• End-to-End Arguments in System Design (Classic Paper)
  • RFC791: Interent Protocol
  • RFC792: Internet Control Message Protocol (ICMP)
  • RFC8200: Internet Protocol, Version 6 (IPv6)
  • RFC768: User Datagram Protocol (UDP)
  • RFC793: Transmission Control Protcol (TCP) (1981)
  • RFC9293: Transmission Control Protocol (TCP) (2022)
  • SYN Cookies Description in RFC 4987: TCP SYN Flooding Attacks and Common Mitigations
  • Open Shortest Path First (OSPF) Protocol Version 2 - RFC 2328
  • Host-to-Host Congestion Control for TCP
  • RFC 826: An Ethernet Address Resolution Protocol
  • RFC 4861: Neighbor Discovery for IP version 6 (IPv6)
  • netinet/ip.h
  • netinet/tcp.h
  • An Internet-Wide Analysis of Traffic Policing
  • UDP Hole Punching
  • Ubuntu help page on ServersBehindNat
  • A Border Gateway Protocol 4 (BGP-4) (RFC 4271)
  • BGP routing policies in ISP networks
  • Securing Data Through Avoidance Routing
  • How YouTube was "Hijacked"
  • Why secure systems require random numbers
  • Behind Intel's New Random-Number Generator
  • RFC 4086: Randomness Requirements for Security
  • Notes on Transport Layer Security
  • RSA-OAEP Encryption Scheme
  • Remote Timing Attacks are Practical
  • Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web
  • List of trusted Certifying Authorities by Google Chrome
  • Example of Certifying Authority Pricing
  • X.509 Standard Complete Document
  • RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
  • RFC 6960: Online Certificate Status Protocol (OCSP)
  • RFC 1035: Domain Names - Implementation and Specification
  • root-servers.org
  • List of Root Servers
  • RFC 4033: DNS Security Introduction and Requirements
  • Security through Publicity
  • How Great is the Great Firewall? Measuring China's DNS Censorship
  • Examining How the Great Firewall Discovers Hidden Circumvention Servers
  • Analyzing the Great Firewall of China Over Space and Time (using port scans)
  • iptables man page
  • nmap.org
  • Live Cyber Attack Map for Visualizing Digital Threat Incidents
  • Designing an Authentication System: a Dialogue in Four Scenes
  • Authenticated Encryption With Associated Data (AEAD) Algorithm API
  • Authenticated-Encryption with Associated-Data