Blogs

Last modified: January 30, 2014
  • DNS Forwarders

    Recently, at a BIND 10 Face to face meeting, we scheduled a short slot of time to discuss the features of a DNS forwarder. As part of the development process of the BIND 10 recursive resolver, we initially implemented a basic forwarder. As we added actual recursive resolver features, the original ‘forwarding’ mode was left in, and got some of

    Read more
    0
  • New Opportunities for Criminal Growth – Forecasting Cyber-Crime during the IPv6 Transition

     I had the fortunate opportunity to present the Wednesday Keynote at the Rocky Mountain 2011 IPv6 Summit.  The session was a slightly different angle to the normal “IPv6″ presentations. We worked through how the cyber-criminal dynamics impact IPv4 networks, the cyber-criminal “arms race” is pushing IPv6 in the criminal market place, and how these factors must be considered in IPv6

    Read more
    0
  • ISC DHCP and IPv6 – the DHCPv6 story

    Numbering Computers in IPv6 Computers and other IPv6-enabled devices need a way to select which IP address they are using, just like in IPv4. IPv6 provides several ways to do this: Manual configuration Autoconfiguration (Stateless Address Autoconfiguration, or SLAAC) Cryptographically Generated Addresses (CGA) DHCPv6 (sometimes called stateful autoconfiguration) Manual configuration works the same in IPv6 as in IPv4 – the

    Read more
    0
  • Sign up now to learn how Security Information Exchange (SIE) & Passive DNS are changing the way investigators are effectively collaborating.

    Robert Edmonds, Eric Ziegast, Barry Greene The Security Information Exchange (SIE) and ISC’s Passive DNS System (DNSDB) are public benefit projects that are contributing to a shift in the way security companies work with each other. Please sign up now for one of two webinars on March 29th, 2011 (click here). In this webinar, we will: Provide an Overview of

    Read more
    0
  • Blocking DNS

    COICA and Secure DNS Update: This article from March 2011 was superceded in some details by a article published in August 2011. If you reached this blog entry as a result of the SOPA markup meeting December 15 2011, you should read both articles. As a strong proponent of the private right of action for all Internet endpoints and users, I’ve long

    Read more
    0