<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p><font size="+1"><font face="Lucida Grande">These are excellent
          questions.  I would add an additional one:  why are private
          cybercrime investigators not accredited?  How can the global
          public trust them, or perhaps why?</font></font></p>
    <p><font size="+1"><font face="Lucida Grande">Stephanie Perrin</font></font><br>
    </p>
    <br>
    <div class="moz-cite-prefix">On 2017-06-07 10:49, Volker Greimann
      wrote:<br>
    </div>
    <blockquote type="cite"
      cite="mid:f75f8fa5-2638-b2b3-a577-01e05adbb0f9@key-systems.net">
      <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
      <p>All good questions that we will no doubt come to later. <br>
      </p>
      <br>
      <div class="moz-cite-prefix">Am 07.06.2017 um 16:47 schrieb John
        Bambenek via gnso-rds-pdp-wg:<br>
      </div>
      <blockquote type="cite"
        cite="mid:B52ABF7E-09B4-4C3B-9A8D-444C7F904C31@bambenekconsulting.com">
        <div>I want to add. Requiring authentication means that you will
          be creating a database (potentially many of them) that will
          contain private data (usernames, emails, passwords, and api
          keys combined is some of the most sensitive private data there
          is) to access public data. You will be creating logs of what
          we search and why (what's the point of requiring purpose be
          disclosed if not to store it. For a subset of us that exposes
          our customer lists that could be easily derived. </div>
        <div><br>
        </div>
        <div>The first problem is, who has access to this data and under
          what conditions? Will every domain owner see who queries their
          domains? That inherently means targets of our investigations
          are not only tipped off that there is an investigation, but
          can expose specifically WHO is investigating. You are
          increasing the direct PERSONAL risk investigators take to
          solve the problems you have raised with anti-abuse. </div>
        <div><br>
        </div>
        <div>Further, you are inherently creating a database of high
          profile targets for intelligence agencies. System admins,
          network admins and investigators are targets of intelligence
          agencies because they have privileged access if not the full
          "keys to the kingdom". (See: <a
href="https://www.usenix.org/conference/enigma2016/conference-program/presentation/joyce"
            moz-do-not-send="true">https://www.usenix.org/conference/enigma2016/conference-program/presentation/joyce</a> short
          version, the NSA says these are the exact people they try to
          compromise). This system almost exclusively has those people
          in it. If LE has access to the logs and this database, it is
          hard to see how intelligence agencies can't get it. Do you
          want the NSA knowing what domains you are looking at knowing
          its a mere NSL away? </div>
        <div><br>
        </div>
        <div>Further, creating this pool of high-profile targets also
          makes the RDS a major target of attack. By literally everyone.
          Considering the problem of password reuse, if this database
          were ever compromised, a huge number of organizations would
          face very immediate existential threats. Who is going to pay
          for the security of RDS? Who is going to accept the liability
          when its breached?</div>
        <div><br>
        </div>
        <div>Putting public info behind a gate creates huge liabilities,
          assumes great cost, and delivers no real anti-abuse features
          because domain status alone is not weaponizable via phishing
          (you need contact info, and if that's behind the gate or a
          proxy registration, lets just assume the spammer can't get to
          it; also a bad assumption). </div>
        <div><br>
        </div>
        <div>So the basic question for you guys even if you set the
          value of MY risk at 0 and completely irrelevant, what is the
          return on this massive investment and who's going to pay that
          bill? It won't be me. </div>
        <div><br>
        </div>
        <div>The last point, and I will be very direct about this. Some
          of you on this list made a startling bald statement that you
          ignore your contractual OBLIGATIONS as they exist today
          regarding registrant accuracy because you "don't like them" in
          such a way that at least one investigation was already opened.
          For those of you who openly admitted that you ignore ICANN
          contractual requirements for a contract you signed, how can we
          (who will bear the personal risks) trust any assurances you
          will give that you simply won't give this data to criminals
          despite any policy we create here?</div>
        <div><br>
          <div>--
            <div>John Bambenek</div>
          </div>
        </div>
        <div><br>
          On Jun 7, 2017, at 15:20, Michael Peddemors &lt;<a
            href="mailto:michael@linuxmagic.com" moz-do-not-send="true">michael@linuxmagic.com</a>&gt;
          wrote:<br>
          <br>
        </div>
        <blockquote type="cite">
          <div><span>Hi Volker,</span><br>
            <span></span><br>
            <span>Maybe we are getting to the root of your position, too
              much spam ;)</span><br>
            <span>Maybe a better spam filter would be the solution? ;)</span><br>
            <span></span><br>
            <span>But in all seriousness, what you are discussing are
              problems that really should NOT be part of this
              discussion.  Just because cars are a target for theft, we
              should not prevent owners from parking on the street.</span><br>
            <span></span><br>
            <span>What you are discussing are criminal activities, for
              which other resources are available to address that
              problem.  But a gated solution would inherently add to the
              problem.  First of all, most spam of that type are already
              addressed by good filters, and domains involved in such
              activity usually end up on blacklists etc quite quickly,
              but a gated approach would prevent some of the ability to
              identify those actors, and report/stop them.</span><br>
            <span></span><br>
            <span>Some of these tests are automated, eg right in
              software policies, and need to have access to that data on
              the fly, and that type of automated detection tool cannot
              work properly, or will be very inhibited with any form of
              gated access.</span><br>
            <span></span><br>
            <span>And to argue that in the case of unfettered access can
              be used by both the bad players and the good, do remember
              that the 'bad actors' have a commercial interest in
              gaining that data, and will be the first people to
              automate work arounds.. (eg when SPF came out, surprised
              how many spammers were early adopters)</span><br>
            <span></span><br>
            <span>Every email operator should be able to have access to
              that data, eg domain creation date, expiry date, and that
              data cannot be restricted by bulk (have you seen the
              volume of senders?) and distributed protection software
              should not require the end user to 'register' for access
              to this data to have their protections work.</span><br>
            <span></span><br>
            <span>Gated Access:</span><br>
            <span></span><br>
            <span>* Inhibits the ability to create systems that protect
              privacy</span><br>
            <span>* Adds a commercial burden (extra systems) to those
              with legitimate requirements</span><br>
            <span>* Requires an authentication mechanism which can
              create privacy concerns</span><br>
            <span>* requires an authentication mechanism which may not
              be usable or desired by all parties</span><br>
            <span>* Raises the bar on who can develop protections and
              legitimate systems</span><br>
            <span>* Provides protection for the very actors you are
              worried about.</span><br>
            <span>* Adds unnecessary burdens/costs on ICANN and
              registrars as well</span><br>
            <span>* Adds a point of failure</span><br>
            <span>* Research and innovation will be inhibited</span><br>
            <span></span><br>
            <span>IMHO, you had better have a STRONG reason to put a
              gate up..</span><br>
            <span>Let's not mix the problems of certain criminal
              elements getting access to this data, that is a separate
              issue, and we can't cut off our nose to spite our face..</span><br>
            <span></span><br>
            <span>I might suggest that rather than promoting 'gated'
              access, which those elements would be the first to sign up
              for, is spend the same amount of time working on getting
              internet providers to prevent that activity from occurring
              in the first place, and doing anything you can to help
              those who are trying to stop such activity, including
              ensuring that they (the good guys) have unfettered access.</span><br>
            <span></span><br>
            <span></span><br>
            <span></span><br>
            <span>On 17-06-07 01:54 AM, Volker Greimann wrote:</span><br>
            <blockquote type="cite"><span>It is remarkable how much of
                the spam that we see on a regular basis</span><br>
            </blockquote>
            <blockquote type="cite"><span>that is tied to the domain
                lifecycle. Fake renewal notices, SEO offers,</span><br>
            </blockquote>
            <blockquote type="cite"><span>the lot.</span><br>
            </blockquote>
            <blockquote type="cite"><span>Anything that would reduce
                this is a basis for restricting access</span><br>
            </blockquote>
            <blockquote type="cite"><span>somewhat. I do not really see
                any harm in such restrictions either.</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Best,</span><br>
            </blockquote>
            <blockquote type="cite"><span>Volker</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Am 07.06.2017 um 10:27 schrieb
                jonathan matkowsky:</span><br>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>There is no basis for
                  restricting ungated access any more so than the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>domain's existence or the
                  string of characters registered.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>On Wed, 7 Jun 2017 at 11:22
                  Volker Greimann &lt;<a
                    href="mailto:vgreimann@key-systems.net"
                    moz-do-not-send="true">vgreimann@key-systems.net</a></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>&lt;<a
                    href="mailto:vgreimann@key-systems.net"
                    moz-do-not-send="true">mailto:vgreimann@key-systems.net</a>&gt;&gt;
                  wrote:</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    I have no objections
                  against having this data available and</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    accessible.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    The question is whether
                  it should be as accessible as it is now or</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    whether there could be
                  certain restrictions. A tiered access system as</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    has been proposed would
                  solve this beautifully.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    In this case, the dates
                  would be on the second tier (the first tier</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    being full unhindered
                  access), which would entail some form of</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    authentification and
                  bulk access restrictions. Every single one of the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    uses Andrew desribes
                  would remain possible and unproblematic, but the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    data would no longer be
                  in as much danger of being abused as it is</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    today.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Best,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Volker</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Am 06.06.2017 um 22:07
                  schrieb Michael Peddemors:</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; +1 as well..</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; .. but with so many
                  +1's on having that data publicly accessible, it</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; would be
                  interesting to take a straw poll, to a wider audience</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    on that</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; simple question..</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; It would be also
                  nice to see what category the parties in each camp</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; lie? We know that
                  everyone involved in making the internet a</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    safer and</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; better place
                  (security companies, law enforcement et al) want it</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; available, and to
                  define 'thin data' as wide as possible, and I can</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; understand that
                  some consideration to privacy be considered so</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    that it</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; doesn't go too
                  wide, but not really certain I understand the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    position</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; of those that want
                  it as 'thin' as possible, or non-existant, and/or</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; the parties behind
                  that position and their numbers.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; And of course the
                  ever present question for both camps, is the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    opinion</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; coming from a place
                  where there are financial motivations (not that</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; necessarily there
                  is anything wrong with that &lt;sic&gt;) that have</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    formed</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; the basis of that
                  opinion. (eg, if the money equation was removed,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; would you still
                  have that opinion, or even be in the conversation?)</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; For all we know,
                  the privacy camp are in very small numbers in this</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; conversation, and
                  while they might hold legitimate positions,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    maybe it</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; isn't enough to
                  affect the directions/positions of ICANN as a group</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; going forward.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; And IMHO, even if
                  it was 50/50 split, if it came down to two</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    camps, eg</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; 'the ones keeping
                  us safe' and 'it affects/risks our pocketbooks', I</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; would err on
                  policies that would aid the former..</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; Don't want
                  'politics' to affect such important decisions..</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt; On 17-06-06 11:22
                  AM, Andrew Sullivan wrote:</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; Hi,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; On the call
                  today there were arguments being made about why
                  certain</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; fields should
                  not be publicly accessible.  In effect, what we</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    are now</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; arguing about,
                  in talking about what should be considered "thin</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    data",</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; is the
                  definition of the set of data to which unauthenticated</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    access</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; should be
                  permitted.  (Let us please not get distracted by what
                  is</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; actually
                  required by the RAA or anything like that just now,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    since the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; outcome of this
                  policy discussion might change that.)</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; There were
                  several arguments put forth about whether the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    created on,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; updated on, and
                  expiry dates should be included.  Similarly, people</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; discussed
                  whether the domain status values should be included. I</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; believe they
                  must be.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; The Internet is
                  unlike many other technologies because of its</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    radical</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;
                  decentralization.  That is not some sort of political
                  choice, but</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; instead a
                  fundamental part of the design of the Internet: it's a</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; network of
                  networks (of networks…) formed by voluntary</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    interoperation</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; among the
                  participants.  Participants in the Internet
                  interoperate</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; without setting
                  up formal contractual arrangements between all the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; participating
                  parties.  This feature is part of what has made the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; Internet so
                  successful compared to other telecommunications</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    systems,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; because the
                  barrier to entry is really low.  But that design</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    comes at</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; a cost.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; The cost is
                  that there's not always a party to speak to, with</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    whom one</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; has a
                  pre-existing relationship.  If communications break
                  down</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    between</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; two telephone
                  customers, they know whom to call: the phone company.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; The phone
                  company also has contractual (or sometimes treaty)</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; relationships
                  to other phone companies.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; The Internet
                  doesn't work that way.  If you and I are communicating</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; over the
                  Internet, there is no guarantee of direct contractual</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; relationships
                  all the way along the transit path: that's what open</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; peering
                  policies ensure.  The way we make this work in fact is
                  by</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; placing the
                  responsibility for troubleshooting out at the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    edges.  And</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; because of
                  that, when I need to troubleshoot my site I need to
                  have</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; tools with
                  which to do that.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; In domain-based
                  communications (such as email, IP telephony,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    websites,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; money transfer,
                  and thousands of other applications), when I</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    encounter</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; a problem with
                  the communication I need to answer whether the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    problem</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; is in _my_
                  network operation, or in the other end.  Important</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    data to</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; rule out "the
                  other end" is in the thin RDS data.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; Obviously, the
                  nameserver and DNSSEC information in the RDS</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    will allow</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; me to tell
                  whether what is in the global DNS is what ought to be</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; there.  For
                  instance, if the RDS has one value for the name</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    servers,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; but the DNS
                  returns something else, there is a problem.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; Less obvious
                  but just as important are the status values.  If a</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    name</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; is on Hold or
                  is pendingTransfer or something like that, it can</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    tell</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; me that
                  something is up.  A name that doesn't appear in the
                  DNS but</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; has a full
                  complement of name servers in the RDS, for example,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    might</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; be on hold; and
                  I can't tell that without seeing the status values.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; In the same
                  way, the dates in the RDS allow a troubleshooter to</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; understand what
                  might be wrong when things are broken.  If a</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    name is</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; set to expire
                  in a day and you're getting a parking page on the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; website, you
                  have a clue about what is going on.  Most of the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    examples</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; cited in</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
href="https://whoapi.com/blog/1582/5-all-time-domain-expirations-in-internets-history/"
                    moz-do-not-send="true">https://whoapi.com/blog/1582/5-all-time-domain-expirations-in-internets-history/</a></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; were trivial to
                  understand for help desks that could see that a</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    name</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; that should
                  have existed for some time was just hours old,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    because the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; created_on date
                  was available.  And if you start having trouble and</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; see a domain
                  was updated about the same time the trouble</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    started, you</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; have a pretty
                  good clue that the problem is most likely at the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    target</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; domain, and not
                  in your own network.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; As for the
                  question of why the global Internet infrastructure</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    needs to</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; help with this,
                  the answer is that _that's what the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    infrastructure is</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; for_.  We have
                  registrars and registries in order to</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    co-ordinate these</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; assignments and
                  make those assignments available, in support of the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; distributed
                  administration and operation of the Internet.  If the</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; infrastructure
                  isn't providing this kind of information in order to</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; help
                  administrators of various Internet administrators,
                  then it</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    isn't</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; doing its job.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; The Internet is
                  a distributed system.  If you want to make</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    distributed</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; systems work,
                  you have to allow the operators to have enough</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; information to
                  do their jobs independently of one another.  So,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; regardless of
                  where one lands on whether any of this data is</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    personal</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; data, it makes
                  no difference.  If you want the domain name</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    system to</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; continue to
                  work reliably, you have to publish this data.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; Centralization
                  and locking the data up for just registrars simply</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; won't scale.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; Best regards,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt; A</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    &gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    --</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Bei weiteren Fragen
                  stehen wir Ihnen gerne zur Verfügung.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Mit freundlichen Grüßen,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Volker A. Greimann</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    - Rechtsabteilung -</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Key-Systems GmbH</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Im Oberen Werk 1</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    66386 St. Ingbert</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Tel.: +49 (0) 6894 -
                  9396 901</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Fax.: +49 (0) 6894 -
                  9396 851</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Email: <a
                    href="mailto:vgreimann@key-systems.net"
                    moz-do-not-send="true">vgreimann@key-systems.net</a>
                  &lt;<a href="mailto:vgreimann@key-systems.net"
                    moz-do-not-send="true">mailto:vgreimann@key-systems.net</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Web: <a
                    href="http://www.key-systems.net"
                    moz-do-not-send="true">www.key-systems.net</a> &lt;<a
                    href="http://www.key-systems.net"
                    moz-do-not-send="true">http://www.key-systems.net</a>&gt;
                  /</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.RRPproxy.net"
                    moz-do-not-send="true">www.RRPproxy.net</a> &lt;<a
                    href="http://www.RRPproxy.net"
                    moz-do-not-send="true">http://www.RRPproxy.net</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.domaindiscount24.com"
                    moz-do-not-send="true">www.domaindiscount24.com</a>
                  &lt;<a href="http://www.domaindiscount24.com"
                    moz-do-not-send="true">http://www.domaindiscount24.com</a>&gt;
                  /</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.BrandShelter.com"
                    moz-do-not-send="true">www.BrandShelter.com</a> &lt;<a
                    href="http://www.BrandShelter.com"
                    moz-do-not-send="true">http://www.BrandShelter.com</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Folgen Sie uns bei
                  Twitter oder werden Sie unser Fan bei Facebook:</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.facebook.com/KeySystems"
                    moz-do-not-send="true">www.facebook.com/KeySystems</a>
                  &lt;<a href="http://www.facebook.com/KeySystems"
                    moz-do-not-send="true">http://www.facebook.com/KeySystems</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.twitter.com/key_systems"
                    moz-do-not-send="true">www.twitter.com/key_systems</a>
                  &lt;<a href="http://www.twitter.com/key_systems"
                    moz-do-not-send="true">http://www.twitter.com/key_systems</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Geschäftsführer:
                  Alexander Siffrin</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Handelsregister Nr.: HR
                  B 18835 - Saarbruecken</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Umsatzsteuer ID.:
                  DE211006534</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Member of the KEYDRIVE
                  GROUP</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.keydrive.lu" moz-do-not-send="true">www.keydrive.lu</a>
                  &lt;<a href="http://www.keydrive.lu"
                    moz-do-not-send="true">http://www.keydrive.lu</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Der Inhalt dieser
                  Nachricht ist vertraulich und nur für den</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    angegebenen Empfänger
                  bestimmt. Jede Form der Kenntnisgabe,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Veröffentlichung oder
                  Weitergabe an Dritte durch den Empfänger ist</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    unzulässig. Sollte diese
                  Nachricht nicht für Sie bestimmt sein, so</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    bitten wir Sie, sich mit
                  uns per E-Mail oder telefonisch in</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Verbindung zu setzen.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>
                     --------------------------------------------</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Should you have any
                  further questions, please do not hesitate to</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    contact us.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Best regards,</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Volker A. Greimann</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    - legal department -</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Key-Systems GmbH</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Im Oberen Werk 1</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    66386 St. Ingbert</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Tel.: +49 (0) 6894 -
                  9396 901</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Fax.: +49 (0) 6894 -
                  9396 851</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Email: <a
                    href="mailto:vgreimann@key-systems.net"
                    moz-do-not-send="true">vgreimann@key-systems.net</a>
                  &lt;<a href="mailto:vgreimann@key-systems.net"
                    moz-do-not-send="true">mailto:vgreimann@key-systems.net</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Web: <a
                    href="http://www.key-systems.net"
                    moz-do-not-send="true">www.key-systems.net</a> &lt;<a
                    href="http://www.key-systems.net"
                    moz-do-not-send="true">http://www.key-systems.net</a>&gt;
                  /</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.RRPproxy.net"
                    moz-do-not-send="true">www.RRPproxy.net</a> &lt;<a
                    href="http://www.RRPproxy.net"
                    moz-do-not-send="true">http://www.RRPproxy.net</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.domaindiscount24.com"
                    moz-do-not-send="true">www.domaindiscount24.com</a>
                  &lt;<a href="http://www.domaindiscount24.com"
                    moz-do-not-send="true">http://www.domaindiscount24.com</a>&gt;
                  /</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.BrandShelter.com"
                    moz-do-not-send="true">www.BrandShelter.com</a> &lt;<a
                    href="http://www.BrandShelter.com"
                    moz-do-not-send="true">http://www.BrandShelter.com</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Follow us on Twitter or
                  join our fan community on Facebook and</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    stay updated:</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.facebook.com/KeySystems"
                    moz-do-not-send="true">www.facebook.com/KeySystems</a>
                  &lt;<a href="http://www.facebook.com/KeySystems"
                    moz-do-not-send="true">http://www.facebook.com/KeySystems</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.twitter.com/key_systems"
                    moz-do-not-send="true">www.twitter.com/key_systems</a>
                  &lt;<a href="http://www.twitter.com/key_systems"
                    moz-do-not-send="true">http://www.twitter.com/key_systems</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    CEO: Alexander Siffrin</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Registration No.: HR B
                  18835 - Saarbruecken</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    V.A.T. ID.: DE211006534</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    Member of the KEYDRIVE
                  GROUP</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="http://www.keydrive.lu" moz-do-not-send="true">www.keydrive.lu</a>
                  &lt;<a href="http://www.keydrive.lu"
                    moz-do-not-send="true">http://www.keydrive.lu</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    This e-mail and its
                  attachments is intended only for the person to</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    whom it is addressed.
                  Furthermore it is not permitted to publish</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    any content of this
                  email. You must not use, disclose, copy, print</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    or rely on this e-mail.
                  If an addressing or transmission error has</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    misdirected this e-mail,
                  kindly notify the author by replying to</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    this e-mail or
                  contacting us by telephone.</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>
                     _______________________________________________</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    gnso-rds-pdp-wg mailing
                  list</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="mailto:gnso-rds-pdp-wg@icann.org"
                    moz-do-not-send="true">gnso-rds-pdp-wg@icann.org</a>
                  &lt;<a href="mailto:gnso-rds-pdp-wg@icann.org"
                    moz-do-not-send="true">mailto:gnso-rds-pdp-wg@icann.org</a>&gt;</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>    <a
                    href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg"
                    moz-do-not-send="true">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg</a></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span></span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>--</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite">
              <blockquote type="cite"><span>jonathan matkowsky, vp - ip
                  &amp; head of global brand threat mitigation</span><br>
              </blockquote>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>--</span><br>
            </blockquote>
            <blockquote type="cite"><span>Bei weiteren Fragen stehen wir
                Ihnen gerne zur Verfügung.</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Mit freundlichen Grüßen,</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Volker A. Greimann</span><br>
            </blockquote>
            <blockquote type="cite"><span>- Rechtsabteilung -</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Key-Systems GmbH</span><br>
            </blockquote>
            <blockquote type="cite"><span>Im Oberen Werk 1</span><br>
            </blockquote>
            <blockquote type="cite"><span>66386 St. Ingbert</span><br>
            </blockquote>
            <blockquote type="cite"><span>Tel.: +49 (0) 6894 - 9396 901</span><br>
            </blockquote>
            <blockquote type="cite"><span>Fax.: +49 (0) 6894 - 9396 851</span><br>
            </blockquote>
            <blockquote type="cite"><span>Email: <a
                  href="mailto:vgreimann@key-systems.net"
                  moz-do-not-send="true">vgreimann@key-systems.net</a></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Web: <a
                  href="http://www.key-systems.net"
                  moz-do-not-send="true">www.key-systems.net</a> / <a
                  href="http://www.RRPproxy.net" moz-do-not-send="true">www.RRPproxy.net</a></span><br>
            </blockquote>
            <blockquote type="cite"><span><a
                  href="http://www.domaindiscount24.com"
                  moz-do-not-send="true">www.domaindiscount24.com</a> /
                <a href="http://www.BrandShelter.com"
                  moz-do-not-send="true">www.BrandShelter.com</a></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Folgen Sie uns bei Twitter
                oder werden Sie unser Fan bei Facebook:</span><br>
            </blockquote>
            <blockquote type="cite"><span><a
                  href="http://www.facebook.com/KeySystems"
                  moz-do-not-send="true">www.facebook.com/KeySystems</a></span><br>
            </blockquote>
            <blockquote type="cite"><span><a
                  href="http://www.twitter.com/key_systems"
                  moz-do-not-send="true">www.twitter.com/key_systems</a></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Geschäftsführer: Alexander
                Siffrin</span><br>
            </blockquote>
            <blockquote type="cite"><span>Handelsregister Nr.: HR B
                18835 - Saarbruecken</span><br>
            </blockquote>
            <blockquote type="cite"><span>Umsatzsteuer ID.: DE211006534</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Member of the KEYDRIVE GROUP</span><br>
            </blockquote>
            <blockquote type="cite"><span><a
                  href="http://www.keydrive.lu" moz-do-not-send="true">www.keydrive.lu</a></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Der Inhalt dieser Nachricht
                ist vertraulich und nur für den angegebenen Empfänger
                bestimmt. Jede Form der Kenntnisgabe, Veröffentlichung
                oder Weitergabe an Dritte durch den Empfänger ist
                unzulässig. Sollte diese Nachricht nicht für Sie
                bestimmt sein, so bitten wir Sie, sich mit uns per
                E-Mail oder telefonisch in Verbindung zu setzen.</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>--------------------------------------------</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Should you have any further
                questions, please do not hesitate to contact us.</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Best regards,</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Volker A. Greimann</span><br>
            </blockquote>
            <blockquote type="cite"><span>- legal department -</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Key-Systems GmbH</span><br>
            </blockquote>
            <blockquote type="cite"><span>Im Oberen Werk 1</span><br>
            </blockquote>
            <blockquote type="cite"><span>66386 St. Ingbert</span><br>
            </blockquote>
            <blockquote type="cite"><span>Tel.: +49 (0) 6894 - 9396 901</span><br>
            </blockquote>
            <blockquote type="cite"><span>Fax.: +49 (0) 6894 - 9396 851</span><br>
            </blockquote>
            <blockquote type="cite"><span>Email: <a
                  href="mailto:vgreimann@key-systems.net"
                  moz-do-not-send="true">vgreimann@key-systems.net</a></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Web: <a
                  href="http://www.key-systems.net"
                  moz-do-not-send="true">www.key-systems.net</a> / <a
                  href="http://www.RRPproxy.net" moz-do-not-send="true">www.RRPproxy.net</a></span><br>
            </blockquote>
            <blockquote type="cite"><span><a
                  href="http://www.domaindiscount24.com"
                  moz-do-not-send="true">www.domaindiscount24.com</a> /
                <a href="http://www.BrandShelter.com"
                  moz-do-not-send="true">www.BrandShelter.com</a></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Follow us on Twitter or join
                our fan community on Facebook and stay updated:</span><br>
            </blockquote>
            <blockquote type="cite"><span><a
                  href="http://www.facebook.com/KeySystems"
                  moz-do-not-send="true">www.facebook.com/KeySystems</a></span><br>
            </blockquote>
            <blockquote type="cite"><span><a
                  href="http://www.twitter.com/key_systems"
                  moz-do-not-send="true">www.twitter.com/key_systems</a></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>CEO: Alexander Siffrin</span><br>
            </blockquote>
            <blockquote type="cite"><span>Registration No.: HR B 18835 -
                Saarbruecken</span><br>
            </blockquote>
            <blockquote type="cite"><span>V.A.T. ID.: DE211006534</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>Member of the KEYDRIVE GROUP</span><br>
            </blockquote>
            <blockquote type="cite"><span><a
                  href="http://www.keydrive.lu" moz-do-not-send="true">www.keydrive.lu</a></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>This e-mail and its
                attachments is intended only for the person to whom it
                is addressed. Furthermore it is not permitted to publish
                any content of this email. You must not use, disclose,
                copy, print or rely on this e-mail. If an addressing or
                transmission error has misdirected this e-mail, kindly
                notify the author by replying to this e-mail or
                contacting us by telephone.</span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <blockquote type="cite"><span>_______________________________________________</span><br>
            </blockquote>
            <blockquote type="cite"><span>gnso-rds-pdp-wg mailing list</span><br>
            </blockquote>
            <blockquote type="cite"><span><a
                  href="mailto:gnso-rds-pdp-wg@icann.org"
                  moz-do-not-send="true">gnso-rds-pdp-wg@icann.org</a></span><br>
            </blockquote>
            <blockquote type="cite"><span><a
                  href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg"
                  moz-do-not-send="true">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg</a></span><br>
            </blockquote>
            <blockquote type="cite"><span></span><br>
            </blockquote>
            <span></span><br>
            <span></span><br>
            <span></span><br>
            <span>-- </span><br>
            <span>"Catch the Magic of Linux..."</span><br>
            <span>------------------------------------------------------------------------</span><br>
            <span>Michael Peddemors, President/CEO LinuxMagic Inc.</span><br>
            <span>Visit us at <a href="http://www.linuxmagic.com"
                moz-do-not-send="true">http://www.linuxmagic.com</a>
              @linuxmagic</span><br>
            <span>------------------------------------------------------------------------</span><br>
            <span>A Wizard IT Company - For More Info <a
                href="http://www.wizard.ca" moz-do-not-send="true">http://www.wizard.ca</a></span><br>
            <span>"LinuxMagic" a Registered TradeMark of Wizard Tower
              TechnoServices Ltd.</span><br>
            <span>------------------------------------------------------------------------</span><br>
            <span>604-682-0300 Beautiful British Columbia, Canada</span><br>
            <span></span><br>
            <span>This email and any electronic data contained are
              confidential and intended</span><br>
            <span>solely for the use of the individual or entity to
              which they are addressed.</span><br>
            <span>Please note that any views or opinions presented in
              this email are solely</span><br>
            <span>those of the author and are not intended to represent
              those of the company.</span><br>
            <span>_______________________________________________</span><br>
            <span>gnso-rds-pdp-wg mailing list</span><br>
            <span><a href="mailto:gnso-rds-pdp-wg@icann.org"
                moz-do-not-send="true">gnso-rds-pdp-wg@icann.org</a></span><br>
            <span><a
                href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg"
                moz-do-not-send="true">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg</a></span><br>
          </div>
        </blockquote>
        <br>
        <fieldset class="mimeAttachmentHeader"></fieldset>
        <br>
        <pre wrap="">_______________________________________________
gnso-rds-pdp-wg mailing list
<a class="moz-txt-link-abbreviated" href="mailto:gnso-rds-pdp-wg@icann.org" moz-do-not-send="true">gnso-rds-pdp-wg@icann.org</a>
<a class="moz-txt-link-freetext" href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg" moz-do-not-send="true">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg</a></pre>
      </blockquote>
      <br>
      <pre class="moz-signature" cols="72">-- 
Bei weiteren Fragen stehen wir Ihnen gerne zur Verfügung.

Mit freundlichen Grüßen,

Volker A. Greimann
- Rechtsabteilung -

Key-Systems GmbH
Im Oberen Werk 1
66386 St. Ingbert
Tel.: +49 (0) 6894 - 9396 901
Fax.: +49 (0) 6894 - 9396 851
Email: <a class="moz-txt-link-abbreviated" href="mailto:vgreimann@key-systems.net" moz-do-not-send="true">vgreimann@key-systems.net</a>

Web: <a class="moz-txt-link-abbreviated" href="http://www.key-systems.net" moz-do-not-send="true">www.key-systems.net</a> / <a class="moz-txt-link-abbreviated" href="http://www.RRPproxy.net" moz-do-not-send="true">www.RRPproxy.net</a>
<a class="moz-txt-link-abbreviated" href="http://www.domaindiscount24.com" moz-do-not-send="true">www.domaindiscount24.com</a> / <a class="moz-txt-link-abbreviated" href="http://www.BrandShelter.com" moz-do-not-send="true">www.BrandShelter.com</a>

Folgen Sie uns bei Twitter oder werden Sie unser Fan bei Facebook:
<a class="moz-txt-link-abbreviated" href="http://www.facebook.com/KeySystems" moz-do-not-send="true">www.facebook.com/KeySystems</a>
<a class="moz-txt-link-abbreviated" href="http://www.twitter.com/key_systems" moz-do-not-send="true">www.twitter.com/key_systems</a>

Geschäftsführer: Alexander Siffrin
Handelsregister Nr.: HR B 18835 - Saarbruecken 
Umsatzsteuer ID.: DE211006534

Member of the KEYDRIVE GROUP
<a class="moz-txt-link-abbreviated" href="http://www.keydrive.lu" moz-do-not-send="true">www.keydrive.lu</a> 

Der Inhalt dieser Nachricht ist vertraulich und nur für den angegebenen Empfänger bestimmt. Jede Form der Kenntnisgabe, Veröffentlichung oder Weitergabe an Dritte durch den Empfänger ist unzulässig. Sollte diese Nachricht nicht für Sie bestimmt sein, so bitten wir Sie, sich mit uns per E-Mail oder telefonisch in Verbindung zu setzen.

--------------------------------------------

Should you have any further questions, please do not hesitate to contact us.

Best regards,

Volker A. Greimann
- legal department -

Key-Systems GmbH
Im Oberen Werk 1
66386 St. Ingbert
Tel.: +49 (0) 6894 - 9396 901
Fax.: +49 (0) 6894 - 9396 851
Email: <a class="moz-txt-link-abbreviated" href="mailto:vgreimann@key-systems.net" moz-do-not-send="true">vgreimann@key-systems.net</a>

Web: <a class="moz-txt-link-abbreviated" href="http://www.key-systems.net" moz-do-not-send="true">www.key-systems.net</a> / <a class="moz-txt-link-abbreviated" href="http://www.RRPproxy.net" moz-do-not-send="true">www.RRPproxy.net</a>
<a class="moz-txt-link-abbreviated" href="http://www.domaindiscount24.com" moz-do-not-send="true">www.domaindiscount24.com</a> / <a class="moz-txt-link-abbreviated" href="http://www.BrandShelter.com" moz-do-not-send="true">www.BrandShelter.com</a>

Follow us on Twitter or join our fan community on Facebook and stay updated:
<a class="moz-txt-link-abbreviated" href="http://www.facebook.com/KeySystems" moz-do-not-send="true">www.facebook.com/KeySystems</a>
<a class="moz-txt-link-abbreviated" href="http://www.twitter.com/key_systems" moz-do-not-send="true">www.twitter.com/key_systems</a>

CEO: Alexander Siffrin
Registration No.: HR B 18835 - Saarbruecken 
V.A.T. ID.: DE211006534

Member of the KEYDRIVE GROUP
<a class="moz-txt-link-abbreviated" href="http://www.keydrive.lu" moz-do-not-send="true">www.keydrive.lu</a> 

This e-mail and its attachments is intended only for the person to whom it is addressed. Furthermore it is not permitted to publish any content of this email. You must not use, disclose, copy, print or rely on this e-mail. If an addressing or transmission error has misdirected this e-mail, kindly notify the author by replying to this e-mail or contacting us by telephone.



</pre>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
gnso-rds-pdp-wg mailing list
<a class="moz-txt-link-abbreviated" href="mailto:gnso-rds-pdp-wg@icann.org">gnso-rds-pdp-wg@icann.org</a>
<a class="moz-txt-link-freetext" href="https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg">https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg</a></pre>
    </blockquote>
    <br>
  </body>
</html>