All topics
🌐

Internet Operations

The foundation stack: DNS, IP, TCP, TLS, HTTP. Everything needed to get bytes from A to B securely.

Naming & AddressingTransport SecurityCertificate TrustHTTPState & SessionsVPN & TunnelingTransport
17
Must Know
11
Should Know
2
Niche

Must Know

17 specs
RFC 1034RFCMust Know

DNS Concepts

DNS is the phone book of the internet. Every domain, email MX record, SPF/DKIM TXT record, and service discovery entry depends on it.

Back OfficeProductNaming & Addressing
Details
RFC 1035RFCMust Know

DNS Implementation

The record types (A, MX, TXT, CNAME) you configure in every DNS panel live in this spec. Know what you're setting.

Back OfficeProductNaming & Addressing
Details
RFC 3986RFCMust Know

URI

Every URL in your app, API, auth redirect, webhook, or deep link is built on this grammar. Essential for routing, redirects, and OAuth callback validation.

Back OfficeProductNaming & Addressing
Details
WHATWG URLWHATWGMust Know

URL Standard

Browsers parse URLs per this standard, not raw RFC 3986. Critical for client-side routing, form encoding, and cross-origin behavior.

ProductNaming & Addressing
Details
RFC 8446RFCMust Know

TLS 1.3

Every HTTPS connection, SMTP/IMAP over TLS, OAuth token exchange, and API call uses TLS. It is the foundational security layer.

Back OfficeProductTransport Security
Details
RFC 6797RFCMust Know

HSTS

A one-line HTTP header that eliminates a class of downgrade attacks. Every public web app should set HSTS.

ProductTransport Security
Details
CA/B Forum BRCA/BMust Know

CA/B BR

Governs every TLS certificate you buy or provision via Let's Encrypt/ACM/Digicert. Understanding BR helps with cert errors, CAA records, and domain validation requirements.

Back OfficeProductCertificate Trust
Details
RFC 9110RFCMust Know

HTTP Semantics

This is the core contract of every web API, browser request, and server response. You can't design or debug HTTP without knowing this.

ProductHTTP
Details
RFC 9111RFCMust Know

HTTP Caching

Correct caching is the difference between a fast app and an expensive, slow one. Mis-configured cache headers cause stale data bugs and unnecessary origin load.

ProductHTTP
Details
RFC 9112RFCMust Know

HTTP/1.1

HTTP/1.1 is still the baseline. Load balancers, proxies, and debugging tools often present HTTP in this format. Understanding the wire format is essential.

ProductHTTP
Details
RFC 6265RFCMust Know

Cookies

Sessions, auth tokens, tracking, and CSRF defenses all run through cookies. Know SameSite, Secure, HttpOnly, and domain scoping to avoid security bugs.

ProductState & Sessions
Details
Fetch Standard §CORSWHATWGMust Know

CORS

Every browser-side API call to a different origin hits CORS. Misconfigured CORS is a top source of dev frustration and security holes.

ProductState & Sessions
Details
W3C CSP Level 3W3CMust Know

CSP

A well-configured CSP is the strongest mitigation against XSS. Required by modern security audits and browser hardening.

ProductState & Sessions
Details
RFC 4301RFCMust Know

IPsec Architecture

IPsec is the dominant VPN technology for enterprise site-to-site links (AWS VPN, Azure VPN Gateway, on-prem firewalls). Understanding tunnel vs transport mode, SAs, and the SPD is essential for configuring and debugging VPN connectivity.

Back OfficeProductVPN & Tunneling
Details
RFC 4303RFCMust Know

ESP

ESP is the workhorse of IPsec — every encrypted VPN tunnel uses it. When your cloud VPN shows 'Phase 2 SA established', that's an ESP SA. Understanding ESP's SPI, sequence numbers, and algorithm negotiation is key to VPN troubleshooting.

Back OfficeProductVPN & Tunneling
Details
RFC 7296RFCMust Know

IKEv2

IKEv2 is how IPsec tunnels are established and rekeyed. Every cloud VPN gateway (AWS, GCP, Azure), enterprise firewall, and mobile VPN client uses IKEv2. Phase 1/Phase 2 failures are the #1 VPN debugging scenario.

Back OfficeProductVPN & Tunneling
Details
WireGuard WhitepaperIETFMust Know

WireGuard

WireGuard is replacing IPsec and OpenVPN for most new VPN deployments. Its simplicity (~4,000 lines of kernel code vs 400,000+ for OpenVPN/IPsec) makes it auditable. Used by Tailscale, Mullvad, Mozilla VPN, and most modern VPN services.

Back OfficeProductVPN & Tunneling
Details

Should Know

11 specs
RFC 791RFCShould Know

IPv4

Your servers, load balancers, firewalls, and security groups are all defined in IPv4/CIDR. Know the addressing model.

Back OfficeProductTransport
Details
RFC 8200RFCShould Know

IPv6

ISPs and cloud providers are rolling out IPv6 dual-stack. AAAA records, IPv6 CIDR, and dual-stack routing are real concerns.

Back OfficeProductTransport
Details
RFC 9293RFCShould Know

TCP

Every HTTP request your app makes rides on TCP. Understanding TCP helps with latency, timeouts, keep-alives, and connection pooling.

ProductTransport
Details
RFC 768RFCShould Know

UDP

DNS runs over UDP. QUIC and HTTP/3 run over UDP. Media and gaming often use UDP for low-latency delivery.

ProductTransport
Details
RFC 9000RFCShould Know

QUIC

HTTP/3 runs on QUIC. Modern CDNs and browsers use it by default. It fixes TCP's head-of-line blocking problem for multiplexed requests.

ProductTransport
Details
RFC 9114RFCShould Know

HTTP/3

HTTP/3 is the current performance frontier for web delivery. CDNs enable it automatically; understand it for performance tuning and debugging.

ProductHTTP
Details
RFC 9457RFCShould Know

Problem Details

Error response formats are the most inconsistent part of most APIs. RFC 9457 gives you a standard shape that clients can handle generically.

ProductHTTP
Details
RFC 4302RFCShould Know

AH

AH is mostly historical — ESP does everything AH does and adds encryption. However, AH appears in legacy configurations and exam material. Understanding why it was replaced helps explain modern IPsec design decisions.

Back OfficeVPN & Tunneling
Details
RFC 2784RFCShould Know

GRE

GRE is the standard tunneling protocol for carrying routing protocols (OSPF, EIGRP) across IPsec links. AWS Transit Gateway, SD-WAN overlays, and many enterprise networks use GRE+IPsec. Also the basis for PPTP's data channel.

Back OfficeVPN & Tunneling
Details
RFC 3931RFCShould Know

L2TPv3

L2TP/IPsec was the default VPN protocol on every major OS for a decade. Understanding L2TP explains why many legacy VPN deployments use UDP port 1701, why they're always paired with IPsec, and how they differ from pure IPsec tunnel mode.

Back OfficeVPN & Tunneling
Details
RFC 4555RFCShould Know

MOBIKE

Mobile VPN clients constantly switch networks (Wi-Fi to cellular, roaming between APs). Without MOBIKE, every IP change tears down the VPN and forces a full IKEv2 re-handshake. MOBIKE is why modern mobile VPN clients reconnect instantly.

Back OfficeProductVPN & Tunneling
Details

Niche / Specialized

2 specs
RFC 2637RFCNiche

PPTP

PPTP is a cautionary tale in protocol design. Understanding why it's broken (DES key space in MS-CHAPv2, RC4 key reuse in MPPE) teaches important lessons about protocol-level cryptographic failures. Never deploy it.

Back OfficeVPN & Tunneling
Details
RFC 6071RFCNiche

IPsec/IKE Roadmap

The IPsec RFC ecosystem is large and interconnected. When you need to find the right RFC for a specific algorithm, extension, or use case, this roadmap saves hours of cross-referencing.

Back OfficeVPN & Tunneling
Details