ICANN ICANN Email List Archives

[dns-collab-analysis]


<<< Chronological Index >>>    <<< Thread Index    

Summary & Analysis of Comments [updated]

  • To: "dns-collab-analysis@xxxxxxxxx" <dns-collab-analysis@xxxxxxxxx>
  • Subject: Summary & Analysis of Comments [updated]
  • From: Marc Salvatierra <marc.salvatierra@xxxxxxxxx>
  • Date: Mon, 12 Jul 2010 14:36:46 -0700

Summary & Analysis of Comments [updated]

Submitted by ICANN staff on behalf of Patrick L. Jones, Senior Manager, 
Continuity & Risk Management, ICANN

----------

The Summary & Analysis of Comments on the DNS-CERT Operational Requirements & 
Collaboration Analysis is being updated to include comments submitted by the 
gTLD Registries Stakeholder Group (RySG) as a supermajority statement from the 
stakeholder group on 8 July 2010. The RySG noted during the ICANN Brussels 
meeting that it would be submitting comments on the DNS-CERT Operational 
Requirements & Collaboration Analysis comment period. For completeness and 
transparency, these comments are being included.

----------

Summary & Analysis of Comments for:
DNS-CERT Operational Requirements & Collaboration Analysis

The comment period ran from 24 May to 2 July 2010. Two comments were received, 
and an additional comment from received from the gTLD Registries Stakeholder 
Group on 8 July and included for completeness and transparency. All comments 
can be viewed at 
http://forum.icann.org/lists/dns-collab-analysis/.<http://forum.icann.org/lists/dns-collab-analysis/>

Summary: Bob Hutchinson provided lengthy comments, noting that DNS security and 
stability must be defined with a set of measurable metrics, and that he 
supported ICANN pursuing development of CERT capabilities in conjunction within 
DNS-OARC. Tadeusz Golonka noted that ICANN should not spend money in its 2011 
Budget to create a "cybercrime emergency unit, DNS CERT." The gTLD Registries 
Stakeholder Group (RySG) congratulated ICANN for highlighting DNS stability and 
security to the Internet and DNS security communities as important issues, and 
noted developments at the ICANN Brussels meeting. The RySG also indicated 
several key steps that the Internet community should take before a DNS-CERT is 
contemplated.

Analysis:

Bob Hutchinson noted that the April 2010 DNS-CERT Operational Requirements & 
Collaboration Analysis Workshop lacked representation from Internet Service 
Providers, "which would have brought which would have brought to the discussion 
a broader and more balanced perspective of DNS security and stability gleaned 
from the real-world experience of day-to-day DNS resolver operations."

Hutchinson stated that DNS security and stability must be defined with a set of 
measurable metrics, such as "Name-Resolution-Error-Rate [the % of invalid 
domain-name to
IP resolutions received by a client]." He indicated that "Anecdotal 
scenario-based study, as was done in this workshop, is useful in qualitative 
understanding of the potential failures of DNS - but does not yield the 
quantitative data needed to prioritize a counter-attack. For example, several 
of the scenarios examined are not related to DNS security or stability [malware 
distribution and containing Conficker]- but instead are based upon using DNS as 
a policing mechanism to thwart Internet bad-actors."

Hutchinson also noted that he supported "ICANN pursuing the development of CERT 
capabilities in conjunction within DNS-OARC with the following objectives:

1) instrument DNS to record real-time metrics which reflect an accurate picture 
of the health of the DNS system.
2) document the current support channels for each primary stake-holder group.
3) organize the trusted contacts in each stakeholder group.
4) organize the "interested-parties" contacts in each stakeholder group.

These measures will help ensure DNS remains healthy through the challenges of 
introducing new gTLDs, IDNs, IPv6 and DNSSEC."

Tadeusz Golonka of BPD.pl noted that "I am concerned to hear that ICANN's 2011 
Budget could create a new cybercrime emergency unit, DNS CERT. I am proud of 
what the special polish cybercrime police has accomplished in Poland over last 
few years. These investigators move instantly to track down originators of 
fraud and cyber-attacks.
But now I very worried if ICANN is going to get into the business of 
investigating cyber attacks. You should not try to put ICANN between victims 
and investigators. Let the victims go directly to our Polish special police 
without delay. Do not spend money for these activities with that ICANN's 2011 
Budget."

As noted in the FY2011 Operating Plan & Budget, and in sessions during the 
ICANN meeting in Brussels, ICANN has not provided funding for a DNS-CERT. The 
DNS-CERT Business Case was published in February 2010 for community comment, 
and based on input received, ICANN staff is engaged in collaborative 
discussions with the DNS community to develop a deeper understanding of 
systematic risks and threats to the DNS before a collaborative response 
capability is developed.

The RySG congratulated ICANN for highlighting DNS stability and security to the 
Internet and DNS security communities as important issues, and noted 
developments at the ICANN Brussels meeting, where:

* ICANN Staff indicated that ICANN is not interested in operating the DNS-CERT,
* ICANN reiterated that it has not allocated any funds for the DNS-CERT in the 
FY2011 budget, and
* Important discussions are now taking place about how an industry-led DNS-CERT 
(or CERTs) for Internet and DNS security might be created in and with the 
broader Internet community.

The RySG also cited to the Birds of a Feather session (BOF) in Brussels as "a 
useful step for building and furthering communication, outreach and work" on 
DNS stability and security (Note - the BOF session was community-led and not 
organized by ICANN staff).

The RySG also noted that "the Internet community needs to take a number of key 
steps as an industry-led DNS-CERT or (CERTs) is contemplated:

* There need to be clear statements and substantiation regarding what problems 
need to be solved. There is currently no agreement or documentation regarding 
the threats to DNS security that a DNS-CERT would be established to address.
* There needs to be a proper scoping of the Internet and DNS security problems 
and their potential solutions. The ICANN DNS-CERT Business Case's scope and 
mission was unclear and overly broad. It also remains unclear whether and how 
security needs are already covered by existing entities, how and where any 
unfulfilled needs should be filled, and what ICANN's role should be versus 
industry-led organizations that already exist for response operations.
* There is the problem of buy-in and trust from the various stakeholders that 
own and operate relevant resources across the DNS and Internet.
* A full and balanced gap analysis should be performed, to help understand not 
only the operational work performed by existing institutions, but also their 
scope and mission.

The RySG noted that "these fundamental scope and mission issues must be better 
understood before operational requirements and gap analyses for a DNS-CERT can 
be finalized. The DNS-CERT workshop, to which these particular comments are 
directed, did not address these pre-requisite issues, and while some of the 
discussions in the workshop were helpful, the exercise was premature in some 
ways."

Next Steps:

ICANN staff recognize that community prefers that ICANN not be the operator of 
a DNS-CERT, and the community may prefer other structures. ICANN seeks to 
engage with proposals that another body be considered if funding and 
appropriate guidelines can be developed. The principal role of ICANN going 
forward is to work with others to facilitate the broad-based community 
discussion on the requirement for and best approaches to establishing necessary 
capabilities. ICANN staff will work with the Board and ICANN community to 
establish the approach to most effectively play its facilitating role.

ICANN staff conducted several sessions in Brussels on DNS Security and the 
Strategic Initiatives for a DNS Risk Assessment and DNS-CERT. Community 
representatives also met in a "birds of a feather" discussion to consider 
approaches for a collaborative response capability. The ccNSO, GNSO, SSAC and 
ALAC supported the creation of a cross-constituency working group on ICANN's 
Security Strategic Initiatives.

During the ICANN Brussels meeting, the Governmental Advisory Committee (GAC) 
noted "the GAC supports the ccNSO's decision to work jointly with the GNSO, 
SSAC and ALAC to draft a charter for a potential cross-constituency WG to 
consider further ICANN's proposals regarding the security and stability of the 
DNS. The GAC notes that these issues are of significant public policy interest 
and indicates its willingness to collaborate with other parts of the ICANN 
community on this important issue." See Brussels Communique at 
http://gac.icann.org/system/files/Brussels-communique.pdf.

As suggested by the RySG, ICANN staff is working to compile clear statements 
and substantiation regarding threats to DNS security that a DNS-CERT would be 
established to address. As noted in the Security Strategic Initiatives paper 
published in February 2010, ICANN encourages interested experts and 
stakeholders to participate in gap analysis and DNS Risk Assessment, to help 
understand not only the operational work performed by existing institutions, 
but also their scope and mission.

Commenters:
Bob Hutchinson - http://forum.icann.org/lists/dns-collab-analysis/msg00002.html
Tadeusz Golonka - http://forum.icann.org/lists/dns-collab-analysis/msg00003.html
gTLD Registries Stakeholder Group - 
http://forum.icann.org/lists/dns-collab-analysis/msg00005.html
--
Patrick

--
Patrick L. Jones
Senior Manager, Continuity & Risk Management
Internet Corporation for Assigned Names & Numbers
1101 New York Avenue, NW, Suite 930
Washington, DC 20005
Tel: +1 202 570 7115
patrick.jones@xxxxxxxxx<mailto:patrick.jones@xxxxxxxxx>
patrickjones.tel


<<< Chronological Index >>>    <<< Thread Index    

Privacy Policy | Terms of Service | Cookies Policy