Throwing out some ideas on terminology for the rogue operator work party.  Please feel free to share your thoughts on these.

 

-Ken

 

 

Non-sanctioned Operator:  This could be an enterprise that serves the root zone [possibly with modifications] to its internal users, fully within their authority.  This purposefully avoids the term "rogue" and its negative implications.  This could be done via recursive resolvers configuring non-standard root servers, or by impersonating RSO address space only within the domain of their authority.  Do we need a separate term for cases where they do this outside of their authority?

 

Impersonating Operator: An authoritative server, serving the Root Zone publicly, that is run by someone other than the 12 Root Server Organizations, responding to one or more the 26 root server addresses.  These organizations do not necessarily uphold the guiding principles of the root server operators.  Correctness of the served zone is irrelevant?  This also purposefully avoids the term "rogue" and its negative implications.  (Impersonating Operator, Imposter Operator, Fake Operator, … word-smithing encouraged)

 

Rogue Operator:  A legitimate Root Server Operator that decided to do "bad things".  A starting point for defining "bad things" would be a violation of some set of the 11 principals defined in Section 3 of RSSAC037.  Specifically:

 

 

 

There could be more definitions and we can certainly refine these. 

 

 

Ken Renard

S&TCD Contractor – ICF

Sustaining Base Network Assurance Branch 

C5ISR Center, Space and Terrestrial Communications Directorate

Office:  443-395-7809

kenneth.d.renard.ctr@mail.mil