Networks

Blogs

Still Waiting for IPv6

It's now been a decade since the world officially ran out of blocks of IP addresses. In early 2011 the Internet Assigned Numbers Authority (IANA) announced that it had allocated the last block of IPv4 addresses and warned ISPs to start using the new IPv6 addresses. But here we are a decade later and not one of my clients has converted to IPv6. more

Connectivity Starts at Home

Today's Internet is just one application of the powerful idea of best-efforts connectivity. The home router (NAT) decouples the connectivity within the home from the larger internet, enabling innovation that leverages the Internet without being limited by it. Connectivity starts at home. Your computers and devices all interconnect locally. In a sense, the larger Internet is just one more connected device. You are free to innovate and experiment without asking a provider's permission. more

The Insecurity of Ambiguous Standards

Why are networks so insecure? One reason is we don't take network security seriously. We just don't think of the network as a serious target of attack. Or we think of security as a problem "over there," something that exists in the application realm, that needs to be solved by application developers. Or we think the consequences of a network security breach as "well, they can DDoS us, and then we can figure out how to move load around, so if we build with resilience (enough redundancy)... more

Notes from the DNS Privacy Workshop at NDSS 2021

For many years the consuming topic in DNS circles was that of the names themselves. If you wind the clock back twenty years or so, you will find much discussion about the nature of the Internet's namespace. Why were there both generic top-level labels and two-letter country codes? If we were going to persist with these extra-territorial generic country codes in the namespace, then how many should there be? Who could or should manage them? And so on. more

Notes from NANOG 81

As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more

ECFiber: Building a Fiber-to-Premises Network in the Rural United States

Nestled in the northeastern part of the United States is the small state of Vermont, the 14th State to join the United States in 1789. Its name comes from the French, in which 'vert montagne' means 'green mountain.' and it is known as the Green Mountain state. With only about 625,000 inhabitants, it is the 45th state out of 50 in size, and 49th of 50 in number of people, even less populated than Alaska. more

Let's Not Forget About Solar Flares

As the world becomes more and more reliant on electronics, it's worth a periodic reminder that a large solar flare could knock out much of the electronics on earth. Such an event would be devastating to the Internet, satellite broadband, and the many electronics we use in daily life. A solar flare is the result of periodic ejections of matter from the sun into space. Scientists still aren't entirely sure what causes solar flares, but they know that it's somehow related to shifts in the sun's magnetic field. more

An IPv6 Update for 2020

The Australian Domain Name Administration, AUDA, recently published its quarterly report for the last quarter of 2020. The report contained the interesting snippet: "The rapid digitization of our lives and economy -- necessitated by COVID-19 -- continued to underpin strong growth in .au registrations. New .au domains created in December 2020 were up 23 percent from December 2019, while total domains under management were up more than 2.1 percent over the same period." more

The Netizen's Guide to Reboot the Root (Part II)

The first part of this series explained how Amendment 35 to the NTIA-Verisign cooperative agreement is highly offensive to the public interest. But the reasons for saving the Internet are more fundamental to Western interests than a bad deal made under highly questionable circumstances. One of the world's foremost experts on conducting censorship at scale, the Chinese Communist Party's experience with the Great Firewall... more

A Look Back at the World of IP Addressing in 2020: What Changed and What It Means

Time for another annual roundup from the world of IP addresses. Let's see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. Back around 1992, the IETF gazed into their crystal ball and tried to understand how the Internet was going to evolve and what demands would be placed on the addressing system as part of the "IP Next Generation" study.  more

The Christmas Goat and IPv6 (Year 11)

This is the fourth year now with almost no snow during the Christmas Goat event here in Sweden, and so once again, you get a photo without any snow. Because of Covid-19 and 99.99% people working for home, I have not even seen the Goat live this year... What a crazy year it has been! more

Unintended Consequences of Submarine Cable Deployment on Internet Routing

The network layer of the Internet routes packets regardless of the underlying communication media (Wifi, cellular telephony, satellites, or optical fiber). The underlying physical infrastructure of the Internet includes a mesh of submarine cables, generally shared by network operators who purchase capacity from the cable owners. As of late 2020, over 400 submarine cables interconnect continents worldwide and constitute the oceanic backbone of the Internet. more

DNS Oblivion

Technical development often comes in short, intense bursts, where a relatively stable technology becomes the subject of intense revision and evolution. The DNS is a classic example here. For many years this name resolution protocol just quietly toiled away. The protocol wasn't all that secure, and it wasn't totally reliable, but it worked well enough for the purposes we put it to. more

Protecting an Enterprise from Cyber Catastrophe

We are suffering an epidemic of cyberattacks while in a viral pandemic. This post is for those who have responsibility for assuring that the IT-based services offered by their enterprise can quickly recover in the case of successful cyber-attack or other disaster. University of Vermont Medical Center (UVMMC) is an excellent hospital. I owe my life to treatment there and am grateful for both the skill and the kindness of UVMMC staff. They have been devastated by a cyber-attack. more

An Innovative Framework That Will Help the IoT Industry Scale Into the Billions

The Internet of Things (IoT) is on an explosive growth trajectory. According to Transforma Insights, the number of IoT-connected devices is projected to increase to 24.1 billion worldwide by 2030. That's almost a three-fold increase from 2019. Much of this growth will be fueled by the coming 5G revolution, which will enable businesses and consumers to take advantage of a wide range of increasingly sophisticated connected devices. more

News Briefs

EU Member States Release Report on Coordinated Risk Assessment on Cybersecurity in 5G Networks

Other Countries Beginning to Adopt China's Unique Approach to an Isolated Internet Structure

Microsoft Becomes the Latest Company to Join the Internet Society’s MANRS Initiative

Nigerian Cable Company Takes Blame for Misrouting Google's Global Traffic Through China

China Telecom Accused of Misdirecting Internet Traffic

US Senators Urge Canada to Drop China’s Huawei Technologies in Building Future Telecom Networks

Internet Society Partnering With Facebook to Develop Internet Exchange Points Throughout Africa

Microsoft Cancels Plans to Move Its Internal Wireless Network to IPv6-Only

Large-Scale Study by Security Researchers in China Sheds Light on the Scope of DNS Interception

Group of Engineers Have Created a Way to Detect Dangerous Objects in Baggage Using Public Wifi

Escalating War in Yemen Dividing Country's Internet

Russian Hackers Have Penetrated U.S. Electric Utilities

Doug Madory Reports on Shutting Down the BGP Hijack Factory

Oracle Launches Internet Intelligence Map Providing Insight Into the Impact of Internet Disruptions

DNS Firewall Market Expected to Grow From $90.5 Million in 2018 to $169.7 Million by 2023

US Federal Judge Dismisses Kaspersky Lawsuit, Government-Wide Ban Stays in Place

Kaspersky Lab Software Too Deeply Embedded in US Gov Network, Impossible to Get Rid Off by October

Newly Discovered Malware Called VPNFilter is Targeting at Least 500K Networking Devices Worldwide

New Type of DDoS Attack Targets Vulnerability in Universal Plug and Play Networking Protocol

Moving to IPv6 Is Becoming a Matter of Business Continuity, Says NASA Transition Manager

Most Viewed

Most Commented

Industry Updates

Leasing IPv4 Addresses in the Dawn of the New Internet Era

How to Monitor IP Netblocks for Possible Targeted Attacks

Not All VPN Users Are Worth Trusting, a Lesson for Cloud Service Providers

Everything You Need to Know About IPv4 vs. IPv6

The Louisiana State Ransomware Attack: Enhancing Cyberdefense with Reverse IP Address Lookup

The Disney+ Account Hijacking: Preventing Unauthorized Network Access with Threat Intelligence Tools

InterMed Breach: How Threat Intelligence Sources Help Maintain Domain Integrity

Alleviating the Constant Clash Between DevSecOps and DevOps Teams

Moving from the Castle-and-Moat to the Zero-Trust Model

NS1 Raises $33M for Its Application Traffic Management Solutions

How Threat Intelligence Can Solve 3 Common SIEM Problems

Currents of Change: Empowering the Growth and Interplay of Subsea and Interconnection

Peering Versus IP Transit: Answering the Age-Old Question

Navigating IPv4 Market: Industry Pioneers Marc Lindsey and Janine Goodman to Speak at Interop ITX

Attacks Decrease by 23 Percent in 1st Quarter While Peak Attack Sizes Increase: DDoS Trends Report

Participants – Random Selection