DNS

Sponsored
by

DNS / Most Viewed

Nations at WSIS Better Off with an ICANN-Like Structure

There is much talk currently about the WSIS meeting taking place in Geneva this week which means some needed attention is being paid to Internet governance. While some may view the term "Internet governance" as an oxymoron and my natural reaction is something along the lines of "I hope that they continue to view regulation as too complicated so that we Internet-folks can just keep doing what we are doing" I confess to knowing deep down that we would all be better off with a simple, effective policy framework than with the current anarchic state. more

ICANN Meetings in Luxembourg

The ICANN Meetings are in full flow here in sunny Luxembourg. The venue is immense and located a cab, bus, or shuttle ride from the various hotels. So far, the big topics are the .Net finalization (focusing on the readjustment of the pricing verbiage), the USDOC root announcement, the shell registrar accreditations used in the batch pool for the purposes of getting dropped names, and the practice of registrars exploiting the 5 day add grace period to register in excess of 50000 names to watch how much web traffic they have, and returning the ones that do not at no cost... more

ALAC on WSIS Declaration of Principles and Plan of Actions

The At Large Advisory Committee (ALAC) has released this statement about the results of the World Summit on Information Society (WSIS). It is circulated for public comment, in view of subsequent statements to be released in the next months. At the World Summit on the Information Society held on December 10 to 12 in Geneva, the member states of the United Nations adopted the Declaration of Principles and the Plan of Action that include specific language on the issue of "Internet Governance". ICANN's At Large Advisory Committee welcomes the fact that these statements clearly recognize the role of civil society as a full participant in the international management of the Internet, and bring attention to the need for a deep involvement of individual users into its governance. more

The Fragile Network

One of the more persistent founding myths around the internet is that it was designed to be able to withstand a nuclear war, built by the US military to ensure that even after the bombs had fallen there would still be communications between surviving military bases. It isn't true, of course. The early days of the ARPANET, the research network that predated today's internet, were dominated by the desire of computer scientists to find ways to share time on expensive mainframe computers rather than visions of Armageddon. Yet the story survives... more

Loudmouths Wanted for ICANN WHOIS Replacement Work

TL;DR? It's worth reading, BUT, if not -- ICANN has yet another group looking at WHOIS, and there is a huge push to redact it to nothing. I spend easily half my day in WHOIS data fighting online crime, losing it would not make my job harder, it will make it impossible. PLEASE JOIN THE ICANN GROUP and help us fight back against people who are fighting in favour of crime. more

ICANN Needs a Good Root

It's not been the best of years for ICANN. Leaving aside for a few seconds the controversy about xxx, and the allegations of improper behavior about the .Net assignment, ICANN has had a lot to deal with. The troubles began with the UN Working Group on Internet Governance hell bent on fixing ICANN, even though ICANN says nothing is broke. That trouble remains and isn't likely to go away for some time. And then, just when it seemed that the UN and ITU was the cause of all ICANN's problems, the old ally, US Government's DOC, decided that it was going to be in charge of ICANN. ...This could be the beginnings of a distinct change where the centralized DNS as we know it gradually gives way to some next generation structure which is far more decentralized. The coming 12 months may see some significant changes in this area. more

Paul Vixie on How the Openness of the Internet Is Poisoning Us

In a video interview conducted during the NSCS ONE conference, Paul Vixie CEO of Farsight Security further discusses the topic of his presentation titled: "Defective by Design -- How the Internet's Openness is Slowly Poisoning Us". more

DNSSEC Deployment at the Root

The DNSSEC is a security protocol for providing cryptographic assurance (i.e. using the public key cryptography digital signature technology) to the data retrieved from the DNS distributed database (RFC4033). DNSSEC deployment at the root is said to be subject to politics, but there is seldom detailed discussion about this "DNS root signing" politics. Actually, DNSSEC deployment requires more than signing the DNS root zone data; it also involves secure delegations from the root to the TLDs, and DNSSEC deployment by TLD administrations (I omit other participants involvement as my focus is policy around the DNS root). There is a dose of naivety in the idea of detailing the political aspects of the DNS root, but I volunteer! My perspective is an interested observer. more

Domain Name Theft Part II: Did ICANN Leave Foxes Guarding the Chicken COOP?

When it comes to stealing domain names, I suspect that there are two reasons why so many web bandits appear to be immune from ICANN (the Internet Corporation for Assigned Names and Numbers uses the acronym ICANN): the first reason I discussed in my last column on domain name theft (where I described a substantive void in domain name "regulation" as a primary factor for the increasing incidence of domain name theft), the second reason, which is the focus of this column, is the procedural anomaly that currently infuses ICANN's uniform dispute resolution process (UDRP) by providing no administrative forum for domain name registrants who become victims of domain name theft carried out by ICANN's registrars. more

How Domain Name Typo-Squatters are Gaming Google

In a recent article, eWeek reports on researchers at Microsoft revealing large-scale, typo-squatting schemes that use "multi-layer URL redirection to game Google's AdSense for domains program". According to this report, the Microsoft Research Systems Management Research Group succeeded in tracking a ring of typo-squatters registering misspelled domain names that generated traffic for serving advertising from Google. more

UDRP Dilemma In Proving Bad-Faith Domain Registrations - Part II

In the second part of this 3-part series article, the issue of UDRP in proving bad-faith domain registrations is examined with respect to the trademark's characteristics. The first part of this article can be found here. In assessing whether there is a passive holding of a domain name, panels look carefully into the trademark's characteristics in question, namely what is the degree of reputation and distinctiveness of the trademark in question. more

DDOS and the DNS

The Mirai DDOS attack happened just over a year ago, on the 21st October 2016. The attack was certainly a major landmark regarding the sorry history of "landmark" DDOS attacks on the Internet. It's up there with the Morris Worm of 1988, Slammer of 2002, Sapphine/Slammer of 2009 and of course Conficker in 2008. What made the Mirai attack so special? more

A Day Which Will Live in Infamy: ICANN Board Approves VeriSign Settlement

ICANN's Board voted to accept the latest settlement proposal by a vote of 9 to 5: "Today, ICANN's Board of Directors approved, by a majority vote, a set of agreements settling a long time dispute between ICANN and VeriSign, the registry operator for the .COM registry. These settlement documents include a new registry agreement relating to the operation of the .COM registry..." more

Short Domain Names Threatened by Proposed Policy on IGO Dispute Resolution Procedure

ICANN staff has published a draft report on dispute resolution procedures for IGO (inter-governmental organization) domain names. This proposal has deep flaws and should be rejected by the community, as it does not have the balance and protection of registrant rights present in the existing UDRP. Initially, the proposed policy would apply to new Top-Level Domains (TLDs), but via a Policy Development Process (PDP) it could be extended to existing TLDs. more

Nation Scale Internet Filtering—Do’s and Don’ts

If a national government wants to prevent certain kinds of Internet communication inside its borders, the costs can be extreme and success will never be more than partial. VPN and tunnel technologies will keep improving as long as there is demand, and filtering or blocking out every such technology will be a never-ending game of one-upmanship. Everyone knows and will always know that determined Internet users will find a way to get to what they want, but sometimes the symbolic message is more important than the operational results. more