Generic Top-Level Domain (gTLD) Registry Agreements

gTLD Registry Agreements establish the rights, duties, liabilities, and obligations ICANN requires of registry operators to run gTLDs.

Unsponsored TLD Agreement: Appendix C, Section G (.info)

ICANN | Unsponsored TLD Agreement: Appendix C, Section G (.info)
  ICANN Logo

Unsponsored TLD Agreement: Appendix C, Section G (.info)

(11 May 2001)


Functional Specifications

Section G—Registry Operations

Physical Plant

All Registry systems will be located within secure data centers, with at minimum, the following security standards:

  • 24/7 on-site security personnel and security monitoring
  • Surveillance cameras
  • Controlled access to the data center
  • Use of identification systems

All facilities are colocated in telco-grade, high security buildings. Security guards are on duty 24/7, and enforce a sign-in process where anyone entering the facility must be on the approved list. Visitors must show legal photo ID to be granted access to each facility. Once inside the facility, visitors must use a card key and palm scanner to gain access to the data center. The Registry systems are locked within cages in the data center and must be unlocked by security. The entire facility is monitored by video surveillance. Multiple air conditioning units are configured in a fully redundant array. Multiple UPS power units with battery backup provide clean and reliable electrical power. Multiple diesel generators, also in a fully redundant array, are available for extended power outages.

Hardware Architecture

The system uses a distributed architecture that achieves the goals of scalability, reliability, and extensibility. The systems can continue to function even if an entire server were to suffer catastrophic failure. The registry will use load balancers to assist in scalability as well as to prevent service outages. Due to the nature of load balancing, in many cases it will be possible to also perform upgrades on servers without the customer being impacted.

Registry facilities will be operated in two geographic locations, allowing for redundancy and fault tolerance. The primary registry facility will be a live facility, meaning that it will be the normal full-time registry. The secondary registry facility will be a standby facility, meaning that it will only be activated because of operational concerns about the primary facility. The secondary facility will remain continuously synchronized with the primary.

The registry will operate several database servers to provide redundancy. The primary registry facility will house two database servers, one being the main database and the other being the secondary database. The standby registry facility will house one database server, which will be constantly synchronized with the primary registry. The database servers will be replicated but are not load balanced.

The following diagram illustrates the hardware architecture.

The specifications of the individual servers are described below.

Primary Site

Two (2) Web Servers (Load Balanced)

Base Components
Server Sun E450
Processor 2 x 480 Mhz CPU, 8 MB L2 Cache
Memory 2 GB RAM
Disk (for systems software) 2 x 36.4 GB (D1000) 10K SCSI (BOS/ Log File Mirror)
Disk (for data) 2 x 36.4 GB 10K SCSI (App Mirror)
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

Two (2) Registry Servers (Load Balanced)

Base Components
Server Sun E6500
Processor 16 x 400 Mhz CPU, 8 MB L2 Cache
Memory 16 GB RAM
Disk (for systems software) 4 x 36.4 GB (D1000) 10K SCSI (BOS/ Log File Mirror)
Disk (for data) SUN A5100 External Disk Array 5 x 36.4 GB 10K SCSI (App Mirror) 2 x Interface Boards 2 x GBICs Fibre Channel Connection
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

Two (2) Whois Servers (Load Balanced)

Base Components
Server Sun E4500
Processor 8 x 400 Mhz CPU 8 MB L2 Cache
Memory 28 GB RAM
Disk (for systems software) 2 x 36.4 GB (D1000) 10K SCSI (BOS/Log File Mirror)
Disk (for data) 2 x 36.4 GB (D1000) 10K SCSI (App mirror)
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

Two (2) Database Servers

Base Components
Server Sun E4500
Processor 8 x 400 Mhz CPU 8MB L2 Cache
Memory 16 GB RAM
Disk (for systems software) 4 x 36.4 GB 10K SCSI (BOS, Log File Mirror)
Disk (for data) SUN A5200 External Disk Array 22 x 36.4 GB 10K FC-AL Disk Drive (800.8 GB) 2 x Interface Boards, 2 x GBICs 7 x 36.4 GB 10K FC-AL Disk Drive (254.8 GB) 2 x Interface Boards, 2 x GBICs 2 x FC100 FC - AL Sbus Host Adapter 1 x GBIC Module
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

One (1) Report Server

Base Components
Server Sun E450
Processor 2 x 480 Mhz CPU, 8 MB L2 Cache
Memory 2 GB RAM
Disk (for systems software) 2 x 36.4 GB (D1000) 10K SCSI (BOS/ Log File Mirror)
Disk (for data) 2 x 36.4 GB 10K SCSI (App Mirror)
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

Two (2) O T &E Servers

Base Components
Server Sun E450
Processor 2 x 480 Mhz CPU, 8 MB L2 Cache
Memory 2 GB RAM
Disk (for systems software) 2 x 36.4 GB (D1000) 10K SCSI (BOS/ Log File Mirror)
Disk (for data) 2 x 36.4 GB 10K SCSI (App Mirror)
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

One (1) Admin Server

Base Components
Server Sun E450
Processor 2 x 480 Mhz CPU, 8 MB L2 Cache
Memory 2 GB RAM
Disk (for systems software) 2 x 36.4 GB (D1000) 10K SCSI (BOS/ Log File Mirror)
Disk (for data) 2 x 36.4 GB 10K SCSI (App Mirror)
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

Two (2) Server Access Switches

Base Components
Switch type Cisco 9 Slot Catalyst Cisco 6506 Chassis
Adapter 16-Port GB Ethernet Module
Other software CAT 6000 Supervisor Image

Two (2) Load Balancer Switches

Base Components
Switch type Alteon A180E
Adapter 8-Port 10/100/1000 GB Ethernet Module
Other software Web OS - Local

Four (4) Dedicated Firewalls (VPN)

Base Components
Server Nokia IP650
Software provides CheckPoint Firewall-1 v 4.0 + Enterprise Security Suite VPN-1 for Frontend Firewalls

Dedicated TSM (Primary Site Only)

Base Components
Hardware One Ultrium Tape Library 3583-L72 6 x LTO Drive Sled 4 x 20 Data Cartridges
Other software Tivoli Storage Manager Tivoli Disaster Recovery Tivoli Support TDP & TSM

Secondary Site

One (1) Web Server

Base Components
Server Sun E450
Processor 2 x 480 Mhz CPU, 8 MB L2 Cache
Memory 2 GB RAM
Disk (for systems software) 2 x 36.4 GB (D1000) 10K SCSI (BOS/ Log File Mirror)
Disk (for data) 2 x 36.4 GB 10K SCSI (App Mirror)
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

One (1) Registrar Server

Base Components
Server Sun E6500
Processor 16 x 400 Mhz CPU, 8 MB L2 Cache
Memory 16 GB RAM
Disk (for systems software) 4 x 36.4 GB (D1000) 10K SCSI (BOS/ Log File Mirror)
Disk (for data) SUN A5100 External Disk Array 5 x 36.4 GB 10K SCSI (App Mirror) 2 x Interface Boards 2 x GBICs Fibre Channel Connection
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

One (1) Whois Server

Base Components
Server Sun E4500
Processor 8 x 400 Mhz CPU 8 MB L2 Cache
Memory 28 GB RAM
Disk (for systems software) 2 x 36.4 GB (D1000) 10K SCSI (BOS/Log File Mirror)
Disk (for data) 2 x 36.4 GB (D1000) 10K SCSI (App mirror)
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

One (1) Database Server

Base Components
Server Sun E4500
Processor 8 x 400 Mhz CPU 8MB L2 Cache
Memory 16 GB RAM
Disk (for systems software) 4 x 36.4 GB 10K SCSI (BOS, Log File Mirror)
Disk (for data) SUN A5200 External Disk Array 22 x 36.4 GB 10K FC-AL Disk Drive (800.8 GB) 2 x Interface Boards, 2 x GBICs 7 x 36.4 GB 10K FC-AL Disk Drive (254.8 GB) 2 x Interface Boards, 2 x GBICs 2 x FC100 FC - AL Sbus Host Adapter 1 x GBIC Module
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

One (1) Admin Server

Base Components
Server Sun E450
Processor 2 x 480 Mhz CPU, 8 MB L2 Cache
Memory 2 GB RAM
Disk (for systems software) 2 x 36.4 GB (D1000) 10K SCSI (BOS/ Log File Mirror)
Disk (for data) 2 x 36.4 GB 10K SCSI (App Mirror)
Network Adapter 1 x Quad FastEthernet
Operating System Sun Solaris 7.0 (BOS)
Other Software Veritas File System Veritas Volume Manager

Two (2) Load Balancer Switches

Base Components
Switch type Alteon A180E
Adapter 8-Port 10/100/1000 GB Ethernet Module
Other software Web OS - Local

Two (2) Server Access Switches

Base Components
Switch type Cisco 9 Slot Catalyst Cisco 6506 Chassis
Adapter 16-Port GB Ethernet Module
Other software CAT 6000 Supervisor Image

Two (2) Dedicated Firewall Servers

Base Components
Server Nokia IP650
Software CheckPoint Firewall-1 v 4.0 + Enterprise Security Suite VPN-1 for Frontend Firewalls

Connectivity

Connectivity between the Internet and the Primary and Secondary Registry is via multiple redundant connections. In addition, connections between servers on the internal Registry Network are via redundant multi-homed 100 Mbps Ethernet. Connectivity between the primary and secondary registry facility (for replication) is via redundant connections within the network.

A separate network is used for backups. High capacity routers and switches are used to route traffic to Registry services (see Hardware Architecture). Load balancing is used for balancing all aspects of the Registry, including the Registry gateway, Whois services, and Domain Name Services.

Internet Services

The Internet services of the registry includes multiple DNS servers, mail servers, EPP gateways, Whois servers, Report servers, OT&E servers, Web servers for Registrar and Registry Administrative interfaces, and Registry Operations servers. All gateways and servers are hosted in a UNIX environment on multi-processor servers. All servers are protected behind firewall systems. See "Hardware Architecture" for detailed information.

Internet services operate on RISC-architecture processors with large external caches, main memory and multiple input/output channels, which are able to support internal hot-swappable storage and have redundant hot-swappable power and cooling.

The Registry Operations Center operates separate servers to handle customer support, database administration functions, and support for system development. The Registry operations center is on a separate network from the primary and secondary registry facilities, and connects to the registry facilities via a VPN connection.

The OT&E Environment is hosted on high capacity multi-processor UNIX servers.

System Security

All Registry systems shall be located within secure data centers. The Registry shall employ a number of measures to prevent unauthorized access to its network and internal systems. Before reaching the Registry network, all traffic shall be required to pass through a firewall system. Packets passing to or from the Internet shall be inspected, and unauthorized or unexpected attempts to connect to the Registry servers shall be denied and logged.

Front-end Registry servers shall generally sit behind a second layer of network security. A network-based intrusion detection system (IDS) shall monitor the network for suspicious activity. If possibly malicious activity is detected, appropriate personnel shall be notified immediately.

The Registry shall employ a set of security precautions to ensure maximum security on each of its servers, including disabling all unnecessary services and processes; regular application of security-related patches to the operating system or critical system applications.

Regular detailed audits of the server configuration shall be performed to verify that it complies with current best security practices.

The Registry application shall use encrypted network communications. Access to the Registry server shall be controlled. The Registry shall allow access to an Authorized Registrar only if each of the authentication factors matches the specific Authorized Registrar. These mechanisms will also be used to secure any web-based tools that allow Authorized Registrars to access the Registry. Additionally, all relevant transactions in the Registry (whether conducted by Authorized Registrars or the Registry's own personnel) shall be logged.

The Registry also shall support a secure personal communication process. Authorized Registrars shall be permitted to supply a list of specific individuals (5 to 10 people) who are authorized to contact the Registry. Each such individual shall be assigned a pass phrase. Any support requests made by an Authorized Registrar to Registry customer service shall be authenticated by Registry customer service. All failed authentications will be logged and provided to Afilias on a monthly basis for consideration and/or distribution.

All root/super-user accounts shall have passwords changed regularly. Shell accounts on production servers shall be kept to an absolute minimum and limited strictly to senior network and operations staff. Secure shell connections shall be used by Afilias operations staff to access servers remotely.

The Registry shall maintain out-of-band management connections to production servers; should there be a denial of service attack on the systems. Root access shall be controlled and managed by Registry Operations.

System Redundancy

System redundancies exist at the hardware, database, and application layer. These are explained below.

Hardware Layer Redundancy

The registry will operate with redundant hardware for key facilities. These are described above under "Hardware Architecture".

Database Layer Redundancy

The registry will operate several database servers to provide redundancy. The primary registry facility will house two database servers, one being the main database (Database A) and the other being the secondary database (Database B). Any transactions committed to the primary database will be automatically replicated to the secondary database. The Whois service will normally operate off the secondary database server, to allow optimal use of the primary for handling registration events.

In addition, the standby registry facility will house one database server, which will be constantly synchronized with the primary registry.

In the event that the primary registry's main database (A) fails, the Registry application will automatically switch over to the secondary database (B). The centralized Whois application will continue to use the secondary database as usual. When the main database is restored, any transactions committed to the secondary database will be automatically replicated to the primary database.

If the secondary database (B) fails, the centralized Whois server will automatically switch over to use the primary database (A). In the event that the primary database fails, and the Registry application and the Whois server are both using the same database (secondary), some degradation in service is expected.

If the primary and secondary database at the Primary data center fail, the registry will switch over to the standby registry facility as described in "Disaster Recovery".

Application Layer Redundancy

The application layer architecture allows several instances of the system to be running simultaneously. Automatic fail-over of the system and subsystems is an integral part of the design of the architecture. In addition, the application layer is designed so that peak load can be scaled across multiple processors and multiple servers using a load-balancing algorithm. This results in high reliability and redundancy.

The registry will operate two Registry (application) servers (Registry A, B) at the primary registry location, and one Registry (application) server at the stand-by location. A hardware load balancer will distribute load between the two application servers at the primary registry location.

In addition, the registry will operate two centralized Whois servers (Whois A, B) at the primary registry location, and one centralized Whois server at the stand-by location. A hardware load balancer will distribute load between the two Whois servers at the primary registry location.

In the event of failure of one of the Registry servers, or one of the Whois servers at the primary registry location, the remaining server will handle all transactions until the failed server becomes available. Any fail-over of the application or Whois server will be transparent to the Registrar.

If both Registry Application servers at the primary registry facility fail, then the registry will switch over to the stand-by facility as described in "Disaster Recovery".
All software applications shall create a detailed error alert if the application encounters a situation that deviates from the baseline specification. These application alerts shall be automatically sent to the network management system, which shall generate an alert to the operations staff so that the event can be handled as necessary.

Disaster Recovery

The Registry consists of two geographically separate physical facilities - the primary and the standby (secondary). These are described above in "Hardware Architecture". In the event that the primary facility fails, the systems will switchover to use the standby facility. This is described in more detail below.

System Impact

If the Registry is operating from the secondary facility, and the primary facility is restored, any transactions that have occurred and have been recorded on the secondary facility database will be replicated to the primary facility databases (Database A & B).

While the registry is operating from the standby facility, some degradation in service is expected since the Registry application and Whois service will be accessing a single Database (as opposed to accessing separate databases as they do in the Primary facility).

Registrar Impact

Any fail-over of the system between the primary and standby registry facility will be transparent to the Registrar. The Registrar will be provided with the logic to query the status of the Registry, and be able to switch over to the operating facility (either primary or standby) as necessary. If the Registrar's application has switched over to the standby facility, once the primary registry is restored, the Registrar application will automatically switch back to using the primary registry.

While the registry is operating from the standby facility, some degradation in service is expected since the Registry application and Whois service will be accessing a single Database (as opposed to accessing separate databases as they do in the Primary facility).

Backup

The Registry will conduct routine backup procedures. This will be performed in such a way as not to adversely impact scheduled operations.


Normal backups will allow retention of:

  • Up to 7 versions of database backup (flat file)
  • Up to 3 versions of non-database changed files
  • Weekly full on-line backups of database files and provide off-site storage of one weekly full database backup per month
  • Archival of database transaction logs once per day

Nightly backup window starts at 7:00 p.m. and ends at 7:00 a.m. local time.

Data Escrow

Escrow of the Registry database is discussed in Appendices R and S.

OT&E

The OT&E environment provides a test bed for Registrars to test their client applications against a simulated Registry environment before going online. The Registry also uses the OT&E environment to verify client applications for potential registrars. During client development, registrars can expect the live system to behave exactly as the OT&E system.

Afilias' OT&E environment will be hosted on multi-processor UNIX servers and represents a scaled down version of the live system.

Registrar Reports

Regular Scheduled Reports

Afilias will generate reports for each registrar on a daily and weekly basis. These reports will contain domains, nameservers and contacts for which the Registrar is the sponsoring registrar. The reports are available for download from the Registrar Administration Interface secure web site. This site requires the Registrar to provide its username and password for authorization.

Report Types

Two types of reports will be created for each Registrar: Daily Reports and Weekly Reports. These are described below.

Daily Reports

  • Daily Transaction Report: This reports includes Addition, Modification, and Delete and domain Transfer activity by the Registrar. Domain operations produce one row for each associated nameserver. Nameserver operations produce one row for each associated IP address. A transaction ID is included in column 1 to allow unique identification of transactions. Column 2 contains the transaction operation. The content of column 3 and 4 is dependent on the operation according to the following table. Column 5 contains the transaction date.

    Operation

    Column 3

    Column 4
     ADD_DOMAIN Domain Name Server Name
     MOD_DOMAIN Domain Name Server Name
     DEL_DOMAIN Domain Name Server Name
     ADD_NAMESERVER IP Address Server Name
     MOD_NAMESERVER IP Address Server Name
     DEL_NAMESERVER IP Address Server Name
     TRANSFER_DOMAIN Domain Name NULL

For example,

1234567:ADD-DOMAIN:EXAMPLE1.INFO:NS1.EXAMPLE1.INFO:2001.07.01.11.12.54
1234568:ADD-DOMAIN:EXAMPLE1.INFO:NS2.EXAMPLE1.INFO:2001.07.01.11.12.54
1235789:ADD-DOMAIN:EXAMPLE2.INFO:NS1.EXAMPLE1.INFO:2001.07.01.11.13.30
1235790:ADD-DOMAIN:EXAMPLE2.INFO:NS2.EXAMPLE1.INFO:2001.07.01.11.13.30
1245734:ADD-NAMESERVER:111.222.123.211:NS1.EXAMPLE1.INFO:2001.07.01.11.13.50
1245735:ADD-NAMESERVER:111.222.123.212:NS1.EXAMPLE1.INFO:2001.07.01.11.13.50
2341413:TRANSFER_DOMAIN:TEST.INFO::2001.07.01.11.14.31





  • Daily Transfer Reports: This report includes gaining and losing transfer activity. There are two separate reports for transfers:
    • Gaining Transfer Report: indicates domains transferred to the Registrar ("gaining registrar").
    • Losing Transfer Report: indicates domains transferred away from the Registrar ("losing registrar").

The Transfer reports will have the following fields: Gaining registrar name, Domain name, Losing registrar name, Date/time of transfer request, Status (one of ACK, NACK or PENDING), Date/time of ACK/NACK. The value of Date/time of ACK/NACK will be NULL if the status is PENDING. For example:

Tucows.com, Inc.:EXAMPLE1.INFO:InterQ, Inc.:2001.07.01.15.13.41:PENDING:
Tucows.com, Inc.:TEST.INFO:InterQ, Inc.:2001.07.01.15.14.00:ACK:2001.07.03.04.23.12
Tucows.com, Inc.:TEST2.INFO:InterQ, Inc.:2001.07.01.15.25.00:NACK:2001.07.03.05.50.39

Weekly Reports

  • Weekly Domain Report: Lists all domain names currently sponsored by the Registrar. The domain is listed once with each current status and associated name server. For example:

EXAMPLE1.INFO:ACTIVE:NS1.EXAMPLE1.INFO
EXAMPLE1.INFO:ACTIVE:NS2.EXAMPLE1.INFO
EXAMPLE2.INFO:ACTIVE:NS1.EXAMPLE1.INFO
EXAMPLE2.INFO:ACTIVE:NS2.EXAMPLE1.INFO
TEST.INFO:HOLD:NS1.TEST.INFO
TEST.INFO:HOLD:NS2.TEST.INFO
HAPPY.INFO:ACTIVE:





  • Weekly Nameserver Report: Lists all nameservers currently sponsored by the Registrar. The nameserver is listed once with each associated IP address. For example:

NS1.EXAMPLE1.INFO:111.222.123.211
NS1.EXAMPLE1.INFO:111.222.123.212
NS1.TEST.INFO:123.14.2.4

  • Domains Hosted by Nameserver Weekly Report: Lists all domains hosted on nameservers currently sponsored by the Registrar. The nameserver is listed once with each associated domain name.

NS1.EXAMPLE1.INFO:EXAMPLE1.INFO
NS1.EXAMPLE1.INFO:EXAMPLE2.INFO
NS2.EXAMPLE1.INFO:EXAMPLE1.INFO
NS2.EXAMPLE1.INFO:EXAMPLE2.INFO
NS1.TEST.INFO:TEST.INFO
NS2.TEST.INFO:TEST.INFO




Report Frequency

Daily reports will be generated daily every four hours. Previous reports for that day shall be overwritten each time a new daily report is generated.

Weekly reports will be generated on Sunday at 00:00 UTC and shall contain activity for the previous week. Previous weekly reports are overwritten when a new weekly report is generated.

Storage

Daily Registrar reports are maintained for each registrar for seven days. Daily reports older than seven days will be removed.
Weekly Registrar reports are maintained for each Registrar for four weeks. Weekly reports older than four weeks will be removed.

Distribution

Registrar reports shall be available for download via a Reports section in the Registrar Administrative Interface ("Registrar Tool"). Each Registrar will have secure, password-protected access, to the Registrar Administrative Interface. A given Registrar will only have access to its own reports.

Registry Reports to ICANN

Afilias will also provide various informational reports to ICANN regarding the registry. These are described in Appendices T and U.

Registrar-Registry Synchronization

There are two methods available for the Registrar to synchronize data with the authoritative-source Registry.

Bulk synchronization: A Registrar will contact Registry support and request a data file containing all domains registered by that Registrar, within a certain time interval. The data file will be generated by Registry support and made available for download using a secure web server. The data file will be a comma delimited file that contains all domains the Registrar has registered in the time period requested - including all associated host (nameserver) and contact information.

Single object synchronization via EPP: The Registrar can, at any time, use the EPP <info> command to obtain definitive data from the Registry, for a known object: including domains, hosts (nameservers) and contacts. There is no need to contact Registry support for this synchronization method.

Earlier draft:

26 April 2001


Comments concerning the layout, construction and functionality of this site
should be sent to webmaster@icann.org.

Page Updated 02-Feb-2012

©2001  The Internet Corporation for Assigned Names and Numbers. All rights reserved.