Leaking Routes

Its happened again. We’ve just had yet another major routing leak, this time bringing down the Internet for most of an entire country. Maybe twenty years ago no one would’ve noticed, let alone comment, but now of course its headline material in the media. What happened? And how could this…


Hunting the Bogon Filter

Until recently IP network operators were encouraged to set up so-called “bogon address filters” at the edge of their networks. These filters were intended to discard all incoming traffic where the source address in the IP header was from a block of addresses that was known to be unallocated. The…


NZ nogging

The NZNOG meeting continues to be one of the more interesting NOG meetings these days. Now I have to say that in some sense the NZNOG meeting was not highly polished in terms of logistics: some of the time the overhead projector was either bouncing around or projecting in green,…


Addressing 2011 – One Down, Four to Go!

It’s January again, and being the start of another year, it’s as good a time as any to look at the last 12 months and see what the Internet was up to in 2011. So lets see what has changed in the past 12 months in addressing the Internet, and…


Detecting IP Address Filters

Until recently IP network operators were encouraged to set up so-called “bogon address filters” at the edge of their networks. These filters were intended to discard all incoming traffic where the source address in the IP header was from a block of addresses that was known to be unallocated. The…


Curious Case of the Crooked TCP Handshake

In this article we will be delving into the behaviour of the Linux implementation of TCP, and looking at the way in which TCP establishes a connection. There are socket options in Linux that cause the TCP handshake to behave in a rather curious way.


Dual Stack Esotropia

The introduction of a second IP protocol into the Internet presents many technical issues, and in previous columns we’ve explored many of the issues related to network engineering and infrastructure. In this column I’d like to head upward in the protocol stack to the rarefied air way up there at…


The (BGP) World is Flat!

In the previous article on the growth trends of BGP we looked at the BGP routing table, and looked at some predictive models for the growth of the size of the Internet’s routing table. The conclusions made in that article were that while there is a very high level of…


Hacking Away at the Internet’s Security

The front page story of the September 13 2011 issue of the International Herald Tribune said it all: “Iranian activists feel the chill as hacker taps into e-mails.” The news story relates how a hacker has “sneaked into the computer systems of a security firm on the outskirts of Amsterdam”…