The project to sign the DNS root zone with DNSSEC took an additional step toward completion yesterday with the last of the "root server" hosts switching to serving signed DNSSEC data. Now every DNS query to a root server can return DNSSEC-signed data, albeit the "deliberately unvalidatable" data prior to the final launch. Another key piece for a working signed root is the acceptance of trust anchors in the form of DS records from top-level domain operators. These trust anchors are used to form the chain of trust from the root zone to the TLD. more
At the moment we are facing the end stage of a relatively large range of traditional products and services. The reason for this is that for a long time traditional industries have been able to delay the arrival of the decline phase of many of their products, basically because of the monopolistic, or at least dominant, structures of many of the industry sectors -- and in particular telecoms, media, energy and banking. more
For administrative convenience and not as required by law, the FCC likes to apply an either/or single regulatory classification to convergent operators. Having classified ISPs as information service providers, the Commission unsuccessfully sought to sanction Comcast's meddling with subscribers' peer-to-peer traffic. Now Chairman Genachowski wants to further narrow and nuance regulatory oversight without changing the organic information service classification. more
The CAN SPAM act has been in place for five and a half years. Compatible state laws have been in place nearly as long. Anti-spam laws in the EU, Australia, and New Zealand were enacted years ago. But the number of significant anti-spam lawsuits is so small that individual bloggers can easily keep track of them. Considering that several billion spams a day are sent to people's inboxes, where are all the anti-spam lawsuits? more
A number of comments to ICANN's proposed Post Delegation Dispute Resolution Process for new gTLD Registry Operators support a proposal by the World Intellectual Property Organization (WIPO) to hold a registry operator accountable for trademark infringement that occurs within a TLD if it "knowingly permitted, or could not have reasonably been unaware of" infringing domain names within the TLD. more
Since November of last year we have been discussing the problem of illicit and illegal online pharmacy support by ICANN-accredited Registrars. In several articles and direct contact with the Registrars we have tirelessly tried to convey the seriousness of this problem, many listened, some did not... With the background information already known, the case presented here is much more specific and concerns EvaPharmacy, which was until recently, the world's largest online criminal pharmacy network. more
IT security specialists have known for years that the plain DNS is not to be trusted. Any hope for improvement rests on the DNSSEC protocol deployment. In this post, I will review the current status in one critical aspect, namely the DNS root signature key management. The other two foremost are the application usage of DNSSEC protocol functionality and the operational front, or the extent of deployment in the DNS infrastructure. The operational front includes the support by the DNS root nameservers, but my focus on signature key management leaves this issue aside. more
As we approach the World Cup in South Africa this June it's heartening to see the amount of attention being paid to the continent. As with ICANN's recent Nairobi meeting, the eyes of the world are focusing on Africa in a new way -- as a sophisticated marketplace, and as a destination for investment, technology, and yes, sports... Still, as we prepare for the Cup and as we celebrate ICANN's recent approval of more Internationalized Domain Names (IDNs), our job as an Internet community remains unfinished. Too many scripts and thus too many key voices remain "off the pitch". more
The first step (but certainly not the last) towards saving the internet from spam, malware, and other abuse is to keep your own network clean. A friend of CAUCE, who wishes to remain anonymous, offers these tips and resources to help you identify problem traffic emanating from your network, and clean it up. Though primarily written for ISPs, many of the items below should apply equally well to any network owner. more
The FCC seems determined in revisiting and repairing the current CableCard rules fiasco in which it chose to mandate a universal Set-Top-Box for Cable, Telco, and DBS providers. Where does a solution lie, and is the FCC going down another road of improbable acceptance? The problem with a CableCard solution, in an attempt to create more competition, was the opening of current provider STB's to access other venues, which turned out to be both technically and business concept unfriendly. more
Those advocates of a free market approach to fiber to the home (FttH), rather than a utilities-based one, often point to entertainment as the way to make that happen. And they then immediately point to the USA, where FttH rollouts have indeed been driven by competition between the cable TV companies... The telcos who were initially less enthusiastic about broadband (because it required them to abandon their lucrative ISDN services and replace them with the simpler and cheaper DSL technology) suddenly found themselves bested in the broadband market by the cable TV companies - a trend we also saw in some of the European markets - for instance, the Netherlands... more
One of the RSS feeds that I read is Reason magazine, which is a web site for libertarians. In general, libertarians want less government intervention both in our personal lives and in the economy. The idea behind libertarians is that today's Republicans want less government intervention in our economy but are perfectly fine to have them dictate some aspects of morality. Similarly, today's Democrats want less government intervention in our personal lives but are perfectly fine with creating government bureaucracy to deliver social services. That's an oversimplified summary, but is more or less correct. About two months ago I got an article in my RSS feed where Reason was commenting on the government's response to the cyber war threats. more
Werner Vogels, CTO of Amazon, explains how web applications will be built in the future. His point is twofold. The bad news is that expectations for good web applications are sky high. It has to have rich media, available on multiple devices, very scalable, social networking and that is just the beginning. The good news is that a lot of this can be done by services that are readily available on the web, with reasonable usage based pricing. more
What better way to kick things off than to review the domain aftermarket, three years after my then infamous "Domain Aftermarket Overdue For An Asset Repricing" article which caused a bit of a stir at the time. I said then that there was a big recession coming, in it everything would suffer severe price declines, and that domain names would not be exempt. I went on to say that the low-hanging fruit in the domain industry had been picked: type-in activity would go into secular decline over time, and that domainers would face increasing competition from other avenues such as DNS resolvers, ISPs and web browsers. It didn't go over well. more
Defense Readiness Condition (DEFCON) is a measure of the activation and readiness of the United States armed forces. The DEFCON scale is a numerical ranking from 5 (standard peacetime protocol) to DEFCON 1 (expectation of actual imminent attack). Today ICANN should find itself at a DEFCON 1 status with the announced pending departure of Doug Brent, ICANN's Chief Operating Officer, effect at the end of July. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global