[gnso-rds-pdp-wg] ​A possible global process for collection, storage and access of Registrant Data

Gomes, Chuck cgomes at verisign.com
Mon Jul 25 21:56:11 UTC 2016


Parts of what you are suggesting will fit into all three phases of the PDP: 1) requirements, 2) policy development, and 3) implementation.  It will also be applicable to several of the 11 questions that are part of each phase.

Chuck

From: isolatedn at gmail.com [mailto:isolatedn at gmail.com] On Behalf Of Sivasubramanian M
Sent: Monday, July 25, 2016 5:32 PM
To: Gomes, Chuck
Cc: gnso-rds-pdp-wg at icann.org
Subject: Re: [gnso-rds-pdp-wg] ​A possible global process for collection, storage and access of Registrant Data

Dear Chuck,


I don't know. You are far more experienced, you could suggest how to move forward on this, whois, RDAP-long term, even Accountability?

Andrew Sullivan mentioned the pursuit to avoid centralization. The initial outline above is fraught with such a danger, but a new process for the long term could be well thought of to reconcile such a concern.

Sivasubramanian M

On Tue, Jul 26, 2016 at 1:04 AM, Gomes, Chuck <cgomes at verisign.com<mailto:cgomes at verisign.com>> wrote:
Where do you think this should fit in the work plan Sivasubramanian?  Note that it might fit in multiple places.

Chuck

From: gnso-rds-pdp-wg-bounces at icann.org<mailto:gnso-rds-pdp-wg-bounces at icann.org> [mailto:gnso-rds-pdp-wg-bounces at icann.org<mailto:gnso-rds-pdp-wg-bounces at icann.org>] On Behalf Of Sivasubramanian M
Sent: Monday, July 25, 2016 1:37 PM
To: gnso-rds-pdp-wg at icann.org<mailto:gnso-rds-pdp-wg at icann.org>
Subject: [gnso-rds-pdp-wg] ​A possible global process for collection, storage and access of Registrant Data

If the topic is not a priority for the Working Group at present, I would still request the Working Group to suggest a suitable time for discussion or redirect this to a suitable forum. (sent this from the email address isolatedn at ...  which did not get posted, so resending this a moment later from this alias, if there is repetition, apologies.)

Thank you
Sivasubramanian M<https://www.facebook.com/sivasubramanian.muthusamy>

​A possible global process for collection, storage and access of Registrant Data


Background


A Domain Registrar, either directly or through a Reseller collects a Registrant’s personal data at the time of registering a Domain Name. With over 300 million domain names registered worldwide, this becomes Big Data as a collective.


ICANN coordinates the allocation of Domain Names (and associated Number resources), but does not make “rules” concerning the handling of Registrant Data, which is valuable to the Registrant who parted it with the Registrar/Reseller in Trust.


Due to the cross border nature of the Internet, a Registrant in one country, say, India, registers a Domain Name which on the Top Level is delegated by ICANN, a non-profit Corporation Registered in the State of California, United States, to a Registry operating from, say, Gibraltar, who appoints a Registrar based in Germany, who in turn appoints a Reseller based in South Africa who registers the Domain Name to the Registrant based in, say, India. The Reseller retains some of the Registrant Data, and parts with part of the data (or a copy of all Data) to the Registrar, who passes on a part of the Data to the Registry, and a certain mandated components of the Registrant Data gets published in the whois database for public access. (This has not been described with schematic accuracy, but in general it works more or less in this manner at present)


The Registry, Registrar and the Reseller might be using the Registrant Data for their own essential commercial operations, or at times sharing it with third parties by commercial arrangements. In addition, there are periodic requests from the Law and Order Agencies for access to the Registrant Data. Complications arise when one country demands access to Registrant Data stored outside its jurisdiction, and further complications arise when the data so released pertain to the citizens of another country. Also, “the problem of cross-border data requests arises when one government’s laws compel the production of information while another government’s laws simultaneously forbid that same production.”


It can not be denied that some of these Law and Order requirements are in the National or Global public interest, but the focus of this paper is on possible excesses or abuses.


A possible global process for collection, storage and access of Registrant Data:


If some data is held by Registrar, some by Registry and some by the ISP, there may be a way of streamlining this by modifying the manner in which Registrant data is gathered and stored at the time of registration. Some attention to the VISA/MASTERCARD method of collecting and handling credit card information could help ICANN come up with a streamlined design for handling Registrant data.


If such a model is to be emulated, a Registrant going to a sub-Reseller going through a Reseller going through a Registrar under a Registry would gather the Registrant data on a secure form interjected by an operator like Verisign. ‘Verisign’ here is not to be confused with Verisign the Registry, or Verisign the RZM operator, but that division of Verisign which serves the secure form in credit card transactions. In the Domain registration scenario, ‘Verisign’ would, by a secure protocol, interject a registration form on the Reseller interface, that would be a secure form independent of and regardless of the insecurity of the Sub-Reseller's webspace. In DNS, this could indeed be a verisign form or an IAB/IETF/ICANN designed secure form, ​or a form designed by the ICANN Technical expert volunteers from the Community, or even by any other commercial contractor designated by ICANN. This verisign form (I call this the Verisign form, for illustration. Not implying that the system peculiar to DNS must only be designed by Verisign. However we could continue to refer to this as the 'Verisign form' for the purpose of this discussion) could then be used to collect:


a) all Registrant data and then automatically distribute the basic data back to the Sub-Reseller and Reseller, basic + quasi-sensitive data to the Registrar under whom the Reseller operates and retain a copy of the above + Sensitive data with the Registry, while ultra-sensitive data, if any so categorised by any name, together with all of the above would stay only with ICANN.  (the categorization of data as basic etc is arbitrary.  This is a generalized description of how it would work, there may be existing classes and sub-classes or ICANN may come up with suitable sub-classes of Registrant data)


Or, optionally,


b) The Sensitive and Ultra-sensitive user data alone could be gathered by the Verisign form after the basic data is collected by the Reseller in his own form that may be shared with the Registrar.


Any of the above options would prevent Registrant data abuse in a situation where there are a multitude of Resellers. If such a process could be designed and implemented, the Resellers would retain the basic contact information for them the opportunity to maintain contact with their customers,  Registrars would get a copy of whatever commercial data that they require from the Resellers or from their direct customers, the Registry would still retain most of the data with a copy for the ICANN in a database, and only ICANN retain the ultra-sensitive data, if there is any part of Registrant data is ultra-sensitive by any other name.


Law and Order Requests:


Such a new process would require a system of handling Law and Order Requests. ICANN could facilitate/ help to create/ or actually ‘own’ a well designed process involving a highly ethical team of community members to screen requests from Law and Order authorities anywhere to access data, and to determine what portion of data to be released or allowed access.


The caution needed here is that such a system may have to be well thought of, the privacy and security concerns to be examined in extensive detail, the commercial privileges concerning Registrant data prevailing among Resellers, Registrars and Registries have be examined, the ability of ICANN / Internet Community to judge the validity of Law and Order requests and the strength of ICANN to deny some requests if deemed necessary - all these aspects have to be examined in detail.


If the question "where does data reside" extends beyond Registrant data, the answer would be far more complicated. That would draw the Internet Community's attention to questions concerning content in a very interesting way.


The details: (with some repetion)


1.  What I suggested was use of this form as a globally central system of collecting all Registrant data from Registrants through any Reseller/Registrar, across the world, across all gTLDs. Sounds a bit scary, but could be fair.


2.  The data collected by using the 'Verisign' Domain Name Registration form would be 'owned' by ICANN​, the term 'owned' implying responsibility.


3.  By an automated process, the data entered by the Registrant as received in total by ICANN could get classified according to predetermined and gradually increasing levels of privileges between the Reseller who registered the domain name for the Registrant (for example, the information gathered from form fields 1-5), the Registrar under whom the Reseller operates (for example, the information gathered from form fields 1-5 + fields 6-7), the Registry who operates that TLD (for example form fields 1-7 + form fields 8-10) and ICANN (all form fields 1-20). Without any discernible delay, ICANN Storage returns the information from 1-5 to that Reseller, 1-7 to that Registrar, 1-10 to that Registry and retains a copy of all of ​1-20 in its highly secure storage with community oversight.


4. The same method could be used to determine what information gets published on whois.   (for example, it could be agreed by the ICANN community that form fields 2, 4, 5, and 7 gets published in the public whois database.


5. If there is agreement that Law and Order Agencies could UNIVERSALLY access an additional portion of the Registrant data over and above whois, WITHOUT the need to make a request or produce a warrant, we could agree to transfer a copy of all form fields in whois (2,4,5 and 7)​ + the information gathered in form field 14 and 17 to, lets say, ​to ​the Interpol data base.


6. Apart from the Domain Registration form, for Law  and Order requests, as in cases where the FBI or the police in any other country require specific information, a similar, possibly even a relatively less transparent form could be designed to allow the Law and Order Agency to document their requests to ICANN to release information.  This could be the form to fill in, for FBI to make a request​ for all Registrants' 1-20 data on .terror, or ​for a culturally aggressive Government to make a request​ for all Registrants' 1-20 data on .wildsex.  Or ​for the Law and Order Agency of another country to make ​a more specific request for 16-18 of a particular domain registrant.


​7. ​This relatively less transparent form as described in (6) above, ​would be visible to the Trustees of Registrant Data, (loosely we could say at this stage, for the purpose of illustration, this could be a Board or Council ​of 30 or more Nominees by ICANN, ISOC, IETF, Privacy Organizations, Government representatives from such Departments as Department of Culture, other Civil Society organizations of relevance, Trustees to ​be ​drawn for their individual propensity to be trusted and for their ability to judge the merits of Law and Order requests). The trustees would make the  ​Law and Order ​requests transparent only in extremely difficult cases, for example in the case of a request for 1-20 data on .sex by a country known for culturally extreme positions, request denied, and the Trustees politically challenged.


​8.​ The relatively less transparent form as described in 6, could also be so designed as to accept  “a secret law enforcement request (warrant or other legal document), and manage the expiry date of the secrecy of the warrant".  The idea of designing this second Law and Order Access form would be to "to deal with law enforcement's demands that their investigations be private".


​9​.Even the doors opened on specific requests would be in such a manner as to ensure that the Law and Order Agencies do not "go for a romp in the system, for an indefinite period."


​10​. Such a collection, Storage and Request for Access system, in combination, would make it rare for ICANN to consider, or even reasonably deny, excessive backdoors for Law and Order access, not to FBI, nor to Scotland Yard, not to the Interpol, not to the CBI of India.


This proposal could be discussed, or even tested, by ICANN delegating a test domain,  .test, or .dnsdata, to itself, make it somewhat privately operational, assign roles as “Registrars”, “Resellers” to volunteers from Business, ask Community participants to take up the role of Registrants and register .test names, first to test the technical feasibility of such a system, then to determine what personal data is absolutely needed, what is commercially desirable, what is needed for National Security, and what safeguards are needed for sharing this data between the Registrar and Registry, and what would be routinely made available to Law and Order, what part of the data would be released on requests and how, for what time frame, and what would be denied.  This test TLD could also be more vividly used to simulate content regulation scenarios.


Sivasubramanian M

​​

​








-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20160725/9f61247b/attachment.html>


More information about the gnso-rds-pdp-wg mailing list