/ Most Viewed

Microsoft Direct Access: Is it Heaven or Hell for IPv6?

I must confess, during the past couple of years I have highlighted the VPN-solution Direct Access (DA) from Microsoft as a killer application for IPv6. I still have hope for this solution, but as I now have had the chance to study the UAG/DA-solution more closely and in practical implementation, I must also highlight some issues for Microsoft to handle. My conclusion is that using DA today brings difficulties when it comes to an organization that already has, or wants to, deploy native IPv6 internally. more

Legal Controls on Extreme End-to-End Encryption (ee2ee)

One of the most profoundly disruptive developments occurring in the cyber security arena today is the headlong rush by a set of parties to ubiquitously implement extreme End-to-End (e2e) encryption for communication networks using essentially unbreakable encryption technology. A notable example is a new version of Transport Layer Security (TLS) known as version 1.3. The activity ensues largely in a single venue... more

The Small, But Limitless World of .kids.us

Erica Wass is the editor and contributing author of the recently published book, "Addressing the World: National Identity and Internet Country Code Domains", (Rowman & Littlefield, October 2003). This book is an edited collection of original essays by domain name administrators, academics, journalists and lawyers that examine the connections between various cultures and the use and regulation of their country code domain names. This is the second part of a three-part series. "Congress and the President of the United States believed so much in the idea that the Internet needed a "safe zone" for children that they passed a law designating such a space. One year after its passage I sought to examine the development of the .kids.us name space. I found an initiative that has yet to live up to its potential, but has a limitless, albeit difficult future ahead." more

How You Can Be Hijacked Without Actually Being Hacked

Unsuspecting website visitors are often unaware when they have landed on a spoofed page or are re-directed to malware-hosting web servers designed to steal their sensitive data and information. This attack is known as subdomain hijacking, or subdomain takeover. A web user's private information is then traded on the dark web, and cybercriminals profit, further fueling the expansion of identity theft in the online world. more

Freedom of Expression Part 1: Hate Speech, Linehan, Trans as a Protected Class in California

Graham Linehan was banned from Twitter last week. Graham Linehan is an Irish writer and creator of Father Ted and Black Books. Twitter closed Graham Linehan's account for tweeting "men aren't women though" which twitter perceived as "hate speech" and offensive to the Trans community. Context always shapes meaning, and so I thought it would be useful to explore how hate speech is interpreted in California and then to see how it is treated in Fiji. more

WIPO Crowing Again About “Cybersquatting”

Most of us would be put off if a court issued a press release cheering the number of prisoners its judges had put behind bars or the number of tenants it had helped landlords to evict. That seems antithetical to the neutral adjudication of disputes, and ethical rules regularly decry such "appearance of bias." Yet WIPO seems to think it perfectly natural to crow about its arbitrators' favoritism for complainants against "cybersquatters" in UDRP proceedings. It issued a release that reads like a solicitation for trademark claimants' business, not a promotion of neutral arbitration services... more

Abusive and Malicious Registrations of Domain Names

When ICANN implemented the Uniform Domain Name Dispute Resolution Policy (UDRP) in 1999, it explained its purpose as combating "abusive registrations" of domain names which it defined as registrations "made with bad-faith intent to profit commercially from others' trademarks... Bad actors employ a palette of stratagems, such as combining marks with generic qualifiers, truncating or varying marks or by removing, reversing, and rearranging letters within the second level domain (typosquatting). more

MARID is Dead

As long suspected by some, the IETF is going to be closing up the Mail Transfer Agent Authentication in DNS (MARID) Working Group according to today's post by Ted Hardie, co-AD for Applications. Larry Seltzer of eWeek was right on target about this: "The rest of the SID standards process will now be a waste of time thanks to Microsoft, and the other participants will afterwards pick up the pieces and get the job done with another spec." more

Will ICANN Reveal Its True Self To WSIS?

The U.N. World Information Summit (WSIS) meets next Wednesday in Geneva. It is expected that questions will be raised whether the some or all of the functions performed by ICANN would be better vested in an organization such as the ITU...ICANN has not hesitated to ring the bell of its stewardship of these functions before governments and businesses. In fact, I seem to remember court filings in which ICANN tried to excuse itself by hinting to the court that the internet would wobble off of its axis should the court interfere with ICANN and its unfettered role as overseer. Over the last few days, on the IETF mailing list, ICANN's Chairman has tried to tell a different story, a story in which ICANN is merely a "coordinator" with no real power to do much of anything with regard to IP address allocation or operation of the DNS root servers. more

Why I Voted for .XXX

The ICANN Board voted today 9-5, with Paul Twomey abstaining, to reject a proposal to open .xxx. This is my statement in connection with that vote. I found the resolution adopted by the Board (rejecting xxx) both weak and unprincipled... I am troubled by the path the Board has followed on this issue since I joined the Board in December of 2005. I would like to make two points. First, ICANN only creates problems for itself when it acts in an ad hoc fashion in response to political pressures. Second, ICANN should take itself seriously as a private governance institution with a limited mandate and should resist efforts by governments to veto what it does. more

Myanmar Internet Shutdown

There have been lots of press stories in the last day reporting on what the Internet shutdown in Myanmar looked like for people there, and that's the important story. This is what it looked like to the rest of the world, from an Internet infrastructure standpoint. The connection between Myanmar and the rest of the world appears to be turned back on, at least temporarily. The 45 megabit per second circuit connecting Myanmar to Kuala Lumpur that is Myanmar's primary connection to the Internet came back up at 14:27 UTC today. It had mostly been "hard down," indicating either that it had been unplugged or that the router it was connected to was turned off, with the exception of a few brief periods since September 28. Myanmar's country code top level domain, .MM, disappeared... more

Google Voice Dispute Highlights an Opportunity for Mobile Network Operators

The recent row between Google, Apple and AT&T concerning the removal of Google Voice from the Apple iPhone store highlights the friction existing between network operators and so-called over the top (OTT) application providers. Most observers believe that AT&T initiated the blockade because Google Voice (which offers free or highly discounted calling rates) is a direct threat to AT&Ts call revenue (Google Voice users need only pay AT&T for access to the Internet). more

Goodmail Shutting Down

Yesterday Goodmail sent out mail to all their customers announcing they are ceasing operations and taking all their token generators offline as of 5pm pacific on February 8th. While this is a bit of a surprise on one level, I'm not that shocked. Ken Magill mentioned in August that Goodmail was on the sales block and rumors have been circulating for weeks about significant changes coming to Goodmail. ... Despite the free service, people at some of those ESPs told me they were having difficulty getting customers to adopt Goodmail. more

ICANN Montreal: Real-Time Thoughts During the WHOIS Meeting - 2nd Session

John LoGalbo - a "law enforcement" type - is complaining how long it takes him to issue a subpoena. My thought is this: Why should our privacy suffer because his organization can't get its procedural act together?

I am incensed - he is simply stating a conclusion that his targets are "criminals" and that, to go after them, he wants to throw away all legal processes and procedures - so much for the fourth, fifth, sixth, and fourteenth amendments. more

Maybe the IETF Won’t Publish SPF and Sender-ID as Experimental RFCs After All

Yesterday, the IESG, the group that approves RFCs for publication received an appeal from Julian Mehnle to not to publish the Sender-ID spec as an experimental RFC due to technical defects. IESG members' responses were sympathetic to his concerns, so I'd say that a Sender-ID RFC has hit a roadblock. The problem is simple: Although Sender-ID defines a new record type, called SPF 2.0, it also says that in the absence of a 2.0 record, it uses the older SPF1 record. Since SPF and Sender-ID can use the same records, if you publish an SPF record, you can't tell whether people are using it for SPF or Sender-ID. Ned Freed commented... more