EREG - PowerPoint PPT Presentation

1 / 7
About This Presentation
Title:

EREG

Description:

moving forward with IRIS. draft-newton-iris-ereg-01.txt. incorporated ... common, so what's the likelihood of encountering a messed up NAPTR or SRV record? ... – PowerPoint PPT presentation

Number of Views:29
Avg rating:3.0/5.0
Slides: 8
Provided by: anew1
Learn more at: https://www.ietf.org
Category:

less

Transcript and Presenter's Notes

Title: EREG


1
EREG IRIS for ENUM
  • Andrew Newton ltandy_at_hxr.usgt
  • 62th IETF, Minneapolis, MN, USA
  • 11 November 2003

2
Quick Update
  • CRISP WG
  • base requirements done
  • protocol selection done
  • moving forward with IRIS
  • draft-newton-iris-ereg-01.txt
  • incorporated comments received for 00.
  • removed cruft from section 6
  • updated to be current with iris-core -04

3
Why?
  • Is a whois service needed for ENUM?
  • Will ENUM just be a small community of providers?
  • Will all ENUM interactions remain intra-national?
  • cross-border abuse?
  • cross-border coordination?
  • Will there be delegations to private entities?
  • b2b e2e coordination?

4
Who?
  • Who will resolve ENUM problems?
  • To resolve an issue, does the end-point sys admin
    have to rely on the upward chain?
  • Who do you contact?
  • Large network operators have different sys admins
    for different purposes abuse, noc, etc
  • Which one is which?
  • Is that SOA a SIP address or an SMTP address or
    an XMPP address?

5
What?
  • Just what can go wrong?
  • Messed up MX records are fairly common, so whats
    the likelihood of encountering a messed up NAPTR
    or SRV record?
  • Will fat-fingering cause incorrect delegations or
    bad NS sets at the zone apex?
  • What will we do about abuse?
  • Will ENUM will be easy prey for war-dialing SIP
    spammers?

6
This Proposal
  • Specifies a vector for coordination.
  • Not mandating the vector for coordination.
  • Is one part of the answer.
  • No protocol/technology can be the whole answer.
  • Policy plays a major role.
  • Attempts to be policy-neutral.
  • Providers have differing requirements based on
    jurisdiction.

7
Applicability
  • Public-facing
  • account for data miners and abusive users
  • Privacy
  • pluggable authentication for adaptable
    authorization
  • Structured
  • well-understood multiple methods of alternative
    contact
  • I18N
  • localization of protocol elements
  • multiple language contact equivalents
  • standard queries and results
Write a Comment
User Comments (0)
About PowerShow.com