CRISP Requirements Discussion draft-ietf-crisp-requirements-02.txt Andrew Newton 55 th IETF, November 19, 2002 Atlanta, GA.

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

The Internet Registry Information Service (IRIS) Protocol January 12, 2005 Marcos Sanz, DeNIC Andrew Newton, VeriSign Leslie Daigle, VeriSign.
© 2006 Open Grid Forum OGF19 Federated Identity Rule-based data management Wed 11:00 AM Mountain Laurel Thurs 11:00 AM Bellflower.
IPP Notification and Notification Services White Paper Hugo Parra; Novell, Inc. October 6, 1999 The intent of this paper is to supplement the discussions.
International Telecommunication Union ENUM Issues and Solutions Houlin Zhao Director Telecommunication Standardization Bureau International Telecommunication.
SG-A Ad Hoc - ENUM Jordyn A. Buchanan Register.com February 12, 2001.
Enabling Secure Internet Access with ISA Server
Directory and Trust Services (D&TS) Define an Abstract Model Purpose: Document a common terminology that the group can use between the various tracks Identify.
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
ICANN/ccTLD Agreements: Why and How Andrew McLaughlin Monday, January 21, 2002 TWNIC.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
ECS and LDAP Karen Krivaa Product Marketing Manager.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Lesson 17: Configuring Security Policies
Systems Analysis and Design in a Changing World, 6th Edition
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Networking Chapter 6 Domain Name System.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
MNO Cloud Use Case 2 Source: Rogers Wireless Contact: Ed O’Leary George Babut 3GPP/SA3-LI#43Tdoc SA3LI11_115.
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
Understanding Active Directory
© N. Ganesan, Ph.D., All rights reserved. Active Directory Nanda Ganesan, Ph.D.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
IDN over EPP (IDNPROV) IETF BOF, Washington DC November 2004.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Implementing Secure Shared File Access
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Overview of the Database Development Process
DNS Registries. Overview What is a DNS registry? –DNS registries –Data In –Data Out –Transactions Registry Structure –Registry –Registrars –Registrants.
EREG: an Intelligent Network capability set for User and Infrastructure ENUM Tony Rutkowski VeriSign Switzerland Andrew Newton.
CcTLD/ICANN Contract for Services (Draft Agreements) A Comparison.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 15,
Moodle (Course Management Systems). Managing Your class In this Lecture, we’ll cover course management, including understanding and using roles, arranging.
Computer Emergency Notification System (CENS)
Registries and Registrars Dr Bruce Tonkin Chief Technology Officer Melbourne IT Ltd 3 March 03.
Common PSMFC “data use agreement or policy” Overview of current data sharing in PTAGIS, RMIS, StreamNet.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
June 6, CRISP Overview and Update Andrew Newton VeriSign Labs
Configuring Name Resolution and Additional Services Lesson 12.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
© 2004 VeriSign, Inc. Domain Registry Version 2 (DREG2) Andrew Newton 8 November 2005 IETF 64 CRISP Working Group Vancouver, BC, Canada.
Proposal for RBAC Features for SDD James Falkner Sun Microsystems October 11, 2006.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Jini Architecture Introduction System Overview An Example.
RDMAP/DDP Security Draft draft-ietf-rddp-security-00.txt Jim Pinkerton, Ellen Deleganes, Allyn Romanow, Bernard Aboba.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
1 1 ECHO Extended Services February 15, Agenda Review of Extended Services Policy and Governance ECHO’s Service Domain Model How to…
Review of CCWG-Acct 3 rd Proposal and ALAC Issues Alan Greenberg 04 December 2015.
Session Traversal Utilities for NAT (STUN) IETF-92 Dallas, March 26, 2015 draft-ietf-tram-stunbis Marc Petit-Huguenin, Gonzalo Salgueiro.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
CNNIC Chinese Domain Name Registration System Zhang Wenhui CNNIC China Internet Network Information Center.
Dynamic/Deferred Document Sharing (D3S) Profile for 2010 presented to the IT Infrastructure Technical Committee Karen Witting February 1, 2010.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Models for Resources and Management
draft-ietf-geopriv-lbyr-requirements-02 status update
RMS with Microsoft SharePoint
CE Operating Systems Lecture 21
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
OGF 40 Grand BES/JSDL Andrew Grimshaw Genesis II/XSEDE
Presentation transcript:

CRISP Requirements Discussion draft-ietf-crisp-requirements-02.txt Andrew Newton 55 th IETF, November 19, 2002 Atlanta, GA

7 Security Considerations Option 1: append This document contains requirements for the distribution of queries against a mesh of participants and the possible generation and distribution of index hints both of which could be used in the development of DDoS attacks against the entire mesh or used to create data mining efforts by Direct Marketers (see Section 2.4.7)

7 Security Considerations Option 2: append This document contains requirements for the distribution of queries among a mesh of participating service providers. Protocols proposed to meet these requirements must be able to protect against the use of that distribution system as a vector of DDoS attacks or unauthorized data mining.

3.2.4 Domain Information Lookup Option 1: append The domain information set MUST be able to express and represent arbitrary information and extensions on a individual registry/registrar basis such as license agreements, authorized use policies or extended status notifications and/or marketing/for sale notices.

3.2.4 Domain Information Lookup Option 2: append The domain information set MUST be able to express arbitrary textual information for extensions on a individual service instance basis. Examples of such information are license agreements, authorized use policies, extended status notifications, marketing/for sale notices, and URI references to other sources.

3.2.9 DNS Label Referencing The service MUST use DNS[2] to determine the authoritative source of information about domain names. It is the intention of this requirement that a client be able to determine via DNS and query the servers or set of servers of the domain registry delegating the domain name, the domain registrar responsible for registering the domain name if one is applicable, and the domain registrant of the domain name. The service SHOULD provide procedures or mechanisms to allow this determination if it cannot be done using DNS. This allows the service to operate when an operator chooses not to take advantage of DNS label referencing and during periods of transient or erroneous state of DNS configuration.DNS

3.2.9 DNS Label Referencing Nobody disagrees with it (once it has been explained to them) Nobody likes how it is worded Nobody has suggested alternate text

2.4.7 Abusive Users Option 1: add Abusive users use the directory services of Internet registries as a source of addresses, postal addresses and telephone numbers. Often a direct marketer as associated with junk postal mail, spam/uce and dinner time telephone solicitations.

2.4.7 Abusive Users Option 2: add The directory services of Internet registries are often the target of practices by abusive users. Using information obtained from Internet registries, abusive users undertake certain activities that are counter to the acceptable use of the information as intended by a registry, registrar, or registrant. Many times, these practices violate law in the jurisdiction of the user, registry, registrar, or registrant. One example is the use of Internet registry information for the use of sending unsolicited commercial .

3.2.6 Escrow Support The service MUST provide a means to escrow data of domain registrars to an escrow entity using a common schema. This escrow capability SHOULD be "off-line" and "out-of-band" from the normal operations of the service. Option 1: Since is out of band and out of scope lets remove it. If an entity wishes to use the schemas defined by crisp for escrow that’s fine but escrow has requirements unto its self that may be in opposition to the requirements under discussion.

3.2.6 Escrow Support Option 2: rewording The CRISP schema MAY be usable in other protocols or support systems. As an example, a registrar MAY choose to use the CRISP schema as part of an off-line, out-of-band escrow service in order to enhance the ability to reuse the escrowed data in systems with disparate backed servers"

3.2.6 Serialization Support Option 3: rewording The schemas used by the service SHOULD be capable of off-line serialization. Off-line serialization allows for implementation independent operations such as backup and recovery, load-balancing, etc. This MAY also make possible data escrow capabilities and other usages, however such usages are out of the scope of this document.

3.1.8 Query of Access Levels If a query cannot yield a valid response due to insufficient permissions, the service MUST provide the client with an error response indicating this condition. The service SHOULD NOT provide a mechanism allowing a client to determine if a query will be denied before the query is submitted.

3.1.8 Query of Access Levels Option 1: reword If a query cannot yield a valid response due to insufficient permissions, the service MUST provide the client with an error response indicating this condition. The service MUST provide a mechanism allowing a client to determine if a query will be denied before the query is submitted according to the appropriate policies of the operator.

3.1.4 Level of Access The service MUST allow the classification of data as being either privileged or non-privileged, for the purpose of restricting access to privileged data. Note that this requirement makes no assumption or prescription as to what data (social or operational) might be considered privileged, but merely provides the ability to make the classification as necessary. The service MUST be capable of serving both privileged and non-privileged data. The service MUST be capable of authenticating privileged entities and ensuring that only those entities have access to both privileged and non- privileged data. The service MUST be capable of providing access to non-privileged data without requiring authentication of any type (i.e. anonymous access).

3.1.4 Level of Access Option 1: rework Implies only two levels of access. Rework so that there may be multiple levels of access. No text yet proposed.

3.1.9 Authentication Distribution The service MUST NOT require any Internet registries to participate in any particular distributed authentication system. The service SHOULD allow the participation by an Internet registry in distributed authentication by many centralized authorities.

3.1.9 Authentication Distribution Option 1: reword The service MUST NOT require any Internet registries to participate in specific authentication systems. The service SHOULD allow the participation by an Internet registry in federated, distributed authentication system of their choosing.

3.2.3 Domain Registrant Search The service MUST provide the capability of searching for registrants by exact name match or a reasonable name subset. This search must comply with Result Set Limits.Result Set Limits The service MUST provide a mechanism to distribute this search across all applicable domain registries and registrars. The service SHOULD have a means to narrow the scope of a search to a specific TLD. The service MUST be able to specify to the client an empty result set should the search yield no results.

3.2.3 Domain Registrant Search Option 1: reword The service MUST provide a lightweight mechanism to distribute this search across applicable domain registries and registrars. The service SHOULD have a means to narrow the scope of a search to a specific TLD. The service MUST provide a mechanism to restrict the scope of a search to specific TLDs, registrars and registries. The service SHOULD provide a mechanism for operators to opt-out of this search or series of searches. The service SHOULD NOT distribute queries to operators that have opted out. The service MUST be able to specify to the client an empty result set should the search yield no results.

3.2.3 Domain Registrant Search Option 2: modify option 1 Rework language concerning opt-out so as not to imply an inter-service provider protocol. Such a protocol would be out of scope.

3.2.3 Domain Registrant Search Option 3: rework Remove second paragraph of Add a base requirement (in the 3.1 section) specifying that the following for referrals that they 1) must not be “generic”, 2) must have context and 3) possess the ability to pass back CRISP-opaque tokens.

3.2.5 Nameserver Search The service MAY allow the ability to list all domains hosted by a specific nameserver given the fully-qualified host name or IP address, if applicable, of the nameserver. The service MAY provide a mechanism to distribute this search across all applicable domain registries and registrars.

3.2.5 Nameserver Search Option 1: remove 10,000 & 100,000+ host names on one nameserver make it useless Allows one to recreate a non-published zone file when lots of data mining is allowed. Option 2: modify Make reference to Section Data Mining.

Query Settlements Option 1: add Any search mechanism used to distribute a query to all applicable domain registries and registrars for Nameserver Search (3.2.5) or Domain Registrant Search (3.2.3) MUST contain provisions for cost recovery through a settlements mechanism.

Query Settlements Option 2: Out Of Scope Option 3: Specify the use of CRISP-transparent transaction tokens. Uses of the tokens for financial settlement or other uses are out of scope.