Featured Blogs

Latest

Examining Stuart Lynn’s Domain Name Plans - Part II

In the last article we examined the language in Stuart Lynn's A Plan for Action Regarding New gTLDs, and I addressed concerns about specific language in that document. In this article, I will examine several questions of importance that need to be addressed when discussing new gTLD policy; questions that Mr. Lynn leaves unanswered in his proposal... more

Domain Name Theft Part II: Did ICANN Leave Foxes Guarding the Chicken COOP?

When it comes to stealing domain names, I suspect that there are two reasons why so many web bandits appear to be immune from ICANN (the Internet Corporation for Assigned Names and Numbers uses the acronym ICANN): the first reason I discussed in my last column on domain name theft (where I described a substantive void in domain name "regulation" as a primary factor for the increasing incidence of domain name theft), the second reason, which is the focus of this column, is the procedural anomaly that currently infuses ICANN's uniform dispute resolution process (UDRP) by providing no administrative forum for domain name registrants who become victims of domain name theft carried out by ICANN's registrars. more

Examining Stuart Lynn’s Domain Name Plans - Part I

Last month ICANN began soliciting comments on Stuart Lynn's A Plan for Action Regarding New gTLDs, which will be one of the Internet governance organization's primary discussion topics at its December meeting in Amsterdam. more

Preventing Future Attacks: Alternatives In DNS Security Management - Part II

In Part I of this article I set the stage for our discussion and overviewed the October 21st DDoS attacks on the Internet's 13 root name servers. In particular, I highlighted that the attacks were different this time, both in size and scope, because the root servers were attacked at the same time. I also highlighted some of the problems associated with the Domain Name System and the vulnerabilities inherent in BIND. Part II of this article takes our discussion to another level by critically looking at alternatives and best practices that can help solve the security problems we've raised. more

Is Whois Data Accuracy Enough?

The Whois Task Force of the Domain Name Supporting Organization (DNSO) has been consulting with registrars over the past few months on the Whois accuracy issue for law enforcement. The Task Force has enumerated three primary areas of interest: accuracy, uniformity, and better searching capabilities. When the registrars met with the Task Force in Shanghai, a fourth area of interest was also brought forward and advocated by many of the registrars at the meeting as paramount to the other three areas. This fourth area of interest was privacy. more

Role Of The Government In The Internet Infrastructure Revisited

When thinking about the infrastructure of the Internet, it is important to consider the role of government in this infrastructure.

This is a question that involves two aspects: the role of government, and the role of the computer scientists who are part of the needed government structure or institution. Reviewing the history of the development of the Internet helps to highlight the importance of some role for both government and for computer scientists. more

Preventing Future Attacks: Alternatives In DNS Security Management - Part I

The October 21 DDoS attacks against the 13 root-name servers containing the master domain list for the Internet's Domain Name System (DNS), (which reportedly took offline 9 of the 13 servers) remain a clear and daunting reminder of the vulnerabilities associated with online security. Many DNS authorities have named the most recent hit the largest DDoS attack against the root server system. Chris Morrow, network security engineer for UUNET, the service provider for two of the world's 13 root servers, recently told The Washington Post... more

Invalid WHOIS Data: Who Is Responsible?

Suppose you wanted to know who operates a website at a given domain name. Perhaps you suspect that the domain name is pointing to a website that offers illegal content, or you may just want to send a comment to its authors. Conveniently, the Internet provides a so-called "WHOIS" system that ordinarily provides contact information for each registered domain. But in the case of many hundreds of thousands of domains, the WHOIS data just isn't accurate.  more

Privacy Matters: Is It Time To Abolish The WHOIS Database?

Recently, I entered my domain name in a "WHOIS" database query to test the results of the database by using WHOIS on a number of domain name registrar websites. WHOIS is a database service that allows Internet users to look up a number of matters associated with domain names, including the full name of the owner of a domain name, the name of the domain name hosting service, the Internet Protocol or I.P. number(s) corresponding to the domain name, as well as personally identifying information on those who have registered domain names. I was astonished to find... more

ICANN at Large Shanghais The At-Large Conversation

On October 28, as ICANN met in Shanghai, China for its regular board meeting, ICANN at Large held a lengthy meeting to address user concerns, particularly the disenfranchisement of the At-Large by ICANN, and the At-Large's self-organizing in response. The meeting was chaired by YJ Park, one of our Executive Panel Members, and was well attended. Attendees included ... more

A Closed And Secret Process Is Not The Answer To Reform

The recent meeting of the Internet Corporation for Assigned Names and Numbers (ICANN) in China demonstrates a serious dilemma for Internet users around the world. In the name of reforming ICANN and making it more responsive, ICANN ended the seats of the At-Large directors on its board. This was the part of the ICANN structure that was supposed to be responsive to Internet users. more

Internationalized Domain Names: The Babelization Factor

As current statistics now clearly indicate, two-thirds of the estimated 560 million people online are non-English speakers. As one would expect, in the upcoming ICANN Shanghai Meeting of October 28, 2002, IDNs (Internationalized Domain Names, also known as Multilingual Domain Names), are one of the main topics of discussion. This global affair is also fueling the growing list of Internationalized Domain Name Certified Registrars that offer domain names in many other non-English characters with .com, .net, and .org. more

The Internet And Its Governance: Where Should We Look For Models?

The US Department of Commerce (DOC) has recently signed a new contract with the Internet Corporation for Assigned Names and Numbers (ICANN) for one more year. ICANN and the DOC are to continue to work together to design an organizational form that is suitable to administer and control the infrastructure of the Internet. That infrastructure includes the IP numbers, which are critical to the functioning of the Internet protocol TCP/IP. These numbers must be unique for the Internet to continue to function. The infrastructure also includes the protocols that make the Internet possible. Protocols involve the conventions or agreements that each network that is part of the Internet accepts in order to make communication possible across the boundaries of the different technical and political and administrative entities that comprise the networks of the Internet. Another component of the Internet's infrastructure is the domain name system (DNS). This system includes the names that identify various sites on the Internet and the translation of those names into IP numbers via the system of computers that make the one to one mapping between names and numbers. more

Parsing Hype From Hope: Will ENUM Spark Changes In Telecom?

In the beginning there was silence; then, silence begat communication, and communication begat more communication and, ultimately, group communication formed and begat a primordial "network" of communication that gradually and inevitably increased in effectiveness and complexity: there were only signal fires at first but, then, there were cave drawings, carrier pigeons, shouting from hill-tops, smoke from fire, lines of cannon fire, the telegraph, Alexander Graham Bell, and, finally, the network of networks known as the Internet. But, is that it? Is there not something more impressive in its impact upon communication than the Internet? What more might one desire than the dynamic wonders of the Internet, you ask? Well, what about ENUM? "E-What!?" more

TLD Registration Enforcement: A Call for Automation - Part II

Last month, I wrote to describe the state of registration restrictions in .BIZ, .US, and .NAME. I noted trends among nonconforming registrations in these TLDs, and I suggested that certain automated enforcement systems might serve to improve compliance. But an important larger question remained unanswered: Why care about registration restrictions in the first place? Much as registries might like to ignore the restrictions, I submit that the Internet community nonetheless ought to hold them to their contracts.
 more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days