I can't help but think that the situation in this rather old joke applies very precisely to the current Australian efforts to compel network operators, through some contemplated regulatory instrument, to record and retain network-collected data about their customers' online activities. What I'd like to examine here the emerging picture that while networks, and network operators, make convenient targets for such surveillance efforts, the reality of today's IP network's are far more complex, and Internet networks are increasingly ignorant about what their customers do. more
I'm sure we've all heard about "the open Internet." The expression builds upon a rich pedigree of term "open" in various contexts. For example, "open government" is the governing doctrine which holds that citizens have the right to access the documents and proceedings of the government to allow for effective public oversight, a concept that appears to be able to trace its antecedents back to the age of enlightenment in 17th century Europe. more
The Internet is undergoing an evolutionary transformation resulting from the explosive growth of things that are interconnected. From single purpose sensors through wearable technologies to sophisticated computing devices, we are creating, exchanging, and consuming more data at rates that would have been inconceivable just a decade ago. The market suggests the average consumer believes this is the best world possible. As technologists, we have a responsibility to consider if we are building an Internet that is in the best interest of the user. more
Recently, the FBI, DEA and even the Canadian Mounted Police have suggested that the switch to IPv6 is making it more difficult to track criminals online, those who would traffic in things such as drugs or child pornography, in addition to hackers, botnets, kidnappers and terrorists. Under IPv4, it wasn't very difficult to find offenders online via their IP addresses. The American Registry of Internet Numbers (ARIN) would hand out the address and internet providers would log them into the public WHOIS database. more
The 85th meeting of the Internet Engineering Task Force (IETF) begins next week in Atlanta, Georgia, USA. Over 1000 engineers, maybe as many as 1400 or more, from all around the world will gather in various working groups to discuss and debate issues relating to the open standards that define the Internet's infrastructure. more
A 'decade from hell', according to Times Magazine, a 'dazing decade' says Newsweek. In Copenhagen, at the Climate Change Conference, the World Meteorological Organization talked of the 'hottest decade on record'. BusinessWeek characterized the decade as one of 'innovation interrupted'. All this gloom made me wonder how to qualify our IPv6 decade? more
Mid March a special plenary session of the Canadian standard committee isacc was convened in Ottawa to review the final report of the Canadian IPv6 Task Group. It was unanimously approved and the essence of its 66 pages are seven recommendations for Government, Industry, Service and Content providers, and the regulator, CRTC to proceed with diligence, even some sense of urgency. One paragraph provides an interesting new twist... more
Funny how some topics seem sit on a quiet back burner for years, and then all of a sudden become matters of relatively intense attention. Over the past few weeks we've seen a number of pronouncements on the imminent exhaustion of the IP version 4 address pools. Not only have some of the Regional Internet Registries (RIRs) and some national registry bodies made public statements on the topic, we've now seen ICANN also make its pronouncement on this topic... Why the sudden uptake of interest in this topic? I suspect that a small part of this may be my fault! more
Timothy D. Morgan's recent paper titled, "IPv6 Address Cookies", seeks to apply the fundamental shift in resource availability brought about by the vastly increased Internet address space in IPv6 to develop a novel, lower cost solution to mitigating spoofed attacks. "Spoofed denial of service attacks have plagued the Internet for a number of years, and show no signs of abating. Research into mitigation techniques has apparently not led to a financially viable solution, and new attacks have been discovered in the wild without being widely anticipated". The following provides an introduction to this paper. more
It has often been claimed that IPv6 and the Internet of Things are strongly aligned, to the extent that claims are made they are mutually reliant. An Internet of Things needs the massively expanded protocol address space that only IPv6 can provide, while IPv6 needs to identify a compelling use case to provide a substantive foundation to justify the additional expenditures associated with a widespread deployment of this new protocol that only the Internet of Things can provide. more
The Cooperative Association for Internet Data Analysis (CAIDA) and the American Registry for Internet Numbers (ARIN) presented the results [PDF] of a recent IPv6 survey at the ARIN XXI Public Policy Meeting in Denver on April 7th. The survey involved over 200 respondents from a blend of Government, commercial organizations (including ISPs and end users), educational institutions, associations, and other profit and non-profit entities. The purpose of the survey, conducted between March 10th and 24th, was to capture IPv6 penetration data in the ARIN region... more
One of the major principles of the architecture of the Internet was encapsulated in a paper by Saltzer, Reed and Clark, "End-to-End Arguments in System Design". This paper, originally published in 1981, encapsulated very clearly the looming tension between the network and the application: "The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the end points of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible." At the time this end-to-end argument was akin to networking heresy! more
Alain Durand, Principal Technologist at ICANN, visited Georgia Institute of Technology last week for a talk on the global adoption of Internet Protocol version 6 (IPv6). The Internet Governance Project organized the talk in cooperation with Atlanta's Technology Development Center (ATDC) and the Institute for Information Security and Privacy. Durand, who was involved in the IPv6 standardization efforts at IETF back in the early to mid-1990s, offered a clear eyed assessment of the protocol's critical flaw... more
As the IPv4 address pool is rapidly reaching exhaustion, Silvia Hagen, a leading expert on IPv6 and the author of O'Reilly's book, "IPv6 Essentials," stresses that a primary step towards IPv6 address space is not about "transition" but "integration". IPv4 and IPv6 are going to co-exist for many years to come and so what companies need to do, in the first place, is to look at their IPv4 landscape and identify areas of priority, Hagen said in a recent interview with CircleID. more
There is currently a discussion going on between Milton Mueller and Patrik Fältström over the deployment of DNSSEC on the root servers. I think the discussion exemplifies the difficult relation between those who develop standards and those who use them. On the one hand, Milton points out that the way the signing of the root zone will be done will have a great influence on the subjective trust people and nation states will have towards the system. On the other hand, Patrik states that "DNSSEC is just digital signatures on records in this database". Both are right, of course, but they do not speak the same language... more