![[Podcast] IP Networking in Deep Space](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://blog.apnic.net/wp-content/uploads/2026/04/PIA14761.jpg)
[Podcast] IP Networking in Deep Space
Marc Blanchet of Viagenie discussed extending Internet Protocol beyond low‑Earth orbit, targeting the Moon, asteroid belt and interplanetary missions. Using Linux TUN, TC‑NETEM and 64‑bit delay modeling, his team can simulate round‑trip times of hours, revealing TCP’s limitations in deep‑space environments. The conversation highlighted QUIC as a more suitable transport, given its resilience to loss and built‑in security. The IETF’s TIPTOP Working Group is now evaluating such protocols, while China and others have already fielded 4G‑based IP stations on the lunar surface.

Exploring the Blind Spot of IXPs Route Servers
Route servers at large IXPs filter BGP updates using a two‑stage process—RPKI validation followed by IRR‑based prefix whitelists derived from AS‑SET objects. The article reveals that AS‑SET expansion discards the origin‑ASN relationship, creating a blind spot where invalid announcements can...

Connecting the Pacific: Infrastructure, Operations, and Regional Cooperation
The Pacific region is witnessing incremental but meaningful upgrades to its Internet ecosystem, highlighted by new submarine‑cable projects such as Google’s Bulikula system, the VAKA cable to Tuvalu, and upcoming Hawaiki Nui 1 and Adamasia cables. Local Internet Exchange Points are slowly...

Setting up Akvorado: A NetFlow Analyser for Your IPv6-First Network
Terry Sweetser details how to deploy Akvorado, an open‑source NetFlow/IPFIX collector, on a modest SOHO server using Docker Compose. The guide walks through enabling SNMP on a router, configuring NetFlow v9 export, and launching the Akvorado stack with ClickHouse and...

APNIC Policy 101: How Policy Shapes Operations — and How Policy Fellows Are Making Participation Easier
At APRICOT 2026 in Jakarta, APNIC’s Policy 101 session illustrated how the region’s internet number resource (INR) policy directly shapes routing, incident response, and registry accuracy. The workshop, led by APNIC Policy Fellows, walked participants through a simulated policy development cycle, using...

Strengthening IPv6 Collaboration: Xiong’an New Area Delegates Visit APNIC
APNIC awarded Xiong’an New Area its first city‑level IPv6 plaque, recognizing the district’s rapid rollout of IPv6 infrastructure. Delegates from Xiong’an and APNIC discussed a joint roadmap that includes IPv6 deployment training and an RPKI roadshow hosted by the city....

RPKI vs Social Engineering: A Case Study in Route Hijacking
At APRICOT 2026, APNIC and LACNIC disclosed a BGP hijack in July 2025 that combined technical spoofing with social engineering. The attacker forged identity documents to convince a multinational upstream provider to activate transit for a stolen ASN, enabling short‑lived, unauthorized route...

Demystifying Performance of eBPF Network Applications
The article examines why eBPF, despite success in network functions, has limited adoption in general networked applications such as web servers and databases. It highlights architectural constraints in the eBPF kernel runtime, APIs, and compiler that impede offloading complex, blocking...

Your Elected Leaders: Shaila Sharmin, Policy SIG Co-Chair
Shaila Sharmin, a cybersecurity architect at Prime Bank PLC, has been re‑elected as Co‑Chair of APNIC’s Policy Special Interest Group for APNIC 60, following prior terms at APNIC 52 and 56. Her career spans ISP, WiMAX and banking sectors, giving her a practical...

Getting Network Automation Right: A Practical Strategy for Enterprise Networks
Enterprise network automation hinges on strategic planning rather than just tool selection. Leaders must prioritize process maturity, governance, and skill development before deploying IaC platforms like Terraform or Ansible. A phased, high‑frequency task approach mitigates risk in brownfield environments, while...

bgproutes.io: A Next-Generation BGP Data Collection Platform
bgproutes.io launches as a next‑generation BGP data platform that aggregates routing information from RIPE RIS, RouteViews, PCH and its own peers, surpassing 5,000 worldwide VPs. It uses automated peering via PeeringDB and the BGP Monitoring Protocol to capture both best‑path and...

APNIC Routing Security SIG at APRICOT 2026: Social Engineering, RPKI, ASPA, & TA Constraints
At APRICOT 2026, APNIC’s Routing Security SIG highlighted six RPKI‑related initiatives, most notably Indonesia’s rapid climb to over 90% RPKI coverage driven by the IIX’s drop‑invalid policy. The session introduced the Autonomous System Provider Authorization (ASPA) object for path validation and...

How to Talk About the Trust in Your Devices: An IRTF Draft
The IRTF’s 14th draft, titled “A Taxonomy of operational security considerations for manufacturer‑installed keys and Trust Anchors,” offers a structured classification of trust‑bootstrapping mechanisms for IoT devices. Authored by Michael Richardson, the document distinguishes between trust anchors, trusted zones, and...

Towards an Industry Best Practice for DNSSEC Automation
DNSSEC adoption remains modest, with only 36 % of resolvers validating and 7 % of domains securely delegated in 2025, hampered by complex enrollment and manual key‑rollovers. Automation using authenticated CDS/CDNSKEY records can eliminate these hurdles, and several European ccTLDs have already...
Balancing Growth and Efficiency — APNIC 61 Policy SIG Deliberations on IPv6 and IPv4 Allocation
At APNIC 61’s Policy SIG in Jakarta, members debated two pivotal proposals: prop‑164, which would lower the minimum IPv6 allocation from a /32 to a /36, and prop‑168, which seeks to raise the maximum IPv4 delegation for account holders to a...