Author Archives: Russ White
Author Archives: Russ White
Does an IP address need to be treated like other Personally Indentifiable Information (PII)?
The post Privacy And Networking Part 3: Is An IP Address Protected Information For Privacy? appeared first on Packet Pushers.
Given the arguments from the first article in this series, if privacy should be and is essential—what does the average network engineer do with this information? How does privacy impact network design and operations? To answer this question, we need to look at two other questions. First, what is private information, precisely? The network carries […]
The post Privacy And Networking Part 2: Legal And Ethical Privacy appeared first on Packet Pushers.
In the first post on a series on privacy and networking, Russ White makes the case that privacy matters not just for infosec, risk management, or compliance, but as a human right.
NOGs and other NOGs, they sit on logs… Looking at the Internet from the outside, it might almost seem like it runs just on standards bodies, vendors, and providers. But these three groups, as important as they are, really only scratch the surface of the sinews that keep the Internet operating. At the core of […]
As we come close to ending this rather long running series on how the Internet really works (because I’m certain you’re about bored of this series, and ready for me to talk about something else!), I’d like to discuss three more topics I think are really important to the Internet’s operation on a day to […]
Most providers — transit, edge, and content — are pretty obvious to the various users of the Internet. Users interact with edge and content providers every day, and transit providers have such large names in the industry that they’re often the subject of news and other articles. But who actually connects all these different providers […]
One of the various problems we face in the data networking world is the absolute plethora of tunneling technologies we have available. Going way back to the beginning, there was SNA, GRE, IP-in-IP, and a host of others. In the midterm was have MPLS (though some will argue this isn’t a tunneling protocol — but […]
Let’s take one look back over the IETF before we move on to the next piece of the infrastructure of the ‘net. Why does it take so long for a single document to get through the process, and result in a standard? There is, of course, the formal process, which requires the document to proposed, […]
Quite often RFCs in the “earlier days” discussed not only process but also design. Looking back now, considering the complexity of the network engineering world, these RFCs might seem even a little trite. But these “architectural RFCs” often still carry thoughts and records of experience that are important, even if they aren’t so much followed […]
Last time we talked about a few things that go wrong in the IETF — this time we’ll talk about a few more things that can go wrong. Boiling the Ocean. Engineers, as a rule, like to solve problems. The problem is we often seem to think the bigger the problem, the better the solution. […]
We’ve talked a little about the structure of the IETF, and the process a draft follows when moving from submission to draft to RFC… The perennial question is, though — why does it take so long? Or, perhaps — why is the IETF so broken? Let me begin here: the IETF is a human organization. […]
In a former post I pointed out that we need to think of obscurity as a tool in network security — that we shouldn’t try to apply rules that are perfectly logical in terms of algorithms to networks as a system. While I’m not normally one to repeat myself, this topic needs a little more […]
In our deeper investigations of the IETF as a “sample standards body” in this (apparently forever running) series on how the Internet really works, let’s take a look at the IETF standards process. This is a rather sanitized, informal review — I may leave out some steps, or describe things in a way that doesn’t […]
This is the final post in my series on BGPSEC — I will probably follow this up, at some point, with a couple of posts on some alternatives to BGPSEC, and the larger issue of the evolution of BGP. Basic Operation Protections Offered Replays, Timers, and Performance Signatures and Performance In this final post, I […]
So far, we’ve looked at the naming system, routing, and policy in our travel through “internet land.” Last time, we took a quick look at some of the various organizations that create the standards that make the internet work. This time I’m going to start looking in more depth at one specific standard body, or […]