Featured Articles

Hands on: Nvidia Shield Tablet with Android 5.0

Hands on: Nvidia Shield Tablet with Android 5.0

We broke the news of Nvidia's ambitious gaming tablet plans back in May and now the Shield tablet got a bit…

More...
Nokia N1 Android tablet ships in Q1 2015

Nokia N1 Android tablet ships in Q1 2015

Nokia has announced its first Android tablet and when we say Nokia, we don’t mean Microsoft. The Nokia N1 was designed…

More...
Marvell launches octa-core 64-bit PXA1936

Marvell launches octa-core 64-bit PXA1936

Marvell is better known for its storage controllers, but the company doesn’t want to give up on the smartphone and…

More...
TSMC 16nm FinFET Plus in risk production

TSMC 16nm FinFET Plus in risk production

TSMC’s next generation 16nm process has reached an important milestone – 16nm FinFET Plus (16FF+) is now in risk production.

More...
Nvidia GTX 970 SLI tested

Nvidia GTX 970 SLI tested

Nvidia recently released two new graphics cards based on its latest Maxwell GPU architecture, with exceptional performance-per-watt. The Geforce GTX 970…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Thursday, 09 December 2010 11:58

Insecurity experts close to fixing the worst hack of all time

Written by Nick Farell
china-flag

The Internet will not belong to China again
Insecurity experts claim that they are close to sealing one of the worst flaws in Internet coding which effectively shunted all US traffic through China for half an hour. The incident which happened last year was thanks to a lack of security in the Internet's main routing protocol.

While a fix has been mooted for nearly a decade,  a fix should be rolled out in January. Beginning Jan. 1, Internet registries will add a layer of encryption to their operations so that ISPs and other network operators can verify that they have the authority to route traffic for a block of IP addresses or routing prefixes known as Autonomous System Numbers.

The fix, which has been dubbed Resource Public Key Infrastructure (RPKI), is not perfect and it needs adoption by all of the Internet registries as well as major ISPs before it can provide a significant amount of protection. Proponents of RPKI say it is a much-needed first step in improving the security of the Border Gateway Protocol (BGP), which is the core routing protocol of the Internet.

If widely adopted, should prevent ISPs from accidentally disrupting the flow of Internet traffic with erroneous routing information. The RPKI development effort was funded in part by the U.S. Department of Homeland Security, probably as the US woke up to the fact that the status quo was insanity.

Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments