Language Selection

English French German Italian Portuguese Spanish

ICANN to lift price caps on .net domains

Filed under
Web

The Internet Corporation for Assigned Names and Numbers, the nonprofit organization responsible for Internet addresses, quietly agreed to lift wholesale price restrictions on .net registry fees last month when it renewed a contract with VeriSign to run the master database for .net domain names.

Buried in the fine print, the fact has escaped notice until recently. Over the past several days, news of the change has traveled around the Web.

"(It's) a move that may signal ICANN's intent to get out of the business of regulating domain name pricing," noted Internet services firm Netcraft.

ICANN used to cap .net domain fees at either $6 or $4.25, depending on the type of address. Under the new, six-year VeriSign contract, the cap is now $4.25 and that cap will remain in effect until Dec. 31, 2006, after which time all price restrictions expire.

A VeriSign spokesman told Computer Business Review that it's unlikely to raise prices, and would do it only to invest in its infrastructure. The master-registrar has agreed to give six months' notice in advance of any price changes, Netcraft noted.

Netcraft said prices are likely to remain stable because the domain-name market is very competitive. Domain names are practically given away as part of Web hosting packages, the group noted.

Others were less certain. "I'm not yet sure whether it's a change for the good or the bad," wrote Bret Fausett in his Lextext blog. "On the one hand, it gets ICANN out of the messy, non-"technical coordination" business of price control. On the other, will I be able to afford to renew my .net domain names after 2007?"

The $6 price cap will still apply to the more popular .com registry, which VeriSign also controls. That contract expires in November 2007.

By Alorie Gilbert
CNET News.com

More in Tux Machines

Meltdown and Spectre Linux Kernel Status - Update

I keep getting a lot of private emails about my previous post previous post about the latest status of the Linux kernel patches to resolve both the Meltdown and Spectre issues. These questions all seem to break down into two different categories, “What is the state of the Spectre kernel patches?”, and “Is my machine vunlerable?” Read more

today's leftovers

OSS: Jio, VMware Openwashing, and Testing Jobs

  • Jio is committed to use open source technology: Akash Ambani
    Speaking at the India Digital Open Summit 2018, Akash Ambani, Director of Reliance Jio Infocomm, said that open source is very important for his company. “The year 2017 was the tipping point for AR and VR globally. In India, AR and VR are in the initial stages of adoption but at Jio, we believe it will grow at a 50 percent compounded rate for the next five years,” Akash said. He also spoke on the evolution of artificial intelligence and blockchain.
  • VMware and Pivotal’s PKS Distribution Marries Kubernetes with BOSH [Ed: It looks like the author has been reduced to Microsoft propaganda and other openwashing puff pieces sponsored by proprietary software giants. We have given up on several writers who used to support GNU/Linux. Seeing their activity, it seems as though they ended up with neither gigs nor credibility (used to get far more writing assignments from LF, often for Microsoft openwashing).]
  • Hehe, still writing code for a living? It's 2018. You could be earning x3 as a bug bounty hunter
    Ethical hacking to find security flaws appears to pay better, albeit less regularly, than general software engineering. And while payment remains one of the top rationales for breaking code, hackers have begun citing more civic-minded reasons for their activities. A survey of 1,700 bug bounty hunters from more than 195 countries and territories by security biz HackerOne, augmented by the company's data on 900 bug bounty programs, has found that white-hat hackers earn a median salary that's 2.7 times that of typical software engineers in their home countries. In some places, the gap is far more pronounced. In India, for example, hackers make as much as 16 times the median programmer salary. In the US, they earn 2.4 times the median.

Security: Spectre and Meltdown, Industrial System Sabotage, VDP, Windows in Healthcare

  • Some thoughts on Spectre and Meltdown
     

    Contrast that with what happened this time around. Google discovered a problem and reported it to Intel, AMD, and ARM on June 1st. Did they then go around contacting all of the operating systems which would need to work on fixes for this? Not even close. FreeBSD was notified the week before Christmas, over six months after the vulnerabilities were discovered. Now, FreeBSD can occasionally respond very quickly to security vulnerabilities, even when they arise at inconvenient times — on November 30th 2009 a vulnerability was reported at 22:12 UTC, and on December 1st I provided a patch at 01:20 UTC, barely over 3 hours later — but that was an extremely simple bug which needed only a few lines of code to fix; the Spectre and Meltdown issues are orders of magnitude more complex.  

  • Menacing Malware Shows the Dangers of Industrial System Sabotage
     

    At the S4 security conference on Thursday, researchers from the industrial control company Schneider Electric, whose equipment Triton targeted, presented deep analysis of the malware—only the third recorded cyberattack against industrial equipment. Hackers [sic] were initially able to introduce malware into the plant because of flaws in its security procedures that allowed access to some of its stations, as well as its safety control network.

  • 25 per cent of hackers don't report bugs due to lack of disclosure policies
     

    One of the standout discoveries was that almost 25 per cent of respondents said they were unable to disclose a security flaw because the bug-ridden company in question lacked a vulnerability disclosure policy (VDP).

  • 'Professional' hack [sic] on Norwegian health authority compromises data of three million patients [iophk: "Windows TCO"]