Posts Tagged ‘Security’

Deploy360@IETF95, Day 2: TLS, Curdle, Homenet, Security & Sunset4

John Levine at microphone

Our schedule for Day 2 at IETF 95 is a bit less hectic than yesterday, but promises to be the most interesting of the week. As well as the established Home Networking and TLS Working Groups, today also sees the debut of the new CURves, Deprecating and a Little more Encryption Working Group. There will also Read more…


Diffie-Hellman Key Exchange Problems & Recommendations for Stronger Encryption

TLS badge

A paper recently published at the 22nd ACM Conference on Computer and Communications Security in Denver, USA raises concerns about how Diffie-Hellman key exchange is implemented in many protocols including HTTPS, SSH, IPsec, SMTPS and other protocols relying on TLS. Diffie-Hellman is an asymmetric cryptographic algorithm that is commonly used to exchange session keys when establishing a Read more…


October 22nd, 2015 by | Posted in TLS for Applications | Tags: , , | No Comments

Join InterCommunity 2015 on July 7/8 to talk about Internet security!

InterCommunity 2015 logo

This week you have a unique opportunity to offer your opinion on how we can make the Internet more secure!  On July 7 and 8 our global Internet Society membership meeting, InterCommunity 2015, will bring together thousands of people all around the world to address critical questions around the future of the Internet – how Read more…


July 6th, 2015 by | Posted in About Deploy360 | Tags: , , , | No Comments

Introducing RFC 7454: BGP Operations and Security

Securing BGP

Today I’m re-reading an IETF RFC that was published just this month. RFC 7454 is titled “BGP Operations and Security” and that’s exactly what it’s about. The documents’ abstract does a great job of summarizing the content: This document describes measures to protect the BGP sessions itself such as Time to Live (TTL), the TCP Read more…


February 25th, 2015 by | Posted in IETF, News, Securing BGP | Tags: , , , | 2 Comments

ERNW Compares Penetration Testing Tools IPv6 Support

ERNW December Newsletter

Which network security penetration testing tools support IPv6?  What caveats should you know about the ones that do support IPv6? Recently the team as security firm ERNW published their December 2014 newsletter with the headline “Penetration Testing Tools that (do not) Support IPv6” where they took a lengthy tour through a wide range of security Read more…


December 29th, 2014 by | Posted in IPv6, Security | Tags: , , | No Comments

IPv6 Privacy Addresses Provide Protection Against Surveillance And Tracking

IPv6 Badge

Recently we’ve seen several articles, such as one out today, that assert that IPv6 addresses will make it easier for security services and law enforcement to track you. Surprisingly, these articles seem to miss that when IPv6 is implemented today on mobile devices or other computers, it is almost always implemented using what are called “privacy Read more…


December 8th, 2014 by | Posted in IPv6 | Tags: , , , | No Comments

Make Encryption The Norm For All Internet Traffic, Says The Internet Architecture Board (IAB)

Internet Architecture Board (IAB) logo - square

The Internet Architecture Board announced a new “Statement on Internet Confidentiality” yesterday that calls on “protocol designers, developers, and operators to make encryption the norm for Internet traffic“.  The statement, distributed via email by IAB Chair Russ Housely, goes further in urging those who design and develop new protocols “to design for confidential operation by default“. Read more…


November 14th, 2014 by | Posted in TLS for Applications | Tags: , , , , , | No Comments

DNSSEC Is A Building Block, Not A Magic Bullet

Olaf Kolkman

Speaking at Broadband World Forum (BBWF) in Amsterdam this week, our CITO Olaf Kolkman was quoted as saying a key point we’ve been emphasizing throughout our work: “There is no magic solution to any cyber security or internet security type of threat. But there are a number of building blocks that are promising.” They include Read more…


October 24th, 2014 by | Posted in DNSSEC | Tags: , , | No Comments

Chris Grundemann Speaking at the 2014 Government IPv6 Conference

After a long summer at home it is time for me to once again take to the road, or rather the skies. My first trip for the second half of this year will take me to Washington, D.C. next week for the Digital Government Institute’s 8th Annual Government IPv6 & Networking Conference. To be held Wednesday, Read more…


August 12th, 2014 by | Posted in About Deploy360, Events, IPv6 | Tags: , , , | 1 Comment

What Shall We Call Our New Topic Area On “Anti-Spoofing” Of IP Addresses?

question mark

We need your help.  We are struggling with what to name the new topic area we are planning to launch related to preventing the “spoofing” of IP addresses. In routing security circles this topic is generally referred to as “anti-spoofing” and we’ve talked about it ourselves that way such as in our report on an Read more…


June 16th, 2014 by | Posted in About Deploy360, Anti-Spoofing, Routing | Tags: , , | 2 Comments