• العربية
  • 简体中文
  • English
  • Français
  • Русский
  • Español
  • اردو

You are here

  • This installment of the Internet Society’s Rough Guide to IETF 95 focuses attention on the IETF 95 activities related to improving trust in the Internet. Key to this trust is the ability to establish and maintain accurate identity including privacy. As one might expect, there is a great deal of activity in this space in the IETF.First, there is one BoF related to the trust topic at IETF 95. The Limited Use of Keys (lurk) BoF is looking at the problem caused by the increasing separation of the content provider from the network delivery. In this case, the content provider does not necessarily...
    Date published 04 April 2016
  • This issue of the ISOC Rough Guide to IETF 95 includes not only issues related to the control plane (routing), but also to the data forwarding plane – specifically DDoS attacks. There is interesting and important work underway at IETF 95 in Buenos Aires next week that can help addressing problems in both areas.The Secure Inter-Domain Routing (SIDR, http://datatracker.ietf.org/wg/sidr/) WG is focusing on securing inter-domain routing. The overall architecture is based on a Resource PKI (RPKI), which adds an authentication framework to BGP and is an important component of BGP security...
    Date published 31 March 2016
  • IPv6 remains an important aspect of the standardization work within the IETF, with much activity next week at IETF 95 in Buenos Aires. IPv6 deployment hit 10% earlier this year according to Google IPv6 statistics, and whilst other sources such as APNIC Labs and Akamai show slightly lower adoption rates, IPv6 usage continues to grow a steady rate as Regional Internet Registries assign their last remaining IPv4 addresses. There’s also evidence from both the RIRs and commercial transfer market that IPv4 address transfers as well as use of legacy addresses (i.e. those allocated before 1997)...
    Date published 30 March 2016
  • This week, the RightsCon Silicon Valley 2016 conference takes place in Silicon Valley. Since the use of encryption in general and the Apple/FBI case in particular are likely to be debated I want to share a perspective on system security.My phone as a systemThe Apple/FBI case revolves around a phone. Think of your own phone now.When I look at my own phone I have rather sensitive information on it:my calendar, which could be used to find out when to rob my house;pictures of my kids that I do not want others to see;a password manager which could be used to impersonate me anywhere in the virtual...
    Date published 29 March 2016
  • In this post I'll highlight some of the Internet Engineering Task Force (IETF) and Internet Research Task Force (IRTF) groups meeting as part of the IETF 95 meeting in Buenos Aires next week. These groups are working to explore and address more sophisticated ways to use and share available bandwidth, improve Internet performance, and otherwise efficiently get Internet content to where it needs to be.Measurement techniques and data sources that could help us to make better engineering decisions to work around some of the rigidity in the protocol stack will be the subject of the proposed...
    Date published 29 March 2016