Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

In Praise of Relatively Dumb Pipes

Comcast's furtive and undisclosed traffic manipulation reminds me of a curious, red herring asserted by some incumbent carriers and their sponsored researchers: that without complete freedom to vertically and horizontally integrate the carriers would lose synergies, efficiencies and be relegated to operating "dumb pipes."... Constructing and operating the pipes instead of creating the stuff that traverses them gets a bad rap. It may not be sexy, but it probably has less risk. But of course with less risk comes less reward, and suddenly no one in the telecommunications business is content with that. So incumbent carriers assert that convergence and competitive necessity requires them to add "value" to the pipes. more

Why Restricted TLDs Should Not Be Gatecrashed

In recent weeks, thousands of what ICANN describes as "questionable" registrations have been activated... Let me illustrate: Mr. ICANN decides to hold a party. He has decided that he only wants to ask some of his professional friends to come, so they are asked to bring their party invites with them to prove they've been invited, because poor Mr. ICANN has had trouble before with people gatecrashing his parties. At a sunrise party he'd held a few years ago, all kinds of people had gatecrashed and no-one had asked to see their invites and it was dreadful. So Mr. ICANN hires a bouncer to stand guard at the front door of his house. The bouncer, Johnny Registry, assures Mr. ICANN that no-one will get in without an invite... more

What’s Driving Spam and Domain Fraud? Illicit Drug Traffic

Spam is not about who sent it, it's about who benefits from it. For a moment forget everything you know about filters, zombie PCs, firewalls, spoofing, viruses, beisyan algorithms, header forgery, botnets, or blacklists. These are all methods for sending spam or preventing spam delivery. None of these explain why spam is sent and for far too long all the attention has been paid to the effects and not the driving force. Under the endless onslaught of junk mail it is easy to feel that the goal of the game is send spam and annoy us all. more

Active and Passive Internet of Things

"The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it." -Mark Weiser ...The Internet of Things is a step in this very direction. And like all things new and mysterious, it has its fair share of utopian and dystopian soothsayers; with an almost certain probability that neither of their deterministic predictions will completely come to fruition in the future. more

MARID is Dead

As long suspected by some, the IETF is going to be closing up the Mail Transfer Agent Authentication in DNS (MARID) Working Group according to today's post by Ted Hardie, co-AD for Applications. Larry Seltzer of eWeek was right on target about this: "The rest of the SID standards process will now be a waste of time thanks to Microsoft, and the other participants will afterwards pick up the pieces and get the job done with another spec." more

ICANN UDRP and Contract Disputes

When domain name conflicts between manufacturers and distributors rest on contractual disputes over the use of the trademark owners' marks, ICANN UDRP panels have frequently denied relief. See generally the cases cited and discussed in Western Holdings, LLC v. JPC Enterprise, LLC d/b/a Cutting Edge Fitness and d/b/a Strivectin SD Sales & Distribution, D2004-0426 (WIPO August 5, 2004) by Mark Partridge as sole panelist. The decision summarizes other ICANN UDRP decisions involving contractual disputes. For instance... more

More than 99% of Email is Spam?

One of my pet peeves is the headline "n %" of email is spam, it is inherently misleading, and conveys no useful data. I guess it makes for great newspaper headlines then! On our servers looking at one email address for 4 hours, we saw 208 attempted connections for SMTP traffic referring to this email address. ...One can't measure spam in relation to the amount of genuine email, because the amount of genuine email is not connected to the amount of spam... more

At the Moment, No One Governs the Internet

What's remarkable about this moment is that the hot potato of DNS standard-setting is still up in the air. The US government didn't want to appear to be in charge, and wanted to convince European governments that it wasn't in charge, and so it created (or called for the creation of) ICANN. ICANN was designed to keep other governments at bay. ICANN has, however, no particular delegated power beyond that accorded to it by the contracts it has signed with registries and registrars. In fact, it can't have more power than that, because if it pretends to be a regulatory agency it should be complying with the APA -- and if it pretends to be a regulator its private nature probably violates US law in a number of respects. more

Endpoint Rollbacks & Data Shadow Copies

Recently I was asked by a customer how they can easily set up rollback capabilities on the endpoints in their corporate network. They had seen the marketing hype by various security technology providers that their products included rollback capabilities they could utilize if/when one of their workstations or servers was infected by malware. Having gotten this question more than once, I thought it would be a good subject to share with a broader audience. more

Uprooting of the DNS Root

The folks at Renesys pointed out earlier this week some interesting activity surrounding the L-root name server, highlighting some activity that should give us all yet another reason to be concerned about the security and integrity of the Internet DNS... considering that a great deal of malware today tends to corrupt the DNS resolution path in order to further exploit compromised end-systems, and that corruption, or any other actual end-system compromise, might well be unnecessary if the root were compromised -- well, think of the possibilities! more

Curbing Cyber- and Typosquatting

We need a tax. You don't hear that too often. But right now a tax is the weapon needed by the domain name community. We face way too many cyber- and typosquatters. To drive them back, let's tax parked and unused domain names. Done right -- sized properly and phased in -- the tax will make it much harder for speculators to turn a profit while they keep domains sitting idle or parked. more

Goodmail Shutting Down

Yesterday Goodmail sent out mail to all their customers announcing they are ceasing operations and taking all their token generators offline as of 5pm pacific on February 8th. While this is a bit of a surprise on one level, I'm not that shocked. Ken Magill mentioned in August that Goodmail was on the sales block and rumors have been circulating for weeks about significant changes coming to Goodmail. ... Despite the free service, people at some of those ESPs told me they were having difficulty getting customers to adopt Goodmail. more

Brand Complementors: Implementing a Cooperative Domain-Name Use

The essay expands a cooperative solution to third-party use of brands in domain names. Like any approach that depends on cooperation, the solution will require both sides to change behavior but also allow both sides to take credit for the resulting benefits, i.e. a triangular solution. If not immediately addressed, the problem of third-party use can become a major threat to the industry. But we already know one thing: when it comes to this issue, legal action and bullying don't work. more

DotAsia Auctions Aim to Address Problems of the Past

The announcement this week that DotAsia will work with Pool.com on an auction system to introduce its new domain names is a good reaction to problems of the past. Previous launches worked (sometimes not well) on a first-come, first-served basis. For example, sex.eu had over 280 potential applications but only the first was even considered. Yet, today, nearly 2 years later, the domain application is still being reviewed... more

VIPR: New Developments in the VoIP Market

This is a new development in the VoIP market. This is how one of my colleagues, Cullen Jennings explained it to me. Today we have two widely deployed global identifiers for reaching people. One is delegated address out of DNS and the other is phone numbers. So I consider an address like email: [email protected] or xmpp:[email protected] to roughly be out of the DNS namespace and phone number to be out of the E.164 name space. Phone numbers have lots of parts that are not cool, but they also have some cool parts... more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days