It's not been the best of years for ICANN. Leaving aside for a few seconds the controversy about xxx, and the allegations of improper behavior about the .Net assignment, ICANN has had a lot to deal with. The troubles began with the UN Working Group on Internet Governance hell bent on fixing ICANN, even though ICANN says nothing is broke. That trouble remains and isn't likely to go away for some time. And then, just when it seemed that the UN and ITU was the cause of all ICANN's problems, the old ally, US Government's DOC, decided that it was going to be in charge of ICANN. ...This could be the beginnings of a distinct change where the centralized DNS as we know it gradually gives way to some next generation structure which is far more decentralized. The coming 12 months may see some significant changes in this area. more
I'm a network engineer, and like many engineers I often gravitate to the big projects; large networks with problems of scale and complexity in my case. However, I also consider myself a student of Occam's razor and often quote Antoine de Saint-Exupéry: "perfection is reached not when there is nothing left to add, but when there is nothing left to take away." In this spirit of "less is more" I have recently become intrigued by the problems appearing in home networking. more
2025 is not a banner year for the status quo. A fashion for deregulation, ignoring processes and questioning whatever was long-established is finding enough adherents that even things which work well are being upended. That's why those looking for leverage to use in hurried dealmaking, or countries with plans to rebalance where digital power lies, may find a handy tool in ICANN. more
In his article titled, "End of Life Announcement", John Walker (author of the Speak Freely application) makes a few arguments about Network Address Translation (NAT) that are simply not true: "There are powerful forces, including government, large media organisations, and music publishers who think this situation is just fine. In essence, every time a user--they love the word "consumer"--goes behind a NAT box, a site which was formerly a peer to their own sites goes dark, no longer accessible to others on the Internet, while their privileged sites remain. The lights are going out all over the Internet. ...It is irresponsible to encourage people to buy into a technology which will soon cease to work." more
The financial industry is all about pinstripe suits, excessive Excel sheets and boring data. Or is it? Financial markets are more colorful than their reputation: take a look at Bloomberg's or Reuters' sites, and you'll see that pork belly is as much an object of investment speculation as coffee, electricity, bananas, hides, or fishmeal. Recently, the universe of data available to financial analysts and investment bankers grew further, with the addition of the Internet Domain Name Index (IDNX) to leading financial data distributors Bloomberg (ticker symbol: IDNX <Index>) and Reuters (ticker symbol: .IDNX). more
Starting with Teledesic in 1990, would-be Low-Earth Orbit (LEO) satellite constellations have been justified to the FCC, other regulators, and the public as a means of closing the digital divide. Teledesic's goal was "providing affordable access to advanced network connections to all those parts of the world that will never get such advanced capabilities through existing technologies." Today's low-Earth Orbit (LEO) satellite companies make the same claim, but Telesat, OneWeb and Leosat seem to be targeting commercial markets first. more
Universal Acceptance is the topic of the moment, explained in one simple sentence: in the new gTLD world, it means that various groups (the DNS, ICANN and a few others) are working hard to make new domain names better accepted by the existing technical Internet infrastructure. A video extracted from the "ICANN 52" meeting explains it in 50 slides but I suggest a pause on slide 17, because it shows where the issues are and what remains to be fixed to give the ultimate answer to that question. more
In a video interview conducted during the NSCS ONE conference, Paul Vixie CEO of Farsight Security further discusses the topic of his presentation titled: "Defective by Design -- How the Internet's Openness is Slowly Poisoning Us". more
The DNSSEC is a security protocol for providing cryptographic assurance (i.e. using the public key cryptography digital signature technology) to the data retrieved from the DNS distributed database (RFC4033). DNSSEC deployment at the root is said to be subject to politics, but there is seldom detailed discussion about this "DNS root signing" politics. Actually, DNSSEC deployment requires more than signing the DNS root zone data; it also involves secure delegations from the root to the TLDs, and DNSSEC deployment by TLD administrations (I omit other participants involvement as my focus is policy around the DNS root). There is a dose of naivety in the idea of detailing the political aspects of the DNS root, but I volunteer! My perspective is an interested observer. more
When it comes to stealing domain names, I suspect that there are two reasons why so many web bandits appear to be immune from ICANN (the Internet Corporation for Assigned Names and Numbers uses the acronym ICANN): the first reason I discussed in my last column on domain name theft (where I described a substantive void in domain name "regulation" as a primary factor for the increasing incidence of domain name theft), the second reason, which is the focus of this column, is the procedural anomaly that currently infuses ICANN's uniform dispute resolution process (UDRP) by providing no administrative forum for domain name registrants who become victims of domain name theft carried out by ICANN's registrars. more
Netflix has become the largest source of Internet traffic in North America, according Sandvine's Spring 2011 Global Internet Phenomena Report. Company further reports that currently, Real-Time Entertainment applications consume 49.2% of peak aggregate traffic, up from 29.5% in 2009 -- a 60% increase [see figture]. Sandvine forecasts that the Real-Time Entertainment category will represent 55-60% of peak aggregate traffic by the end of 2011. more
Iran's political filtering during the recent 2009 presidential campaign and the role of the Internet in the post-election turmoil has brought a heightened level of attention to the country's Internet filtering system. According to a status report just updated by the OpenNet Initiative, the Internet censorship system in Iran has become one of the most comprehensive and sophisticated in the world. Iran and China are the only countries that aggressively filter the Internet using their own technology. Iran's aggressive filtering measures "have contributed to the implementation of a centralized filtering strategy and a reduced reliance on Western technologies," says OpenNet. more
In a recent article, eWeek reports on researchers at Microsoft revealing large-scale, typo-squatting schemes that use "multi-layer URL redirection to game Google's AdSense for domains program". According to this report, the Microsoft Research Systems Management Research Group succeeded in tracking a ring of typo-squatters registering misspelled domain names that generated traffic for serving advertising from Google. more
In the second part of this 3-part series article, the issue of UDRP in proving bad-faith domain registrations is examined with respect to the trademark's characteristics. The first part of this article can be found here. In assessing whether there is a passive holding of a domain name, panels look carefully into the trademark's characteristics in question, namely what is the degree of reputation and distinctiveness of the trademark in question. more
The Mirai DDOS attack happened just over a year ago, on the 21st October 2016. The attack was certainly a major landmark regarding the sorry history of "landmark" DDOS attacks on the Internet. It's up there with the Morris Worm of 1988, Slammer of 2002, Sapphine/Slammer of 2009 and of course Conficker in 2008. What made the Mirai attack so special? more