Docker IPv6 networking, routing, and NDP proxying
Today I was working on migrating my RIPE Atlas probe from running natively on a Raspberry Pi to running on a different Pi inside Docker.
Read more…Today I was working on migrating my RIPE Atlas probe from running natively on a Raspberry Pi to running on a different Pi inside Docker.
Read more…If you’ve watched more than a handful of YouTube videos in the past few years, you’ve probably seen sponsored advertisements for VPNs impressing on you the great security benefits of using a VPN. But in a time where a lot of Internet communications are already encrypted, what are the actual benefits of using a VPN?
Read more…Now that I’ve explained both DNS and DNSSEC, I can cover the most widely known part of the DNSSEC infrastructure – the Root KSK Ceremonies. These ceremonies exist to provide transparency to the Internet community around the creation, use, and storage of the root KSK. Transparency is essential in establishing trust of the KSK – asking the Internet to just blindly trust something wouldn’t work, and rightly so!
Read more…In my last post, I gave a pretty detailed overview of DNS itself and touched on its weaknesses in terms of authenticity and privacy. This time, I’ll go into detail on DNS Security Extensions (DNSSEC) and how it allows clients to establish a chain of authenticity back to an authoritative DNS server, preventing tampering by intermediate parties.
Read more…If you follow me on Twitter, you might have seen me live tweeting the 42nd DNSSEC root key signing ceremony a few weeks ago. Without any context, it was probably pretty boring and didn’t make much sense, but to me, it’s one of the most interesting and human parts of the massive global infrastructure that makes up the Internet.
Read more…