BGP

BGPSec – A reality now
BGPSec – A reality now Thumbnail
Deploy360 16 October 2017

BGPSec – A reality now

The Secure Inter Domain Routing (SIDR) initiative held its first BoF at IETF 64 back in November 2005, and...

[email protected] 96, Day 4: SIDR & IPv6
Deploy360 21 July 2016

[email protected] 96, Day 4: SIDR & IPv6

Throughout this week at IETF 96 in Berlin we’re bringing you these daily blog posts that highlight what Deploy360 is focused on during that...

Hacking on BGP for Fun and Profit
Hacking on BGP for Fun and Profit Thumbnail
Improving Technical Security 10 February 2016

Hacking on BGP for Fun and Profit

Of all the many protocols that run over the Internet some are more fundamental than others. Border Gateway Protocol...

[email protected], Day 5: IDR (Securing BGP), IPv6 and heading on to ION Tokyo
Deploy360 14 November 2014

[email protected], Day 5: IDR (Securing BGP), IPv6 and heading on to ION Tokyo

As the final day of IETF 91 opens there are only a few sessions left on the long IETF 91 agenda.  For...

[email protected], Day 2: UTA, DPRIVE, BGP in ANRP, 6LO and IOT, DNSOP
Deploy360 11 November 2014

[email protected], Day 2: UTA, DPRIVE, BGP in ANRP, 6LO and IOT, DNSOP

For us at Deploy360, Day 2 of IETF 91 brings a heavy focus on DNSSEC and DNS security in general with both DNSOP...

BGPmon: Using BGP Data To Fight Spam
Deploy360 18 September 2014

BGPmon: Using BGP Data To Fight Spam

Can we use BGP data to find email spammers? And could securing BGP provide a mechanism to help reduce...

BGP Hijacker Steals Bitcoins
8 August 2014

BGP Hijacker Steals Bitcoins

Researchers at Dell’s Secureworks have uncovered multiple BGP incidents used to steal bitcoins. According to Secureworks, the attacker used...

[email protected], Day 5: HOMENET, SIDR, TRANS and GROW… and then we're done!
Deploy360 25 July 2014

[email protected], Day 5: HOMENET, SIDR, TRANS and GROW… and then we're done!

You might think the final day of IETF 90 might be a bit quieter for us… but in fact...

Resource Public Key Infrastructure (RPKI)
Securing Border Gateway Protocol (BGP) 13 June 2014

Resource Public Key Infrastructure (RPKI)

In response to IP address hijacking attacks and to the continuing vulnerability in IP address hijacking, the IETF Secure...

Video: CrypTech and RPKI (Randy Bush at RIPE 68)
9 June 2014

Video: CrypTech and RPKI (Randy Bush at RIPE 68)

How do we build an open hardware security module that’s verifiably secure? Can we use Openflow and BGP RPKI...

3 Sessions About Securing BGP At IETF89 Next Week
Deploy360 24 February 2014

3 Sessions About Securing BGP At IETF89 Next Week

Next week at IETF 89 in London there will be a good bit of discussion around the security and...

BGP Hijacking In Iceland And Belarus Shows Increased Need for BGP Security
7 February 2014

BGP Hijacking In Iceland And Belarus Shows Increased Need for BGP Security

Want to understand better why we need to secure the Border Gateway Protocol (BGP) to make the Internet’s routing...

Load More