A few months ago, I made a post about IPv6 security. I've caught some flak for saying that IPv6 isn't a security issue. I still stand by this position. This is not to say that you should ignore security considerations when deploying IPv6. All I claim is that deploying IPv6 in and of itself does not make an organization any more or less secure. This point was made by Dr. Joe St. Sauver, of the University of Oregon... more
USA-Canada World Championship hockey games never fail to elicit great excitement. In the IPv6 adoption world league however, the US seems to have a convincing lead over their northern neighbour but the game is not over yet, here come the Canucks. Internet evolution, and IPv6 in particular, were the major themes at the ISACC (ICT Standards Advisory Council of Canada) Plenary meeting in Ottawa mid April... more
Four senators (Rockefeller, Bayh, Nelson, and Snowe) have recently introduced S.773, the Cybersecurity Act of 2009. While there are some good parts to the bill, many of the substantive provisions are poorly thought out at best. The bill attempts to solve non-problems, and to assume that research results can be commanded into being by virtue of an act of Congress. Beyond that, there are parts of the bill whose purpose is mysterious, or whose content bears no relation to its title. more
In Europe yet another package is discussed, and it includes issues related to what I guess one could call Network Neutrality. And, as usual, at the end of the game, texts are negotiated that does not have much meaning in reality. Negotiations on what words imply, while I as an engineer have absolutely no idea what either of the parties actually mean... more
As founder and CTO of Ellacoya Networks, a pioneer in Deep Packet Inspection (DPI), and now having spent the last year at Arbor Networks, a pioneer in network-based security, I have witnessed first hand the evolution of DPI. It has evolved from a niche traffic management technology to an integrated service delivery platform. Once relegated to the dark corners of the central office, DPI has become the network element that enables subscriber opt-in for new services, transparency of traffic usage and quotas, fairness during peak busy hours and protection from denial of service attacks, all the while protecting and maintaining the privacy of broadband users. Yet, DPI still gets a bad rap... more
A Tipping Point for the Internet? Catching the precise moment of a tectonic shift in a global system as large and important as the Internet may be viewed as an exercise in the improbable. However, I point out in this summary that I think we are precisely in the midst of such a shift... more
This very interesting document was released by ICANN's Generic Names Supporting Organization (GNSO) for public comment yesterday. And it asks some fundamental questions while at the same time pointing to sources such as the Honeynet Alliance's reports on fast flux. more
The beginning of the year saw IPv6 added to the DNS root, closing a major hole for IPv6-only communication. In mid-year, the US federal government's IPv6 mandate came into effect, requiring all federal IP backbones to support IPv6. While the mandate didn't have anywhere near the effect that many had hoped for, it did spur many vendors to add IPv6 support to their products. The amount of observed IPv6 traffic increased considerably, but we still lack good data for how much IPv6 is being used. So, where were we at the end of 2008? more
With all the focus on neutrality in the provider networks we must not lose sight of what is happening in our own homes. As with some of the efforts to make the networks work better (as measured in the providers' paternalistic) view, their attempt to retake the home is about serving us better by reducing the operators' costs. "Better" is of course in terms of the operator's own measures. It's not quite the same as in 1995 when providers opposed home networks and want to charge us for each machine... more
It is sometimes said that: 'IP addresses are hoarded by "developed nations" - if only "underdeveloped" nations were given more IP addresses, the Internet would grow more/better...' Assertions like this mistakenly conflate the administrative process of requesting and receiving public IP addresses with the economic or commercial act of routing IP addresses - of engaging in what is sometimes called "Internet production." The former, administrative process involves relatively little in the way of overhead, and confers nothing more than the potential to develop public Internet resources -- i.e., to create new Internet users (provide access) and/or Internet uses (provide content and other online services). more
The end of the year is approaching which seems to be a harbinger of Internet disasters. Four years ago (on 24 Dec. 2004), TTNet significantly disrupted Internet traffic by leaking over 100,000 networks that were globally routed for about an hour. Two years ago (on 26 Dec. 2006), large earthquakes hit the Luzon Strait, south of Taiwan, severing several underwater cables and wreaking havoc on communications in the region. Last year there was a small delay. On 30 Jan. 2008, more underwater cables were severed in the Mediterranean, severely disrupting communications in the Middle East, Africa, and the Indian subcontinent. Calamity returned to its customary end-of-year schedule this year, when early today (19 Dec. 2008) several communications cables were severed, affecting traffic in the Middle East and Indian subcontinent. more
In a highly anticipated presentation, Internet security researcher Dan Kaminsky today gave details of the much talked about Domain Name System (DNS) vulnerability issue which has been intensely covered since it was publicly announced a month ago on Jul 8th. Although original plans entailed keeping the bug details undisclosed for 30 days in order to allow for necessary security patches to be implemented around the world, details of the bug were eventually leaked-and-confirmed 13 days after its public announcement. Even so, just hours ago in jam-packed ballroom during the Black Hat conference, Kaminsky delivered his 100-plus-slide presentation detailing the DNS flaw that, if exploited, could potentially "destroy the Web". more
The internet bus continues to accelerate straight into the IPv4 address depletion wall with spirited discussions continuing on how to divvy up the remnants of the address space. Obviously all five Regional Internet Registries (RIR's) want to make sure they get their fair share from IANA but what is a fair share remains the subject of interpretation. In the mean time, scenarios of a speculative land rush and auctions of ever smaller address blocks abound with unattractive consequences such as an explosion of the size of the routing table and a stunted growth of the global internet economy... In the meantime, the airline industry completed a rather significant migration of their own... more
The folks at Renesys pointed out earlier this week some interesting activity surrounding the L-root name server, highlighting some activity that should give us all yet another reason to be concerned about the security and integrity of the Internet DNS... considering that a great deal of malware today tends to corrupt the DNS resolution path in order to further exploit compromised end-systems, and that corruption, or any other actual end-system compromise, might well be unnecessary if the root were compromised -- well, think of the possibilities! more
I've posted to SSRN my paper on why most telecom companies, even though they operate networks, don't appreciate the fundamental business dynamics of network structures. This will be a chapter in a book Wharton is publishing on network-based strategies and competencies. In the paper, I describe two views on telecom and Internet infrastructure... more