I saw this case in the excellent National Association of Attorneys General publication Cyber Crime e-newsletter. Many of us host or sponsor online communities of one form or another. On occasion, this means we must engage in moderation of the discourse in that community, and, as chance may arise, on occasion, we must give some chap the boot from the community for violating the AUP or the TOS. Inevitable, the booted chap screams "First Amendment Violation," to which we must respond, "The First Amendment restrains government actors -- we are not government actors." more
One of the "key" questions cryptographers have been asking for the past decade or more is what to do about the potential future development of a large-scale quantum computer. If theory holds, a quantum computer could break established public-key algorithms including RSA and elliptic curve cryptography (ECC), building on Peter Shor's groundbreaking result from 1994. more
Recently, a couple of anti-spam (or at least email security related) bloggers have written some articles about IPv6 and the challenges that the email industry faces regarding it. John Levine, who has written numerous RFCs and a couple of books about spam fighting, writes the following in his article "A Politically Incorrect Guide to IPv6, part III". more
There are relatively few venues today for the development of public international cybersecurity law among Nation States. One was the United Nations Group of Governmental Experts (UNGGE) at which the U.S. several months ago announced its de facto withdrawal with some concern expressed. A much older, well-established venue is newly assuming considerable significance - the Expert Group on the International Telecommunication Regulations (EG-ITRs). more
The press, the blogosphere, CircleID - everybody has been discussing Craig Mundie's comment on the need for an "Internet Driver's License". Most of the reaction has been from privacy advocates fearing that this is simply another way to kill anonymity on the Internet. Oh well... that's the usual set of reactions. Now... the fun part is, a driver's license also shows that you have the competence to drive... more
Not infrequently mark owners in disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) claim that respondents should have been aware that the domain names they registered corresponded to their marks; and from this, urge panelists to draw the inference that the registrations were designed to take advantage of their goodwill and reputation. To test this premise, we need to take a step back for a quick look at UDRP provisions. All it takes to acquire a domain name is to sign a registrar’s registration agreement. more
I don't know about you, but I am angry. I am angry with the state of the world and our incapacity to do something about it. I am angrier because, in all this, I thought that the Internet would be the place where we would see collective action at its best. But, that's not going to happen. At least, anytime soon. Is it time to admit that the Internet has turned toxic? No. But, it is time to ask ourselves the question... more
In 1964, Canadian scholar Marshall McLuhan famously wrote, "The medium is the message." This phrase popped into my head last week as I listened to the opening speakers at the Internet Governance Forum in Nairobi. McLuhan meant that the form in which a message is delivered - the medium - embeds itself in the meaning of the message. The medium influences how the message is perceived and understood and is therefore inseparable from the message itself. What does this have to do with the Internet? more
Root name servers are a core service of the Internet. As such they receive a huge amount of queries and need to answer reliably with acceptable delay. The RIPE NCC is responsible for operating one of the 13 DNS root name servers K-root which responds to 10,000 - 15,000 queries per second. Most root servers are operated as a network of distributed "instances" using anycast. more
Earlier this week, I posted from Singapore on the challenges we face in designing the transition of IANA functions from the US government to the global multistakeholder community. Now, let's consider how a programmer would design new mechanisms to accomplish this transition. For starters, a programmer would need something more than high-level principles. Coding requires use cases for routine interaction and especially for cases where users don't follow the expected routine and where the real world intervenes with inconvenient problems. more
In January we presented the glorious history of the MIT spam conference, today we present the schedule for the first day. Opening session will be from this author, Garth Buren with a topic entitled The Internet Doomsday Book, with details be released the same day as the presentation. Followed by Dr. Robert Bruen with a review of activities since the last MIT spam conference... more
At ICANN's meeting in Egypt last week, I had the opportunity to try and explain to various non-technical audiences why the Domain Name System (DNS) is vulnerable to attack, and why that is important, without needing a computer science degree to understand it. Here is the summary. more
China is holding the First Internet Conference in the rivertown of Wuzhen, calling for global Internet interconnectivity and shared governance by all. Founders of China's top three Internet companies Alibaba, Tencent and Baidu as well as executives from global giants including Apple, Amazon, Google and Facebook all joined the gala. more
Freedom of expression on the Internet is at risk from ICANN's recent decision to prohibit anyone but one specific type of doctor from using the word within the .doctor new gTLD space. Last month, ICANN's New GTLD Program Committee decided that only "medical practitioners" would be allowed to register a domain in the .doctor name space. ICANN's decision to exclude numerous lawful users of the word, including a broad range of individuals who are in fact doctors, comes at a time when the world is watching ICANN to see if it can adequately protect Internet users' rights in the absence of US Government supervision. more
In Tony Li's article on path MTU discovery we see this text: "The next attempt to solve the MTU problem has been Packetization Layer Path MTU Discovery (PLPMTUD). Rather than depending on ICMP messaging, in this approach, the transport layer depends on packet loss to determine that the packet was too big for the network. Heuristics are used to differentiate between MTU problems and congestion. Obviously, this technique is only practical for protocols where the source can determine that there has been packet loss. Unidirectional, unacknowledged transfers, typically using UDP, would not be able to use this mechanism. To date, PLPMTUD hasn't demonstrated a significant improvement in the situation." Tony's article is (as usual) quite readable and useful, but my specific concern here is DNS... more
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byWhoisXML API