Presentation is loading. Please wait.

Presentation is loading. Please wait.

Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?

Similar presentations


Presentation on theme: "Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?"— Presentation transcript:

1

2

3 Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?

4 What are the provisioning methods used in the Australian registry systems?

5 The Key points: Object model Web based interface Socket based interface (EPP)

6 The Object Model Registrars – Registrar name, address, telephone Contacts – contact name, organisation, address, telephone, fax, email Hosts – host name, IP address Domains – domain name, name servers, subordinate hosts, associated contacts

7 Object State - Status Objects maintain status Available statuses include: client/server – approved, cancelled, deleteProhibited, hold, rejected, renewProhibited, transferProhibited, updateProhibited inactive, linked, ok, pending pending – delete, transfer, verification

8 Web Based Interface Encrypted and secured using HTTPS(SSL) Good for small volumes Contains most features Limited technical knowledge Standard Web based forms – like objects

9 Socket Interface IETF EPP Protocol Extensible and Customisable SSL Encryption Full Automation Good for high volumes

10 EPP in detail An XML based protocol Full W3C compliant XML schema definition Makes use of XML namespaces Extensibility UTF - Internationalisation Manipulate all properties of objects Transport independent

11 Typical EPP command XML Header EPP Namespace EPP Command Object Specific Namespace Object Specific Information EPP Transaction ID

12 Typical EPP response XML Header EPP Namespace EPP Response Object Specific Namespace Object Specific Information EPP Transaction IDs EPP Response Code EPP Response Message

13 EPP Commands Hello and Greeting Login and Logout Check and Info Create, Modify and Delete Transfer (request, cancel and approve) Poll Status

14 Hello and Greeting Used to establish presence and server capabilities Client says “Hello” Server replies with its capabilities, current time and policies in effect. Sent as soon as transport session established

15 Login and Logout Used to start and stop session based communications Username and password Objects to be managed in that session Client can request policies to be used during that session Credentials used in the login are assumed for all following transactions in the established session

16 Check and Info Used to view information on objects in the registry database Check availability of objects e.g. Domains Names Retrieve the properties of objects you sponsor Retrieve information on other objects using the “authinfo”

17 Create, Modify and Delete Used to manipulate objects in the registry database Create new objects (Domains, Contacts and Hosts) Creating registrar becomes “sponsor” of object Modify details of existing objects that logged in registrar currently “sponsors” Delete objects, objects may fall into a pending delete status depending on policies in effect

18 Transfer (request, cancel and approve) Transfer of objects (Domains and Contacts) Gaining Registrar requests transfer from another Registrar Losing Registrar can approve or reject the transfer depending on policy Transfers will be server approved after a timeout period

19 Poll Used to check the server message queue Low balance messages Transfer request messages Expiry messages Used to acknowledge receipt of messages Also used to keep sessions active

20 Status Commands are atomic i.e. succeed or fail Can look up a command by transaction ID and find out if it succeeded or failed Can get details of previous command

21 Advantages of using EPP Industry standard - IETF Extensible - will support modifications or fit policy Vast array of toolkits available Well-defined atomic operation Full Automation

22 Example of Extensibility NAPTR records in domain create command

23

24 How are these provisioning systems secured?

25 Security viewed on three Levels Security of systems Authentication of Registrars (Tier 2) Authentication of Registrants

26 Security of systems Physical Security Firewalls – Authorised IPs only Security Policies Data

27 Registrar Authentication 3 Layers Secure Certificate Signed by AusRegistry Access given only to Registrar IP address range EPP Credentials (Username and Password)

28 Registrar Authentication Certificate Common name must match Username Username must match IP addresses being used Certificate must match IP address range Can’t use someone else’s certificate from your addresses

29 Registrant Authentication All domains contain “authinfo” field (domain password) “authinfo” is required to perform operations on domain, especially transfers Exactly how this is implemented is based on policy

30 Questions?

31 Thank you

32

33


Download ppt "Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?"

Similar presentations


Ads by Google