/ Recently Commented

EFF Releases New Tool for Internet Users to Test ISP Interference

In light of today's FCC ruling against Comcast, Electronic Frontier Foundation (EFF) has released a software tool dubbed, "Switzerland," for internet users to check ISP interference of their connections. Fred von Lohmann, EFF Senior Intellectual Property Attorney says: "The sad truth is that the FCC is ill-equipped to detect ISPs interfering with your Internet connection. It's up to concerned Internet users to investigate possible network neutrality violations, and EFF's Switzerland software is designed to help with that effort. Comcast isn't the first, and certainly won't be the last, ISP to meddle surreptitiously with its subscribers' Internet communications for its own benefit." more

U.S. Intends to Remain in Full Control of Internet Root Zone, Says Letter from NTIA

In a letter sent by bureau of the U.S. Department of Commerce, National Telecommunications and Information Administration (NTIA) to ICANN, the department has made it clear that despite recent discussions in Paris meetings, the U.S. department intends to remain in full authority over the Internet root zonemore

Why We’ll Never Replace SMTP

An acquaintance asked whether there's been any progress in the oft-rumored project to come up with a more secure replacement for SMTP. Answer: No. Truly, spam isn't a technical problem, it's a social one. If we could figure out some way to make mail recipient networks and hosts willing to shun known bad actors, even at the cost of losing some real mail for a while until the bad actors cave, it would make vastly more difference than any possible technical changes. more

Cyber Threats Accelerate: 94% of Web Browser Exploits Occur Within 24 Hours of Disclosure

Today X-Force, IBM's security research and development arm, released its 2008 Midyear Trend Statistics report that indicates cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before. The new tools are being implemented on the Internet by organized criminal elements, and at the same time public exploit code published by researchers are putting more systems, databases and ultimately, people at risk of compromise. more

IPv6… Unstoppable Road to Hyperconnectivity: Blame It On Opiates!

Some think IPv6 with its myriad addresses will accelerate the evolution of a hyperconnected world. But could a world where everything and everybody is sensed, monitored, located, to augment our quasi real-time interaction with the world outside our little selves, lead to total dependency, if not to gradual stupidity of the human race? Not surprisingly, a favourite topic for (late night) Internet Conference bar discussions... more

Is This Only Sloppy Wording by ICANN?

So I wrote earlier that I though it was good stuff when ICANN released a paper on DNS Security. Yes, I think it was good this paper was released, and yes it points out correctly how important DNSSEC is. But, now when reading it in detail, I find two things that troubles me. And it has to do with management of .ARPA. A top level domain that is used for infrastructural purposes. Like IP-addresses and E.164 numbers... more

17 Countries to Reach 60% Household Broadband Penetration by 2012, Says New Study

Worldwide consumer broadband connections will grow from 323 million connections in 2007 to 499 million in 2012, according to latest research by Gartner. Worldwide consumer broadband connections penetrated 18 percent of households in 2007, and by 2012, households with a broadband connection are expected to reach 25 percent. Five countries exceeded 60 percent broadband penetration into the home in 2007; and, this is expected to grow to 17 countries by 2012. The five countries with broadband penetration into the home above 60 percent are Canada, Netherlands, Switzerland, South Korea and Hong Kong. more

US-CERT Says They Are Aware of DNS Exploit Code, Emphasizes Urgent Patching

The United States Computer Emergency Readiness Team (US-CERT) has acknowledged that they are aware of the publicly available exploit code for a cache poisoning vulnerability in common DNS implementations. US-CERT is re-emphasizing the urgency of patching vulnerable DNS systems. more

ICANN Releases Paper on Domain Name Security

Today ICANN releases a paper with the title "DNSSEC @ ICANN - Signing the root zone: A way forward toward operational readiness". The paper explains in more detail than earlier documents what ICANN view on signing of the root zone is. I think the key points mentioned in this paper are true, and in general, I think this document is a good read. It is not long, and summarizes what I would call the current view is. more

Open Web Foundation Launches to Push Data Portability

A new nonprofit organization called the Open Web Foundation (OWF) launched today with a mission to be an independent non-profit dedicated to the development and protection of open, non-proprietary specifications for web technologies. "The Open Web needs Open Data, Open Date needs Open Specifications," is one of the statements used in today's opening presentation. With backing from some of the biggest companies including Google, MySpace, Facebook, and Yahoo, the foundation plans to serve as a placeholder for "all the legal dirty work that needs to happen in order for data portability to become a reality." more

DNS Attack Code Has Been Published

As warned by Dan Kaminsky, Paul Vixie, and numerous other experts experts, it was just a matter of time before an exploit code for the now public DNS flaw would surface. An exploit code for the flaw allowing insertion of malicious DNS records into the cache of target nameservers has been posted to Metasploit, a free provider of information and tools on exploit techniques. According to reports Metasploit creator, H D Moore in collaboration with a researcher named "|)ruid" from Computer Academic Underground, created the exploit, dubbed "DNS BaliWicked Attack", along with a DNS service created to assist with the exploit. more

DNS Security Flaw Secret Leaked Prior to Set Date: Patch DNS as Fast as Possible

In what seems to have started with a blog post by reverse engineer Halvar Flake, and subsequent blog postings from other experts in the know, the details of the recently announced DNS vulnerability was quite likely made public today. The DNS flaw was found earlier this year by security researcher Dan Kaminsky and earlier this month announced publicly along with various tools and patches provided by numerous vendors... more

Shim6 Host-Based IPv6 Multihoming: Ready for Testing

During the last decade, the Internet Engineering Task Force (IETF) has been designing IPv6 as a replacement for IPv4. Most of the initial benefits of IPv6 (security, QoS, autoconfiguration,...) have been ported to IPv4 and IPv6 deployment has been limited. However, thanks to the huge IPv6 addressing space, it is possible to design protocols and mechanisms that are more scalable and more powerful than with IPv4. A typical example is the multihoming problem. This problem occurs when a site is attached to several Internet Service providers... more

The Cost of Walled-Garden Designs

The Swedish morning daily Svenska Dagbladet on their editorial page yesterday writes about the EU threat to intervene at mobile roaming costs for voice, SMS and data. The editorial is pushing the point that it's wrong for the EU to try and price regulate the market, but instead the free market will prevail. They even seem to be indicating that the current pricing is fair and that an EU price regulation would hamper investments. In very general terms I would agree with the editorial... more

BT and Ofcom

About 16 months ago, I heard Ed Richards of Ofcom speak at a CITI conference at Columbia, and blogged about it here. I remember thinking that Richards didn't seem to think that highspeed access to the internet was all that important. The market had to demand it, and the market wasn't being demanding. Also, he wasn't interested in government intervention to support highspeed access... more