Firewalls and Virtual Private Networks Acknowledgements

Total Page:16

File Type:pdf, Size:1020Kb

Firewalls and Virtual Private Networks Acknowledgements Firewalls and Virtual Private Networks A thesis submitted in partial fulfilment of the requirements for the Degree of Master of Commerce in Computer Science in the University of Canterbury by B. A. Harris University of Canterbury 1998 Firewalls and Virtual Private Networks Acknowledgements Acknowledgements There are a great number of people that I wish to thank for helping me undertake this thesis. Perhaps I should start with my supervisor and friend, Ray Hunt, who has provided me with unwavering support, encouragement, and of course much needed criticism. I believe that without your help and enthusiasm this work would probably have never seen the light of day. Thank you. I am equally indebted to my fiancee Sharalie, who has stoically endured many months of separation while I pursued my dream. Your love and encouragement were given without hesitation, and for that I love you even more. I cannot go any further without acknowledging all of the support and encouragement given by my parents, sister, and future parents-in-law. Each of you have contributed in your own special way, and helped smooth a path that at times threatened to become very difficult indeed. There are a number of friends that I wish to thank because they have contributed significantly, in a variety of ways, to the completion of my thesis. So please bear with me - Matthew Brady for commanding and conquering my battles; Greg Slui and Rebecca Gilmore for being great friends and providing me with somewhere to go; Mark Snelling for inspiration and cryptographic support; Stephen Harvey for entertaining discussion and helping me understand public-key infrastructures; and Sylvester and Scooby-Doo for providing essential relaxation and escapism. Finally, a very special mention is deserved for Malcolm Shore of the Government Communications Security Bureau. Malcolm has provided a great deal of technical direction and support, and was instrumental in arranging for me to take leave from work to return to university and complete my thesis. Thank you. Funding for this thesis was provided by the Government Communications Security Bureau. Brendan Harris 1998 vii Firewalls and Virtual Private Networks Table of Contents Table of Contents LIST OF FIGURES xiii LIST OF TABLES xv CHAPTER 1. INTERNET BEGINNINGS 1 1.1 INTRODUCTION 1 1.2 THE ARPANET 1 1.3 NEW ZEALAND AND THE INTERNET 2 1.4 INTERNET GROWTH 4 1.5 SUMMARY 8 CHAPTER 2. OVERVIEW OF TCP/IP 9 2.1 INTRODUCTION 9 2.2 THE TCP/IP PROTOCOL SUITE 9 2.3 INTERNET PROTOCOL (IP) 11 2.3.1 IP ADDRESSES 13 2.3.2 IP SECURITY LABELS 14 2.4 INTERNET CONTROL MESSAGE PROTOCOL (ICMP) 14 2.5 ADDRESS RESOLUTION PROTOCOL (ARP) 16 2.6 TRANSMISSION CONTROL PROTOCOL (TCP) 16 2.7 USER DATAGRAM PROTOCOL (UDP) 19 2.8 DOMAIN NAME SERVICE 19 2.9 SUMMARY 21 CHAPTER 3. THREATS FROM THE INTERNET 23 3.1 INTRODUCTION 23 3.2 THREATS TO THE TCPIIP PROTOCOL 26 3.2.1 SYN FLOODING 26 3.2.2 IP SPOOFING, TCP SEQUENCE NUMBER PREDICTION, AND TCP SESSION HIJACK 28 3.2.3 RST AND FIN ATIACK 33 3.2.4 PING 0' DEATH 34 3.3 THREATS TO STANDARD TCP/IP SERVICES 35 3.3.1 SIMPLE MAIL TRANSPORTPROTOCOL(SMTP) 36 3.3.2 TELNET 37 3.3.3 NETWORKTIMEPROTOCOL(NTP) 37 3.3.4 FINGER AND WHOIS 38 3.3.5 NETWORK FILE SYSTEM (NFS) 39 3.3.6 FILE TRANSFER PROTOCOL (FTP) 39 3.3.7 WORLD WIDE WEB (WWW) 40 3.3.8 X-WINDOW SYSTEM 41 3.4 SUMMARY 41 ix Table of Contents Firewalls and Virtual Private Networks CHAPTER 4. FIREWALL TECHNOLOGY 43 4.1 INTRODUCTION 43 4.2 FIREWALL TERMINOLOGY 43 4.3 THE OSI MODEL 45 4.4 DEFINING BOUNDARIES 47 4.5 THE ROLE OF A SECURITY POLICY 48 4.5.1 NETWORK SERVICE ACCESS POLICY (NSAP) 49 4.5.2 FIREWALL DESIGN POLICY (FDP) 50 4.5.3 SAMPLE POLICIES 52 4.5.4 POLICY EVOLUTION 52 4.6 SUMMARY 53 CHAPTER 5. FIREWALL ARCHITECTURES 55 5.1 INTRODUCTION 55 5.2 SCREENING-ROUTER 55 5.3 DUAL-HOMED GATEWAY 57 5.4 SCREENED-HOST GATEWAY 59 5.5 SCREENED-SUBNET 61 5.6 HYBRID GATEWAYS 62 5.7 FIREWALL LIMITATIONS 63 5.8SUMMARY 64 CHAPTER 6. CERTIFICATION OF FIREWALL TECHNOLOGY 65 6.1 INTRODUCTION 65 6.2 PROBLEMS WITH FIREWALL EVALUATION 66 6.3 GOVERNMENT CERTIFICATION 66 6.3 .1 DEVELOPMENT OF lNFORMA TION TECHNOLOGY SECURITY EVALUATION CRITERIA 66 6.3.2 OVERVIEWOFTHEITSEC 67 6.3.3 OVERVIEW OF THE AUSTRALIAN INFORMATION SECURITY EVALUATION PROGRAMME69 6.4 COMMERCIAL CERTIFICATION 72 6.4.1 ICSA FIREWALL CERTIFICATION 72 6.4.2 ICSA FIREWALL TESTING 74 6.5 SUMMARY 75 CHAPTER 7. VIRTUAL PRIVATE NETWORKS 77 7.1 WHAT IS A VIRTUAL PRIVATE NETWORK? 77 7.2 VIRTUAL PRIVATE NETWORKS AND THE INTERNET 78 7.3 OVERVIEW OF CRYPTOGRAPHY 80 7.3.1 SECRET-KEY (SYMMETRIC) CRYPTOGRAPHY 80 7.3.2 PUBLIC-KEY (ASYMMETRIC) CRYPTOGRAPHY 82 7.3.3 DIGITAL SIGNATURES 84 7.3.4 CERTIFICATE AUTHORITIES 85 7.4 VIRTUAL PRIVATE NETWORK TECHNOLOGY 87 7.5 POINT-TO-POINT TUNNELLING PROTOCOL 90 7.5.1 PPTP SECURITY 92 7.6 IP SECURITY (IPSEC) 93 7.6.1 SECURITY ASSOCIATION 94 X Firewalls and Virtual Private Networks Table of Contents 7.6.2 AUTHENTICATION 95 7.6.3 CONFIDENTIALITY 96 7 .6.4 KEY MANAGEMENT 99 7. 7 SECURE SOCKETS LAYER 100 7. 7.1 SESSION ESTABLISHMENT 102 7.7.2 DATA TRANSFER 103 7. 7.3 SSL AND PROXIES 104 7.8SUMMARY 105 CHAPTER 8. CONCLUSIONS 107 8.1 THE FUTURE OF INTERNET SECURITY 107 8.2 PROBLEMS AND FUTURE RESEARCH 108 APPENDIX A ITSEC TARGET EVALUATION LEVELS 111 APPENDIX B NCSA FWPD CRITERIA 113 APPENDIX C PRIVILEGED PORT NUMBERS 117 REFERENCES 123 xi Firewalls and Virtual Private Networks List of Figures list of Figures FIGURE 1-1 THE LOCATION OF EACH UNIVERSITY INNEW ZEALAND, INCLUDING THE LOGICAL TOPOLOGY OF THE KA WAIHOKI NETWORK(SEE INSET) ....................................................................................... 3 FIGURE 1-2 GROWTH OF HOST MACHINES ON THEINTERNET ................................................................... 5 FIGURE 1-3 COMPARISON OF WWW- BROWSER USE BY US AND EUROPEAN USERS ................................ 5 FIGURE 1-4 COMPARISON OF INTERNET TECHNOLOGIES USED BYUS AND EUROPEAN USERS .................. 6 FIGURE 1-5 SERVICES USED BY INTERNET USERS IN THE UK. .................................................................. 7 FIGURE 2-1 THE FOUR LAYERS OF THE TCP/IP PROTOCOL STACK. .......................................................... 9 FIGURE 2-2 RELATIONSHIP OF PROTOCOLS IN THETCP/IP PROTOCOL SUITE. ......................................... 10 FIGURE 2-3 IP DATA GRAM FORMAT....................................................................................................... 11 FIGURE2-4 ICMP MESSAGESTRUCTUREINRELATIONTOIP DATAGRAM ENCAPSULATION .................. 14 FIGURE2-5 TCP SEGMENT FORMAT ...................................................................................................... 16 FIGURE 2-6 TCP 3-wAy HANDSHAKE. ................................................................................................... 19 FIGURE2-7 HIERARCHICAL ORGANISATION OFTHEDNS ........•.............................................................. 21 FIGURE 3-1 TCP SYN FLOOD ATTACK. .................................................................................................. 27 FIGURE 3-2 TCP 3-WAY HANDSHAKE AND DATA TRANSFER ................................................................. 29 FIGURE 3-3 EXAMPLE OF A BLIND SPOOFING ATTACK ............................................................................ 31 FIGURE 3-4 EXAMPLE OF A TCP SESSION HIJACK. .................................................................................. 32 FIGURE4-1 COMPARISON OFOSI AND TCP/IP COMMUNICATIONS ARCHITECTURES. ............................ 46 FIGURE 4-2 OSI MODEL IN RELATION TO THE VARIOUS FIREWALL ARCHITECTURES .............................. 47 FIGURE 4-3 THE ZONE-OF-RISK FOR AN ORGANISATIONAL NETWORK CONNECTED TO THElNTERNET WITHOUT A FIREWALL ARCHITECTURE ............................................................................................ 47 FIGURE 4-4 THE ZONE-OF-RISK WITH FIREWALL ARCHITECTURE IN PLACE ............................................ 48 FIGURE 5-1 THE COST OF FIREWALL ARCHITECTURES IN COMPARISON TO THE LEVEL OF SECURITY THEY PROVIDE .......................................................................................................................................... 55 FIGURE 5-2 THE OSI LAYERS AT WHICH THE SCREENINGROUTER FUNCTIONS ...................................... 56 FIGURE 5-3 TYPICAL SCREENING ROUTER BASED FIREWALL ARCHITECTURE ........................................ 56 FIGURE 5-4 THE OSI LAYERS AT WHICH THE DUAL-HOMED GATEWAY FUNCTIONS. ............................... 58 FIGURE 5-5 TYPICAL DUAL-HOMED GATEWAY ....................................................................................... 58 FIGURE 5-6 THE OSI LAYERS AT WHICH THE SCREENED-HOST FIREWALL ARCHITECTURE FUNCTIONS .. 60 FIGURE 5-7 TYPICAL SCREENED-HOST FIREWALL ARCHITECTURE ......................................................... 60 FIGURE 5-8 THE OSI LAYERS AT WHICH THE SCREENED-SUB NET FIREWALL ARCHITECTURE FUNCTIONS61 FIGURE 5-9 TYPICAL SCREENED-SUB NET FIREWALL ARCHITECTURE ..................................................... 62 FIGURE 6-1 ITSEC ASSURANCE LEVELS ............................................................................................... 68 FIGURE 6-2 COMPARISON OF CC AND ITSEC ASSURANCE LEVELS ........................................................ 69 FIGURE7-1 EXTRANET SECURED BY A VPN. ························································································· 79 FIGURE 7-2 SYMMETRIC ALGORITHM ENCRYPTION AND DECRYPTION ................................................... 81 FIGURE 7-3 ASYMMETRIC ALGORITHM ENCRYPTION
Recommended publications
  • 2013 Annual Telecommunications Monitoring Report
    ISSN 1179-724X Project no. 13.3/10147 Public Annual Telecommunications Monitoring Report 2013 Telecommunications monitoring report Date: May 2014 2 CONTENTS Executive Summary 3 Introduction 5 Purpose of this report 5 Data sources 5 Market overview 6 TelstraClear disappears 6 UFB drives up telecommunications investment 6 Broadband connections continue to grow 8 Calling volumes converging 10 Total revenue rise not sustained 11 Fixed-line and mobile markets show similar levels of concentration 12 Retail fixed-line market 14 Market overview 14 Fall in local calling accelerates 15 Most fixed-line revenues continue to fall 17 Telecom’s retail voice share continues to slip, including wholesale 18 Consolidation in broadband market 19 Lift in average broadband speed 21 Retail mobile market 23 Market overview 23 Rising data revenues underpin modest growth 24 Mobile voice minutes resume upward trend 25 Off-net calling becomes more popular 26 Texting appears to have peaked 28 Competition progressing in prepay but not much in business 30 The telecommunications consumer – from smartphone to smart living 33 How much appetite do users have for data and speed? 34 What drives consumption? 38 What is the impact on citizens’ welfare and New Zealand’s economic growth? 44 Challenges of digital life 50 The 2013 year in review 52 List of defined terms and abbreviations 57 3 Executive Summary This is the Commerce Commission’s seventh annual telecommunications market monitoring report. It is produced as part of the Commission’s on-going monitoring of the evolution of competition in the telecommunications sector in New Zealand. We have included two infographics showing how the telecommunications market is delivering more to consumers and helping to drive the economy.
    [Show full text]
  • The World Internet Project International Report 6Th Edition
    The World Internet Project International Report 6th Edition THE WORLD INTERNET PROJECT International Report ̶ Sixth Edition Jeffrey I. Cole, Ph.D. Director, USC Annenberg School Center for the Digital Future Founder and Organizer, World Internet Project Michael Suman, Ph.D., Research Director Phoebe Schramm, Associate Director Liuning Zhou, Ph.D., Research Associate Interns: Negin Aminian, Hany Chang, Zoe Covello, Ryan Eason, Grace Marie Laffoon‐Alejanre, Eunice Lee, Zejun Li, Cheechee Lin, Guadalupe Madrigal, Mariam Manukyan, Lauren Uba, Tingxue Yu Written by Monica Dunahee and Harlan Lebo World Internet Project International Report ̶ Sixth Edition | i WORLD INTERNET PROJECT – International Report Sixth Edition Copyright © 2016 University of Southern California COPIES You are welcome to download additional copies of The World Internet Project International Report for research or individual use. However, this report is protected by copyright and intellectual property laws, and cannot be distributed in any way. By acquiring this publication you agree to the following terms: this copy of the sixth edition of the World Internet Project International Report is for your exclusive use. Any abuse of this agreement or any distribution will result in liability for its illegal use. To download the full text and graphs in this report, go to www.digitalcenter.org. ATTRIBUTION Excerpted material from this report can be cited in media coverage and institutional publications. Text excerpts should be attributed to The World Internet Project. Graphs should be attributed in a source line to: The World Internet Project International Report (sixth edition) USC Annenberg School Center for the Digital Future REPRINTING Reprinting this report in any form other than brief excerpts requires permission from the USC Annenberg School Center for the Digital Future at the address below.
    [Show full text]
  • Cross-Media News Repertories in New Zealand
    . Volume 14, Issue 2 November 2017 Shopping in a narrow field: Cross-media news repertories in New Zealand Craig Hight, University of Newcastle, Australia Arezou Zalipour, University of Waikato, New Zealand Abstract: This article reports on the New Zealand case study within a larger project investigating cross-media news repertoires within (and across) national audiences. Six key news media repertoires emerged in this case study; heavy news consumers; hybrid browsers; digital browsers; ambivalent networkers; mainstream multiplatformers; and casual and connected). Despite a range of news media outlets available within New Zealand, particularly across digital platforms, participants consistently noted a relatively narrow social, cultural and political discursive field for news content in the country. Within this context, the news repertoires identified within this case study highlighted the high value placed by news consumers on national daily newspapers (print and online), and the continued salience of television and radio news broadcasting for some audience segments. But findings also offered a snapshot of the ways these are being supplemented or replaced, for some audience segments, by digital news outlets (even as these also generated dissatisfaction from many participants). Keywords: news repertoires, New Zealand, Q-methodology, news consumption, cross- cultural Introduction This article reports on the New Zealand case study within a larger project investigating patterns of news repertoires (Schrøder 2015) within (and across) national audiences, at a time of broadening forms of distribution of news content across a variety of media Page 416 Volume 14, Issue 2 November 2017 platforms. The overall project involved 12 countries and used a Q-sort methodology (Kobbernagel & Schrøder, 2016) to analyze and examine cross-media news consumption among audiences.
    [Show full text]
  • ANNUAL TELECOMMUNICATIONS MONITORING REPORT 2010 April 2011
    ANNUAL TELECOMMUNICATIONS MONITORING REPORT 2010 April 2011 TABLE OF CONTENTS INTRODUCTION ........................................................................................... 4 KEY MARKET TRENDS AND OBSERVATIONS FOR 2010 ................. 5 MARKET OVERVIEW ................................................................................. 8 Investment in Telecommunications Markets ............................................ 8 Investment Initiatives .................................................................................. 9 Fixed Line and Mobile Comparisons ....................................................... 11 Call Volumes ............................................................................................... 12 Revenue from Telecommunications Services .......................................... 14 THE FIXED LINE MARKET ..................................................................... 18 Market Overview ....................................................................................... 18 Fixed Line Voice ......................................................................................... 19 Fixed Line Data .......................................................................................... 25 Development of Unbundling ..................................................................... 28 Broadband Quality .................................................................................... 31 MOBILE MARKET .....................................................................................
    [Show full text]
  • Comparison of Disk Encryption Software 1 Comparison of Disk Encryption Software
    Comparison of disk encryption software 1 Comparison of disk encryption software This is a technical feature comparison of different disk encryption software. Background information Name Developer First released Licensing Maintained? ArchiCrypt Live Softwaredevelopment Remus ArchiCrypt 1998 Proprietary Yes [1] BestCrypt Jetico 1993 Proprietary Yes BitArmor DataControl BitArmor Systems Inc. 2008-05 Proprietary Yes BitLocker Drive Encryption Microsoft 2006 Proprietary Yes Bloombase Keyparc Bloombase 2007 Proprietary Yes [2] CGD Roland C. Dowdeswell 2002-10-04 BSD Yes CenterTools DriveLock CenterTools 2008 Proprietary Yes [3][4][5] Check Point Full Disk Encryption Check Point Software Technologies Ltd 1999 Proprietary Yes [6] CrossCrypt Steven Scherrer 2004-02-10 GPL No Cryptainer Cypherix (Secure-Soft India) ? Proprietary Yes CryptArchiver WinEncrypt ? Proprietary Yes [7] cryptoloop ? 2003-07-02 GPL No cryptoMill SEAhawk Proprietary Yes Discryptor Cosect Ltd. 2008 Proprietary Yes DiskCryptor ntldr 2007 GPL Yes DISK Protect Becrypt Ltd 2001 Proprietary Yes [8] cryptsetup/dmsetup Christophe Saout 2004-03-11 GPL Yes [9] dm-crypt/LUKS Clemens Fruhwirth (LUKS) 2005-02-05 GPL Yes DriveCrypt SecurStar GmbH 2001 Proprietary Yes DriveSentry GoAnywhere 2 DriveSentry 2008 Proprietary Yes [10] E4M Paul Le Roux 1998-12-18 Open source No e-Capsule Private Safe EISST Ltd. 2005 Proprietary Yes Dustin Kirkland, Tyler Hicks, (formerly [11] eCryptfs 2005 GPL Yes Mike Halcrow) FileVault Apple Inc. 2003-10-24 Proprietary Yes FileVault 2 Apple Inc. 2011-7-20 Proprietary
    [Show full text]
  • The Internet, the Law, and Privacy in New Zealand: Dignity with Liberty?
    International Journal of Communication 6 (2012), 127–143 1932–8036/20120127 The Internet, the Law, and Privacy in New Zealand: Dignity with Liberty? JONATHAN BARRETT LUKE STRONGMAN Open Polytechnic of New Zealand Early participants in the Internet experienced very little legal or social pressure with respect to either data privacy or regulation. However, the innovations of Web 2.0 are symptomatic of a re-creation of cyberspace from an original “free for all,” in which websites had no normative constraints, toward a significant shift to website management that addresses privacy concerns. If the laws of the non-virtual world are difficult to apply to the online world, must the non-virtual world create new laws to control the online world? Should a balance be made between laws of the non-virtual and virtual worlds, or should a new set of laws be created specifically to govern the Internet? Concordant with this dilemma is the issue that although precedent may create new laws, when the law changes with the possibilities for uses and abuses of new online technologies, to what extent can it be said to either perpetuate or create to any internally consistent system? Introduction For many of its early participants, the Internet presented the opportunity for a benignly anarchic and anomic space for freedom of expression that, in principle and practice, should be liberated from established legal traditions and social pressures. Its debt to the military notwithstanding (see Morozov, 2011b), Web 1.0 was typically conceived as a virtual realm that could be created, grown, and governed— or non-governed—by its participants.
    [Show full text]
  • Veracryptcrypt F R E E O P E N - S O U R C E O N - T H E - F L Y E N C R Y P T I O N User’S Guide
    VERAVERACRYPTCRYPT F R E E O P E N - S O U R C E O N - T H E - F L Y E N C R Y P T I O N USER’S GUIDE veracrypt.codeplex.com Version Information VeraCrypt User’s Guide, version 1.19 Released by IDRIX on October 17th, 2016 Legal Notices THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY. THE ENTIRE RISK AS TO THE QUALITY, CORRECTNESS, ACCURACY, OR COMPLETENESS OF THE CONTENT OF THIS DOCUMENT IS WITH YOU. THE CONTENT OF THIS DOCUMENT MAY BE INACCURATE, INCORRECT, INVALID, INCOMPLETE AND/OR MISLEADING. IN NO EVENT WILL ANY AUTHOR OF THE SOFTWARE OR DOCUMENTATION, OR ANY APPLICABLE COPYRIGHT OWNER, OR ANY OTHER PARTY WHO MAY COPY AND/OR (RE)DISTRIBUTE THIS SOFTWARE OR DOCUMENTATION, BE LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A FAILURE OF THIS SOFTWARE TO OPERATE WITH ANY OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT (INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, COPYING, MODIFICATION, OR (RE)DISTRIBUTION OF THIS SOFTWARE OR DOCUMENTATION (OR A PORTION THEREOF), OR INABILITY TO USE THIS SOFTWARE OR DOCUMENTATION, EVEN IF SUCH DAMAGES (OR THE POSSIBILITY OF SUCH DAMAGES) ARE/WERE PREDICTABLE OR KNOWN TO ANY (CO)AUTHOR, INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY.
    [Show full text]
  • State of the Internet 2017 Adobe Acrobat PDF File 897
    State of the Internet 2017 The State of the Internet in New Zealand Table of Contents Welcome to the 2017 State of the Internet report .....................1 Who is InternetNZ ......................................................................... 2 Our key insights ............................................................................. 2 What we are going to do ............................................................. 3 The state of access in New Zealand ......................................... 4 Summary ..........................................................................................9 The state of trust online in New Zealand .....................................10 New Zealanders are concerned about trust on the Internet, but are using is anyway ................................ 10 Unreliable information, fake news and trust .......................... 11 We have some good institutions to bolster trust .................12 New Zealand can do more with trust-boosting technologies.......................................................13 We need more ...............................................................................19 The state of creative potential of the Internet in New Zealand ..........................................................................20 How can we measure “creative potential”? ...........................21 New Zealand creative content online ......................................21 Open data ......................................................................................24 Online tools
    [Show full text]
  • Network Neutrality Adobe Acrobat PDF File 482 KB This
    InternetNZ Network Neutrality in New Zealand Public Discussion Document – June 2015 Network Neutrality InternetNZ invites you to collaborate with us, and the New Zealand Internet Community in understanding Network Neutrality in a New Zealand context. Network Neutrality is the sort of topic that InternetNZ is uniquely positioned to address. Our remit is to work for the Internet Community in all of its facets – business, consumer, government, academic and technical, and bring those perspectives to bear on issues. All of those constituent parts of our New Zealand Internet Community have a perspective on an issue like Network Neutrality, and we believe that uniquely robust and insightful solutions can be found through balancing those perspectives. InternetNZ is also a cause-based organisation in that we stand for the Open Internet. At its heart, Network Neutrality is about ensuring that that openness is preserved, to ensure that the Internet remains a platform for unfettered communication, collaboration and innovation. We have developed this discussion document because we believe that New Zealand will be best served if we start talking about Network Neutrality before there is a problem to solve. We envisage this being an open and collaborative process to develop an understanding of Network Neutrality grounded in the realities of the New Zealand market, and to propose solutions that are also uniquely appropriate to our challenges and opportunities. This document seeks to establish a definition of Network Neutrality to guide discussions; to understand the limitations and challenges of that definition in a New Zealand context, and to establish whether there is any cause for concern about Network Neutrality in the New Zealand market.
    [Show full text]
  • RBUS Final Report Adobe Acrobat PDF File 7.4 MB 01 August
    Current State of Broadband Usage of Rural Communities in New Zealand Final Report By Rural Broadband Usage Survey (RBUS) Project Team School of Engineering, Computer and Mathematical Sciences Auckland University of Technology Auckland, New Zealand August 2018 RBUS Project Team Academic Staff Members: - Dr William Liu - Professor Edmund M-K Lai - Associate Professor Jairo A. Gutierrez - Dr Simon Xiang Student Members: - Rory Knight - Louie Faundo - Chung But - Keli Liu - Khodesh Temita EXECUTIVE SUMMARY A statistical survey of rural residents in New Zealand’s North Island in relation to their current level of broadband access and use was conducted. The goal of this survey is to understand how rural residents and their communities are making use of the improved Internet connections through the Government’s Rural Broadband Initiative (RBI). In addition, the drivers of Internet use that characterizes the importance of the Internet to rural residents are explored. The survey data collection was conducted between February and July 2018, and it had been undertaken from a down-to-earth, grassroots perspective with face-to-face meetings with people living in rural areas. A total of 226 respondents had participated in this survey. The results of this rural broadband usage survey (RBUS) indicate that about 50% of the respondents are satisfied with the speed and the reliability of their Internet connections offered by RBI stage I. However, around 28% of the respondents are still dissatisfied with the Internet speed and connection reliability. The majority of the Internet usage involves searching for basic information and news, online entertainment and banking. There is still a high proportion of respondents who are unsure how else the Internet can help them in their day-to-day activities, e.g., using cloud technology capabilities and online marketing.
    [Show full text]
  • ITU Normal.Dot
    INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION ccTLD Doc 59 Rev 1 STANDARDIZATION SECTOR STUDY PERIOD 2001-2004 Original: English Workshop on Member States' experiences with ccTLD Geneva, 3-4 March 2003 DOCUMENT FOR ccTLD WORKSHOP Source: Co-Chairmen Title: Draft Summary The purpose of this document is to provide a summary of the input contributions to the workshop. In many countries, there is either a formal relation between the government and the operator of the corresponding ccTLD, or there is an informal relation. In many cases, domain names come under the provisions of a general telecommunications law and the government exercises its formal powers, or its informal influence, through the ministry of communications or the telecommunications regulator. In some cases the appropriate government authority supervises the activities of the ccTLD operator and approves their pricing policy if there isn't a competitive registry-registrar model. In many cases, previous informal arrangements are being clarified and/or formalized, under the sponsorship of the government, and in consultation with all concerned parties, because it is held that matters related to the administration and operation of the ccTLD are of public interest. The public interest arises from the growth of the Internet and its use to facilitate electronic commerce and the information society. It appears that there would be interest in, and scope for, agreeing framework "best practices" in certain areas. Indeed, WIPO has developed such for dispute resolution. ICANN states that it has a well-defined mission: to coordinate the administration of the Internet’s systems of unique identifiers (domain names, Internet protocol addresses, and protocol port and parameters numbers).
    [Show full text]
  • World Internet Project
    The World Internet Project International Report 10th Edition THE WORLD INTERNET PROJECT International Report – Tenth Edition December 2019 Jeffrey I. Cole, Ph.D. Director, USC Annenberg School Center for the Digital Future Founder and Organizer, World Internet Project Michael Suman, Ph.D., Research Director Phoebe Schramm, Associate Director Liuning Zhou, Ph.D., Project Manager Interns: Jamilah Hah, Isabella Hernandez, Joanna Kim, Yuhan Mei, Ryan Robbins, Gabrielle Sones, Lara Washington, Emily Zhou Written by Harlan Lebo Production editing by Monica Dunahee World Internet Project International Report – Tenth Edition|i PARTICIPANTS IN THE TENTH EDITION OF THE WORLD INTERNET PROJECT Belgium University of Antwerp www.uantwerpen.be/en/rg/mios/mission-and-members Colombia CINTEL – Centro de Investigación de las Telecomunicaciones www.cintel.org.co Greece EKKE: The National Center for Social Research www.ekke.gr Indonesia Indonesia Internet Service Provider Association (APJII) www.apjii.or.id Middle East Contact: Justin Martin, [email protected] (Egypt, Jordan, Lebanon, Qatar, Saudi Arabia, Tunisia, United Arab Emirates) New Zealand NZ Work Research Institute AUT University of Technology www.workresearch.aut.ac.nz Sweden IIS (The Internet Infrastructure Foundation) www.iis.se www.wii.se For the complete list of international partners in the World Internet Project, see page 43. World Internet Project International Report – Tenth Edition|ii WORLD INTERNET PROJECT International Report Tenth Edition Copyright © 2019 University of Southern California COPIES You are welcome to download additional copies of The World Internet Project International Report for research or individual use. However, this report is protected by copyright and intellectual property laws and cannot be distributed in any way.
    [Show full text]