Let’s Encrypt

Deploy360@IETF98, Day 1: IoT, IPv6, DNSSEC & TLS

It’s a busy week IETF 98 in Chicago, and we’ll be bringing you daily blog posts that highlight what Deploy360 will be focused on during that day. And Monday is the busiest day, with a couple of working groups on the Internet-of-Things, along with sessions relevant to IPv6, DNSSEC and TLS. The day kicks off at 09.00 CDT/UTC-6 with Homenet which is developing protocols Read more…


Our Hot Topics @ IETF 98

Next week is IETF 98 in Chicago which is the third time the IETF has been held in the Windy City. The Deploy360 team will be represented by Megan Kruse and Dan York this time, along with ISOC’s Chief Internet Technology Officer Olaf Kolkman. We’ll again be highlighting the latest IPv6, DNSSEC, Securing BGP and TLS related developments. Our colleagues are planning to cover the following sessions, Read more…


Deploy360 @ APRICOT 2017

The Deploy360 team will be busy next week at the APRICOT 2017 Conference in Ho Chi Minh City, Vietnam. Aftab Siddiqui and Jan Žorž will be co-chairing the Asia-Pacific BCOP BoF, Jan will be giving two presentations on DNSSEC/DANE and IPv6, whilst Aftab will moderate a panel about the APNIC transfer market. Our colleague Andrei Robachevsky will also be talking Read more…


Deploy360@IETF97, Day 3: IoT, PKI & Still More IPv6

Wednesday at IETF 97 in Seoul is another busy day, with the primary focus being on the Internet-of-Things, but with other relevant sessions on PKI and routing. Each day we’re bringing you blog posts pointing out what Deploy360 will be focusing on. The day opens with a choice between the Routing Over Low power and Lossy networks and Global Routing Operations Working Groups on Wednesday morning at Read more…


ION Bucharest / RONOG 3: The Case for DNSSEC & IPv6

ION Bucharest

The Deploy360 team has just returned from Romania where we held our third ION Conference of the year. This was organised jointly with RONOG 3 – the meeting of the Romanian Network Operators Group – on 12 October 2016 at the Novotel Bucharest Hotel, and attracted 85 participants from several countries. Kevin Meynell opened the event with an overview of Read more…


Our Hot Topics @ IETF 96

Next week is IETF 96 in Berlin which is the second time the IETF has been held in the city. The Deploy360 team will be well represented with Megan Kruse, Dan York and Kevin Meynell in attendance, who between them will be bringing you the latest IPv6, DNSSEC, Securing BGP, TLS and anti-spoofing developments. Our Deploy360 colleagues are planning to cover the following sessions, so please come and Read more…


ENOG 11 in Moscow

The 11th Eurasia Network Operator’s Group (ENOG 11) that was held on 7-8 June 2016 in Moscow, Russia featured a record turnout of 550 participants from the Russian Federation, Commonwealth of Independent States and Eastern Europe who came together to discuss operational issues and share expertise about evolving the Internet in the region. This bi-annual event Read more…


Deploy360@IETF95, Day 1: IPv6, TLS, SIDR, DNSSD, ACME & REGEXT

IETF95 Hackathon participants

It’s a very busy first day for the Deploy360 team at IETF 95 in Buenos Aires with our focus areas of IPv6, DNSSEC, securing BGP and TLS all having sessions during the day. Throughout this week at IETF 95 we’ll be bringing you these daily blog posts that point out what we are focused on during Read more…


Let’s Encrypt hits 1 million certificates

Early last week, Let’s Encrypt issued its one millionth certificate, a impressive achievement considering it only entered its public beta phase just over three months ago. Let’s Encrypt is a new trusted Certificate Authority (CA) offering free digital certificates used for securing servers for use with TLS applications such as secure web browsing and online financial transactions. In fact, the Read more…


Let’s Encrypt certificates for mail servers and DANE – Part 2 of 2

In the first part of our blog on testing the Let’s Encrypt certificates for mail servers and adding extra security with DANE TLSA records, we focused on how to deal with the default behaviour of the Let’s Encrypt client on Linux. This generates a new underlying key and certificate request every time we renew the Read more…