I just discovered that VeriSign's SiteFinder Web site is leaking data submitted in Web forms to its marketing analysis partner, Omniture. Forms can easily contain personal information such as an email address. For the problem to occur, a Web form must use the GET method. This data spill problem occurs if a Web page anywhere on the Internet submits a Web form to an action URL with a misspelled or expired domain name. Because of VeriSign's recent controversial changes to the DNS system, this form data is submitted to the SiteFinder Web site. more
The recent announcement in eWeek titled "Feds Won't Let Go of Internet DNS" (slashdotted here) has some major internet policy implications. The short, careful wording appears to be more of a threat to ICANN than a power grab. In short, the US Department of Commerce's (DOC) National Telecommunications and Information Administration (NTIA) announced that it was not going to stop overseeing ICANN's changes to the DNS root. ...Of course, they have done next to nothing to support DNSSEC or other proposal for securing the DNS, but it sounds reassuring. The last sentence shows that the Bush administration shares the Clinton administration's lack of understanding of how the internet should evolve... more
This growth is clearly unsustainable within the IPv4 address space. Not every country can have these utilization levels. The hunger for new addresses is greatest in China (currently at 1 IPv4 address per 4 inhabitants) and India (1 address per 53 inhabitants). To put these at the modest level of 1 address per inhabitant requires more than 2.2 billion addresses, where there are currently only 290 million left... Given these numbers and the overall strong growth, any hopes of being able to reuse space that is allocated but not used (i.e. pre-CIDR) are futile. This demand dwarfs the entire US allocation. more
What would duopoly providers of internet access really like to have? They'd really like to be paid for providing non-commodity services. They'd really like to be rewarded for running the network, top to bottom. "But that's not possible," you say. No provider can tell one packet from another. Providers can only block the ports used by applications they don't like, and that's a clumsy, unwinnable arms race. The applications can always switch to common and useful ports, and no provider wants to alienate its subscriber base. But what if providers could inspect the contents of packets, without using too much computational power, and discriminate among applications? "Naah," you say. "They can't possibly do that."... more
Cities are among the largest regional authorities and natural human communities we know. Of course there are countries like China, India or the USA which count some hundred million or even a billion inhabitants. But there are also countries with far less than 100,000 inhabitants, like Tuvalu, Andorra or Barbados. If city communities are ranked by the number of inhabitants as independent entities among country communities, cities like Tokyo, New York, Shanghai or London head the ranking because they have more citizens than many countries. London for instance has more inhabitants than the Netherlands, and Tokyo outpaces Canada in that respect. Interestingly, there are only around 400 cities worldwide with more than 1 million inhabitants... The following post will give an overview of how cities are being identified on the Internet via Top-Level Domains and the opportunities that lay ahead. more
Nominet has published a very detailed and comprehensive position paper on "front running". Although the paper is a mere 5 pages long it covers all the areas that the topic encompasses very well and is well worth a read. The topic of "front running" has received some publicity in the last few months. If you're not familiar with the concept Nominet's definition is helpful... more
For about the last two years, I was a member of ICANN's At Large Advisory Commitee (ALAC), the group charged with representing the interests of ordinary Internet users within ICANN. In case anyone is wondering, here's why I'm not on the ALAC any more. ICANN has a very narrow mission. They maintain the root zone, the list of top-level domain names in the Internet's domain name system. They coordinate numeric IP addresses, with the real work delegated to five Regional Internet Registries. And they keep track of some simple and uncontroversial technical parameters for Internet routing applications... more
Ah yes, 'Security by obscurity': "Many people believe that 'security through obscurity' is flawed because... secrets are hard to keep." I'm glad the guys guarding the A Root Servers are up on the latest security trends. Of course, you could hide the A Root Servers at the heart of the Minotaur's maze, but they're still going to be "right over there" in cyberspace, at 198.41.0.29 more
The U.S. government has announced today that it will indefinitely retain oversight of the Internet's root servers, ignoring pervious calls by some countries to turn the function over to an international body. more
On October 16, 2003, VeriSign announced the sale of its Network Solutions (NSI) business unit three years after its purchase from SAIC. This is a report on the historical snapshot of Network Solutions and a collection of commentaries made in response to this event...Network Solutions, Inc. was founded by Emmit J. McHenry as a joint venture with the National Science Foundation and AT&T... more
The new organization called Coalition for ICANN Transparency (CFIT) has filed a lawsuit against ICANN and VeriSign in order to stop implementation of the proposed .com registry agreement. According to its description, "CFIT is a not-for-profit Delaware corporation based in Washington, D.C. CFIT’s supporters include individuals, organizations, institutions and companies who are committed to the core principles on which ICANN, the internet governing body is founded." more
The following is an analysis based on the hypothesis that trademark holders are not, in general, registering their trademarks as domain names across the existing top-level domain namespace. To determine if the hypothesis is true, we examine domain names registered in the popular generic top-level domains ("gTLDs" such as .com, .net and .info), also using other publicly available information such as the USPTO database of trademarks, the English dictionary, DNS entries, UDRP records and whois records. more
The evolution of the internet is anchored in the phenomenon of new technologies replacing their older counterparts. But technology evolution can be just as much about building upon what is already in place, as it is about tearing down past innovations. Indeed, the emergence of cloud computing has been powered by extending an unlikely underlying component: the more than 30-year-old global Domain Name System (DNS). more
As attack vectors go, very few are as significant as obtaining the ability to insert bespoke code in to an application and have it automatically execute upon "inaccessible" backend systems. In the Web application arena, SQL Injection vulnerabilities are often the scariest threat that developers and system administrators come face to face with (albeit way too regularly). more
In the beginning there was silence; then, silence begat communication, and communication begat more communication and, ultimately, group communication formed and begat a primordial "network" of communication that gradually and inevitably increased in effectiveness and complexity: there were only signal fires at first but, then, there were cave drawings, carrier pigeons, shouting from hill-tops, smoke from fire, lines of cannon fire, the telegraph, Alexander Graham Bell, and, finally, the network of networks known as the Internet. But, is that it? Is there not something more impressive in its impact upon communication than the Internet? What more might one desire than the dynamic wonders of the Internet, you ask? Well, what about ENUM? "E-What!?" more