Hunting the Bogon Filter

Until recently IP network operators were encouraged to set up so-called “bogon address filters” at the edge of their networks. These filters were intended to discard all incoming traffic where the source address in the IP header was from a block of addresses that was known to be unallocated. The…


NZ nogging

The NZNOG meeting continues to be one of the more interesting NOG meetings these days. Now I have to say that in some sense the NZNOG meeting was not highly polished in terms of logistics: some of the time the overhead projector was either bouncing around or projecting in green,…


Measuring the Internet for fun and profit

Measuring the Internet for fun and profit Since March 2010 APNIC Research has been engaged in a web based data collection, as part of an ongoing, wide ranging measurement of the Internet, to try and understand how IPv6 deployment is taking shape. This article discusses how we’ve been doing this…


Addressing 2011 – One Down, Four to Go!

It’s January again, and being the start of another year, it’s as good a time as any to look at the last 12 months and see what the Internet was up to in 2011. So lets see what has changed in the past 12 months in addressing the Internet, and…


Detecting IP Address Filters

Until recently IP network operators were encouraged to set up so-called “bogon address filters” at the edge of their networks. These filters were intended to discard all incoming traffic where the source address in the IP header was from a block of addresses that was known to be unallocated. The…


Curious Case of the Crooked TCP Handshake

In this article we will be delving into the behaviour of the Linux implementation of TCP, and looking at the way in which TCP establishes a connection. There are socket options in Linux that cause the TCP handshake to behave in a rather curious way.


Dual Stack Esotropia

The introduction of a second IP protocol into the Internet presents many technical issues, and in previous columns we’ve explored many of the issues related to network engineering and infrastructure. In this column I’d like to head upward in the protocol stack to the rarefied air way up there at…


The (BGP) World is Flat!

In the previous article on the growth trends of BGP we looked at the BGP routing table, and looked at some predictive models for the growth of the size of the Internet’s routing table. The conclusions made in that article were that while there is a very high level of…


Hacking Away at the Internet’s Security

The front page story of the September 13 2011 issue of the International Herald Tribune said it all: “Iranian activists feel the chill as hacker taps into e-mails.” The news story relates how a hacker has “sneaked into the computer systems of a security firm on the outskirts of Amsterdam”…


BGP Routing Growth in 2011

BGP has been toiling away, literally holding the Internet together, for more than two decades, and nothing seems to be falling off the edge of the Internet. As far as we can tell everyone can still see everyone else, and routing appears to be working. So why should we be…