Association of Trustworthy Roots?

Christopher L. Morrow christopher.morrow at mci.com
Mon Jan 17 03:28:54 UTC 2005



On Sun, 16 Jan 2005, Sean Donelan wrote:

> On Sun, 16 Jan 2005, Christopher L. Morrow wrote:
> > assume Mr. Rosen and MIT do... If the proper process was started then
> > things look good, though unfortunately it may take some time to resolve
> > the problem. That process/procedure is in place for a good reason,
> > circumventing it will lead to problems in the long run. Do you circumvent
> > for MS, for AOL, for ATT? At what point do you draw the line? My home
> > business of pot painting?
>
> I agree rules and processes are important.  Instead of calling it
> circumvention, I would call it a robust exception handling process.  Both
> the intial process of protecting your identity, as well as the exception
> handling process in the event it is compromised, should be available for
> both my home domain as well as well-known companies like MS, AOL and
> AT&T. It should be as hard to steal my domain as it is to steal AOL.COM.
>
> Unfortunately, there is very little I can do to prevent a
> Registry/Registrar from giving my identity away without my
> permission.

So, more folks need to make the right noise at ICANN meetings about this
policy.



More information about the NANOG mailing list