DNS

Sponsored
by

DNS / Most Viewed

More Problems Crop Up With Universal Acceptance of Top Level Domains

I've often found truth in the famous George Santayana quote, "Those that cannot remember the past are doomed to repeat it." That's an apt warning for what is currently happening - again - with the hundreds of new generic Top Level Domains (gTLDs) that are launching ... and failing to work as expected on the Internet. First, a quick refresher: As most CircleID readers know, in the early 2000s, seven new gTLDs were launched: .AERO, .BIZ, .COOP, .INFO, .MUSEUM, .NAME and .PRO. Aside from Country Code TLDs (ccTLDs), these were the first top-level changes to the DNS since the early days of the Internet. more

XXX Comes to a Head

Just when you thought the .xxx affair couldn't get any worse, it does. I'm beginning to think that ICANN's approach to TLD approval was cooked up by a demented sergeant from Abu Ghraib... Now, after the triple x people negotiated with ICANN's staff a contract that met all prior objections, and heads into what should be its final approval, word is that a few ICANN Board members are leaning in a negative direction. What is the reason? A group of pornographers has organized a campaign against .xxx, flooding ICANN's comment box with overwhelmingly negative remarks. more

CircleID’s Top 10 Posts of 2015

Once again it is time for CircleID's annual roundup of top ten most popular posts featured during the past year (based on overall readership). Congratulations to all the 2015 participants and best wishes in the new year. more

Registrar Influence on the Domain Security Posture of the Forbes Global 2000

In the 2021 Domain Security Report, we analyzed the trend of domain security adoption with respect to the type of domain registrar used, and found that 57% of Global 2000 organizations use consumer-grade registrars with limited protection against domain and DNS hijacking, distributed denial of service (DDoS), man-in-the-middle attacks (MitM), or DNS cache poisoning. On average, the adoption of domain security controls is two times higher for enterprise-class registrars than for those using consumer-grade registrars. more

Is a Domain Name Property?

In an article by Sheldon Burshtein, published in the Journal of Intellectual Property Law & Practice, the author examines the view on whether domain names are properties. The following is the abstract of this article: "...Domain names have become increasingly valuable assets, in some respects more valuable than trade marks. A domain name may identify not only the source of the goods, services, business or information, but also the virtual location of the source, much as an address or telephone number does. However, there is still a significant unresolved issue as to whether a domain name is a form of intangible property or merely a contractual right." more

Most Popular Invalid TLDs Should Be Reserved

Some of the root server operators post public statistics for their domain name traffic at the top-level. For example, the graph (which can take a bit of time to generate, given ICANN's slow servers) for the L-root server's most popular Top-Level Domain (TLD) queries demonstrates, to no one's surprise, that .com is king. What's more interesting, though, especially given the new generic Top-Level Domain (gTLD) debate, is to look at the most popular invalid (non-existent) TLDs. more

12th Registration Operations Workshop: Join Us Online on June 20th, 2023

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system and IP addressing. The ROW series is being co-sponsored by Verisign and ICANN and organized by Cofomo, and we are looking forward to an engaging set of talks, panel discussions, and conversations with individuals involved with the operation of domain name registrations systems. more

78% of Cybersecurity Professionals Expect an Increase in DNS Threats, Yet Have Reservations

A recent survey conducted by the Neustar International Security Council confirmed the heightened interests on domain name system (DNS) security. The survey reveals that over three-quarters of cybersecurity professionals anticipate increases in DNS attacks, especially with more people shopping online amid the pandemic. Yet, close to 30% have reservations about their ability to respond to these attacks. more

Languages in the Root: A TLD Launch Strategy Based on ISO 639

TLD registrations in the Internet's root-zone file currently are divided into two broad classifications: generic and country-code top-level domains. With respect to the latter classification, no new "strategy" is required to add further ccTLDs as a relatively well-working process is already in place to integrate the occasional new country-code top-level domain. With one of these two classifications under reasonably sound management, it is therefore perfectly understandable to see that the ICANN organization consequently views its obligation to "Define and implement a predictable strategy for selecting new TLDs" as a mandate "to begin the process of allocating and implementing new gTLDs"... the flaw in this conclusion, however, stems from the presumption that the Internet's taxonomy must necessarily contain only the two above-so-mentioned broad classifications. I am proposing a third TLD classification -- based on languages. more

Cybersecurity Tech Accord: 98% of Registrar Whois Requests Unrequited

When a brand goes so far as to ask a domain name registrar for Whois (the registration contact details) of a potentially abusive domain name, there's likely a lot at stake. Most often, the request is prompted by consumer safety concerns, such as the risk to consumers posed by a malicious site. Other times, the demand has a simple goal: to have a dialog with the registrant about the use of trademarks or other intellectual property in order to avoid extreme action. more

New CSC Research Finds Significant Lack of Redundancy for Enterprise DNS

As outlined in CSC's recent 2020 Domain Security Report: Forbes Global 2000 Companies, cybercriminals are disrupting organizations by attacking the protocol responsible for their online presence -- their domain name system (DNS). When a DNS is overwhelmed with traffic due to a distributed denial of service (DDoS) attack or configuration error, content and applications become inaccessible to users, affecting both revenue and reputation. more

Paul Vixie on Fort N.O.C.‘s

I wish to correct several misstatements made by Brock Meeks in his article, "Fort N.O.C.'s", published January 20. I am speaking as an operator of the "F" root name server which was mentioned several times in this story. ..."A" root is not special in any way. Our "F" root server receives updates from an unrelated server called SRS which is operated under contract from the US Department of Commerce and the Internet Corporation for Assigned Names and Numbers (ICANN). These updates are received by all 13 root name servers, with "A" root a peer of the other 12, having no special capability or importance. If any one of these 13 servers (including "A" root) were temporarily unavailable due to a failure or disaster, there would be no noticeable impact on the Internet as a whole. more

The Villain in the ICANN-VeriSign Struggle is the U.S. Government

ICANN Board Chair Vint Cerf now works for a company whose motto is, "Do No Evil." So how could Vint and his fellow board members be engaged in a massive capitulation to the enterprise greed of dot-com operator VeriSign? The story of how the Internet community got to its current impasse over the future of the ICANN-VeriSign relationship is overly complicated but the bottom line is that we are suffering from woes created by the U.S. Government with the best of intentions over the past fifteen years. And only the government has the capacity to stop equivocating and do the right thing for all of us. The road to hell is paved with good intentions... more

ENUM: Mapping the E.164 Number Space into the DNS

Many communications networks are constructed for a single form of communication, and are ill suited to being used for any other form. Although the Internet is also a specialized network in terms of supporting digital communications, its relatively unique flexibility lies in its ability to digitally encode a very diverse set of communications formats, and then support their interaction over the Internet. In this way many communications networks can be mapped into an Internet application and in so doing become just another distributed application overlayed on the Internet. From this admittedly Internet-centric perspective, voice is just another Internet application. And for the growing population of Voice over IP (VoIP) users, this is indeed the case... more

Report on Distribution Analysis of Internationalized Domain Names

In December 2003, the testing phase of Multilingual domains also known as Internationalized Domain Names (IDN), went live with the addition of over 350,000 multilingual domains to the .com and .net registries. As of 1st January 2004, the .com registry contained 300,409 IDN's, whereas the .net registry had 79,630 IDN's, representing around 1.25% of the total .com and .net domains. WebHosting.Info has analyzed these 380,039 IDN domains that are now live, and provided a detailed insight on trends and patterns across these domains. more