Addressing 2012 – Another One Bites the Dust!

Time for another annual roundup from the world of IP addresses. What happened in 2012 and what is likely to happen in 2013? This is an update to the reports prepared at the same time in previous years, so lets see what has changed in the past 12 months in…


Calling Stumps at WCIT: Win, Lose or Draw?

The problem with setting expectations is that when they are not fulfilled the fallout is generally considered to be a failure, and while everyone wants to claim parenthood of success, failure is an orphan. In that sense it looks like the WCIT meeting, and the International Telecommunications Regulations (ITRs) that…


To Flat or To Cap?

No that’s not a question about Australian coffee tastes and the critically important difference between a flat white and a cappuccino. This is a question about the differences in ISP retail models for broadband Internet access and the choice between a retail model of a “unlimited” flat fee that has…


What we are up to with RPKI

APNIC has recently deployed some changes to its RPKI service, and is in the process of continuing developments that will be released across 2013. This article discusses the changes, and what’s on the horizon early next year. Splitting the TAL A highly visible change to the APNIC RPKI system recently…


Superstorm Sandy and the Global Internet

The Internet has managed to collect its fair share of mythology, and one of the more persistent myths is that from its genesis in a cold war US think tank in the 1960’s the Internet was designed with remarkable ability to “route around damage.” Whether the story of this cold…


NANOG 56

NANOG held its 56th meeting in Dallas on October 21 through 24. I found the two and a half day program to be once more quite diverse and interesting. The following are my impressions of the presentations of this meeting.


Counting IPv6 in the DNS

At the recent ARIN XXX meeting in October 2012 I listened to a debate on a policy proposal concerning the reservation of a pool of IPv4 addresses to address critical infrastructure. The term “critical infrastructure” is intended to cover a variety of applications, including use by public Internet Exchanges and…


Re-counting DNSSEC

This is a followup article to “Counting DNSSEC” that reflects some further examination of the collected data. This time I’d like to describe some additional thoughts about the experiment, and some revised results in our efforts to count just how much DNSSEC is being used out there. And for those…


Counting DNSSEC

At the Nordunet 2012 conference in September, a presentation included the assertion that “more than 80% of domains could use DNSSEC if they so chose.” This is an interesting claim that speaks to a very rapid rise in the deployment of DNSSEC in recent years, and it raises many questions…