Download presentation
Presentation is loading. Please wait.
Published byDeirdre Armstrong Modified over 9 years ago
3
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
4
What are the provisioning methods used in the Australian registry systems?
5
The Key points: Object model Web based interface Socket based interface (EPP)
6
The Object Model Registrars – Registrar name, address, telephone Contacts – contact name, organisation, address, telephone, fax, email Hosts – host name, IP address Domains – domain name, name servers, subordinate hosts, associated contacts
7
Object State - Status Objects maintain status Available statuses include: client/server – approved, cancelled, deleteProhibited, hold, rejected, renewProhibited, transferProhibited, updateProhibited inactive, linked, ok, pending pending – delete, transfer, verification
8
Web Based Interface Encrypted and secured using HTTPS(SSL) Good for small volumes Contains most features Limited technical knowledge Standard Web based forms – like objects
9
Socket Interface IETF EPP Protocol Extensible and Customisable SSL Encryption Full Automation Good for high volumes
10
EPP in detail An XML based protocol Full W3C compliant XML schema definition Makes use of XML namespaces Extensibility UTF - Internationalisation Manipulate all properties of objects Transport independent
11
Typical EPP command XML Header EPP Namespace EPP Command Object Specific Namespace Object Specific Information EPP Transaction ID
12
Typical EPP response XML Header EPP Namespace EPP Response Object Specific Namespace Object Specific Information EPP Transaction IDs EPP Response Code EPP Response Message
13
EPP Commands Hello and Greeting Login and Logout Check and Info Create, Modify and Delete Transfer (request, cancel and approve) Poll Status
14
Hello and Greeting Used to establish presence and server capabilities Client says “Hello” Server replies with its capabilities, current time and policies in effect. Sent as soon as transport session established
15
Login and Logout Used to start and stop session based communications Username and password Objects to be managed in that session Client can request policies to be used during that session Credentials used in the login are assumed for all following transactions in the established session
16
Check and Info Used to view information on objects in the registry database Check availability of objects e.g. Domains Names Retrieve the properties of objects you sponsor Retrieve information on other objects using the “authinfo”
17
Create, Modify and Delete Used to manipulate objects in the registry database Create new objects (Domains, Contacts and Hosts) Creating registrar becomes “sponsor” of object Modify details of existing objects that logged in registrar currently “sponsors” Delete objects, objects may fall into a pending delete status depending on policies in effect
18
Transfer (request, cancel and approve) Transfer of objects (Domains and Contacts) Gaining Registrar requests transfer from another Registrar Losing Registrar can approve or reject the transfer depending on policy Transfers will be server approved after a timeout period
19
Poll Used to check the server message queue Low balance messages Transfer request messages Expiry messages Used to acknowledge receipt of messages Also used to keep sessions active
20
Status Commands are atomic i.e. succeed or fail Can look up a command by transaction ID and find out if it succeeded or failed Can get details of previous command
21
Advantages of using EPP Industry standard - IETF Extensible - will support modifications or fit policy Vast array of toolkits available Well-defined atomic operation Full Automation
22
Example of Extensibility NAPTR records in domain create command
24
How are these provisioning systems secured?
25
Security viewed on three Levels Security of systems Authentication of Registrars (Tier 2) Authentication of Registrants
26
Security of systems Physical Security Firewalls – Authorised IPs only Security Policies Data
27
Registrar Authentication 3 Layers Secure Certificate Signed by AusRegistry Access given only to Registrar IP address range EPP Credentials (Username and Password)
28
Registrar Authentication Certificate Common name must match Username Username must match IP addresses being used Certificate must match IP address range Can’t use someone else’s certificate from your addresses
29
Registrant Authentication All domains contain “authinfo” field (domain password) “authinfo” is required to perform operations on domain, especially transfers Exactly how this is implemented is based on policy
30
Questions?
31
Thank you
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.