/ Most Viewed

Comcast’s Impressive System for Notifying Infected Users

Pretty much as long as there've been computers, one of the biggest challenges has been user education. How do you create software smart enough to inform a user when they're about to do something potentially disastrous - or, worse, when something disastrous has been done to them? As one of the world's largest access providers, Comcast has put a ton of thought into developing a notification system for their users. The solution Comcast developed involves, in effect, hijacking HTTP requests... more

Google, Service Providers and the Future of P2P

In a non-operational NANOG discussion about Google bandwidth uses, several statements were made. It all started from the following post by Mark Boolootian: "Cringley has a theory and it involves Google, video, and oversubscribed backbones..." The following comment has to be one of the most important comments in the entire article and its a bit disturbing... more

Perspectives on a DNS-CERT

Last week at the ICANN meeting in Nairobi, a plan was announced by ICANN staff to create a "CERT" for DNS. That's a Community Emergency Response Team (CERT) for the global Domain Name System (DNS). There are all kinds of CERTs in the world today, both inside and outside the Internet industry. There isn't one for DNS, and that's basically my fault, and so I have been following the developments in Nairobi this week very closely. more

Brad Templeton in Response to Site Finder Controversy

A harmful, highly unilateral and capricious action. Tons of software out there depended on the ability to tell the difference between a domain name which exists and does not. They use that to give a meaningful, locally defined error to the user, or to identify if an E-mail address will work or not before sending the mail. Many used it as a way to tag spam (which came from domains that did not exist). It is the local software that best knows how to deal with the error. more

North American Saw Complete Exhaustion of IPv4 Address Space Inventory in Q3, 2015

Akamai Technologies today released its Third Quarter, 2015 State of the Internet Report with updates on IPv4 exhaustion and IPv6 adoption. more

What New gTLD Applicants Need Is a Quick, Lightweight Answer to the World’s Governments. Here It Is.

It's safe to say that with just a week to go before ICANN intended to sign the first contract for a new gTLD, the last thing anyone wanted was a 12-page document from the world's governments with 16 new "safeguards", six of which it wants to see applied to every new extension. But what the industry shouldn't overlook, especially in the face of the expected critical responses this week and next, is that the Governmental Advisory Committee's (GAC's) formal advice from the ICANN Beijing meeting represents an opportunity for the domain name industry to lock-in self-regulation at a critical point in its evolution. more

Two More Crypto Holes

If you work in computer security, your Twitter feed and/or Inbox has just exploded with stories about not just one but two new holes in cryptographic protcols. One affects WiFi; the other affects RSA key pair generation by certain chips. How serious are these? I'm not going to go through the technical details. For KRACK, Matthew Green did an excellent blog post; for the other, full details are not yet available. There are also good articles on each of them. What's more interesting are the implications. more

Notes from NANOG 81

As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more

Whois Scared?

Every time I witness another argument about changing the rules of the Whois system I marvel at how such an important core internet protocol could be so widely misunderstood. I don't mean that the protocol's technical details are not well understood -- it's a very simple device, easy to implement correctly and easy to use even for new users. I mean that the Whois system itself and its purpose in the Internet ecosystem is widely misunderstood. Everybody uses Whois and lots of people argue about Whois but precious few folks know why Whois exists in the first place. more

Why ICANN TLD Policy Imposes Severe Constraint on Development of Internationalized Domain Names

In 2008, ICANN made it known to the community that it is finally ready to discuss Internationalized Domain Names regarding Top-Level Domains (TLDs) after several years of working groups, technical trials, studies and considerations. It was highly anticipated by the Chinese, Japanese and Korean (CJK) community. It was also with great disappointment when the New gTLD Application Guidebook, published on 24th Oct 2008, included the following paragraph... more

South Korean Banks Receive DDoS Threat from Hacker Group, Record Ransomware Payment Demanded

Various sources including South Korea's news agency Yonhap are reporting that a hacker group has threatened to launch a DDoS attack against seven South Korean banks unless they pay about 360 million won (US$315,000) in bitcoin. more

Converging Technologies Create New Cyber Threats, UK Government Warns

As digital technologies intertwine ever more closely, new vulnerabilities are surfacing in unexpected places. A recent UK government report highlights how the convergence of emerging technologies - such as artificial intelligence (AI), blockchain, quantum computing, and the Internet of Things (IoT) - is generating complex cybersecurity risks across critical sectors. more

Worm Propagation Strategies in an Ipv6 Internet

A recent paper called "Worm Propagation Strategies in an IPv6 Internet", written by Steven M. Bellovin, Angelos Keromytis, and Bill Cheswick, examines whether or not the deployment of IPv6 will in fact provide a substantial level of barrier against worms. Shared below are the introductory paragraphs from this paper. "In recent years, the internet has been plagued by a number of worms. One popular mechanism that worms use to detect vulnerable targets is random IP address-space probing..." more

21st Century Triple Networks: Ubiquitous 4G, WiFi, & Wires

The best engineers on the planet are coming to the same conclusion: a hybrid 4G/WiFi/landline network is the way to meet mobile demand. Folks like John Donovan of AT&T and Masayoshi Son of Softbank in Japan had this vision around 2007-2008. As the iPhone/iPad/Android made the coming demand clear, networks planners around the world evolved similar strategies. more

Political Email Placement or, You’re Not Special

A recent piece in The Markup called Swinging the Vote? attempts to figure out how Google decides where to deliver political e-mail. They were startled to discover that only a small fraction of it was delivered into the main inbox, and a fair amount was classed as spam. They shouldn't have been. This is an example of the fallacy We're so nice that the rules don't apply to us, which is far too common among non-profit and political mailers. more