It looks as if ICANN is going to require applicants for new TLDs to agree (in advance) not to negotiate a changed contract with ICANN. We agree that streamlining the process is in everyone's interest. Along those lines, we are proposing a substantially thinner contract that ICANN and new registries could use. Existing registries should also be allowed to sign up to this contract, if they wish. more
The FCC has unveiled two proposals as part of its plan to help reduce unwanted phone and text spam however the move is challenged by consumer advocacy groups. more
On October 28th, at a Special Meeting of the ICANN Board of Directors, an updated New generic Top-Level Domain (gTLD) timeline was adopted as a working plan. The new Launch Scenario indicates that the New gTLD Applicant Guidebook will be declared final at the December ICANN Meeting in Cartagena, Colombia. more
Yesterday, taking a look at the "Legal Rights Objection" (3.1.2.2) I read : "An intergovernmental organization (IGO) is eligible to file a legal rights objection if it meets the criteria for registration of a .INT domain name". Taking a look at registered .INT domain names, I found Basel Convention on the Control of Transboundary Movements of Hazardous Wastes and their Disposal... more
Monetization of DDoS attacks has been core to online crime way before the term cybercrime was ever coined. For the first half of the Internet's life, DDoS was primarily a mechanism to extort money from targeted organizations. As with just about every Internet threat over time, it has evolved and broadened in scope and objectives. The new report by Forcepoint Security Labs covering their investigation of the Sledgehammer gamification of DDoS attacks is a beautiful example of that evolution. more
So this Internet thing, as we discussed in our last article, is broken. I promised to detail some of the specific things that are broken. Implicit trust is the Achilles heel of the Internet... All of the communication between the resolver and the DNS server is in plain text that can be easily seen and changed while in transit, further, the resolver completely trusts the answer that was returned... more
From "Last Call for Whois Comments", a recent opinion piece by eWeek's Security Center Editor Larry Seltzer: "It's not a good sign when the criminals and the lawyers are on the same side of an issue; there may be no good solution to the problems of Whois service rules. Who would have imagined that so much business and so much abuse would center around Internet domain names? Certainly not the designers of the system, including those of the Whois service, which reports on ownership and some other data on domain names... more
In a recent blog post How to Sell IPv6 to Executives -- Guidance for Engineers, the feedback I got from mailing list discussions was that the case for IPv6 was more of mitigating risk than some inherent benefit of IPv6 itself. That is quite true depending on context. In this article, I will attempt to give more insight into the benefits of deploying IPv6. In a nutshell, viewed from the traditional lens of benefit as something we know and recognise based upon experience, IPv6 has little benefit apart from the large address space. more
The first "Middle East DNS Forum" kicks off on this coming Monday, February 3, 2014, in Dubai. The event is hosted by the Telecommunication Regulatory Authority (TRA) of the UAE and was organized jointly by ICANN and the Internet Society. The event aims to bring together people from across the region to look at opportunities to advance the domain name industry within the region. more
ICANN's plan to open up the domain name space to new top level domains is scheduled to begin January 12, 2012. This long overdue implementation is the result of an open process that began in 2006. It would, in fact, be more realistic to say that the decision has been in the works 15 years; i.e., since early 1997. That is when demand for new top-level domain names, and the need for other policy decisions regarding the coordination of the domain name system, made it clear that a new institutional framework had to be created. more
The U.S. National Security Agency (NSA) has confirmed acquiring Americans' internet browsing information without warrants through commercial brokers, according to a letter from NSA Director Paul Nakasone to Senator Ron Wyden. more
We (the global corps of IPv6 evangelists) have done the trainings (over 200 training sessions in about 45 countries in Africa alone and counting). We've done the conferences (several variations of IPv6 World, IPv6 Business Conferences, IPv6 Hours and Days at the Africa Internet Summits, etc). We've even done the global coordinated events -- IPv6 World Launch. Governments have found it trendy to launch IPv6 Task Forces and come up with National Action Plans for IPv6. Now, almost more than 2000 network engineers (across Africa), thousands of hours of speeches and presentations, hundreds of blog articles and webinars later, where are we? more
Early this month I attended the 3rd Internet Governance Forum in Hyderabad, India. The overall theme of the 4-day meeting was "Internet for All"... Last Friday, I spent a couple of hours in the morning on email before I got cutoff around 10am. I have 2 DSL lines at home through 2 different ISPs, I tried both lines but they were both down. I thought something wrong happened at the local exchange and decided to turn off my computer and enjoy my weekend. The last thing I could have thought about then was that what happened back in January 2008 was happening again in less than a year! more
As you certainly noticed, a lot of traditional media has recently been focusing on click fraud. Is it as big of an issue as it is made out to be, compared to traditional advertising? Unfortunately Eytan Elbaz of Google will not answer this question with statistics, but he lets us know that Google has the problem under control. Here are some notes based on the Click Fraud Session at the Targeted Traffic Conference in Hollywood, Florida last week. more
Few Internet technologies have horked cyberlaw as much as keyword metatags. Back in the 1990s, some search engines indexed keyword metatags, which encouraged some websites to stuff their keyword metatags as a way of gaming the rankings. Judges took a dim view of this practice, largely because the surreptitious nature of keyword metatags seemed inherently sinister, regardless of their efficacy. In the interim, search engines wizened up. more