/ Recently Commented

Bob Marley’s “WAILERS” Win Cybersquatting Lawsuit

Bob Marley's Wailers, who eventually became known simply as the "Wailers" after Bob Marley's death, successfully argued for dismissal of this cybersquatting and trademark infringement lawsuit brought by band members of another Wailers musical group who started using the band name 10 years before Bob Marley named his group in 1969... more

Defendants Respond to Dell’s Anti-Tasting Suit

The defendants in Dell's domain tasting suit responded last Friday. It looks like a pretty feeble response to me. Their main argument is that they're just the registrar, and deny Dell's claim that the registrants are fakes made up by the registrar. They also argue that they're not infringing, they didn't use the names in question in commerce, they were just acting as helpful search engines, you know, like Google or Yahoo. (The comparison to Google and Yahoo is theirs.) more

Homeland Security Department Was Warned About DNSSEC Key Ownership and Trust Issues

The Internet Governance Project has unearthed a consultancy report to the U.S. Department of Homeland Security (DHS) that makes it clear that the issue of root signing and DNSSEC key management has been recognized as a political issue within the US government for long time. more

The Internet Running Out of Everything?

We know that the Internet is running out of IPv4 addresses and that some in our community check twice a day Mat Ford's doomsday clock or spend an hour once a week reading the tea leaves based on Geoff Huston's exhaustive data compiled at Potaroo. Like with global warming, there is still a school of thought out there arguing that this running out of IP addresses is just fear mongering and that we are not really running out of IPv4 addresses as a NATted world is more than adequate to run the Internet for the foreseeable future. We know that the Internet is running out of AS... more

DNSSEC: Once More, With Feeling!

After looking at the state of DNSSEC in some detail a little over a year ago in 2006, I've been intending to come back to DNSSEC to see if anything has changed, for better or worse, in the intervening period... To recap, DNSSEC is an approach to adding some "security" into the DNS. The underlying motivation here is that the DNS represents a rather obvious gaping hole in the overall security picture of the Internet, although it is by no means the only rather significant vulnerability in the entire system. One of the more effective methods of a convert attack in this space is to attack at the level of the DNS by inserting fake responses in place of the actual DNS response. more

More on Dell’s Anti-Tasting Suit

Dell filed a suit in Florida in early October against a nest of domain tasters in Miami, widely reported in the press last week... The primary defendant is a Miami resident named Juan Vasquez, doing business as several registrars called BelgiumDomains, CapitolDomains, and DomainDoorman, as well as a whole bunch of tiny companies of unknown authenticity... Those registrars have an egregious history of domain churning. I gave a talk on domain tasting at MAAWG in October in which I picked out the registrars who churned the most domains from the May registrar reports, and those three were the worst, each having registered about 500,000 domains, refunded over 10 million... more

Nominet Position Paper on Front Running

Nominet has published a very detailed and comprehensive position paper on "front running". Although the paper is a mere 5 pages long it covers all the areas that the topic encompasses very well and is well worth a read. The topic of "front running" has received some publicity in the last few months. If you're not familiar with the concept Nominet's definition is helpful... more

In Praise of Relatively Dumb Pipes

Comcast's furtive and undisclosed traffic manipulation reminds me of a curious, red herring asserted by some incumbent carriers and their sponsored researchers: that without complete freedom to vertically and horizontally integrate the carriers would lose synergies, efficiencies and be relegated to operating "dumb pipes."... Constructing and operating the pipes instead of creating the stuff that traverses them gets a bad rap. It may not be sexy, but it probably has less risk. But of course with less risk comes less reward, and suddenly no one in the telecommunications business is content with that. So incumbent carriers assert that convergence and competitive necessity requires them to add "value" to the pipes. more

Domain Tasting: Big Multifaceted Action on Bad Actors

Reported in the Washington Post no less: "Dell Takes Cybersquatters to Court". As reported a few weeks ago, this is a very thorough action targeting certain practices and practitioners... I'm surprised a suit this thorough didn't name Google as a co-defendant. Then again, maybe it's not that surprising because Google offers a well liked product, has a lot more money; and a search partnership with Dell that allows Dell to share in the profit when its users engage in "right of the dot" typosquatting on Dell keyboards. It's funny, because one day, Dell could find itself on the defendant's side of the courtroom... more

Thus Ends the Stupid Network Model?

There is an article in EETimes by Fay Arjomandi of Vancouver-based Mobidia that may shake up the fans of the 10 year old stupid network principle. The stupid network essay calls for intelligence to reside at the edge of the network, rendering IP networks to plumbing pipes -- with carriers ignorant of the application and services being transported. more

An Internet Security Operations Viewpoint of IGF

The Internet Governance Forum (IGF) is an annual UN conference on Internet governance which was held this year in Rio de Janeiro, Brazil. The topics discussed range from human rights online to providing Internet access in developing countries. A somewhat secondary topic of conversation is Internet security and cyber-crime mostly limited to policy and legislative efforts. Techies and Internet security industry don't have much to do there, but I have a few updates for us from the conference. more

Telecommunications Advocacy: Who’s Behind That Blog?

An assignment in a Media and Democracy course I teach at Penn State invites students to select a telecommunications advocacy web site for analysis. I want my students to decode the message and attempt to identify whether a bias exists and who financially supports the site. The exercise typically fails miserably... Most students cannot infer that a site that advertises books by Ann Coulter trends to the right and one that talks about social justice trends to the left. more

Spam Kings: Book Review (Part 2)

I'd like to continue on in my review of the book Spam Kings (read part 1) and make some more comments, particularly regarding the antispammers. One thing that I really liked about the book is learning the history of some of the spam tools. I was never a participant on NANAE (news.admin.net-abuse.email; a USENET newsgroup which discusses e-mail spamming), that was before my antispam time. But I was intrigued by its history. People would gather together and discuss spammers and tools for stopping them, and sometimes spammers would stop by and the flame wars would ensue. more

Best Approach for Appraising Domain Names

There are two types of domain name appraisers, designated here as type "1" and type "0," with the former being appraisers who rely on a scientific approach. A large number of domain owners use the services of type "0" -- the nonscientific -- or do the appraisal themselves. Approaches used by scientific appraisers include regression-type statistical modeling, discounted cash-flow analysis, and reliance on the Law of Large Numbers. This post looks at some of the typical erroneous arguments against taking a statistical approach and provides an example from law... more

Domain Management White Paper

Businesses may rely on domain names to conduct their day to day work, but that does not mean that they really understand what they are using or how important they are. Of course those of us in industry may feel tempted to either scoff at people's naivety or feel terribly frustrated with their ignorance, however neither action is particularly productive. Loic Damilaville, however, has tried to take a more practical and positive approach by publishing a white paper on domain name management. The document was published a few months ago in French and has since been made available in English. more