Reports from other days:
Saturday, 18 June 2011 Meetings
Sunday, 19 June 2011 Meetings
Tuesday, 21 June 2011 Meetings
Wednesday, 22 June 2011 Meetings
Thursday, 23 June 2011 Meetings
Friday, 24 June 2011 Meetings
Welcome Ceremony
Time: 09:00 - 10:30
Location: Canning/Padang
Author:
Please add your report here |
ccNSO Tech Day
Time: 09:00 - 16:00
Location: Olivia
Author:
Please add your report here |
Board Session - New gTLD Program
Time: 11:00 - 12:30
Location: Canning/Padang
Author:
Please add your report here |
Joint ccNSO/GNSO Council Meeting
Time: 12:30 - 14:00
Location: Sophia
Author:
Please add your report here |
Forum on DNS Abuse
Time: 13:00 - 14:30
Location: Canning/Padang
Author: Dev Anand Teelucksingh
Held in the large Raffles Ballroom, where hours earlier, the ICANN Board voted to approve the New gTLD Program.
|
INITIATIVES
- the US has the National Transportation Safety Board ; this industry could benefit from such a model (not mentioned on slides - futher thought - don't CERTs do this type of function?)
- Substantially improve consumer education on CyberSecurity - In Austraila the AISI(?) model is used to allow ISPs to notify customers of malware activity on their PCs.
- Charter an organization to directly attack botnets - ISPs could also screen for and block botnet activity. Perhaps use vulnerabilities to attack the bad guys' botnets
- Drag MLATs out of the 19th century into the 21st
- Create an international law enforcement model that allows for prosecution without requiring extradition
- Require that Internet devices “fail safe” - referencing his earlier show of hands who used wireless routers, Wireless routers should not have default passwords but something unique since many do not change the defaults.
- Force unsupported devices off the Internet - this wasn't explained during the presentation, but in a chat after the ALAC/WHOIS RT meeting (Bill being on the WHOIS RT), he explained this meant not having computers with older OSes (Win98 for eg) not go on the net, due to their vulnerabilities and that no software fixes by the OS maker are no longer forthcoming.
- Take enforcement action against “bulletproof hosters” (see http://en.wikipedia.org/wiki/Bulletproof_hosting)
- Have SLAs for hosting companies to remove phish/malware sites
- Create safe ways for companies to share information about compromised customers, which are exempt from normal rules
- Ensure that ICANN properly enforces ecosystem safety initiatives (for example dealing with WHOIS)
Next, Edmon Chung talked about dot Asia's DNS Abuse Prevention Mechanisms: - many of the policies dot Asia put in place (sunrise policies) are now being put in the new gTLD discussions
- with Afilias as the back end provider helped dot Asia with the technical capability to deal with DNS abuse and phishing attacks
- Policy-wise, dot Asia worked with the APWG (Anti-Phishing WG) on predictable mechanisms to take down domains and/or sites with phishing activities.
- MPAA MoU - MOU with the MPAA that do something similiar to the URS to quickly take down domains with movie content, especially during the opening weeks when the movie is showing in theaters.
- worked with AP CERT & HK CERT and done practice drills for sceanarios
- extensive use of Sunrise Mechanisms for dot Asia and is using that experience for its IDN TLD. Also deal with the variant issues as per their IDN variant policy. A detailed illustration was shown in the slides (page 18 of the 93 page PDF)
- working with CHIP (Clearinghouse for Intellectual Property), for the sunrise verification and preverification processes and a trademark claims service (being discussed in the new gTLD program) after the the sunrise period.
- using such expertise to help the Macao (.mo) govt
As ISOC Hong Kong:
- ISOC Hong Kong has worked on security and privacy as this is the #1 issue for At-Large as well as security issues related to IPv6 and Green Dam (http://en.wikipedia.org/wiki/Green_Dam_Youth_Escort)
- ISOC Hong Kong has a WG on security and privacy and is trying to balance those issues. The dilemna is that while users think they want security and privacy, there are tradeoffs or compromises. Eg. dot CN requires real name for domain registration which increases security, but with loss of privacy.Note : see link at http://dl.dropbox.com/u/877052/ICANN-Singapore/Monday/dns-abuse-forum-report.txt due to the length and the difficulty in inserting the text
[From Charles Mok, APRALO]
Just to add: Edmon was speaking in his capacity of Internet Society Hong Kong also, in addition to his DotAsia and APRALO many hats :)
FY12 Draft Operating Plan and Budget
Time: 13:30 - 14:30
Location: Orchard A/B
Author:
Please add your report here |
New gTLD Update
Time: 14:30 - 16:00
Location: Canning/Padang
Author:
Please add your report here |
GAC Meeting with SSAC
Time: 15:00 - 16:00
Location: Collyer
Author:
Please add your report here |
DNSSEC for Everybody - A Beginners Guide
Time: 16:00 - 17:30
Location: Olivia
Author: Darlene Thompson
DNSSEC for Everybody: A Beginners Guide
|
[From Charles Mok, APRALO]
A clip from the talk, part of the interesting role play skit mentioned above:
[http://www.youtube.com/watch?v=DHlVk2EVlmA|http://www.youtube.com/watch?v=DHlVk2EVlmA]
|
IDN Varaint TLD
Time: 16:00 - 17:30
Location: Canning/Padang
Author:
Please add your report here |
Joint ccNSO/GNSO IDN Working Group (JIG)
Time: 17:30 - 18:30
Location: Moor
Author:
Please add your report here |