At NANOG on the Road (NotR) in September of 2018, I participated in a panel on BGP security -- specifically the deployment of Route Origin Authentication (ROA), with some hints and overtones of path validation by carrying signatures in BGP updates (BGPsec). This is an area I have been working in for... 20 years? ... at this point, so I have seen the argument develop across these years many times, and in many ways. more
We are at an inflection point in our lifetimes. The Internet is broken, seriously broken... Almost all of the systems currently in use on the Internet are based on implicit trust. This has to change. The problem is that these systems are so embedded in our everyday lives that it would be, sort of like, changing gravity, very difficult. more
IT disasters can strike anywhere, anytime. In 1983, a faulty Soviet warning system nearly precipitated World War III -- the system claimed five missiles were en route from the U.S. Only quick thinking by Lt. Col. Stanislav Petrov saved the day when he realized the United States would never launch so few warheads. And in 2004, a private contractor working with the British Child Support Agency (CSA) suffered a glitch that overpaid 1.9 million people and underpaid 700,000. more
Our latest research shows that dot brand domains continue their qualitative and quantitative growth. We carried out a complete cycle of analysis in April 2017, and found that brands had registered 6,505 domains in their Top Level Domains, which represents a progression of 3% compared to February 2017. 761 actual websites are published on these domains, which represents an increase of 6% form February 2017. more
Paul Sloan reporting in CNET: "ICANN tomorrow will reveal who is going after what new domain extensions, paving the way for a very different looking Web. Prepare for dot-madness... It's not just the hard-core denizens of the domain world that are going after new TLDs, which are also known as 'strings.' Others are jumping into the fray. The most intriguing is Google, which in late May revealed that it's applying for an undisclosed number of strings, including .Google, .YouTube, .docs, and .lol..." more
In Part One of this series, we examined internal server, network and infrastructure monitoring applications. Now let's take a look at another way to capture DDoS information: external performance monitoring... Unlike network/infrastructure tools - which are usually installed inside a customer's network - external performance monitoring solutions are typically provided by a third party and leverage monitoring locations from around the world. more
Rudolph van der Berg presented on the latest updates from the ongoing tensions in the Internet industry between carriage infrastructure providers and content providers, with a European perspective. The carriage providers in the EU region are asserting that they're making major capital investments in augmenting the access network infrastructure to carry gigabit traffic volumes, which is largely streaming content, while at the same time the content providers were getting a free ride, or so goes the argument. more
January 28 is marked as International Data Privacy Day in order to help raise awareness and generate discussions about information privacy. This year companies such as Intel, Microsoft, Google, AT&T, LexisNexis and The Privacy Projects are sponsoring Data Privacy Day efforts. more
Is the United States in full retreat from internationally recognized regulatory best practice? Or is it instead headed toward some different destination -- "dancing to the beat of a different drummer"? Where is this likely to lead? The following is an introduction to a paper, published by IDATE, from J. Scott Marcus, a Senior Consultant for WIK-Consult GmbH: "...What has radically changed is telecoms regulatory practice in the United States. The U.S., in a long series of regulatory decisions, has largely abandoned its long-standing regulatory principles and moved in an entirely new direction." more
Earlier this month, Google sent me several notifications for an article entitled "The Internet Is Widely Accessible in Cuba. Why Is the US Insisting It Isn't?" I checked it out and found that Reese Erlich had posted it on Truthout.org, a left-leaning Web site, on February 12. On the 13th, Cabasi.com published a shortened version of the article and Salon.com published the original version on the 17th. These were all in English, and both Salon and Cubasi credited Truthout. more
ICANN has appointed IID President and CTO Rod Rasmussen to its Security and Stability Advisory Committee (SSAC). An area that Rasmussen's work and recent SSAC reports have both covered in-depth is domain name hijacking. Recent hijackings against UFC.com and Coach.com, and similar past attacks against CheckFree, Comcast and Twitter have heightened awareness about the security dangers with the Internet's infrastructure. more
Craig Labovitz reporting from Arbor Networks: "We use ATLAS data to graph Facebook (AS32934) traffic with 80 ISPs around the world between 5pm September 22 and 5pm EDT today. You can see Facebook traffic plummet around 1:30pm and return shortly after 4pm. From a quick glance at the data, the outage appears to be global (impacting most of the 80 ISPs)." more
We've received enough interest about our previous notes on Iranian Internet connectivity that I wanted to give a brief update, and some reflections. In short: Iran is still on the Internet. As the crisis deepens, people are literally risking their lives by continuing to use the Internet for coordination and communication. more
I saw a poster on the London Underground yesterday, and as is often the case it got me thinking about the parallels with telecoms. The poster explains the peak and off-peak fare structure for tube travel. The purpose of this pricing system is to manage the relationship between supply and demand in a system that is capacity constrained. Over short and medium timescales the supply is essentially fixed, and demand can oversaturate that supply. more
The pace of generative AI development has been astonishing to the degree that the normative space has been unable to keep up. As governments start looking into some implementations of the technology, such as ChatGPT, more advanced techniques and products continue to emerge by the day. Society is changing in irrevocable ways, and it is paramount that the Internet Governance community turns its attention to this question. more