/ Recently Commented

The DNSSEC “Onus of Reality Check” Shifted to gTLD Administrations by ICANN

Last month, there was an exchange of letters between a gTLD administration and ICANN about DNSSEC deployment. This gTLD administration is PIR or Public Interest Registry, the gTLD administration for the .org TLD. Interestingly, PIR is a non-profit organization that makes significant contributions to ISOC (Internet Society) initiatives: thus, both ICANN and PIR are organizations dedicated to the well-being of the Internet. more

GigaNet Announces Global Scholar Network, Issues CFP

The Global Internet Governance Academic Network (GigaNet), an emerging scholarly community initiated in Spring 2006, has issued a call for proposals (CFP) to speak at its first conference to be held on 29 October 2006 in Athens, Greece prior to the inaugural Internet Governance Forum meeting. more

In Rem Domain Name Proceeding: Sometimes “may” Means “must”

Investools, Inc. recently filed an in rem domain name proceeding against a Canadian entity that registered the domain names investtools.com and investtool.com. In rem domain name proceedings are provided for under the Anticybersquatting Consumer Protection Act ("ACPA"), 15 U.S.C. 1125(d), and are a handy way for a trademark owner to acquire a domain name from a cybersquatter when the cybersquatter can't be found e.g., is located outside the U.S. ...The ACPA requires that a plaintiff demonstrate four things to establish in rem jurisdiction over a domain name... more

The Burr Proposal: Beginning of the End of Unilateral Control of the DNS Root?

The results of the recent NTIA consultation made it clear that there is no real public or industry support for unilateral control of the DNS root by the U.S. government. The latest and most interesting sign of collapsing support for US unilateral control of the DNS root, which the Internet Governance Project learned of today, is a proposal being circulated by G. Beckwith Burr... more

China Betting on IPv6 and First Mover Advantage

The United States' reluctance to invest in IPv6 makes it more likely that China will be in a position to gain the first-mover advantage it seeks. ...Liu Dong, president of the Beijing Internet Institute sums it up succinctly: "We think we can develop the killer applications," he says. China plans to show the rest of the world just how advanced its Internet is at the 2008 Olympics in Beijing. CNGI will control the facilities -- everything from security cameras to the lighting and thermostats -- at the Olympic venues, and events will be broadcast live over the Internet. Even the taxis in Beijing's snarled traffic will connect to CNGI via IPv6 sensors so that dispatchers will be able to direct their drivers away from congestion. more

New WHOIS Definition Survives Marrakech ICANN Meeting

For now, it appears that the new, more technically focused and privacy-friendly definition of the purpose of Whois survived the Marrakech meeting. The U.S. Government and the copyright and law enforcement interests mounted a major onslaught against the Generic Names Supporting Organization (GNSO) action, using the Governmental Advisory Committee (GAC) as their pressure point.  more

Verisign Receives Subpoena Relating to Stock Option Backdating

VeriSign has reported that they are cooperating with a grand jury subpoena and a SEC inquiry into their historical stock option grants. More can be found here. Backdating of options is essentially a fraud against existing shareholders, as noted in the press or simply searching Google for "backdating fraud". Under the existing 2001 .com Registry Agreement, section 16.C would allow for termination of the agreement by ICANN in the event that VeriSign "is convicted by a court of competent jurisdiction of a felony or other serious offense related to financial activities... more

FTC Issues Statement on Whois Databases

A recent statement released by the U.S. Federal Trade Commission emphasized that the Whois databases should be kept "open, transparent, and accessible," allowing agencies like the FTC to protect consumers and consumers to protect themselves: "In short, if ICANN restricts the use of Whois data to technical purposes only, it will greatly impair the FTC's ability to identify Internet malefactors quickly -- and ultimately stop perpetrators of fraud, spam, and spyware from infecting consumers' computers," the statement states." more

Macabre Result Avoided in Mortician Domain Name Case

If a court won't let you use your own name, you might feel like you're a mere ghost of your former self. That happened to Ed Kalis of Broward County, Florida. In a recent case, Florida's court of appeal considered whether a trial court's order against Kalis, enjoining him from using his own last name in various means of advertising and in the URL for his company's website, was proper. The appellate court held that the injunction was overkill. more

CIRA’s Second Public Letter to ICANN

Readers of my blog may recall that the Canadian Internet Registration Authority wrote a public letter earlier this year to ICANN that expressed concern over the current lack of accountability (note that I am on the CIRA board). The letter indicated that CIRA was withholding payment of any voluntary fees to ICANN until the accountability concerns were addressed. This week CIRA followed up with a second public letter to ICANN... more

Phishing: Competing on Security

The UK today is one of the main attack targets by phishing organized crime groups, globally. Phishing damages will amount to about two billions USD in 2006 worldwide -- not counting risk management measures such as preventative measures, counter-measures, incident response and PR damages. In most cases, phishing is caused by the fault of the users, either by entering the wrong web page, not keeping their computers secure or falling for cheap scams. Often this is due to lack of awareness or ability in the realm of Internet use rather than incompetence by the users... more

Mitigating Spoofed Attacks Using IPv6 Address Space

Timothy D. Morgan's recent paper titled, "IPv6 Address Cookies", seeks to apply the fundamental shift in resource availability brought about by the vastly increased Internet address space in IPv6 to develop a novel, lower cost solution to mitigating spoofed attacks. "Spoofed denial of service attacks have plagued the Internet for a number of years, and show no signs of abating. Research into mitigation techniques has apparently not led to a financially viable solution, and new attacks have been discovered in the wild without being widely anticipated". The following provides an introduction to this paper. more

DNSSEC Deployment at the Root

The DNSSEC is a security protocol for providing cryptographic assurance (i.e. using the public key cryptography digital signature technology) to the data retrieved from the DNS distributed database (RFC4033). DNSSEC deployment at the root is said to be subject to politics, but there is seldom detailed discussion about this "DNS root signing" politics. Actually, DNSSEC deployment requires more than signing the DNS root zone data; it also involves secure delegations from the root to the TLDs, and DNSSEC deployment by TLD administrations (I omit other participants involvement as my focus is policy around the DNS root). There is a dose of naivety in the idea of detailing the political aspects of the DNS root, but I volunteer! My perspective is an interested observer. more

If It’s Not Neutral It’s Not Internet

The success of a proposal by AT&T and Verizon to end net neutrality does not threaten the Internet. The broadband customers of AT&T and Verizon will just no longer have access to the Internet. The development appropriately creates alarm among AT&T and Verizon's customers, but the combined customer bases of these companies represent less than 2% of the billion or so users of the Internet. The fact that access to the Internet requires net neutrality does not depend on laws passed by the US Congress or enforced by the FCC. Neutrality arises as a technical and business imperative facilitating the interconnection 250,000 independent networks that choose to participate in the Internet. more

Net Neutrality Again!

I had hoped to take a longer break from the theme of Net Neutrality, but a piece on Om Malik's blog by Daniel Berninger seems to be screaming for a reply. Berninger hails from Tier 1 Research; his credentials show a close association with Jeff Pulver's Free World Dialup, and hence a piece that is sympathetic to the 'Save the Internet' movement. His legalistically styled piece attempts to suggest that, in the absence of conformance to network neutrality principles, telephone companies will lose their common carrier status and therefore should lose their access to low cost rights-of-way. Good try, Dan... more