Skip to main content

Showing 1–3 of 3 results for author: Streibelt, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.11393  [pdf, other

    cs.NI

    How Ready Is DNS for an IPv6-Only World?

    Authors: Florian Streibelt, Patrick Sattler, Franziska Lichtblau, Carlos H. Gañán, Anja Feldmann, Oliver Gasser, Tobias Fiebig

    Abstract: DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be resolved. We point out, that the presence of an AAAA resource record for a zone's nameserver does not necessarily imply that it is resolvable in an IPv6-only environment since the full DNS delegation chain must r… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Journal ref: Proceedings of the Passive and Active Measurement Conference 2023 (PAM '23)

  2. arXiv:2211.06537  [pdf, other

    cs.NI

    Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets

    Authors: Florian Streibelt, Martina Lindorfer, Seda Gürses, Carlos H. Gañán, Tobias Fiebig

    Abstract: Researchers and practitioners often face the issue of having to attribute an IP address to an organization. For current data this is comparably easy, using services like whois or other databases. Similarly, for historic data, several entities like the RIPE NCC provide websites that provide access to historic records. For large-scale network measurement work, though, researchers often have to attri… ▽ More

    Submitted 31 January, 2023; v1 submitted 11 November, 2022; originally announced November 2022.

  3. arXiv:1610.05531  [pdf, other

    cs.CR

    SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    Authors: Tobias Fiebig, Franziska Lichtblau, Florian Streibelt, Thorben Krueger, Pieter Lexis, Randy Bush, Anja Feldmann

    Abstract: Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in… ▽ More

    Submitted 18 October, 2016; originally announced October 2016.