Keynote speaker, and noted security industry commentator, Bruce Schneier (Co3 Systems ) set the tone for the two days with a discussion on how humans name things and the shortcomings of computers in doing the same. Names require context, he observed, and "computers are really bad at this" because "everything defaults to global." Referring to the potential that new gTLDs could conflict with internal names in installed systems, he commented, "It would be great if we could go back 20 years and say 'Don't do that'," but concluded that policymakers have to work with DNS the way it is today. more
Earlier this week, I posted from Singapore on the challenges we face in designing the transition of IANA functions from the US government to the global multistakeholder community. Now, let's consider how a programmer would design new mechanisms to accomplish this transition. For starters, a programmer would need something more than high-level principles. Coding requires use cases for routine interaction and especially for cases where users don't follow the expected routine and where the real world intervenes with inconvenient problems. more
Soon after capitulating to Comcast's surcharge demand for improved treatment of its traffic, Netflix got better downstream delivery speeds. Apparently Comcast did not have to undertake a major bandwidth expansion program. Much to the immediate relief of Netflix, Comcast merely needed to allocate more ports for Netflix traffic. So with a reallocation of available bandwidth, Comcast solved Netflix's quality of service dilemma apparently without degrading service to anyone else, upstream or downstream. more
Proper, transparent, accountable U.S. NTIA's Transition of its oversight of the Internet to something other than a single country oversight is something I have always believed in and spoke and written about repeatedly for years and is long overdue. But NTIA's March 14th declared intent to transfer "Key" Internet roles is not only very ambiguous but leads to new questions and concerns that must be answered before anything starts taking place. more
U.S. Commerce Department's National Telecommunications and Information Administration (NTIA) took a historic step today announcing "its intent to transition key Internet domain name functions to the global multistakeholder community." more
Today the full original name of the World Wide Web is being seen everywhere as people all around the world join together to celebrate the 25th anniversary of the proposal that Tim Berners-Lee submitted at CERN that led to the creation of the "Web" we have today. While many of our articles here on CircleID focus more on the underlying Internet infrastructure that makes the Web possible, it's good to take a moment to reflect on - and celebrate - the amazing evolution of the Web from those very early days! more
John Yunker reporting in Global by Design: "Google has gone live with one if its many Internationalized Domain Names (IDNs): ???. I want to emphasize here that this is a top-level IDN - that is, the equivalent of a .com or .org. This TLD, according to Google, stands for 'everyone.' So you could in effect register 'someword.everyone,' which sounds a bit odd to me but I'm not Japanese. And, frankly, the Japanese have not been blessed with much in the way of IDN options up to this point." more
On Feb. 7, 2014 Dr. Stephen Crocker, the Chair of the ICANN Board of Directors, wrote to Asia Green IT System (AGIT), a Turkish company which applied for .Islam and .Halal, conveying ICANN's latest position on these two applications. The letter is deeply flawed, and shows how ICANN's handling of the .Islam and .Halal applications is at once an egregious assault on the new gTLD program rules, and a betrayal of whatever trust Muslims around the world might have had in ICANN. more
A concrete plinth was lain at the foundation of durable Enhanced Cooperation this week when ISOC unveiled its IXP toolkit and portal. In simple English (which no doubt will be expanded to other languages) the soft launch modestly seeks feedback, corrections, and further input to the already pithy and instructive content. More to the point, this resource responds to one of the principle demands of those who do not recognize themselves in the multistakeholder model: how do we get our own IXP? more
Donuts is an applicant that threw the entire domain name industry into uproar due to the number of applications it submitted: 307 in total. It is hardly surprising that whenever new gTLDs are mentioned in the media that Donuts are mentioned alongside due to shear number of applications that they have submitted. There are dozens of articles in the media mixing information and opinions about Donuts. Often, they address the benefits to those registrants who are excited about the possibility of acquiring a new domain name and the threats to those who have an existing .COM domain name portfolio. more
I was told recently that I should register the domain "calzone.pizza" as soon as it becomes available, even though our start-up has nothing to do with food. This is a question that a lot of businesses may be facing as they become aware of the new dots that are becoming available, like .club, .nyc and .guru. Should businesses spend money and grab their brand in all of the new domain extensions to prevent potential customer confusion, or worse - cybersquatting or phishing of their brand on the internet? What if your brand can have multiple meanings? more
In a recent video interview conducted while he attended the World Economic Summit in Davos, Switzerland, ICANN CEO Fadi Chehade stated "legitimacy comes from accountability". That statement is correct. It is also troubling, in that many of ICANN's recent policies and activities raise serious questions regarding whether it is sufficiently accountable and therefore perceived as acting in a legitimate manner - as well as whether it is continuing to faithfully abide by the Affirmation of Commitments (AOC) it entered into when the US government terminated direct oversight of ICANN in 2009. more
There may still be a few security practitioners working in the field who didn't have a copy of Bruce Schneier's Applied Cryptography on their bookshelf the day they started their careers. Bruce's practical guide to cryptographic algorithms, key management techniques and security protocols, first published in 1993, was a landmark volume for the newly emerging field, and has been a reference to developers ever since. more
IPv6 adoption continues to gain ground at a slow pace. This is to be expected. The complications associated with hardware and software upgrades, as well as the lack of reachable content, means that IPv4 is still king of the hill. To me, this situation seems to mirror one a few years back with web browsers. Sometime around the turn of the century, Internet Explorer became the dominant browser. Riding on a 90% market share for Windows, the incumbent - Netscape Navigator - did not stand a chance. However, with it came a dark age for web developers. more
By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet's wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, the decision to put all smartness at the edge means we're at the mercy of scale when it comes to the quality of the Internet's aggregate traffic load. Not all device and software builders have the skills - and the quality assurance budgets - that something the size of the Internet deserves. more