Donate

BGP

BGPSec – A reality now
BGPSec – A reality now Thumbnail
Deploy360 16 October 2017

BGPSec – A reality now

The Secure Inter Domain Routing (SIDR) initiative held its first BoF at IETF 64 back in November 2005, and...

Deploy360@IETF 96, Day 4: SIDR & IPv6
Deploy360 21 July 2016

Deploy360@IETF 96, Day 4: SIDR & IPv6

Throughout this week at IETF 96 in Berlin we’re bringing you these daily blog posts that highlight what Deploy360 is focused on during that...

Hacking on BGP for Fun and Profit
Hacking on BGP for Fun and Profit Thumbnail
Improving Technical Security 10 February 2016

Hacking on BGP for Fun and Profit

Of all the many protocols that run over the Internet some are more fundamental than others. Border Gateway Protocol...

Deploy360@IETF91, Day 5: IDR (Securing BGP), IPv6 and heading on to ION Tokyo
Deploy360 14 November 2014

Deploy360@IETF91, Day 5: IDR (Securing BGP), IPv6 and heading on to ION Tokyo

As the final day of IETF 91 opens there are only a few sessions left on the long IETF 91 agenda.  For...

Deploy360@IETF91, Day 2: UTA, DPRIVE, BGP in ANRP, 6LO and IOT, DNSOP
Deploy360 11 November 2014

Deploy360@IETF91, Day 2: UTA, DPRIVE, BGP in ANRP, 6LO and IOT, DNSOP

For us at Deploy360, Day 2 of IETF 91 brings a heavy focus on DNSSEC and DNS security in general with both DNSOP...

BGPmon: Using BGP Data To Fight Spam
Deploy360 18 September 2014

BGPmon: Using BGP Data To Fight Spam

Can we use BGP data to find email spammers? And could securing BGP provide a mechanism to help reduce...

BGP Hijacker Steals Bitcoins
8 August 2014

BGP Hijacker Steals Bitcoins

Researchers at Dell’s Secureworks have uncovered multiple BGP incidents used to steal bitcoins. According to Secureworks, the attacker used...

Deploy360@IETF90, Day 5: HOMENET, SIDR, TRANS and GROW… and then we're done!
Deploy360 25 July 2014

Deploy360@IETF90, Day 5: HOMENET, SIDR, TRANS and GROW… and then we're done!

You might think the final day of IETF 90 might be a bit quieter for us… but in fact...

Resource Public Key Infrastructure (RPKI)
Securing Border Gateway Protocol (BGP) 13 June 2014

Resource Public Key Infrastructure (RPKI)

Currently Border Gateway Protocol (BGP), the Internet’s core routing protocol, is susceptible to IP address hijacking attacks. Examples of...

Video: CrypTech and RPKI (Randy Bush at RIPE 68)
9 June 2014

Video: CrypTech and RPKI (Randy Bush at RIPE 68)

How do we build an open hardware security module that’s verifiably secure? Can we use Openflow and BGP RPKI...

3 Sessions About Securing BGP At IETF89 Next Week
Deploy360 24 February 2014

3 Sessions About Securing BGP At IETF89 Next Week

Next week at IETF 89 in London there will be a good bit of discussion around the security and...

BGP Hijacking In Iceland And Belarus Shows Increased Need for BGP Security
7 February 2014

BGP Hijacking In Iceland And Belarus Shows Increased Need for BGP Security

Want to understand better why we need to secure the Border Gateway Protocol (BGP) to make the Internet’s routing...

Load More