It is not often I go out to my driveway to pick up the Washington Post -- yes, I still enjoy reading a real physical paper, perhaps a sign of age -- and the headline is NOT about how the (insert DC sports team here) lost last night but is instead is about an IT technology. That technology is the Border Gateway Protocol (BGP), a major Internet protocol that has been around for more than a quarter century, before the Internet was commercialized and before most people even knew what the Internet was. more
Yesterday's DDoS attack against DNSimple brought to light a longstanding need for DNS nameserver operators to have an ability to unilaterally repudiate domains from their nameservers. The domains under attack started off on DNSMadeEasy, migrated off to DNSimple and took up residence there for about 12 hours, causing a lot of grief to DNSimple and their downstream customers. more
Speaking at a Technology University of Delft conference on the internationalization of infrastructures, Professor Viktor Mayer-Schoenberger made some unique and provocative observations about the future of the ICANN tether to the U.S. government. Mayer-Schoenberger was trying to predict the position of the three main players: the EU, the US and China... more
There has been an ongoing debate on domain name blogs about the relationship between investment and speculation, but there has been no attempt to clarify and reconcile different views. In this essay, I shed some light on the relationship and analyze the implied value creation of transactions in the secondary markets. more
The DNS root servers were reported by Verisign to be under unexpected attack from name servers across the Internet following ICANN's recent changes to their cryptographic master keys. more
When discussing IPv6, it is easy to forget that we are ultimately talking about an enhanced version of an existing network protocol. Sure, it brings about a number of technical advantages. But when viewed in isolation - without a business case - there really are not that many drivers that would place IPv6 on the agenda of the top decision makers looking after budgets. For IPv6 to gain serious momentum, this has to be changed. more
This follows a general meeting on November 14, 2023, and comes ahead of the 2024 EU elections. The initiative outlines strategies for protecting Europe's digital future in the coming decade, especially considering potential strategic shifts in the next legislative term. more
In 1964, Canadian scholar Marshall McLuhan famously wrote, "The medium is the message." This phrase popped into my head last week as I listened to the opening speakers at the Internet Governance Forum in Nairobi. McLuhan meant that the form in which a message is delivered - the medium - embeds itself in the meaning of the message. The medium influences how the message is perceived and understood and is therefore inseparable from the message itself. What does this have to do with the Internet? more
In January we presented the glorious history of the MIT spam conference, today we present the schedule for the first day. Opening session will be from this author, Garth Buren with a topic entitled The Internet Doomsday Book, with details be released the same day as the presentation. Followed by Dr. Robert Bruen with a review of activities since the last MIT spam conference... more
For three years, I've been a member of ICANN's "Interim" At-Large Advisory Committee, ALAC. At this Vancouver meeting, for the first time, the ICANN Board met with us, and Bret captured it on mp3 for podcast. ALAC criticized ICANN's proposed settlement with VeriSign, and then spoke about the problems with the current structure for at-large participation. more
A great deal of discussion is taking place about topics such as the digital economy, sharing economy and networked economy. Obviously these are concepts rather than being well-defined, but they are being used by the various players in the market to argue for or against certain developments. For example, in some of the broadband debates around the world, the digital economy is the key reason why national broadband infrastructure gets developed. more
I saw this case in the excellent National Association of Attorneys General publication Cyber Crime e-newsletter. Many of us host or sponsor online communities of one form or another. On occasion, this means we must engage in moderation of the discourse in that community, and, as chance may arise, on occasion, we must give some chap the boot from the community for violating the AUP or the TOS. Inevitable, the booted chap screams "First Amendment Violation," to which we must respond, "The First Amendment restrains government actors -- we are not government actors." more
At June 30, 2015 the Inaugural Meeting of the Coordination Council of the NetMundial Initiative (NMI.CC) elected a "Quintett" to guide its activities through the global Internet Governance Ecosystem. Alibaba's CEO Jack Ma from China, ICANN's President Fadi Chehade, Brazilian's Minister Virgilio Almeida and two woman: Eileen Donahou from Human Rights Watch (HRW)) and Marilia Maciel from the Center of Technology and Society (CTS) in Rio de Janeiro are sharing now the helm to bring more steam to this new innovative multistakeholder platform. more
This case had a bit of a weird result -- even though the brand owner had a mark that was 20 years old, and the alleged cybersquatter, in the meantime, acquired a domain name on the open market identical to that mark, because the domain name was first registered (by an unrelated party) before the brand owner's trademark rights arose, there was no relief under federal trademark law. more
In Tony Li's article on path MTU discovery we see this text: "The next attempt to solve the MTU problem has been Packetization Layer Path MTU Discovery (PLPMTUD). Rather than depending on ICMP messaging, in this approach, the transport layer depends on packet loss to determine that the packet was too big for the network. Heuristics are used to differentiate between MTU problems and congestion. Obviously, this technique is only practical for protocols where the source can determine that there has been packet loss. Unidirectional, unacknowledged transfers, typically using UDP, would not be able to use this mechanism. To date, PLPMTUD hasn't demonstrated a significant improvement in the situation." Tony's article is (as usual) quite readable and useful, but my specific concern here is DNS... more