A recent study by researchers at the Cooperative Association for Internet Data Analysis (CAIDA) at the San Diego Super Computer Center (SDSC) revealed that a staggering 98% of the global Internet queries to one of the main root servers, at the heart of the Internet, were unnecessary. This analysis was conducted on data collected October 4, 2002 from the 'F' root server located in Palo Alto, California.
The findings of the study were originally presented to the North American Network Operators' Group (NANOG) on October 2002 and later discussed with Richard A. Clarke, chairman of the President's Critical Infrastructure Protection Board and Special Advisor to the U.S. President for Cyber Space Security. more
The .xxx controversy is a legacy of the Bush era. In the dark period of WSIS and the Iraq invasion, ICANN's independence was fatally undermined when a political appointee of the Bush administration, in response to an email campaign from rightwing groups in the Bush "base", issued a direct threat to Paul Twomey that if ICANN approved the .xxx Top-Level Domain (TLD) it would not put it in the root. more
On April 24th the NETmundial "Global Multistakeholder Meeting on the Future of Internet Governance" concluded with the issuance of an eight-page statement. This non-binding document falls short of the "Magna Carta for the Internet" called for in an opening statement delivered by Tim Berners Lee, but it does set the stage for the other two major 2014 events that will affect the course of Internet Governance (IG) - the IGF meeting in Istanbul, Turkey and the ITU meeting in Busan, Korea. more
A decade has passed since Jon Postel left our midst. It seems timely to look back beyond that decade and to look forward beyond a decade hence. It seems ironic that a man who took special joy in natural surroundings, who hiked the Muir Trail and spent precious time in the high Sierras was also deeply involved in that most artificial of enterprises, the Internet. more
Ever since Neustar announced they signed a deal with GSMA to oversea global database for the mobile operators last week (see also Washington Post), there are many debates about the deal online. "Neustar, a company that should certainly know better, has announced that they're going to create a .gprs TLD to serve the mobile phone industry This, of course, requires creation of a private root zone, against the very strong warnings in RFC 2826" said Steven Bellovin. To the more supportive John Levine: "This isn't quite as stupid as it seems. The GSM industry needs some way to maintain its roaming user database, the database is getting considerably more complicated with 3G features, and it looks to me like they made a reasonable decision to use DNS over IP to implement it rather than inventing yet another proprietary distributed database." more
Good taste has never been a criterion in ICANN's new domains program, and domains including .fail and the remarkably vulgar .wtf have become part of the DNS with little comment. Now we have .sucks, which is intended to empower consumers, but does so in a way so clumsy that ICANN is asking regulators in the U.S. and Canada for an excuse to shut it down. more
This is the first part of a 2-part series article arguing that the decentralization of the Internet will allow the DNS to recede to its earlier, uncontroversial role, before all the lawsuits and screaming matches at ICANN board meetings.
Is it just me, or are we paying less attention to the Domain Name System than we used to? Seems like only a few years ago that the tech-culture world was attuned to every new angle in the ongoing struggle over the DNS' management. You couldn't read the front page of Slashdot without catching one heavily commented-upon story on alternate registries, trademark disputes, or the latest ICANN board meeting. more
It is ICANN's responsibility to make sure domain names do not infringe on trademarks. To determine infringement, ICANN should rely in the short term on predictive models. Thus, domain name and trademark owners must start putting pressure on ICANN to assume its trademark responsibility. more
Some domains are too big to fail. Quite apart from the obvious ones like google.com and facebook.com, upon whose availability our everyday lives depends, there are many others upon which the infrastructure of the Internet (and much of the modern world itself) depends. These are domains like w3.org and ietf.org, which host the technical specifications which describe the World Wide Web and the Internet themselves. more
I'm sure we have all heard a techie or standards body tell legislatures, courts, and business groups to keep their mits off of the internet; that such groups are "clueless" and that they will damage some noumenon or other indistinct, but critical, principle of the internet. Consider, for example, the condemnation of competing DNS roots by ICANN and the IAB. What makes today so interesting is that two well respected techies have stepped forth and made strong social/economic/business policy statements. more
Recently, I entered my domain name in a "WHOIS" database query to test the results of the database by using WHOIS on a number of domain name registrar websites. WHOIS is a database service that allows Internet users to look up a number of matters associated with domain names, including the full name of the owner of a domain name, the name of the domain name hosting service, the Internet Protocol or I.P. number(s) corresponding to the domain name, as well as personally identifying information on those who have registered domain names. I was astonished to find... more
In Part I of this article I set the stage for our discussion and overviewed the October 21st DDoS attacks on the Internet's 13 root name servers. In particular, I highlighted that the attacks were different this time, both in size and scope, because the root servers were attacked at the same time. I also highlighted some of the problems associated with the Domain Name System and the vulnerabilities inherent in BIND. Part II of this article takes our discussion to another level by critically looking at alternatives and best practices that can help solve the security problems we've raised. more
Internet domain names are truly bizarre. There is nothing especially remarkable about them from a technical perspective, but from a social and political perspective they are all sorts of fun. We can have arguments over control of the DNS root, arguments over whether names are property, arguments over innate rights to specific names, arguments over a registrar's right (or lack thereof) to exploit unregistered names for private gain, and many more arguments besides. In this article, I'd like to explore the argument-space rather than defend any particular position in it. In so doing, I hope to illuminate some novel (or under-emphasised) perspectives on the matter. more
As a member of the ROW Planning Committee, I am writing this post on behalf of the Committee and welcome all community members to join us on June 4th. We are celebrating ROW's 10th anniversary! A decade of collaboration and inspiration! Thank you to the incredible community that has fueled this journey! more
Earlier this year, ICANN began to seriously consider the various effects of adding DNS protocol features and new entries into the Root Zone. With the NTIA announcement that the Root Zone would be signed this year, a root scaling study team was formed to assess the scalability of the processes used to create and publish the Root Zone. Properly considered, this study should have lasted longer than the 120 days -- but the results suggest that scaling up the root zone is not without risk -- and these risks should be considered before "green-lighting" any significant changes to the root zone or its processes. I, for one, would be interested in any comments, observations, etc. (The caveats: This was, by most measures, a rush job. My spin: This is or should be a risk assessment tool.) Full report available here [PDF]. more