Cross-posting excellent presentation made by Maciej Andzinski and Pawel Foremski on IETF conference. Presentation is based on the RIPE hackhathon I mentioned in previous post, but extended with the new data and findings. Enjoy!
This time I had a chance to work with excellent people on recdnsfp during RIPE DNS measurements hackathon. Our goal was to identify hijacked resolvers by analyzing their fingerprints, in order to increase safety of Internet users. To do that, we utilize data collected via RIPE Atlas (atlas.ripe.net).
We gathered really interesting data. Check it out on recdnsfp.github.io
There are so many tutorials "how to setup vpn tunnel". Unfortunately most of them are pretty much manual or are based on some bash magic.
I found myself repetitively doing the same thing over and over again... This article will show you how to setup full vpn tunnel (with sniproxy and dns server) with as little as one click (once you have keys) with vagrant and CoreOS.
As bonus point I'll briefly describe how to setup your openwrt to transparently pass traffic through tunnel.
Probably every and each one of have already heard about IPv6. Texts like "IPv4 is over" or "IPv4 Address-space is exhausted" are flooding the internet. So, why should I even bother about moving to IPv6? What are benefits?