Want to learn about the state of DNSSEC usage in North America? Or what is new in DNS monitoring? Or where DNSSEC fits into the plans of operating systems? Or how DANE is being used to bring a higher level of security to email? All those questions and much more will be discussed at the DNSSEC Workshop at ICANN 51 happening on Wednesday, October 15, 2014, from 8:30 am to 2:45 pm Pacific Daylight Time (PDT, which is UTC-7). more
As we arrived in Hollywood -- the land of happy endings -- ICANN had just given us cause to hope that the ICANN accountability process might get its own Hollywood ending, despite a fitful start. As one who's been critical of ICANN management's heavy-handed attempts to control the accountability process, it's only appropriate to give credit where credit is due. In accepting the community's strenuous -- and nearly unanimous -- calls for a cross-community working group to lead the process of improving ICANN's accountability mechanisms, ICANN management says it's now prepared to follow the community's lead, rather than dictating and constraining it. more
Whenever I examine the technical elements of the various Internet security certifications and standards that organisations are clamouring to achieve compliance against, I can't help but feel that in too many cases those businesses are prioritising the wrong things and wasting valuable resources. They may as well be following a WWI field guide on how to keep cavalry horses nourished and bayonets polished in a world of stealth aircraft and dirty bombs. more
NANOG 62 was held at Baltimore from the 6th to the 9th October. These are my observations on some of the presentations that occurred at this meeting. .. One of the more memorable sides in this presentation was a reference to "map" drawn by Charles Minard in 1869 describing the statistics relating to the Napoleonic military campaign in Russia, and the subsequent retreat. more
Back in late 2009 I had the honour of explaining my views on how broadband can deliver social and economic benefits to countries and their people to Dr Hamadoun Touré the Secretary-General (SG) of the ITU, the UN body looking after global telecoms. He showed a particular interest in the initiative Australia had taken in developing the NBN. This discussion with the SG led to the establishment in 2010 of the UN Broadband Commission, co-sponsored by UNESCO and the ITU. Dr Touré invited 50 Commissioners from around the world to participate in this initiative, half of them from private industry. more
In a series of recent blog posts I've described the technical challenges in registration operations, a proposal for an industry association, and announced an interactive workshop to explore association formation. This is an update on where things stand with the workshop. The first Registration Operations Association Workshop is scheduled for Thursday, 16 October 2014 in the Pacific Palisades room at the Los Angeles Hyatt Regency Century Plaza hotel, the same venue being used for ICANN 51. more
ICANN 51 taking place in Los Angeles this week may not have its customary evening Gala, but it opened with rousing remarks by U.S. Secretary of Commerce Penny Pritzker in the first-ever ICANN appearance of the head of the Cabinet agency from which it was born and which has exercised continuous oversight of its key IANA functions. The themes of the growing importance of Internet Governance and the U.S. government's steadfast commitment to defense of the multistakeholder model, as well as the connection between maintenance of an open Internet and fostering free speech and economic growth, were key elements of Secretary Pritzker's address. more
It probably won't raise any eyebrows to know that for practically every penetration tester, security researcher, or would-be hacker I know, nothing is more likely to make their eyes glaze over and send them to sleep faster than a discussion on Governance, Risk, and Compliance (i.e. GRC); yet the dreaded "C-word" (Compliance) is a core tenet of modern enterprise security practice. more
It has been my distinct pleasure to serve on ICANN's Expert Working Group on gTLD Directory Services (EWG). We put in many long months and what seemed like countless hours of research, discussion, meetings, and deliberations on how to tackle a clean-slate approach to gTLD directory services, popularly known as "WHOIS". In our Final Report, the Expert Working Group (EWG) recommended a Registration Directory Service (RDS) to replace today's WHOIS, providing a next-generation system to better meet the needs of the evolving global Internet with greater accuracy, privacy, and accountability. more
Engineering wise, how's the industry doing? With that question in mind, hundreds descended on Denver for this year's Society of Cable Telecommunications Engineers (SCTE) Cable-Tec Expo. That question begs to be answered. Really, can we still separate the engineering 'cool' stuff from the business chic? By that, I mean the business requirements from subscribers who demand communication and entertainment when they want it, where they want it, and on whatever device they want it delivered to. more
As the Chair of the 2014 Generic Names Supporting Organization (GNSO) Review Working Party, I have the privilege of working with 19 dedicated and passionate individuals who represent the diversity of the GNSO community. We've held numerous meetings and provided extensive input and feedback on key aspects of the GNSO Review in the short time that our group has been assembled to act as a liaison between the GNSO, the Independent Examiner (Westlake Governance Limited), and the ICANN Board Structural Improvements Committee. more
In my first CircleID post, I compared the cyberspace to a farmland, which has to be cultivated and developed. I ended by asking: Where is cyberspace? I have asked this same question from many people, many of whom are internet experts. They all said the cyberspace is in the computers, networks, or servers, or the Internet itself. I agree with these cyberspace ideas. In addition, my opinion is a bit different. more
Today, anyone can use WHOIS to identify the organization or person who registered a gTLD domain name, along with their postal address, email address, and telephone number. Publishing this data has long been controversial, creating a system riddled with problems. On one hand, anonymous access to all WHOIS data enables misuse by spammers and criminals and raises concerns about personal privacy. On the other hand, incomplete or false WHOIS data prolongs Internet outages and leaves crime victims with little recourse. more
It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. We are spending large amounts of resources in reacting to various vulnerabilities and attempting to mitigate individual network attacks, but are we making overall progress? What activities would constitute "progress" anyway? more
This post outlines location factors that make the online world not as flat as some have claimed. I then outline the impact of these factors on the demand for new gTLDs. Domain names can signal geography by means of country-code Top Level Domains (ccTLDs) and new generic TLDs (gTLDs). Location is back in the spotlight for reasons laid out by Professor David R. Bell of the Wharton School in his recent book. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byDNIB.com