It is almost 25 years since the Internet was privatized by the U.S. government. ICANN was formed by Esther Dyson and Jon Postel as a California-based non-profit with the responsibility to administer the Internet. However, the U.S. government retained limited control, primarily through the Internet Assigned Numbers Authority (IANA). It was the revelations, in 2013, of highly classified National Security Agency (NSA) documents by Edward Snowden that sparked global concerns over the U.S. dominance of the Internet. more
Internet users are willing to navigate to, use, and trust new web addresses that will be flooding the Internet later this year, and brand name websites will carry more weight with Internet users than generic sites. These are among the results of a public opinion survey commissioned by FairWinds Partners. The poll also found that the owners and operators of these new addresses should be technically prepared or risk driving away or losing traffic intended for their sites. more
The American University Washington College of Law announced it will be hosting a fireside chat on the sale of the Public Interest Registry (PIR) to the private equity firm Ethos Capital. more
For quite a while, it looked like my prediction – one to two articles per day – was overly optimistic. By summer, there were only four new sites: Reed College, University of Oklahoma (at least, I think that that's what uucp node uok is), vax135, another Bell Labs machine – and, cruciallyy, U.C. Berkeley, which had a uucp connection to Bell Labs Research and was on the ARPANET. more
It would be one of the ironies of global technology development that the West has effectively so far followed a Jugaad principle of "good enough" innovation for DNS security, whereas India could well embrace all the latest advances in DNS security as its Internet economy grows. Like most other protocols from the early Internet, the DNS protocol was not designed with security built in. For those protocols, security services were typically either implemented at a different layer of the protocol stack, or were added on later. more
To the annoyance of some, surely, the issue of abuse in the domain name system (DNS) has been high on the list of critical issues in internet governance circles. Personally, in my more than 20 years of internet governance experience, tackling DNS abuse is one of the more important issues I've participated in and seen debated. Despite this intense scrutiny, common-sense solutions (such as contract improvements) have been so far elusive, even as they fall squarely within its ICANN's remit. more
To those of us who have worked on crypto policy, the 1990s have become known as the Crypto Wars. The US government tried hard to control civilian use of cryptography. They tried to discourage academic research, restricted exports of cryptographic software, and -- most memorably -- pushed something called "escrowed encryption", a scheme wherein the government would have access to the short-term keys used to encrypt communications or stored files. more
While many were expecting a decision of strict Registry/Registrar separation, in an unexpected ruling, it was announced that ICANN will not restrict cross-ownership between Registries and Registrars. While the current set of agreements prohibits Registries from acquiring Registrars, they do not prohibit Registrars from applying for or operating TLDs. The Board Resolutions also made note of the fact that while individually negotiated contracts have included restrictions on Registry ownership of Registrars, cross-ownership provisions have varied over time and no formal "policy" on this topic has ever been recommended by the GNSO or adopted by ICANN. more
The next few short weeks in the run-up to ICANN's Cartagena meeting could prove the most important time yet for the organization to show that it is a credible and capable overseer of the domain name system. After over two years of delays, tens of thousands of email exchanges, weeks of heated face-to-face discussions, and many millions of accumulated frequent flier miles, the time has arrived for ICANN to finally draw a line under the new top-level domain policy-development process and name the date for the opening of the first-round application window. more
David Redl, head of U.S. Commerce Department's National Telecommunications and Information Administration (NTIA) resigned abruptly from his position on Thursday. more
With the latest "DNSpionage" attack, ICANN astutely prompted domain name holders to fully deploy DNSSEC on their names. Afilias absolutely supports this and encourages the same. In this post, I remind you of why DNSSEC is important and our continued role. Afilias has a long history in the development and advocacy of DNSSEC. In 2007, we partnered with Public Interest Registry to help found dnssec-deployment.org. more
Coalition Against Domain Name Abuse, the lobby group that campaigned for stronger cybersquatting laws and against new gTLDs, is back. more
Two miles (and a short Tube ride) from where ICANN is gathering in London, rests an original copy of the Magna Carta, which introduced the concept of imposing limits on the powers of the king. I'm taking the proximity of this icon of constitutional history as a good omen for our task: to create a charter to limit ICANN's powers and enhance its accountability, in the wake of the U.S. Government's decision to terminate its legacy role. more
Neustar has sent the following letter to ICANN. Neustar sent the letter to urge caution to ICANN before launching the batching process to promote competition and choice for consumers in a fair and balanced manner... "Neustar has long been an advocate for the introduction of new generic top level domains. Given the long and sometimes arduous road the ICANN community has traveled to get to this point in the process, we are understandably anxious to avoid unnecessary delay in the launch of new gTLDS." more
When it comes to the problem of outbound spam, one of the experiences that I have, and this was reaffirmed at TechEd, is that the number one source of compromised accounts are educational institutions. That is to say, whenever we have an outbound spam problem and have to hunt down where it is coming from, the highest number of these accounts are phished accounts/credentials from users at an educational institution. Why is this? Why does so much spam originate from universities? more