ICANN ICANN Email List Archives

[fast-flux-initial-report]


<<< Chronological Index >>>    <<< Thread Index    

Summary of Public Comments on the Fast Flux Hosting Initial Report

  • To: "fast-flux-initial-report@xxxxxxxxx" <fast-flux-initial-report@xxxxxxxxx>
  • Subject: Summary of Public Comments on the Fast Flux Hosting Initial Report
  • From: Marika Konings <marika.konings@xxxxxxxxx>
  • Date: Wed, 18 Feb 2009 02:28:24 -0800

Summary of Public Comments on the Fast Flux Hosting Initial Report

This summary is not a full and complete recitation of the comments received. It 
is an attempt to capture in broad terms the nature and scope of the comments. 
This summary has been prepared in an effort to highlight key elements of these 
submissions in an abbreviated format, not to replace them. Every effort has 
been made to avoid mischaracterizations and to present fairly the views 
provided.  Any failure to do so is unintentional. The comments may be viewed in 
their entirety at http://forum.icann.org/lists/fast-flux-initial-report/.

Summary of public comments for:

Fast Flux Hosting (Initial Report)

Comment period ended: 15 February 2009

Summary published: 18 February 2009

Prepared by: Marika Konings, Policy Director

Background

In May 2008, the GNSO Council initiated a Policy Development Process (PDP) and 
called for the creation of a working group on fast flux. The working group was 
asked to consider a number of questions relating to fast flux. The Fast Flux 
Working Group started its deliberations in June 2008 and published an Initial 
Report. In this report, the Working Group provided initial answers to the 
charter questions, drew interim conclusions and provided a number of ideas for 
possible next steps. The public comment period was created to solicit feedback 
from the Internet community on the Fast Flux Hosting Initial Report.

Summary and Analysis

The comment period ran from 26 January to 15 February 2009. Twenty-five 
comments were received, including two from GNSO Constituencies. The public 
comments on this forum are archived at 
http://forum.icann.org/lists/fast-flux-initial-report/.

The relevant comments below are listed in the order they were received.

Michael Brusletten (Spacesquad AntiSpam Services): Brusletten notes that 'fast 
flux hosting needs to have strict laws put in place to allow registrars and 
hosting companies to terminate the offenders that that try to use these 
schemes'. He adds that fast flux hosting is not only used by criminals to 
distribute spam, but also for the distribution of malware and computer viruses. 
He understands 'the problems and complexities of shutting [criminals] down', 
but notes that 'registrars and hosting companies are in the unique position to 
get this done'. He fears that if no measures are put in place to address fast 
flux hosting, 'it will just continue to get worse'.

Bill Woodcock (Packet Clearing House): Woodcock comments on behalf of Packet 
Clearing House which 'is a not-for-profit global authoritative DNS 
infrastructure provider to nearly sixty top-level domains, operating servers on 
six continents'. In his comments he raises a point that he feels the report has 
not taken into account: the increased use of fast flux hosting 'has led to a 
radical change of paradigm in the distribution of DNS record changes from 
registries to their authoritative nameservers. Whereas the majority of 
registries used to publish zone updates on, at most, a daily basis, many now 
flood the network with a constant stream of updates, and consider propagation 
delays of more than a few seconds problematic'. He notes that this development 
has 'worsened the digital divide' on two fronts:
-       'First, accepting this flood of illegitimate changes poses a cost in 
Internet bandwidth, and ultimately money, to anyone who would spread 
authoritative nameserves among development countries'. In addition, 'because it 
floods constricted circuits, it can cause incremental zone transfer processes 
to fail, taking servers offline for hours or days at a time'.
-       Secondly, Registry Service Level Agreements (SLAs) 'catering to the 
fast-flux market now promise that DNS servers will be purposely removed from 
service if they're unable to keep up with, or lose connectivity from, the flood 
of fast-flux changes. [...] Countries that suffer incidents of national 
disconnection are usually those already laboring under the heaviest burdens: 
Pakistan, Sri Lanka, and Zimbabwe, for example'.
Woodcock concludes that 'these are significant degradations of the quality of 
service offered by the domain name system, and they disproportionately and 
unfairly burden those who already find themselves on the wrong side of the 
digital divide'.

R Atkinson (individual):  Atkinson notes that the Fast Flux Initial report 
fails to recognize a number of 'legitimate uses for DNS records with very low 
TTL values' such as mobility support (short TTL values for the DNS A/PTR) or 
renumbering of a network (short TTL values for A/PTR, MX/KK/other DNS records). 
He recommends that a clearer distinction is made in the report between 
'legitimate reasons to have DNS records with low TTL values [and] cases where a 
particular DNS record type has a low TTL value for no obvious reason'. In his 
comment he provides a number of links to papers on the use of DNS for Internet 
mobility and notes that active research in this area is undertaken by a number 
of groups (examples of current research projects are referenced). He recommends 
that the report be reviewed by the relevant IETF WGs as 'it is important to 
ensure that not only current DNS-related specifications and deployments, but 
also emerging and anticipated DNS-related specifications and deployments, are 
fully taken into account in the report'.

Ed (individual): Ed comments that he does not think 'fast flux technology 
should be banned, or any other technology for that matter'. He notes that a 
fair balance needs to exist between privacy / freedom on the one hand and 
public safety / regulation on the other, which might not always be easy. In his 
view, the root cause of the problem is 'un-patched computers connected to the 
internet' and 'criminal behaviour'. Ed proposes the following solutions for 
consideration to address the former: 'banning the ip of infected pc's [...]; 
put some responsibility of internet control back to the ISP level; time delay 
between registrations and activation [which could be avoided by] registering in 
person and providing photo ID and biometric data; and, forced updates [...] 
where a security patch is applied'.

Ben Gelbart (Spacequad AntiSpam Services): Gelbart notes that fast flux hosting 
is a 'very serious problem'. He comments that there are two ways in which 
registries and registrars can restrict fast flux:
1)    'By monitoring DNS activity [...] and reporting suspicious behavior to 
law enforcement or other appropriate reporting mechanism.'
2)    'By adopting measures that make fast flux either harder to perform or 
unattractive. Some possible measures that have been suggested include:
-      authenticating contacts before permitting changes to NS records;
-      preventing automated NS record changes;
-      enforcing a minimum time to live (TTL) for name query responses;
-      limiting the number of name servers that can be defined for a given 
domain.'

Claus von Wolfhausen (UCEPROTECT-Network): Von Wolfhausen comments that 'there 
is no legitimate purpose that requires one site to use hundreds of hosts and 
have DNS changing with records'.

Steven Chamberlain (individual): Chamberlain comments that in his view 'it is 
wrong and ultimately futile to restrict the use of fast flux as a way to 
counter' malware, phishing and hosting of illegal content. In addition, he 
notes that there are numerous legitimate fast flux domains that benefit from 
this technique to increase speed, facilitate load balancing and enhance 
reliability. He notes that there are 'viable methods for disabling domains 
without penalising legitimate users of fast flux techniques, and without 
imposing any new restrictions on domain registration' such as blacklisting of 
domain names that are known to host malware or illegal content, or are used for 
phishing. He suggests that the date for such a blacklist(s) 'can be compiled 
and published by government or law-enforcement agencies, security researchers 
or private individuals'. A way to disable those domains included in these 
blacklists would be to 'remove their records from all authoritative root 
servers worldwide' or 'ISPs could make use of the blacklist data'.  Chamberlain 
describes a number of techniques that can be used by ISPs to filter such 
domains and notes that these techniques could also be applied in corporate 
environments, educational establishments, other providers of Internet access 
and individuals.

RAS (individual): RAS states that he works for an ISP and deals with fast flux 
domains and other internet abuse issues on a daily basis. In his view there are 
'enough valid reasons for short TTL values' which should be a reason to avoid 
any policies that would hamper these legitimate uses. RAS notes that 'the best 
way to address this may be to start with registrars who are not able to quickly 
identify and take down these domains because they will typically not improve 
unless they are forced to'. He adds that registrars 'have created an 
environment that invites abuse' as they 'do not maintain staff and policies 
adequate to prevent [...] abuses from taking place'. He recommends that 
registrars undertake more due diligence when registering new domain names, even 
if this would bring along additional costs. In addition, he promotes that 
'ICANN should take a more active role by encouraging, tracking, and publishing 
reports of registrars who are slow to act on abusive domains and should be more 
aggressive on dealing with registrars who generate large numbers of complaints'.

Richard Golodner (individual): Golodner recognizes that fast flux is a threat, 
but at the same time notes that it is a technique 'we all take advantage of'. 
He raises the question of 'what can be done at the domain registry level to 
make it more difficult [...] for the bad guys to use Fast Flux as a means of 
continuing their criminal enterprises?'

Michael Holder (TRD Associates) - Holder notes that 'this is a case of blaming 
the network layer for inappropriate choices made for the session or application 
layers'. In his view the solution is 'to secure the applications with 
technology that is appropriate to the level of value and risk'.

Bonnie Chun (Hong Kong Internet Registration Corporation Limited) - Chun shares 
the experience of the .hk registry in dealing with fast flux domains and notes 
that the introduction of 'additional measures to stop criminals from 
registering .hk domain names for illegal use' and 'help of the local law 
enforcement agencies and the local CERT, brought the situation back under 
control. Based on this experience, the .hk registry supports 'ICANN in 
formulating a best practice policy for domain registries / registrars and/or 
ISPs to fight against the use of fast flux in illegal activities'.

Davide Giuffrida (individual): Giuffrida welcomes the initiative to counter the 
abuse of fast flux technology by criminals. He notes that 'only a small part of 
fast-flux domains is legal' and promotes the listing of bad domains, those that 
abuse fast flux, which could be used to clean the network. Those domains using 
fast flux legitimately should be incorporated in a separate list.

Eric Brunner-Williams (Core): In his comments, Brunner-Williams refers to note 
he wrote while he was participating in the Fast Flux Working Group in which he 
made the following observations:
-      'The stated problem is only one in a larger space of evasion or 
resiliency techniques, some of which use the DNS'
-      'The stated problem exists in a larger context of technical 
infrastructure, only some of which are even remotely within the largest scope 
of technical coordination of ICANN's SOs'
-      'As a specific technique, it is an optimization of a resource 
utilization'
-      'The stated problem exists in an unstated relation to technical 
fundamentals'
He notes that the response to these observations at the time was that 'there is 
no relation between the techniques exploited for evasion or resiliency and the 
consequences of v4 address exhaustion, and the non-adoption of v6 addressing'. 
In addition his shares his views on the comments made by Woodcock, Atkinson, 
Chun and Holder. He concludes by pointing to his concerns over the process, 
SSAC, the Fast Flux WG and lack of technical participation which he notes have 
also been communicated to various bodies and individuals within ICANN.

Mauro (individual): Mauro shares his experience as a 'private citizen running 
[his] own web/mail servers on a dynamic IP range' as a result of which he has 
already experienced a number of problems such as the refusal of emails. He 
expresses his disagreement with the idea discussed in the report to charge a 
premium for dynamic name server domains as he believes that individual internet 
users should not 'have to pay the bill because a little part of user[s] are 
misusing the Internet'. From his experience as a cybercrime analyst, he notes 
the difficulty in take downs of fast flux domains explaining that in the case 
of .ch, domains cannot be taken down unless there is an order coming from a 
judge. In his view 'adopting accelerated domain suspension processing in 
collaboration with certified investigators / responders should be a must in the 
fight against fast flux domains'.

Jeffrey A. Williams (INEGroup): Williams expresses concerns that the views of 
his group are not reflected in the report. He disagrees with the inclusion of 
advocacy groups and free speech as benefitting from fast flux. He notes that 
the 'Initial report seems to be pushing down the actual responsibility from 
ICANN's accredited Registrars and Registries, down to Registrants which is 
partly justified, and ISP's, which is not justified [as they are not] the 
originator. He disagrees with the idea raised in the report to strengthen 
registrant verification and identification processes as way to mitigate fast 
flux as this would result in 'a reduction of privacy protection for 
Registrants'. He suggests that 'registrars [...] need to build detecting 
mechanisms of a technical nature that will detect when Fast Flux of DNS is 
evident, and than generate a Email alert to CERT, other law enforcement 
agencies, contracted reporting agencies, and ICANN staff that this activity has 
been recognized'.

Philip Virgo (individual): Virgo uses the, in his view, slow progress made in 
addressing fast flux hosting as an example of the 'institutional failure at the 
heart of Internet Governance'.

Claudio DiGangi (IPC Constituency): DiGangi submits his comments on behalf of 
the Intellectual Property Constituency (IPC). The IPC is of the opinion that 
'any steps that can be taken to identify and prevent the illegitimate use of 
Fast Flux hosting should be pursued'. The IPC recognizes the difficulties 
identified by the WG in separating legitimate use of fast flux from 
illegitimate, but wants to encourage the WG 'to continue its work and to work 
with others to identify, manage and overcome these challenges'. On the role of 
ICANN, the IPC notes that 'even if the involvement of third parties will be 
required to fully address the problems associated with the illegitimate use of 
Fast Flux, ICANN is in a position to protect the stability and integrity of the 
Internet by taking positive incremental steps towards resolving these issues 
(including by, at a minimum, gathering and disseminating information regarding 
Fast Flux hosting and developing best practices for registries and 
registrars)'. The IPC expresses its agreement with the conclusion of the WG 
that further work is required in a number of areas, and recommends that such 
work should be conducted before the issuance of a final report. In addition, 
the IPC provides comments on each of the charter questions addressed by the WG 
in the Initial Report. In relation to question 1, who benefits from fast flux, 
and who is harmed, the IPC notes that 'in order to establish the extend of the 
harm [...] further study is needed (especially regarding piracy activities 
resulting from Fast Flux activities)'. On question 2, who would benefit from 
cessation of the practice, and who would be harmed, the IPC states that 'the 
report fails [...] to provide any empirical data to support the speculative 
list of benefits of fast flux hosting. To balance any arguable benefits of Fast 
Flux hosting against its adverse impacts to IP owners and the public, more 
study is needed to understand the rather speculative characterization of Fast 
Flux benefits and whether such benefits can be achieved in another manner'. On 
question 3, are registry operators involved or could they be in Fast Flux 
hosting activities, the IPC is of the opinion that 'the registry community is 
in a position to assist in mitigating problems arising as a result of the 
illegitimate use of Fast Flux hosting'. While acknowledging that other 
stakeholders might need to be involved, 'the IPC is of the view that taking 
even small steps may be effective in mitigating the harms caused by 
illegitimate uses of Fast Flux hosting'. In relation to question 4, are 
registrars involved in Fast Flux hosting activities, the IPC notes that 
although it agrees with the report's assessment that most registrars are not 
involved, it is concerned as 'registrar's responses and defensive mechanisms to 
Fast Flux activities appear to vary widely in substance and timeliness' which 
may result in 'certain registrars being increasingly targeted for Fast Flux 
activities'. On question 5, how are registrants affected by fast flux hosting, 
the IPC points to the risks for trademark owner registrants whose domain names 
might become a target for attackers looking for reputable domains, the possible 
consequences of blacklisting and suspension of a domain associated with a fast 
flux attack, and harm to a registrants trademark. On question 7, what technical 
measures should be implemented by Registries and Registrars to mitigate the 
negative effects of Fast Flux, the IPC 'strongly encourages the Working Group 
to further consider and develop the Information Sharing and Active Engagement 
measures outlined in the Initial Report'. In relation to question 8, what would 
be the impact of establishing limitations, guidelines, or restrictions on 
Registrants, Registrars, and/or Registries with respect to practices that 
enable or facilitate Fast Flux hosting, the IPC recognizes that it is difficult 
to assess the impact without knowing the exact measures, but is of the opinion 
that the benefits for affected registrants and internet users is likely to 
'outweigh the identified harms to the Registrars and Registries in the Initial 
Report. On question 10, what are some of the best practices available with 
regard to protection from Fast Flux, the IPC 'encourages the Working Group to 
continue to investigate the APWG's proposed best practices' and 'encourages 
members of the registrar community to adopt recognized best practices designed 
to curtail the harms caused by illegitimate uses of Fast Flux hosting'.

Suresh Ramasubramanian (individual): Ramasubramanian notes that the legitimate 
uses of fast flux identified in the report do not have the same characteristics 
as the abusive use of fast flux. Legitimate uses of fast flux do not use 
hijacked bots, have full control over IP ownership data and do not use 
'throwaway domains with fake whois contacts [...] that are quite often bought 
with stolen cards'. He adds that 'the vast majority of fastflux is used for 
criminal purposes and is hosted on illegally acquired [...] hosts'. He 
furthermore notes that registrars and registries 'are the single point of 
failure for dns based fastflux or double fast flux.

Jon Orbeton (PayPal): Orbeton's comments specifically relate to charter 
question 7, what technical changes and policy measures could be implemented by 
registries and registrars to mitigate the negative effects of fast flux. 
Orbeton notes that the following could, if implemented properly, 'significantly 
reduce the risk created by fast-flux networks':
-      'Make additional non-private information about registered domains 
available through DNS based queries;
-      Publish summaries of unique complaint volumes by registrar, by TLD and 
by name server;
-      Cooperative, community initiatives designed to facilitate data sharing 
and the identification of problematic domain names;
-      Stronger registrant verification procedures;
-      Adopt accelerated domain suspension processing in collaboration with 
certified investigators / responders'.
In addition, Orbeton encourages stronger conflict resolution measures to deal 
with 'registrars/IP space owners who are non-responsive to wide scale and 
numerous abuse complaints to ensure resolution of conflict' comparable to e.g. 
the UDRP. He implores 'ICANN to consider as a first step, rapid implementation 
of the suggestions already called out within [the] report along with the 
establishment of an Advisory Board on how to continually improve these 
suggestions'.

Gary Warner (University of Alabama): Warner is Director of Research in Computer 
Forensics at the University of Alabama. In relation to the question 'who 
benefits from fast flux', he questions whether free speech / advocacy groups 
belong on this list, as he has not seen any evidence of such groups. In 
addition, he notes that the only example provided in the report is a site that 
encourages violation of local law, which in his opinion should not belong in a 
free speech category condoned by ICANN. He does urge the group to add 'criminal 
entities' to the list of those who benefit from fast flux. To the question 'who 
would benefit from cessation', he proposes to add 'law enforcement and 
investigators' as cessation would facilitate catching the criminals. In 
response to the question 'are registrars involved', Warner states that 'there 
is strong evidence that registrars which operate "reseller practices" - 
particularly those registrars who are based in China and have resellers in St. 
Petersburg Russia - have resellers of their services which are entirely corrupt 
and who practice fast flux registration as a matter of course'. He also notes 
that sometimes criminals use a variety of registrars in different countries to 
establish their fast flux network which makes it difficult to investigate. On 
the question 'what measures could be implemented', Warner notes that 'one 
problem is convincing the registrars that they should do something about fast 
flux domains'. He recognizes the problem of proving the crime and notes that 
'the problem of breaking up a particular hosted domain does not necessarily 
address the issue of the underlying infrastructure'. In relation to the impact 
of establishing limitations, he notes that establishing a fee for modification 
of name servers would not be a disincentive as in most of these cases stolen 
credit cards are used. With regard to targeting short TTLs, he disagrees with 
this approach as there are 'many possible reasons for short TTLs', but adds 
that it would be appropriate to use it as a basis for further investigation 
e.g. by centrally archiving short TTL domains that could be used to verify 
against complaints received about domains on this list which should then be 
terminated. In relation to reporting to law enforcement, Warner notes that law 
enforcement will be more interested to learn about the fast flux hosting 
infrastructures than individual domain names, while at the same time 
highlighting the importance of information sharing. Warner welcomes the fast 
flux data metrics and remarks that 'tying those domains to spam [...] may 
provide a more useful picture'. In addition, Warner offers to share supporting 
data from a paper that is currently being authored with the Working Group on 
'which netblocks are most commonly associated with high volume spam attacks'.

Clarke D. Walton (Registrar Constituency): Walton submits his comments on 
behalf of the Registrar Constituency (RC). The RC notes that the comments 
'capture the overall sentiment expressed by the RC Members', but 'due to time 
constraints [...] no formal vote [...] was taken'. After reviewing the 
different ideas for next steps in the report, the RC 'strongly encourages the 
Council to explore other means to address the fast flux issues instead of 
initiating a Policy Development Process' which it does not consider suitable 
'because of the rapidly evolving nature of fast flux, combined with the minimal 
effect new policy would likely have on Internet fraud and abuse'. In addition, 
the RC is of the opinion that other organizations are more suited to lead 
mitigation efforts in this area. However, should the Council decide to pursue a 
PDP in this area, the RC 'recommends that these next steps, as suggested by the 
WG, occur in the following order:
1)    Further work/study to determine which solutions/recommendations are best 
addressed by best practices, industry solutions, or policy development.  The RC 
prefers development of best practices and industry solutions with policy 
development reserved as a last resort.
2)    Include flux hosting, flux techniques and flux facilitated attacks as 
part of the work now being done on registration abuse and take-down policies.
3)    If the Council pursues policy development specifically for fast flux, the 
Council should redefine the issue and scope to address some of the problems 
encountered by the WG and to develop a narrower and more sharply focused 
charter. This can only be done by first following the WG advice on additional 
research and fact-finding to address the questions and issues raised in the 
Initial Report.'

Richard Clayton (University of Cambridge): Clayton is a security researcher in 
the Computer Laboratory of the University of Cambridge and has, amongst others, 
published a number of papers that examine the lifetime of phishing web sites 
and the factors that influence this lifetime. He states that he is 'deeply 
unimpressed' with the report. In his view the report does not describe the 
problem accurately; does not explain the roles of ICANN, registries and 
registrars; 'does not consider the issues abstractly enough, but narrowly 
concentrates on some aspects of current criminal behaviour'; and, does not 
provide any hard data that details the scope of the problem nor how it has 
changed over time. In short, he notes that 'the report fails to provide any 
basis for policy development and short be completely reworked before any other 
actions are considered'. He notes that the report does not provide a general 
definition of fast flux, but instead resorts to provide a number of 
characteristics some of which are also relevant for legitimate uses of fast 
flux. He states that 'the specific distinguisher of a fast-flux attack is that 
the dynamic nature of the DNS is exploited so that if a website is to be 
suppressed then it is essential to prevent the hostname resolving, rather than 
attempting to stop the website being hosted'. Taking this into account, he 
notes that 'there are no technical ways to proceed which are effective and 
avoid collateral damage', the only option is to suspend the domain names. In 
view of this conclusion, Clayton argues that more attention needs to be paid to 
the role of ICANN, the registries and registrars in the suspension of domain 
names, 'with ICANN having a role in promoting consistent standards and 
contractual arrangements'. He agrees that 'the difficulty that needs to be 
addressed is to establish when it is appropriate to suspend a domain name' and 
recommends that 'establishing guidelines and principles [...] and arranging 
compensation for any innocent domains caught in the cross-fire, would be a 
useful role for an ICANN report'. In relation to some of the technical 
suggestions made in the report, Clayton puts forward insights as to why 'they 
all tackle the symptoms rather than the disease'. Clayton shares some recent 
data comparing the removal time for ordinary phishing websites and fast-flux 
sites from which he concludes that 'fast-flux hosting is prolonging website 
lifetimes, but the situation is not getting worse, and there are signs of it 
getting a little better'. In his overall conclusions, Clayton notes that 'the 
bottom line on fast-flux today is that it is almost entirely associated with a 
handful of particular botnets, and a small number of criminal gangs. Law 
enforcement action to tackle these would avoid a further need for ICANN 
consideration. [...] If ICANN are determined to deal with this issue [...] 
attention should be paid instead [of to the technical issues] to the process 
issues involved, and the minimal standards of behaviour to be expected of 
registries, registrars, and those investigators who are seeking to have domain 
names suspended'.

K Claffy (individual): Claffy argues that the claim that it is not possible to 
separate legitimate use of fast flux from illegitimate use 'only holds on 
paper'. In her view, 'there are so many measurable differences' that it should 
not be difficult to separate one from the other, as long as safeguards are 
built in such as whitelisting that would address any possible false positives. 
She concludes that this report and the way it outlines potential concerns in 
dealing with this issue are 'excellent steps forward'.

Alan Murphy (Spamhaus Project Team): Murphy commends the efforts made by the WG 
in this report. One of the suggestions he makes is that additional information 
is provided on how to separate legitimate use of fast flux from illegitimate. 
He expresses his hope that 'ICANN considers [the report] to be a starting point 
for implementing policies designed to inhibit the illicit use of fast flux 
hosting'. He adds that 'both for ICANN-dependent entities, but also for ccTLDs 
and others which are not beholden to ICANN, ICANN is in an excellent position 
to provide leadership and guidance in developing policies and guidelines to 
distinguish good and bad use of the Internet'.
Philip Virgo (individual): In a follow up comment, Virgo observes that there is 
'confusion, including over the way that the "supply chain" for domain names 
actually works in practice, as opposed to theory" and suggest therefore that "a 
group be set up to facilitate the exchange of information on the conditions of 
service of registries and registrars and how these work in practice'.

Next Steps

The comments received will be analyzed and used for redrafting of the Initial 
Report into a Final Report to be considered by the GNSO Council for further 
action.

Contributors

Contributors are in order of first appearance and number of postings if more 
than one:

Michael Brusletten, Spacequad AntiSpam Services
Bill Woodcock, Packet Clearing House
R Atkinson
Ed
Ben Gelbart, Spacequad AntiSpam Services
Claus von Wolfhausen, UCEPROTECT-Network
Steven Chamberlain
RAS
Richard Golodner
Michael Holder, TRD Associates
Bonnie Chun, Hong Kong Internet Registration Corporation Limited
Davide Giuffrida
Eric Brunner-Williams, CORE
Mauro
Jeffrey A. Williams, INEGroup
Philip Virgo (two postings)
Claudio DiGangi, Intellectual Property Constituency
Suresh Ramasubramanian
Jon Orbeton, PayPal
Gary Warner, University of Alabama
Clarke D. Walton, Registrar Constituency
Richard Clayton, Computer Laboratory, University of Cambridge
K Claffy
Alan Murphy, Spamhaus Project Team


<<< Chronological Index >>>    <<< Thread Index    

Privacy Policy | Terms of Service | Cookies Policy