Thursday Threads: So-called “Internet Kill-switch”, IP address exhaustion, demographics of P2P piracy

Receive DLTJ Thursday Threads:

by E-mail

by RSS

Delivered by FeedBurner

This week of DLTJ Thursday Threads covers a wide range of topics. First, from a public policy perspective, is news that the U.S. Senate has a bill proposing the study of an internet “kill-switch” that some are speculating could behave like what happened in Egypt last week. Next, from a technical perspective, is the fact that we’re running out of IP addresses, which is going to make some engineers’ lives pretty messy before it is ultimately fixed. Lastly, from a research perspective, is a paper that characterizes the demographics of users using peer-to-peer for piracy.

Continuing last week’s sidenote, I think I have found the fundamental problem of why Thursday Threads hasn’t been coming out via e-mail on, well, Thursday. Although the underlying issue still remains, a workaround has been put in place that will hopefully eliminate the symptomps.

Internet ‘Kill Switch’ Legislation Back in Play


Legislation granting the president internet-killing powers is to be re-introduced soon to a Senate committee, the proposal’s chief sponsor told Wired.com on Friday.

The resurgence of the so-called “kill switch” legislation came the same day Egyptians faced an internet blackout designed to counter massive demonstrations in that country.

The bill, which has bipartisan support, is being floated by Sen. Susan Collins, the Republican ranking member on the Homeland Security and Governmental Affairs Committee. The proposed legislation, which Collins said would not give the president the same power Egypt’s Hosni Mubarak is exercising to quell dissent, sailed through the Homeland Security Committee in December but expired with the new Congress weeks later.

The bill is designed to protect against “significant” cyber threats before they cause damage, Collins said.

Wired.com has this article about proposed legislation to “direct the Department of Homeland Security to undertake a study on emergency communications” (the bill’s title). The text of the legislation is not available at this time, but when a similar topic was debated in the last congressional session, the United States Senate Committee on Homeland Security and Governmental Affairs — chaired by Senator Joseph I. Lieberman with Senator Susan M. Collins as ranking minority member — issued a four-page Myth-v-Reality document [PDF]. That bill also seemed to do more than simply request a study — it actually established in the Executive Office of the President an Office of Cyberspace Policy. The bill died before coming up for a vote in the final days of the session. At the time, the American Library Association joined with dozens of other groups to send a letter [PDF] to the committee expression concerns with that version.

There is some really wacky stuff going on here. For instance, the Wired.com article reports on an aide to the Homeland Security committee gave an example when the limited power given to the President would be used: “An example, the aide said, would require infrastructure connected to ‘the system that controls the floodgates to the Hoover dam’ to cut its connection to the net if the government detected an imminent cyber attack.” This, of course, begs the question of “Is the system that controls the floodgates of the Hoover Dam connected to the public internet?” followed closely by “If so, why?” I think this one is going to be worth following to see what happens.

No more IPv4 addresses

The Internet has run out of IPv4 address space.

The Internet Assigned Numbers Authority (IANA) assigned two of the remaining blocks of IPv4 addresses – each containing 16.7 million addresses – to the Asia Pacific Network Information Centre (APNIC) on Tuesday, as predicted.

This action sparks an immediate distribution of the remaining five blocks of IPv4 address space, with one block going to each of the five Regional Internet Registries (RIR).

Internet Protocol (or “IP”) addresses are the unique identifiers that direct traffic from one computer on the network to another. When the experiment that we now know as the Internet was created — known as IP version 4 or “IPv4″ — the number of possible unique addresses was set as 4,294,967,2961. It was thought that such a number would be sufficient for experimental purposes. The internet, of course, has taken on a life of its own, and with the assignment of unique addresses to home computers and cell phones, it was only a matter of time before we ran out.

Well, as stated in the article from Network World where the above quote came from, that time is quickly coming. The very top layer of the IP address bureaucracy assigns addresses in blocks of about 16.8 million to five regional registries that correspond to roughly continental boundaries. Those registries then assign smaller blocks to various internet services providers to use. How long it takes for each regional registry to run out of addresses varies from months to years, but with the exhaustion of the top-level registry the internet engineers know that we have reached the first milestone on that path.

There are various techniques that can be used to stretch the number of addresses, but the end-game is going to be the adoption of IP version 6. IPv6 will give us 340,282,366,920,938,463,463,374,607,431,768,211,456 unique addresses. That’s 340 undecillion, 282 decillion, 366 nonillion, 920 octillion, 938 septillion, 463 sextillion, 463 quintillion, 374 quadrillion, 607 trillion, 431 billion, 768 million, 211 thousand and 456 addresses. Think that will be enough?

A research study identifies who uploads the majority of the content to the P2P piracy networks

Users who publish contents on BitTorrent dedicate a large part of their own resources (bandwidth, storage capacity) and assume the risks involved in publishing contents that are protected by copyright laws. So, is this altruistic behavior or is there some type of economic incentive at work? “The success of BitTorrent is due to the fact that a few users make a large number of contents available in exchange for receiving economic benefits”, explain the authors of a study carried out by the Telematic Engineering Department of the UC3M, Professors Rubén Cuevas, Carmen Guerrero and Ángel Cuevas. Their analysis demonstrates that a small group of users of these applications (around one hundred) is responsible for 66 percent of the content that is published and 75 percent of the downloads. In other words: the great success of a massively used application like BitTorrent depends on a few users.

This quote comes from a summary of a research study presented at 6th International Conference on emerging Networking EXperiments and Technologies (CoNEXT) late last year. It would seem to suggest that if one wanted to shut down piracy on peer-to-peer (P2P) file sharing networks such as BitTorrent that it would only take convincing or eliminating “a few users” to make it happen. That this hasn’t happened perhaps points to the difficulty in locating and stopping those users, but still I thought this made for an interesting read none the less. [Via ACM TechNews from January 26, 2011]

Footnotes

  1. Okay, when one takes out the reserved private addresses and the multicast addresses, the number is somewhere around 4,006,000,000, but who is counting? []