Authors

Geoff Huston

63

Articles

193

Likes on articles

About the author

Geoff Huston AM is the Chief Scientist at APNIC, where he undertakes research on topics associated with Internet infrastructure, IP technologies, and address distribution policies. From 1995 to 2005, Geoff was the Chief Internet Scientist at Telstra, where he provided a leading role in the construction and further development of Telstra's Internet service offerings, both in Australia and as part of Telstra's global operations. Prior to Telstra, Mr Huston worked at the Australian National University, where he led the initial construction of the Internet in Australia in the late 1980s as the Technical Manager of the Australian Academic and Research Network. He has authored a number of books dealing with IP technology, as well as numerous papers and columns. He was a member of the Internet Architecture Board from 1999 until 2005 and served as its Executive Director from 2001 to 2005. He is an active member of the Internet Engineering Task Force, where he currently chairs two Working Groups. He served on the Board of Trustees of the Internet Society from 1992 until 2001 and served a term as Chair of the Board in 1999. He has served on the Board of the Public Internet Registry and also on the Executive Council of APNIC. He chaired the Internet Engineering and Planning Group from 1992 until 2005.

New gTLD Concerns: Dotless Names and Name Collisions

New gTLD Concerns: Dotless Names and Name Collisions

27 min read

In the long discussions about the new generic Top level Domains (gTLD), there were two technical topics that were the subject of many assertions and little in the way of observed data. The first concerned the viability of a so-called "dotless" name, where the gTLD label itself contains an IP addres…

Article tags:

0 You have liked this article 0 times.
0
Measuring Google's Public DNS

Measuring Google's Public DNS

34 min read

Much has been said about how Google uses the services they provide, including their mail service, their office productivity tools, file storage and similar services, as a means of gathering an accurate profile of each individual user of their services. The company has made a very successful busines…

Article tags:

0 You have liked this article 0 times.
4
Valuing IP Addresses

Valuing IP Addresses

14 min read

The prospect of exhaustion of the IPv4 address space is not a surprise. We've been anticipating this situation since at least 1990. But it's a "lumpy" form of exhaustion. It's not the case that the scarcity pressures for IP addresses are evidently to the same level in every part of the Internet. It…

Article tags:

0 You have liked this article 0 times.
0
All IP Addresses Are Not The Same

All IP Addresses Are Not The Same

14 min read

One IP address is much the same as another – right? There’s hardly a difference between 192.0.2.45 and 192.0.2.46 is there? They are just encoded integer values, and aside from numerological considerations, one address value is as good or bad as any other – right? So IP addresses are much the same …

Article tags:

0 You have liked this article 0 times.
0
Here’s looking at you …

Here’s looking at you …

29 min read

Much has been said in recent weeks about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States’ NSA, Edward Snowden, has accused various US intelligence agencies of systematic examination…

Article tags:

0 You have liked this article 0 times.
4
Counting IPv6 in the DNS

Counting IPv6 in the DNS

1 min read

At the recent ARIN XXX meeting in October 2012 I listened to a debate on a policy proposal concerning the reservation of a pool of IPv4 addresses to address critical infrastructure. The term "critical infrastructure" is intended to cover a variety of applications, including use by public Internet E…

Article tags:

0 You have liked this article 0 times.
1
Re-Counting DNSSEC

Re-Counting DNSSEC

1 min read

This is a followup article to "Counting DNSSEC" that reflects some further examination of the collected data. This time I'd like to describe some additional thoughts about the experiment, and some revised results in our efforts to count just how much DNSSEC is being used out there.

Article tags:

0 You have liked this article 0 times.
0

Showing 63 article(s)