The Mirai DDOS attack happened just over a year ago, on the 21st October 2016. The attack was certainly a major landmark regarding the sorry history of "landmark" DDOS attacks on the Internet. It's up there with the Morris Worm of 1988, Slammer of 2002, Sapphine/Slammer of 2009 and of course Conficker in 2008. What made the Mirai attack so special? more
I'm a network engineer, and like many engineers I often gravitate to the big projects; large networks with problems of scale and complexity in my case. However, I also consider myself a student of Occam's razor and often quote Antoine de Saint-Exupéry: "perfection is reached not when there is nothing left to add, but when there is nothing left to take away." In this spirit of "less is more" I have recently become intrigued by the problems appearing in home networking. more
In his article titled, "End of Life Announcement", John Walker (author of the Speak Freely application) makes a few arguments about Network Address Translation (NAT) that are simply not true: "There are powerful forces, including government, large media organisations, and music publishers who think this situation is just fine. In essence, every time a user--they love the word "consumer"--goes behind a NAT box, a site which was formerly a peer to their own sites goes dark, no longer accessible to others on the Internet, while their privileged sites remain. The lights are going out all over the Internet. ...It is irresponsible to encourage people to buy into a technology which will soon cease to work." more
Universal Acceptance is the topic of the moment, explained in one simple sentence: in the new gTLD world, it means that various groups (the DNS, ICANN and a few others) are working hard to make new domain names better accepted by the existing technical Internet infrastructure. A video extracted from the "ICANN 52" meeting explains it in 50 slides but I suggest a pause on slide 17, because it shows where the issues are and what remains to be fixed to give the ultimate answer to that question. more
The financial industry is all about pinstripe suits, excessive Excel sheets and boring data. Or is it? Financial markets are more colorful than their reputation: take a look at Bloomberg's or Reuters' sites, and you'll see that pork belly is as much an object of investment speculation as coffee, electricity, bananas, hides, or fishmeal. Recently, the universe of data available to financial analysts and investment bankers grew further, with the addition of the Internet Domain Name Index (IDNX) to leading financial data distributors Bloomberg (ticker symbol: IDNX <Index>) and Reuters (ticker symbol: .IDNX). more
The DNSSEC is a security protocol for providing cryptographic assurance (i.e. using the public key cryptography digital signature technology) to the data retrieved from the DNS distributed database (RFC4033). DNSSEC deployment at the root is said to be subject to politics, but there is seldom detailed discussion about this "DNS root signing" politics. Actually, DNSSEC deployment requires more than signing the DNS root zone data; it also involves secure delegations from the root to the TLDs, and DNSSEC deployment by TLD administrations (I omit other participants involvement as my focus is policy around the DNS root). There is a dose of naivety in the idea of detailing the political aspects of the DNS root, but I volunteer! My perspective is an interested observer. more
When it comes to stealing domain names, I suspect that there are two reasons why so many web bandits appear to be immune from ICANN (the Internet Corporation for Assigned Names and Numbers uses the acronym ICANN): the first reason I discussed in my last column on domain name theft (where I described a substantive void in domain name "regulation" as a primary factor for the increasing incidence of domain name theft), the second reason, which is the focus of this column, is the procedural anomaly that currently infuses ICANN's uniform dispute resolution process (UDRP) by providing no administrative forum for domain name registrants who become victims of domain name theft carried out by ICANN's registrars. more
In a recent article, eWeek reports on researchers at Microsoft revealing large-scale, typo-squatting schemes that use "multi-layer URL redirection to game Google's AdSense for domains program". According to this report, the Microsoft Research Systems Management Research Group succeeded in tracking a ring of typo-squatters registering misspelled domain names that generated traffic for serving advertising from Google. more
In the second part of this 3-part series article, the issue of UDRP in proving bad-faith domain registrations is examined with respect to the trademark's characteristics. The first part of this article can be found here. In assessing whether there is a passive holding of a domain name, panels look carefully into the trademark's characteristics in question, namely what is the degree of reputation and distinctiveness of the trademark in question. more
I'm sitting here at the Inbox conference on e-mail, and listening to an encouraging, plays-nicely-with-other-children talk from Ryan Hamlin, GM of anti-spam technology and strategy at Microsoft. Over the past couple of months, with evidence abounding at this conference, a number of big industry players have been getting together to fight spam. Most significantly, Microsoft, Yahoo! and AOL - plus a bunch of (other) ISPs are getting together behind a single standard for "Sender ID " - (actually, server authentication) name not yet determined... more
The Internet controversy between the US and China is escalating. The Trump Administration is fighting against Huawei, TikTok and We Chat. China is pushing back with new export regulations for Chinese IT technology. August 5, 2020 the US State Department launched a "Clean Network" initiative, aimed to remove Chinese digital corporations from the global supply chain in today's interconnected world. September 8, 2020 the Chinese Foreign Ministry replied with a "Data Security" initiative, aimed to enhance global cybersecurity in "Chinese colours." more
ICANN's Board voted to accept the latest settlement proposal by a vote of 9 to 5: "Today, ICANN's Board of Directors approved, by a majority vote, a set of agreements settling a long time dispute between ICANN and VeriSign, the registry operator for the .COM registry. These settlement documents include a new registry agreement relating to the operation of the .COM registry..." more
With all of the buzz around apps & app stores it would be easy to assume that mobile apps have unstoppable momentum and that the mobile web is taking a back seat. It's worth taking a step back to see how this is all going to pan out. Will mobile apps dominate completely and overwhelm the mobile web or does the mobile web still stand a chance? more
It's common to hear that oversubscription is the cause of slow broadband -- but what does that mean? Oversubscription comes into play in any network when the aggregate subscribed customer demand is greater than the available bandwidth. The easiest way to understand the concept is with an example. Consider a passive optical fiber network where up to 32 homes share the same neighborhood fiber. more
The FCC has run three days of workshops on the National Broadband Plan now, for the purpose of bringing a diverse set of perspectives on broadband technology and deployment issues to the attention of FCC staff. You can see the workshop agendas here. The collection of speakers is indeed very diverse. As you would expect, the session on eGov featured a number of government people and a larger collection of folks from the non-profit sector, all but one of whom has a distinctly left-of-center orientation. Grass-roots devolution arguments have a leftish and populist flavor, so who better to make the argument than people from left-of-center think tanks? more
Sponsored byDNIB.com
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign