DNS |
Sponsored by |
ICANN's 44th public meeting is about to start in a few days with a number of topics on the agenda. Some of them are new, while some of them are ongoing. First off, ICANN will be announcing the new CEO this Friday afternoon in Prague. Whoever it is will be coming to the organisation at a time when it faces a number of significant challenges. While the actual official meeting does not start until Monday morning there will be plenty of meetings on over the weekend as well... So what's on the "menu" for Prague?
For those worried about the threat of a state-based takeover of the Internet, there is no need to obsess over the International Telecommunication Regulations (ITRs) exclusively. Three Chinese engineers are proposing a way to alter Internet standards to partition the Internet into autonomously administered national networks, using the domain name system (DNS). The idea was not proposed in the ITU; no, it was sent to a multi-stakeholder institution, the granddaddy of the Internet itself, the Internet Engineering Task Force (IETF).
We have posted our support of the WHOIS Policy Review Team Report with two important comments. First, on page 79 of the report it is confirmed that the RAA is unenforceable on WHOIS inaccuracy (we wrote about this while at the last ICANN meeting) because the language of RAA 3.7.8 has no enforcement provision. It is now time for ICANN to confirm this problem officially.
For two things that would seem to be completely unrelated there is an interesting parallel between IPv6 and DNSSEC. In both cases there is a misalignment of interests between content providers and service?providers. Content providers aren't highly motivated to deploy IPv6 because only a small proportion of users have v6 connectivity and even fewer only have v6. Service providers aren't anxious to deploy IPv6? because there isn't a lot of content on v6, and virtually none exclusively on v6 - so they don't expand the universe of interesting stuff on the web by deploying IPv6. Basically the same things could be said about DNSSEC.
As announced on RIPE Labs we monitored the behaviour of a number of networks that participated in the World IPv6 Launch on 6 June 2012. For that, we looked at the full list of participating organisations as shown on the ISOC website and chose 50 websites from that list. We looked at 'interesting' sites and at geographic distribution. We also tried to find a good mix of networks that had IPv6 switched on already and those that didn't have IPv6 deployed at the time they registered on the ISOC web site.
A woman on the radio talks about revolution, though it's already passed. The window is now closed. A snapshot can be taken. A baseline can be set. How have the public markets valued the new gTLD program? And more importantly, how will public markets value it going forward? Until a few months ago, the new gTLD program was arcane policy discussion among a very narrow technical population of the Internet community.
The transition to IPv6 is top of mind for most service providers. Even in places where there are still IPv4 addresses to be had surveys we've run suggest v6 is solidly on the priority list. That's not to say everyone has the same strategy. Depending where you are in the world transition options are different -- in places such as APAC where exhaustion is at hand one of the many NAT alternatives will likely be deployed since getting a significant allocation of addresses is not going to happen and other alternatives for obtaining addresses will prove expensive.
Only two years after signing the DNS root zone, the powerful lure of a secure global infrastructure for data distribution is starting to reveal itself. It is illustrated clearly by two proposed technical standardizations that seek to leverage secure DNS. To some degree these developments highlight the strength of DNS institutions and how they might fill gaps elsewhere in the Internet's governance. But an increasing reliance upon and concentration of power in the DNS also makes getting its global governance correct even more important.
Mobile networks aren't usually thought of as sources of spam, but a quick look at some of the resources that track spam reveals they actually are. This is counter intuitive at first glance because when most people think of mobile they think of smartphones, and those aren't known to be sources of spam (at least not yet). What's really going on is PCs connected to mobile networks with air cards, or tethered with a smartphone where it's permissible, are the culprits
There has been a lot of talk about how the DNS can provide network-based security, and how DNS is in the best position to detect malware traffic before it does any harm. But what does this mean for end users? How does it make their online lives easier and more secure? DNS servers that are aware of sites that host malware, perform phishing activities (harvesting bank details, for instance) and other nefarious misbehaviors, can prevent end users from ever going to those sites.