Shared TLD Daily Digest, Aug 23, 1996 - Part 1

-> Modelling the Process
     by "Dave Collier-Brown" 
-> Re: yet more unworkable distributed design, was New Non-Shared TLD's Create More Monopolies
     by "David R. Conrad" 
-> Re: yet more unworkable distributed design, was New Non-Shared TLD's Create More Monopolies
     by chris@kosh.punk.net (Christopher Ambler)
-> Re: yet more unworkable distributed design, was New Non-Shared TLD's Create More Monopolies
     by Michael Dillon 


----------------------------------------------------------------------

Date: 22 Aug 1996 00:22:08 -0700
From: Simon Higgs 
Subject: Re: yet more unworkable distributed design

At 10:34 PM -0700 8/21/96, Michael Dillon wrote:

>> >Then let's have a PERSON identifier that is stored at the CDB. When
>> >designing the actual record layouts I favor the following technique:
>> >
>> [SNIP]
>>
>> How is this different from the whois contact id?
>
>The whois contact id is internally generated within the Internic. I'm
>suggesting a standard id code that will be used by all international TLD's
>and maintained in the CDB.
>

So why not use the InterNIC ID's? NSI have no proprietry right to them.
Plus, if and when .COM et al become shared, every single InterNIC whois
contact will need to be renumbered to the shared scheme.

There are two choices:

1. Create a new scheme and make InterNIC renumber later. This creates a
   big headache when the time comes.
2. Use InterNIC ID's and force InterNIC to honor those created by other
   registries. This more or less forces InterNIC into sharing at least
   a minor portion of the registration process right from the start.

The less painful is going to be 2.

>> OK, so the update requested can be verified via email before it's
>> completed. Which is exactly why the key could be the From: address (or PGP
>> or any other method).
>
> From addresses can be forged
>And most people will never use a PGP key.
>

You're talking in circles, and appear to have completely missed the point.
The method the key uses is more or less irrelevent, but the necessity for a
key of some kind isn't. If the registry sends a verify message to the From:
address, and it is replied to in the correct manner, then it's authentic.
This is the same method First Virtual use. You can't forge it.


_____S_i_m_o_n___H_i_g_g_s_________________H_i_g_g_s___A_m_e_r_i_c_a_____
... "I'm fine - it's the others" ......... President/CEO ................
_____e-mail: simon@higgs.com _____________ http://www.higgs.com/ ________
... http://ds.internic.net/internet-drafts/draft-higgs-tld-cat-02.txt ...




----------------------------------------------------------------------

Date: 22 Aug 1996 12:42:58 -0700
From: "Richard J. Sexton" 
Subject: Re: yet more unworkable distributed design

At 10:34 PM 8/21/96 -0700, you wrote:
>On Wed, 21 Aug 1996, Simon Higgs wrote:
>And most people will never use a PGP key.

They will if they want to change THEIR nameserver...



----------------------------------------------------------------------

Date: 22 Aug 1996 12:43:29 -0700
From: "Richard J. Sexton" 
Subject: Re: yet more unworkable distributed design, was New Non-Shared  TLD's Create More Monopolies

At 12:37 PM 8/21/96 -0400, you wrote:

>information gets hard. Perhaps we should abandon the old style NIC
>handles -- thoughts?
>
>Perry


Perhaps extend them, ie:

        internic.net:rs79




----------------------------------------------------------------------

Date: 22 Aug 1996 12:43:36 -0700
From: "Richard J. Sexton" 
Subject: Re: yet more unworkable distributed design

At 04:19 PM 8/21/96 -0700, you wrote:
>On Wed, 21 Aug 1996, Simon Higgs wrote:
>
>> We need the handles to identify a specific record in a specific table.
>
>Sequentially assigned numbers will do that.

Yes, but not as well.

NEXT



----------------------------------------------------------------------

Date: 22 Aug 1996 13:03:11 -0700
From: Michael Dillon 
Subject: Re: yet more unworkable distributed design

On Thu, 22 Aug 1996, Richard J. Sexton wrote:

> At 10:34 PM 8/21/96 -0700, you wrote:
> >On Wed, 21 Aug 1996, Simon Higgs wrote:
> >And most people will never use a PGP key.
>
> They will if they want to change THEIR nameserver...

No they won't. They will bitch and complain to whoever will listen and the
whole pool of shared-TLD registries will be tarred with the same brush as
the Internic. There is no point in doing shared-TLD's unless it addresses
the needs of the customers, i.e. end users.

Most people don't understand this PGP stuff, don't see why they need it,
don't know where to buy it for their email program, don't understand how
to use it and don't remember where they put their PGP key when they
upgraded to a new notebook. PGP is *NOT* for the masses, at least not
anytime soon.

Michael Dillon                   -               ISP & Internet Consulting
Memra Software Inc.              -                  Fax: +1-604-546-3049
http://www.memra.com             -               E-mail: michael@memra.com



----------------------------------------------------------------------

Date: 22 Aug 1996 13:46:39 -0700
From: Kent Crispin 
Subject: Re: yet more unworkable distributed design

Michael Dillon allegedly said:
>
> On Thu, 22 Aug 1996, Richard J. Sexton wrote:
>
> > At 10:34 PM 8/21/96 -0700, you wrote:
> > >On Wed, 21 Aug 1996, Simon Higgs wrote:
> > >And most people will never use a PGP key.
> >
> > They will if they want to change THEIR nameserver...
>
> No they won't. They will bitch and complain to whoever will listen and the
> whole pool of shared-TLD registries will be tarred with the same brush as
> the Internic. There is no point in doing shared-TLD's unless it addresses
> the needs of the customers, i.e. end users.
>
> Most people don't understand this PGP stuff, don't see why they need it,
> don't know where to buy it for their email program, don't understand how
> to use it and don't remember where they put their PGP key when they
> upgraded to a new notebook. PGP is *NOT* for the masses, at least not
> anytime soon.

Of course, people requesting domain names generally aren't "the
masses", by any stretch.  But even so, I agree with Michael.  The
authority controlling a domain will be mediated through
current standard business practices -- phone, snailmail, email, and
human signatures.  I would guess that it will be on the order of 10
years before there is a PK infrastructure in place.

- --
Kent Crispin				"No reason to get excited",
kent@songbird.com,kc@llnl.gov		the thief he kindly spoke...
PGP fingerprint:   B6 04 CC 30 9E DE CD FE  6A 04 90 BB 26 77 4A 5E


----------------------------------------------------------------------

Date: 22 Aug 1996 14:53:13 -0700
From: Simon Higgs 
Subject: Re: yet more unworkable distributed design

At 1:44 PM -0700 8/22/96, Kent Crispin wrote:

>Of course, people requesting domain names generally aren't "the
>masses", by any stretch.  But even so, I agree with Michael.  The
>authority controlling a domain will be mediated through
>current standard business practices -- phone, snailmail, email, and
>human signatures.  I would guess that it will be on the order of 10
>years before there is a PK infrastructure in place.
>

You mean like the ability to have individualized key certificates in
current versions of Netscape Navigator & Internet Explorer? It's (maybe) 10
months, not ten years. And that puts us right on schedule.

The following authentication schemes that are working right now are
RSA-key, reply-authenticated email, and paper signature. What exactly is
the problem with adopting them?


_____S_i_m_o_n___H_i_g_g_s_________________H_i_g_g_s___A_m_e_r_i_c_a_____
... "I'm fine - it's the others" ......... President/CEO ................
_____e-mail: simon@higgs.com _____________ http://www.higgs.com/ ________
... http://ds.internic.net/internet-drafts/draft-higgs-tld-cat-02.txt ...




----------------------------------------------------------------------

Date: 22 Aug 1996 15:36:21 -0700
From: Kent Crispin 
Subject: Re: yet more unworkable distributed design

Simon Higgs allegedly said:
>
> At 1:44 PM -0700 8/22/96, Kent Crispin wrote:
>
> >Of course, people requesting domain names generally aren't "the
> >masses", by any stretch.  But even so, I agree with Michael.  The
> >authority controlling a domain will be mediated through
> >current standard business practices -- phone, snailmail, email, and
> >human signatures.  I would guess that it will be on the order of 10
> >years before there is a PK infrastructure in place.
> >
>
> You mean like the ability to have individualized key certificates in
> current versions of Netscape Navigator & Internet Explorer? It's (maybe) 10
> months, not ten years. And that puts us right on schedule.
>
> The following authentication schemes that are working right now are
> RSA-key, reply-authenticated email, and paper signature. What exactly is
> the problem with adopting them?

None, that I can see.  I was replying to a statement by Michael
(attached below, in case you've forgotten the thread), to the effect
that we couldn't *require* PK authentication of domain name owners.
To clarify my statement -- I don't believe that we will have a
sufficient PK infrastructure that we can *require* a customer to
maintain a digital signature for many years to come.  As you say,
technically it is available now.  But the question I was addressing is
whether a registry can *require* a customer to maintain one.

I guess the model being contested here is this: the customer receives
a secret key (or a certificate of some sort) for the domain name, and
uses a secret key to prove to another registry that the domain name
can be moved.

IMHO, this is completely unrealistic, and it would be downright
foolish to build it into the desig.  To paraphrase you, mechanisms to
handle these issues are completely in the business and legal world.

Attached message:

Michael Dillon allegedly said:
>
> On Thu, 22 Aug 1996, Richard J. Sexton wrote:
>
> > At 10:34 PM 8/21/96 -0700, you wrote:
> > >On Wed, 21 Aug 1996, Simon Higgs wrote:
> > >And most people will never use a PGP key.
> >
> > They will if they want to change THEIR nameserver...
>
> No they won't. They will bitch and complain to whoever will listen and the
> whole pool of shared-TLD registries will be tarred with the same brush as
> the Internic. There is no point in doing shared-TLD's unless it addresses
> the needs of the customers, i.e. end users.
>
> Most people don't understand this PGP stuff, don't see why they need it,
> don't know where to buy it for their email program, don't understand how
> to use it and don't remember where they put their PGP key when they
> upgraded to a new notebook. PGP is *NOT* for the masses, at least not
> anytime soon.
>

- --
Kent Crispin				"No reason to get excited",
kent@songbird.com,kc@llnl.gov		the thief he kindly spoke...
PGP fingerprint:   B6 04 CC 30 9E DE CD FE  6A 04 90 BB 26 77 4A 5E


----------------------------------------------------------------------

Date: 22 Aug 1996 15:45:18 -0700
From: John Leslie 
Subject: Re: New Non-Shared TLD's Create More Monopolies

Kent Crispin wrote:
>
> A database that is the single, central, authorative repository of all whois
> data, and all SLD registrations is over my warning threshold for
> abuse potential.  It is also a risk for single point of failure.

   Agreed.

> Frankly, I would prefer a solution that does not have a central CDB of
> any type.  I would trade off a fair amount of short term simplicity,
> reliability, and performance to meet that goal, because I think in the
> long run it actually is a better model -- registrations should
> continue without a hitch if an earthquake sank IANA and its computers
> beneath the ocean.

   I really think it's asking a bit much to say "without a hitch". Would
you settle for "within 24 hours"?

   I'd like to see the CDB manage a DNS referring inquiries to the
appropriate registry; mirrored by a bunch of sites, so that if an
earthquake sank it the domain-lookup services would continue without
a hitch.

   Registrations, however, would need to stop until the mirror sites
could agree on what replacement site to mirror. This seems to me an
acceptable risk...

   Also, when I speak of it being a "light" CDB, I mean it. I don't
want the CDB to be authoritative about anything but the association
between domain name and currently-responsible registry. If one or
more registries wants to contract with the CDB to serve up more info
than a simple redirection, that's between the two of them -- no other
registry should need to know or care about that arrangement.

   I can see how it's academically more satisfying to have a "CDB-less"
arrangement; but to be honest, all the ways of doing that increase the
complexity of the system, either at the registry level or the end-user
inquiry level. IMHO, we're better off with something we can implement
without writing new code.

- --
John Leslie 


----------------------------------------------------------------------

Date: 22 Aug 1996 17:04:44 -0700
From: Simon Higgs 
Subject: Re: yet more workable distributed design

At 3:34 PM -0700 8/22/96, Kent Crispin wrote:

>Simon Higgs allegedly said:
>>
>> At 1:44 PM -0700 8/22/96, Kent Crispin wrote:
>>
>> >Of course, people requesting domain names generally aren't "the
>> >masses", by any stretch.  But even so, I agree with Michael.  The
>> >authority controlling a domain will be mediated through
>> >current standard business practices -- phone, snailmail, email, and
>> >human signatures.  I would guess that it will be on the order of 10
>> >years before there is a PK infrastructure in place.
>> >
>>
>> You mean like the ability to have individualized key certificates in
>> current versions of Netscape Navigator & Internet Explorer? It's (maybe) 10
>> months, not ten years. And that puts us right on schedule.
>>
>> The following authentication schemes that are working right now are
>> RSA-key, reply-authenticated email, and paper signature. What exactly is
>> the problem with adopting them?
>
>None, that I can see.  I was replying to a statement by Michael
>(attached below, in case you've forgotten the thread), to the effect
>that we couldn't *require* PK authentication of domain name owners.
>To clarify my statement -- I don't believe that we will have a
>sufficient PK infrastructure that we can *require* a customer to
>maintain a digital signature for many years to come.  As you say,
>technically it is available now.  But the question I was addressing is
>whether a registry can *require* a customer to maintain one.
>
>I guess the model being contested here is this: the customer receives
>a secret key (or a certificate of some sort) for the domain name, and
>uses a secret key to prove to another registry that the domain name
>can be moved.
>
>IMHO, this is completely unrealistic, and it would be downright
>foolish to build it into the desig.  To paraphrase you, mechanisms to
>handle these issues are completely in the business and legal world.
>

Ahem... the whole point of providing a field for a key in a particular
record is that it *COULD* get used, not that it MUST get used. It's really
stupid to leave it out of the design. Record hi-jacking is a legal
liability for the registry. Two fields in the database and it becomes the
applicants problem.

Remember, it's not the job of the registry to provide the key, it's the job
of the applicant. If they don't, no big deal, except the record is not
secure. All the registry has to do is perform due diligence in verifying a
key while performing an update. Guardian does this job right now, and uses
two fields - one to describe  the type of key, and the other for the key
itself. Let's include this model in pencil and move on.


_____S_i_m_o_n___H_i_g_g_s_________________H_i_g_g_s___A_m_e_r_i_c_a_____
... "I'm fine - it's the others" ......... President/CEO ................
_____e-mail: simon@higgs.com _____________ http://www.higgs.com/ ________
... http://ds.internic.net/internet-drafts/draft-higgs-tld-cat-02.txt ...




----------------------------------------------------------------------

Date: 22 Aug 1996 17:34:38 -0700
From: Kent Crispin 
Subject: Re: yet more workable distributed design

Simon Higgs allegedly said:
>
>
> Ahem... the whole point of providing a field for a key in a particular
> record is that it *COULD* get used, not that it MUST get used. It's really
> stupid to leave it out of the design. Record hi-jacking is a legal
> liability for the registry. Two fields in the database and it becomes the
> applicants problem.
>
> Remember, it's not the job of the registry to provide the key, it's the job
> of the applicant. If they don't, no big deal, except the record is not
> secure. All the registry has to do is perform due diligence in verifying a
> key while performing an update. Guardian does this job right now, and uses
> two fields - one to describe  the type of key, and the other for the key
> itself. Let's include this model in pencil and move on.

OK -- Of course you realize that I think a central database of this
stuff is a bad idea, and I will still try to find a better one.  But
onward!  :-)



- --
Kent Crispin				"No reason to get excited",
kent@songbird.com,kc@llnl.gov		the thief he kindly spoke...
PGP fingerprint:   B6 04 CC 30 9E DE CD FE  6A 04 90 BB 26 77 4A 5E


----------------------------------------------------------------------

Date: 22 Aug 1996 18:12:04 -0700
From: Michael Dillon 
Subject: Re: yet more unworkable distributed design

On Thu, 22 Aug 1996, Simon Higgs wrote:

> The following authentication schemes that are working right now are
> RSA-key, reply-authenticated email, and paper signature. What exactly is
> the problem with adopting them?

This is just a bunch of meaningless technical jargon to most people. The
business people who make the decisions and order the domain names just
don't understand this stuff and too many of their technical "experts"
don't have a clue about it either. Only Internet cultists know and use
this kind of stuff.

Michael Dillon                   -               ISP & Internet Consulting
Memra Software Inc.              -                  Fax: +1-604-546-3049
http://www.memra.com             -               E-mail: michael@memra.com



----------------------------------------------------------------------

Date: 22 Aug 1996 18:12:15 -0700
From: Michael Dillon 
Subject: Re: New Non-Shared TLD's Create More Monopolies

On Thu, 22 Aug 1996, John Leslie wrote:

> > A database that is the single, central, authorative repository of all whois
> > data, and all SLD registrations is over my warning threshold for
> > abuse potential.  It is also a risk for single point of failure.
>
>    Agreed.

Having a single point of failure is a GOOD THING (tm). This makes it easy
to secure that single point and guard against having it fail utterly and
completely.

> > registrations should
> > continue without a hitch if an earthquake sank IANA and its computers 
> > beneath the ocean.
>
>    I really think it's asking a bit much to say "without a hitch". Would
> you settle for "within 24 hours"?

No! 20 minutes at the absolute maximum. The backup system should be live
and in place just waiting for a human to confirm that it REALLY is
a catastrophic failure that requires the backup to take over.

On the other hand you could probably develop a failover protocol between
the two CDB sites that would be able to hand off in much less time
although it is still good to have some sort of damping algorithm to
prevent a hot potato situation.

>    I'd like to see the CDB manage a DNS referring inquiries to the
> appropriate registry; mirrored by a bunch of sites, so that if an
> earthquake sank it the domain-lookup services would continue without
> a hitch.

In fact, the domain-lookup services should not be handled by the true
central database site at all.


Michael Dillon                   -               ISP & Internet Consulting
Memra Software Inc.              -                  Fax: +1-604-546-3049
http://www.memra.com             -               E-mail: michael@memra.com



----------------------------------------------------------------------

Date: 22 Aug 1996 20:02:59 -0700
From: "Dave Collier-Brown" 
Subject: Modelling the Process

[oops, mailtool doesn't like forwarding mime messages...]
- ----- Begin Included Message -----

>From hobbes.ss.org!davecb@lethe.ss.org Thu Aug 22 19:47:32 1996
Return-Path: 
Received: from lethe.uucp by hobbes.ss.org (4.1/SMI-4.1-1)
	id AA00312; Thu, 22 Aug 96 19:47:30 EDT
Received: from ntigate.rich.nt.com by ss.org with smtp (Smail3.1.29.1) id m0uteC0-00024XC; Thu, 22 Aug 96 14:09 EDT
X400-Received: by mta NT.COM in /PRMD=NT/ADMD=MCI/C=US/; Relayed;
               Thu, 22 Aug 1996 18:06:16 +0000
X400-Received: by /PRMD=NT/ADMD=MCI/C=US/; Relayed;
               Thu, 22 Aug 1996 17:55:51 +0000
X400-Received: by /PRMD=NT/ADMD=MCI/C=US/; Relayed;
               Thu, 22 Aug 1996 17:57:48 +0000
X400-Received: by /PRMD=NT/ADMD=MCI/C=US/; Relayed;
               Thu, 22 Aug 1996 17:57:47 +0000
Date: Thu, 22 Aug 1996 17:57:47 +0000
X400-Originator: davecb@hobbes.ss.org
X400-Recipients: non-disclosure:;
X400-Mts-Identifier: [/PRMD=NT/ADMD=MCI/C=US/;<321C9F9B.794BDF32@hobbes.ss.org]
X400-Content-Type: P2-1984 (2)
Content-Identifier: Modelling the...
From: David Collier-Brown 
Sender: davecb@hobbes.ss.org
Message-Id: <321C9F9B.794BDF32@hobbes.ss.org>
To: "Collier-Brown, David" 
Cc: David Collier Brown 
Subject: Modelling the Process
Organization: The Orville Torpid family and friends
X-Mailer: Mozilla 2.02 (X11; I; SunOS 4.1.4 sun4m)
Mime-Version: 1.0
X-Url: file:/tmp_mnt/net/nbrws3e5/export/home/davecb/projects/done/tld/Model.html
Content-Type: multipart/mixed; boundary="------------15FB748359E2B6001CFBAE39"
Status: R

This is a multi-part message in MIME format.

- --------------15FB748359E2B6001CFBAE39
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Well, it's time t ocomment on requirements next (as I promised
all too many moons ago).  This is the partially-proofread example

As with the appreciation, I'll upload it to a web site presently.
- --dave
- --
David Collier-Brown,  | Always do right. This will gratify some people
185 Ellerslie Ave.,   | and astonish the rest.        -- Mark Twain
Willowdale, Ontario   | davecb@hobbes.ss.org, unicaat.yorku.ca
N2M 1Y3. 416-223-8968 | http://java.science.yorku.ca/~davecb

- --------------15FB748359E2B6001CFBAE39
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline; filename="Model.html"




Modelling the Process 



Introduction 

This is a background note on what can happen between a customer, a registry and a domain-name, from the point of view of a coordinating database service (a CDB).

It provides enough data to start discussion of policy issues, and given a decision on them, to start modelling what the CDB must be able to do. In other words, start specifying the requirements for a CDB.

This is a technique blatantly stolen from Dr. Jonathan Ostroff of York University's course on designing safety-critical systems, but without the rigor and expertise Jonathan could bring to bear. In fact. it's a subset of the real thing: the author admits to being no more than an interested amateur.



Modeling 

We represent a customer by C, a registry by R and a domain-name by d, and claim that we take one each of C, R and d to create a new relationship in the coordinating database (CDB). To represent the result we say (C,R,d). 

Having this relation is the desired state. We get into it by joining the three with a successfull allocation from the cloud of unclaimed names and a contract of a simple sort. As a diagram this is 

	C R d ---> (C,R,d)

This is the easy case, and one which has been discussed to a reasonable degree in the mailing list. The hard cases involve the dissolution of this relationship and their recreation. There are three ways we can break up the three-tuple: (C,R) d, (C,d) R, C (R,d) and C R d. 

C R d is just our starting state, and is the ``normal'' dissolution. The others are (C,d) R, a customer leaves a registry with ``his'' domain under his arm, C (R,d), a customer abandons his domain name to a registry (or is tossed out without it for non-payment), and (C,R) d, a domain is pried out of the hands of a registry and customer, leaving they standing there looking stunned.

This enumeration raises the first question: should the domain name go with the customer, the registry or neither if one or the other leaves? This is the first policy question I mentioned above.

I'm going to prejudge it for a moment, purely to be able to draw a pretty picture farther down the page, and pretend that we've let it go with the customer. This raises a second policy question, and the question of time: Should a domain remain with a customer who lacks a registry? And if so, forever or for some specific time? 


The Nice-Looking Diagram 

Given this much background, I can finally draw the picture I doodled on the coffee-table:

The blob in the middle is the desired state of the world. Each arc is an action, each of which takes some definite time. We can then represent two outcomes of a customer leaving: the error state after unit-of-time t or the making of a new relationship with registry R' (r-prime).

Since this mess is of very moderate size, we can analyze it by exhaustively listing the outcomes, annotating them with what the CDB needs to do on each and what to do on error, including on timeout.

And then we can specify what the ``safe'' transitions are, by stating an answer to all the policy questions. The result is a from of specification of the correct functioning of the CDB.

And I can relax the prejudice I was showing above and consider both (C,d) R and C (R,d). 



The States, Transitions and their Effects


Successfull Domain-Name Allocation 



C,R,d  --> (C,R,d)

The result of this is 

CDB creates the record 
DNS and whois data is recorded 
the domain name is no longer available for claim 


Unsuccessfull Allocation

C,R,d--> no change 
The name is already taken, the customer needs to select another. 


A Customer Leaves with his Domain 

(C,R,d) --> (C,d) R 
CDB takes R out of record, which now relates only C,r 
Question: 
Does the DNS data stays the same? 
point to R? 
point to C? 
point to hyperspace? 
disappear?