Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

What ICANN is Doing Wrong

A couple of recent articles have caught my attention because they offer scathing criticism of ICANN. The first is a long and convoluted article by Kieren McCarthy on the .JOBS debacle. Kieren has basically written a feature that only a seasoned ICANN insider can hope to understand and that's a pity, because the points he makes appear very valid. Namely that ICANN is incapable of looking at itself in the mirror and admitting when it's wrong. more

A Digital ‘Red Cross’

A look into the past reveals that continuous developments in weaponry technology have been the reason for arms control conventions and bans. The banning of the crossbow by Pope Urban II in 1096, because it threatened to change warfare in favour of poorer peasants, the banning of poisoned bullets in 1675 by the Strasbourg Agreement, and the Geneva protocol banning the use of biological and chemical weapons in 1925 after world war 1, all prove that significant technological developments have caused the world to agree not to use certain weapons. more

New TLD Spotted - .FUD

In politics, as in Internet policy, the most effective weapons are also the oldest. So when it came time for hard-line intellectual property advocates to make a desperate last stand against the new gTLD program, it came as no surprise they turned to the atomic bomb of rhetorical devices: FUD. FUD stands for "fear, uncertainty and doubt" and it is the tool of last resort when change is coming and you want to stop it. The theory is simple: the human response to fear is to cling to what's familiar and oppose what's new. So if you can scare enough people about the potential effects of a new policy or law, you stand a pretty good chance of preventing it from ever going into effect. more

Comcast’s Impressive System for Notifying Infected Users

Pretty much as long as there've been computers, one of the biggest challenges has been user education. How do you create software smart enough to inform a user when they're about to do something potentially disastrous - or, worse, when something disastrous has been done to them? As one of the world's largest access providers, Comcast has put a ton of thought into developing a notification system for their users. The solution Comcast developed involves, in effect, hijacking HTTP requests... more

Beyond NETmundial: Initiative or Inertia?

The April NETmundial meeting was a seminal event in the history of Internet Governance. Fears that the meeting might fail to reach consensus were not realized. Instead, the participants achieved a high degree of harmony -- the "Spirit of NETmundial" -- that resulted in issuance of a consensus Statement that, while lacking in precise detail, was effused with positive energy. Since that meeting there has been considerable discussion within the Internet Governance (IG) community as to what lessons have been learned from NETmundial, and how its work might best be carried into the future. more

Trademarks for TLDs

The United States Patent and Trademark Office (USPTO) has recently circulated proposed examination guidelines to allow the USPTO to begin providing Trademark Protection for Top Level Domains (TLDs). This is an important new development. TLDs today are currently ineligible for Trademark protection on the basis that they do not constitute a source-identifying mark. The USPTO is currently in the process of rectifying this situation by extending Trademark protection to Registry Service providers and has released its proposed examination procedures for that purpose. However, there are some very concerning elements to their proposed examination guidelines. more

Policy Failure Enables Mass Malware: Part I (Rx-Partners/VIPMEDS)

This is the first in a series of releases that tie extensive code injection campaigns directly to policy failures within the Internet architecture. In this report we detail a PHP injection found on dozens of university and non-profit websites which redirected visitor's browsers to illicit pharmacies controlled by the VIPMEDS/Rx-Partners affiliate network. This is not a unique problem, however the pharmacy shop sites in question: HEALTHCUBE[DOT]US and GETPILLS[DOT]US should not even exist under the .US Nexus Policy. more

“It’s The Internet Stupid” ...I Respectfully Disagree

Today, in response to "It’s The Internet Stupid", Richard Bennett highlights (on the IP List) something I've noticed even among other advocates of 'Net Neutrality' (and how I've come to detest the term after its widespread and misguided overuse). Legislating against the concepts of Deep Packet Inspection (DPI) or other preferential treatment of packets is not the brightest thing to do. I've seen others draw analogies to gun control using the 'guns don't kill people' argument... more

Google, Service Providers and the Future of P2P

In a non-operational NANOG discussion about Google bandwidth uses, several statements were made. It all started from the following post by Mark Boolootian: "Cringley has a theory and it involves Google, video, and oversubscribed backbones..." The following comment has to be one of the most important comments in the entire article and its a bit disturbing... more

Perspectives on a DNS-CERT

Last week at the ICANN meeting in Nairobi, a plan was announced by ICANN staff to create a "CERT" for DNS. That's a Community Emergency Response Team (CERT) for the global Domain Name System (DNS). There are all kinds of CERTs in the world today, both inside and outside the Internet industry. There isn't one for DNS, and that's basically my fault, and so I have been following the developments in Nairobi this week very closely. more

Brad Templeton in Response to Site Finder Controversy

A harmful, highly unilateral and capricious action. Tons of software out there depended on the ability to tell the difference between a domain name which exists and does not. They use that to give a meaningful, locally defined error to the user, or to identify if an E-mail address will work or not before sending the mail. Many used it as a way to tag spam (which came from domains that did not exist). It is the local software that best knows how to deal with the error. more

Two More Crypto Holes

If you work in computer security, your Twitter feed and/or Inbox has just exploded with stories about not just one but two new holes in cryptographic protcols. One affects WiFi; the other affects RSA key pair generation by certain chips. How serious are these? I'm not going to go through the technical details. For KRACK, Matthew Green did an excellent blog post; for the other, full details are not yet available. There are also good articles on each of them. What's more interesting are the implications. more

What New gTLD Applicants Need Is a Quick, Lightweight Answer to the World’s Governments. Here It Is.

It's safe to say that with just a week to go before ICANN intended to sign the first contract for a new gTLD, the last thing anyone wanted was a 12-page document from the world's governments with 16 new "safeguards", six of which it wants to see applied to every new extension. But what the industry shouldn't overlook, especially in the face of the expected critical responses this week and next, is that the Governmental Advisory Committee's (GAC's) formal advice from the ICANN Beijing meeting represents an opportunity for the domain name industry to lock-in self-regulation at a critical point in its evolution. more

Why ICANN TLD Policy Imposes Severe Constraint on Development of Internationalized Domain Names

In 2008, ICANN made it known to the community that it is finally ready to discuss Internationalized Domain Names regarding Top-Level Domains (TLDs) after several years of working groups, technical trials, studies and considerations. It was highly anticipated by the Chinese, Japanese and Korean (CJK) community. It was also with great disappointment when the New gTLD Application Guidebook, published on 24th Oct 2008, included the following paragraph... more

Worm Propagation Strategies in an Ipv6 Internet

A recent paper called "Worm Propagation Strategies in an IPv6 Internet", written by Steven M. Bellovin, Angelos Keromytis, and Bill Cheswick, examines whether or not the deployment of IPv6 will in fact provide a substantial level of barrier against worms. Shared below are the introductory paragraphs from this paper. "In recent years, the internet has been plagued by a number of worms. One popular mechanism that worms use to detect vulnerable targets is random IP address-space probing..." more

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days