What is so secret about the word, "Capacity"? As I read and talk with people I realize the word, "capacity" is typically missing from the DNS discussion. "Capacity" and "Security" are the two cornerstones to maximizing DNS resilience; both of which are typically missing from the DNS discussion. Have you seen a single DNS node easily process over 863,000 queries per second? Have you seen a network routinely handle over 50Gbits/second in outbound traffic alone without breaking a sweat? more
While this article specifically discusses the issues of E911 service in the Canadian hinterlands, I fear that the same fiscal shell game is being played by wireless providers all over North America... Grant Robertson writes in The Globe and Mail: Every month when cellphone bills arrive, Northern Canadians are forced to pay for a 911 service they can't access. more
The controversial site gab.com has been shut down by GoDaddy and given 2 days to move the domain elsewhere. The deadline expires at midnight tonight Irish time. In recent days the site has seen itself become increasingly disconnected as various service providers and online platforms including PayPal have shut the door to them. At present the site is displaying this notice... more
This open-source initiative is designed to systematically gather and analyze data on new domain registrations, with the goal of enhancing transparency and fostering innovation across the European domain landscape. more
Secretary Clinton's major address on internet freedom made the connection between humanity and technology. We've been waiting a long time for our political leaders to have the courage to express thoughts like this, to have a vision about the role of the internet in human history, and yesterday the day arrived. The speech wasn't an isolated event, of course. more
How do you achieve excellence in the cloud? Enterprises know it's not enough to simply locate and leverage the services of a cloud provider: using cloud resources effectively marks the difference between "adequate" and "excellence" in achieving long-term IT and revenue goals. But to maximize cloud use, you need to know what's next for this disruptive market: here are four emerging techniques. more
The level of interest in the general topic of routing security seems to come in waves in our community. At times it seems like the interest from network operators, researchers, security folk and vendors climbs to an intense level, while at other times the topic appears to be moribund. If the attention on this topic at NANOG 74 is anything to go by we seem to be experiencing a local peak. more
There is no doubt that LTE is going to take a prime position in broadband developments. With competitively priced services, innovative smartphones and an increasing range of very innovative apps this market is set to continue to boom. So how will all this impact the overall broadband market? ...this is not an 'us or them' issue between fixed and mobile broadband. As a matter of fact, the companies that are rolling out LTE are increasingly dependent on deep fibre rollouts as they need to handle massive amounts of data, to which the mobile infrastructure technology is not well-suited. more
I first became familiar with DNSSEC around 2002 when it was a feature of the Bind9 server, which I was using to setup a new authoritative DNS platform for customers of the ISP I was working for. I looked at it briefly, decided it was too complex and not worth investigating. A couple of years later a domain of a customer got poisoned in another ISPs network. And while the DNS service we provided was working properly, the customers impression was we hadn't protected them. more
The security of the global Default Free Zone (DFZ) has been a topic of much debate and concern for the last twenty years (or more). Two recent papers have brought this issue to the surface once again - it is worth looking at what these two papers add to the mix of what is known, and what solutions might be available. The first of these traces the impact of Chinese "state actor" effects on BGP routing in recent years. more
I don't know about you, but I'm starting to think that DNSSEC being so hot these days is a mixed blessing. Yes, it's wonderful that after so many years there is finally broad consensus for making DNSSEC happen. But being so prominent also means the protocol is taking shots from those who don't want to make the necessary software, hardware and operational modifications needed. And DNSSEC has taken some shots from those who just want to be contrarian. more
Culminating a year-long policy development process, ICANN today launched its new Blocking Usage Review Panel (BURP). The BURP provides long-needed oversight over services that block Internet traffic. "While everyone understands that national laws such as the U.S. CAN SPAM define what traffic is or is not elegible to block, legal processes can be slow and cumbersome," said a spokeswoman. "Since the Internet is global and traffic often traverses multiple countries, the array of different laws cause uncertainty." more
My Pattishall colleagues Brett August, Bradley Cohn and Alexis Payne recently won another round in a closely watched lawsuit involving Google and others regarding allegedly unfair use of domain names. The plaintiffs had attempted to bring a class action against multiple defendants for purported trademark infringement, cybersquatting and deceptive trade practices. more
The Internet has provided an unprecedented number of opportunities while raising far-reaching legal issues. It has created a complex matrix of national laws, global circumstances and new definitions -- or, at least, definitions in progress. The turmoil over Brexit and the international implications of the EU General Data Protection Regulation are signs of the times; as are issues surrounding domain names. more
Over the last year the world has been virtually buried under news items describing hacks, insecure websites, servers and scada systems, etc. Each and every time people seem to be amazed and exclaim "How is this possible?" Politicians ask questions, there is a short lived uproar and soon after the world continues its business as usual. Till the next incident. In this blog post I take a step back and try to look at the cyber security issue from this angle... more