Inter-registrar or registry 1) Change registrar Automation (“instantaneous”) Internal to registrar 2) Change registrant, with default lock to prevent “registrar.

Slides:



Advertisements
Similar presentations
RP Designs Semi-Custom e-Commerce Package. Overview RP Designs semi- custom e-commerce package is a complete website solution. Visitors can browse a catalog.
Advertisements

Intellectual Property Constituency Jane Mutimear.
Improving DNS contents in the RRR world Ólafur Guðmundsson Steve Crocker Oct.
Deficiency Judgments Susan Francis Maryland Volunteer Lawyers Service
© 2003 Public Interest Registry Whois Workshop Introduction to Registry/Registrar Issues Presented by Bruce W. Beckwith VP, Operations June 23, 2003 Serving.
Registrar experiences with WHOIS Bruce Tonkin Melbourne IT Ltd.
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
.| The Trusted Channel Centric Marketplace Domain Name Transfers & Domain Delegation.
DISCLOSURE OF BENEFICIAL OWNERSHIP CROATIAN CENTRAL DEPOSITORY AGENCY (CDA)
Policy Update Marika Konings. Agenda 2 Inter-Registrar Transfer Policy Part C Locking of a Domain Name Subject to UDRP Proceedings Fake Renewal Notices.
CRC Energy Efficiency Scheme How to Trade Allowances GEHO0312BWGD-E-E Last updated: 31/05/2013v3.
IRTP-C: Handling of Address Changes IRTP-C Implementation Review Team Discussion 8 January 2015.
Implementation Recommendation Team (IRT) Proposal Comments Sue Todd, Director, Product Management Monday 11 May 2009, San Francisco.
IBM Software Group © 2006 IBM Corporation IBM ® Workplace Web Content Management Web Publishing Without Pain!
Interim Report Review Inter-Registrar Domain Name Transfers ICANN DNSO Names Council Task Force on Transfers Public Discussion on Transfers of gTLD Names.
Text #ICANN51. Text #ICANN51 15 October 2014 At-large policy round table Holly Raiche Panel 1: Privacy and Proxy 1000 – 1045 Hrs.
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
RAA Update and WHOIS Validation Workshop Moderated by: Volker Greimann, Gray Chynoweth, Kurt Pritz 12 March 2012.
REACH: Protecting Your Supply Chain Georjean L. Adams EHS Strategies, Inc. November 17,
Live Support A “receptionist” on your website (typing) Can answer questions Transfer calls to different departments Take messages Automatically “push”
DNS Registries. Overview What is a DNS registry? –DNS registries –Data In –Data Out –Transactions Registry Structure –Registry –Registrars –Registrants.
1 Conservation Transaction Plug-In (CTP) Tool Overview March 23 & 25, 2010 Tim Pilkowski State Conservation Agronomist Annapolis, MD USDA is an equal opportunity.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Text #ICANN51 15 October :30 - 5:30 pm Board/GNSO Collaboration Group to suggest next steps on EWG Report/registration data services PDP.
David Giza, Stacy Burnette & Pam Little Contractual Compliance Team October 2009 Registrar Stakeholder Group Constituency Meeting.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
RECALL THE MAIN COMPONENTS OF KIM Functional User Interfaces We just looked at these Reference Implementation We will talk about these later Service Interface.
#ICANN49 Inter-Registrar Transfer Policy Part D PDP Working Group.
IRTP Part D PDP WG Items for Review. Items for Review Policy Development Process WG Charter GNSO WG Guidelines.
Starting a Business: LLCs and Other Options. “Business underlies everything in our national life, including our spiritual life. Witness the fact that.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Contractual Compliance Registrar Stakeholder Group Constituency Pam Little 9 March 2010.
Cookies and Sessions IDIA 618 Fall 2014 Bridget M. Blodgett.
1 Agribusiness Library Lesson : Hedging. 2 Objectives 1.Describe the hedging process, and examine the advantages and disadvantages of hedging. 2.Distinguish.
Unit 7 Seminar.  According to Sanderson (2009), the problems with the current paper-based health record system have been well documented. The author.
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
RrSG Working Groups Status Update James M. Bladel, GoDaddy.com Reston, VA Mar 2010.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Registry Functions Essential components for operating a ccTLD registry.
A. Whether dispute options for registrants should be developed and implemented as part of the policy (registrants currently depend on registrars to initiate.
CyberSource 2013 and 2014 Online Fraud Report
1 TX SET Mass Transition Project RMS Update March 15, 2006.
Message Validation, Processing, and Provisioning System (MVPS) Access for Jurisdictions User has SAMS User ID Center for Surveillance, Epidemiology, and.
IRTP Part B PDP Final Report Overview. Background Inter-Registrar Transfer Policy (IRTP) Straightforward process for registrants to transfer domain names.
New FCC Forms 479, 486, and 500 I 2013 Schools and Libraries Fall Applicant Trainings 1 E-rate Program New FCC Forms 479, 486, 500 Proposed Changes.
Inter-Registrar Transfer Policy Part C Presentation of Initial Report.
WIRELESS FRAUD Detection & Prevention. Method of Fraud CLONING of SIM Card.
Margie Milam, Senior Director 27 March 2014 Privacy/Proxy Accreditation Survey Results.
1 Family Education Rights & Privacy Act (FERPA) Training University of Kentucky Registrar’s Office.
© 2013 Pearson Education, Inc., publishing as Prentice Hall. All rights reserved.5-1 Futures Contracts Exchange-traded “forward contracts” Typical features.
Wire Fraud Prevention Training: Setting Your Organizational Structure to Mitigate Fraud Risk and Comply with Regulatory Expectations Presented by: Terri.
5 Smart Suggestions You Required When Purchasing a Made use of Automobile.
Whois & Data Accuracy Across the RIRs. Terms ISP – An Internet Service Provider is allocated address space by an RIR for the purpose of providing connectivity.
Inter-registrar or registry 1) Change registrar Automation (“instantaneous”) Internal to registrar 2) Change registrant, with default safeguard to prevent.
Accounting Principles. GAAP (Generally Accepted Accounting Principles): The rules that govern accounting are called GAAP (Generally Accepted Accounting.
Block Chain 101 May 2017.
Mastercard® Automatic Billing Updater
Policy Advisory Committee .IE namespace
EUG Finance.
IRTP Part D PDP Working Group Update
Registration Renewal Customers are solely responsible for ensuring that any and all domains and additional services are renewed prior to their expiration,
Typical Life Cycle of a Domain Name
Typical Life Cycle of a Domain Name
Registrar of Voter’s Conference
Platform for expert-led researcher services
Platform for expert-led researcher services
Web Information Systems Engineering (WISE)
Update to Google’s review guidelines.
Mastercard® Automatic Billing Updater
Distributed Digital Rights Management
Presentation transcript:

Inter-registrar or registry 1) Change registrar Automation (“instantaneous”) Internal to registrar 2) Change registrant, with default lock to prevent “registrar hopping” NN-day IRT lock Remove NN-day IRT lock 3) Remove the post registrant-change lock Authorize removing the post registrant change lock Policy components Transfer to new registrant Transfer to new registrar Authorize transfer to new registrant Authorize transfer to new registrar

1) Change registrar 2) Change registrant, with default lock to prevent “registrar hopping” Use cases Authenticate for transfer to new registrar Authenticate for transfer to new registrant 3) Waive default “registrar-hopping” safeguard Authenticate to remove the post-change lock NN-day IRT lock Transfer to new registrant Transfer to new registrar Remove NN-day IRT lock

Transfer to new registrar 4) Change registrar, change registrant, with default post-change lock to prevent “registrar hopping” 5) Change registrar, change registrant, waive the post-change lock Use cases Authenticate for transfer to new registrar Authenticate for transfer to new registrant Transfer to new registrant Authenticate for transfer to new registrant Remove NN-day IRT lock Authenticate to remove the post-change lock Transfer to new registrar NN-day IRT lock Transfer to new registrant

6) Minor change to registrant information, with default lock to prevent “registrar hopping” 7) Minor change to registrant information, waiving the post-change lock Use cases Transfer to new registrant Authenticate for transfer to new registrant Transfer to new registrant Authenticate for transfer to new registrant Remove NN-day IRT lock Authenticate to remove the post-change lock NN-day IRT lock

Request to change Registrar Request to change Registrant Request to waive safeguard Authenticate to Δ Registrar Authenticate to Δ Registrant Authenticate to Waive Safeguard ✔ CASE 1: Change Registrar Note: Registrant information fields need to match in this use case. Present the “Registrant info must match” requirement to the registrant (and validate that it does) at the new registrar. Registrars of record that don’t yet comply with RAA uniform WHOIS access rules will fail this authentication. If registrant wants/needs to change registrant info, present the option to switch to Case 4 or 5 (depending on lock choice) Authorize Registrar change Authorize Registrant change Authorize waiver of safeguard ✔ Authenticate to Δ Registrar Authenticate to Δ Registrant Authenticate to Waive Safeguard This falls under current IRTP policy. Mike wants to move his domain from one registrar to another. No other parties involved. Because the Registrant hasn’t changed, Registrant info must remain the same and the “waive lock” option is not needed or presented. Current registrant

✔ Authenticate to Δ Registrar Authenticate to Δ Registrant Authenticate to Waive Safeguard New registrant Request to change Registrar Request to change Registrant Request to waive safeguard CASE 2: Change Registrant ✔ Authenticate to Δ Registrar Authenticate to Δ Registrant Authenticate to Waive Safeguard Current registrant Authorize Registrar change Authorize Registrant change Authorize waiver of safeguard Mary (a business owner) wants to buy a domain from Mike for use in her business. She and Mike are using the same registrar. Because she plans to use the name for a long time, and wants to protect it from hijacking, she leaves the lock in place.

Current registrant ✔ Request to change Registrant Request to change Registrar Request to waive safeguard CASE 3: Waive the Registrar-hopping Safeguard Authenticate to Δ Registrant Current registrant ✔ Authorize Registrant change Authorize Registrar change Authorize waiver of safeguard Susan (a domain investor) wants waive the lock in anticipation of a future transaction. Authenticate to Δ Registrant Authenticate to Δ Registrar Authenticate to Waive Safeguard Authenticate to Δ Registrant Authenticate to Δ Registrar Authenticate to Waive Safeguard Note: Authentication to remove the lock must be very rigorous (preferably out of band, using information that is hard for hijackers to acquire) otherwise hijackers simply do this before they steal the name.

Authenticate to Δ Registrant Authenticate to Δ Registrar Authenticate to Waive Safeguard New registrant ✔ ✔ Request to change Registrant Request to change Registrar Request to waive safeguard CASE 4: Change Registrant AND Registrar ✔ Authenticate to Δ Registrant Authenticate to Δ Registrar Authenticate to Waive Safeguard Current registrant ✔ Authorize Registrant change Authorize Registrar change Authorize waiver of safeguard Ann (an individual) wants to buy a domain from Mike for use for her blog. She and Mike are NOT using the same registrar. Because she plans to use the name for a long time, and wants to protect it from hijacking, she leaves the lock in place.

Authenticate to Δ Registrant Authenticate to Δ Registrar Authenticate to Waive Safeguard New registrant ✔ ✔ ✔ Request to change Registrant Request to change Registrar Request to waive safeguard CASE 5: Change Registrant and Registrar and Waive Safeguard ✔ Authenticate to Δ Registrant Authenticate to Δ Registrar Authenticate to Waive Safeguard Current registrant ✔ ✔ Authorize Registrant change Authorize Registrar change Authorize waiver of safeguard Susan (a domain investor) wants to buy a domain asset from Mike. She and Mike are NOT using the same registrar. Because she wants the flexibility to sell the name, and has sophisticated anti-hijacking of her own, she waives the lock. Note: Authentication to remove the lock must be very rigorous (preferably out of band, using information that is hard for hijackers to acquire) otherwise hijackers simply do this before they steal the name.

CASE 6: Minor Change to Registrant Information Nathalie (a recently married blogger) wants to update her Registrant information to her married name. Because she has no plans to transfer her domain and wants to protectit from hijacking, she declines the opportunity to waive the lock when it’s presented by her registrar. Note: technically this is identical to Use Case 2 ✔ Authenticate to Δ Registrar Authenticate to Δ Registrant Authenticate to Waive Safeguard Current registrant Request to change Registrar Request to change Registrant Request to waive safeguard ✔ Authenticate to Δ Registrar Authenticate to Δ Registrant Authenticate to Waive Safeguard Current registrant Authorize Registrar change Authorize Registrant change Authorize waiver of safeguard

CASE 7: Minor change to Registrant information, waiving the post-change lock Nettie (an unhappy registrar customer) wants to make a minor change to her registrant information. She is willing to waive the safeguard in order to have the option to quickly transfer to a new registrar. Authenticate to Δ Registrant Authenticate to Waive Safeguard Current registrant ✔ ✔ Request to change Registrant Request to change Registrar Request to waive safeguard Authenticate to Δ Registrant Authenticate to Waive Safeguard Current registrant ✔ ✔ Authorize Registrant change Authorize Registrar change Authorize waiver of safeguard Note: Authentication to remove the lock must be very rigorous (preferably out of band, using information that is hard for hijackers to acquire) otherwise hijackers simply do this before they steal the name. Authenticate to Δ Registrant