ICANN ICANN Email List Archives

[gnso-ff-pdp-may08]


<<< Chronological Index >>>    <<< Thread Index >>>

Re: [gnso-ff-pdp-may08] DTeam - framework for proposal

  • To: "gnso-ff-pdp-May08@xxxxxxxxx" <gnso-ff-pdp-May08@xxxxxxxxx>
  • Subject: Re: [gnso-ff-pdp-may08] DTeam - framework for proposal
  • From: "Mike O'Connor" <mike@xxxxxxxxxx>
  • Date: Thu, 07 Aug 2008 11:07:56 -0500


really nice work Dave.

i'm going to intersperse a few points amongst yours, based on the version .01 document i circulated, plus some ideas that came to me while reading your post.

At 10:38 AM 8/7/2008, Dave Piscitello wrote:
It occurred to me that we have had numerous, valuable threads regarding solutions, and many expressions of concerns of scope, cost, impact. These are all good activities.

What we may be missing among all these is a framework for what any resulting (set of) solutions we recommend would be deployed/implemented and by whom.

In an admittedly simplistic fashion, I think the following is a strawman for a multi-organizational approach to "combating fast flux" that could be applied to future attacks and abuses
- Improve our definition of fast flux

- Develop & test algorithms to detect fast flux (somewhat out of scope for ICANN)

* quantify the attack. We are slowly teasing out the characteristics we use to identify a fast flux network based in input from Joe, me, Greg, Randy, Eric, Mark and others. This effort also helps us identify the data required to quantify the attack. This answers the question, "What is it that we want to detect?" * develop a methodology/tool that has a very high probability of detecting the attack and a very low probability of reporting a false positive (Joe's tool, TMF, etc. are examples of detection methods and tools). This answers the question, "How can we detect it?"

- Establish a preliminary false-positives accuracy target (.1%, .001%, .00001% ?)

- Develop detection software based on approved algorithms and targets (somewhat out of scope for ICANN)

* identify the data collectors. Marc and others have identified various sources of data and perhaps it would be helpful to identify the parties (e.g., registrars and registries) who collect it. This answers the question, "Who can provide the data we need to detect it?"

- Conduct pilot tests of detection software with volunteer domain service-providers

* identify the approved users of the data. The range of users spans from "anyone with an internet connection" to "parties who are trusted to use the data". For the sake of this strawman, let's go with the trusted party end of this spectrum. This answers the question, "Who is responsible for detecting it?"

- Develop suggested/model service-level (and liability) agreements between detection service-providers and domain service-providers

* identify the "trust model" for approved data users. We want a high confidence that the parties will act in the best interests of the community at large, for users and registrants. This answers the question, "Why do we entrust these individuals to detect it?" * identify the access and reporting model for the approved data users. We have proposals ranging from publishing additional information via the DNS using TXT records to SSL gateway portals that provide WDPRS reporting like capabilities. This answers the questions, "How do the trusted parties acquire data they need, and report abuse?", "How do we keep the data from falling into the hands of folks who would misuse the data?", and "How do we keep bad actors from disrupting the access method?" * identify the responders and the response. In several models, we've discussed accelerated suspension of domains by registrars and registries, with processes for reinstatement, etc.

If we were to lay out a proposal in this fashion, I think we could then discuss pros/cons more objectively. We might even be able to add clarity to issues that make some folks uncomfortable so that the proposal addresses (or at least offers) sufficient checks and balances to hopefully make everyone comfortable with what we recommend to the GNSO.

Hope this helps.

No virus found in this incoming message.
Checked by AVG - http://www.avg.com
Version: 8.0.138 / Virus Database: 270.5.12/1597 - Release Date: 8/7/2008 5:54 AM




<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy