ICANN's Board voted to accept the latest settlement proposal by a vote of 9 to 5: "Today, ICANN's Board of Directors approved, by a majority vote, a set of agreements settling a long time dispute between ICANN and VeriSign, the registry operator for the .COM registry. These settlement documents include a new registry agreement relating to the operation of the .COM registry..." more
This morning I got a bunch of alarmist messages from friends asking about this English-language People's Daily article titled: China adds top-level domain names. The paragraph that's freaking people out is: "Under the new system, besides "CN", three Chinese TLD names "CN", "COM" and "NET" are temporarily set. It means Internet users don't have to surf the Web via the servers under the management of ICANN..." Not for the first time, it appears that the People's Daily's English translation is very misleading. more
I suppose not many have been listening to Paul Vixie or surfing from China, I have done both. The Chinese "alternate root" has been going on for a while. China is creating an alternate root, which it can control while using the Chinese language. I doubt I need to tell any of you about ICANN, VeriSign, Internet Governance, alternate roots or the history of these issues. Everyone else will. Unlike most of my colleagues, I hold a different opinion on the subject and have for some time. China launches an alternate root? It's about time they do, too! more
There's a lot of argument as to which "anti-spam" techniques are legitimately so called. In this article, I'd like to consider what constitutes an anti-spam technique in an ideal sense, then consider the various practiced approaches to spam mitigation in that light, drawing conclusions as to how we should frame the "anti-spam" discussion. ...For the purposes of this discussion, let "spam" refer to "unsolicited bulk email". Not everyone agrees on this definition, but it's by far the most widely accepted, and without a working definition we won't be able to define "anti-spam"... more
If you have been following the debate over Internet governance over the past few years, you know that while ICANN supporters (U.S., Canadian, Australian governments; business lobby) and critics (developing world and occasionally Europe) argue over the optimal approach, particularly with respect to government involvement in the domain name system, the reality has been that possession is all. ...The alternate root has always lurked in the background as a possibility that would force everyone to rethink their positions since it would enable a single country (or group of countries) to effectively pack up their bags and start a new game. ...It is with that background in mind that people need to think about a press release issued yesterday in China announcing a revamping of its Internet domain name system. Starting tomorrow, China's Ministry of Information Industry plans to begin offering four country-code domains. more
A recent report released by Forrester Research last week has put the .travel sponsored top-level domain under the microscope -- calling the sTLD "Nice, But Not Necessary". Although this 4-page report (sold for US$49.00) has singled out the .travel domain, its critical arguments might very well apply to the nature of most sponsored top-level domains currently in existence -- or under review: '.mobi', '.jobs', '.museum', '.coop', '.xxx' and others. CircleID has invited Ron Andruff, President and CEO of Tralliance, the registry for .travel, to respond to arguments made in this report. more
In my recent write-up I start by discussing some recent threats network operators should be aware of, such as recursive DNS attacks. Then, a bit on the state of the Internet, cooperation across different fields and how these latest threats with DDoS also relate to worms and bots, as well as spam, phishing and the immense ROI organized crime sees. I try and bring some suggestions on what can be done better, and where we as a community, as well as specifically where us, the "secret hand-shake clubs" of Internet security fail and succeed. Over-secrecy, lack of cooperation, lack of public information, and not being secret enough about what really matters. more
If there is one word in the telecommunications that has suffered from over-abuse for many years now, it's convergence. The term has been liberally applied to each successive generation of communications technology for their supposed ability to solve a myriad of service delivery problems within a single unifying converged carriage and service delivery solution. Unfortunately, the underlying reality has always been markedly different from these wondrous promises, and we continue to see an industry that deploys a plethora of service delivery platforms and an equally diverse collection of associated switching and service delivery technologies. One can't help but wonder at the collective gullibility of an industry that continues to herald the convergent attributes of each new generation of communications technology, while at the same time being forced to admit that previous convergent promises have never been realized. more
ICANN Board Chair Vint Cerf now works for a company whose motto is, "Do No Evil." So how could Vint and his fellow board members be engaged in a massive capitulation to the enterprise greed of dot-com operator VeriSign? The story of how the Internet community got to its current impasse over the future of the ICANN-VeriSign relationship is overly complicated but the bottom line is that we are suffering from woes created by the U.S. Government with the best of intentions over the past fifteen years. And only the government has the capacity to stop equivocating and do the right thing for all of us. The road to hell is paved with good intentions... more
I'm continually amazed by the amount of FUD being spread with regard to VoIP security threats. People...the sky is not falling. VoIP isn't e-mail. It isn't implemented like e-mail, it won't be implemented like e-mail (maybe "it shouldn't be implemented like e-mail" is a more appropriate statement). Following best security practices will ensure at least a level of security equivalent to current TDM systems. Best FUD I've heard this week: VoIP is insecure because you can simply put a bridge on an ethernet line and capture a stream. Hey, has anyone ever heard of alligator clips? more
Om has burnt the midnight oil analyzing Vonage's S-1 filing, coming to the conclusion that, while churn may not be as ugly as people thought, it's still cause for concern, and apparently intensifying. His point at the end about definitions is particularly good, as excluding cancellations in the first 30-days is undoubtedly flattering to the numbers. The net present value of Vonage's lifetime customer revenues is an issue which VoIP-watchers have long speculated about with trepidation -- what if marketing spending, churn, and price competition combined to form a toxic soup which fatally poisoned the economic proposition for access-independent VoIP? more
Back in the days of dial-up modems and transfer speeds measured in hundreds of bits per second, unwanted email messages were actually felt as a significant dent in our personal pocketbooks. As increases in transfer speeds outpaced increases in spam traffic, the hundreds of unwanted emails we received per week became more of a nuisance than a serious financial threat. Today sophisticated spam filters offered by all major email providers keep us from seeing hundreds of unwanted emails on a daily basis, and relatively infrequently allow unwanted messages to reach our coveted Inboxes. So, to some degree, the spam problem has been mitigated. But this "mitigation" requires multiple layers of protection and enormous amounts of continually-applied effort. more
Despite rather rapid growth in broadband access, the U.S. is falling further and further behind other countries -- we're now ranked #16 in the world. What's slowing the U.S. down? Two threads dominate U.S. broadband policy debate today. The first focuses on traditional telecom regulation -- reciprocal compensation, universal service, e911, and CALEA (wiretap capabilities). The second focuses on "Internet freedoms," i.e., guarantees that your broadband access provider won't block or inhibit specific applications like VoIP. more
A recent paper called "Worm Propagation Strategies in an IPv6 Internet", written by Steven M. Bellovin, Angelos Keromytis, and Bill Cheswick, examines whether or not the deployment of IPv6 will in fact provide a substantial level of barrier against worms. Shared below are the introductory paragraphs from this paper. "In recent years, the internet has been plagued by a number of worms. One popular mechanism that worms use to detect vulnerable targets is random IP address-space probing..." more
All those Internet Governance pundits who track ICANN the way paparazzi track Paris Hilton are barking up the wrong tree. They've mistaken the Department of Street Signs for the whole of the state. The real action involves words like rbldnsd, content filtering, and webs of trust. Welcome to the Internet! What's on the menu today? Spam, with some phish on the side! We've got email spam, Usenet spam, IRC spam, IM spam, Jabber spam, Web spam, blogs spam, and spam splogs. And next week we'll have some brand new VoIP spam for you. Now that we're a few years into the Cambrian explosion of messaging protocols, I'd like to present a few observations around a theme and offer some suggestions. more
Sponsored byRadix
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byVerisign