BGP Hijacker Steals Bitcoins
Researchers at Dell’s Secureworks have uncovered multiple BGP incidents used to steal bitcoins. According to Secureworks, the attacker used a compromised administrator account at a yet undisclosed...
View ArticleDNSSEC:NSEC vs. NSEC3
The Domain Name System Security Extensions(DNSSEC) provide two different records for securely handling non-existent names in DNS, NSEC and NSEC3. They are mutually exclusive, so operators need to pick...
View ArticleImportant IPv6 RFCs
There are many Request For Comments(RFC)s related to IPv6. This page will list the most important RFCs related to IPv6. If you are just getting started with your IPv6 deployment and are comfortable...
View ArticleIPv6 Training from Boson.com
Boson.com has put together a great introductory training regimen for IPv6. The training assumes basic understanding of IPv4, then takes the reader on a tour of the changes in IPv6 in four parts. This...
View ArticleDNSSEC Client Check for Websites
Are you a website operator who wants to know if your users are using a DNSSEC validating resolver? SIDN Labs in The Netherlands, have put together a JavaScript tool to show users visiting websites if...
View ArticlePrivacy Extensions for IPv6 SLAAC
Whereas IPv4 had two basic methods for obtaining an IP address, IPv6 has three. Static configuration is basically the same in both protocols, although less relevant for IPv6 given the length of the...
View ArticleFakeID, Android, Certificates, and Implementation Details
Security firm Bluebox Security has uncovered a vulnerability in Google’s Android mobile operating system , which could allow attackers to trick an Android device into installing malicious applications....
View ArticleFCC requests comments on DNSSEC, BGPSec and Anti-Spoofing
On July 25, 2014 the United States Federal Communications Commission (FCC) posted a request for comments from the ISP community on proposed best practices for US ISPs. They’re specifically seeking...
View ArticleIPv6 Measurement statistics from ACM SIGCOMM
A research paper presented at the August 2014 ACM SIGCOMM shows IPv6 usage increasing by all measurements. The paper’s conclusion is summed up as, “IPv6 is Now Real.” It goes on to state, “Traffic data...
View ArticleNew Research shows IPv6 Adoption “is now real”
New research conducted by a team of researchers shows that IPv6 adoption has fundamentally left behind its experimental origins. Their research paper will be presented at the upcoming 2014 ACM SIGCOMM...
View ArticleVideo: BGP Blackholing Project (RIPE 68)
How can network operators cooperate to prevent abuse? How do we educate network operators to ensure they’re connecting their network in a secure way to the Internet? In this lightning talk from Lukasz...
View ArticleAnti-Spoofing, BCP 38, and the Tragedy of the Commons
In the seminal 1968 paper “The Tragedy of the Commons” , Garrett Hardin introduced the world to an idea which eventually grew into a household phrase. In this blog article I will explore whether...
View ArticleOpenWRT and Open Wireless: Bringing IPv6 and DNSSEC to End Users
Interesting things are happening in the home router space. On July 14th, the OpenWRT project released a new version of their software. Called “Barrier Breaker”, or 14.07-rc1, this is the first open...
View ArticleVideo: Selective Blackholing at RIPE 68
Until such time as we succeed in preventing IP spoofing in the Internet, Distributed Denial of Service(DDOS) attacks are going to be a problem. Job Snijders, gave a presentation at RIPE 68 detailing...
View ArticleDistributed Trust Models:TLS Certificate Transparency and DANE
Many of the Internet’s secure protocols rely on Certificate Authorities(CA)s to issue certificates that we can trust. These certificates are responsible for ensuring that servers are who they say they...
View ArticlePHP Domain Parser Adds Support for IPv6
The PHP community recently announced the release of the initial draft specification for PHP. This is an important step in the development of any open language. With the announcement they also showed...
View Article
More Pages to Explore .....