Lost in all the discussion around the recent ITU meeting (TIES account required of course) is any discussion of the current policy regarding the formation of new RIRs. You may recall that one of the reports that the ITU commissioned on this subject suggests that it would be possible, even desirable for the ITU to be allocated a /12 of IPv6 from the IANA to be further allocated to Country Internet Registries. more
Seven different government agencies, including the Ministry of Public Security and the State Council Information Office declared war on Internet smut today. 19 Internet companies, including Google, Baidu, Sina, and others, were cited for "violating public morality and harming the physical and mental health of youth and young people."... Another Chinese language report, including video of a TV report with footage of computer servers being confiscated by police at an unknown location and unknown time... more
This year could be the fifth year in a row where the goat isn't burned down. But early in the morning of Dec 17th, it was on fire by an arsonist who got caught a few minutes later. So Stephan Lagerholm, who had visited me earlier for some IPv6 site seeing in Gävle and I were lucky to get this photo. The traffic went down by 5% from last year, and I don't have any good explanation for that. The visitors with many hits in the logs are always from the same countries where North America and Europe are dominating. more
ICANN's new gTLD program provides for last resort auctions to settle contention sets where the competing applicants are unable to reach agreement by negotiation or private auction, with the proceeds going to a segregated ICANN account. With the recent $25 million bid of Google to secure control of the .App registry the total proceeds of those ICANN auctions has swelled to $58.8 million. The final sum by the end of the first round could go higher, perhaps to more than $100 million. That's serious money. more
On Tuesday, September 9, 2014, you have a great opportunity to watch live a very packed agenda full of great sessions about IPv6, DNSSEC, routing/BGP security and other components of Internet infrastructure streaming out of the UKNOF / ION Belfast event in Belfast, UK. All of the sessions can be seen live. more
While there is much discussion in the United States about the mergers of Comcast and Time Warner Cable, and of AT&T and DirectTV, issues such as this are generally discussed from a very narrow perspective and, we maintain, from the wrong underlying telecoms regime operating in that country - one that has stifled competition in the telecoms for nearly two decades. The same wrong parameters apply to the endless debates on net neutrality an issue that is, by the way, largely of significance to the US market alone. more
I was browsing CircleID the other day and came across Bruce Schneier's article on cyberwar. Schneier's article, and the crux of his point, is that the term cyber war and the threat of cyber warfare has been greatly exaggerated. The real problem in cyberspace is not the threat of cyber warfare wherein a foreign government, or possibly non-state actor, conducts a cyber attack on another nation. more
Paul observed that most new domain names are malicious. Are they? Since the "dawn of tasting", some 30 million domain names have been created for the purposes of interposition on existing name to resource mappings. That is a third of the .COM historical growth, and mostly in the last five years. ... It is difficult not to conclude that interposition on persistent, public referents is without malice, and that the malicious parties are advertisers seeking to transform public referents into private property, as promotional devices... more
As Internet services go, WHOIS held a lot of promise but has repeatedly failed to live up to its potential; raising the question "is it time to retire WHOIS?" The concept behind WHOIS was simple. For each and every registered domain name, provide the facility for querying details about who owns it, who administers it, when was it created and when it will expire. Unfortunately the service lost its way practically from day one after failing to agree upon or adhere to any formal structure of the content it provides. more
For those not familiar with RBL, the term means Real-time Blackhole List, it is mainly used for SPAM fighting. I have recently started playing around with Google as an RBL engine, the idea is that if the search term I use hits too many hits it is likely to be SPAM. The danger of course is that the term could be simply popular -- but the trick here is that I'm using something very special as the search term -- the IP address of the poster. more
In a recent issue of the Dongfang Hour Newsletter, Blaine Curcio pointed out that China's powerful State Administration of Science, Technology, and Industry for National Defence (SASTIND) had published a notice intended to promote the orderly development of microsatellites and strengthen safety management. The notice defines microsatellites as being below 1,000 kilograms, which would include those making up China's planned GwoWang/SatNet broadband constellation. more
What to one panelist is clearly bad faith conduct in filing a UDRP complaint, to another is excusable for lack of proof. The disagreement over reverse domain name hijacking centers on the kind of evidence necessary to justify it and the nature of the burden. RDNH is defined as "using the UDRP in bad faith to attempt to deprive a registered domain-name holder of a domain name." Rule 1, Definitions. more
The U.S. Government is causing a huge disservice to protection and defense in the private sector (80%+ of CIKR) by creating an ECS that contains monetary incentive for a few large players to exert undue control over the availability, distribution, and cost of security threat indicators. While there may be a legitimate need for the federal government to share classified indicators to entities for protecting critical infrastructure, the over-classification of indicator data is a widely recognized issue that presents real problems for the private sector. ECS as currently construed creates monetary incentives for continued or even expanded over-classification. more
The .build domain namespace opened in General Availability in April 2014, as a domain name designed specifically for the online needs of the building industry and beyond. As the appointed technical provider for .build, ARI Registry Services powered the launch and continued technical operations for this global domain name. A year into the life of the namespace, ARI Registry Services' Head of Global Consulting Tony Kirsch caught up with George Minardos, CEO of .build to talk about his insights to date, what he's learnt about the domain name industry, and a look at where he thinks it is heading. more
The ICANN Intellectual Property Constituency (IPC) and Business Constituency (BC) will be hosting a community-wide discussion regarding the proposed accreditation and access model for non-public WHOIS data, which was first circulated to the community during ICANN 61. The discussion will take place via ICANN-supported remote participation and/or audio bridge this Friday, April 6, 2018, from 1400-1600 UTC. more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign