Senior Research and Development Scientist at APNIC
Joined on February 12, 2010
Total Post Views: 36,592
About |
George Michaelson is currently APNIC’s senior R&D;scientist. Recently, he has been working on long-baseline DNS statistics, services logging, audit and analysis, and design and implementation of the Internet Number Resource Certification framework.
George is a member of the BCS, and a founder member of the Australian chapter of the Internet Society. He participates regularly in IETF standardization meetings, and co-authors Request For Comment (RFC) documents, technical drafts, and conference and peer-review papers.
George graduated from York University in 1982 with a BSc in Computer Science. His career in the United Kingdom and Australia has pursued research and development in computer science, networking, and systems administration.
Except where otherwise noted, all postings by George Michaelson on CircleID are licensed under a Creative Commons License.
The 24th DNS-OARC meeting was held last week in Buenos Aires -- a two-day DNS workshop with amazingly good, consistent content. The programme committee are to be congratulated on maintaining a high quality of presentations. Here are my picks of the workshop. They fall into three groups, covering themes I found interesting... These presentations related to the ongoing problem of DNS as a source of reflection attacks, or a victim of attempted DDoS... more
Wouldn't it be nice if turning on IPv6 really was 'press one button and the rest is magic' easy? For some things, it is. If you're talking about client-side, enabling an IPv4-only home service on DSL or fibre really can be this simple, because all the heavy lifting is being done inside your ISP: you're not enabling IPv6 in the network, you're turning on the last mile. It was knocking at your door and you just had to let it in. more
In August of last year I wrote in a blog about the importance of cryptech to wide-scale trust in the Internet. For those who don't know about it, http://cryptech.is is a project aiming to design and deploy an openly developed, trustable Hardware Security Module (HSM) which can act both as a keystore (holding your secrets and keeping them private) and as a signing engine. more
Security is great when all the green lights are shining brightly and everything validates as intended, but what happens when you encounter failure? In this work we examine the behaviour of the DNS when security, in the form of DNSSEC is added, and we look at what happens when things do not happen as intended. What triggered this examination was a sudden increase in the traffic generated by secondary servers for the in-addr.arpa reverse zones in December 2009. more