Message to ICANN: Let those who want to create a TLD, simply register it with ICANN. If the TLD is not already taken, if they have the technical capability to mange the TLD, and they have the desire to market domain names on that TLD, then let them do so. ...Do you present a businesss plan to the city you live in before they allow you a business license? Does the city ask you to prove you are financially stable before issuing you a business license? If you apply for a business license to open a clothing store, does the city ask how you will run your clothing store or if you have the necessary expertise to run a clothing store? Does the city think you will hurt them economically if your clothing store goes out of business? No, it's none of their business... more
I am at the ICANN meeting in Rome. The big story here is that ICANN is under attack for not sticking to its narrow mission -- technical coordination of the DNS and IP numbering system. People here are referring obliquely to the VeriSign lawsuit as "recent events" (as in "in light of recent events"). This euphemism reminds me of words used to reference the US Civil War ("the late unpleasantness"). more
In 1949 a Bell Laboratory researcher, Claude Shannon, published a paper on a new science of "Information". Bell Labs had sponsored the research with the goal of improving phone networks but was not prepared to embrace the full implications of the new science which made explicit the distinction between information in the information sense and information encoded in numbers or bits... more
Maybe you've seen one of the news stories about the revised Georgia statute (Georgia Code ยง 41-1-12) that now requires sex offenders to turn their Internet passwords, screen names and email addresses over to authorities. The purpose of the revised statute is to give authorities the ability to track what sex offenders are doing online, to, in the words of one news story, "make sure" they "aren't stalking children online or chatting with them about off-limits topics." more
One of the basic tools in network design is the so-called "stacked" protocol model. This model was developed in the late 1970s as part of a broader effort to develop general standards and methods of networking. In 1983, the efforts of the CCITT and ISO were merged to form The Basic Reference Model for Open Systems Interconnection, usually referred to as the Open Systems Interconnection Reference Model or the "OSI model." more
The "delegation-only" patch to BIND that was released for Internet Service Providers and others who wanted to block Site Finder service is reported to be disrupting emails to .name emails (that look like '[email protected]'). As a result, the Global Name Registry has submitted a letter to ICANN stating... more
ICANN has released its draft new budget. The document gives us a good look at how ICANN sees itself. It's arguably an internally inconsistent view. ...This budget calls for ICANN to have almost 60 staff members by the end of the next fiscal year. Expenses under this budget are predicted to be twice those of last year ($16 million v. $8 million). more
Starting with Teledesic in 1990, would-be Low-Earth Orbit (LEO) satellite constellations have been justified to the FCC, other regulators, and the public as a means of closing the digital divide. Teledesic's goal was "providing affordable access to advanced network connections to all those parts of the world that will never get such advanced capabilities through existing technologies." Today's low-Earth Orbit (LEO) satellite companies make the same claim, but Telesat, OneWeb and Leosat seem to be targeting commercial markets first. more
What is the impact of IPv6 on telecommunications, VoIP, unified communications, etc? Why should telecom operators care about IPv6? What VoIP systems already support IPv6? What efforts are underway within organizations like the IETF and the SIP Forum to ensure that telecommunications can work over IPv6? more
From the perspective of Internet security operations, here is what Net Neutrality means to me. I am not saying these issues aren't important, I am saying they are basically arguing over the colour of bits and self-marginalizing themselves. For a while now I tried not to comment on the Net Neutrality non-issue, much like I didn't comment much on the whole "owning the Internet by owning the Domain Name System" thingie. Here it goes anyway. Two years ago I strongly advocated that consumer ISP's should block some ports, either as incident response measures or as permanent security measures... more
This is a followup to Wout de Natris' as usual excellent piece on the Enisa botnet report -- pointing out the current state of mobile malware and asking some questions I started off answering in a comment but it grew to a length where I thought it'd be better off in its own post. Going through previous iterations of Mikko's presentations on mobile malware is a fascinating exercise. more
In a recent article, eWeek reports on researchers at Microsoft revealing large-scale, typo-squatting schemes that use "multi-layer URL redirection to game Google's AdSense for domains program". According to this report, the Microsoft Research Systems Management Research Group succeeded in tracking a ring of typo-squatters registering misspelled domain names that generated traffic for serving advertising from Google. more
I never thought I'd see the day when the difference in capability between a wireless and a wireline Internet would become a core policy differentiator in a national election, but this has now happened in Australia. ... It seems that everyone has an interest in a ubiquitous, fast and cheap internet. Now that interest has been taken up as a major policy differentiator by both sides of the political spectrum in the recent Australian election. What was this all about? more
In the first article of this two-part blog series, we looked at how frequently domains were used by bad actors for phishing activity across individual top-level domains (TLDs) or domain extensions, using data from CSC's Fraud Protection services, powered by our DomainSecSM platform. In this second article, we analyze multiple datasets to determine the highest-threat TLDs, based on the frequency with which the domains are used egregiously for a range of cybercrimes. more
Being approved by the Internet Corporation for Assigned Names and Numbers (ICANN) as the owner of a new generic top-level domain (gTLD) extension requires considerable analysis before the application is submitted. You must understand the sources of risk, gauge your risk tolerance, and you must obtain an estimate of the value of your proposed TLD's future revenues (with the effects of potential competitors factored in, a step too many applicants ignore). more
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byVerisign