[gnso-rds-pdp-wg] Use cases: Actual / Real

Vayra, Fabricio (Perkins Coie) FVayra at perkinscoie.com
Thu Aug 11 15:48:56 UTC 2016


Great question, Elaine.  Out of curiosity, did we get an answer?

Thanks,

Fabricio Vayra
PARTNER
700 Thirteenth Street, N.W. Suite 600
Washington, DC 20005-3960
D. +1.202.654.6255
F. +1.202.654.9678
E. FVayra at perkinscoie.com<mailto:FVayra at perkinscoie.com>
[cid:image001.jpg at 01D054C5.01001EE0]


From: gnso-rds-pdp-wg-bounces at icann.org [mailto:gnso-rds-pdp-wg-bounces at icann.org] On Behalf Of Elaine Pruis
Sent: Monday, August 08, 2016 6:10 PM
To: Rob Golding
Cc: RDS PDP WG
Subject: Re: [gnso-rds-pdp-wg] Use cases: Actual / Real

Thanks for the actual/real use case examples.
You wrote:
(whois data not actually needed as we have all the data in our system anyway)
Do you think if the customers knew to look at whois they would have been able to sort out any of these issues themselves?


On Wed, Aug 3, 2016 at 5:42 PM, Rob Golding <rob.golding at astutium.com<mailto:rob.golding at astutium.com>> wrote:
Hi

Having just returned from a conference, I've had opportunity to review some of the Support Tickets handled in my absence, as we do every month-end anyway, but paid special attention to those relating to domains.

I've excluded many (as the logs don't show a whois was done), which largely consist of:
* how do I renew
* how do I cancel
* will you take payment automatically
type questions and limited this to real "use cases" where a WHOIS has been part of either the affected party needing data/contact info (if server logs show a whois query from that user), or during the investigation by registrar staff (where the server logs show a whois from our staff ips) or where whois data was pasted into the ticket, from the last 7 days ...

I'll try and layout to the 'template format' tomorrow:


#1
End User: My Email Stopped Working at the Weekend
Actual Issue: Domain expired on Friday
Details accessed from WHOIS: domain name, expiry date, registrar name
Resolution: we're only the host, directed to contact their registrar
(client had not actually looked at domain/whois, we wouldnt have needed to look to know we're not the registrar)


#2
End User: Everything down, I can't PING www.*REDACTED*<http://www.*REDACTED*>
Actual Issue: Host "vanished" as nameservers no longer online/responding/serving records
Details accessed from WHOIS: domain name, expiry date, registrar name, nameservers
Resolution: Informed to try and contact their host another method, if that fails, will need to find a new one and update their domain. Provided details of wayback machine and our hosting plans
(whois data not actually needed as we have all the data in our system anyway)


#3
End User: Manual Domain Renewal
Actual Issue: Registrant failed to renew domain/disabled renewal
Details accessed from WHOIS: domain name, expiry date, registrar name
Resolution: provided link to client portal to login and instructions on renewal
(whois data not actually needed as we have all the data in our system anyway)


#4
End User: domain transfer still pending after 2 weeks - help!
Actual Issue: Domain is still locked at losing registrar
Details accessed from WHOIS: domain name, epp status, registrar name
Resolution: suggested to login to current registrar (where is claims to be unlocked) and re-lock and unlock again, and advise use when done to restart the transfer process
(client had already been emailled the lock/status data at the start of the transfer process)


#5
End User: My website is down again
Actual Issue: Domain has 2 valid (responding with A record) nameservers and 2 invalid namesrevers
Details accessed from WHOIS: domain name, nameservers
Resolution: client added the nameservers for their hosting instead of replacing the nameservers already on the domain, support removed the additional 2 namesrevers for them and instructions on clearing cache provided
(had client looked at whois they may have spotted this themselves - whois data not actually needed as we have all the data in our system anyway)


#6
End User: Domain showing as Expired but paid for
Actual Issue: Registrant had failed to pay us for renewal, but paid a scammer instead
Details accessed from WHOIS: domain name, expiry date, status code, registrar
Resolution: client educated about domain scams, payment taken by phone by us (registrar) for renewal and renewal processed, told to contact card issuer regarding the "directory service" $75 payment they made to the scammer
(whois data not actually needed as we have all the data in our system anyway)


#7
End User: URGENT Unable to access website/email - *REDACTED* expired ?
Actual Issue: Domain has expired as renewal not paid, redirects to renewal required page
Details accessed from WHOIS: domain name, expiry date, registrar name
Resolution: Registrant had ignored upcoming domain expiry notices, and renewal invoice ( email address exists and is valid but they're not regularly monitoring it).  They couldn't/didn't get the post-expiry notices ( which woudl have equally been ignored anyway ) as the contact email was @thedomain. Registrant couldn't now login and pay as no recollection of password, and reminders unable to be sent (as contact is @thedomain which has expired). Details validated "offline", renewal processed on their behalf to get back online and both email and paper copies of invoice sent - and now showing as paid.
(whois data not actually needed as we have all the data in our system anyway)


#8
End User: Assigning www.*REDACTED*<http://www.*REDACTED*>
Actual Issue: Designer wants to "hand-off" the billing/management/ownership of domain and hosting to end-user
Details accessed from WHOIS: domain name, registrant name
Resolution: Designer reminded on how to have their client signup directly to agree to our T&Cs and about our service-push process. Domain is currently in name of designer (as all of theirs are) so they're the RNH, so (as per their previous similar requests) a change-of-owner process will need to be followed which old and new registrant will need to take part in
(whois data not actually needed as we have all the data in our system anyway)


#9
End User: My website has been hijacked
Actual Issue: Accessing domain in a browser shows a hosting company sales/holding page
Details accessed from WHOIS: domain name, nameservers, registrar name, registrant name
Resolution: no changes have been made recently to the domain (last update was Feb 2015) and the hosting account (with us) is active but no traffic since 29/July (domain is not expired)
It would appear they'd used the DNS service(s) included in their previous hosting to repoint the domain to the new hosting rather than updating the nameservers at their registrar (not us), and that hosting account no longer exists at the host.
Advised to first contact the previous host as the domain is in the name of the host, to get nameservers and "ownership" sorted out, then to transfer the domain to us so they can manage it all in one place


I'm personally dissapointed in the final use-case, as it used the "personal details" about the registrant, which conflicts with our opinion about what information should be 'public' - although not strictly needed in providing the support (as the advice to contact the old host / dns provider would have been the same without that, but it did highlight an issue the client was unaware of)

Rob
_______________________________________________
gnso-rds-pdp-wg mailing list
gnso-rds-pdp-wg at icann.org<mailto:gnso-rds-pdp-wg at icann.org>
https://mm.icann.org/mailman/listinfo/gnso-rds-pdp-wg<https://urldefense.proofpoint.com/v2/url?u=https-3A__mm.icann.org_mailman_listinfo_gnso-2Drds-2Dpdp-2Dwg&d=CwMFaQ&c=XRWvQHnpdBDRh-yzrHjqLpXuHNC_9nanQc6pPG_SpT0&r=6lUxzkhJPN5qts-Nve5TYqxoGjP81z1kCvXgsmw-MiQ&m=tW6GxQQCLdM5efUjUA5iequaNB7eqqeuaiGAvvrTV3Q&s=JrQuzCEqg-88kUlFfjxPKeOAq86atBS5BWvFHGwgIK0&e=>



--

[Donuts Inc.]<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.donuts.domains&d=CwMFaQ&c=XRWvQHnpdBDRh-yzrHjqLpXuHNC_9nanQc6pPG_SpT0&r=6lUxzkhJPN5qts-Nve5TYqxoGjP81z1kCvXgsmw-MiQ&m=tW6GxQQCLdM5efUjUA5iequaNB7eqqeuaiGAvvrTV3Q&s=zIErhbhvo2erJ8BXroNZCvx62F0iR4BM2jT-ZOkZpjQ&e=>
Elaine Pruis, Vice President, Operations
Donuts Inc.<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.donuts.domains&d=CwMFaQ&c=XRWvQHnpdBDRh-yzrHjqLpXuHNC_9nanQc6pPG_SpT0&r=6lUxzkhJPN5qts-Nve5TYqxoGjP81z1kCvXgsmw-MiQ&m=tW6GxQQCLdM5efUjUA5iequaNB7eqqeuaiGAvvrTV3Q&s=zIErhbhvo2erJ8BXroNZCvx62F0iR4BM2jT-ZOkZpjQ&e=>
10500 NE 8th Street, Suite 350, Bellevue Washington, 98004, U.S.A. | Telephone: 509.899.3161
[Twitter]<https://urldefense.proofpoint.com/v2/url?u=https-3A__twitter.com_DonutsInc&d=CwMFaQ&c=XRWvQHnpdBDRh-yzrHjqLpXuHNC_9nanQc6pPG_SpT0&r=6lUxzkhJPN5qts-Nve5TYqxoGjP81z1kCvXgsmw-MiQ&m=tW6GxQQCLdM5efUjUA5iequaNB7eqqeuaiGAvvrTV3Q&s=Sd1Eda5VL259-tAlli3_HbUF3sq1TlyPDyAHnj6H8SU&e=>[Facebook]<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.facebook.com_donutstlds&d=CwMFaQ&c=XRWvQHnpdBDRh-yzrHjqLpXuHNC_9nanQc6pPG_SpT0&r=6lUxzkhJPN5qts-Nve5TYqxoGjP81z1kCvXgsmw-MiQ&m=tW6GxQQCLdM5efUjUA5iequaNB7eqqeuaiGAvvrTV3Q&s=2cn47QkqC5Q9iIzRaUtVbqsrCfrBmGz7VKoTPw_u5cw&e=>[Linked In]<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.linkedin.com_company_donuts-2Dinc-2D&d=CwMFaQ&c=XRWvQHnpdBDRh-yzrHjqLpXuHNC_9nanQc6pPG_SpT0&r=6lUxzkhJPN5qts-Nve5TYqxoGjP81z1kCvXgsmw-MiQ&m=tW6GxQQCLdM5efUjUA5iequaNB7eqqeuaiGAvvrTV3Q&s=64Mo9SQSqsOI48gexR1kdGIAgmyBzzB_qz_yo0PY1qo&e=>




________________________________

NOTICE: This communication may contain privileged or other confidential information. If you have received it in error, please advise the sender by reply email and immediately delete the message and any attachments without copying or disclosing the contents. Thank you.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20160811/9eb068ef/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.jpg
Type: image/jpeg
Size: 4701 bytes
Desc: image001.jpg
URL: <http://mm.icann.org/pipermail/gnso-rds-pdp-wg/attachments/20160811/9eb068ef/image001.jpg>


More information about the gnso-rds-pdp-wg mailing list