PING

APNIC
PING

PING is a podcast for people who want to look behind the scenes into the workings of the Internet. Each fortnight we will chat with people who have built and are improving the health of the Internet. The views expressed by the featured speakers are their own and do not necessarily reflect the views of APNIC.

  1. 2 DAYS AGO

    Post-Quantum Cryptography

    In the last episode of PING for 2024, APNIC’s Chief Scientist Geoff Huston (https://blog.apnic.net/author/geoff-huston/) discusses the shift from existing public-private key cryptography using the RSA and ECC algorithms to the world of ‘Post Quantum Cryptography. These new algorithms are designed to withstand potential attacks from large-scale quantum computers and are capable of implementing Shor’s algorithm (https://en.wikipedia.org/wiki/Shor%27s_algorithm), a theoretical approach for using quantum computing to break the cryptographic keys of RSA and ECC.Standards agencies like NIST are pushing to develop algorithms (https://csrc.nist.gov/projects/post-quantum-cryptography) that are both efficient on modern hardware and resistant to the potential threats posed by Shor’s Algorithm in future quantum computers. This urgency stems from the need to ensure ‘perfect forward secrecy’ for sensitive data — meaning that information encrypted today remains secure and undecipherable even decades into the future.To date, maintaining security has been achieved by increasing the recommended key length as computing power improved under Moore’s Law, with faster processors and greater parallelism. However, quantum computing operates differently and will be capable of breaking the encryption of current public-private key methods, regardless of the key length.Public-private keys are not used to encrypt entire messages or datasets. Instead, they encrypt a temporary ‘ephemeral’ key, which is then used by a symmetric algorithm to secure the data. Symmetric key algorithms (where the same key is used for encryption and decryption) are not vulnerable to Shor’s Algorithm. However, if the symmetric key is exchanged using RSA or ECC — common in protocols like TLS and QUIC when parties lack a pre-established way to share keys — quantum computing could render the protection ineffective. A quantum computer could intercept and decrypt the symmetric key, compromising the entire communication.Geoff raises concerns that while post-quantum cryptography is essential for managing risks in many online activities — especially for protecting highly sensitive or secret data—it might be misapplied to DNSSEC. In DNSSEC, public-private keys are not used to protect secrets but to ensure the accuracy of DNS data in real-time.If there’s no need to worry about someone decoding these keys 20 years from now, why invest significant effort in adapting DNSSEC for a post-quantum world? Instead, he questions whether simply using longer RSA or ECC keys and rotating key pairs more frequently might be a more practical approach.Read more about Post-Quantum Cryptography and DNSSEC on the APNIC blog and the web.* Post-Quantum Cryptography (https://blog.apnic.net/2024/11/29/post-quantum-cryptography/) (Geoff Huston, APNIC Blog November 2024)* [Podcast] Testing Post-Quantum Cryptography DNSSEC (https://blog.apnic.net/2024/07/11/podcast-testing-post-quantum-cryptography-dnssec/) (Podcast July 2024)* A quantum-safe cryptography DNSSEC testbed (https://blog.apnic.net/2024/02/16/a-quantum-safe-cryptography-dnssec-testbed/) (Caspar Schutijser (https://blog.apnic.net/author/caspar-schutijser/), APNIC Blog 2024)* [Podcast] The SIDN Labs post-quantum DNSSEC testbed (https://blog.apnic.net/2024/08/08/podcast-the-sidn-labs-post-quantum-dnssec-testbed/) (Podcast August 2024)*

    1h 6m
  2. NOV 27

    Measuring DNSSEC keying "drift" between parent and child

    This time on PING, Peter Thomassen (https://github.com/peterthomassen) from SSE (https://www.securesystems.de/) and DEsec.io (https://desec.io/) discusses his analysis of the failure modes of CDS and CDNSKEY records between parent and child in the DNS. These records are used to provide in-band signalling of the DS record, fundamental to the maintenance of a secure path from the trust anchor to the delegation through all the intermediate parent and grandparent domains. Many people use out-of-band methods to update this DS information, but the CDS and the CDNSKEY records are designed to signal this critical information inside the DNS, avoiding many of the pitfalls of passing through a registry-registrar web service.The problem is, as Peter has discovered, the information across the various nameservers (denoted by the NS record in the DNS) of the child domain can get out of alignment, and the tests a parent zone need to do checking CDS and CDNSKEY information aren't sufficiently specified to wire down this risk.Peter performed a "meta analysis" inside a far larger cohort of DNS data captured by Florian Steurer and Tobias Fiebig at the Max Planck Institute and discovered a low but persisting error rate, a drift in the critical keying information between a zones NS and the parent. Some of these related to transitional states in the DNS (such as when you move registry or DNS provider) but by no means all, and this has motivated Peter and his co-authors to look at improved recommendations for managing CDS/CDNSKEY data, to minimise the risk of inconsistency, and the consequent loss of secure entry path to a domain name.Read more about DNSSEC delegation at the APNIC Blog, and the IETF:* Authenticated bootstrapping of DNSSEC delegations (https://blog.apnic.net/2022/03/08/authenticated-bootstrapping-of-dnssec-delegations/) (NIls Wisiol, APNIC Blog March 2022)* Measurement of CDS/CDNSKEY inconsistencies (https://datatracker.ietf.org/meeting/119/materials/slides-119-dnsop-measurement-of-cdscdnskey-inconsistencies-01) (IETF119 Presentation, March 2024)* Generalised DNS NOTIFY (https://datatracker.ietf.org/doc/draft-ietf-dnsop-generalized-notify/) (IETF Draft)

    36 min
  3. NOV 13

    The IPv6 Transition

    In his regular monthly spot on PING, APNIC’s Chief Scientist Geoff Huston (https://blog.apnic.net/author/geoff-huston/) discusses the slowdown in worldwide IPv6 uptake. Although within the Asia-Pacific footprint we have some truly remarkable national statistics, such as India which is now over 80% IPv6 enabled (https://stats.labs.apnic.net/ipv6/IN)by APNIC Labs measurements, And Vietnam which is not far behind on 70% (https://stats.labs.apnic.net/ipv6/VN) the problem is that worldwide, adjusted for population and considering levels of internet penetration in the developed economies, the pace of uptake overall has not improved and has been essentially linear since 2016 (https://stats.labs.apnic.net/ipv6/XA). In some economies like the US, a natural peak of around 50% capability was reached in 2017 (https://stats.labs.apnic.net/ipv6/US) and since then uptake has been essentially flat: There is no sign of closure to a global deployment in the US, and many other economies.Geoff takes a high level view of the logisitic supply curve with the early adopters, early and late majority, and laggards, and sees no clear signal that there is a visible endpoint, where a transition to IPv6 will be "done". Instead we're facing a continual dual-stack operation of both IPv4 (increasingly behind Carrier Grade Nats (CGN) deployed inside the ISP) and IPv6.There are success stories in mobile (such as seen in India) and in broadband with central management of the customer router. But, it seems that with the shift in the criticality of routing and numbering to a more name-based steering mechanism and the continued rise of content distribution networks, the pace of IPv6 uptake worldwide has not followed the pattern we had planned for.Read more about the IPv6 transition at the APNIC Blog* The IPv6 Transition (https://blog.apnic.net/2024/10/22/the-ipv6-transition/) (Geoff Huston, APNIC Blog November 2024)* The Transition to IPv6 are we there yet (https://blog.apnic.net/2022/05/04/the-transition-to-ipv6-are-we-there-yet/) (Geoff Huston, APNIC Blog May 2022)

    1 hr
  4. OCT 30

    A student-led IPv6 deployment at NITK Karnataka

    In this episode of PING, Vanessa Fernandez and Kavya Bhat, two students from the National Institute of Technology Karnataka (NITK) (https://www.nitk.ac.in/) discuss the student led, multi-year project to deploy IPv6 at their campus. Kavya & Vanessa have just graduated, and are moving into their next stages of work and study in computer sciences and network engineering.Across 2023 and 2024 they were able to attend IETF118 and IETF119 and present on their project and it’s experiences to the IPv6 working groups and off-Working Group meetings, in part funded by the APNIC ISIF Project and the APNIC Foundation.This multi-year project is supervised by the NITK Centre for Open-source Software and Hardware (COSH) and has outside review from Dhruv Dhody (ISOC) and Nalini Elkins (Inside Products inc). Former students have also acted as alumni and remain involved in the project as it progresses.We often focus on IPv6 deployment at scale in the telco sector, or experiences with small deployments in labs, but another side of the IPv6 experience is the large campus network, in scale equivalent to a significant factory or government department deployment but in this case undertaken by volunteer staff, with little or no prior experience of networking technology. Vanessa and Kavya talk about their time on the project, and what they got to present at IETF.Read more information on the NITK and their IPv6 deployment project on the APNIC Blog, the IETF website and the APNIC Foundation pages:* Migrating the NITK Surathkal Campus Network to IPv6 (https://apnic.foundation/projects/migrating-nitk-surathkal-campus-network-to-ipv6/) (APNIC Foundation)* How Deploying IPv6 at NITK Led me to IETF (https://blog.apnic.net/2024/07/08/how-deploying-ipv6-at-nitk-led-me-to-ietf/) (Vanessa Fernandez, APNIC Blog)* IPv6 Deployment at NITK (https://datatracker.ietf.org/meeting/118/materials/slides-118-v6ops-ipv6-deployment-at-nitk-00) (IETF118 Presentation)

    28 min
  5. OCT 16

    The back of the class: looking at 240/4 reachability

    In his regular monthly spot on PING, APNIC’s Chief Scientist, Geoff Huston (https://blog.apnic.net/author/geoff-huston/), discusses a large pool of IPv4 addresses left in the IANA registry, from the classful allocation days back in the mid 1980s. This block, from 240.0.0.0 to 255.255.255.255 encompasses 268 million hosts, which is a significant chunk of address space: it's equivalent to 16 class-A blocks, each of 16 million hosts. Seems a shame to waste it, how about we get this back into use?Back in 2007 Geoff Paul and myself submitted An IETF Draft (https://datatracker.ietf.org/doc/draft-wilson-class-e/history/) which would have removed these addresses from the "reserved" status in IANA and used to supplement the RFC1918 private use block. We felt at the time this was the best use of these addresses because of their apparent un-routability, in the global internet. Almost all IP network stacks at that time shared a lineage with the BSD network code developed at the University of California, and released in 1983 as BSD4.2. Subsequent versions of this codebase included a 2 or 3 line rule inside the Kernel which checked the top 4 bits of the 32 bit address field, and refused to forward packets which had these 4 bits set. This reflected the IANA status marking this range as reserved. The draft did not achieve consensus.A more recent proposal has emerged (https://datatracker.ietf.org/doc/draft-schoen-intarea-unicast-240/) from Seth Schoen, David Täht and John Gilmore in 2021 which continues to be worked on, but rather than assigning to RFC1918 internal non-routable puts the address into global unicast use. The authors believe that the critical filter in devices has now been lifted, and no longer persists at large in the BSD and Linux derived codebases. This echoes use of the address space which has been noted inside the Datacentre.Geoff has been measuring reachability at large to this address space, using the APNIC Labs measurement system and a prefix in 240.0.0.0/4 temporarily assigned and routed in BGP. The results were not encouraging, and Geoff thinks routability of the range remains a very high burden.Read more about 240/4 in the APNIC Blog, and the IETF Datatracker website:* Looking for 240/4 addresses (https://blog.apnic.net/2024/09/10/looking-for-240-4-addresses/) (Geoff Huston, APNIC Blog September 2024)* Re-delegation of 240/4 from "future use" to "private use" (https://datatracker.ietf.org/doc/draft-wilson-class-e/) (expired IETF draft, 2008)* Unicast use of the formerly reserved 240/4 (https://datatracker.ietf.org/doc/draft-schoen-intarea-unicast-240/00/) (active IETF draft, 2024)

    1h 9m
  6. OCT 2

    Focusing purely on technology limits the understanding of Internet resilience

    In this episode of PING, Nowmay Opalinski (https://blog.apnic.net/author/nowmay-opalinski/) from the French Institute of Geopolitics at Paris 8 University discusses his work on resilience, or rather the lack of it, confronting the Internet in Pakistan.As discussed in his blog post (https://blog.apnic.net/2024/09/17/focusing-on-technology-limits-understanding-of-internet-resilience-pakistan-case-study/), Nowmay and his colleagues at the French Institute of Geopolitics (IFG), University Paris 8 (https://www.univ-paris8.fr/en/ur-centre-de-recherches-et-d-analyses-geopolitiques-ifg-lab-research-unit), and LUMS University Pakistan (https://lums.edu.pk/) used a combination of technical measurement from sources such as RIPE Atlas (https://atlas.ripe.net/), in a methodology devised by the GEODE project, combined with interviews in Pakistan, to explore the reasons behind Pakistan’s comparative fragility in the face of seaborne fibre optical cable connectivity. The approach deliberately combines technical and social-science approaches to exploring the problem space, with quantitative data and qualitative interviews.Located at the head of the Arabian Sea, but with only two points of connectivity into the global Internet, Pakistan has suffered over 22 ‘cuts’ to the service in the last 20 years, However, as Nowmay explores in this episode, there actually are viable fibre connections to India close to Lahore, which are constrained by politics.Nowmay is completing a PhD at the institute, and is a member of the GEODE project (https://geode.science/en/about/). His paper on this study was presented at the 2024 AINTEC conference (https://interlab.ait.ac.th/aintec2024) held in Sydney, as part of ACM SIGCOMM 2024 (https://conferences.sigcomm.org/sigcomm/2024/).Read more about GEODE, and Nowmay’s work:* The GEODE project (https://geode.science/en/)* Pakistan, a case study (https://blog.apnic.net/2024/09/17/focusing-on-technology-limits-understanding-of-internet-resilience-pakistan-case-study/) in Internet fragility* The Quest for a Resilient Internet Access in a Constrained Geopolitical Environment  (https://dl.acm.org/doi/fullHtml/10.1145/3674213.3674220)(AINTEC 2024 Paper)

    34 min

Ratings & Reviews

5
out of 5
4 Ratings

About

PING is a podcast for people who want to look behind the scenes into the workings of the Internet. Each fortnight we will chat with people who have built and are improving the health of the Internet. The views expressed by the featured speakers are their own and do not necessarily reflect the views of APNIC.

You Might Also Like

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes, and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada