Featured Blogs

Latest

IP Addresses and Traceback

This is an informal description the evolution of a particular area of network forensic activity, namely that of traceback. This activity typically involves using data recorded at one end of a network transaction, and using various logs and registration records to identify the other party to the transaction. Here we'll look at the impact that IPv4 address exhaustion and IPv6 transition has had on this activity, and also note, as we explore this space, the changing role of IP addresses within the IP protocol architecture. more

Watch Live - What Does “Success” For IPv6 Look Like? (Briefing Panel on Nov 5)

Now that IPv6 deployment is happening in major networks around the world, the question becomes -- what does "success" look like for IPv6? How much IPv6 traffic is "enough"? What are major milestones we should be tracking in IPv6 deployment? What is next for IPv6? more

Policy Advisory Boards - A Cornerstone PICS (Public Interest Commitment Specification)

Six months following the April 11th issuance of the Beijing Communique by ICANN's Governmental Advisory Committee (GAC), ICANN continues to wrestle with whether to accept the bulk of the GAC's proposed safeguards for new gTLDs as set forth in Annex 1 of that document. On October 1st ICANN Board Chairman Stephen Crocket sent a letter to GAC Chair Heather Dryden summarizing the results of the September 28th meeting of the New gTLD Program Committee (NGPC) that considered the remaining and still undecided advice received from the GAC. more

How Insider Domain Theft Can Bring Down ICANN

If a hired philosopher graced ICANN, the work would get down to brass tacks. "What is it?", she would ask, that drives ICANN beyond the mysterious dot that apparently represents the root. One can picture subsequent appeals from senior management to its navels, for clues as to what in the end game the root truly represents. I surmise that contemplating bred-in-the-bone values does not resonate easily or often at ICANN. Its like that unreachable itch that evades our scratch; we can't get at the source. more

Yet Another Embarrassing IDN Gaff from ICANN

Hot on the heels of other ICANN Internationalized Domain Name (IDN) Top-Level Domain (TLD) launch errors, we now have another example of ICANN's failure to comprehend the differences between IDN and ASCII names, this time to the detriment of potential IDN registrants and the new IDN generic TLD (gTLD) Registries. This gaff really makes you wonder whether the SSAC and Multilinguism departments at ICANN have ever met. more

First New TLD Quietly Enters Sunrise Period

The first Sunrise Period for trademark owners under ICANN's new gTLD program has begun. The gTLD is the Arabic IDN '????, or "dot-Shabaka". The term roughly means "web" in Arabic and eligibility for registrations is unrestricted. The Dot-Shabaka Registry has made it clear for months that they wanted to be the first TLD to launch this year. more

PRISM and the Administration State Strikes Back

It is a safe assumption that if you are reading this post, you like technology. If that is the case, then you understand the tremendous economic, cultural, and human rights benefits an open, universal, and free Internet provides. That freedom is under attack. And it is our responsibilities, as stakeholders in a successful Internet, to balance governments and have an open dialog on the topic. more

Highlights from SCTE Cable-Tec EXPO

As a product manager and engineer, I really enjoy attending the technology-oriented Cable-Tec Expo each year. It has a stronger technology focus than many other industry trade shows and it's always a good opportunity to talk to the engineering teams from all of the operators and vendors. more

Bruce Schneier to Speak About Internet Surveillance at IETF 88 Technical Plenary Next Week

How do we harden the Internet against the kinds of pervasive monitoring and surveillance that has been in recent news? While full solutions may require political and legal actions, are there technical improvements that can be made to underlying Internet infrastructure? As discussed by IETF Chair Jari Arkko in a recent post on the IETF blog, "Plenary on Internet Hardening", the Technical Plenary at next weeks IETF 88 meeting in Vancouver, BC, Canada, will focus on this incredibly critical issue. more

Technical Viability of Dotless Domain Names

It was never obvious at the outset of this grand Internet experiment that the one aspect of the network's infrastructure that would truly prove to be the most fascinating, intriguing, painful, lucrative and just plain confusing, would be the Internet's Domain Name System. After all, it all seemed so simple to start with: network applications rendezvous with their counterparts using protocol-level addresses, but we users prefer to use "natural" identifiers that act as aliases for these addresses. more

Here They Come

Something has shifted. I think it might be the end of the holding pattern we as new gTLD applicants/followers/enthusiasts and generally speaking, the entire community, have been caught up in. We´re all looking forward to ushering in the next generation of the Internet. Someone press start please. Several major milestones have been reached. more

Surfing the Internet in Bali: Reflections on IGF 2013

It's been a busy week for the Internet. More famous for its golden beaches, Bali recently hosted the eighth Internet Governance Forum which delivered waves of constructive discussion and debate. Over the past few days, the Internet governance community has exchanged best practices and debated a wide range of key topics that will continue to pose questions for policy as the Internet evolves... more

DNS Tunneling: Is It a Security Threat?

DNS tunneling -- the ability to encode the data of other programs or protocols in DNS queries and responses -- has been a concern since the late 1990s. If you don't follow DNS closely, however, DNS tunneling likely isn't an issue you would be familiar with. Originally, DNS tunneling was designed simply to bypass the captive portals of Wi-Fi providers, but as with many things on the Web it can be used for nefarious purposes. For many organizations, tunneling isn't even a known suspect and therefore a significant security risk. more

Google’s Project Shield May Actually Be A Double-Edged Sword

Google has received a lot of press regarding their Project Shield announcement at the Google Ideas Summit. The effort is being applauded as a milestone in social consciousness. While on the surface the endeavor appears admirable, the long-term impact of the service may manifest more than Google had hoped for. Project Shield is an invite-only service that combines Google's DDoS mitigation technology and Page Speed service... more

Multi-Stakeholderism and the ‘Coalition of the Willing’

I was part of a group of about 200 people who attended and update at the Internet Governance Forum in Bali on the Montevideo statement. I'd like to share a few of my observations, and offer some unsolicited advice. First, the de facto leader of the and champion of the multi-stakeholder model, the United States, has been sent to the penalty box in light of the NSA surveillance revelations. more

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days