Recent collaborative test by Core Competence and Nominet have concluded that 75% of common residential and small SOHO routers and firewall devices used with broadband services do not operate with full DNSSEC compatibility "out of the box". The report presents and analyzes technical findings, their potential impact on DNSSEC use by broadband consumers, and implications for router/firewall manufacturers. Included in its recommendations, the report suggests that as vendors apply DNSSEC and other DNS security fixes to devices, consumers should be encouraged to upgrade to the latest firmware. more
A report broke today revealing hackers have successfully breached a German internet infrastructure firm that provides services to several large companies, including Ericsson, Leica, Toshiba, UniCredit, British Telecom, Hugo Boss, NH Hotel Group, Oracle, Airbus, Porsche, and Volkswagen. more
Resource Public Key Infrastructure (RPKI) is a method to secure internet routing traffic by cryptographically verifying routes. As we begin 2022, we look back at 2021 and see how the year saw another significant step towards its adoption. High-profile issues with the old trust-based model of Border Gateway Protocol, designed several decades ago, have shown the continued importance of protecting popular networks from mistakes or hackers. more
The Uniform Domain Name Dispute Resolution Policy (UDRP) is known as an inexpensive alternative to litigation (and that's true), but some proceedings can end up costing a trademark owner more than it may have expected. There are generally two additional types of expenses that can arise during the course of a UDRP proceeding: (1) extra filing fees for certain aspects of a case filed at the Forum, and (2) an increased filing fee if the domain name registrant wants a three-member panel to decide the case. more
Analysts at the Federal Reserve Bank of Atlanta looked at the long-term impact of working from home on the economy and ranked different parts of the economy on two factors related to working at home – the likelihood that an area will generate a lot of work-at-home opportunities, and the ability of an area to support a work-at-home economy. more
Recently, the Internet Corporation for Assigned Names and Numbers (ICANN) unveiled its Trademark Clearinghouse (TMCH), a tool it proposes will help fight trademark infringement relating to another of its new programs - generic top level domain (gTLD). As Lafeber describes, criticism of ICANN's gTLD program and subsequent TMCH database is mounting. Skeptics have noted that given the significant cost of registering a gTLD - the application fee is $185,000 and subsequent annual fees are $25,000 - the program appears to be solely a cash cow, without adding much value to Internet users. more
While Starlink dominates the low-Earth orbit internet race, rivals like OneWeb, Telesat, Amazon's Project Kuiper, and Europe's IRIS² are slowly building capacity, buoyed by geopolitical necessity, state support, and commercial partnerships. more
Would you be interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. The nominations deadline is Monday, February 4, 2019, at 15:00 UTC. There are three positions opening on the PIR Board. Directors will serve a 3-year term that begins mid-year 2019 and expires mid-year 2022. more
This is Part 4 of a series of articles published (here in CircleID) on the UDHR and human rights in the cyberspaces of the Internet Ecosystem. Here we discuss Articles 13-15 and touch on other topics such as the role of cyber governance, empowered digital citizenship, and whistleblowers. At this point in this series of articles on the UDHR in the digital age, it is useful to pause and remind ourselves of the purpose of this analysis. more
Doug Madory, Director of Internet Analysis at Dyn, is reporting that the Russian Internet traffic (including domestic traffic) was re-routed out of the country due to routing errors by China Telecom. more
What does authorized access mean? If an employee with authorized access to a computer system goes into that system, downloads company secrets, and hands that information over to the company's competitor, did that alleged misappropriation of company information constitute unauthorized access? This is no small question. If the access is unauthorized, the employee potentially violated the Computer Fraud and Abuse Act (CFAA) (the CFAA contains both criminal and civil causes of action). But courts get uncomfortable here. more
Do you have ideas about DNSSEC or DANE that you would like to share with the wider community? Have you created a new tool or service? Have you found a way to use DNSSEC to secure some other service? Do you have new statistics about the growth or usage of DNSSEC, DANE or other related technology? If so, and if you will be in Johannesburg, South Africa, for ICANN 59 in June 2017 (or can get there), please consider submitting a proposal to speak at the ICANN 59 DNSSEC Workshop! more
With more than 100 countries now involved in the rollout of FttH there is increased evidence that commercial demand exists for this infrastructure. In developed economies FttH demand will, over the next 5 years, grow to between 30%-50% of the population. Competition aimed at the top end of this market will trigger a broader rollout. A Bernstein study of Google's rollout of FttH in Kansas City concluded that the penetration measured by them was much higher than they had expected. more
The quest for new top-level domains took an important step last spring with 1,930 applications to ICANN. 755 of these applications, from 145 different parties, are under contention. ICANN has encouraged these applicants to resolve the contention among them, and has established a last-resort auction in the event agreements among applicants cannot be reached. Here I describe a private auction model, the Applicant Auction, which is an efficient, fair and transparent approach to resolve contentions. more
Who would think that so much could go wrong with something as seemingly innocent as a domain name? As cybercrime continues to evolve, causing devastating reputational and financial losses to businesses and organizations, web addresses are used as a weapon -- and it's not always easy to notice their many faces. In this article, let's take a look at the domain name crime landscape, discuss the current challenges investigators and legitimate registrants face, and talk about some useful techniques. more