/ Most Viewed

Spamhaus Policy Block List Update

Recently, I wrote about the Spamhaus Policy Block List (PBL), suggesting senders encourage their network/connectivity service providers (whomever they lease or purchase IP addresses from) to list their illegitimate email-sending IPs as a step towards improving the overall email stream on the internet. The initial PBL was seeded with listings from the Dynablock NJABL ("Not Just Another Bogus List"), which at the time of the cut-over was at more than 1.9 million entries... more

The Risk Factors of CDNs and Centrality

On the afternoon of June 17 of this year, there was a widespread outage of online services. In Australia, it impacted three of the country's largest banks, the national postal service, the country's reserve bank, and one airline operator. Further afield from Australia, the outage impacted the Hong Kong Stock Exchange and some US airlines. The roll call of affected services appeared to reach some 500 serv more

New Regime for Registration of .fr

Association Francaise pour le Nommage Internet en Cooperation ("AFNIC"), the domain name authority managing the French country code top level domain, is introducing a new regime for registration of .fr domain names. Among the main changes, the new regime abolishes any "right to the name". Until now an applicant for registration of a .fr domain name must prove that the domain name reflects its company name, business name or trade mark that is in force in France. more

DNS Resolvers and DNSSEC: Roll Over and Die?

Security is great when all the green lights are shining brightly and everything validates as intended, but what happens when you encounter failure? In this work we examine the behaviour of the DNS when security, in the form of DNSSEC is added, and we look at what happens when things do not happen as intended. What triggered this examination was a sudden increase in the traffic generated by secondary servers for the in-addr.arpa reverse zones in December 2009. more

Domain Name Hijacking Affects Local Illinois Campaign in Will County

We've previously noted here the challenge of dealing with domain name disputes based on personal names, particularly in the political arena. Now that the campaigns are over and all are taking a deep breath, we can reflect back on one of the domain name disputes arising in the political campaign this year for the office of State's Attorney in Will County Illinois. more

A Voting System for Internet by Domain Name Owners - Part I

This is the first part of a 2-part series article describing a method for voting among owners of domain names.

The primary intended use for this is to allow identifiable participants in the domain name system to vote on matters that affect the whole domain name system in an easy (and easily-verifiable) fashion. The method for voting is specifying a string in the whois data for a domain name. more

A Tale of Two Governance Models

As many of us in the Internet community gear up for the ICANN meeting in Colombia next week, it's important to remember that not everybody embraces the multi-stakeholder approach that we've gradually learned to love. Just a month ago, a group with a very different vision of how to run things wrapped up their own Internet governance meeting in Latin America. Their meeting was three times as long and accomplished about a third as much, but they'd still like to see their model replace the ICANN model. more

Plutocrats and the Internet

The new month visits on us a new attempt to control the Internet; the UN's specialized agency, the International Telecommunication Union (ITU), is holding its quadrennial plenipotentiary meeting in Guadalajara, Jalisco this week. The governments assembled there are considering a few proposals that can best be described as piquant. more

Soon in a Mail Box Near You: Internationalized Email Addresses

The EAI working group of the IETF has finished (part of) its work on the interationalization of email addresses. This, together with Internationalized Domain Names (IDN) will make it possible to send email messages to non-7 bit ASCII addresses... There are 3 RFCs, covering changes to the SMTP protocol, e-mail message format and delivery Status Notifications. more

Is ICANN Stumbling Forward? GAC Advice and Shared Decision Making Procedures

When Bill Clinton addresses the 40th ICANN meeting in San Francisco in March 2010 he described Internet Governance as a process of "stumbling forward". Stumbling is good, he said, as long as it goes forward. Five ICANN meetings later - in the meantime ICANN adopted the new gTLD program, got nearly 2000 applications for Top Level Domains (TLDs) and has a new CEO - the "stumbling forward" goes into the next round. more

Stopping SOPA’s Anti-Circumvention

The House's Stop Online Piracy Act is in Judiciary Committee Markup today. As numerous protests, open letters, and advocacy campaigns across the Web, this is a seriously flawed bill. Sen. Ron Wyden and Rep. Darrell Issa's proposed OPEN Act points out, by contrast, some of the procedural problems. Here, I analyze just one of the problematic provisions of SOPA: a new"anticircumvention" provision more

Policies to Promote Broadband Access in Developing Countries

In the 2014 Istanbul-Turkey IGF workshop on policies to promote broadband access in developing countries organised by Rui ZHONG of ISOC China, we realized that while technological solutions are advancing rapidly, policy and regulations remain a significant barrier to affordable internet especially in the developing world. According to a report by Alliance for Affordable Internet ( A4AI), the key to affordability is the policy and regulatory environment that shapes the different actors in the market. more

U.S. Military Is Buying Location Data of People Around the World Through Ordinary Apps

The U.S. military is buying the granular movement data of ordinary people worldwide, harvested from innocuous-seeming apps, reports Motherboard. Among the apps connected to this type of data sale is a Muslim prayer and Quran app with more than 98 million downloads worldwide. more

DNSSEC Takes Off in Wake of Root Zone Signing

The Domain Name System Security Extensions (DNSSEC) is a suite of IETF-developed specifications designed to validate information provided by the Domain Name System (DNS). ... When the root zone was signed in June 2010, this acted as a catalyst for TLD operators to deploy DNSSEC on their side. We have seen a gradual but significant increase in signed TLDs since then. The map in this post shows the level of DNSSEC deployment in Europe. more

International Law and Cyberspace: It’s the “How”, Stupid

The Internet has enhanced freedom of communication, ignored national borders, and removed time and space barriers. But the Internet sphere was never a law-free zone. Already ICANN's "Articles of Incorporation" (1998) constituted that the management of critical Internet resources has to take place within the frameworks of "applicable national and international law". more