Categories
Articles

BEREC Net Neutrality Guidelines: good news for security

BEREC, the board of European Telecoms Regulators, has just published its updated guidance on enforcing the Network Neutrality Regulation. Jisc has been working with the Forum of Incident Response and Security Teams (FIRST) for nearly five years to ensure that this legislation and guidance didn’t discourage legitimate practices to secure the operation of networks: this […]

Categories
Articles

BEREC clarifies that permanent network security measures may be OK

Four years ago, Jisc responded to the Board of European Regulators of Electronic Communications (BEREC) consultation on network neutrality to point out that some security measures cannot just be temporary responses by the victims of attacks, but need to be permanently configured in all networks to prevent them being used for distributed denial of service […]

Categories
Articles

Net Neutrality: BCP-38 Seems OK

The Board of European Regulators of Electronic Communications (BEREC) have now released the final version of their net neutrality guidelines, following a public consultation that received nearly half a million responses. These seem to have resulted in clarifications of the draft version, rather than any significant change of policy. Jisc’s response raised a concern that […]

Categories
Consultations

Network Neutrality and Network Security

A new EU law, created earlier this year, requires public network providers to ensure “network neutrality” – roughly, that every packet be treated alike unless there are legitimate reasons not to. The Body of European Regulators of Electronic Communications (BEREC) has now published draft guidelines on how this will be implemented, in particular the circumstances […]

Categories
Articles

Network Neutrality and Network Security

There’s a tension between network neutrality – essentially the principle that a network should be a dumb pipe that treats every packet alike – and network security, which may require some packets to be dropped to protect either the network or its users. Some current attacks simply can’t be dealt with by devices at the […]

Categories
Articles

“Internet” means Open Internet

A couple of developments in network neutrality. The Broadband Stakeholders Group have announced an update to its Open Internet Code of Practice, which has already been signed by a number of UK ISPs. The previous version of this voluntary code concentrated on transparency, by requiring those who signed up to document their traffic management practices. […]

Categories
Articles

Internet Invariants – things worth fighting for

Leslie Daigle, Chief Internet Technology Officer of the Internet Society (ISOC) talked about the Society’s eight “Internet invariants” in the closing plenary session of TERENA’s Networking Conference 2012. The invariants are key features of the Internet that make it such a good platform for innovation and whose loss might harm the network’s ability to support […]

Categories
Articles

Are We Too Late for IPv6 Transition?

[This post was originally published on the TERENA conference blog] Tuesday morning at the TERENA Networking Conference 2012 began with an entertaining and important call to action by Geoff Huston, on why we may have left transition to IPv6 too late and the serious consequences for open Internet connectivity that could result. It was recognised […]

Categories
Articles

Re-opening the Internet?

Two recent news stories suggest that the importance of open Internet connectivity is gaining increasing international recognition. The UN’s Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression has published a report stressing the importance both of making internet infrastructure available to as much of the world’s population […]

Categories
Articles

Net Neutrality: Responses to EC Consultation

The European Commission has published an overview report of the responses to its recent consultation on network neutrality. It seems that respondents agreed that “traffic management is a necessary and essential part of the operation of an efficient internet” and that its use to address security and congestion issues is entirely legitimate. However there appears […]