The need for an access model for non-public Whois data has been apparent since GDPR became a major issue before the community well over a year ago. Now is the time to address it seriously, and not with half measures. We urgently need a temporary model for access to non-public Whois data for legitimate uses, while the community undertakes longer-term policy development efforts. more
If you are interested in the current state of IPv4 address exhaustion within North America as well as the current state of IPv6 deployment, there will be a live stream today, April 17, of the sessions happening at INET Denver starting at 1:00pm US Mountain Daylight Time (UTC-6). The event is subtitled "IPv4 Exhaustion and the Path to IPv6" and you can view the live stream at. more
Something bad happens online. I can tie that something-bad back to an IP address. Do I know who did the bad thing? According to the Federal District Court in Arizona, I don't. An IP address may identify the owner of an Internet access account; it does not identify who was online at that particular time and who may be responsible for the actions in question. In Breaking Glass Pictures v Does, DAZ 2013, Plaintiff brought a claim for copyright infringement, wants early discovery, but the court is refusing. more
Recent events have shown the threat of domain hijacking is very real; however, it is also largely preventable. As Verisign previously noted, there are many security controls that registrants can utilize to help strengthen their security posture. Verisign would like to reiterate this advice within the context of the recent domain hijacking reports. Domains are an important element of internet infrastructure; their functionality and security rely upon many factors such as their delegated name servers. more
Here we go again; another instance of really sophisticated spyware has been reported, a system that is "so complex and sophisticated that it's probably an advanced cyber-weapon unleashed by a wealthy country to wage a protracted espionage campaign on Iran". I won't get into the debate about whether or not it's really more impressive than Stuxnet, whether or not it's groundbreaking, or whether or not Israel launched it; let it suffice to say that there are dissenting views. I'm more interested in the implications. more
A friend who read my Creating Sustainable Network Neutrality paper wrote to say, "Help me understand what is so bad about treating different types of communications differently." That's a really good question! If you want to offer vertically integrated services on special purpose networks, such as video entertainment or pager service or telephony, I do not have a problem with that, provided you don't use your market power to impede Internet applications that offer competing services... more
The legitimacy of the ICANN multistakeholder model and its governance framework are facing an existential threat requiring immediate attention. The recently announced results of the ICANN Nominating Committee highlight how the ICANN Board is captured by "affiliated" directors, which threatens its independence and ability to act for the public interest. more
I have struggled over the past couple of weeks to come up with a metaphor to succinctly describe the standoff between the ICANN Board and the ICANN Government Advisory Committee (GAC) over the new generic Top-Level Domain (gTLD) implementation process. So here's my best attempt to explain these dynamics in terms a layperson may be better to understand. I chose the metaphor for its timeliness, without meaning to offend anyone. more
During the sunrise period for .eu domains there was quite a bit of controversy, as a number of high profile names were grabbed by companies that had no legitimate right to them. One of the domains that caught my attention at the time was dublin.eu (see Irish Times article). So what about the .tel sunrise?
Were companies like Lantec, who grabbed the dublin.eu domain, actively seeking high profile names this time round? more
The U.S. National Telecommunications and Information Administration (NTIA) is soliciting comments on signing the DNSSEC root. Ignore the caption on the page: this is not about DNSSEC deployment, which is already happening just fine. It's about who gets to sign the root zone. more
After wading through the various IANA Notice of Inquiry (NOI) submissions I thought I would take a break and do a secondary review of the recently concluded ICANN regional meeting in San Francisco. In doing this review there were three things that kind of jumped out at me as still missing in action. more
Argentines use the word "quilombo" to describe "a real mess", which is what I feared was awaiting us at the outset of ICANN's meeting in Buenos Aires this week. Since then, ICANN President Fadi Chehade has done a good job cleaning-up the internal process quilombo he and the board created. But ICANN's leadership has left the ICANN community struggling to answer deep and ongoing questions about the future of the Internet and the multistakeholder model. more
In my role as CMO of .CLUB I get to speak about domain names at different events all over the world, and have been doing so for more than two years now. From stages and podiums at countless events I have heard the same comments and questions again and again, and in all that time it seems that very little has changed when it comes to the perceptions of the new domain extensions, the so-called "new gTLDs"... more
Bruce Schneier's recent blog post, "Someone is Learning How to Take Down the Internet", reported that the incidence of DDOS attacks is on the rise. And by this he means that these attacks are on the rise both in the number of attacks and the intensity of each attack. A similar observation was made in the Versign DDOS Trends report for the second quarter of 2015, reporting that DDOS attacks are becoming more sophisticated and persistent in the second quarter of 2016. more
In case you missed it (you probably didn't), the Internet was hit with the Monday blues this week. As operator-focused lists and blogs identified, "at 17:47:05 UTC yesterday (6 November 2017), Level 3 (AS3356) began globally announcing thousands of BGP routes that had been learned from customers and peers and that were intended to stay internal to Level 3. By doing so, internet traffic to large eyeball networks like Comcast and Bell Canada, as well as major content providers like Netflix, was mistakenly sent through Level 3's misconfigured routers." more
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC