In this post I'd like to discuss the threat widely circulated insecure broadband routers pose today. We have touched on it before. Today, yet another public report of a vulnerable DSL modem type was posted to bugtraq, this time about a potential WIRELESS flaw with broadband routers being insecure at Deutsche Telekom. I haven't verified this one myself but it refers to "Deutsche Telekom Speedport w700v broadband router"... more
There is currently a discussion going on between Milton Mueller and Patrik Fältström over the deployment of DNSSEC on the root servers. I think the discussion exemplifies the difficult relation between those who develop standards and those who use them. On the one hand, Milton points out that the way the signing of the root zone will be done will have a great influence on the subjective trust people and nation states will have towards the system. On the other hand, Patrik states that "DNSSEC is just digital signatures on records in this database". Both are right, of course, but they do not speak the same language... more
40%, not 92%-120%. "Data consumption right now is growing 40% a year," John Stankey of AT&T told investors and his CEO Randall Stephenson confirmed on the investor call. That's far less than the 92% predicted by Cisco's VNI model or the FCC's 120% to 2012 and 90% to 2013 figure in the "spectrum crunch" analysis. AT&T is easily a third of the U.S. mobile Internet and growing market share; there's no reason to think the result will be very different when we have data from others. more
This text was originally meant to be read by the Swedish authorities and municipalities, but the problem is most probably similar all over the world. Along with others, I have repeatedly written and spoken about the need for municipalities and agencies to start with the roll-out of IPv6. Most of what I have written has been focused on IT managers. It might seem natural that it is the IT manager's decision to get the IPv6-project started. But what if perhaps it isn't...? more
About 82% of the Alexa 100 top sites use some form of server-side mobile device detection to serve content on their main website entry point. As you descend from the top 10 to the top 25 and top 100 sites the percentage of sites using server-side detection falls from 100% to 96% to 82%. This is an interesting fact given that all the recent discussion in the blogosphere is of responsive design using client-side techniques such as media queries. more
There are discussions starting within the Regional Internet Registries (RIRs) about the creation of trading market in IPv4 addresses as we approach the inevitable exhaustion of unallocated addresses. The view being put forward is basically "this is likely to happen anyway and by discussing it now, we can ensure it happens in an orderly way". When I first heard this idea I was a bit surprised. The RIRs are policy based bodies and so a shift to a trading market appears to be an abandonment of that policy base. However I have been partly corrected on that. more
There are updates in the domain name business that I have never been able to understand: one of them is called "vanity domain names". A vanity domain name is a domain that keeps on using the first and the second level domain, to form a keyword; the third level domain is sometimes used too. Good examples of these would be: webc.am or marmala.de, aud.it or del.icio.us. more
Consumption of software as a service with a usage-based business model has gained incredible popularity in recent years. On the other hand, other cloud services such as infrastructure and platform as a service are just starting to pick up. While compute and storage are by the far the most commonly used cloud infrastructure services, few consider core network services such as IP Address Management (IPAM) as something that could be utilized over the cloud. more
Neal Stephenson’s foundational cyberpunk novel Snow Crash brought to the public the concept of a metaverse, a virtual reality in which people interact using avatars in a manufactured ecosystem, eschewing the limitations of human existence. More recently, Ready Player One capitalized on that idea and brought it back to prominence with a bestselling novel and subsequent film adaptation. Amid rebranding efforts and seeking a new way forward, Mark Zuckerberg has made it Facebook’s (now Meta Platforms) priority to build a platform that could enable the metaverse to become a mainstream technology with the sort of reach that their social networks and WhatsApp have. more
New generic Top-Level Domains (gTLDs) appear to be headed for introduction next year, finally. That's a good thing for many ICANN constituents who have been waiting for them to become available. Important questions persist about how new gTLDs will affect ICANN and its constituents, however, despite a lot of effort to resolve concerns. Pressing those questions should not be taken as criticism of the basic wisdom of making new gTLDs available to many constituents under many circumstances. But too much is at stake not to get it right. more
Another paper from the Fifth Workshop on the Economics of Information Security, (WEIS 2006) is Proof of Work can Work by Debin Liu and L, Jean Camp of Indiana University. Proof of work (p-o-w) systems are a variation on e-postage that uses computation rather than money. A mail sender solves a lengthy computational problem and presents the result with the message. The problem takes long enough that the sender can only do a modest number per time period, and so cannot send a lot of messages, thereby preventing spamming. But on a net full of zombies, proof of work doesn't work. more
Given the recent panix.com hijacking, I will give an outline of the current ICANN transfers process for gtlds. In the case of panix.com, evidence so far indicates that a third party that holds an account with a reseller of Melbourne IT, fraudulently initiated the transfer. The third party appears to have used stolen credit cards to establish this account and pay for the transfer. That reseller is analyzing its logs and cooperating with law enforcement. more
Expect a charm offensive as Comcast and scores of sponsored researchers explain how acquiring Time Warner Cable will promote competition and enhance consumer welfare. You might not hear too much about two traditional concerns remedied by actual facilities-based competition: incentives to innovate and reduce prices. Comcast will frame its acquisition as necessary to achieve even greater scale to compete with other sources of video content and maybe to compete with the limited other sources of broadband access. more
Although this article was first published just a few days ago, on May 8th, there have been several important intervening developments. First, on May 10th ICANN released a News Alert on "NGPC Progress on GAC Advice" that provides a timetable for how the New gTLD program Committee will deal with the GAC Communique. Of particular note is that, as the last action in an initial phase consisting of "actions for soliciting input from Applicants and from the Community', the NGPC will begin to "Review and consider Applicant responses to GAC Advice and Public Comments on how Board should respond to GAC Advice... more
Later this week, ICANN is finally going to vote on the proposed sale of .ORG to Ethos Capital. It will decide the future owner of .ORG, but the decision will also provide a window into whether ICANN will remain independent of the U.S. government. It's a big decision, one that can strengthen both ICANN and the NGO community on the web, if we get it right. For nearly a decade, the ICANN community fought hard to untether itself from the U.S. Department of Commerce. more
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byDNIB.com