COST Action IC0703 : Data Traffic Monitoring and Analysis (TMA)

Thu, 06/26/2008 - 00:44 by Olivier Bonaventure • Categories:

Since March 2008, Benoit Donnet participates in the COST Action IC0703 "Data Traffic Monitoring and Analysis (TMA): theory, techniques, tools and applications for the future networks" together with key researchers who work on Internet measurements in Europe.

Google IPv6 Conference - Summaries and comments

Wed, 06/18/2008 - 15:00 by Damien Leroy • Categories:

to be continued

IPv6 and DNS

By ISC. (authors of BIND)
Nothing really interesting for us.


Available at

- It seems that Apple airport Gateway implements full IPv6 (by tunnel?)
- NAT v4->v6->v4 an issue ? It is temporary and an incentive for full IPv6... and it's not worth than v4->v4->v4


Wed, 06/11/2008 - 15:19 by Damien Saucez • Categories:

The Farinacci et al. "LISP Alternative Topology (LISP-ALT)" draft proposes a mechanism to manage EID to RLOCs mapping in the LISP protocol.

The idea of LISP-ALT (ALT for Alternative Topology) propose to build an public Internet overlay to manage mapping in LISP.

Observations from the DNSSEC deployment

Tue, 05/20/2008 - 15:43 by Sébastien Barré • Categories:

This paper by E. Osterwell, D. Massey and L. Zhang describes the experience learned from their tool, secspider (

After introducing DNSSEC, they show that DNSSEC is currently not widely deployed, and many "islands of security" exists. An island of security is a (set of) zone(s) that have deployed DNSSEC, but their parent have not DNSSEC. Thus the trust chain cannot be established. In particular the root servers have not enabled DNSSEC.

A Monitoring Approach for Safe IPv6 Renumbering

Mon, 05/19/2008 - 17:17 by Damien Leroy • Categories:

F. Beck, I. Chrisment, and O. Festor. A Monitoring Approach for Safe IPv6 Renumbering. IPv6 Today - Technology and Deployment Workshop (IPv6TD'06). August 2006.
The paper can be found on :

IP Address Authorization for Secure Address Proxying using Multi-key CGAs and RING Signatures

Mon, 05/19/2008 - 16:43 by Sébastien Barré • Categories:

That paper from Kempf, Wood, Ramzan and Gentry proposes to use multi-key CGAs as a way to secure address proxying.

Examples of address proxying include proxy-SEND (previously proxy-arp for IPv4), or Mobile IPv6, where the home agent locally claims ownership of an adress, on behalf of its real owner, because the owner is away from the network.

Pure SEND does not work in those cases, since it relies on a private key, that is not known by the proxy.

Client-Side Adaptive Search Optimisation for Online Game Server Discovery

Wed, 05/07/2008 - 00:01 by Damien Saucez • Categories:

The paper "Client-Side Adaptive Search Optimisation for Online Game Server Discovery" presented at Networking'08 and written by G. Armitage aims at reducing response time and resources consumption of server selection in online games.

Syndicate content