Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

IPv6 Hour… One, Two, Three, IPv4 Switched Off!

It happened in San Jose, it happened in Taiwan and soon it will happen in Philadelphia! A nightmare? A conspiracy? No, no, it was just the IPv6 hour. One hour of pure IPv6 LAN for NANOG attendees with a NAT-PT as valve to the crowded teeming world of the IPv4 internet... At 12 noon, Tuesday February 19th it happened! While Mac, Vista, Linux and Unix can breathe AAAA, Windows XP however cannot do DNS over IPv6 transport. What to do to avoid all these Windows XP users... more

Exposing A Famous Secret: Well-known Trademarks Are Not Easily Diluted

Regarding a domain name dispute involving famous authors, the novelist, Louis Sachar, observed that "if some unrelated person is going to co-opt my name in cyberspace, and fails to use it to identify a web site related to my books or myself, that's going to endanger my career, as well as my reputation." Louis Sachar is one of nine famous authors for whom the Authors Guild, recently successfully snatched personal name domain names from a United Kingdom domain name registrant known as Old Barn Studios... more

WHOIS Record Redaction and GDPR: What’s the Evolution Post-2018?

We all use the Internet daily. Practically every element of our reality has its equal in the virtual realm. Friends turn into social media contacts, retail establishments to e-commerce shops, and so on. We can't deny that the way the Internet was designed, to what it has become, differs much. One example that we'll tackle in this post is the seeming loss of connection between domains and their distinguishable owners. more

IDN and Email: The Harsh Reality

There has been a lot of talk about IDNs here and elsewhere but what does the reality look like for a plain user? As a test, I randomly choose 28 domains from Alexa's top 100 Sites and tried to create a user account with the email address user@??.com. The bleak result... more

ICANN Subject to the Data Quality Act

CRE notified Dr. Twomey, President and Chief Executive Officer of ICANN, of the applicability of the Data Quality Act to ICANN in a detailed letter of October 29th. CRE asked ICANN for a meeting to discuss the issue of the applicability of the Data Quality Act to ICANN since CRE received no communication in response to the letter. In mid-December ICANN agreed to a January 23rd meeting with CRE. Notwithstanding CRE's trip to ICANN's headquarters in California for the scheduled meeting, the organization refused at the last moment to meet with CRE. CRE now knows how Dr. Twomey felt when he was expelled from an ICANN-related planning meeting in Geneva. more

Crypto - The New Market for Lemons

Ever buy a used car only to realize later that you've purchased a lemon? That scenario occurs because of information asymmetry between the seller -- who knows the car is a lemon -- and the buyer who doesn't. Without transparency, the market assumed that any used car for sale is a lemon, so that drove down the price of good used cars. The good news is that thanks to the Internet, buyers now have access to data that can help them determine if a car is a lemon or a good buy. more

Let Me Make Yeti-DNS Perfectly Clear

The following rather alarming text caught my eye today... Had the text appeared under a less august letterhead, or signed by less qualified authors, there would be no cause for alarm. However, the letterhead was World Economic Forum and the authors were William J. Drake, Vinton G. Cerf, and Wolfgang Kleinwächter. As one of three coordinators for the Yeti-DNS project, this feels a bit like I'm in big trouble now. So, let's discuss the matter. more

Vendor Selection Matters in the Domain Registrar Ecosystem

Domain name abuse is one of the most dangerous and under-regulated issues in digital business security today. Many of the largest companies in the world still lack basic domain security protocols, making them prime targets for bad actors. An attack on a domain can lead to the redirection of a company's website, domain spoofing, domain and domain name system (DNS) hijacking attacks, phishing attacks, network breaches, and business email compromise (BEC). more

Understanding Broadband Oversubscription

It's common to hear that oversubscription is the cause of slow broadband -- but what does that mean? Oversubscription comes into play in any network when the aggregate subscribed customer demand is greater than the available bandwidth. The easiest way to understand the concept is with an example. Consider a passive optical fiber network where up to 32 homes share the same neighborhood fiber. more

NTP is Still a Security Risk

The Network Time Protocol (NTP) has been in the news a number of times over the past couple of years because of attacks on the protocol, vulnerabilities in the daemon, and the use of NTP in DDoS attacks. In each case, the developers of NTP have responded quickly with fixes or recommendations for remediating these attacks. Additionally, the development team has continued to look ahead and has worked to enhance the security of NTP. Unfortunately, that has not translated to an improved security picture for NTP. more

Wired vs Wireless Debate Becomes a Core Policy Differentiator in National Election

I never thought I'd see the day when the difference in capability between a wireless and a wireline Internet would become a core policy differentiator in a national election, but this has now happened in Australia. ... It seems that everyone has an interest in a ubiquitous, fast and cheap internet. Now that interest has been taken up as a major policy differentiator by both sides of the political spectrum in the recent Australian election. What was this all about? more

An Internet Security Operations Viewpoint of IGF

The Internet Governance Forum (IGF) is an annual UN conference on Internet governance which was held this year in Rio de Janeiro, Brazil. The topics discussed range from human rights online to providing Internet access in developing countries. A somewhat secondary topic of conversation is Internet security and cyber-crime mostly limited to policy and legislative efforts. Techies and Internet security industry don't have much to do there, but I have a few updates for us from the conference. more

Letter from Rome

I am at the ICANN meeting in Rome. The big story here is that ICANN is under attack for not sticking to its narrow mission -- technical coordination of the DNS and IP numbering system. People here are referring obliquely to the VeriSign lawsuit as "recent events" (as in "in light of recent events"). This euphemism reminds me of words used to reference the US Civil War ("the late unpleasantness"). more

WLS Deemed Illegal by Registrar Coalition

ICANN's announcement of a "Special Meeting of the Board", to be held on February 18, 2004, includes a number of topics in its "Proposed Agenda" including: "WLS Negotiations with VeriSign". In reaction to this particular item related to WLS, Newman & Newman, the law firm representing an ad hoc coalition of ICANN-accredited domain name registrars, has sent a letter to Dr. Paul Twomey, President and CEO of ICANN expressing... more

New TLDs For Dummies (Sort of)

There's been a lot of media attention on the new Top-Level Domain (TLD) process in the last few days, which is a good thing. Unfortunately most of it is badly written, misleading or simply misinformed. Let's look at the reality. To start with, there are currently 20 gTLDs i.e. "global" Top-Level Domains (extensions)... more

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days