SlideShare a Scribd company logo
| 1
Edward Lewis
APRICOT 2019
27 February 2019
Experience using RIR WhoIs
... or Reaching Operators with a Message
| 2
The Setting
¤ From 2016-2018, ICANN had an operational message to deliver
¡ But no list of all "who need to know"
¡ Not everyone needed to know, but many did
¤ We tried conferences
¡ We spoke so often we were told "we've heard the message"
¤ We tried letters to IXPs, top-level domain registries, even regulators
¤ But "data" suggested we were missing operators (specifically DNS)
¤ We settled on trying issuing a survey
| 3
The Background
¤ The project involved is the "first" DNS root zone KSK rollover
¤ This is not "yet another KSK rollover talk"
¡ Nothing more in these slides is about that topic
¤ This a "lesson learned" about operational coordination, from that project
| 4
The Survey
¤ Designed to grab people's attention
¡ Some are carefully crafted to learn something
¡ This an exercise in getting a reaction
¤ Finding the target audience
¡ We have network traffic suggesting DNSSEC activity
¡ We convert the addresses into Autonomous System numbers
¡ Send email to the contacts for the Autonomous System operators
¤ Simple!
| 5
The Plan
¤ Beginning with a list of Autonomous System numbers
¡ And with a short deadline
¤ Make use of the Regional Internet Registries databases, via WhoIs, to get
a list of email addresses
¡ Yes, WhoIs,not RDAP
¤ Did we think this would work?
¡ No
¡ But it was our only hope and we had a really good reason
| 6
Our Doubts
¤ The threat of "Spamming"
¡ A specific case of data mining
¡ There's a history of people using databases of email addresses to send
unsolicited messages, usually for the purposes of advertising,
marketing, or anti-social behavior
• Rate limits on queries
• Obscured/hidden, missing email information
• Acceptable use claims
¡ The mail system is built to defend against unwarranted email
• Sender reputation scoring
| 7
Skipping to the End
¤ We survived
¤ We contacted nearly 16,000 autonomous systems
¤ We weren't accused of violating email rules
¤ We weren't labelled "Spammer!"
¤ And the project appears to have succeeded in getting our message out
¤But it wasn't easy (enough to prevent this talk!)
| 8
In This Talk...
¤ This work was done with the WhoIs systems in place
¡ RDAP is the still (in) the future
¤ There's no "how to" in this talk
¡ Avoiding providing a recipe for "spamming"/data mining
¤ With a goal of "how can we provide a means for global operations contacts"
suggestions are made
| 9
Disclaimer: not disparaging RIR functions
¤ What's presented here seems at first blush to be suggesting work on
contacting operators could be better
¡ Well, it can, but it isn't clear there are "guilty parties"
¤ Registration information is largely treated as "garbage in, garbage out"
¡ An issue with public safety (or extrajudicial efforts like reputation
managers) when investigating abuse from an address – long known
issue
¡ But now we see this as possibly hindering operations
¤ And note that the KSK rollover may be a unique event
| 10
WhoIs yesterday, RDAP tomorrow
¤ Yes, WhoIs (port 43) or its web-version is being replaced by RDAP
¤ At the time of the survey, RDAP didn't seem mature enough to use "in the
heat of the moment"
¤ Treat this more as a problem statement/observation than a request for
action or suggestion for updating
| 11
Approach to using the RIR WhoIs
¤ The activity – given a list of AutNums, find email addresses for each
operator to invite to the survey
¤ First step – determine the right RIR or NIR source
¤ Second step – determine query and how to parse results
¤ Third step – select the addresses per AutNum
| 12
Which WhoIs Server? – ARIN or LACNIC as starting
¤ To determine region
¡ ARIN made this easiest, based on response
¡ LACNIC was possible, except for rate limiting and the complication of
having an NIR
¡ Other regions either weren't tried or didn't make it easy
¤ Complication – RIR and NIR operators would enter their own addresses in
fields when there was no "correct answer"
¡ "Inside" knowledge to realize this
| 13
Special flags
¤ ARIN has its unique set of flags
¤ RIPE and AFRINIC use special flags, burned into some whois clients
¡ Clients on MacOS and Linux differed, one way was the flags
¡ Linux:
$ whois -B -h whois.ripe.net as0
% This is the RIPE Database query service. ...
¡ MacOS:
$ whois -B -h whois.ripe.net as0
whois: illegal option – B ...
¤ WhoIs clients don't help: no "—version" to tell which is installed
| 14
National Internet Registries
¤ NIRs are a great idea, but little known outside the RIR community
¤ WhoIs services at NIRs differ
¡ Some run WhoIs for their region's address space
¡ Some run WhoIs for Autonomous System numbers in addition to the RIR
¡ Some run WhoIs for Autonomous System numbers instead of the RIR
¡ Note: "in addition to" versus "instead of"
¤ No clear documentation of this state of affairs
| 15
APNIC & its NIRs
¤ APNIC presented three challenges in parsing its responses
¤ One: NIR handling
¡ Seven NIRs but only one exclusively manages AutNum registration
information
¡ Took time to "discover this" and automate a way to parse the results
¤ Two: AutNum block information
¡ Had to learn to discard the APNIC "enclosing AutNum block" information
to get to the AutNum specific information
¤ Three: For NIR managed space, needed unique parsing code
| 16
LACNIC & its NIRs
¤ LACNIC presented a first—order challenge
¡ Rate limiting, but this could be relaxed with justification
¤ LACNIC also has multiple (two) NIRs
¡ And like APNIC, only one actively manages its AutNum Registrations
¤ LACNIC's "AutNum-active" NIR
¡ Also has rate limiting, again, relaxed with justification
¡ Has the overwhelming number of AutNum information – 16% of the
global numbers we needed to contact
| 17
Parsing Responses
¤ There's a "latent desire" of operators to include more information:
remarks: trouble: | Operational issues: noc@example.com |
remarks: trouble: | Peering issues: peering-office@example.com |
¤ Or hide information
remarks: Contact < op AT example DOT com > re general operations
¤ Or restrict contact
Comment: DO NOT E-MAIL ... AS IT WILL NOT BE READ/ANSWERED.
¤ Or "lay down the rules"
Comment: Please ... Failure to comply with this statement ...
| 18
Comments and Remarks
¤ In a world where "one lookup" is done, these make sense
¤ Where automation is involved, these don't
| 19
Up-level comments
¤ Whether RDAP has matured enough to help this is something I haven't
studied yet
¡ Matter of time, priorities
¤ A major concern was whether this is acceptable use
¡ But we decided to give it a try anyway
| 20
Experience with the "acceptable use"
¤ 16,000 AutNums contacted
¡ Note – number of operators is less, many run multiple AutNums
¡ One invitee noted we had an error in our email message. One!
¡ One invitee suggested that we were dancing around GDPR. One!
¡ One invitee teased us "are you for real".
¤ We did receive more outright notes of appreciation
¤ We did answer dozens of questions in responses to us
¤ Many probably ignored our call to participate in a survey
| 21
General Issues with RIR "WhoIs" information
¤ A lot of domain specific knowledge is needed
¡ Knowing who the RIRs are and the NIR structure
¤ Lack of common query – language or service point
¤ Lack of common response format
¤ Lack of specific fields for contact
¡ Use of remarks or comment fields to supply information
¤ Use of "dummy values" to indicate a who is "referral"
¤ Blanket defense against data mining (rate limiting)
| 22
Specific Issues with APNIC whois information
¤ Remove the AutNum block contact information in a response to a query
about a specific AutNum
¡ This will uncover some errors – missing information or mislabeled
information
¤ Clearer documentation when information is available only at an NIR's
WhoIs service
¤ Haven't researched the process for formalizing that suggestion
| 23
A peak into the future – RDAP formatting
¤ Quick inspections seem that RDAP is deployed as a "drop in" replacement
for WhoIs
¡ JSON seen to have this in sampled output
"remarks" : [ {
"title" : "... Comments",
"description" : [ "Please ...." ]
¤ Would be good to revisit the policies behind WhoIs in light of what RDAP
can do
¡ Tiered-access, richer data structures, and so on
| 24
A peak into the future – RDAP locations
¤ "urls" need to strive for consistency:
¡ https://rdap.arin.net/registry/autnum/0
¡ https://rdap.db.ripe.net/autnum/0
¡ https://rdap.afrinic.net/rdap/autnum/0
¡ http://rdap.apnic.net/autnum/0
• Typing "https://rdap.apnic.net/autnum/0" – note the
"s" in https - makes my browser go to Afrinic
¡ https://rdap-web.lacnic.net/autnum/0
¤ Without commonality, we need tools, with tools we need to have output
suitable for automation
| 25
Engage with ICANN
Visit us at icann.org
Thank You and Questions
Email: edward.lewis@icann.org
flickr.com/icann
linkedin/company/icann@icann
facebook.com/icannorg
youtube.com/icannnews soundcloud/icann
slideshare/icannpresentations
instagram.com/icannorg

More Related Content

What's hot

DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNSDINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
APNIC
 
IETF 112: Internet centrality and its impact on routing
IETF 112: Internet centrality and its impact on routingIETF 112: Internet centrality and its impact on routing
IETF 112: Internet centrality and its impact on routing
APNIC
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSEC
APNIC
 
RIPE 82: An Update on Fragmentation Loss Rates in IPv6
RIPE 82: An Update on Fragmentation Loss Rates in IPv6RIPE 82: An Update on Fragmentation Loss Rates in IPv6
RIPE 82: An Update on Fragmentation Loss Rates in IPv6
APNIC
 
RIPE 82: Measuring Recursive Resolver Centrality
RIPE 82: Measuring Recursive Resolver CentralityRIPE 82: Measuring Recursive Resolver Centrality
RIPE 82: Measuring Recursive Resolver Centrality
APNIC
 
ICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
ICANN DNS Symposium 2021: Measuring Recursive Resolver CentralityICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
ICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
APNIC
 
IETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNSIETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNS
APNIC
 
Thoughts about DNS for DDoS
Thoughts about DNS for DDoSThoughts about DNS for DDoS
Thoughts about DNS for DDoS
APNIC
 
Next generation web protocols
Next generation web protocolsNext generation web protocols
Next generation web protocols
Daniel Austin
 
bdNOG 7 - Re-engineering the DNS - one resolver at a time
bdNOG 7 - Re-engineering the DNS - one resolver at a timebdNOG 7 - Re-engineering the DNS - one resolver at a time
bdNOG 7 - Re-engineering the DNS - one resolver at a time
APNIC
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
ThousandEyes
 
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersNANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
Chika Yoshimura
 
Approaches for Mitigating Discovery Problems in Larger Systems
Approaches for Mitigating Discovery Problems in Larger SystemsApproaches for Mitigating Discovery Problems in Larger Systems
Approaches for Mitigating Discovery Problems in Larger Systems
Real-Time Innovations (RTI)
 
Honeypots and Security
Honeypots and SecurityHoneypots and Security
Honeypots and Security
APNIC
 
RINA Introduction, part II
RINA Introduction, part IIRINA Introduction, part II
RINA Introduction, part II
ICT PRISTINE
 
6 security130123
6 security1301236 security130123
6 security130123
ICT PRISTINE
 
Zombie DNS
Zombie DNSZombie DNS
Zombie DNS
APNIC
 
A constructive review of in network caching a core functionality of icn slides
A constructive review of in network caching a core functionality of icn slidesA constructive review of in network caching a core functionality of icn slides
A constructive review of in network caching a core functionality of icn slides
Anshuman Kalla
 
An Introduction to DANE - Securing TLS using DNSSEC
An Introduction to DANE - Securing TLS using DNSSECAn Introduction to DANE - Securing TLS using DNSSEC
An Introduction to DANE - Securing TLS using DNSSEC
Carlos Martinez Cagnazzo
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
Jisc
 

What's hot (20)

DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNSDINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
DINR 2021 Virtual Workshop: Passive vs Active Measurements in the DNS
 
IETF 112: Internet centrality and its impact on routing
IETF 112: Internet centrality and its impact on routingIETF 112: Internet centrality and its impact on routing
IETF 112: Internet centrality and its impact on routing
 
DNS & DNSSEC
DNS & DNSSECDNS & DNSSEC
DNS & DNSSEC
 
RIPE 82: An Update on Fragmentation Loss Rates in IPv6
RIPE 82: An Update on Fragmentation Loss Rates in IPv6RIPE 82: An Update on Fragmentation Loss Rates in IPv6
RIPE 82: An Update on Fragmentation Loss Rates in IPv6
 
RIPE 82: Measuring Recursive Resolver Centrality
RIPE 82: Measuring Recursive Resolver CentralityRIPE 82: Measuring Recursive Resolver Centrality
RIPE 82: Measuring Recursive Resolver Centrality
 
ICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
ICANN DNS Symposium 2021: Measuring Recursive Resolver CentralityICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
ICANN DNS Symposium 2021: Measuring Recursive Resolver Centrality
 
IETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNSIETF 100: A signalling mechanism for trusted keys in the DNS
IETF 100: A signalling mechanism for trusted keys in the DNS
 
Thoughts about DNS for DDoS
Thoughts about DNS for DDoSThoughts about DNS for DDoS
Thoughts about DNS for DDoS
 
Next generation web protocols
Next generation web protocolsNext generation web protocols
Next generation web protocols
 
bdNOG 7 - Re-engineering the DNS - one resolver at a time
bdNOG 7 - Re-engineering the DNS - one resolver at a timebdNOG 7 - Re-engineering the DNS - one resolver at a time
bdNOG 7 - Re-engineering the DNS - one resolver at a time
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
 
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache ServersNANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
NANOG32 - DNS Anomalies and Their Impacts on DNS Cache Servers
 
Approaches for Mitigating Discovery Problems in Larger Systems
Approaches for Mitigating Discovery Problems in Larger SystemsApproaches for Mitigating Discovery Problems in Larger Systems
Approaches for Mitigating Discovery Problems in Larger Systems
 
Honeypots and Security
Honeypots and SecurityHoneypots and Security
Honeypots and Security
 
RINA Introduction, part II
RINA Introduction, part IIRINA Introduction, part II
RINA Introduction, part II
 
6 security130123
6 security1301236 security130123
6 security130123
 
Zombie DNS
Zombie DNSZombie DNS
Zombie DNS
 
A constructive review of in network caching a core functionality of icn slides
A constructive review of in network caching a core functionality of icn slidesA constructive review of in network caching a core functionality of icn slides
A constructive review of in network caching a core functionality of icn slides
 
An Introduction to DANE - Securing TLS using DNSSEC
An Introduction to DANE - Securing TLS using DNSSECAn Introduction to DANE - Securing TLS using DNSSEC
An Introduction to DANE - Securing TLS using DNSSEC
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
 

Similar to Experience Using RIR Whois

Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security Roadmap
APNIC
 
LEA Workshop dated 09052013
LEA Workshop dated 09052013LEA Workshop dated 09052013
LEA Workshop dated 09052013
APNIC
 
UN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAs
APNIC
 
KSK Rollover 2015-2019
KSK Rollover 2015-2019KSK Rollover 2015-2019
KSK Rollover 2015-2019
APNIC
 
Tips to get the most out of OpenERP. Jean Luc Delsaute & Coralie Girardet, Au...
Tips to get the most out of OpenERP. Jean Luc Delsaute & Coralie Girardet, Au...Tips to get the most out of OpenERP. Jean Luc Delsaute & Coralie Girardet, Au...
Tips to get the most out of OpenERP. Jean Luc Delsaute & Coralie Girardet, Au...Odoo
 
Tips to get the most out of OpenERP
Tips to get the most out of OpenERPTips to get the most out of OpenERP
Tips to get the most out of OpenERP
Audaxis
 
Trends in Resource Sharing: More than Just Numbers
Trends in Resource Sharing: More than Just NumbersTrends in Resource Sharing: More than Just Numbers
Trends in Resource Sharing: More than Just Numberskramsey
 
Global IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem StatementGlobal IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem Statement
APNIC
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learning
Ratnakar Pandey
 
LEA Workshop 11/12/2013
LEA Workshop 11/12/2013LEA Workshop 11/12/2013
LEA Workshop 11/12/2013
APNIC
 
Some news about the SW
Some news about the SWSome news about the SW
Some news about the SW
Ivan Herman
 
Your Slice of the IPv6 Cake
Your Slice of the IPv6 CakeYour Slice of the IPv6 Cake
Your Slice of the IPv6 Cake
RIPE NCC
 
Measuring the End User
Measuring the End User Measuring the End User
Measuring the End User
APNIC
 
( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring
Gouasmia Zakaria
 
Orange Legal Technologies Considering Meet And Confer I L T A Prod...
Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...
Orange Legal Technologies Considering Meet And Confer I L T A Prod...Rob Robinson
 
How it works internet networking icann53
How it works internet networking icann53How it works internet networking icann53
How it works internet networking icann53ICANN
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow Analysis
Alex Henthorn-Iwane
 
CSA on Rails: a practical case-study
CSA on Rails: a practical case-studyCSA on Rails: a practical case-study
CSA on Rails: a practical case-study
calamitas
 
How to Bring Shadow IT to the Light
How to Bring Shadow IT to the LightHow to Bring Shadow IT to the Light
How to Bring Shadow IT to the Light
Rackspace
 
Presentation by Kasper Kisjes (Rijkswaterstaat) and Christoph Balduck (Data T...
Presentation by Kasper Kisjes (Rijkswaterstaat) and Christoph Balduck (Data T...Presentation by Kasper Kisjes (Rijkswaterstaat) and Christoph Balduck (Data T...
Presentation by Kasper Kisjes (Rijkswaterstaat) and Christoph Balduck (Data T...
Patrick Van Renterghem
 

Similar to Experience Using RIR Whois (20)

Routing Security Roadmap
Routing Security RoadmapRouting Security Roadmap
Routing Security Roadmap
 
LEA Workshop dated 09052013
LEA Workshop dated 09052013LEA Workshop dated 09052013
LEA Workshop dated 09052013
 
UN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAs
 
KSK Rollover 2015-2019
KSK Rollover 2015-2019KSK Rollover 2015-2019
KSK Rollover 2015-2019
 
Tips to get the most out of OpenERP. Jean Luc Delsaute & Coralie Girardet, Au...
Tips to get the most out of OpenERP. Jean Luc Delsaute & Coralie Girardet, Au...Tips to get the most out of OpenERP. Jean Luc Delsaute & Coralie Girardet, Au...
Tips to get the most out of OpenERP. Jean Luc Delsaute & Coralie Girardet, Au...
 
Tips to get the most out of OpenERP
Tips to get the most out of OpenERPTips to get the most out of OpenERP
Tips to get the most out of OpenERP
 
Trends in Resource Sharing: More than Just Numbers
Trends in Resource Sharing: More than Just NumbersTrends in Resource Sharing: More than Just Numbers
Trends in Resource Sharing: More than Just Numbers
 
Global IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem StatementGlobal IRR and RPKI: a Problem Statement
Global IRR and RPKI: a Problem Statement
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learning
 
LEA Workshop 11/12/2013
LEA Workshop 11/12/2013LEA Workshop 11/12/2013
LEA Workshop 11/12/2013
 
Some news about the SW
Some news about the SWSome news about the SW
Some news about the SW
 
Your Slice of the IPv6 Cake
Your Slice of the IPv6 CakeYour Slice of the IPv6 Cake
Your Slice of the IPv6 Cake
 
Measuring the End User
Measuring the End User Measuring the End User
Measuring the End User
 
( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring( Ethical hacking tools ) Information grathring
( Ethical hacking tools ) Information grathring
 
Orange Legal Technologies Considering Meet And Confer I L T A Prod...
Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...Orange  Legal  Technologies    Considering  Meet And  Confer    I L T A  Prod...
Orange Legal Technologies Considering Meet And Confer I L T A Prod...
 
How it works internet networking icann53
How it works internet networking icann53How it works internet networking icann53
How it works internet networking icann53
 
Cloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow AnalysisCloud-Scale BGP and NetFlow Analysis
Cloud-Scale BGP and NetFlow Analysis
 
CSA on Rails: a practical case-study
CSA on Rails: a practical case-studyCSA on Rails: a practical case-study
CSA on Rails: a practical case-study
 
How to Bring Shadow IT to the Light
How to Bring Shadow IT to the LightHow to Bring Shadow IT to the Light
How to Bring Shadow IT to the Light
 
Presentation by Kasper Kisjes (Rijkswaterstaat) and Christoph Balduck (Data T...
Presentation by Kasper Kisjes (Rijkswaterstaat) and Christoph Balduck (Data T...Presentation by Kasper Kisjes (Rijkswaterstaat) and Christoph Balduck (Data T...
Presentation by Kasper Kisjes (Rijkswaterstaat) and Christoph Balduck (Data T...
 

More from APNIC

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
APNIC
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
APNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
APNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
APNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APNIC
 

More from APNIC (20)

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 

Recently uploaded

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 

Recently uploaded (20)

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 

Experience Using RIR Whois

  • 1. | 1 Edward Lewis APRICOT 2019 27 February 2019 Experience using RIR WhoIs ... or Reaching Operators with a Message
  • 2. | 2 The Setting ¤ From 2016-2018, ICANN had an operational message to deliver ¡ But no list of all "who need to know" ¡ Not everyone needed to know, but many did ¤ We tried conferences ¡ We spoke so often we were told "we've heard the message" ¤ We tried letters to IXPs, top-level domain registries, even regulators ¤ But "data" suggested we were missing operators (specifically DNS) ¤ We settled on trying issuing a survey
  • 3. | 3 The Background ¤ The project involved is the "first" DNS root zone KSK rollover ¤ This is not "yet another KSK rollover talk" ¡ Nothing more in these slides is about that topic ¤ This a "lesson learned" about operational coordination, from that project
  • 4. | 4 The Survey ¤ Designed to grab people's attention ¡ Some are carefully crafted to learn something ¡ This an exercise in getting a reaction ¤ Finding the target audience ¡ We have network traffic suggesting DNSSEC activity ¡ We convert the addresses into Autonomous System numbers ¡ Send email to the contacts for the Autonomous System operators ¤ Simple!
  • 5. | 5 The Plan ¤ Beginning with a list of Autonomous System numbers ¡ And with a short deadline ¤ Make use of the Regional Internet Registries databases, via WhoIs, to get a list of email addresses ¡ Yes, WhoIs,not RDAP ¤ Did we think this would work? ¡ No ¡ But it was our only hope and we had a really good reason
  • 6. | 6 Our Doubts ¤ The threat of "Spamming" ¡ A specific case of data mining ¡ There's a history of people using databases of email addresses to send unsolicited messages, usually for the purposes of advertising, marketing, or anti-social behavior • Rate limits on queries • Obscured/hidden, missing email information • Acceptable use claims ¡ The mail system is built to defend against unwarranted email • Sender reputation scoring
  • 7. | 7 Skipping to the End ¤ We survived ¤ We contacted nearly 16,000 autonomous systems ¤ We weren't accused of violating email rules ¤ We weren't labelled "Spammer!" ¤ And the project appears to have succeeded in getting our message out ¤But it wasn't easy (enough to prevent this talk!)
  • 8. | 8 In This Talk... ¤ This work was done with the WhoIs systems in place ¡ RDAP is the still (in) the future ¤ There's no "how to" in this talk ¡ Avoiding providing a recipe for "spamming"/data mining ¤ With a goal of "how can we provide a means for global operations contacts" suggestions are made
  • 9. | 9 Disclaimer: not disparaging RIR functions ¤ What's presented here seems at first blush to be suggesting work on contacting operators could be better ¡ Well, it can, but it isn't clear there are "guilty parties" ¤ Registration information is largely treated as "garbage in, garbage out" ¡ An issue with public safety (or extrajudicial efforts like reputation managers) when investigating abuse from an address – long known issue ¡ But now we see this as possibly hindering operations ¤ And note that the KSK rollover may be a unique event
  • 10. | 10 WhoIs yesterday, RDAP tomorrow ¤ Yes, WhoIs (port 43) or its web-version is being replaced by RDAP ¤ At the time of the survey, RDAP didn't seem mature enough to use "in the heat of the moment" ¤ Treat this more as a problem statement/observation than a request for action or suggestion for updating
  • 11. | 11 Approach to using the RIR WhoIs ¤ The activity – given a list of AutNums, find email addresses for each operator to invite to the survey ¤ First step – determine the right RIR or NIR source ¤ Second step – determine query and how to parse results ¤ Third step – select the addresses per AutNum
  • 12. | 12 Which WhoIs Server? – ARIN or LACNIC as starting ¤ To determine region ¡ ARIN made this easiest, based on response ¡ LACNIC was possible, except for rate limiting and the complication of having an NIR ¡ Other regions either weren't tried or didn't make it easy ¤ Complication – RIR and NIR operators would enter their own addresses in fields when there was no "correct answer" ¡ "Inside" knowledge to realize this
  • 13. | 13 Special flags ¤ ARIN has its unique set of flags ¤ RIPE and AFRINIC use special flags, burned into some whois clients ¡ Clients on MacOS and Linux differed, one way was the flags ¡ Linux: $ whois -B -h whois.ripe.net as0 % This is the RIPE Database query service. ... ¡ MacOS: $ whois -B -h whois.ripe.net as0 whois: illegal option – B ... ¤ WhoIs clients don't help: no "—version" to tell which is installed
  • 14. | 14 National Internet Registries ¤ NIRs are a great idea, but little known outside the RIR community ¤ WhoIs services at NIRs differ ¡ Some run WhoIs for their region's address space ¡ Some run WhoIs for Autonomous System numbers in addition to the RIR ¡ Some run WhoIs for Autonomous System numbers instead of the RIR ¡ Note: "in addition to" versus "instead of" ¤ No clear documentation of this state of affairs
  • 15. | 15 APNIC & its NIRs ¤ APNIC presented three challenges in parsing its responses ¤ One: NIR handling ¡ Seven NIRs but only one exclusively manages AutNum registration information ¡ Took time to "discover this" and automate a way to parse the results ¤ Two: AutNum block information ¡ Had to learn to discard the APNIC "enclosing AutNum block" information to get to the AutNum specific information ¤ Three: For NIR managed space, needed unique parsing code
  • 16. | 16 LACNIC & its NIRs ¤ LACNIC presented a first—order challenge ¡ Rate limiting, but this could be relaxed with justification ¤ LACNIC also has multiple (two) NIRs ¡ And like APNIC, only one actively manages its AutNum Registrations ¤ LACNIC's "AutNum-active" NIR ¡ Also has rate limiting, again, relaxed with justification ¡ Has the overwhelming number of AutNum information – 16% of the global numbers we needed to contact
  • 17. | 17 Parsing Responses ¤ There's a "latent desire" of operators to include more information: remarks: trouble: | Operational issues: noc@example.com | remarks: trouble: | Peering issues: peering-office@example.com | ¤ Or hide information remarks: Contact < op AT example DOT com > re general operations ¤ Or restrict contact Comment: DO NOT E-MAIL ... AS IT WILL NOT BE READ/ANSWERED. ¤ Or "lay down the rules" Comment: Please ... Failure to comply with this statement ...
  • 18. | 18 Comments and Remarks ¤ In a world where "one lookup" is done, these make sense ¤ Where automation is involved, these don't
  • 19. | 19 Up-level comments ¤ Whether RDAP has matured enough to help this is something I haven't studied yet ¡ Matter of time, priorities ¤ A major concern was whether this is acceptable use ¡ But we decided to give it a try anyway
  • 20. | 20 Experience with the "acceptable use" ¤ 16,000 AutNums contacted ¡ Note – number of operators is less, many run multiple AutNums ¡ One invitee noted we had an error in our email message. One! ¡ One invitee suggested that we were dancing around GDPR. One! ¡ One invitee teased us "are you for real". ¤ We did receive more outright notes of appreciation ¤ We did answer dozens of questions in responses to us ¤ Many probably ignored our call to participate in a survey
  • 21. | 21 General Issues with RIR "WhoIs" information ¤ A lot of domain specific knowledge is needed ¡ Knowing who the RIRs are and the NIR structure ¤ Lack of common query – language or service point ¤ Lack of common response format ¤ Lack of specific fields for contact ¡ Use of remarks or comment fields to supply information ¤ Use of "dummy values" to indicate a who is "referral" ¤ Blanket defense against data mining (rate limiting)
  • 22. | 22 Specific Issues with APNIC whois information ¤ Remove the AutNum block contact information in a response to a query about a specific AutNum ¡ This will uncover some errors – missing information or mislabeled information ¤ Clearer documentation when information is available only at an NIR's WhoIs service ¤ Haven't researched the process for formalizing that suggestion
  • 23. | 23 A peak into the future – RDAP formatting ¤ Quick inspections seem that RDAP is deployed as a "drop in" replacement for WhoIs ¡ JSON seen to have this in sampled output "remarks" : [ { "title" : "... Comments", "description" : [ "Please ...." ] ¤ Would be good to revisit the policies behind WhoIs in light of what RDAP can do ¡ Tiered-access, richer data structures, and so on
  • 24. | 24 A peak into the future – RDAP locations ¤ "urls" need to strive for consistency: ¡ https://rdap.arin.net/registry/autnum/0 ¡ https://rdap.db.ripe.net/autnum/0 ¡ https://rdap.afrinic.net/rdap/autnum/0 ¡ http://rdap.apnic.net/autnum/0 • Typing "https://rdap.apnic.net/autnum/0" – note the "s" in https - makes my browser go to Afrinic ¡ https://rdap-web.lacnic.net/autnum/0 ¤ Without commonality, we need tools, with tools we need to have output suitable for automation
  • 25. | 25 Engage with ICANN Visit us at icann.org Thank You and Questions Email: edward.lewis@icann.org flickr.com/icann linkedin/company/icann@icann facebook.com/icannorg youtube.com/icannnews soundcloud/icann slideshare/icannpresentations instagram.com/icannorg