[tech-whois] A follow up session in San Francisco?

Michael Young michael at mwyoung.ca
Tue Mar 8 19:51:21 UTC 2011


Absolutely, a user ID accessing a whois system does not have to be tied to
known identity if the overall policy supports anonymity.  The elements of
usage enforcement can be applied against the user ID just the same.  Of
course you would want some control heuristics preventing the automated
creation of those anonymous user ID's in any sort of scale, but that's a
well understood problem with many existing tools that can help with that.

Best Regards,

Michael Young
M:+1-647-289-1220



-----Original Message-----
From: Dave Piscitello [mailto:dave.piscitello at icann.org] 
Sent: March-08-11 2:49 PM
To: Michael Young; 'Smith, Bill'
Cc: tech-whois at icann.org
Subject: Re: [tech-whois] A follow up session in San Francisco?

Michael you raise an excellent point re: IPv6.

I also think you touch on important benefits of "knowing the source":
accountability and auditing. Anonymity is very different from accountability
but the Internet fails to make this distinction and thus abuse flourishes.

There are several forms of authentication that can provide auditing or a
basis for rate limiting that do not require disclosure of personal
information or creation of an identity, e.g., guest accounts that can be
bound to sessions, connections, validated origin IP addresses. There's a lot
of room between "unknown origin, unknown querying party" to "non-reputiable
originator of a request".


On 3/8/11 2:20 PM, "Michael Young" <michael at mwyoung.ca> wrote:

> "- access control, which most WHOIS providers have implemented at the 
> TCP/IP level
> 
> Without source address validation, IP level access control is not 
> sufficient. Even with IP level access control, the granularity of 
> access control is arguably less than one might want in a future 
> incarnation of a Whois service. For example, an IP level access 
> control does not accommodate a future policy that might block a user 
> of group X from accessing to a subset of registration data elements 
> {b} while allowing a user of group Y access to those elements. A 
> robust directory service protocol ought to accommodate this."
> 
> First of all I agree with this point but let me reinforce/add that the 
> current rate limiting methodologies based on traffic from source IPs 
> becomes much trickier with IPv6.  I don't see any practical reason why 
> every user of a whois service shouldn't have to authenticate to get a 
> response. Just because its a free public service doesn't mean someone 
> seeking the data can't sign up for a user ID.  Sign up systems can be 
> automated and protected from machine based registration, subsequent 
> whois lookups would always be tied to User ID and usage policy 
> enforcement can be made against individuals instead of IP addresses. 
> You can also create classes of users with different traffic policy 
> expectations (provided you were still in compliance with any contractual
obligations).
> 
> I know this is a fundamental change from today, but the more I think 
> about it, the more I see the practicality and operational sensibility 
> in going that route.
> 
> Best Regards,
> 
> Michael Young
> M:+1-647-289-1220
> 
> 
> 
> -----Original Message-----
> From: tech-whois-bounces at icann.org 
> [mailto:tech-whois-bounces at icann.org] On Behalf Of Smith, Bill
> Sent: March-08-11 1:22 PM
> To: Dave Piscitello
> Cc: tech-whois at icann.org
> Subject: Re: [tech-whois] A follow up session in San Francisco?
> 
> 
> On Mar 7, 2011, at 12:13 PM, Dave Piscitello wrote:
> 
> 
> On 3/7/11 2:45 PM, "Jay Daley" 
> <jay at nzrs.net.nz<mailto:jay at nzrs.net.nz>>
> wrote:
> [snipped]
> 
> The only two that cannot be addressed this way are:
> 
> - authentication, which is the feature where I think we are talking 
> about a very different protocol from WHOIS
> 
> Agree.
> 
> Why would we consider requiring authentication when accurate WHOIS 
> information is available to the public?
> 
> 
> - access control, which most WHOIS providers have implemented at the 
> TCP/IP level
> 
> Without source address validation, IP level access control is not 
> sufficient. Even with IP level access control, the granularity of 
> access control is arguably less than one might want in a future 
> incarnation of a Whois service. For example, an IP level access 
> control does not accommodate a future policy that might block a user 
> of group X from accessing to a subset of registration data elements 
> {b} while allowing a user of group Y access to those elements. A 
> robust directory service protocol ought to accommodate this.
> 
> 
> 
> With respect, I trust we aren't talking about a directory service for 
> the Internet public.
> 
> 
> _______________________________________________
> tech-whois mailing list
> tech-whois at icann.org<mailto:tech-whois at icann.org>
> https://mm.icann.org/mailman/listinfo/tech-whois
> 
> 
> _______________________________________________
> tech-whois mailing list
> tech-whois at icann.org
> https://mm.icann.org/mailman/listinfo/tech-whois
> 




More information about the tech-whois mailing list