Loopback Address

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 42 Experts worldwide ranked by ideXlab platform

Paul Hoffman - One of the best experts on this subject based on the ideXlab platform.

  • Running a Root Server Local to a Resolver
    2020
    Co-Authors: Warren Kumari, Paul Hoffman
    Abstract:

    Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server; those resolvers may have difficulty getting responses from the root servers, such as during a network attack. Some DNS recursive resolver operators want to prevent snooping by third parties of requests sent to DNS root servers. In both cases, resolvers can greatly decrease the round- trip time and prevent observation of requests by serving a copy of the full root zone on the same server, such as on a Loopback Address or in the resolver software. This document shows how to start and maintain such a copy of the root zone that does not cause problems for other users of the DNS, at the cost of adding some operational fragility for the operator. This document obsoletes RFC 7706. [ This document is being collaborated on in Github at: https://github.com/wkumari/draft-kh- dnsop-7706bis. The most recent version of the document, open issues, and so on should all be available there. The authors gratefully accept pull requests. ]

  • Decreasing Access Time to Root Servers by Running One On The Same Server
    2018
    Co-Authors: Warren Kumari, Paul Hoffman
    Abstract:

    Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on the same server, such as on a Loopback Address. This document shows how to start and maintain such a copy of the root zone that does not pose a threat to other users of the DNS, at the cost of adding some operational fragility for the operator. This draft will update RFC 7706. See Section 1.1 for a list of topics that will be added in the update. [ Ed note: Text inside square brackets ([]) is additional background information, answers to freqently asked questions, general musings, etc. They will be removed before publication.] [ This document is being collaborated on in Github at: https://github.com/wkumari/draft-kh-dnsop-7706bis. The most recent version of the document, open issues, and so on should all be available there. The authors gratefully accept pull requests. ]

  • Decreasing Access Time to Root Servers by Running One on Loopback
    2015
    Co-Authors: Warren Kumari, Paul Hoffman
    Abstract:

    Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on a Loopback Address (such as 127.0.0.1). This document shows how to start and maintain such a copy of the root zone that does not pose a threat to other users of the DNS, at the cost of adding some operational fragility for the operator.

Warren Kumari - One of the best experts on this subject based on the ideXlab platform.

  • Running a Root Server Local to a Resolver
    2020
    Co-Authors: Warren Kumari, Paul Hoffman
    Abstract:

    Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server; those resolvers may have difficulty getting responses from the root servers, such as during a network attack. Some DNS recursive resolver operators want to prevent snooping by third parties of requests sent to DNS root servers. In both cases, resolvers can greatly decrease the round- trip time and prevent observation of requests by serving a copy of the full root zone on the same server, such as on a Loopback Address or in the resolver software. This document shows how to start and maintain such a copy of the root zone that does not cause problems for other users of the DNS, at the cost of adding some operational fragility for the operator. This document obsoletes RFC 7706. [ This document is being collaborated on in Github at: https://github.com/wkumari/draft-kh- dnsop-7706bis. The most recent version of the document, open issues, and so on should all be available there. The authors gratefully accept pull requests. ]

  • Decreasing Access Time to Root Servers by Running One On The Same Server
    2018
    Co-Authors: Warren Kumari, Paul Hoffman
    Abstract:

    Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on the same server, such as on a Loopback Address. This document shows how to start and maintain such a copy of the root zone that does not pose a threat to other users of the DNS, at the cost of adding some operational fragility for the operator. This draft will update RFC 7706. See Section 1.1 for a list of topics that will be added in the update. [ Ed note: Text inside square brackets ([]) is additional background information, answers to freqently asked questions, general musings, etc. They will be removed before publication.] [ This document is being collaborated on in Github at: https://github.com/wkumari/draft-kh-dnsop-7706bis. The most recent version of the document, open issues, and so on should all be available there. The authors gratefully accept pull requests. ]

  • Decreasing Access Time to Root Servers by Running One on Loopback
    2015
    Co-Authors: Warren Kumari, Paul Hoffman
    Abstract:

    Some DNS recursive resolvers have longer-than-desired round-trip times to the closest DNS root server. Some DNS recursive resolver operators want to prevent snooping of requests sent to DNS root servers by third parties. Such resolvers can greatly decrease the round-trip time and prevent observation of requests by running a copy of the full root zone on a Loopback Address (such as 127.0.0.1). This document shows how to start and maintain such a copy of the root zone that does not pose a threat to other users of the DNS, at the cost of adding some operational fragility for the operator.

Ali Zafar - One of the best experts on this subject based on the ideXlab platform.

  • SRV6 SID/USID OAM FOR ADJ-SID VALIDATION
    Technical Disclosure Commons, 2020
    Co-Authors: Nainar, Nagendra Kumar, Pignataro, Carlos M., Ali Zafar
    Abstract:

    Techniques are presented for using a Loopback segment identifier (SID) that has the semantic of a Loopback Address (terminate and process). Such a Loopback SID is assigned for both traditional SID and micro SID (uSID) that can be used in the segment-list of the probe packet to terminate the probe directly in the Nexthop of the adjacent SID (Adj-SID) which can be used to validate the forwarding semantic of the respective Adj-SID at the dataplane

Li Zhi - One of the best experts on this subject based on the ideXlab platform.

  • Study and analysis of EBGP oscillation induced by Loopback Addresses
    Journal of Sichuan University, 2008
    Co-Authors: Li Zhi
    Abstract:

    Border Gateway Protocol(BGP) is a path vector protocol with plenty of expansibility and control mechanisms.It provides loop-free inter-domain route information to autonomy systems(AS),and control the data transit between ASes with given policies.With the applications of BGP serves in backbone network,BGP stability is directly concerns on internet's stable operation and it is the basis of expansibility and sustainable development for internet.The EBGP peering with Loopback Address facilitate load balancing over multiple links.However,the router oscillations may occur under special network configuration.This paper has analyzed the condition lead to BGP routing oscillation in the EBGP peering with Loopback Addresses,and has shown various oscillating possibility.In addition,it has brought forward the common method how to avoid this kind of route oscillation.

Nainar, Nagendra Kumar - One of the best experts on this subject based on the ideXlab platform.

  • SRV6 SID/USID OAM FOR ADJ-SID VALIDATION
    Technical Disclosure Commons, 2020
    Co-Authors: Nainar, Nagendra Kumar, Pignataro, Carlos M., Ali Zafar
    Abstract:

    Techniques are presented for using a Loopback segment identifier (SID) that has the semantic of a Loopback Address (terminate and process). Such a Loopback SID is assigned for both traditional SID and micro SID (uSID) that can be used in the segment-list of the probe packet to terminate the probe directly in the Nexthop of the adjacent SID (Adj-SID) which can be used to validate the forwarding semantic of the respective Adj-SID at the dataplane