Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

IDN Spoofing Solutions With Balance

Last week's tizzy about IDN (Internationalized Domain Name) spoofing was an interesting exercise in watching how people react to the unknown. The nearly-universal response to the problem that had been described in detail many years ago was "turn off IDNs" instead of "assume that the people who created IDNs knew about this, so let's do some research." The following is based on my thoughts this week. For those of you who are not familiar with my earlier work, I'm one of the authors of the IDN standards... more

Send a Message to NTIA

The Internet Governance Project is is urging Internet users everywhere, but especially those outside the United States, to respond to the NTIA Notice of Inquiry with the following statement: "The Internet's value is created by the participation and cooperation of people all over the world. The Internet is global, not national. Therefore no single Government should have a pre-eminent role in Internet governance. As the US reviews its contract with ICANN, it should work cooperatively with all stakeholders to complete the transition to a Domain Name System independent of US governmental control." more

Blacklisting Under Wrong Assumptions

If you analyze the relay of spam- and malware-containing email circulating on the Internet purely through your mail server logs (running the Unix command "tail"), a large proportion seem to come from Asia Pacific hosts, especially those from mainland China. Therefore, many less-experienced systems administrators have simply blocked the access from subnets of Chinese or Asian origin, effectively destroying the fabric of the Internet -- messaging. If administrators took pains to analyze these supposedly Asian spam messages by analyzing the full Internet headers, they would have realized that the Asian servers were merely used by the real spammers as open relays, or perhaps as zombie hosts previously infected with the mass mailing worms through the exploitation of operating system vulnerabilities.  more

Registrars File Lawsuit Against ICANN and VeriSign

Newman & Newman, the law firm representing an ad hoc coalition of ICANN-accredited domain name registrars, has filed a lawsuit today against ICANN and VeriSign to Stop 'Anti-Consumer, Anti-Competitive' Wait List Service Implementation. ...The complaint attacks ICANN and VeriSign based on 1) Unfair Trade Practices Act Violations; 2) Violation of California Business & Professions Code; 3) Unlawful Tying Arrangement; 4) Attempted Monopolization; 5) Violation of Racketeer Influenced and Corrupt Organizations Act; 6) Intentional Interference with Prospective Economic Advantage; 7) Breach of Contract; and 8) Declaratory Relief. more

Lessons for the Internet Governance Forum from the IETF

As Antonios Broumas has correctly observed, the Internet Governance Forum (IGF) begins life in Athens next week without the means for its participants to agree upon any substantive documents such as resolutions or declarations. Indeed, according to Nitin Desai, the Chairman of its Advisory Group, it is impossible for the IGF to make any decisions, as it "is not a decision-making body. We have no members so we have no power to make decision."... more

Blacklists Down from Fear of DDoS

Yet another DNS blacklist has been taken down out of fear of the DDoS attacks that took down Osirusoft, Monkeys.com, and the OpenRBL. Blackholes.compu.net suffered a Joe-Job (A Joe-Job is essentially spam designed to look like it's coming from someone else.) earlier this week. Apparently the Joe-Jobing was enough to convince some extremely ignorant mail administrators that Compu.net is spamming and blocked mail from compu.net. Compu.net has also seen the effects of DDoS attacks on other DNS blacklist maintainers. They've decided that the risk to their actual business is too great and they are pulling the plug on their DNS blacklist before they come under the gun by spammers. more

Network Protocols and Their Use

In June, I participated in a workshop, organized by the Internet Architecture Board, on the topic of protocol design and effect, looking at the differences between initial design expectations and deployment realities. These are my impressions of the discussions that took place at this workshop. ... In this first part of my report, I'll report on the case studies of two protocol efforts and their expectations and deployment experience. more

Clouded by a Convenient Illusion

In a relatively short time, the phrase "in the cloud" has become a term of art when talking about the internet. A quick Google search shows nearly a million uses of the phrase in the past month, a 3x increase from the same period in 2009. But, what does it actually mean to have your web site, your software, your data, or anything else "in the cloud?" "In the cloud" is derived from "cloud computing," which in turn is just a new term for distributed computing, where data-crunching tasks are spread across a variety of different physical processing units. This was common in mainframes in the 1960s, and later the idea of distributing processing across cheap PCs running Linux became popular in the 1990s. more

Two New Chinese Internet Service Constellations and Their Market

China’s plans for low-Earth orbit Internet service constellations began with two projects, Hongyun (156 satellites) and Hongyan (864 satellites). These were eventually sidelined for Guowang, an ambitious, 12,992 satellite constellation that is expected to begin launching satellites this year. But, that is old news. China’s five-year plan designates satellite Internet as a strategic emerging industry and two new constellations have emerged, G60 (12,000 satellites) and Honghu–3 (10,000 satellites). more

How Do You Do Secure Bank Transactions on the Internet?

Banks love it when their customers do their transactions on line, since it is so much cheaper than when they use a bank-provided ATM, a phone call center, or, perish forbid, a live human teller. Customers like it too, since bank web sites are usually open 24/7, there's no line and no need to find a parking place. Unfortunately, crooks like on line banking too, since it offers the possibility of stealing lots of money. How can banks make their on line transactions more secure? more

History of SMTP

The following excerpt is from the Free Software Magazine, March 2005 Issue, written by Kirk Strauser. To read the entire article, you may download the magazine here [PDF]. Also thanks to Yakov Shafranovich for making us aware of this publication. "Spam has existed since at least 1978, when an eager DEC sales representative sent an announcement of a product demonstration to a couple hundred recipients. The resulting outcry was sufficient to dissuade most users from repeating the experiment. This changed in the late 1990s: millions of individuals discovered the internet and signed up for inexpensive personal accounts and advertisers found a large and willing audience in this new medium." more

Do You Agree With WLS? Your Chance to Comment!

Should ICANN's Wait-Listing Service be implemented?

Why yes or why not? What are the negative or positive consequences that are being overlooked?


In light of the recent events regarding ICANN's approval of the Wait-Listing Service (WLS), CircleID is requesting all stakeholders (all individuals or organization that own domain names or sell related services) to submit their comments 'for' or 'against' WLS. All comments gathered will be posted on CircleID WLS Speical Coverage and presented to key decision makers...  more

What the Net Did Next

During this slow and long lull of domain name policy and ICANN related news stories, I thought it would be a good time to bring an article by BBC News Online technology correspondent Mark Ward to the attention of the CircleID community. In it, ICANN Chairman of the Board Vint Cerf reflects on the history of the Internet and his involvement as somewhat of a "midwife," rather than the "father" title he doesn't like. He also looks to the future and identifies two key, fundamental changes that will shape the next stage of the Internet. As he puts it, they are VoIP and ENUM. more

Welcome to the Root, .MOBI

mTLD's .mobi entered the root zone on Tuesday, quietly contrasted amidst all of the recent ICANN/VeriSign announcements. The .mobi mTLD is a Dublin, Ireland based joint venture between the Nokia Corporation, Vodafone Group Services Limited, and Microsoft. The .mobi domain was granted to service a sponsored community, consisting of: Individual and business consumers of mobile devices, services and applications; Content and service providers; Mobile operators; Mobile device manufacturers and vendors; IT technology and software vendors who serve the mobile community, and there are numerous benefits of .mobi to this community. more

Domain Name Containing Trademark Translation is Determined Confusingly Similar

Interesting WIPO case (D2005-1085): Complainant (Saint-Exupery estate) owns "Le Petit Prince" in EU, US, and other countries. The translation of "Le Petit Prince" is "The little prince". Respondent registered 'thelittleprince.com'. Is such a domain name confusingly similar to the trademark? more

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days