I read this to the ICANN Board Thursday morning, in Sydney, after more prep work than I care to recall. If you don't know that the DAGv3 is delayed, or what the IRT is, this is a good time to bush up on current ICANN state. "Good morning. My name is Eric Brunner-Williams, and I am speaking to you on behalf of the initial signatories of the Step-by-Step proposal. I represent one of the signatories as the principal of the native, aboriginal, and indigenous cultural and linguistic Top-Level Domain (TLD) project, one of many similar efforts to preserve living languages and cultures..." more
In a letter sent by bureau of the U.S. Department of Commerce, National Telecommunications and Information Administration (NTIA) to ICANN, the department has made it clear that despite recent discussions in Paris meetings, the U.S. department intends to remain in full authority over the Internet root zone. more
Cyber security was a hot topic in 2014. It seemed not a week went by without details of a high profile data breach hitting the headlines. To recap, the Sony breach was one of the most notable, as was the Home Depot hack, while details of widespread security vulnerabilities such as Heartbleed, Shellshock and Poodle were also revealed. But what will 2015 bring? Will it be more of the same, or have cyber criminals got some new tricks up their sleeves? more
It is almost 25 years since the Internet was privatized by the U.S. government. ICANN was formed by Esther Dyson and Jon Postel as a California-based non-profit with the responsibility to administer the Internet. However, the U.S. government retained limited control, primarily through the Internet Assigned Numbers Authority (IANA). It was the revelations, in 2013, of highly classified National Security Agency (NSA) documents by Edward Snowden that sparked global concerns over the U.S. dominance of the Internet. more
I write a lot about the U.S. Federal Communications Commission (FCC), but I imagine a lot of folks don't realize the many functions the agency handles. Like any regulatory agency, the FCC staff and Commissioners have been tasked by Congress with a wide range of responsibilities. The public gets to hear from the FCC formally once each month ... more
At first blush most are unlikely to see the relationship between new generic Top-Level Domains (gTLDs) and children. However, as a father and someone that has worked with approximately 50% of all new gTLDs approved by ICANN over the last decade, I have a unique perspective that may shed some light on this analogy. Hopefully, as the ICANN community begins to seek closure in connection with the new gTLD implement process, this article may offer one perspective as to what lies ahead. more
On July 28th DNSSEC took center stage at the 2010 Black Hat Conference in Las Vegas. Two years ago, at the same conference, Dan Kaminsky unveiled the infamous DNS bug that many believe became a major catalyst for DNSSEC implementation. To kick things off, Jeff Moss -- founder of Black Hat -- in his opening speech called out the fact that "we have not solved any fundamental problems" and noted that the technical community must catch up. more
There's been a lot of emphasis on DNS performance lately because faster DNS contributes directly to a better user experience. There's an interesting flipside to DNS performance though, higher performance DNS servers may be better targets for cache poisoning attacks. Faster servers give attackers more opportunities to insert fake entries into the DNS - speed can kill (or at least inflict a nasty wound!) so it's important to understand the security implications if you're looking to upgrade DNS performance. more
When a new TLD goes into General Availability or Land Rush, the first few days are filled with registrations that reflect how the market perceives the TLD. Registrants may register domain names to develop or for speculative purposes. Others register to protect their brand. The first major web usage survey for a new TLD is generally a Signs of Life survey where the early stages of development can be detected. These surveys were based on the May 19th, 2018 .APP zone file. more
The Department of Energy (DoE) recently came out with an excellent report, called the Magellan report, on the advantages and disadvantages of using commercial clouds versus in house High Performance Computers (HPC) for leading edge scientific research. The DoE probably supports the largest concentration of HPC facilities in the world. I agree with the report that for traditional applications such as computational chemistry, astrophysics, etc. will still need large HPC facilities. more
The Internet Commerce Association (ICA) in an open letter issued today, has asked ICANN to withhold the approval of the assignment of the .ORG top-level domain to the private equity company Ethos Capital. more
Just a few months after Yahoo confirmed a massive data breach impacting half a billion users, the company today disclosed a second major breach of its systems affecting over a billion users. more
A group of 24 CEO's and Internet company founders submitted a letter today to the Federal Communications Commission in support of the Net Neutrality initiative. Also last week, in a similar letter, Vinton Cerf, Stephen Crocker and other Internet pioneers spoke out on Net Neutrality supporting FCC's recent open Internet initiative. more
In ICANN circles these days, accountability is the buzz word. Nearly everybody is talking about it. Generally everybody is in favor of it, but that's where the agreement ends. This paper urges action by ICANN to provide a means for redress of grievances as an essential element of accountability. I would like to review the ICM case (the delegation of the .xxx domain), and the role of ICANN's Independent Review Panel (the IRP). As you will recall, the ICANN Board had originally awarded .xxx to ICM, but in a subsequent reconsideration had reversed the award. more
A couple of years ago I started a mailing list where folks not necessarily involved with the vetted, trusted, closed and snobbish circles of cyber crime fighting (some founded by me) could share information and be informed of threats. In this post I explore some of the history behind information sharing online, and explain the concept behind the botnets mailing list... we may not be able to always share our resources, but it is time to change the tide of the cyber crime war, and strategize. One of the strategies we need to use, or at least try, is public information sharing of "lesser evils" already in the public domain. more