A Technical Overview of.tel. Jim Reid jim@telnic.org



Similar documents
Configuring an External Domain

The Future of DNS. Johan Ihrén Netnod. October 15,

Preparatory Meeting for Phase 2 of Philippine National ENUM Trial

The Domain Name System

Lecture 2 CS An example of a middleware service: DNS Domain Name System

How To Guide Edge Network Appliance How To Guide:

Implementation notes on Integration of Avaya Aura Application Enablement Services with Microsoft Lync 2010 Server.

Configuring a Domain to work with your Server

How Comcast Built An Open Source Content Delivery Network National Engineering & Technical Operations

Implementation Guide SAP NetWeaver Identity Management Identity Provider

SnapLogic Salesforce Snap Reference

HTG XROADS NETWORKS. Network Appliance How To Guide: DNS Delegation. How To Guide

Introduction Configuration & Spam Detection WinWare Webmail Accounts Account Notes Definitions...

Front-End Performance Testing and Optimization

How to set up the Integrated DNS Server for Inbound Load Balancing

Getting Started With Your Virtual Dedicated Server. Getting Started Guide

What communication protocols are used to discover Tesira servers on a network?

Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN

Smartphone Enterprise Application Integration

Vodafone Business Product Management Group. Web and Domain Frequently Asked Questions (FAQs)

1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide

HW9 WordPress & Google Analytics

DNS and BIND. David White

Improved Credential and SSL Configuration for EE 7

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice Upperside WiFi Voice 2005

Personalised icalendar Teaching Timetable Feed for Staff and Students

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

User Guide. You will be presented with a login screen which will ask you for your username and password.

Remote Access with Outlook 2003 Using RPC over HTTPS

How to Configure Web Authentication on a ProCurve Switch

SSO Plugin. Release notes. J System Solutions. Version 3.6

DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES

A collaborative platform for knowledge management

Application and service delivery with the Elfiq idns module

Configuration Management of Massively Scalable Systems

Japan Registry Service. ENUM Trial in Japan. NGI2 & IPv6 DNS Operation Workshop 5 Dec 2003 Yoshiro YONEYA <yone@jprs.co.jp> Copyright 2003 JPRS

Application Notes for DuVoice with Avaya IP Office 8.1 Issue 1.1

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Strong Authentication in details

Using etoken for Securing s Using Outlook and Outlook Express

SAC 049 SSAC Report on DNS Zone Risk Assessment and Management

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

Amazon Web Services EC2 & S3

SharePoint Integration Framework Developers Cookbook

Small Business Server Part 2

Multi-Homing Security Gateway

Software Architecture Document

ECG-1615A. How to Integrate IBM Enterprise Content Management Solutions With Microsoft SharePoint and IBM Connections. elinar.com

How to set up Outlook Anywhere on your home system

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

How to Add Domains and DNS Records

How to Scale out SharePoint Server 2007 from a single server farm to a 3 server farm with Microsoft Network Load Balancing on the Web servers.

OpenLDAP Oracle Enterprise Gateway Integration Guide

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015

Policy Overview and Definitions

Glossary of Technical Terms Related to IPv6

Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

How To Prepare For The Second Data Center On Payware Connect For A Second Time

Oracle Service Bus Examples and Tutorials

DATA COMMUNICATOIN NETWORKING

Authentication and Single Sign On

Kaspersky Lab Mobile Device Management Deployment Guide

Securing an Internet Name Server

Atomia Cloud Hosting Platform Overview

Architectural Overview

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1

Applied Network Services. Janet Services for Resilience. Andrew Davis Network Services Coordinator

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Getting Started Guide. November 25, 2013

SIP and VoIP 1 / 44. SIP and VoIP

ITIS 2110 Lab 11: Domain Name Server. Tyler Everhart 11/12/2010

Talk-101 User Guide. DNSGate

Getting Started Guide. New Meeting Experience April 13, 2013

Quick Start Guide Getting started with your Hetzner package

Transferring Your Internet Services

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

The Use of DNS Resource Records

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Application Notes for Algo 8028 SIP Door Phone with Avaya IP Office - Issue 1.0

ENUM: an Enabler for VoIP and Next Generation Services

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2

DANE Secured Demonstration. Wes Hardaker Parsons

1.1.3 Versions Verified SIP Carrier status as of 18 Sep 2014 : validated on CIC 4.0 SU6.

S y s t e m A r c h i t e c t u r e

FortiVoice. Version 7.00 User Guide

Transcription:

A Technical Overview of.tel Jim Reid jim@telnic.org

Introduction Why.tel is different Architectural overview Technical/business considerations DNS characteristics/challenges

Why.tel is different Not just yet another (boring) registry-registrar type new TLD Conventional delegation-only model though No user defined address records in.tel ICANN made us do it....tel delegations will primarily contain NAPTR records It s about contact data, not content

Architectural Overview Sponsoring Organisation System Member database & guests Developer web site Name Service Provider System Applications

NAPTR Records - 1 Identify arbitrary communication end-points: Phone numbers, email/sip addresses, IM handles, URLs, SMS/MMS, etc., etc. Amazingly powerful and flexible Order and preferences Regexp matching and substitution Can build data structures in DNS Essentially mini-programs

NAPTR Records - 2 Horribly, horribly ugly: jim.tel. IN NAPTR 10 54 "U" "E2U+voice:sip" \ "!^.*$!sip:jim@rfc1035.com!". A SIP address for yours truly Even experts get these wrong Can t ever put these in front of the public Try explaining this to your mother... Conventional zone file managers just won t do

DNS Challenges in.tel - 1 Very different zone characteristics Conventional zone files are small and static Handful of usual RRs that rarely change.tel zones should be big and frequently changing Many tens (hundreds?) of NAPTRs Potentially updated several times a day Changes have to propagate FAST Low TTLs to avoid stale data getting cached

DNS Challenges in.tel - 2 Usual server/zone provisioning models won t do Typical push 1-2 times a day.tel will need far more rapid propagation than that Effectively updating in real-time Lots of zones to manage too => Database-driven back ends Can t really do this with text-based zone and config files

DNS Challenges in.tel - 3 Lookups in.tel have to be fast and reliable If not,.tel is bad... All name servers in.tel will be accredited Must meet Telnic requirements No lame delegations or misconfigured servers All name servers live under dns.nic.tel Should mean no more than two lookups to resolve anything

DNS Features Privacy Users must be able to protect their private contact details, but DNS is public Profiles Switch published contact data: I m on a plane/asleep/in a meeting/at home New RR in the pipeline to indicate this Keywords Useful for search/directory services

DNS Provisioning NSP system (Tel-hosting) Published specs and SOAP API Free open-source software implementation Initially free hosting service from Telnic Registrars will probably run NSP systems (one day) Tel-hosting providers will be accredited too... Support SOAP APIs, privacy & profile features, import/export, keyword insertion, undo, etc.

NSP Overview Written in Java (J2EE) Tomcat & Apache Postgres as default back-end database Would work with any reasonable RDBMS Partitions: multiple virtual instantiations Could be one per registrar Or one per reseller on a registrar s NSP Supports most sane DNS implementations BIND (text or DLZ), PowerDNS, NSD, etc.

The Privacy Issue How can an email address or phone number go into the DNS and be unreadable by spammers and marketing scumbags but still be available to friends and family? Encrypt them! Use x-crypto NAPTR service type See I-D draft-timms-encrypt-naptr-01 Friending system analogous to social networking web sites

How Friending Works - 1 Bob wants to get private contact data from Alice SO system generates RSA key pair for Bob Public key component stored in the DNS as KEY (NKEY) RR Private key stored in PKCS#8 at SO system SO system doesn t know Bob s private key Bob sends a can I be your friend? message to Alice saying where this public key lives

How Friending Works - 2 Alice accepts the request at her leisure Alice s NSP gets Bob s public key from DNS Alice s NSP encrypts contact data for Bob with his public key Private contact data for Bob stored under uniquestring.alice.tel Friending acknowledgement from Alice tells Bob which domain name to use to retrieve the encrypted content she s just set up Bob remembers this :-)

What this means for alice.tel Alice may have tens of contacts Phone/fax/mobile/work numbers, email & SIP addresses, IM handles, etc., etc. If she has tens of friends, she can publish different encrypted contacts for each of them => Some hundreds of NAPTRs in alice.tel NSP can store encrypted NAPTRs in its database No need to encrypt on the fly when Alice switches her profile

What this means for NSP Users will want to publish same contact data to a group of individuals Granularity of NSP is one-to-one NSP has the concept of groups Group can have arbitrary number of members Same content published to entire group Each group member has a discrete RSA public key and subdomain of alice.tel

Applications Need to provide tools to promote usage: Publish and lookup stuff in.tel Unhappy experiences with web browsers Telnic-operated web proxy Free open-source software: Plug-ins to do address book integration for Outlook, Windows Mobile & Blackberry Proof of concept iphone client

Parked Applications MacOSX AddressBook plug-in Java client for Symbian mobile phones NTN wizard Likely to be thrown over the wall to developer web site: dev.telnic.org

vip.tel Free test of the.tel system Get real-world experience of user behaviour and what functionality is liked/hated Staged introduction of feature set Applications, privacy, profiles Will go away when.tel launches Sign up by email: vip@telnic.org

Launch Timetable vip.tel to be announced at ICANN meeting next week Stops at Landrush but may re-emerge later Sunrise starts 15:00 GMT Dec 3rd 2008 Landrush starts 15:00 GMT Feb 3rd 2009 GA begins 15:00 GMT March 24th 2009