Internet DRAFT - draft-bambenek-porter-dnsop-whois-over-dns

draft-bambenek-porter-dnsop-whois-over-dns



Network Working Group                                       J. Bambenek
Internet Draft                                               ThreatSTOP
Intended status: Standards Track                              R. Porter
Expires: December 30, 2019                           Palo Alto Networks
                                                          June 30, 2019


                Domain Contact Information (WHOIS) over DNS
             draft-bambenek-porter-dnsop-whois-over-dns-01.txt


Abstract

   Domain contact information over DNS provides a vehicle for
   exchanging contact information in a programmatic and reliable
   manner. DNS has a ubiquitous presence within the internet
   infrastructure and will act as a reliable publication method for
   contact information exchange. This RFC provides an agreed upon
   structure, voluntarily, to publish points of contact for domains.

   This document outlines the methodology for utilizing DNS TXT records
   for voluntary publication of various forms of contact. The intended
   purpose is to provide a faster means of reliable contact for
   professionals, cyber-defense of domains.



Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.  It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html




Bambenek, Porter      Expires December 325, 2019               [Page 1]

Internet-Draft              WHOIS over DNS                    June 2019


   This Internet-Draft will expire on December 30, 2019.

Copyright Notice

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document.

Table of Contents


   1. Introduction...................................................3
      1.1. Rationale for Using DNS...................................3
      1.2. Rationale to Publish or Not Public WHOIS over DNS
      Information....................................................4
   2. Conventions used in this document..............................4
   3. Administrative Contact Information.............................4
      3.1. Administrative Contact Name...............................5
      3.2. Administrative Contact Phone Number.......................5
      3.3. Administrative Contact E-mail Address.....................5
      3.4. Administrative Contact Address............................5
   4. Technical Contact Information..................................6
      4.1. Technical Contact Name....................................6
      4.2. Technical Contact Phone Number............................6
      4.3. Technical Contact E-mail Address..........................6
      4.4. Technical Contact Address.................................7
   5. Network Contact Information....................................7
      5.1. Network Contact Name......................................7
      5.2. Network Contact Phone Number..............................7
      5.3. Network Contact E-mail Address............................7
      5.4. Network Contact Address...................................8
   6. Security / Abuse Contact Information...........................8
      6.1. Security / Abuse Contact Name.............................8
      6.2. Security / Abuse Contact Phone Number.....................8
      6.3. Security / Abuse Contact E-mail Address...................9
      6.4. Security / Abuse Contact Address..........................9
   7. All-in-One Option..............................................9
      7.1. "All" Contact Name........................................9
      7.2. "All" Contact Phone Number...............................10
      7.3. "All" Contact E-mail Address.............................10
      7.4. "All" Contact Address....................................10
   8. Security Considerations.......................................10
   9. IANA Considerations...........................................11
   10. References...................................................11


Bambenek, Porter      Expires December 30, 2019                [Page 2]

Internet-Draft              WHOIS over DNS                    June 2019


      10.1. Normative References....................................11
      10.2. Informative References..................................12
   11. Acknowledgments..............................................12
   Appendix A. Copyright Notice.....................................13

1. Introduction

   In lieu of recent events and legislation that has impacted the
   global availability of the current WHOIS protocol and underlying
   model, a new method for distributing contact information for domains
   is necessary. This method must rely on the consent of the domain
   owners and be optional in order to comply with emerging privacy law.
   As an additional requirement, the existing protocol does not allow
   for internationalization and that should be corrected with whatever
   successor system is designed.

   The availability of this information has proved an invaluable
   resource for security and anti-abuse professionals in preventing
   spam, detecting malicious infrastructure, and preemptive detection
   of election manipulation operations. Maintaining some system to both
   distribute this information (should it be voluntarily published) in
   a manner that allows for automated retrieval and analysis is key.

1.1. Rationale for Using DNS

   All resources communicating on the Internet already use DNS to
   distribute information. In many cases, these domains are already
   using text records for SPF, DKIM, CAA, and other types to distribute
   information about their infrastructure and identity to validate
   communication and prevent abuse.

   One of the benefits of the WHOIS system outlined in RFC 3912
   [RFC3912] is that records are stored and distributed by a different
   entity who performs some measure of validation, at least for the e-
   mail address. This means that if a domain owner were compromised,
   someone else has contact information to get in touch with the true
   own to organize remediation. Using WHOIS Over DNS at least separates
   the distribution of this information from a webserver and makes it
   less likely a hostile actor could manipulate the contact information
   as well in the event of a compromise.

   It is less ideal that full administrative separation in a different
   organization, but DNS and webservers are typically separate so
   compromise of both simultaneously would be rare (albeit not
   impossible).




Bambenek, Porter      Expires December 30, 2019                [Page 3]

Internet-Draft              WHOIS over DNS                    June 2019


   Additionally, internationalization is already well-established in
   DNS using punycode as outlined in RFC 3492 [RFC3492].

   DNS TXT records as specified in RFC 1463 [RFC1463] are already in
   wide use and is where WHOIS over DNS information SHOULD be stored.
   These TXT records SHALL be tied to "_whois" subdomain TXT record.
   This roughly follows the convention already used by DMARC records as
   specified in RFC 7489 [RFC7489] so implementation should be easy and
   DNS providers should already be able to support the addition of
   these new records.

1.2. Rationale to Publish or Not Public WHOIS over DNS Information

   There are a wide variety of reasons to publish or not publish valid
   contact information that is available for anyone in the world to
   use. Those concerned about privacy or who are otherwise at-risk
   based on their online activities may wish to hide this information.
   Others may wish to publish it so reputational engines treat their e-
   mail and other communication as more valid.

   Each use case is unique and a "one size fits all" approach cannot
   work on a global Internet. This document was written so that
   publishing or not publishing is optional, whether individual or
   "role-based" information is used is a choice, and that this
   information is preserved for use by automated systems.

   All commercial DNS providers and DNS servers SHALL support these
   record types.

2. Conventions used in this document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

   In this document, these words will appear with that interpretation
   only when in ALL CAPS. Lower case uses of these words are not to be
   interpreted as carrying significance described in RFC 2119.

   In this document, exampledomain.com will be used to describe the DNS
   TXT records used. It is not intended to point to anything currently
   or planned to be in use.

3. Administrative Contact Information

   Administrative contact information MAY be published as a DNS TXT
   record that is prefaced with the letter "a". The administrative


Bambenek, Porter      Expires December 30, 2019                [Page 4]

Internet-Draft              WHOIS over DNS                    June 2019


   contact SHOULD be the person or persons who are representatives of
   the domain and charged with making business and non-technical
   decisions. This person or persons may be on other contact records.

3.1. Administrative Contact Name

   The administrative contact name MAY be created, but if it is, SHALL
   be stored using the name "aname". This contact name may refer to an
   individual or a role name (i.e. "Business Administrator"). Punycode
   can be used to support internationalization of that name. An example
   record of this type would be:

   _whois.exampledomain.com.  14400 IN TXT   "aname=John Bambenek"

3.2. Administrative Contact Phone Number

   The administrative contact phone number MAY be created, but if it
   is, SHALL be stored using the name "aphone". This phone number MAY
   be a direct dial to an individual or to a monitored phone by a group
   of individuals. It SHOULD however, be a line that would be monitored
   by a live person. The phone number MUST be stored in accordance with
   the ITU standard for international numbers [E.164]. An example of
   the record is would be:

   _whois.exampledomain.com.  14400 IN TXT   "aphone=+13127254225"

3.3. Administrative Contact E-mail Address

   The administrative contact e-mail address MAY be created, but if it
   is, SHALL be stored using the name "aemail". This e-mail may be a
   role-based e-mail address or an individual e-mail account. In either
   case, it MUST be monitored for messages. An example of this record
   would be:

   _whois.exampledomain.com.  14400 IN TXT
      "aemail=bambenek@illinois.edu"

3.4. Administrative Contact Address

   The administrative contact address MAY be created, but if it is,
   SHALL be stored using the name "aaddress". This MUST be stored using
   the valid convention of mail services for the country where the
   address resides in and include the country at the end. This address
   MUST exist and MUST correctly represent an address where the
   administrative contact can receive mail. An example of this record
   would be:



Bambenek, Porter      Expires December 30, 2019                [Page 5]

Internet-Draft              WHOIS over DNS                    June 2019


   _whois.exampledomain.com.  14400 IN TXT   "aaddress=201 N. Goodwin
   Ave., Urbana, IL 61801, US"

4. Technical Contact Information

   Technical contact information MAY be published as a DNS TXT record
   that is prefaced with the letter "t". The technical contact SHOULD
   be the person or persons who are representatives of the technical
   aspects of Internet-facing services provided by the domain (i.e. web
   server administrator, e-mail administrator). This person or persons
   may be on other contact records.

4.1. Technical Contact Name

   The technical contact name MAY be created, but if it is, SHALL be
   stored using the name "tname". This contact name may refer to an
   individual or a role name (i.e. "Website Administrator"). Punycode
   can be used to support internationalization of that name. An example
   record of this type would be:

   _whois.exampledomain.com.  14400 IN TXT   "tname=John Bambenek"

4.2. Technical Contact Phone Number

   The administrative contact phone number MAY be created, but if it
   is, SHALL be stored using the name "tphone". This phone number MAY
   be a direct dial to an individual or to a monitored phone by a group
   of individuals. It SHOULD however, be a line that would be monitored
   by a live person. The phone number MUST be stored in accordance with
   the ITU standard for international numbers [E.164]. An example of
   the record is would be:

   _whois.exampledomain.com.  14400 IN TXT   "tphone=+13127254225"

4.3. Technical Contact E-mail Address

   The administrative contact e-mail address MAY be created, but if it
   is, SHALL be stored using the name "temail". This e-mail may be a
   role-based e-mail address or an individual e-mail account. In either
   case, it MUST be monitored for messages. An example of this record
   would be:

   _whois.exampledomain.com.  14400 IN TXT
      "temail=bambenek@illinois.edu"





Bambenek, Porter      Expires December 30, 2019                [Page 6]

Internet-Draft              WHOIS over DNS                    June 2019


4.4. Technical Contact Address

   The administrative contact address MAY be created, but if it is,
   SHALL be stored using the name "taddress". This MUST be stored using
   the valid convention of mail services for the country where the
   address resides in and include the country at the end. This address
   MUST exist and MUST correctly represent an address where the
   technical contact can receive mail. An example of this record would
   be:

   _whois.exampledomain.com.  14400 IN TXT   "taddress=201 N. Goodwin
   Ave., Urbana, IL 61801, US"

5. Network Contact Information

   Network contact information MAY be published as a DNS TXT record
   that is prefaced with the letter "n". The network contact should be
   the person or persons who are representatives of the domain and
   charged with making networking decisions on behalf of the domain.
   This person or persons may be on other contact records.

5.1. Network Contact Name

   The network contact name MAY be created, but if it is, SHALL be
   stored using the name "nname". This contact name may refer to an
   individual or a role name (i.e. "Network Administrator"). Punycode
   can be used to support internationalization of that name. An example
   record of this type would be:

   _whois.exampledomain.com.  14400 IN TXT   "nname=John Bambenek"

5.2. Network Contact Phone Number

   The administrative contact phone number MAY be created, but if it
   is, SHALL be stored using the name "nphone". This phone number MAY
   be a direct dial to an individual or to a monitored phone by a group
   of individuals responsible for networking. It SHOULD however, be a
   line that would be monitored by a live person. The phone number MUST
   be stored in accordance with the ITU standard for international
   numbers [E.164]. An example of the record is would be:

   _whois.exampledomain.com.  14400 IN TXT   "nphone=+13127254225"

5.3. Network Contact E-mail Address

   The network contact e-mail address MAY be created, but if it is,
   SHALL be stored using the name "nemail". This e-mail may be a role-


Bambenek, Porter      Expires December 30, 2019                [Page 7]

Internet-Draft              WHOIS over DNS                    June 2019


   based e-mail address or an individual e-mail account. In either
   case, it MUST be monitored for messages. An example of this record
   would be:

   _whois.exampledomain.com.  14400 IN TXT
      "nemail=bambenek@illinois.edu"

5.4. Network Contact Address

   The administrative contact address MAY be created, but if it is,
   SHALL be stored using the name "naddress". This MUST be stored using
   the valid convention of mail services for the country where the
   address resides in and include the country at the end. This address
   MUST exist and MUST correctly represent an address where the network
   contact can receive mail. An example of this record would be:

   _whois.exampledomain.com.  14400 IN TXT   "naddress=201 N. Goodwin
   Ave., Urbana, IL 61801, US"

6. Security / Abuse Contact Information

   Security or abuse contact information MAY be published as a DNS TXT
   record that is prefaced with the letter "s". The security or abuse
   contact SHOULD be the person or persons who are representatives of
   the domain and should receive reports on security or abuse concerns
   from resources under the domain or being targeted to resources
   served by the domain. This person or persons may be on other contact
   records.

6.1. Security / Abuse Contact Name

   The security or abuse contact name MAY be created, but if it is,
   SHALL be stored using the name "sname". This contact name may refer
   to an individual or a role name (i.e. "Business Administrator").
   Punycode can be used to support internationalization of that name.
   An example record of this type would be:

   _whois.exampledomain.com.  14400 IN TXT   "sname=John Bambenek"

6.2. Security / Abuse Contact Phone Number

   The security or abuse contact phone number MAY be created, but if it
   is, SHALL be stored using the name "sphone". This phone number MAY
   be a direct dial to an individual or to a monitored phone by a group
   of individuals responsible for security and/or abuse reports for the
   domain. It SHOULD however, be a line that would be monitored by a
   live person. The phone number MUST be stored in accordance with the


Bambenek, Porter      Expires December 30, 2019                [Page 8]

Internet-Draft              WHOIS over DNS                    June 2019


   ITU standard for international numbers [E.164]. An example of the
   record is would be:

   _whois.exampledomain.com.  14400 IN TXT   "sphone=+13127254225"

6.3. Security / Abuse Contact E-mail Address

   The security or abuse contact e-mail address MAY be created, but if
   it is, SHALL be stored using the name "semail". This e-mail may be a
   role-based e-mail address or an individual e-mail account. In either
   case, it MUST be monitored for messages. An example of this record
   would be:

   _whois.exampledomain.com.  14400 IN TXT
      "semail=bambenek@illinois.edu"

6.4. Security / Abuse Contact Address

   The security or abuse contact address MAY be created, but if it is,
   SHALL be stored using the name "saddress". This MUST be stored using
   the valid convention of mail services for the country where the
   address resides in and include the country at the end. This address
   MUST exist and MUST correctly represent an address where the
   administrative contact can receive mail. An example of this record
   would be:

   _whois.exampledomain.com.  14400 IN TXT   "saddress=201 N. Goodwin
   Ave., Urbana, IL 61801, US"

7. All-in-One Option

   In order to create a simple option for those cases where the contact
   would be the same for all four types of WHOIS contacts, an "all"
   record MAY be used to take the place of the four individual
   categories to simplify DNS administration for the domain owner.

7.1. "All" Contact Name

   The "all" contact name MAY be created, but if it is, SHALL be stored
   using the name "allname". This contact name may refer to an
   individual or a role name (i.e. "Domain Owner"). Punycode can be
   used to support internationalization of that name. An example record
   of this type would be:

   _whois.exampledomain.com.  14400 IN TXT   "allname=John Bambenek"




Bambenek, Porter      Expires December 30, 2019                [Page 9]

Internet-Draft              WHOIS over DNS                    June 2019


7.2. "All" Contact Phone Number

   The "all" contact phone number MAY be created, but if it is, SHALL
   be stored using the name "allphone". This phone number MAY be a
   direct dial to an individual or to a monitored phone by a group of
   individuals. It SHOULD however, be a line that would be monitored by
   a live person. The phone number MUST be stored in accordance with
   the ITU standard for international numbers [E.164]. An example of
   the record is would be:

   _whois.exampledomain.com.  14400 IN TXT   "allphone=+13127254225"

7.3. "All" Contact E-mail Address

   The "all" contact e-mail address MAY be created, but if it is, SHALL
   be stored using the name "allemail". This e-mail may be a role-based
   e-mail address or an individual e-mail account. In either case, it
   MUST be monitored for messages. An example of this record would be:

   _whois.exampledomain.com.  14400 IN TXT
      "allemail=bambenek@illinois.edu"

7.4. "All" Contact Address

   The "all" contact address MAY be created, but if it is, SHALL be
   stored using the name "alladdress". This MUST be stored using the
   valid convention of mail services for the country where the address
   resides in and include the country at the end. This address MUST
   exist and MUST correctly represent an address where the contact can
   receive mail. An example of this record would be:

   _whois.exampledomain.com.  14400 IN TXT   "alladdress=201 N. Goodwin
   Ave., Urbana, IL 61801, US"

8. Security Considerations

   As with any publication of potentially personally identifiable
   information, this could lead to individuals receiving unwanted
   communication of various sorts. This standard does not require
   specific individuals to be identified, per se, as all the contact
   types can be role-based accounts.

   The purpose of this document is to establish a standard by which
   "someone" can be contacted in the case of a need to contact a domain
   owner and to help establish reputation for those looking to connect
   with a given domain and have transactions with services on that
   domain.


Bambenek, Porter      Expires December 30, 2019               [Page 10]

Internet-Draft              WHOIS over DNS                    June 2019


   The publication of this information is immensely useful to the
   security and anti-abuse industry for a wide variety of reasons and
   this information can and should be used for reputational scoring of
   domains to filter out potentially abusive infrastructure.

   The publication of this data in DNS is optional, but third-parties
   are free to use the lack of this information as a negative indicator
   when considering interconnectivity (such as the delivery of e-mail).

   If the domain registration itself were seized by a hostile third-
   party, this system would not be able to authoritatively identify the
   "victim"-owner. Passive DNS, however, will help in an overwhelming
   majority of these cases.

   The limitation of this approach is that there is no true validation
   of any of the fields that will be published in these records. Under
   the current system in the general case, an e-mail address is
   validated before a domain is published. In this case, individuals
   can use unsuspecting third-parties' contact information. Those
   incidents, when discovered, are all but certainties that the
   underlying domain is abusive (except in the case of plausible typos)
   and provide further negative reputational data that can be used.

   A third-party system could be used to provide for such validation
   but that is outside the scope of this document. Additionally,
   invalid entries, fake addresses, non-working email addresses or
   malformed content MAY be used to negatively score a domain for
   security reputation purposes.

   DNSSEC MUST be fully deployed on any domain using these conventions
   to help ensure reliability of this information.

9. IANA Considerations

   There are no IANA considerations as this will use the existing DNS
   TXT (type 16) RR.

10. References

10.1. Normative References

   [RFC1463] Rosenbaum, R., "Using the Domain Name System to Store
             Arbitary String Attributes", RFC 1463, May 1993.

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
             Requirement Levels", BCP 14, RFC 2119, DOI
             10.17487/RFC2119, March 1997.


Bambenek, Porter      Expires December 30, 2019               [Page 11]

Internet-Draft              WHOIS over DNS                    June 2019


   [RFC3492] Costello, A., "Punycode: A Bootstring encoding of Unicode
             for Internationalized Domain Names in Applications
             (IDNA)", RFC 3492, March 2003.

   [RFC3912] Daigle, L., "WHOIS Protocol Specification", RFC 3912,
             September 2004.

   [RFC7489] Kucherawy, M., Zwicky, E., "Domain-based Message
             Authentication, Reporting, and Conformance (DMARC)", RFC
             7489, March 2015.

10.2. Informative References

   [RFC1034] Mockapetris, P., "Domain Names - Concepts and Facilities",
             RFC 1034, November 1987.

   [RFC1035] Mockapetris, P., "Domain Names - Implementation and
             Specification", RFC 1035, November 1987.

   [RFC4033] Arends, R., Austein, R., Larson, M., Massey, D., and S.
             Rose, "DNS Security Introduction and Requirements", RFC
             4033, March 2005.

   [RFC5322] Resnick, P., "Internet Message Format", RFC 5322, October
             2008.

   [E.164]   International Telecommunications Union, "Recommendatino
             E.164: The international public telecommuncations number
             plan", May 1997, http://www.itu.int/.

11. Acknowledgments

   This document was prepared using 2-Word-v2.0.template.dot.
















Bambenek, Porter      Expires December 30, 2019               [Page 12]

Internet-Draft              WHOIS over DNS                    June 2019


Appendix A.                 Copyright Notice

   Copyright (c) 2019 IETF Trust and the persons identified as the 
   document authors.  All rights reserved.

   Redistribution and use in source and binary forms, with or without
   modification, is permitted pursuant to, and subject to the license
   terms contained in, the Simplified BSD License set forth in Section
   4.c of the IETF Trust's Legal Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info).

Authors' Addresses

   John Bambenek
   ThreatSTOP, Inc.
   2720 Loker Avenue West, Suite G, Carlsbad, CA 92010, USA

   Email: bambenek@illinois.edu

   Richard Porter
   Palo Alto Networks
   3000 Tannery Way, Santa Clara, CA 95054, USA

   Email: rporter@paloaltonetworks.com

























Bambenek, Porter      Expires December 30, 2019               [Page 13]