Featured Blogs

Latest

A Tale of Two Governance Models

As many of us in the Internet community gear up for the ICANN meeting in Colombia next week, it's important to remember that not everybody embraces the multi-stakeholder approach that we've gradually learned to love. Just a month ago, a group with a very different vision of how to run things wrapped up their own Internet governance meeting in Latin America. Their meeting was three times as long and accomplished about a third as much, but they'd still like to see their model replace the ICANN model. more

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more

Is Bulgarian Cyrillic .?? (.bg) Really Similar to Other Latin ccTLDs?

Bulgaria has proposed for an Internationalized Domain Name (IDN) ccTLD string .?? (Cyrillic for .bg, or U+0431 U+0433), but the proposal was turned down by the ICANN DNS Stability panel in May 2010 without any arguments or an option for appeal. The proposed string is composed of two characters... more

ACMA: 30,000 PC’s Infected in Australia Per Day

Anti-spam and malware enforcement agency ACMA reports on this (shocking high?) figure. Keep this up and ca. 50% of the Australian population is infected within a year. I remember a presentation from Sweden only a few years ago, that there were only a little over a thousand infected pc's in Sweden. (Reactions were: that can't be correct. Too low) Do you know what the numbers are for your country and maybe more importantly what your government and/or Industry is/are doing about it? more

Bad Timing: Comcast, Netflix, NN, Cable Modems, and NBCU

Comcast, the largest broadband provider, largest pay-TV company, and third-largest telephone company in the country, distributes communications services to more than a third of the country. Today Comcast's existing overwhelming market power was on display in major public battles with (1) Level 3 and (2) cable modem manufacturer Zoom. The takeaway from today: No market forces are constraining Comcast -- or any of the other major cable distributors, none of which compete with each other. more

ITU, the Internet, and a Very Contentious Footnote

I was part of a small APNIC delegation that attended the ITU Plenipotentiary Conference (PP-10) with a limited Sector Member role as an observer. Our aim was to be available to ITU Member States with questions on IP addressing issues and to follow Member State discussions on the ITU's role in Internet governance issues. Four adopted resolutions at PP-10 were of particular relevance to Internet management, of which one was new: "Facilitating the transition from IPv4 to IPv6". more

Comcast’s Demand for a Video Surcharge From Its Level 3 “Peer”

According to Level 3, a major long haul Internet Service Provider, Comcast has demanded a "recurring fee" when Level 3 hands off movie and other high capacity video traffic for delivery by Comcast to one of the cable company's subscribers. This demand warrants scrutiny, perhaps less in the context of Network Neutrality and more in terms of further diversification (unraveling) of the peering process. more

DNS: The Basis for Billions

In the midst of "Cyber Monday", the day traditionally seen as one of the year's busiest days for online shopping, it is only appropriate to examine the importance DNS plays for online economies. With DNS being at the heart of Internet connectivity it is easy to understand why DNS is important to the growing health of economies whose online health in dollars and euros rest in the billions. more

Why DNS Blacklists Don’t Work for IPv6 Networks

All effective spam filters use DNS blacklists or blocklists, known as DNSBLs. They provide an efficient way to publish sets of IP addresses from which the publisher recommends that mail systems not accept mail. A well run DNSBL can be very effective; the Spamhaus lists typically catch upwards of 80% of incoming spam with a very low error rate. DNSBLs take advantage of the existing DNS infrastructure to do fast, efficient lookups. A DNS lookup typically goes through three computers... more

Phishing Attack: An Open Letter to the Anti-Spam and Mailbox Operator Community

I'm sure many of you are familiar with the targeted ESP phishing attack that has been ongoing for almost a year now and has led to multiple known ESP system breaches. Return Path was recently a victim of this same attack... In short, a relatively small list of our clients' email addresses was taken from us, meaning those addresses are now the targets of the phishing campaign that are intended to compromise those client systems. more

The End is Nearly in Sight for New gTLDs

A little over two weeks from now the ICANN meeting in Cartagena de Indias will be over and, if ICANN has the courage of its convictions, the new generic top-level domain (gTLD) program should be on the home stretch, heading towards its official May 30 launch. The ground rules will be clear, the process predictable, and applicants will be able to begin to implement their strategies with confidence. As Elvis Presley once sang, it will be a time for "a little less conversation, a little more action, please". more

Outlawing Botnets

The European Commission is apparently considering the promulgation and adoption of a directive that would, at least in part, criminalize botnets. As I understand it, the premise behind adopting such a directive is that since botnets are capable of inflicting "harm" on a large scale, we need to separately criminalize them. I decided to examine the need for and utility of such legislation in this post. more

IPv6 and Transitional Myths

I attended the RIPE 61 meeting this month, and, not unexpectedly for a group that has some interest in IP addresses, the topic of IPv4 address exhaustion, and the related topic of the transition of the network to IPv6 has captured a lot of attention throughout the meeting. One session I found particularly interesting was one on the transition to IPv6, where folk related their experiences and perspectives on the forthcoming transition to IPv6. I found the session interesting, as it exposed some commonly held beliefs about the transition to IPv6, so I'd like to share them here, and discuss a little about why I find them somewhat fanciful. more

The Three Lessons We Can Learn from gTLDs’ Past

History is a great teacher, we are told. So, on the cusp of an explosion in new top-level domains, what can we learn from the two previous expansions of the Internet's naming space? And what are the pitfalls to avoid? Let's just assume the fundamental and obvious lessons of realistic expectations, a solid business plan and prudent resource management, and instead focus on the little talked about but still critical lessons that will separate the winners and the losers in this race. But first - a caveat! more

IANA and the Automation of the Root Zone Management

As an unwavering stalwart of ICANN's obligation to honor its commitments under the bylaws to "operate to the maximum extent feasible in an open and transparent manner" I make it a point to read the minutes of its board and committee meetings in large part because I spent most of my three years on the ICANN Board trying to get these documents timely published. In reviewing the recently published IANA Committee minutes the following item caught my attention. more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days