog.apnic.net | 4 years ago

What can you learn from an IP address

Guest Post: Researchers examine whether an adversary can deduce websites visited using a set of IP addresses originating from a user’s device. | Continue reading


@blog.apnic.net | 4 years ago

SHA-1 chosen prefix collisions and DNSSEC

Guest Post: The SHAmbles prefix collision attack against SHA-1 offers a new way for attackers to spook the DNS despite DNSSEC. | Continue reading


@blog.apnic.net | 4 years ago

Is there a buffer sizing problem on the internet?

If buffers are generally good and improve data throughput, then more (or larger) buffers are better, right? | Continue reading


@blog.apnic.net | 4 years ago

Opinion: Centralized DoH is bad for privacy, in 2019 and beyond

Guest Post: Centralized DoH ‘by default’ is a net-negative for everyone's privacy and that even in later years it will not improve privacy outside of the most privacy hostile environments. | Continue reading


@blog.apnic.net | 4 years ago

Does TCP Keep Pace with QUIC?

Guest Post: Researchers have set out to compare the performance of an optimized TCP stack against QUIC. | Continue reading


@blog.apnic.net | 4 years ago

Measuring open DNS resolver use

Can we measure the level of DNS centrality in the Internet today? | Continue reading


@blog.apnic.net | 4 years ago

What do we know about an IP address?

Guest Post: There's a lot more to an IP addresses than merely being an identifier. | Continue reading


@blog.apnic.net | 4 years ago

Characterizing the Performance Impact of AMP

Guest Post: Does Google's Accelerated Mobile Project (AMP) improve web performance on mobiles? | Continue reading


@blog.apnic.net | 4 years ago

TCP MSS values – what’s changed?

A decade ago, the best advice around was to use a down-adjusted TCP MSS value, such as 1300, 1380 or even 1400. What's changed? | Continue reading


@blog.apnic.net | 4 years ago

TakNet – A Community Network Using TV White Space

Guest Post: Community White Space wireless Networks are helping to connect rural communities in developing economies such as Thailand. | Continue reading


@blog.apnic.net | 4 years ago

Moving Control to the Endpoints

Guest Post: The introduction of encrypted DNS has caused a considerable amount of controversy. Mark Nottingham argues that the solution is putting control in the hands of end users. | Continue reading


@blog.apnic.net | 4 years ago

Tracking the DNS Stars: The DNS Observatory

Guest Post: Is today’s DNS distributed, fast and secure enough for its purpose? | Continue reading


@blog.apnic.net | 4 years ago

Happy Birthday BGP

How has this critically important routing protocol fared over these 30 years and what are its future prospects? | Continue reading


@blog.apnic.net | 4 years ago

Large European routing leak sends traffic through China Telecom

Guest Post: A Swiss data centre leaked over 70,000 routes to China Telecom, some for over two hours. | Continue reading


@blog.apnic.net | 4 years ago

Ignore Misconfigurations at Your Peril

Guest Post: It's easy to focus on critical security issues but ignore misconfigurations that could become attack vectors. | Continue reading


@blog.apnic.net | 4 years ago

Public DNS in Taiwan the Latest Victim of BGP Hijack

Guest Post: Traffic going through a public DNS in Taiwan was rerouted to an entity in Brazil for about three and a half minutes. | Continue reading


@blog.apnic.net | 4 years ago

Some bad news for DANE (and DNSSEC)

Geoff Huston shares his thoughts from DNS-OARC 30. | Continue reading


@blog.apnic.net | 4 years ago

Routing and Addressing in 2018

What changed in Internet addressing in 2018 and how has it changed the outlook for the Internet? | Continue reading


@blog.apnic.net | 4 years ago

Protecting IoT with MUD

Guest Post: No matter how hard we try, IoT devices will always have some vulnerability. But that doesn't mean we are defenceless. | Continue reading


@blog.apnic.net | 4 years ago

The DoH Dilemma

Guest Post: Most of the issues created by DoH derive from the fact that it promotes a basic architectural change in the way domain names are resolved by Internet users. | Continue reading


@blog.apnic.net | 4 years ago

Simplicity is key to network redesign for LINE

Guest Post: How the engineers behind one of Asia's most popular messaging apps redesigned its network from scratch with a focus on simplicity and capacity for growth. | Continue reading


@blog.apnic.net | 5 years ago

The future of undersea Internet cables: Are big tech companies forming a cartel?

Guest Post: Content providers are increasingly investing in new submarine cables. Are they forming a cartel? | Continue reading


@blog.apnic.net | 5 years ago

Common misconceptions about IPv6 security

Guest Post: I’ll seek to set the record straight for several of the most common misconceptions about IPv6 security. | Continue reading


@blog.apnic.net | 5 years ago

250bn traffic records show Insta, WhatsApp and Bing rising, as SnapChat falls

Guest Post: Video and messaging has lead to the biggest behavioural change among Internet users with an unexpected decrease in one popular app. | Continue reading


@blog.apnic.net | 5 years ago

Be careful where you point to: the dangers of stale DNS records

Guest Post: Tobias Fiebig illustrates how stale DNS records can leave cloud-based hosts vulnerable to exploitation. | Continue reading


@blog.apnic.net | 5 years ago

IPv6 in China

With an estimated Internet user population of 741 million people, China's adoption of IPv6 matters a lot to IPv6 reaching critical mass globally. | Continue reading


@blog.apnic.net | 5 years ago

LibreRouter: Powering community networks with free and open hardware

The LibreRouter project has developed an open source, open hardware router, customized to the needs of community-run networks. | Continue reading


@blog.apnic.net | 5 years ago

Is the Internet running late?

Not all computer clocks are in sync and that can be cause for concern, writes Geoff Huston. | Continue reading


@blog.apnic.net | 5 years ago

Coming of age: a longitudinal study of TLS deployment

Guest Post: Study follows the evolution of TLS from 2012 using a dataset of 319.3 billion TLS connections collected from large universities and research centres across North America. | Continue reading


@blog.apnic.net | 5 years ago

Has Internet governance become irrelevant?

Geoff Huston shares his thoughts on the future of Internet governance ahead of a panel session at the forthcoming Internet Governance Forum seeking to discuss its past, present and future path. | Continue reading


@blog.apnic.net | 5 years ago

DOH DNS over HTTPS explained

A deeper look at the potential benefits of DNS over HTTPS, or DOH. | Continue reading


@blog.apnic.net | 5 years ago