Any new top level domain approved for the Internet will have to be more than just a single label. ICANN's new gTLD program committee (NGPC) has decided to ban the use of "dotless domains". TLD operators that had planned to use their new suffix as a keyword, i.e. just the string and nothing else, will now have to reconsider. more
We at Innovative Auctions were happy to see the successful completion of the second Applicant Auction earlier today. Winners will pay a total of $9,651,000 to resolve contention for eight new generic top-level domains (gTLDs). The winners for the eight contention sets included in this week's auction were... more
Gregory S. Shatan of Reed Smith writes: "Last week, ICANN (the organization that oversees the domain name system of the Internet) was busy with nothing less than the security and stability of the Internet. At ICANN's recent meeting in Durban, those of us attending heard a drumbeat of studies, presentations and concerns regarding "name collisions": the conflicts that will arise when new gTLDs go live and conflict with existing top-level extensions in private networks..." more
If early International Centre for Dispute Resolution decisions are anything to go by, as far as dispute resolution panellists are concerned, singular and plural versions of the same string do not risk causing user confusion. Tasked with handling string confusion objections under the new gTLD program, the ICDR has just rejected an objection by Google against Donuts' application for .CARS. Google has applied for .CAR. more
Michael Berkens reporting in TheDomains.com blog reports: National Association of Secretaries of State (NASS) is an organization whose members include Secretaries of State and Lieutenant Governors of the 50 U.S. states and territories send a letter to ICANN in late July that was just published today, that the new gTLD's .INC, .LLC, .CORP and .LLP.should only be allowed to be registered by 'entities that are appropriately registered and in good-standing with the Secretary of State or other appropriate state agency." more
The 87th meeting of the Internet Engineering Task Force (IETF) in Berlin, Germany, concluded on August 2, 2013. IETF Chair Jari Arkko recently published his summary of IETF 87 on the IETF Blog highlighting what he felt were some of the more important aspects of what was a very successful IETF meeting. I also had the privilege of interviewing Jari on video about the meeting. more
The IETF WEIRDS working group is defining a follow-on to WHOIS. Since this is the IETF, it's working on the technical issues about which it can deal with, not policy which is up to ICANN and the country registries. Somewhat to my surprise, the group is making steady progress. We've agreed that the basic model is RESTful, with queries via http, and responses as JSON data structures. The protocol is named RDAP for Registration Data Access Protocol, or maybe RESTful Data Access protocol. more
The future of broadband was the main focus of The Independent Show 2013. In particular, the event highlighted how the convergence of video, phone, Internet, and wireless broadband is shaping the industry. As with previous years, the show focused strongly on the programming community and there was no shortage of new, emerging programming to keep attendees interested. One of the breakout sessions focused on the growth of high-quality over-the-top (OTT) content distribution and how NCTC members could take advantage of this trend to target subscribers drifting away from traditional cable. more
Something bad happens online. I can tie that something-bad back to an IP address. Do I know who did the bad thing? According to the Federal District Court in Arizona, I don't. An IP address may identify the owner of an Internet access account; it does not identify who was online at that particular time and who may be responsible for the actions in question. In Breaking Glass Pictures v Does, DAZ 2013, Plaintiff brought a claim for copyright infringement, wants early discovery, but the court is refusing. more
Throughout this series of blog posts we've discussed a number of issues related to security, stability, and resilience of the DNS ecosystem, particularly as we approach the rollout of new gTLDs. Additionally, we highlighted a number of issues that we believe are outstanding and need to be resolved before the safe introduction of new gTLDs can occur - and we tried to provide some context as to why, all the while continuously highlighting that nearly all of these unresolved recommendations came from parties in addition to Verisign over the last several years. more
Most people - mistakenly - believe that they are perfectly safe behind a firewall, network address translation (NAT) device or proxy. The fact is quite the opposite: if you can get out of your network, someone else can get in. Attackers often seek to compromise the weakest link in a network and then use that access to attack the network from the inside, commonly known as a "pivot-and-attack." more
The Internet Society Board of Trustees during its meeting in Berlin, Germany today called on the global Internet community to stand together in support of open Internet access, freedom, and privacy. Recently exposed information about government Internet surveillance programs is a wake-up call for Internet users everywhere -- the fundamental ideals of the Internet are under threat. The Internet Society Board of Trustees believes that government Internet surveillance programs create unacceptable risks for the future of a global, interoperable, and open Internet. more
My blog 'What PRISM, credit card hacking and Chromecast have to do with FttH' led to some very interesting discussions all around the world. One of issues that was discussed was that the sheer capacity of FttH will also allow hackers, criminals and others to use that massive capacity for the wrong reasons. Its volume will make it increasingly difficult to police. more
The Internet Society today announced the launch of a survey to gain greater insights into multistakeholder governance perceptions and processes at all levels - national, regional, and international. The questionnaire is open to all interested participants and is available until 30 September 2013. The survey is one component of the Internet Society's broader initiative focused on the open and sustainable Internet. more
The world of Internet threats has changed continually over the years. From the time that a "worm" first showed up in the wild, or whenever someone penetrated a system without authorization for the first time, various forms of attacks and malware have presented dangers to the system and those who use it. Different vectors have received varied focus over the years... Many parts of the Internet community have been involved in addressing relevant issues and fostering efforts to combat them. more