[governance] On Peer to Peer DNS, FREE DNS $$$, and Root Servers RIP

Jim Fleming JimFleming at ameritech.net
Fri Oct 14 10:54:12 EDT 2005


Despite people's false claims [self-serving lies] that address space is
running out
and the need to move to a new and completely different protocol, with a
dual-stack,
and more code bloat and opportunity to hack, infect and/or crash your
systems,
change is happening as more and more people move to the always-on .NET
architecture with PE (Provider Edge) and CE (Customer Edge) protection
devices.

The pipeline of protocol processing and addressing now is evolving to:

Global Network----PE $60 WIFI Box------CE $60 WIFI Video Box------PC (media
viewer)

That is a different flavor of "dual-stack" because the PE has a stack and
the CE has a stack.

In BOTH the PE and CE there are opportunities (some call them choke-points)
to evolve
the DNS. Because both the PE and CE devices are smart and able to be
programmed and
upgraded they are not tied to the glacial pace of what some call Internet
governance. The
PE and CE are also able to collaborate to create various illusions for the
user who only has
a view via their PC which is really just a media viewer. The PE and CE
function which used
to be in the PC is now strung out in small cheap boxes the users can see and
share. The user
is a long way from the "Global Network" and they rely on vendors of the PE
and CE devices
as well as the Service Provider (SP) that maintain the PE and CE devices to
determine what
they view or their family views.

Some people may continue to claim that the old arrangement is what they
want:

Global Network-------PC (media viewer)

In the old arrangement, users now see that they become the prey of
centralized network
control freaks that create the PE and CE functions inside the Global Network
and do not
allow the consumer to participate in any of the choices. In the old
arrangement, they also
find that content and services now only available on a collaborative PE--CE
network can
not be accessed. Peer-to-Peer services are one example.

With the rapidly evolving PE---CE arrangement, each user or small group of
users has]
some very simple yet powerful devices that not only protect them from the
Global Network
they also participate on the user's behalf and form part of the network.
This is really just a
micro-version of the ISP with each user being an ISP.

The PE----CE devices are not only powerful and cheap, they are very stable,
reliable,
low-power and have enough storage to collaborate in Peer-to-Peer services
with other
PE---CE devices. DNS, and especially free DNS, is a natural service that
Peer-to-Peer
can easily support. Because each PE and CE device has a small (64k?) amount
of
non-volatile storage, they can easily be used to store small objects such as
names and
digital certificates. When called upon, they can freely produce those names
and digital
certificates, even when the user is not connected. The low-power PE and CE
devices are
normally always-on 24x7 and because they are limited and able to be
programmed they
can provide simple services without much risk of corruption, theft, etc.
Because the actual
physical PE and CE devices are at the customer's site, they are in the
physical possession
of the customer. In many parts of the world, that forms the basis for the
law. In cyberspace
(Version 1.0) users found they did not really own anything, large central
corporations
own everything with their large data-centers and spinning disks full of
names and numbers.

The move to Peer-to-Peer DNS presents the user with a slightly different
view. They approach
the system, select their names, their PE and CE devices collaborate with
each other and
with thousands of other PE---CE devices and the names become "registered" or
visible.
The names also become burned into their PE---CE devices with time-stamps,
certificates, etc.
If the user moves their PE----CE devices the names move with them. Other
redundant
PE---CE devices owned by the user can be set up to clone the names and
numbers to help
make sure they are always visible on the Global Network. The sum total of
PE---CE devices
form the storage medium for what some call The Registry. There is no central
datacenter with
large capacity rotating disks that house The Registry. Those days are
rapidly moving into the
history books.

The evolution will of course not happen over-night. From a user point of
view, the system
and services does not need to change, it just moves closer to them,
possession details change,
and the services become more interesting and higher performance. People
stuck in the 80s
with a dial-up BBS view of the world will not be on the same page as modern
users. People
stuck in the 90s with a central DNS model of the world will also not be on
the same page.
The governance structures created assuming a third-world cyberspace with
central control
and choke points operated by THE Big Lie Society make no sense in the
evolving .NET.

One has to question people's motives for continuing to focus on out-dated
root server
topics, governance, etc. Are they still trying to sell books about "the
root" ? Are they still
attempting to sell and maintain root servers ? PE and CE devices do not need
any
root servers. Users get their DNS from the PE and CE devices, not from some
out-dated code-bloat central servers.

Naming services are moving to Peer-to-Peer technology such as DHT
(Distributed Hash Table)
where a 160-bit key is used to broadcast (store) a small amount of data into
the commons
for a period of a week. With a 5-bit alphabet mapped to the 160-bit keys, 32
letter names
(including the dots) emerge, for free. If the 5-bit modified baudot code
from the 1800s
is used then smaller names can be mapped, with all of the letters, digits,
etc. The same
160-bit key can be viewed via the fixed symbolic alphabet or via the more
complex code
that has shift keys to select symbols. The 160-bit key is the same. The
PE--CE devices
can help the users select a 160-bit key and can store and remember the
160-bit key.
Algorithms such as SHA-1 produce a 160-bit key from larger streams of data.
If one 160-bit
key appears to be too small, use two and create a 320-bit key. [Note: Common
packet
headers are 160-bits and 320-bits in length with addresses and sometimes
some data.]

As with any migration, it helps to have early adopters and/or an affinity
group. One of the
things THE Big Lie Society seems to forget is that once people are
communicating and
become members of an affinity group, they can develop opinions and move in
directions
THE Big Lie Society can not control. As has been mentioned many many times,
with
respect to the end-less waste-of-time debates about TLDs, IF you can
assemble a large
affinity group for a TLD and they work together to support and maintain that
TLD and it
provides them some useful function then the TLD will survive and live on and
exist and
most importantly migrate and evolve as technology and the times change. If
it does not
migrate or evolve, it will likely be stuck in time and may vanish or become
very obscur.
Has anyone seen the .NATO TLD lately ?

THE Big Lie Society is of course motivated to NOT allow any migration to
free DNS
and Peer-to-Peer DNS technology. They will make up whatever lies are needed
to attempt
to block the migration. They are largely funded by revenues from the
registrants they have
locked into their walled garden. They call that their "community". Some call
it a prison camp.
Kids just now entering the scene, quickly adopt and grow the Peer-to-Peer
technology
and may never see the walled garden cultivated by THE Big Lie Society.
Existing users who
may be stuck in the walled garden can be migrated out of the walled garden
to freedom.
THAT is the major challenge of the next decade. How can people be saved from
the walled
garden created by THE Big Lie Society ?

With .COM owners be the first to move to Peer-to-Peer DNS ?

Do people really think there will be a .COM re-bid fiasco ?

Can .COM become a parking lot where for $50 one can park (and never appear
to use) a name for 10 years ?...and then use it with Peer-to-Peer DNS
without concern for 10 years...

Do you think THE Big Lie Society wants to give up their cyber tax revenues
from names and numbers ?

If you take an 8-letter .NET name and an alphabet with 16 letters, can you
form a unique 32-bit prefix for free without THE Big Lie Society being
involved ?

Can you make up that 8-letter .NET name, lock it up for 10 years for $50,
and then register it
for FREE in a $60 WIFI router under .DYNDNS.[TLD] and then not only find
your telco or cable 32-bit dynamic prefix but ALSO your unique 32-bit prefix
(encoded in the name) and then proceed to use your FREE (or $5 per year)
unique 32-bit prefix to build your ISP ?

Do you think the U.S. Government would help to protect you from graft,
corruption, kick-backs,
extortion and strong-arming from THE Big Lie Society for using your FREE
8-letter .NET name ?

Are people aware of the long history of shake-downs by THE Big Lie Society
of ISPs and even governments ?

THE Big Lie Society is composed of 52 people who conspire to control network
resources and content for their personal gain. If one of the people dies,
there is always another person that has been groomed to take their position
in THE Big Lie Society. Their names, faces and history can easily be
documented on a deck of playing cards. They will do almost anything or pay
people to do anything to be part of that deck of cards.


_______________________________________________
governance mailing list
governance at lists.cpsr.org
https://ssl.cpsr.org/mailman/listinfo/governance



More information about the Governance mailing list