[acm-tf] Draft Minutes for ACM-TF Meeting, Monday May 2nd 2011
Kaveh Ranjbar kranjbar at ripe.net
Tue May 3 09:33:36 CEST 2011
Hello,
Please find the draft of yesterday's meeting minutes below.
Special Thanks to Denis and Athina who have prepared this document.
Kind Regards,
Kaveh.
-----------------------------------------------------------
Acm-tf
Amsterdam, 2 May 2011
1) Participants:
Brian Nisbet (Chair)
Wilfried Woeber
Peter Koch
Tobias Knecht
Piotr Strzyzewski
Kauto Huopio
Alessandro Vesely
For the RIPE NCC:
Jochem Ruig
Kaveh Ranjbar
Denis Walker
Athina Fragkouli
2) Task Force Charter
- Discuss updated charter proposal
3) ACM policy principles (what are the conditions the policy has to meet?)
- Discuss principles for the policy proposal
4) ACM policy requirements (what do we want to achieve with the policy
proposal?)
5) ACM policy content
6) ACM policy implementation
Discussion on agenda points 2-6
· The problem is the confusion that people do not know where to put
their abuse contact and the accuracy of this information
· The main principle is for a single consistent way to handle abuse
contacts
· Abuse contact must lead to a responsible party
· The email address must receive emails without restriction
· Users with large number of objects must be able to manage the
system with minimum effort
· Email address but url or other ways may be more appropriate for
accuracy purposes
-> Action on Kauto: to share with the task force relevant Finish
regulations
· 2 functions of the database: registration of public resources and
repository of contact details. Both aspects have to be taken into account
· ISPs are not the only network operators, there are others with
different requirements whose resources may not be publicly available in
the Internet and therefore may not need to have an abuse contact. The
url idea also implies you are reachable on the public Internet
· Accuracy applies to all contacts, not only abuse
· The IRT object was design to allow outsourcing of abuse management
· All requirements have to be explicit; putting objects will not
solve the problem by itself
· The abuse complaints procedures should not be part of this first
initiative
· Someone should handle the abuse, it doesn’t have to be the ISP,
it could be the upstream, some hierarchical model or outsourced to a
third party
· There was talk about the RIPE NCC auto-generating date stamps as
any object in the database is changed. But it was made clear that it
would not be the RIPE NCC that assigns any credible meaning to these
date stamps. The organizations have to build their own trust on the
information they are receiving. Abuse contact, and trust information
should be considered as separate issues
· The policy that will come out of this is very important and can
have 3 possible degrees of influence:
1. You must have a place to put the abuse contact.
2. 1+you must verify the validity of the email address.
3. 2+you must verify the effectiveness of processing abuse reports.
Number 3 is unrealistic and any such policy will be unlikely to achieve
community consensus. Number 1 is the most practical as a first step
· There were a number of concerns regarding hierarchical models.
o Upstream providers are not recorded in the RIPE DB.
o They cannot be held reliable by default, even those that make
assignments cannot be held liable by default.
o Although the DB does not record the upstream information, the
providers know who the upstream is. If the parties agree on handling
abuse information the IRT object can accommodate this hierarchical
arrangement.
Following from the above discussion the basic requirements were
summarised as:
· to have a single point of contact that
o may be hierarchical,
o can be simply queried to return a single piece of information
o is easily configured and referenced by others
· to separate storage in the DB from querying the DB and
presentation of the information
Open issues:
· From an implementation point of view the question was raised
whether a new object is required or if the existing IRT would satisfy
all the requirements?
· What should be mandatory? An abuse reference on every single
resource record or abuse references for resources grouped within
hierarchies?
-> Action on Brian: to give feedback on Thursday in both AA-WG and DB-WG
-> Action on the RIPE NCC: To draft minutes and slides for WG presentations
-> Action on the RIPE NCC: to update the acm-tf webpage
Next meeting: end of May, beginning of June and meeting after that on
September (check clashes with other meetings, eg. ICANN)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.ripe.net/ripe/mail/archives/acm-tf/attachments/20110503/2ffa8056/attachment.html>
[ Acm-tf Archives ]