Trust is such a difficult concept in any context, and certainly, computer networks are no exception. How can you be assured that your network infrastructure is running on authentic platforms, both hardware and software and its operation has not been compromised in any way? more
If we traveled back in time, we would discover that unauthorized squatting on someone else's property is an ancient tort, but in cyberspace, it dates from the mid-1990s. Its emergence brought together governments and intellectual property stakeholders to demand a rights protection mechanism devised to deal with this new form of squatting. In 1999 the World Intellectual Property Organization (WIPO) completed its work on a proposal for an online rights protection mechanism which ICANN crafted into the Uniform Domain Name Dispute Resolution Policy (UDRP). more
Registrars who support .com domain names will use the Extensible Provisioning Protocol (EPP) system by October 28. ...There will be an additional step when trying to transfer a .com domain name among registrars. Specifically, a piece of information called an EPP code (aka auth code, EPP key, transfer secret) must be obtained from the current registrar and submitted to the gaining one prior to approving with the latter. more
I've been having arguments about Network Neutrality with a lawyer. My position is that you can't adequately regulate ISPs to be neutral, because there's no agreement what "neutral" means in practice. He points out that the courts aren't interested in technical details like what packets are dropped, it's that all traffic has to be treated the same, and ISPs should just figure out how to do that. So I contemplated a city with Plumbing Neutrality with the simple rule that all people must be treated the same... more
At the recent Anti-Phishing Working Group meeting in San Francisco, Rod Rasmussen and I published our latest APWG Global Phishing Survey. Phishing is a distinct kind of e-crime, one that's possible to measure and analyze in depth. Our report is a look at how criminals act and react, and what the implications are for the domain name industry. more
Strand Consult published an article on its website that makes numerous predictions for broadband and related industries in 2025 and compares them to the company's 2024 predictions. It's fascinating and well worth reading. There is one prediction in particular that got me thinking. In its 2024 predictions, Strand Consult compared Elon Musk's Starlink to Jeff Bezos' Kuiper and said that Bezos had opened a burger bar while Musk runs an interstellar McDonald's. The 2025 observation agrees with that assessment. more
Anyone who reads the papers sees stories -- or hype -- about cyberwarfare. Can it happen? Has it already happened, in Estonia or Georgia? There has even been a Rand Corporation study on cyberwarfare and cyberdeterrence. I wonder, though, if real cyberwarfare might be more subtle -- perhaps a "cyber cold war"? more
Signing Email is now a Draft Standard! Signing email transitioned from a proposed standard to a draft standard (RFC6376 -- one of the new RFCs) over at the IETF a few days ago. The other is RFC6377. Let's go through a brief history of DKIM RFCs to refresh our memories... more
The DNS system is, unfortunately, rife with holes like Swiss Cheese; man-in-the-middle attacks can easily negate the operation of TLS and website security. To resolve these problems, the IETF and the DNS community standardized a set of cryptographic extensions to cryptographically sign all DNS records... Now that these standards are in place, how heavily is DNSSEC being used in the wild? How much safer are we from man-in-the-middle attacks against TLS and other transport encryption mechanisms? more
I believe Mobile Information and Communications Technologies (ICTs) are and very well remain powerful and best-suited technologies that will help provide connectivity and digital access in a much faster and cheaper way for developing countries of the globe. Thus, they are to be leveraged within their most strategic and profitable functional or usage contexts. Mobile access technologies along with relevant innovations have formed a powerful springboard for the Internet to be significantly accelerated in terms of access, usage and penetration. more
In February, the FCC's Office of Strategic Planning and Policy Analysis published three studies (1, 2, 3) on spectrum licensing and spectrum utilization. Thanks to Nick Ruark for pointing them out... Reading on I was struck by a gaping hole in their assumptions. more
For over a decade, the Internet Corporation for Assigned Names and Numbers (ICANN) and its multi-stakeholder community have engaged in an extended dialogue on the topic of DNS abuse, and the need to define, measure and mitigate DNS-related security threats. With increasing global reliance on the internet and DNS for communication, connectivity and commerce, the members of this community have important parts to play in identifying, reporting and mitigating illegal or harmful behavior, within their respective roles and capabilities. more
Earlier today the U.S. Court of Appeals for the DC Circuit issued its decision in Weinstein vs. Iran, a case in which families of terror victims sought to have ICANN turn over control of Iran's .IR ccTLD to plaintiffs. In a unanimous decision the three judge panel stated, "On ICANN's motion, the district court quashed the writs, finding the data unattachable under District of Columbia (D.C.) law. We affirm the district court but on alternative grounds." more
In August 2010, we looked at the growth in RIPE NCC membership and concluded that the number of new RIPE NCC members is still growing at an amazing pace, even during the recent economic downturn... This time we are looking at the different sizes of RIPE NCC members over time. It is often claimed that there is massive consolidation happening in the ISP community, especially in times of economic difficulties like in the early 2000s and now. We were curious to find out if this is really the case. more
The latest ICANN domain auction brought the auction proceeds piggy bank to about $240 million. The application fees for the new gTLD round were $361 million of which, at the end of March, they'd spent $227 million, and their very conservative estimate is that at the end of the process they'll have spent $289 million. If you add the numbers from the private auctions to the ones for the ICANN auctions, it's as much or more than the application costs. more
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byCSC
Sponsored byVerisign