Re: [regext] REGEXT Interim Meeting (2018JUN05) Notes

Pieter Vandepitte <pieter.vandepitte@dnsbelgium.be> Tue, 17 July 2018 20:11 UTC

Return-Path: <pieter.vandepitte@dnsbelgium.be>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8963812785F for <regext@ietfa.amsl.com>; Tue, 17 Jul 2018 13:11:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=dnsbelgium.be
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZUa0DjGoP7ay for <regext@ietfa.amsl.com>; Tue, 17 Jul 2018 13:11:03 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-he1eur02on070e.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe05::70e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C22CD130DE2 for <regext@ietf.org>; Tue, 17 Jul 2018 13:10:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dnsbelgium.be; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fU/17uN+BQcRLrCVpaeUDdwGRxDmUFsQkCDepFG6v64=; b=Iqbho4AWjdEZPGJd7JrLLlZmQoaqGyqDdwLN4TgJtVrPlnDXzwiXRJ9N+8FwH7MveL3odwPIHyQfziAki44QptVI/vFwU1kv9pKoQZ0tDFPOkQYpbXxNfat07z+F/illWJ70Q9pVCRQLuc3nxU4T5wQaxzpSDMAF4c5oODt3f/g=
Received: from HE1PR0601MB1930.eurprd06.prod.outlook.com (10.166.123.140) by HE1PR0601MB2571.eurprd06.prod.outlook.com (10.168.96.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.952.20; Tue, 17 Jul 2018 20:10:47 +0000
Received: from HE1PR0601MB1930.eurprd06.prod.outlook.com ([fe80::987a:1199:ef19:df89]) by HE1PR0601MB1930.eurprd06.prod.outlook.com ([fe80::987a:1199:ef19:df89%5]) with mapi id 15.20.0952.021; Tue, 17 Jul 2018 20:10:46 +0000
From: Pieter Vandepitte <pieter.vandepitte@dnsbelgium.be>
To: Roger D Carney <rcarney@godaddy.com>, Registration Protocols Extensions <regext@ietf.org>
Thread-Topic: [regext] REGEXT Interim Meeting (2018JUN05) Notes
Thread-Index: AQHUFSGN77hQpmXsc0ygH1M+JLENBqSTfrxQgACNBYA=
Date: Tue, 17 Jul 2018 20:10:46 +0000
Message-ID: <54A6FE48-6556-4FCB-84FB-06BAD348E540@dnsbelgium.be>
References: <A834418E-F9C3-4A19-B5A6-F98618FE3661@dnsbelgium.be> <MW2PR02MB38990B131985D82D84252D44B15C0@MW2PR02MB3899.namprd02.prod.outlook.com>
In-Reply-To: <MW2PR02MB38990B131985D82D84252D44B15C0@MW2PR02MB3899.namprd02.prod.outlook.com>
Accept-Language: nl-BE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pieter.vandepitte@dnsbelgium.be;
x-originating-ip: [2a02:1802:5f:fff1::100]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; HE1PR0601MB2571; 7:BcHJOqkXAv5TZHCF2+kgj45vDahj2O9ABPvdADnvbWYWifGHN5wJQac0VcaVFrZw8U9VcOgnaAluhUKhJCKWRnXtvIxwtZZeJbq6KmO1/9Ih0HiU3nOsk1Mcr5cBAv2U5ouJ5mOQGcR1f2GzW2zoFRm5rV8xdKc2vYop577/ayx5IdEmYxi6mQZVg+H1MKkxM5R40FBTSN4hoKeANez4hQ67whWNA2GqMF1TJxc9+xsUewVQnYQfTNGDNPHY+54X
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: ab797a11-2b55-4bec-6a10-08d5ec216241
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(7021125)(8989117)(5600053)(711020)(4534165)(7022125)(4603075)(4627221)(201702281549075)(8990107)(7048125)(7024125)(7027125)(7028125)(7023125)(2017052603328)(7153060)(49563074)(7193020); SRVR:HE1PR0601MB2571;
x-ms-traffictypediagnostic: HE1PR0601MB2571:
x-microsoft-antispam-prvs: <HE1PR0601MB2571A929D4EEA6D150B5F407E25C0@HE1PR0601MB2571.eurprd06.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(158342451672863)(131327999870524)(246761809553906)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(102415395)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(3002001)(3231311)(944501410)(52105095)(10201501046)(149027)(150027)(6041310)(20161123558120)(20161123564045)(2016111802025)(20161123560045)(20161123562045)(6043046)(6072148)(201708071742011)(7699016); SRVR:HE1PR0601MB2571; BCL:0; PCL:0; RULEID:; SRVR:HE1PR0601MB2571;
x-forefront-prvs: 073631BD3D
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(366004)(346002)(39840400004)(136003)(376002)(49754004)(51444003)(189003)(199004)(44832011)(2616005)(790700001)(229853002)(733005)(6436002)(486006)(6116002)(6486002)(25786009)(54896002)(6306002)(53936002)(53946003)(74482002)(83716003)(476003)(11346002)(7736002)(2906002)(76176011)(81156014)(81166006)(8936002)(446003)(551934003)(256004)(6246003)(14444005)(33656002)(8676002)(2900100001)(5250100002)(99286004)(53386004)(105586002)(46003)(53546011)(68736007)(9326002)(6506007)(106356001)(102836004)(606006)(86362001)(99936001)(5660300001)(36756003)(478600001)(6512007)(110136005)(82746002)(236005)(97736004)(316002)(54556002)(14454004)(186003)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:HE1PR0601MB2571; H:HE1PR0601MB1930.eurprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: dnsbelgium.be does not designate permitted sender hosts)
x-microsoft-antispam-message-info: lK8N5fgw9LcX7GvpEpqsI35rIdbssIqOJ+rBVolmhzB7iLUsrr8Hq8Lwyx9o2LECeLQbv06+Oy45s2kSXaMHs5Etk4mUT/ST+4eqbMz6x88u6bpC9DPyrgQdWF8/Ezg+uiWFhFqqyhK2dFuJNqLpj5iOV/5ky+15KV/uDOfKDKzRbcpMBUAyWEEfI5AAqrfXrFOVnGcfUysgp7wD29J+izoLiXugm3XOZZQVct58nm5Uv+Q5IBU+Fox9plWuc9J4a9CWs+2FdJvdeLmzu3h1kMURCSms/mkiNoh39TysBX1haEtDBa5XoL5nipbsUdTJzEroZXR7wd+z/DKYkpKmac8lJcOVYttjK3aV6yHyS50=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/related; boundary="_005_54A6FE4865564FCB84FB06BAD348E540dnsbelgiumbe_"; type="multipart/alternative"
MIME-Version: 1.0
X-OriginatorOrg: dnsbelgium.be
X-MS-Exchange-CrossTenant-Network-Message-Id: ab797a11-2b55-4bec-6a10-08d5ec216241
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Jul 2018 20:10:46.6400 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 695195de-c0cb-4478-9204-2a861e60e59c
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0601MB2571
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/A5uxb_IxejPjrwcX7ryZLvNBlms>
Subject: Re: [regext] REGEXT Interim Meeting (2018JUN05) Notes
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 20:11:09 -0000

Hi Roger,

Thanks for taking the time to answer my question.

I try to convince myself using client validation / UX argumentation. The most common user journey we experience – but maybe that’s not a typical user journey for all TLDs? – is:

  1.  A candidate Registrant visits the Registrar website
  2.  The candidate Registrant checks one or more domains
  3.  The candidate Registrant repeats step 1 and 2 on 1 or more other Registrar websites (this is typically what we see in the logs).
  4.  He selects a Registrar (most of the time, cost is the deciding factor)
  5.  The candidate Registrant “adds the domain to his cart” on the website of the selected Registrar
  6.  He fills in his contact details (Registrant details)
  7.  The candidate Registrant “buys” the domain (incl. some web hosting)

I understand that the current situation is really bad for Registrars: in step 6 the Registrant fills in his details, everything looks OK, but after selecting his web hosting etc. he clicks they “buy” button, but it seems his “contact details” are not valid.

I just don’t see yet why transactions would not be another valid approach to this problem. At step 6, the Registrar could perform the following actions:

  1.  Start transactions. Mode = auto-rollback
  2.  Create contact within transaction (transaction ID as extension)
  3.  Create domain within transaction (transaction ID as extension). Registrant id = contact id of previous command
  4.  Stop transaction. Create contact and Create domain are not persisted as transaction is auto-rollback.

(Step 1 and 2 and step 3 and 4 could be combined by allowing “start/stop transaction” as an extension of any command. But that’s just optimization. Principles are best explained by describing all steps.)

2 to 4 steps seem a lot for a client just to validate a contact, especially in terms of RTT, but:

  1.  It all depends on implementation. Using an asynchronous implementation, the negative effect of 2 commands is negligible.
  2.  As far as UX is concerned, the final delay is hardly noticed by the Registrant.

But far more important than this possible disadvantage are the advantages:

  1.  It’s a simple concept. Everybody knows transactions, rollback, etc.
  2.  I can imagine as a former developer that implementation is very straightforward for Registries with a transactional database as backend
  3.  The use of object extensions is straightforward: just apply them as you would do otherwise. No key/value concept needed.
  4.  Last but not least, it has a huge range of possibilities. Example situations which can be covered by transactions:
     *   A Registrant wants to either register 2 domains or none if one of the 2 domains can’t be registered for some reason.
     *   Various Registry policies can be detected early:

                                                               i.      Registrants can only register domains using the code points only known to their country code

                                                             ii.      A Registrant from a foreign country (ccTLDs) can only register domains for 1 year

                                                           iii.      More general:  a Registrant with extension X=Y is only allowed to register a domain if the domain extension A=B

     *   It could even be extended to other commands, e.g. testing transfer requests / domain deletes / … without actually executing them
     *   …

Not convinced? No hard feelings of course 😊

Kind regards

Pieter

--
Pieter Vandepitte
Product Expert
+32 16 28 49 70
www.dnsbelgium.be<http://www.dnsbelgium.be>

[DNS_PUNT_Belgium_RGB]



From: regext <regext-bounces@ietf.org> on behalf of Roger D Carney <rcarney@godaddy.com>
Date: Tuesday 17 July 2018 at 18:36
To: Registration Protocols Extensions <regext@ietf.org>
Subject: Re: [regext] REGEXT Interim Meeting (2018JUN05) Notes

Good Morning,

Thanks Pieter. I think the real goal of Validate is improved customer experience.

I don’t think wrapping this in a transaction helps as the error identification is still occurring to late in the process.

There are quite a few steps in the registration process but today one of the main issues comes at domain create time (this is basically the last step in the process along with collecting fees).

Today, validating contacts in terms of their “roles”/contactType (Registrant/Admin/Tech/etc) occurs at Domain Create time, which is way too late for a good customer experience. A contact maybe a valid contact for the Registry but it may not be a valid contact for the “role” /contactType. So what we want to do is validate this data in as full of context as we can before the Domain Create / Collection of fees. Getting an error at this point (domain create) causes a painful customer experience and a lot of additional processing to occur.


Thanks
Roger


From: regext [mailto:regext-bounces@ietf.org] On Behalf Of Pieter Vandepitte
Sent: Friday, July 06, 2018 7:05 AM
To: Registration Protocols Extensions <regext@ietf.org<mailto:regext@ietf.org>>
Subject: Re: [regext] REGEXT Interim Meeting (2018JUN05) Notes

Short question regarding the validate extension:

Isn’t the purpose of the validate extension to do what actually transactions are meant for? Ultimately the goal of the validate extension is to check whether a group of commands are possible: create some contacts, link the contacts to a domain with a specific role.
Why not trying to add a layer on top of EPP to enable transactions? Start a transaction, add commands to a transaction, execute a transaction with either commit or auto roll back?
I think that would lead to a much simpler model and could easily deal with other objects and other extensions.

Thoughts?

Pieter


--
Pieter Vandepitte
Product Expert
+32 16 28 49 70
www.dnsbelgium.be<http://www.dnsbelgium.be>

[DNS_PUNT_Belgium_RGB]



From: regext <regext-bounces@ietf.org<mailto:regext-bounces@ietf.org>> on behalf of Roger D Carney <rcarney@godaddy.com<mailto:rcarney@godaddy.com>>
Date: Tuesday 3 July 2018 at 20:04
To: Registration Protocols Extensions <regext@ietf.org<mailto:regext@ietf.org>>
Subject: [regext] REGEXT Interim Meeting (2018JUN05) Notes

Sorry about the tardiness, please enjoy, see everyone in a couple weeks.

Meeting started at 11:06 (UTC-5)

Attendees: Roger Carney, James Gould, Jody Kolker, Jim Galvin

Agenda
1.    Validate draft (comments, concerns, implementations)
2.    Registry Mapping
a.    Continue the lively discussion that was started in London
b.    Policy Extension Review: how a server implements an extension, the SHOULD(s), MAY(s), etc.

Jim Galvin mentioned that co-chairs have been discussing milestones and updated charter with AD (Adam). Hopefully circulate new Charter to the group next week. Planning two meetings for IETF-102.

James Gould said that he has started implementing the Validate draft in their SDK. I mentioned that Nominet has already implemented.

We started out discussing the Validate draft, specifically the questions James Gould posted to the list Monday June 4, 2018, copied below:

1.    I don’t see the purpose of the <validate:cd> element in the check command..  Initially, I thought the <validate:cd> may support a list within a list (e.g., <validate:contact>), but that is not the case.  There is also a little confusion with the use of <validate:cd> in both the check command and response.  My recommendation is to remove the <validate:cd> element from the check command and simply move all its sub-elements to sub-elements of the <validate:contact> element. [Interim] Interesting for removal, post to list.
2.    Is the extension meant to validate the contact details of existing contacts by contact id and also non-existent contacts based on the contact details, by contact type and by tld?  [Interim] Yes, both scenarios. For “new” contacts pass all data, don’t try to short cut it with only id, if only id is passed server will assume it is an existing contact. Change response validate:cd to include TLD and contact type attributes. Discussed the preferences of smaller payload versus complicated payload, went with simpler. Add a new section to 2.0 describing validate:id (Need to have response pass back contact type and tld).
a.    If both cases are true, then wouldn’t you have a choice of referencing the contact by identifier for an existing contact or defining the contact attributes for a non-existing contact?
b.    Also, what if you desire to use the same contact information for multiple contact types for a tld?

  1.  Do you need to replicate the same attributes for each contact type?  [Interim] Simple method would
  2.  It may be better to define a single contact (existing with contact identifier) or contact attributes for non-existing with the list of contact types.  I imagine that you always want to validate a contact within the scope of a tld.  [Interim] Interesting, thoughts?
3.    I view definition of only the check command and response with many contacts and with extensibility via the kv elements as somewhat non-optimal.  Other options include:
a.    Instead of supporting multiple contacts in an individual command, why not support the check or info of an individual contact with attribute extensibility via command / response extensions.  Yes, you can validate only a single contact with multiple target types and a tld at a time, but you get to use existing contact command / response extensions to define the additional contact attributes without having to use key / value pairs.  [Interim] One goal is to pass in multiple contacts and validate as a whole
b.    Create a validate command / response extension of the contact mapping that extends the contact create to function as a no-op with the additional attributes used to validate usage of the contact (e.g., object - domain, contact types, tld), which would define a validate contact validate create command.  The contact info could have been extended by the validate extension to function as a validate usage command with the usage attributes consistent with the contact validate create command (e.g., object – domain, contact types, tld).  In this case, the contact commands can be directly extended by the validate extension. [Interim] So does key/value make sense here. Can this validate extension be able to be extended with other extensions (e..g. registry has a VAT extension instead of this)?
4.    Each element needs to be fully described..  I include some examples below:
a.    <validate:contact> element does not define the required “contactType” or “tld” attributes.  [Interim] Add more descriptions
b.    There is no description of any of the <validate:cd> sub-elements in the check command or response. [Interim] Add more descriptions
5.    Wouldn’t be better to include a required “valid” attribute in the check response <validate:cd> element with an optional reason and reason language similar to the domain check response?  I’m not sure if there is a real need to define a whole list of validity errors using the list of <validate:kv> elements.  It may be good enough to short circuit the validation by simply saying yes or no and if no a human readable reason.  There would be no need for the <validate:response> element or the <validate:kv> elements.  [Interim] Should the response look more like a check response (result, and free form text response if invalid)? I like the draft format better but I understand the consistency part
6.    I don’t recommend directly referencing the urn:ietf:params:xml:ns:contact-1.0 elements, since it adds a direct dependency to inclusion of the contact XML schema and namespace for a subset of the elements that are really specific to the validate mapping.  I would prefer for the validate XML schema to stand on its own by only referring to epp and eppcom, with no cross references to contact.  This would mean copying and pasting elements directly from the contact XML schema into the validate XML schema, which is an inconvenient, but makes it easier to implement.  [Interim] There has been discussion on list on this topic, continued discussion will be good.

We did not make it to the Registry Mapping discussions.