Where Have All the Firewalls Gone? Security Risks in Residential IPv6 Transition
When most home internet connections still relied on IPv4, Network Address Translation (NAT) served...
When most home internet connections still relied on IPv4, Network Address Translation (NAT) served...
When engineers first started connecting tiny, battery-powered sensors to the internet, they...

Oct 29, 2025
There is a theory which states that if ever anyone discovers exactly what the Linux networking stack does and why it does it, it will instantly disappear and be replaced by something even more bizarre and inexplicable.There is...
Oct 29, 2025
On April 10th, 2025 12:10 UTC, a security researcher notified Cloudflare of two vulnerabilities (CVE-2025-4820 and CVE-2025-4821) related to QUIC packet acknowledgement (ACK) handling, through our Public Bug Bounty program....
Oct 29, 2025
Linux’s networking capabilities are a crucial part of how Cloudflare serves billions of requests in the face of DDoS attacks. The tools it provides us are invaluable and useful, and a constant stream of contributions from...
Oct 29, 2025
IP addresses have historically been treated as stable identifiers for non-routing purposes such as for geolocation and security operations. Many operational and security mechanisms, such as blocklists, rate-limiting, and anomaly...
Oct 29, 2025
Every interaction on the Internet—including loading a web page, streaming a video, or making an API call—starts with a connection. These fundamental logical connections consist of a stream of packets flowing back and forth...
Oct 29, 2025
Representatives of the five RIRs propose RPKI Trust Anchor constraints – a draft RPKI protocol that binds each trust anchor to its rightful resources, enabling safe inter-RIR transfers and so closing a long-standing...
