[gnso-rds-pdp-wg] international law enforcement association resolution regarding domain registration data

allison nixon elsakoo at gmail.com
Mon Apr 24 16:46:31 UTC 2017


It also appears that the registrant identifier does not carry the same
meanings across all registrars. Some registrars supply only blank data for
the field, despite always providing the fields. Most, if they supply it at
all, appear to do so on a "unique-per-domain" basis which is useless for
investigative purposes. The registrant identifier of "C270-LRMS" does yield
more than one domain in a search but it's unclear if this means they are
all on the same one paying account at the registrar, or if that happens to
be a hash of some identifier coincidentally used by multiple different
people.

Regardless, it doesn't matter, because "rgret8eyhugregre" is a perfectly
valid street address for WHOIS and hashing a randomized result combined
with valid identifiers will result in nothing useful for anyone attempting
to enumerate domains associated with the same campaign.

On Mon, Apr 24, 2017 at 9:31 AM, Paul Keating <Paul at law.es> wrote:

> I would like to understand this further and forgive my ignorance.  Could
> you please explain what you mean by the following:
>
> We already have "anonymized unique identifiers" in the form of contact
> identifiers, sometimes also known as "handles" (but not to be confused
> with handle system (RFC 3650) identifiers). For example, a WHOIS query for
> a particular domain to one particular thick RDDS registry service will
> return a registrant identifier of "C270-LRMS" in addition to the more
> identifiable information that we're all familiar with. RDAP also supports
> these identifiers, so they are available for purposes as we see fit to
> recommend.
>
>
>
> Also, although WHOIS information itself is not always helpful, WHOIS
> combined with other data (including DNS and historical data) can be
> extremely helpful.  So, I am not at all certain as to what is intended by
> the message or what the solution proposed is or how it works.
>
> Thank you,
>
> Paul Keating
>
> On 4/24/17, 2:47 PM, "Hollenbeck, Scott via gnso-rds-pdp-wg"
> <gnso-rds-pdp-wg-bounces at icann.org on behalf of gnso-rds-pdp-wg at icann.org>
> wrote:
>
> >I must have missed this note when it was original sent back in March.
> >Chuck asked me to address one of the questions posed below.
> >
> >Scott
> >
> >> -----Original Message-----
> >> From: Gomes, Chuck
> >> Sent: Monday, April 24, 2017 7:48 AM
> >> To: Hollenbeck, Scott <shollenbeck at verisign.com>
> >> Subject: FW: [EXTERNAL] Re: [gnso-rds-pdp-wg] international law
> >> enforcement association resolution regarding domain registration data
> >>
> >> FYI Scott.
> >>
> >> Chuck
> >>
> >> -----Original Message-----
> >> From: theo geurts [mailto:gtheo at xs4all.nl]
> >> Sent: Thursday, March 02, 2017 4:21 PM
> >> To: Gomes, Chuck <cgomes at verisign.com>; Greg Aaron <gca at icginc.com>
> >> Cc: gnso-rds-pdp-wg at icann.org
> >> Subject: [EXTERNAL] Re: [gnso-rds-pdp-wg] international law enforcement
> >> association resolution regarding domain registration data
> >>
> >>
> >> Thanks, Chuck.
> >>
> >> I think it is important that we as a WG understand that gated access
> >>could
> >> be a recommendation. But it does not single out any other
> >> solutions/recommendations,  but to get to that point, we should keep
> >> exploring.
> >>
> >> To give this some more color. In 2016 we assisted paloaltonetworks.com
> >>and
> >> shadow server taking down the Prince of Persia malware that went
> >> undetected and roamed the internet for ten years (that's a long time
> >> folks) http://researchcenter.paloaltonetworks.com/2016/06/
> unit42-prince-
> >> of-persia-game-over/
> >>
> >> So the actual WHOIS data was useless in a sense we were dealing with
> >> stolen identities.
> >> But we were able to map out the botnet controller network through the
> >> WHOIS and coordinated with more Registrars to sinkhole the entire lot.
> >>
> >> Again the WHOIS data was useless in this case as it was fake, could have
> >> passed every syntax or WHOIS cross-validation check.
> >>
> >> So instead of gated access, why not aim for an RDS that used anonymized
> >> unique identifiers that are available for everyone?
> >
> >We already have "anonymized unique identifiers" in the form of contact
> >identifiers, sometimes also known as "handles" (but not to be confused
> >with handle system (RFC 3650) identifiers). For example, a WHOIS query
> >for a particular domain to one particular thick RDDS registry service
> >will return a registrant identifier of "C270-LRMS" in addition to the
> >more identifiable information that we're all familiar with. RDAP also
> >supports these identifiers, so they are available for purposes as we see
> >fit to recommend.
> >
> >Scott
> >_______________________________________________
> >gnso-rds-pdp-wg mailing list
> >gnso-rds-pdp-wg at icann.org
> >https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg
>
>
> _______________________________________________
> gnso-rds-pdp-wg mailing list
> gnso-rds-pdp-wg at icann.org
> https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg
>



-- 
_________________________________
Note to self: Pillage BEFORE burning.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20170424/3f840ea2/attachment.html>


More information about the gnso-rds-pdp-wg mailing list