/ Most Commented

ICANN’s Noah: Chehade’s 40-Day Report Card

Forty days. That's how long Fadi Chehade has had to get a handle on the most complex, diverse and important non-profit corporation the world has ever known. The last guy to face such an unforgiving timeline was measuring timber in cubits. So if Cheade is Noah, I guess that makes ICANN Chairman Steve Crocker God, telling Fadi to wrangle all these diverse (and often diverging) constituencies and march them two-by-two into the boat, ahead of the coming storm. more

Is It About to Get Much Harder to Own a Domain Name?

Question: why has air travel become so painful? Because the threat posed by bad actors requires making everyone jump through hoops before letting them board a plane. To the point that, despite obvious requirements to ensure air safety, some are now openly questioning if the cure is not worse than the disease. Registering a domain name could be about to go the same way. more

A Look at Mail Patterns from Legitimate Webmail Sources

For many years, I have tracked spam from botnets and reported on it. I have analyzed those botnets' distribution patterns by number of IPs, number of messages per email envelope and geographical distribution. While spam from botnets is interesting, and the main source of spam, it is not the only source of spam. What about spam that originates from the MAGY sources? more

RIPE NCC is Reaching the Last /8 of IPv4

In an earlier article, IPv4 - Business As Usual, we pointed out that the RIPE NCC will reach the last /8 of IPv4 address space (16,777,216 addresses) sometime later this year. On Friday, 14 September 2012 we reached this important milestone; we allocated the last IPv4 addresses from the unallocated pool. From now on, the RIPE NCC can only distribute IPv6 addresses and a one-time /22 IPv4 allocation from the last /8 to those Local Internet Registries (LIRs) that meet the requirements. more

Are We Giving Up On Broadband Equality?

One of the worldwide challenges in relation to the development of national broadband networks is equality. Broadband is critical for the digital infrastructure and it is essential that everybody enjoys the same level of quality and affordability. This is a major challenge and as a rough measuring stick approximately one-third of the people in developed economies would miss out if there were not a requirement for equality. We see some of the problems related to this issue arising in other countries. more

Do Agencies Already Have the Authority to Issue Critical Infrastructure Protection Regulations?

The President and Congress are deliberating how best to ensure appropriate cybersecurity protection for private sector critical infrastructure. Legislative action and Executive Order are both under consideration. It is possible, however, that the White House Office of Management and Budget (OMB) already has sufficient statutory authority to enact new cybersecurity regulations through the normal notice-and-comment rulemaking process. more

My Comment on Forbes - Why Is the UN Trying to Take over the Internet

Forbes just published this article that's being shared all over my facebook friends feed. I left a comment on the article that I've copied and pasted here, as it is just about long enough to qualify as a CircleID post by itself... The problem is that peering isn't always settlement free -- and even if it is, if and only if there's an equitable amount of traffic exchanged between two ISPs. And then there's transit, where you pay another network to carry your packets for you. more

Towards a More Fully Accountable and Transparent ICANN

ICANN held its second international meeting of 2012 last week in Prague, Czech Republic. While the agenda focused heavily on issues related to new gTLDs and on welcoming incoming CEO Fadi Chehade, ICANN also conducted a community consultation on its accountability and transparency reviews. more

What If New gTLD Applicants Held Private Auctions Where Losing Applicants, Not ICANN Gets The Money

Over the last week at ICANN the arguably best idea coming out of the ICANN meeting is the concept that applicants for new gTLD strings with more than one application, hold a private auction amongst themselves with the winning amount going to the other losing applicants instead of to ICANN. As a backdrop, under the Guidebook multiple applicants for a new gTLD extension are encouraged to work together and come to an agreement to resolve the conflict. more

Measuring World IPv6 Launch: Comparing IPv4 and IPv6 Performance

Following on from last year's measurements after World IPv6 Day, the RIPE NCC carried out active measurements on World IPv6 Launch on 6 June 2012. These measurements included latency measurements both on IPv4 and IPv6 from our vantage points to selected hostnames of World IPv6 Launch participants and other dual-stacked parties. We used these measurements to determine the performance of IPv4 versus IPv6 connections. more

Fixing Holes

According to press reports, DHS is going to require federal computer contractors to scan for holes and start patching them within 72 hours. Is this feasible? It's certainly a useful goal. It's also extremely likely that it will take some important sites or applications off the air on occasion - patches are sometimes buggy (this is just the latest instance I've noticed), or they break a (typically non-guaranteeed or even accidental) feature that some critical software depends on. more

Analysis of the IDN New gTLD Applications

There has been a lot of excitement since ICANN revealed the list of 1930 applications for new gTLD yesterday at an event in London yesterday. Even some of the strongest opponents of the ICANN's new gTLD program have acknowledged there is a case to open up new gTLDs for Internationalized Domain Names (IDNs). I am going to focus here on the analysis of the IDN applicants. more

The ICANN Hunger Games

Adolescents were fascinated by the book and film called "Hunger Games". The plot is about a government forcing people to watch, and forcing some to play, a cruel game for life and death. ICANN's own Hunger Games, the so-called "digital archery" or "batching" process, is not lethal to people, but shares all other features: it is forced upon the participants, it is destructive, unfair and unnecessary. more

Don’t Make Us Treat Our Customers Like Criminals!

Crime, fraud, scams etc., they're all very bad things. They're also not going to go away anytime soon. As a domain name registrar and hosting provider we're constantly "at risk", as we sell a lot of services that are both cost-effective and also give criminals the tools they need to attack 3rd parties. Again, this isn't exactly news. We've always taken a very pro-active approach to dealing with criminal activity and network abuse... But recently I've been losing sleep. more

Running DNSBLs in an IPv6 World

DNS blacklists for IPv4 addresses are now nearly 15 years old, and DNSBL operators have gathered a great deal of expertise running them. Over the next decade or two mail will probably move to IPv6. How will running IPv6 DNSBLs differ from IPv4? There aren't any significant IPv6 DNSBLs yet since there isn't significant unwanted IPv6 mail traffic yet (or significant wanted traffic, for that matter), but we can make some extrapolations from the IPv4 experience. more