Featured Blogs

Latest

Global Surveillance: Towards Convergence?

Built for the most part during the Cold War, surveillance systems on a global scale were considered a vital necessity with the onset of nuclear weapons, if only to keep Mutually Assured Destruction at bay. Today, these systems are also used for domestic surveillance and universal data harvesting, including on one's own citizens. Should we still consider these systems with the same reverence as if we were, say, in the midst of some Cuban Missile Crisis? more

5 Questions to Ask To Choose the Right Website Monitoring Solution

In these competitive times and with the holiday's looming, your Website experience needs to give customers a "warm and fuzzy" feeling. That is, it should be available and fast, with no major hiccups. Website monitoring is essential in delivering just that. How do you find a monitoring tool? Just set the monitoring budget, find a vendor, call the sales department and buy yourself some monitoring, right? Whoa, not so fast. more

DNS Amplification Attacks: Out of Sight, Out of Mind? (Part 1)

Geoff Huston's recent post about the rise of DNS amplification attacks offers excellent perspective on the issue. Major incidents like the Spamhaus attack Geoff mentions at the beginning of his post make headlines, but even small attacks create noticeable floods of traffic. These attacks are easy to launch and effective even with relatively modest resources and we see evidence they're occurring regularly. Although DNS servers are not usually the target of these attacks the increase in traffic and larger response sizes typically stress DNS infrastructure and require attention from operation teams. more

A Question of DNS Protocols

One of the most prominent denial of service attacks in recent months was one that occurred in March 2013 between Cloudflare and Spamhaus... How did the attackers generate such massive volumes of attack traffic? The answer lies in the Domain Name System (DNS). The attackers asked about domain names, and the DNS system answered. Something we all do all of the time of the Internet. So how can a conventional activity of translating a domain name into an IP address be turned into a massive attack? more

ICANN Must Now Decide String Similarity Question

Yesterday, a decision on a string confusion objection was reached by a dispute resolution provider that resulted in a scenario that ICANN and the Applicant Guidebook had not addressed - conflicting opinions have been rendered by expert panelists ruling on the exact same pair of strings. One of our applications now hangs in the balance. The expert panelist for the International Centre for Dispute Resolution (ICDR) assigned to decide the string confusion objection filed by VeriSign against United TLD's .CAM application, issued a decision sustaining VeriSign's objection that .CAM and .COM are confusingly similar. more

The Challenge of DNS Security

When the domain name system (DNS) was first designed, security was an afterthought. Threats simply weren't a consideration at a time when merely carrying out a function - routing Internet users to websites - was the core objective. As the weaknesses of the protocol became evident, engineers began to apply a patchwork of fixes. After several decades, it is now apparent that this reactive approach to DNS security has caused some unintended consequences and challenges. more

Minding the Gap at the ITU-T

In 1992, Theo Irmer who had served as the organization's director for the previous eight years during its glory days, wrote that if there was any hope of saving what was left of the body, it must be privatised. That never occurred. Everyone pretty much left and migrated to dozens of other venues where all the world's information and communication technology standards have long been created and evolved. Essentially every major nation moved to competitive, private, marketplace-driven provisioning of communication products and services. more

New gTLDs: If I Knew Then, What I Know Now…

If only I had been able to predict the new gTLD future, but alas my crystal ball (well, really it's a Magic 8 Ball ®) did little to help me. And I really doubt that 5+ years ago, when this new gTLD journey began, that anyone could have predicted where we are now. All that said, back in 2008, I wish I could have known that... more

ICANN Bans Dotless Domains

Any new top level domain approved for the Internet will have to be more than just a single label. ICANN's new gTLD program committee (NGPC) has decided to ban the use of "dotless domains". TLD operators that had planned to use their new suffix as a keyword, i.e. just the string and nothing else, will now have to reconsider. more

Time for Auction?

Today, Innovative Auctions announced the resolution of eight Top Level Domains in the second private auction commencing on August 13th for a total of $9,651,000. With the first and second auctions successfully completed and the third auction scheduled for September 10th is now a good time to resolve your contention set and jump on the next auction bus? more

8 Domains, $9.65M: Second Applicant Auction a Success

We at Innovative Auctions were happy to see the successful completion of the second Applicant Auction earlier today. Winners will pay a total of $9,651,000 to resolve contention for eight new generic top-level domains (gTLDs). The winners for the eight contention sets included in this week's auction were... more

A Single Price Index for Domain Names Is Misleading

Having a single price index for the domain name industry would be worse than useless. Such an index is presented in a recent study by Thies Lindenthal. The index is intended to be a benchmark for domain owners and investors. But it's out of line with other studies and the common sense of how a market operates. A much better barometer to follow is average prices for groups of domain names with similar characteristics. more

Panels Rule No Confusion Exists Between Singular and Plural New gTLD Strings

If early International Centre for Dispute Resolution decisions are anything to go by, as far as dispute resolution panellists are concerned, singular and plural versions of the same string do not risk causing user confusion. Tasked with handling string confusion objections under the new gTLD program, the ICDR has just rejected an objection by Google against Donuts' application for .CARS. Google has applied for .CAR. more

Video: IETF Chair Jari Arkko Summarizes The Activities of IETF 87 In Berlin

The 87th meeting of the Internet Engineering Task Force (IETF) in Berlin, Germany, concluded on August 2, 2013. IETF Chair Jari Arkko recently published his summary of IETF 87 on the IETF Blog highlighting what he felt were some of the more important aspects of what was a very successful IETF meeting. I also had the privilege of interviewing Jari on video about the meeting. more

A Look at Closed vs. Open New gTLDs

The essay analyzes some of the strengths and weaknesses of closed and open new gTLDs. The success of the gTLD to a large degree rests on the successful design and implementation of an effective digital business model. A closed gTLD is one whose owner uses it for exclusive content - for example, the use of .book exclusively for Amazon books. Conversely, if Amazon opens up .book, other book sellers and libraries would be able to set up sub-domains, sites where they controlled content. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days