Many who attended the ICANN Durban meeting this summer will recall the open forum were speakers lined up to call on ICANN to either speed up or slow down the new gTLDs depending on their position or interest. I chose to address a different topic that no one was yet willing to tackle publicly. It was PRISM and the NSA surveillance scandals. In my intervention I was also the first to also publicly warn ICANN and Fadi Chehade directly that "Trust" in ICANN and Multistakeholderism face serious perils from the Snowden revelations... more
As widely discussed recently, observed within the ICANN community several years ago, and anticipated in the broader technical community even earlier, the introduction of a new generic top-level domain (gTLD) at the global DNS root could result in name collisions with previously installed systems. Such systems sometimes send queries to the global DNS with domain name suffixes that, under reasonable assumptions at the time the systems were designed, may not have been expected to be delegated as gTLDs. more
This is an informal description the evolution of a particular area of network forensic activity, namely that of traceback. This activity typically involves using data recorded at one end of a network transaction, and using various logs and registration records to identify the other party to the transaction. Here we'll look at the impact that IPv4 address exhaustion and IPv6 transition has had on this activity, and also note, as we explore this space, the changing role of IP addresses within the IP protocol architecture. more
Now that IPv6 deployment is happening in major networks around the world, the question becomes -- what does "success" look like for IPv6? How much IPv6 traffic is "enough"? What are major milestones we should be tracking in IPv6 deployment? What is next for IPv6? more
Six months following the April 11th issuance of the Beijing Communique by ICANN's Governmental Advisory Committee (GAC), ICANN continues to wrestle with whether to accept the bulk of the GAC's proposed safeguards for new gTLDs as set forth in Annex 1 of that document. On October 1st ICANN Board Chairman Stephen Crocket sent a letter to GAC Chair Heather Dryden summarizing the results of the September 28th meeting of the New gTLD Program Committee (NGPC) that considered the remaining and still undecided advice received from the GAC. more
If a hired philosopher graced ICANN, the work would get down to brass tacks. "What is it?", she would ask, that drives ICANN beyond the mysterious dot that apparently represents the root. One can picture subsequent appeals from senior management to its navels, for clues as to what in the end game the root truly represents. I surmise that contemplating bred-in-the-bone values does not resonate easily or often at ICANN. Its like that unreachable itch that evades our scratch; we can't get at the source. more
Hot on the heels of other ICANN Internationalized Domain Name (IDN) Top-Level Domain (TLD) launch errors, we now have another example of ICANN's failure to comprehend the differences between IDN and ASCII names, this time to the detriment of potential IDN registrants and the new IDN generic TLD (gTLD) Registries. This gaff really makes you wonder whether the SSAC and Multilinguism departments at ICANN have ever met. more
The first Sunrise Period for trademark owners under ICANN's new gTLD program has begun. The gTLD is the Arabic IDN '????, or "dot-Shabaka". The term roughly means "web" in Arabic and eligibility for registrations is unrestricted. The Dot-Shabaka Registry has made it clear for months that they wanted to be the first TLD to launch this year. more
It is a safe assumption that if you are reading this post, you like technology. If that is the case, then you understand the tremendous economic, cultural, and human rights benefits an open, universal, and free Internet provides. That freedom is under attack. And it is our responsibilities, as stakeholders in a successful Internet, to balance governments and have an open dialog on the topic. more
As a product manager and engineer, I really enjoy attending the technology-oriented Cable-Tec Expo each year. It has a stronger technology focus than many other industry trade shows and it's always a good opportunity to talk to the engineering teams from all of the operators and vendors. more
How do we harden the Internet against the kinds of pervasive monitoring and surveillance that has been in recent news? While full solutions may require political and legal actions, are there technical improvements that can be made to underlying Internet infrastructure? As discussed by IETF Chair Jari Arkko in a recent post on the IETF blog, "Plenary on Internet Hardening", the Technical Plenary at next weeks IETF 88 meeting in Vancouver, BC, Canada, will focus on this incredibly critical issue. more
It was never obvious at the outset of this grand Internet experiment that the one aspect of the network's infrastructure that would truly prove to be the most fascinating, intriguing, painful, lucrative and just plain confusing, would be the Internet's Domain Name System. After all, it all seemed so simple to start with: network applications rendezvous with their counterparts using protocol-level addresses, but we users prefer to use "natural" identifiers that act as aliases for these addresses. more
Something has shifted. I think it might be the end of the holding pattern we as new gTLD applicants/followers/enthusiasts and generally speaking, the entire community, have been caught up in. We´re all looking forward to ushering in the next generation of the Internet. Someone press start please. Several major milestones have been reached. more
It's been a busy week for the Internet. More famous for its golden beaches, Bali recently hosted the eighth Internet Governance Forum which delivered waves of constructive discussion and debate. Over the past few days, the Internet governance community has exchanged best practices and debated a wide range of key topics that will continue to pose questions for policy as the Internet evolves... more
DNS tunneling -- the ability to encode the data of other programs or protocols in DNS queries and responses -- has been a concern since the late 1990s. If you don't follow DNS closely, however, DNS tunneling likely isn't an issue you would be familiar with. Originally, DNS tunneling was designed simply to bypass the captive portals of Wi-Fi providers, but as with many things on the Web it can be used for nefarious purposes. For many organizations, tunneling isn't even a known suspect and therefore a significant security risk. more
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byRadix
Sponsored byVerisign
Sponsored byWhoisXML API