The survival thesis mentioned in Part 2 goes like this. ICANN's imaginary mandate is global. But the mind set is provincial. The latter is defensive; focused on keeping power and therefore control over internet policy. But the evidence points to policy actions that contradict policy rhetoric. Discrepancies disclose the delusion. Here's ICANN "core value" from Article 1, Section 2, Paragraph 6 (amended April, 2013): "Introducing and promoting competition in the registration of domain names where practicable and beneficial in the public interest." more
The news that Comcast, Time Warner, and AT&T are all considering capping use of their networks -- so that "overuse" would trigger a charge -- has prompted intense discussion of just why these network operators are moving in this direction. One camp suggests that these operators have to do *something* to manage congestion, and because any protocol-specific discrimination plan raises howls of protest from the Net Neutrality side of the fence adopting bit-usage discrimination schemes is inevitable. It's the least-bad approach, following this view. more
DMARC is an anti-phishing scheme that was repurposed in April to try to deal with the fallout from security breaches at AOL and Yahoo. A side effect of AOL and Yahoo's actions is that a variety of bad things happen to mail that has 'From:' addresses at aol.com or yahoo.com, but wasn't sent from AOL or Yahoo's own mail systems. If the mail is phish or spam, that's good, but when it's mailing lists or a newspaper's mail-an-article, it's no so good. more
The U.S. Health and Human Services Department (HHS) is reported to have suffered from cyberattacks on its computer system believed, by those familiar with the incident, to be a disruption and disinformation campaign aimed at undermining the response to the coronavirus pandemic. more
Is it time for the IETF to give up? Martin Geddes makes a case that it is, in fact, time for the IETF to "fade out." The case he lays out is compelling -- first, the IETF is not really an engineering organization. There is a lot of running after "success modes," but very little consideration of failure modes and how they can and should be guarded against. Second, the IETF "the IETF takes on problems for which it lacks an ontological and epistemological framework to resolve." In essence, in Martin's view, the IETF is not about engineering, and hasn't ever really been. more
We tend to make a number of assumptions about the Internet, and sometimes these assumptions don't always stand up to critical analysis. We were perhaps 'trained' by the claims of the telephone service to believe that these communications networks supported a model of universal connectivity. Any telephone handset could establish a call with any other telephone handset was the underlying model of a ubiquitous telephone service, and we've carried that assumption into our perception of the Internet. On the Internet anyone can communicate with anyone else - right? more
ICANN have taken a solid stance in regards to contention sets, with those yet to be resolved soon to be forced into auctions of last resort in the coming months. As expected, this has increased the velocity of private settlements between applicants, either via deals or private auctions. It seems like most applicants (wisely) don't want to see their funds going into ICANN coffers unnecessarily. more
Interested in learning more about routing security? How it can affect your connectivity supply chain? What are best practices for enterprises and organizations? What is the role of CSIRTs in securing routing? What are governments doing now, and planning to do in the future around routing security? more
The Mexican telecoms and broadcasting magnate Carlos Slim -- the wealthiest man in the world and owner of the business conglomerate Grupo Carso -- has put a 28% bid for the Netherlands' incumbent telco KPN on the table. This is a very interesting and significant move. As is often the case, new winners tend to arrive when previous winners become losers, especially when they are becoming weaker and thus easier to attack. more
The Affirmation gladdens me. The Affirmation worries me. The Affirmation makes me wonder what is next. I am of course referring to the Affirmation of Commitments between the United States Department of Commerce (DoC) and ICANN. In the respect that the US is loosening its grip on ICANN a little, this is a good thing. Symbolically, of course it is gigantic... more
For nearly the past four years, the Trump Administration has purported to treat 5G supply chain security through empty political gestures such as network equipment banning. The disinformation reached its absurd zenith subsequent to the election with the Q-Anon myth of the Kraken. (The Myth advanced by Trump attorneys asserted the long-deceased Hugo Chavez working with China was corrupting voting machine software to deprive Trump of another term.) more
United Against Nuclear Iran (UANI) is an advocacy group that, among other things, tries to isolate Iran by pressuring businesses and organizations to stop doing business with Iran. This week they turned their attention to ICANN and RIPE to try to cut off Internet access to Iranian organizations. Regardless of one's opinion about the wisdom of isolating Iran (and opinions are far from uniform), this effort was a bad idea in an impressive number of both technical and political ways. more
Jules (Julius Genakowski) may soon have a stark choice: should U.S. wireless prices go up or down? Jules talks a good game about wanting more competition and the evidence is overwhelming that going from 6 to 4 majors resulted in higher prices. Merrill Lynch a while back calculated margins went up $billions each year because of the consolidation. You can hire an economist to say almost anything, and two at the University of Chicago happily stretched the truth on this in the past. But the evidence both academic and common sense is clear. more
The DKIM standard has been out for two years now, and we're starting to see some adoption by large mail systems, but there's still a lot of misunderstanding about what DKIM does and doesn't do... Any a mail system can add a signatures to the messages it handles, and spammers can sign their mail, too. A DKIM signature contains, stripped down to its basics, the domain of the signer and a checksum of the message. more
On behalf of the Federal CIO Council, US Office of Management and Budget (OMB) announced today the release of the "Planning Guide/Roadmap toward IPv6 Adoption within the US Government". This document defines the Federal Government's Internet Protocol version (IPv6) direction, building upon requirements set forth in OMB Memorandum 05-22. It was developed by the CIO Council's IPv6 Working Group, in partnership with the American Council on Technology / Industry Advisory Committee, in consultation with and review by the Federal CIO community. more