The Internet Society (ISOC) has been working with the African Union (AU) to facilitate the African Internet Exchange System (AXIS). This AXIS project funded by the EU-Africa Infrastructure Trust Fund and the Government of Luxembourg will help keep Internet traffic in Africa internal to the continent and avoid expensive international transit costs and delay latency in routing Internet traffic through other continents. more
Everyone knows there are many frauds linked to the growth of domain names. According to AFNIC (the French NIC), there has been a significant increase in the number of cases of slamming since the beginning of this year. ...To fight against these practices, AFNIC issued a guide where it describes different categories of slamming... more
Lots of coverage in the last two days about a Memorial Day weekend attack that took down the servers of Revision3, an Internet video network. This story has a lot of ingredients -- P2P maneuvering, DDoS attack, copyright vs. piracy, talk of laws broken and the FBI investigating. more
On the morning of Wednesday 15th October, the The Domain Name Association (the DNA) held an important working group meeting during ICANN 51 Los Angeles. The topic was to discuss several operational issues between registries and registrars. The meeting's unofficial ongoing name is the Registry-Registrar Operations Working Group. The meeting was a continuation of an inaugural meeting that was held back in June of this year, and covered in a Industry Association: An Implementation Model circulated by the DNA from September 17, by Executive Director Kurt Pritz. more
Last month ICANN began soliciting comments on Stuart Lynn's A Plan for Action Regarding New gTLDs, which will be one of the Internet governance organization's primary discussion topics at its December meeting in Amsterdam. more
The Internet Corporation for Assigned Names and Numbers (ICANN) implemented the Uniform Rapid Suspension System (URS) in 2013 together with three other rights protection mechanisms for trademarks. It "is not intended for use in any proceedings with open questions of fact, but only clear cases of trademark abuse"... It was designed to afford rights holders claiming abusive registration of domain names with new gTLD extensions an even faster route to remedy than the Uniform Domain Name Dispute Resolution Policy (UDRP). more
We read carefully Scott Hollenbeck's call to form a Domain Name Industry association to promote consistency in technical operations across the many moving parts of the industry and we, the Board and members of the Domain Name Association, largely agree. More formal coordination among registry operators and domain name registrars would improve the domain name registration experience for registrants and business operations for the domain name industry in general. more
A remote exploit in the BIND 9 DNS software could allow hackers to trigger excessive memory use, significantly impacting the performance of DNS and other services running on the same server. A flaw was recently discovered in the regular expression implementation used by the libdns library, which is part of the BIND package. The flaw enables a remote user to cause the 'named' process to consume excessive amounts of memory, eventually crashing the process and tying up server resources to the point at which the server becomes unresponsive. more
In mid-May 2020, UN-Secretary General Antonio Guterres will present a "Roadmap for Digital Cooperation". This will be another milestone in the discussion on the future of cyberspace, pushed further forward by the UN High Level Panel on Digital Cooperation (HLP), co-chaired by Jack Ma (AliBaba) und Melinda Gates (Microsoft Foundation) The HLP Final Report presented five groups of recommendations. Discussion started during the 14th IGF in Berlin... more
The World Intellectual Property Organization (WIPO) has sent to ICANN a letter proposing Paperless Uniform Domain Name Dispute Resolution Policy (UDRP)... This would save considerable amounts of paper, reduce courier charges (as the notice weighs far less than the full complaint), and thus would be good for the environment. more
The debate surrounding "closed generics", which has been covered several times in the past, has attracted a lot of attention in recent weeks. At the centre of the debate were a number of new TLD applications from large companies including Google, Amazon and others. Google had stated that they planned to establish a number of domain extensions and operate them as "walled gardens". At the ICANN public meeting in Toronto Google attempted to defend their plans and their position until today was unchanged. more
On 14 September 2012, the RIPE NCC began allocating IPv4 address space from the last /8 we received from the Internet Assigned Numbers Authority (IANA). Nobody was entirely sure what would happen when we reached this point. Would there be a "run on the bank" for this final block of addresses? more
During the two-year period preceding the IANA transition in 2016, there was a near-superhuman effort put forth by the community of stakeholders to design, debate, and deploy an accountability framework for ICANN that would serve to check and balance the coordinator of the global DNS. One of the overriding concerns that stakeholders sought to address was the possibility of ICANN being captured, and it was argued that the global community of stakeholders would serve as a "backstop" that would hold ICANN accountable. more
Cogent (CCOI) recently announced that it was offering secured notes for $206M. The unusual part is what it’s using as security: some of its IPv4 addresses and the leases on those IPv4 addresses... Cogent has been leasing out addresses for several years. All internet service providers (ISPs) give IP addresses to their users, but Cogent was among the first to lease those addresses independently of internet access. more
Why are networks so insecure? One reason is we don't take network security seriously. We just don't think of the network as a serious target of attack. Or we think of security as a problem "over there," something that exists in the application realm, that needs to be solved by application developers. Or we think the consequences of a network security breach as "well, they can DDoS us, and then we can figure out how to move load around, so if we build with resilience (enough redundancy)... more
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byCSC