Yesterday, taking a look at the "Legal Rights Objection" (3.1.2.2) I read : "An intergovernmental organization (IGO) is eligible to file a legal rights objection if it meets the criteria for registration of a .INT domain name". Taking a look at registered .INT domain names, I found Basel Convention on the Control of Transboundary Movements of Hazardous Wastes and their Disposal... more
At the 20th Internet Governance Forum in Lillestrøm, Norway, the UN Internet Governance Forum's dynamic coalition Internet Standards, Security and Safety (IS3C) released its new report on post-quantum policies. This report presents the findings of a collaborative study undertaken by IS3C and the French domain name registry Afnic and examines the critical need for Post-Quantum Cryptography (PQC) to achieve greater security in the ever-expanding global IoT landscape. more
Cybersecurity regulation will take its place alongside environmental regulation, health and safety regulation and financial regulation as a major federal activity. What is not yet clear is what form the regulations will take. FISMA controls, performance standards, consensus standards and industry-specific consortia standards are all possible regulatory approaches. What is not likely is an extended continuation of the current situation in which federal authorities have only limited, informal oversight of private sector cyberdefenses (or lack thereof). more
In recent interviews about World IPv6 Launch I've been asked by several different people whether or not I think there needs to be some kind of a "Flag Day" on which the world all together switches from Internet Protocol version 4 (IPv4) to the version 6 (IPv6). I don't think a flag day is needed. World IPv6 Launch is just the right thing. It's worth looking at some previous flag-type days to get a better sense of why. more
So this Internet thing, as we discussed in our last article, is broken. I promised to detail some of the specific things that are broken. Implicit trust is the Achilles heel of the Internet... All of the communication between the resolver and the DNS server is in plain text that can be easily seen and changed while in transit, further, the resolver completely trusts the answer that was returned... more
Monetization of DDoS attacks has been core to online crime way before the term cybercrime was ever coined. For the first half of the Internet's life, DDoS was primarily a mechanism to extort money from targeted organizations. As with just about every Internet threat over time, it has evolved and broadened in scope and objectives. The new report by Forcepoint Security Labs covering their investigation of the Sledgehammer gamification of DDoS attacks is a beautiful example of that evolution. more
On October 28th, at a Special Meeting of the ICANN Board of Directors, an updated New generic Top-Level Domain (gTLD) timeline was adopted as a working plan. The new Launch Scenario indicates that the New gTLD Applicant Guidebook will be declared final at the December ICANN Meeting in Cartagena, Colombia. more
The 2004 criminal spam case against large-scale spammer Jeremy Jaynes, which I've covered in several previous blog entries, appears to have come to an ignominious end with the state supreme court throwing out the law under which he was convicted. The Virginia anti-spam law was one of the first in the country with criminal provisions, but it failed due to the way that First Amendment cases are treated differently from all other cases. more
In the early days of the internet, companies only needed a simple web presence to be among the pioneers of digitization. Playfully animated hover buttons and electronically-synthesized background music were commonly accepted standards. To appear on a search engine, webmasters simply had to submit the URL of their website. more
Perceptions can be difficult to change. People see the world through the lens of their own experiences and desires, and new ideas can be difficult to assimilate. Such is the case with the registration ecosystem. Today's operational models exist because of decisions made over time, but the assumptions that were used to support those decisions can (and should) be continuously challenged to ensure that they are addressing today's realities. Are we ready to challenge assumptions? Can the operators of registration services do things differently? more
On January 24, 2018, ICANN's Business Constituency (BC) and Intellectual Property Constituency (IPC) co-hosted an event to discuss the EU's General Data Protection Regulation (GDPR) and its implications on access to the WHOIS database. ICANN's CEO and General Counsel joined the discussion, as did stakeholders from across the ICANN community. The event was timely and well attended with over 200 participants attending in-person or virtually. more
In a recent blog post How to Sell IPv6 to Executives -- Guidance for Engineers, the feedback I got from mailing list discussions was that the case for IPv6 was more of mitigating risk than some inherent benefit of IPv6 itself. That is quite true depending on context. In this article, I will attempt to give more insight into the benefits of deploying IPv6. In a nutshell, viewed from the traditional lens of benefit as something we know and recognise based upon experience, IPv6 has little benefit apart from the large address space. more
It's been six years since World IPv6 Launch day on the 6th June 2012. In those six years, we've managed to place ever-increasing pressure on the dwindling pools of available IPv4 addresses, but we have still been unable to complete the transition to an all-IPv6 Internet. Nobody predicted this situation when we first thought about the consequences of running out of IPv4 addresses. We all thought that the depletion of IPv4 addresses would in a continuously expanding Internet provide sufficient rationale for IPv6. more
At first blush, Mahmoud Ahmadinejad and the Globally Protected Marks List (GPML) do not seem to have anything in common. The first is a politician of debated repute that is seeking to quell disputes over the legitimacy of his election. The second is a recommendation that seeks to protect trademark owners and consumers from an explosion of infringement and source confusion that could be wrought by the introduction of new Top-Level Domains (TLDs). However, upon a closer analysis, they do share one common flaw: both have arguably failed to appropriately prioritize the right to free speech... more
There is an article in EETimes by Fay Arjomandi of Vancouver-based Mobidia that may shake up the fans of the 10 year old stupid network principle. The stupid network essay calls for intelligence to reside at the edge of the network, rendering IP networks to plumbing pipes -- with carriers ignorant of the application and services being transported. more
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign