Featured Blogs

Latest

Bit Caps, Consolidation, and Clearwire

The news that Comcast, Time Warner, and AT&T are all considering capping use of their networks -- so that "overuse" would trigger a charge -- has prompted intense discussion of just why these network operators are moving in this direction. One camp suggests that these operators have to do *something* to manage congestion, and because any protocol-specific discrimination plan raises howls of protest from the Net Neutrality side of the fence adopting bit-usage discrimination schemes is inevitable. It's the least-bad approach, following this view. more

SPIT is in Everyone’s Mouth, Though Not Yet in Everyone’s Ears

Spam over Internet Telephony (SPIT) is viewed by many as a daunting threat. SPIT is much more fatal than email spam, for the annoyance and disturbance factor is much higher. Various academic groups and the industry have made some efforts to find ways to mitigate SPIT. Most ideas in that field are leaning on classical IT security concepts such as intrusion detection systems, black-/white-/greylists, Turing tests/computational puzzles, reputation systems, gatekeeper solutions, etc... We identified the lack of a benchmark testbed for SPIT as a serious gap in the current research on the matter, and this motivated us at the to start working on a first tool for that. more

ICANN Paris: Seeking Comments from Internet Users in North America

Ahead of next week's ICANN meeting in Paris, I would like to consult users, At-Large Structures (ALSs) and others involved in internet governance in North America. As one of the three regional representatives on the ICANN At-Large Advisory committee, I want to make sure individuals, users and ALS's are given the chance to summit their own questions, suggestions and items to the agenda of the upcoming meeting. I'd be happy to receive your comments, and/or schedule a chat with you Mon-Thur, from 13:00-18:00 EDT. Leave a comment to this post, or leave me a message. more

Introductory Remarks from Innovation ‘08

Here's my opening remarks from Media Access Project's Innovation '08 in Santa Clara this morning. A DVD will be available shortly. This was a lively discussion, with Google and Vuze on the case. Good morning and welcome. My name is Richard Bennett and I'm a network engineer. I've built networking products for 30 years and contributed to a dozen networking standards, including Ethernet and Wi-Fi... I'm opposed to net neutrality regulations because they foreclose some engineering options that we're going to need for the Internet to become the one true general-purpose network that links all of us to each other, connects all our devices to all our information, and makes the world a better place. Let me explain. more

Will a Global TAR Make DNSSEC Stick?

Two US Government contractors and the National Institute of Science and Technology have released a white paper, "Statement of Needed Internet Capability," detailing possible alternatives and considerations for a Trust Anchor Repository (TAR) to support DNSSEC deployment. The document was released through the DNSSEC-Deployment Group this week with a request that it be circulated as widely as possible to gather feedback. A Trust Anchor Repository (TAR) refers to the concept of a DNS resource record store that contains secure entry point keys... more

Proposal for .sport, a New Top-Level Domain

OK. Now my lawyer has given me the green light, I can officially announce I am working on a proposal for a .sport TLD, to be submitted to ICANN for consideration as a new TLD next year. There is still a long way to go in terms of getting the proposal ready, but I this this one is a winner... more

Swedish National Defense Radio Agency to Wiretap All Internet Traffic

Several people abroad have started mailing me and others asking if rumors of new legislation to be passed in Sweden on the 17th of June is for real. There are also reports in international forums starting to pop up. This is fairly old news, and I think that most of us are surprised that this has not generated more press both inside and outside Sweden earlier. This legislation will allow for the Swedish National Defense Radio Agency (FRA) to wiretap Internet traffic leaving the country... more

Carpet Bombing in Cyber Space - Say Again?

I was pointed to an article in the Armed Forces Journal where Col Charles W. Williamson III argues that the US Air Force needs to develop a BOTnet army as part of the US military capability for retaliatory strikes. The article brings up some interesting issues, the one that I believe carries the most weight is the argument that we (well, people living on the Internet) are seeing an arms race. It is true that more and more nations are looking into or developing various forms of offensive weapons systems for the use on the Internet... more

How Many TLD Applications Will ICANN Receive?

This post could be subtitled: "The Wisdom of Elites." I polled some people I know in the domain field (plus Andrew Goodman, who wondered what the hell I was going on about). I asked them a simple question: "For the record, how many new TLD applications do you think there'll be?" Most of these people know the domain name world very well, but from different perspectives. Journalists, registrars, intellectual property attorneys, domainers, registry operators, TLD aspirants, entrepreneurs, domain aftermarket auctioneers, civil society activists... more

Knowing Less

The announcement yesterday morning in the Times that New York State AG Andrew Cuomo had reached an agreement with three US network operators (Verizon, Sprint, and Time Warner) about blocking child pornography was both less and more important than it appeared. It's less important in that part of the agreement covers something ISPs already do... more

CIRA Creates Backdoor WHOIS Exceptions for Police and IP Owners

Earlier this year, I wrote glowingly about the new CIRA whois policy, which took effect today and which I described as striking the right balance between access and privacy. The policy was to have provided new privacy protection to individual registrants - hundreds of thousands of Canadians - by removing the public disclosure of their personal contact information... Apparently I spoke too soon. more

ISOC-Bulgaria Asks Worldwide Internet Community to Bring Top Priorities During the Coming IGF

The IGF has a tendency of slowly shifting from a place of a discussion about the way the world accesses information resources, into a place where only topics that make the headlines are being highlighted, with many of the same players being among the loudest speakers. We believe that due to cross-cultural reasons, these people are mainly coming from North America and Western Europe. We urge the IGF to allocate equal time for people from regions outside of those two. more

Defense Department Demonstrates Compliance with the OMB IPv6 Mandate

IPv6 is "critical to achieve our net-centric vision", said Kris Strance, DoD Lead for IP Policy, speaking at the Information Assurance Collaboration Forum (IACF) in Laurel, Maryland last week. The Defense Department sees the proliferation of IP-addressable devices as a key driver for IPv6 adoption, and does not believe that IPv4 can satisfy its future requirements. The imminent explosion of non-traditional IP-enabled devices that Defense intends to implement may even threaten the large IPv4 address allocations that the Department holds. more

Domain Names Users vs Domain Names Registrants

Antony Van Couvering from names@work writes that ICANN's constituencies are a "bad idea". While I am not sure to agree with him on the general principle, he makes some interesting remarks. Among others, he points out that the Generic Names Supporting Organization (GNSO) includes groups that seem to be redundant (the Business and Intellectual Property constituencies) and others like domainers which are not represented in the ICANN arena, yet are an integral part of the domain name business... more

.hk the “Most Unsafe” Domains?

Hong Kong domains are the most dangerous in the world; this little factoid from a recent McAfee report generated quite a bit of media coverage, and even made TIME magazine's top stories list. But all is not as it seems, and aspects of the report may have been out of date before the report was even published. McAfee's study seems to be based on a year's worth of data, and last year was a particularly bad year for the Hong Kong domain, thanks to a gang of botnet spammers registering thousands of domains under the .hk ccTLD. These domains were most likely registered using stolen credit cards... more

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days