Engineers are hard at work planning for an eventual transition to the next version of IP—IPv6. We've published several articles about IPv6 in previous editions. This time, François Donzé describes the automatic address configuration feature of IPv6. Of note is also the increasing global support for IPv6 deployment. (Refer to " Fragments" article.)
Our final article returns to our recurring theme: adding security to existing Internet protocols. Because many malicious attacks on the Internet are perpetrated by "spoofing" information in one form or another, it makes sense to look at the Domain Name System (DNS), a critical component of the Internet infrastructure. Today, it is possible to create systems which provide fake answers to DNS queries. Miek Gieben explains what is being done to address this issue in his tutorial on DNSSEC, the secure version of the DNS protocols.
Please take a moment to renew or update your subscription to this journal. You will need to supply your subscription ID and e-mail address in order to gain access to your database record. If you have any questions, please send a note to firstname.lastname@example.org.
This is the 25th edition of IPJ. The journal now has more than 32,000 subscribers world-wide, and is available on paper and electronically on our Website in PDF and HTML format. The Website, contains all our back issues, and will soon offer a cumulative index in ASCII format that will make it easier to find particular articles. As always, we welcome your feedback.
—Ole J. Jacobsen, Editor and Publisher
|| Top | Next ||