Spam over Internet Telephony (SPIT) is viewed by many as a daunting threat. SPIT is much more fatal than email spam, for the annoyance and disturbance factor is much higher. Various academic groups and the industry have made some efforts to find ways to mitigate SPIT. Most ideas in that field are leaning on classical IT security concepts such as intrusion detection systems, black-/white-/greylists, Turing tests/computational puzzles, reputation systems, gatekeeper solutions, etc... We identified the lack of a benchmark testbed for SPIT as a serious gap in the current research on the matter, and this motivated us at the to start working on a first tool for that. more
I posted reviews of important LEO-satellite Internet service developments during 2017, 2018 and 2019. I've updated those posts during the years and have 18 new posts for 2020. In 2020 we saw increased effort from China, OneWeb's bankruptcy and restructuring with new ownership and prospects, Amazon investng in space-related infrastructure, Telesat making steady progress, SpaceX making rapid progress and satellite and debris tracking and collision-avoidsnce service startups. The following are brief summaries of and links to the 2020 posts. more
The IETF published RFC8200 last week, which officially makes IPv6 an Internet Standard. While this move was a long time coming -- IPv6 has now reached about 20% deployment -- a more interesting question is: what has changed since RFC2460, which was a draft standard, was published in 2013? After all, the point of moving from the experimental to the draft standard to the internet standard states is to learn more about the protocol as it operates on the wire... more
As discussed in the several studies on name collisions published to date, determining which queries are at risk, and thus how to mitigate the risk, requires qualitative analysis. Blocking a second level domain (SLD) simply on the basis that it was queried for in a past sample set runs a significant risk of false positives. SLDs that could have been delegated safely may be excluded on quantitative evidence alone, limiting the value of the new gTLD until the status of the SLD can be proven otherwise. more
A federal court granted a request for attorney's fees (in the amount of $806,978.84) against prolific CAN-SPAM plaintiff Asis Internet. I thought things were looking good for Asis - whose lawsuits have generated substantial blog fodder - when it recently obtained a 2.5 million dollar default judgment in a spam case. more
A network traffic analyzer can tell you what's happening in your network, while a Domain Name System (DNS) analyzer can provide context on the "why" and "how." This was the theme of the recent Verisign Labs Distinguished Speaker Series discussion led by Paul Vixie and Robert Edmonds, titled Passive DNS Collection and Analysis -- The "dnstap" Approach. more
The first part of this series explained how Amendment 35 to the NTIA-Verisign cooperative agreement is highly offensive to the public interest. But the reasons for saving the Internet are more fundamental to Western interests than a bad deal made under highly questionable circumstances. One of the world's foremost experts on conducting censorship at scale, the Chinese Communist Party's experience with the Great Firewall... more
Last week the Federal Trade Commission settled a lawsuit against Yesmail, a large ESP (Email Service Provider). The facts of the case are not in dispute, but their meaning is. Yesmail, like most large ESPs, has absorbed a number of its smaller competitors over the years including a company called @Once. Back in 2004, they screwed up their incoming mail so that a whole lot of bounces and opt-out requests were erroneously filtered out as spam. As a result, thousands of people who'd told @Once to stop sending them mail kept getting mail anyway... more
It has been observed that the most profound technologies are those that disappear (Mark Weiser, 1991). They weave themselves into the fabric of everyday life until they are indistinguishable from it, and are notable only by their absence. The feat of reticulating clean potable water into every house, so that it is constantly accessible at the turn of a tap, is a great example of the outcome of large scale civil engineering projects, combining with metallurgy, hydrology, chemistry and physics. But we never notice it until it is no longer there. more
I read with interest the recent blog written by Theresa Swinehart a Sr. Advisor to the President on Strategy. She wrote: "The most critical element of this [ICANN Transition] process is trust and alignment. To ensure success on this accountability track, we must as a community work closely together to make sure that the final process is meaningful. There is plenty of work to be done in an ambitious period of time." more
As we blogged about recently, Neustar is committed to ensuring that the domain name system is secure and stable and has been operating top-level domains (TLDs) for over a decade. Tuesday, Neustar submitted comments to the Internet Corporation for Assigned Names and Numbers (ICANN) in response to ICANN's proposal to delay the launch of hundreds of new generic top-level domains (gTLDs). ICANN's decision to delay the launch is based on a study it commissioned that measured the potential frequency of domain-name collision. more
The RIPE NCC took active measurements of World IPv6 Day participants before, during and after World IPv6 Day (in cooperation with CAIDA). We selected 53 participants and performed periodical A and AAAA DNS lookups and HTTP fetches from 40 servers worldwide. For HTTP, we fetched data over IPv4 and IPv6. These provide important control points... more
As a result of ICANN's IDN ccTLD Fast Track process, which was launched in November of last year, a number of new ccIDNs (Country Code Internationalized Domain Names) have been successfully added to the root including: China (.??, .??), Egypt (.???), Hong Kong (.?? ), Russia (.??), Saudi Arabia (.????????), Taiwan (.??, .??) and the UAE (.??????). ... With so many new registration possibilities available, and several Sunrise periods quickly approaching, many corporate domain managers are asking themselves whether new registrations should be added to portfolios which are already bursting at the seams. more
Cybersecurity regulation is coming. Whether regulations intended to enhance critical infrastructure protection will be based on existing statutory authority, new legislation, an Executive Order or a combination of legal authorities, however, is still unknown. Other aspects of the coming federal oversight of critical infrastructure cybersecurity that remain undetermined include the extent to which governance system will include voluntary characteristics and the time frame for initiation of new cybersecurity regulation. more
We have long argued that ICANN should consider categories for new gTLDs because different categories will have markedly different benefits and impacts for consumers. It is difficult to represent the complexities of the world in any system and the flat, first come first served single level approach ICANN is proposing is actually more cumbersome, more restrictive, more expensive and less equitable than the very successful existing system it is seeking to extend. more
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byVerisign