ccTLD Best Practices

Download Report

Transcript ccTLD Best Practices

ccTLD Best Practices
Michuki Mwangi
AfriNIC5 - INET/AfTLD Meeting, Balaclava, Mauritius
30th Nov 2006
Agenda
1.
ccTLD Establishment
2.
Policy Development
3.
Registry Automation
4.
Stability and Redundancy
5.
Security Consideration
ccTLD Establishment
Considerations

Stakeholder participation





Involvement of Private sector
Academia
Civil Society
Legal fraternity
Government participation

Government support
Considerations …(cont’d)

Domain Registry Model



Open or Closed
Registry/Registrar etc
Sustainability & Commercial Model



Cost of registration
CAPEX
OPEX
Policy Development
Bottom up process

Open Public forums

Mailing lists

Interactive media

Registry/Board proposals
Registry Automation
Registry Software

Identifying the appropriate Registry Software


Avoid re-inventing the wheel


Saves on time and development costs
Online System


Guided by Registry model and policies
Online Registrations, Transfers etc
Whois System
Monitoring & Statistics



Its important to monitor Registry Services
 Ensures more uptime on services
Open Source applications available for monitoring
 E.g Nagios, MRTG, webalizer, cflowd, etc
Statistics enables projection and planning for growth
Stability & Redundancy
Selection of Slave DNS Servers

RFC 2182 (BCP16) provides guidelines
on selection of Secondary (slave)
Servers.





Consider geographic placement
At least 2 Slave Servers and a master
This helps spread name resolution load
Improves efficiency with servers close to
resolvers
Avoid NAT
Finding Suitable Slave Servers



Swap slave servers with other ccTLDs in the
region (Common practice).
AfTLD, ISOC can help find suitable hosts and
organizations to host Slave servers.
Consider Anycast hosting for slave servers
www.pch.net
Hardware and Software



Scalability is Key
Provide sufficient memory, processor
and disk space.
DNS Software should be fast and
capable of handling load (multiple
queries per second)
Internet Connection




Ensure upstream provider must be multihomed
Interconnect at the local/national IXP
Registry should have redundant links to
upstream provider
Provider Independent (PI) IP address Space
and ASN to enable for effective multi-homing
Security Considerations
Best Practice

Implement routing security features

Operating system hardening

Disable Recursion

Have a Stealth Server

Run secure applications

Run TSIG for secondary zone transfers
References


http://ws.edu.isoc.org/workshops/2006/PacNOG2/tra
ck1/day3/draft-wenzel-cctld-bcp-02.txt
http://www.pch.net/resources/papers/anycastservices/

www.isc.org

ftp://ftp.rfc-editor.org/in-notes/rfc2182.txt

www.aftld.org
Thank you
www.aftld.org