ICANN Logo

.NET Application Form


RFP Part 1: General Applicant Information

1. Name and Address fields

The full legal name, principal address, telephone and fax numbers, and e-mail address of the applicant, and the URL of its principal World Wide Web site. Additionally, each applicant must provide the Application Deposit Receipt Number issued to the applicant upon ICANN's receipt of the wired funds for the application deposit.

Organization Name:
DENIC Domain Verwaltungs- und Betriebsgesellschaft eG
Address:
Wiesenhüttenplatz 26
D-60329 Frankfurt
Germany
Telephone:
+49 69 27 235-0
Fax:
+ 49 69 27 235-235
Email:
info@denic.de
Confirm Email:
info@denic.de
URL:
http://www.denic.de/en/
Application Deposit Receipt Number:
[RESPONSE IS CONFIDENTIAL]
   

2. Applicant's Business and Other Associated Activities

Provide a general description of the applicant's business and other activities currently or expected to be associated with the services described in this RFP.

2. Applicant's Business and Other Associated Activities


DENIC eG is the registry for domains under the Top Level Domain (TLD) .de, and 
is a central and important interface of the Internet. Established in 1994, and 
organized as a cooperative in 1996, DENIC has successfully managed the rapid 
growth of .de domains over the past decade - with .de registrations now 
numbering more than eight million. Under DENIC's stewardship, .de has grown to 
become the most requested country code TLD (ccTLD), and the world's second 
largest TLD after .com. To handle this, a stable, highly dependable 
infrastructure has been set up. DENIC is based in Frankfurt, Germany, and has 
85 employees.

DENIC is a not-for-profit organization, and administers its services without 
the intention of making a profit, and for the benefit of all parties with an 
interest in the Internet. DENIC takes seriously its responsibilities and 
obligations, as recommended in RFC1591:

* It "has a duty to serve the community;"
* It must "be able to carry out the necessary responsibilities, and have the 
ability to do an equitable, just, honest, and competent job;"
* "Significantly interested parties in the domain should agree that the 
designated manager is the appropriate party."

DENIC's entire work is neutral, impartial, independent, informed, responsible 
and non-discriminating and in conformity with the internationally recognized 
standards for running a domain registry. It will maintain its close cooperation 
with its registrars as it continues to strive to fulfill its duties towards the 
German and the Global Internet Community. Thanks to its expertise, DENIC has in 
recent years gained much trust and respect not only in Germany but also 
internationally.

DENIC is in permanent contact with other national and international bodies, 
organizations and associations who are concerned with the Internet and 
maintains an active dialogue with representatives of the Internet Community.

The services provided by DENIC are ergonomic, high-performance, safe and always 
available. DENIC attempts to achieve these prerequisites by the use of high-
quality hardware and software components on the one hand and a clear 
infrastructure with the greatest possible redundancy on the other hand.

Modern and highly capable hardware alone guarantees neither quality nor 
technical competence. This also applies at DENIC: the employees are the most 
important resource. Continuous advanced training "on the job" and external 
qualification ensure an up-to-date level of knowledge of the employees at all 
times. Highly capable hardware equipment, the use of up-to-date software and 
flat hierarchies provide a modern, positive working environment and thus the 
necessary foundation for successful work.

For this very reason DENIC has also become the operator of the ENUM trial for 
the German call-number space (.9.4.e164.arpa).

3. Directors, Officers and other Key Staff

Provide the full names, positions and the qualification and experience of each of the following persons:

(i) the person or persons who will have direct responsibility for the business operations of the registry,
(i) The Person or Persons Who Will Have Direct Responsibility for the Business 
Operations of the Registry


1. Sabine Dolderer, Full Time Member of the Executive Board

Sabine Dolderer is a CEO of DENIC eG since April 2001.

Ms. Dolderer has been with DENIC since its inception - beginning in 1994 when 
it was managed by the University of Karlsruhe computing center, and through its 
founding as a cooperative in 1996. She was General Manager of DENIC from 1997-
2001, and has served in the position of Director since then.

Ms. Dolderer worked from 1990-1997 as a scientific assistant at the University 
of Karlsruhe computer center, where she was responsible for central 
communication services such as e-mail, news, and Internet access. In 1994, she 
took on the additional responsibility of the "DENIC" project, for which the 
University of Karlsruhe performed the technical engineering responsibilities on 
behalf of the top German Internet Service Providers (ISPs) until 1999.

In her career, Ms. Dolderer has made significant contributions to the design 
and further development of the domain administration system for the TLD .de. 
Her expertise on domain administration is recognized not only in Germany but 
also abroad. She is a member of various international organizations, having 
served on the board of many of them during her career. Ms. Dolderer has been 
Acting Treasurer of CENTR (Council of European National Top Level Domain 
Registries) for the period 2000-2004.

Ms. Dolderer received her education at the University of Karlsruhe, where she 
obtained her degree in Informatics/Computer Science.


2. Andreas Bäß, Full Time Member of the Executive Board

Andreas Bäß has been a member of the DENIC Executive Board since the foundation 
of the cooperative in December 1996. Being at first an honorary member, he was 
appointed as full-time director by the DENIC Supervisory Board in February 
2003. His work is focused on technical aspects at DENIC.

From 2002 until 2003 Andreas Bäß was working as a freelance consultant in the 
areas of service level management, system security and risk management.

Before this, he had been working as Technical Sales and Distribution Manager 
for Value Added Software GmbH since 2001.

Prior to this, Andreas Bäß was Technical Managing Director at VIA NET. WORKS 
Deutschland GmbH since 1998. In this role he was responsible for the 
Integration of GTN into the worldwide group of VIA Networks companies, the 
setup of an European data backbone for the support of all VIA subsidiaries and 
their customers and the integration of the other German VIA subsidiaries into 
the German backbone.

In 1994 Mr. Bäß was one of the founders of the Gesellschaft für 
Telekommunikations- und Netzwerkdienste (GTN) that merged with VIA NET. WORKS 
Deutschland GmbH in 1998. From 1994 to 1997 Andreas Bäß was managing director 
and in charge of the setup of a technical infrastructure to provide Internet 
services based on Unix Servers and Cisco Routers, the setup of a franchise 
distribution system and the registration of the trade name "DPN Deutsches 
Provider Network" all over Europe.

Before this Mr. Bäß had numerous other positions as system programmer, system 
engineer and technical director at different companies.

Mr. Bäß has an education as Professional for Business Information Systems.
(ii) each person in the chain of command with decision making authority from that person or persons to the principal executive officer of the applicant,
(ii) Each Person in the Chain of Command with Decision Making Authority from 
that Person or Persons to the Principal Executive Officer of the Applicant


The Executive Board will have direct responsibility for the business operations 
of the registry.
(iii) the top two financial officers of the applicant,
(iii) The Top Two Financial Officers of the Applicant


1. Juanita Köberich, Head of Accounting

As Head of Accounting, Juanita Köberich is in overall charge of financial 
operations at DENIC. Juanita Köberich responsibilities include but are not 
limited to financial accounting, cost accounting and balancing.
Ms. Köberich is with DENIC since July 2003 and holds the role of Head of 
Accounting since then.

Before Juanita Köberich joined DENIC, she gained 18 years of work-experience in 
the accounting departments of several other companies, including software and 
hardware companies. During this time she was the Head of Accounting Departments 
for 13 years.

Ms. Köberich holds a degree in Business Administration with majors in 
Organization and Controlling.


2. Heinrich Hildmann, Deputy Head of Accounting

As Deputy Head of Accounting, Heinrich Hildmann is responsible for the accounts 
payable and accounts receivable at DENIC as well as for all day-to-day 
financial transactions of DENIC.

Heinrich Hildmann is with DENIC since April 2001 and holds the role of Deputy 
Head of Accounting since he joined DENIC.

Before Heinrich Hildmann joined DENIC, he gained 19 years of work-experience in 
the accounting department of the consulting company G+E and with the components 
supplier Alfred Teves GmbH (now Continental Teves AG & Co. oHG).

Mr. Hildmann holds a degree in Business Administration from the Johann Wolfgang 
Goethe University, Frankfurt.
(iv) the person with the principal technical responsibility for the operation of the registry,
(iv) The Person with the Principal Technical Responsibility for the Operation 
of the Registry


Joachim Strohbach, Head of Operations

As Head of Operations, Joachim Strohbach is in overall charge of technical 
operations at DENIC, in other words responsible for all technical aspects of 
performing registrations, domain administration, the name server service, the 
integration of new processes into operational work, support for registrars and 
monitoring services. Under his leadership, DENIC introduced IDNs under .de in 
March 2004 and expanded its name server network to full world-wide coverage. He 
is with DENIC since 1999 and became Head of Operations in 2001. This department 
is made up of 14 employees.

Before joining DENIC, Mr. Strohbach worked in the IT-departments of a major 
German tour operator for several years.

Joachim Strohbach studied Computer Science at the University of Stuttgart.
(v) each other executive or management person of the applicant who will have significant policy making or operational influence regarding the registry operations,
(v) Other Executives or Management Persons with Significant Influence


1. Heinz-Gerhard Montag, Head of System Development

Heinz-Gerhard Montag is with DENIC since November 2002. He is head of DENIC's 
software development and has more than 20 years of experience in the IT 
industry. He is responsible for managing the software development team (ten 
staff members) and defining the development strategy. 

Prior to DENIC he has held a variety of senior management positions in software 
development, professional services, strategy and planning in the software 
industry. His previous experience includes serving as Technical Manager for 
Client Service and Professional Service of Legent (1987 - 1995) with about 80 
reporting staff, Technical Director at Computer Associates (1995 - 1996), 
Director Internet Security at Emprise e-commerce Services and General Manager 
at Emprise Technologies (1997 - 2000, since 1998 also Managing Director). From 
2000 to 2002 he was Technical Manager at PentaSafe Security Technologies GmbH.
He has an education as Professional for Business Information Systems.


2. Michael Weiss, Head of System Administration

Michael Weiss has lead the System Administration Group at DENIC, comprised of 
13 staff members, since 2001. He is responsible for the conception, provision, 
maintenance, and quality management of all infrastructure used at DENIC.

Graduated from the University of Karlsruhe as a physicist in 1989, he worked in 
his first years after the university as a software engineer. Starting 1992 he 
was a Managing Director of ICOS Computersysteme, which focused on IT-Consulting 
in the field of Networks and System Integration, and System Manager at the 
scientific Gmelin-Institute, a part of the Max-Planck-Society, before he joined 
DENIC in 1998 as system administrator.


3. Stephan Welzel, General Counsel

Stephan Welzel has been DENIC's general counsel since July 1999 and was 
additionally appointed authorized signatory for DENIC in 2001. He is admitted 
to the bar in all German states. 

After earning his law degree from the University of Hamburg in 1992 he 
completed the series of clerkships necessary for the bar exam clerking i. a. 
for the Hamburgian District Attorney's Office and the German Federal Office of 
Sea-Navigation and Hydrography as well as for judges at the Court of Appeals 
and State Supreme Court of Hamburg. Subsequently, he worked for a law firm 
specializing in intellectual property law and dealt with his first domain name 
case in 1997.

At DENIC, Stephan Welzel supervises the legal staff and is responsible for all 
legal matters and co-responsible (with an Executive Board member) for all 
policy issues on both the national and international levels. He has attended 
all ICANN meetings since August 1999 and been actively involved in various 
ccTLD community issues.

Since 2002 he has been chairman of the Legal & Regulatory Group of the Council 
of European National Top Level Domain Registries (CENTR). He is a member of the 
Committee on Telecommunication and Media of the German Federal Chamber of 
Commerce and the Committee on the Information Industry of the Chamber of 
Commerce of Frankfurt. He regularly publishes articles in law journals and has 
recurring speaking appointments on domain name issues at several universities 
as well as in other national and international fora.
(vi) all directors or persons with equivalent positions for non-corporate entities, and
(vi) Directors or Persons with Equivalent Positions


1. Ines Balthes, Honorary Member of the Executive Board

Ines Balthes has been an honorary member of the Executive Board of DENIC since 
September 1999.

Ines Balthes is a manager in the Technology Projects division of SAP AG based 
in Germany. She is responsible for global network projects including 
implementation of remote access solutions for training systems, implementation 
of business television solutions for internal communication and the wireless 
LAN deployment at SAP.

Ines Balthes holds a Masters degree in Mechanical Engineering.


2. Stephan Martin Deutsch, Honorary Member of the Executive Board

Stephan Deutsch became an honorary member of the Executive Board of DENIC in 
April 2004 after serving as Vice Chairman of DENIC's supervisory board for six 
consecutive years, starting in July 1998. In his position he is instrumental in 
helping to define the cooperative's overall strategy.

Mr. Deutsch is also Head of Corporate Communications for Europe, Middle East 
and Africa (EMEA) at global communications company MCI (NASDAQ: MCIP) holding a 
position as Senior Manager for International Public Relations since 2001. In 
this position he is responsible for all the company's media communications in 
more than 20 countries. Before this, Mr. Deutsch held various management 
positions at UUNET Technologies' European and German operations since 1997. He 
also was one of the founding members, in 1993, of Germany's first commercial 
ISP, EUnet, where he helped define the ISP's systems administration and IT 
concept and structure as well as customer service and support communications 
before accepting positions in Marketing and Event Management.

From an educational perspective, he is maintaining a study of Computer Science, 
Business Administration and Electronics / Electrical Engineering at the 
University of Dortmund, Germany.

He is an author of various articles in IT magazines and Internet books and a 
regular speaker at international conferences (e.g. Resilience 2004 conference, 
October, London, on Business Continuity in the Financial Sector).

Moreover, Mr. Deutsch has been one of the founding members of the German ASP 
Konsortium dedicated to introducing the concept of web based and on-demand 
software and application service provision. He was serving as a Director at the 
consortium's Executive Board for the statuary electoral turn of two years from 
2000 to 2002. The ASP Konsortium merged recently with another German Internet 
body, the Electronic Commerce Forum, ECO.


3. Carsten Schiefner, Honorary Member of the Executive Board

Carsten Schiefner became an honorary member of DENIC's Executive Board in July 
1998.
Apart from his activities on the DENIC Executive Board, Mr. Schiefner was 
responsible for external relations at RIPE NCC in Amsterdam until July 2004. In 
this role Mr. Schiefner maintained existing and established new contacts with 
governmental and industry bodies on national as well as international levels. 
Furthermore, Mr. Schiefner was responsible for the coordination of and led all 
activities related to the ENUM Tier 0 registry for e164.arpa.

Before starting his employment with RIPE NCC in 2002, Mr. Schiefner was with 
Primus Telecommunications GmbH and its predecessors since 1996. During this 
time he was responsible for the creation of an External Affairs department, the 
overall management of the group's IP address allocations as well as the 
administrative overall co-ordination of the peering activities of the Primus 
group in Europe.
From 1988 until 1996 Mr. Schiefner held different positions at Siemens AG in 
Germany.

Carsten Schiefner received his academic education at the "Freie Universität 
Berlin", where he studied Computer Science and Communication Science.
In 2001 Mr. Schiefner was elected as a member of the spokespersons' council of 
DE-CIX, the German Internet exchange point in Frankfurt.


Supervisory Board

Being a cooperative under German law, DENIC has an honorary Supervisory Board 
made up of five distinguished persons elected by the General Assembly of the 
DENIC registrars. The Supervisory Board appoints and supervises the Executive 
Board. It is not directly involved in day-to-day business, but serves as an 
institution of competence and closely cooperates with the Directors on all 
relevant issues. All members of the Supervisory Board are well known for their 
expertise and experience in domain administration and therefore strongly add to 
the high quality of DENIC performance. 

4. Sebastian von Bomhard, Chairman of the Supervisory Board

Sebastian v. Bomhard, member of the Supervisory Board of DENIC eG from the very 
beginning, has been chairman of that board continuously since 1998.

Mr. v. Bomhard also is founder and Alleinvorstand (CEO) of the SpaceNet AG in 
Munich, Germany. SpaceNet has been serving Internet solutions for business 
customers in Germany since 1993. In addition, since 2004 Mr v. Bomhard is a 
member of the Supervisory Board of the KoSiB eG, the cooperative society of IT 
security related companies in Bavaria.
Before 1993 Mr. v. Bomhard worked as consultant, IT instructor and author for 
various IT magazines. His focus was on C, SQL, Unix, Internet Technology and 
The Art of Computer Programming.

Mr. v. Bomhard studied Mathematics and Logics in Heidelberg, Berlin and Vienna. 
He gained his university diploma as Magister rer. nat. at Vienna university for 
his work on a stacking axiomatic calculus for pseudorelative complementary 
lattices.


5. Ulrike Jendis, Member of the Supervisory Board

Ulrike Jendis had been a member of the Supervisory Board from the very 
beginning in December 1996 until April 2001 and was reelected to the 
Supervisory Board in April 2004. From April 2001 until April 2004 she served 
DENIC as an honorary member of the Executive Board.

Ulrike Jendis is managing director of Cable &Wireless Telecommunication 
Services GmbH for Germany, Austria, Russia and the Nordic countries. Before 
holding this position, Ulrike has been working for Cable & Wireless since 1991 
in several other positions.
Prior to this Ms. Jendis worked for the government of Oberbayern in Munich from 
1988 to 1991 and for UNICEF in New York from 1986 to 1988. During this time she 
held positions as auditor as well as assistant program officer.
From 1977 to 1986 Ulrike Jendis worked as an economic expert for the regional 
government of Hannover as well as a lecturer at the Ludwig-Maximilian-
University and the University of the Federal Armed Forces in Munich.

Ulrike Jendis studied Business Administration and History of Arts at the Ludwig-
Maximilian-University in Munich.


6. Elmar Knipp, Member of the Supervisory Board

Elmar Knipp has been a member of the Supervisory Board of DENIC eG since July 
1998.

Elmar Knipp is managing director of Knipp Medien und Telekommunikation GmbH, 
mainly responsible for technology and strategy. Together with his twin brother, 
Dietmar Knipp, he founded the company in 1994. In 1997, Knipp entered the 
domain market and has since gained experience in all areas of this business. 
This includes acting as a registrar, as registry operator for sTLDs and also as 
software vendor for registry systems.
He holds 50% of Knipp's shares. Elmar Knipp is vice president of CORE as well 
as one of the directors of Afilias.

Elmar Knipp studied Computer Science and Business Administration at the 
University of Dortmund.
(Elmar Knipp has resigned from any activities regarding the DENIC .net bid, 
because he has a conflict of interest.)


7. Eric Schätzlein, Member of the Supervisory Board

Eric Schätzlein has been a member of DENIC's Supervisory Board since April 2001.

Eric Schätzlein is Schlund + Partner's CTO for Domain Services. In 1995, Mr. 
Schätzlein co-founded Schlund + Partner and has been with the company ever 
since. He joined the management board of Schlund in 2001 as Chief Technical 
Officer and is responsible for Schlund's domain services department.

Being one of Germany's Internet pioneers, Mr. Schätzlein worked with the German 
Top Level Domain registry DENIC and helped develop DENIC's automated domain 
registration. In its current version, this system has registered more than 
eight million .de domain names. Mr. Schätzlein has designed and implemented 
Schlund + Partner's domain registration and DNS system, which has to date 
registered some 3.8 million domain names. He has also co-designed Schlund + 
Partner's com/net/org registrar system and is familiar with the NSI-RRP and EPP.
Mr. Schätzlein has been working with European and international ccTLD 
registries like Nominet UK, DENIC, SWITCH and nic.at for many years. Since 
December 2003, Mr. Schätzlein has been a member of the advisory council of the 
Austrian ccTLD registry, nic.at. He is also a member of the Board and Executive 
Committee member of Afilias Ltd., but has refused himself on all .net related 
issues at Afilias.

He has attended various workshops on political, legal, and technical domain 
name issues, e.g. ICANN Studienkreis, Domain Pulse, ECLIP as well as RIPE 
meetings. Mr. Schätzlein is a private member of ISOC.

Mr. Schätzlein holds a Bachelor's degree in Computer Science from the 
University of Karlsruhe, Germany.


8. Angela Wilson, Member of the Supervisory Board

Angela Wilson has been a member of the DENIC's Supervisory Board since 1999.

Ms. Wilson is managing director and founder of transnet, a Munich based local 
ISP that has focused on small and medium sized business customers since 1994. 
Before this, Angela Wilson accumulated multiple experiences in the area of 
public relations for political and economical institutions including the EU. 
Since 1989 she also is the publisher and owner of MunichFound, Bavaria's only 
city magazine in English.
In addition to her business ventures she has been an elected member of the city 
council of Munich for the last ten years.

Angela Wilson studied Political Science and Philosophy at the universities of 
Bonn and Munich.
(vii) identify any persons or entities who own or will own or otherwise control, directly or indirectly, 5% or more of the outstanding voting power held by all persons or entities entitled to participate in the election (or other selection) of the applicant’s board of directors or other governing body.
(vii) Control of Outstanding Voting Power


There is no person or entity that own or will own or otherwise control, 
directly or indirectly, 5% or more of the outstanding voting power held by all 
persons or entities entitled to participate in the election (or other 
selection) of the applicant's Board of Directors or other governing body.

The independent evaluators may seek additional information from applicants regarding the qualifications of personnel if deemed necessary.

   

4. Applicant Organization Type

Provide the applicant's type of entity (e.g., corporation, partnership, etc.) and law (e.g., Denmark) under which it is or will be organized. Please state whether the applicant is for-profit or non-profit. If it is non-profit, please provide a detailed statement of its mission. Applicants should be prepared to submit articles of incorporation, or other similar organizational documents later in the evaluation process.

4. Applicant Organization Type


DENIC's was set up as a registered cooperative under German law in December 
1996 by an initiative taken by the industry concerned and has its headquarters 
in Frankfurt. This form of self-administration is entirely in harmony with the 
open structures of the Internet as a global medium, since it is based on the 
principles of the decentralized distribution of responsibilities and resources 
as well as self-regulation through the interest groups concerned.

Setting up DENIC as a cooperative made it possible to maintain an open 
structure for the registry, as new registrars can join the cooperative at any 
time, and the entirety of registrars has a very extensive influence and the 
means of shaping it. DENIC's membership comprises organizations administrating 
domains for their customers and who feel an active commitment to providing, 
within the principles of self-regulation, a key service for the whole German 
Internet Community as well as to the global community - namely, the operation 
of the registry for .de.

DENIC is not profit oriented, but rather sees itself as a neutral service 
provider for everyone having an interest in the Internet. This duty is also 
enshrined in DENIC's statute:

§ 2 Purpose and subject 

(1) As registry, the cooperative administers and operates Internet domains, in 
particular under the Top Level Domain .de, and administrates all related 
functions. This includes, for example, the provision and maintenance of the 
corresponding systems, consultancy for and training of the members, support for 
and informing of the holders of registered domains and attendance to the 
interests of the cooperative as well as those of the entire German Internet 
community.

(2) In accordance with the internationally acknowledged standards for the 
operation of a country code Top Level Domain, the cooperative also fulfils its 
function for the benefit of all who are interested in the Internet, and does 
not pursue the realisation of profits. It merely uses its revenues to cover its 
costs and to secure its own existence.
   

5. Number of Employees

Provide the number of employees currently employed by the applicant or to be employed concurrently with a selection as the successor registry operator.

5. Number of Employees


85 (as of January 1, 2005)
   

6. Contact Person

Provide the name, telephone and fax number, and e-mail address of person to contact for additional information regarding this application. If there are multiple contacts, please list all their names, telephone and fax numbers, and e-mail addresses and describe the areas as to which each should be contacted.

[RESPONSE IS CONFIDENTIAL]
   

RFP Part 2: Technical and Financial Information

The criteria by which the applicants will be evaluated are set forth below. Each criterion is labeled as either absolute or relative. Diagrams, charts and other similar material may be submitted in response to specific provisions where so indicated in the RFP as posted.

1. ICANN Policy Compliance

Criteria: The successor .NET registry operator must comply with all existing consensus policies of ICANN and must agree to comply with all future consensus policies of ICANN. This is an absolute criterion.

Describe in detail your method for implementing ICANN's Inter-Registrar Transfer Policy.

1. ICANN Policy Compliance

Highlights:

* DENIC will comply with all policies set by ICANN for the TLD .net.

* DENIC will participate constructively in ICANN's gTLD policy-making process.

* A compliance officer will be assigned.

* A process to guarantee policy compliance and integration will be implemented.


DENIC as the registry for .de has ten years of experience in establishing 
policies for the .de-zone. These policies have been developed in an open, 
transparent, bottom-up and consensus driven process according to the practices 
described in RFC1591 closely relying on the participation of the German 
Internet community. These processes of policy-making resemble the policy-making 
processes adopted by ICANN for the gTLDs.

DENIC as a ccTLD registry had no reason to participate in this part of ICANN's 
policy-making for gTLDs, but has always supported ICANN's work in general in a 
very constructive and supportive fashion by commenting and sharing its 
experience. A reasoned example for this are DENIC's ongoing contributions to 
the shaping of the ccNSO and the improvement of the ccNSO related parts of the 
ICANN bylaws.

As the registry for .net, DENIC will of course intensify this participation and 
comply with all existing and all future gTLD consensus policies of ICANN. 

(a) Participation in ICANN policy-making process

DENIC considers it a basic principle of the administration of .net that the 
operator of the registry participates constructively in the ICANN policy-making 
process.

Therefore, as the .net registry DENIC will contribute in various ways to the 
development and enhancement of policies affecting .net in particular as well as 
the Internet at large.

* Attending ICANN's regular meetings: DENIC is already known as a registry 
attending all regular meetings and will continue doing so as .net registry.
* Participating in ICANN's working groups: As the .net registry DENIC will even 
further increase its participation in different ICANN working groups.
* Active participation in policy development: As the .net registry DENIC will 
remain an active and constructive partner in ICANN's policy development process.

DENIC also commits to comply with all policies set by ICANN for the TLD .net.

(b) Compliance Officer

DENIC will appoint a .net policy compliance officer based in the legal 
department with close contact to operations and system development. The 
compliance officer's role will be to ensure that DENIC conforms to the 
standards set forth in its contracts with ICANN and the registrars as well as 
the applicable ICANN policies at all times. The compliance officer will act as 
point of contact for ICANN and other parties for any complaints on DENIC's 
compliance with ICANN policies.

The registry officer's tasks will include to:

* Ensure that all relevant operational plans and programs are compliant with 
ICANN's policies
* Ensure that new ICANN policies get implemented completely and without delay
* Monitor potential conflicts of interest and initiate actions to actively 
avoid or remedy such conflicts
* Train staff to comply with policies that the registry is bound by
* Actively monitor the registry's impartiality and the equality of treatment of 
all registrars (see part 2-2-a: Methods of Providing Registry Services)
* Deal with complaints on DENIC's policy compliance from ICANN or third parties 
(first answer on complaint will be given within one working day)


(c) Compliance of Existing / New DENIC Processes with ICANN's Policies

DENIC knows that the most efficient way to ensure policy compliance is to 
thoroughly review operational plans prior to their implementation. For policies 
regarding .de, DENIC already has a process in place to assure such reviews. 
Based on this process, DENIC will complete the following tasks prior to the 
June 30, 2005:

1. In a first step, all technical and operational processes planned to 
operate .net will be reviewed by the compliance officer. They will be reviewed 
with respect to their compliance with existing / planned ICANN policies and any 
requirements of the .net registry agreement. A rigorous process will oblige 
every department to report all relevant plans to the compliance officer before 
implementation of these plans.

2. The compliance officer will check the reported plans for possible influences 
on any existing or planned ICANN policy or requirements of the .net registry 
agreement and will create an internal report on the review of every plan and 
program.

3. Only if this report attests compliance with existing / planned ICANN 
policies and the requirements of the .net agreement, the plans will be approved 
for implementation. If the compliance officer identifies any violation of ICANN 
policies or requirements of the .net agreement, the departments involved in the 
creation of the plan will be instructed to either abolish the plan, or to 
modify the plan in a way so that no conflicts with ICANN policies or 
requirements of the .net agreement arise.

A plan not having been approved by the compliance officer will again go through 
the whole approval process after once the concerned department has modified it.


(d) Compliance of Existing DENIC Processes with New ICANN Policies

Whenever ICANN will decide on a new policy for .net, DENIC will do everything 
to guarantee a quick and smooth implementation of this policy.


In order to achieve this, DENIC will implement the following process for .net 
prior to June 30, 2005. This process is based on a process DENIC already has in 
place for policies regarding .de.

1. Whenever ICANN decides on a new policy for .net, the compliance officer will 
check all existing processes for possible violations of the new policy.

2. The compliance officer will create an internal report on the review.

3. If this report attests compliance of existing processes with the new policy, 
no further action will be taken.
If the compliance officer identifies any violation of the new policy by 
existing processes, the departments involved in the concerned process will be 
instructed to modify it in a way so that no conflicts with the new policy 
arise. These changes will be treated like planned technical and operational 
processes and therefore go through the process described in the prior chapter 
(Compliance of Existing / New DENIC Processes with ICANN's Policies).


(e) Implementation of ICANN's Inter-Registrar Transfer Policy

As described above, DENIC will spend a great deal of attention on the 
implementation of all ICANN policies. As the other policies, ICANN's Inter-
Registrar Transfer Policy will be implemented from the first day of operations 
on.

Generally it has to be mentioned, that each registrar working with DENIC 
regarding its position as registry provider for .net, will have to define its 
preferred way of communication. Therefore, the registrars can choose among EPP 
and RRP (for more details regarding these two protocols refer to part 2-5-b-iv: 
Registry-Registrar Model & Protocol). In the following, the protocol chosen by 
each registrar will be called "preferred way of communication".

Because EPP and RRP are both protocols used for the registration of domains, 
the registrars only need one interface for multiple services. By using these 
protocols, the highest possible degree of security is guaranteed to avoid fraud.
By the use of these protocols, equivalent access therefore also can be 
guaranteed to the machines managing the inter-registrar transfer process (for a 
detailed description of mechanisms used to provide equivalent access see part 2-
2-a: Equivalent Access for Registrars).

When DENIC receives a "transfer" command from the gaining registrar, DENIC will 
transmit an electronic notification to both, the gaining registrar and the 
loosing registrar. The gaining registrar will receive the note with the 
protocol he used to transmit the "transfer" command. The notification for the 
loosing registrar will be transmitted using the poll command when the preferred 
way of communication is EPP (for more details regarding the two protocols refer 
to part 2-5-b-iv: Registry-Registrar Model & Protocol), or using e-mail when 
the preferred way of communication is RRP.

There are three possible ways the loosing registrar can react on this 
notification:

* The loosing registrar sends a NACK protocol command via the registrar's 
preferred way of communication within five calendar days
* The loosing registrar sends a "confirmation" command via the registrar's 
preferred way of communication within five calendar days
* The loosing registrar does not react on the notification within five calendar 
days

In case of a "confirmation" command or no reaction of the loosing registrar, 
DENIC will complete the requested transfer.
In case of a NACK protocol command of the loosing registrar, DENIC will not 
complete the requested transfer.

After DENIC has updated its database, it will send electronic notifications to 
both, the gaining registrar and the loosing registrar. The notifications will 
be send using the poll command when the preferred way of communication is EPP, 
or using e-mail when the preferred way of communication is RRP.

If DENIC receives one of the notices as set below, it will undo a transfer 
after it has occurred. In such case, the transfer will be reversed and the 
domain data reset to its original state. DENIC will undo the transfer within 
five calendar days of receipt of the notice except in the case of a registry 
dispute decision, in which case DENIC will undo the transfer within 14 calendar 
days unless a court action is filed. The notice required will be one of the 
following:

* Agreement of the loosing registrar and the gaining registrar sent by e-mail, 
letter or fax that the transfer was made by mistake or was otherwise not in 
accordance with the procedures set forth in this policy;
* The final determination of a dispute resolution body having jurisdiction over 
the transfer; or
* Order of a court having jurisdiction over the transfer.

SRS, the technical infrastructure that is used for the provision of all other 
registry services, will also be used for the provision of inter-registrar 
transfers (for a more detailed description of the infrastructure used for the 
SRS refer to part 2-5-b-i: Facilities and Systems).
   

2. Equivalent Access for Registrars

Criteria: All ICANN-accredited registrars must be allowed to qualify to register names in .NET. The registry operator must treat all registrars that have qualified to operate as .NET registrars equivalently. This is an absolute criterion (except as described below regarding languages).

(a) Describe in detail your methods of providing registry services on an equivalent basis to all accredited registrars having registry-registrar agreements in effect. Your description should include any measures intended to make registration, technical assistance, and other services available to ICANN-accredited registrars in multiple time zones and multiple languages. Please include in your description the languages that you agree to support if you are selected as the .NET registry operator. Support in English is an absolute criterion. Support in additional languages is a relative criterion. In addition, describe the Registry Code of Conduct and other commitments you propose to make to ensure that all such registrars receive equivalent access to registry services. In preparing your response to this item, you may wish to refer to Appendices H and I of the registry agreements ICANN has entered into for other unsponsored TLDs (e.g., .biz, .com, .info, .name, .org and .pro).

2. Equivalent Access for Registrars

Highlights:

* DENIC has several measures in place to provide equivalent availability of 
registration as well as equivalent availability of technical and other support 
for all registrars.

* DENIC established a code of conduct as well as a several statutory and 
contractual guarantees to put the equal treatment of registrars on a formal 
base.

* DENIC will provide additional documentation describing the differences 
between the protocols during the transition.


(a) Methods for Providing Equivalent Access

Given the importance of .net for the whole of the Internet, DENIC is determined 
to administer this TLD in a way that is impartial and equitable towards all 
registrants and registrars. This requirement tallies completely with the way in 
which DENIC has put its self-perception into action for many years as the 
operator of .de.


(i) Methods to provide equivalent access for all registrars

Equivalent Availability of Registration

All of DENIC's systems have been devised so that they offer the same conditions 
for all registrars, and it is impossible for anyone to snatch any kind of 
advantage, be it technical, financial or organizational. DENIC will deploy 
these same tried-and-tested systems and mechanisms for the administration 
of .net.
An excellent practical example for equal treatment of registrars was the 
introduction of IDNs under .de on March 1, 2004. It was decided to organize 
this as a "big bang" in accordance with the principle of "first come, first 
served", and all of DENIC's more than 200 registrars faced exactly the same 
starting conditions for accessing the electronic registry system.

Measures to guarantee this equal treatment were:

* Starting January 15, 2004, a test environment was made available to all 
registrars. So everybody had the chance to investigate and test every aspect of 
the system in advance and to synchronize their systems to the given conditions.
* Only one mail server was used to receive the incoming mails. Each of these 
mails was signed by a receipt stamp with the accuracy of a microsecond. In this 
sequence, the received orders then were processed.
* Every registrar was given the same bandwidth to access the mail server that 
received the incoming orders. Therefore every registrar had exactly the same 
opportunity to send orders to DENIC.

As a result of these measures, the number of requests processed per time was 
distributed very evenly over the registrars. Even within the peak loads in the 
first full hour of registration (from 15:00 to 16:00 CET) every DENIC registrar 
had equivalent access to the registration.
This example proved, that DENIC, even in times with very high peak loads, is 
capable of guaranteeing equivalent access for every registrar.

To guarantee equivalent access for all accredited registrars, DENIC as .net 
operator will implement different measures.

For registration services these measures will include but not be limited to:

* DENIC will offer the same interfaces to every registrar (EPP and RRP; for 
more detailed information refer to part 2.5.b.iv: Registry-Registrar Model & 
Protocol)
* Each of the two protocols offered for registration (EPP and RRP) will be 
treated equally (for more detailed information refer to part 2.5.b.iv: Registry-
Registrar Model & Protocol)
* Resource controlling mechanisms will be applied in a neutral way (e.g. 
maximum number of parallel sessions per registrar)

For whois services, DENIC will guarantee equivalent access for all accredited 
registrars, by assigning the same maximum number of possible queries per unit 
of time to the whois service to every accredited registrar.
Therefore accredited registrars have to deposit the IP addresses with DENIC, 
from where the queries will come from. Only queries coming from these IP 
addresses will be able to obtain the increased access control limits held ready 
for accredited registrars. For more detailed information on the whois service, 
refer to part 2-5-b-xii: Whois Services.

Equivalent Availability of Technical and Other Support

Technical and other support covers areas such as registrar administration, 
report generation, web portals, mailing lists and newsletters, helpdesks, 
training, test environments, toolkits, emergency support, escalation policies, 
support for new technologies and proactive interaction with the registrars in 
other relevant areas (for more detailed information on all these areas of 
support refer to part 2.5.b.xix: Support).
To give all accredited registrars equivalent availability in all these areas, 
means to guarantee the same opportunities for registrars speaking different 
languages, working in different locations and different time zones.

Language:

* The web portal will be available in Arabic, Chinese, English, French, German, 
Korean, and Spanish.
* Mailing lists and newsletters will be made available in English, French, 
German, Korean and Spanish
* Training activities will be held in English and German. Also training 
materials will be offered in these two languages.
* The helpdesk will offer services in English 24/7/365. From 5 to 19 UTC the 
helpdesk will also offer services in German. For French, Korean and Spanish a 
call back service will be available.

For more detailed information on all these areas of support and the languages 
these services are offered for, refer to part 2.5.b.xix: Support.

Location:
* Trainings will be held in the U.S. as well as in Germany. If there is 
sufficient demand for trainings in other countries, DENIC will initiate 
activities to meet these demands, too.
* Decisions on the locations for events concerning new technologies will be 
made depending on the individual event. To guarantee that the events serve the 
needs of the registrar community best, decisions will be made jointly by the 
registrars and DENIC.

For more detailed information on all these areas of support and the locations 
these services are offered for, refer to part 2.5.b.xix: Support.

Availability:

* The helpdesk will be available 24/7/365.
* The web portal will be available 24/7/365.
* The test environments will be available 24/7/365.
* The emergency support will be available 24/7/365.

For more detailed information on all these areas of support and the 
availability of these services, refer to part 2.5.b.xix: Support.


(ii)	Code of Conduct

The following Code of Conduct forms an integral part of the contract with ICANN:

.net TLD Code of Conduct 

DENIC will at all times operate as a trusted third-party provider of registry 
services. The importance of .net as a critical Internet infrastructure requires 
that the operator of the .net registry conducts itself in a fair, efficient, 
and neutral manner. Therefore, in its provision of neutral registry services 
(as defined by the ICANN in its model .net registry agreement), DENIC will 
comply with the following registry code of conduct.

1. DENIC will conduct periodic reviews of its policy and operation structures 
to ensure continuing operation of the .net TLD in the interest of the global 
Internet Community.

2. DENIC will not, and will require that its subcontractors do not, directly or 
indirectly, show any preference or provide any special consideration to any DNS 
registry operator or ICANN-accredited registrar in the .net registry versus any 
other DNS registry operator or ICANN-accredited registrar in the .net registry, 
including a registry or registrar owned by a member of DENIC.

3. All ICANN-accredited registrars in the .net registry shall have equivalent 
access to registry services provided by DENIC as set forth in Appendix H of the 
registry agreement.

4. DENIC shall not, in any way attempt, either to warehouse domain names or 
attempt to register domain names in its own right, except for names designated 
for operational purposes in compliance with the registry agreement.

5. Any shareholder, subsidiary, affiliate, or other related entity of DENIC 
that also operates as a provider of registrar services shall maintain separate 
books of account with respect to its registrar operations separate from those 
of DENIC.

6. Neither DENIC, nor its shareholders, subsidiaries, affiliates, or other 
related entities shall have access to user data or proprietary information of 
an ICANN-accredited registrar, except as necessary for registry management and 
operations. 

7. DENIC will ensure that no user data or proprietary information from any 
ICANN-accredited registrar is disclosed to its affiliates, subsidiaries, or 
other related entities, except as necessary for registry management and 
operations.

8. Confidential information about DENIC's business services will not be shared 
with employees of any DNS registry operator or ICANN-accredited registrars, 
except (a) as necessary for registry management and operations or (b) if such 
information is made available to all DNS registry operator employees and ICANN-
accredited registrars on the same terms and conditions or except (c) for DENIC 
board members within the framework of their auditing duties.

9. No full time member of DENIC's Executive Board will simultaneously serve on 
the Executive Board of an ICANN-accredited registrar that obtains registry 
services from DENIC.

10. No employee of DENIC will hold a greater than 5% interest, financial or 
otherwise, in a company that obtains registry services from DENIC.

11. No employee of DENIC will also be an employee of any DENIC subsidiary, 
affiliate or other related entity that also operates as an ICANN-accredited 
registrar.

12. DENIC will ensure that with regard to .net no user data from or proprietary 
information of any registry operated or controlled by DENIC is disclosed to any 
other registry operated or controlled by DENIC.

13. DENIC will conduct internal neutrality reviews on a regular basis. In 
addition, DENIC and ICANN may mutually agree on an independent party that ICANN 
may hire, at ICANN's expense, to conduct a neutrality review of DENIC for 
ensuring that DENIC and its owners comply with all the provisions of this 
registry operator Code of Conduct. The neutrality review may be conducted as 
often as once per year. DENIC will provide the auditor with reasonable access 
to information and records appropriate to complete the review. The results of 
the review of the auditor will be provided to ICANN and shall be deemed to be 
confidential and proprietary information of DENIC.


(iii)	Other Commitments to Ensure Equivalent Access for all Registrars

Statutory Guarantee

As a registered cooperative ("eingetragene Genossenschaft", eG), DENIC is 
virtually a synonym for equivalent access for all registrars to the registry's 
resources without any form of discrimination whatsoever. The cooperative model, 
in which the registrars as a whole are members and thus jointly form the 
registry, satisfies one of the most fundamental democratic principles and 
constitutes an essential commitment to equality of treatment.

Thanks to direct control vested in the cooperative's various statutory bodies, 
the registrars directly influence the shape of its services and policies. This 
model has had an extremely successful track record in recent years for the 
administration of the .de TLD in a highly competitive environment and, indeed, 
it has been one of the key contributors to the enormous success of the .de TLD. 
The twofold duty of impartiality and equal treatment is firmly anchored in the 
Cooperative's statutes.

To quote, by way of example, some of its most important provisions:

* "§ 9 Rights and obligations of members
(1) Each member shall have the right to be involved in the organization of the 
cooperative and to make use of the services of the cooperative subject to the 
provisions of the Genossenschaftsgesetz (Cooperative Act) and this statute."

* "§ 13 The Executive Board
(4) It (the Executive Board) shall in particular have the obligation to ensure 
proper and reliable performance of the service of the cooperative for the 
members, including support of them."

DENIC will feel no less bound by this principle in administering the .net TLD 
and will make strictly the same technical, personnel and administrative 
services available to all registrars.

There should be no conflicts of interest, since DENIC itself will not be acting 
as a registrar for .net and any current DENIC registrars who are not ICANN-
accredited registrars will not be able to make any .et registrations.

Contractual Guarantee

DENIC will conclude agreements with all ICANN-accredited registrars, and these 
agreements will lay down the precise terms and conditions for access to the 
registry services. Additionally these agreements will include the corresponding 
service levels. All the information about individual registrars which DENIC 
happens to acquire in the course of its activity as the .net administrator will 
be treated with absolute confidentiality. This confidentiality provision will 
form an integral element of both the agreements concluded with the registrars 
and the employment terms and conditions between DENIC and its employees.

DENIC will nominate either one of its employees or an external consultant to 
actively monitor the registry's impartiality and its equality of treatment for 
all registrars. If an accredited registrar or any third party have any 
complaints in this regard, there will be a compliance officer (for more 
detailed information on the compliance officer, refer to part 2-1: Compliance 
with ICANN Policies) defined who they can address this issue to. This 
guarantees the quickest possible handling of any complaints.

The Technical Advisory Council, whose members are determined by the registrars, 
is yet another instrument for ensuring that the registrars' interests are 
effectively put into practice and that the principle of equal treatment is 
fully adhered to.

(b) VeriSign, Inc., the current operator of the .NET registry uses a registry-registrar protocol (RRP) documented in RFC 2832. At the time of the transition, the selected successor operator will be required to continue to support the RRP (unless a migration of registrars in .NET to another protocol has already been completed by that time). In addition, the selected successor operator will be required to implement support for Version 1.0 of the Extensible Provisioning Protocol as specified in RFC's 3730, 3731, 3732, 3733, 3734, and 3735. Provide a detailed description of your plan for supporting RRP at the time of transition, for supporting EPP 1.0, and for providing registrars with a smooth, low-cost migration path from RRP to EPP.

(b) Registry-Registrar Protocol

Highlights:

* DENIC will be able to provide test systems for both the EPP interface as well 
as the RRP to EPP proxy well in advance of the transition  date.

* A three-step procedure will be followed to accomplish the migration from a 
thin to a thick registry.



(i) Protocols

The incumbent .net registry is planning to migrate its .net registrars from RRP 
to the EPP 1.0 standard as described in RFCs3730 to 3734, and later updated by 
RFC3915. All necessary extensions will be handled regarding RFC3735. In order 
to fully complete this task, all proprie-tary modifications of RFC3632 which 
have not been made public by VeriSign (current RRP Version 2.1.2), must be 
fully disclosed.

Protocols for Going Live on July 1, 2005

DENIC is committed to adhere to the standards set forth by the IETF and will 
build its operation of the .net registry based on the EPP protocol. Registrars 
will be able to use the EPP protocol starting from the first day of operations 
by DENIC.

However, DENIC understand the need to provide for a smooth transition for all 
currently accredited registrars, including those planning to migrate from RRP 
to EPP on a later date. Therefore, DENIC will provide a RRP to EPP proxy which 
will be available from the first day of operations and will remain available 
for six months. Please refer to part 2-8: Transition Plan for full details.

Test Systems

DENIC is already investing in building the RRP to EPP proxy prior to ICANN's 
decision on the successor registry for .net. By making this investment DENIC 
will ensure that as soon as the .net bid has been awarded, DENIC will be able 
to provide test systems for both the EPP interface as well as the RRP to EPP 
proxy in order to enable registrars to plan and test the transition to the new 
registry provider well in advance of the transition date. 

Please refer to the Transition Plan (part 2-8: Transition Plan) for details 
concerning the Transition Testbed which will be created for registrars.

DENIC anticipate a smooth transition with minimal effort on the part of the 
registrars. The test systems will also be maintained during operations, so 
registrars can always test new software implementations at an early stage.

Support for Registrars

In order to make the transition from RRP to EPP as straightforward as possible, 
DENIC's technical team will provide additional documentation describing the 
differences between the protocols during the transition. DENIC will also 
interact with the registrar community, in order to discover whether any 
additional software or documentation would make the transition more 
straightforward. 

Additionally, DENIC will provide for sufficient helpdesk capacities during the 
time of testing and transition, in order to be able to handle peak demands from 
registrars at all times. 

Please refer to the Transition Plan for details of when Support facilities will 
be available during the transition.

(ii) Transition from RRP to EPP and "Thin" to "Thick" 

A three-step procedure will be followed to accomplish the migration from a thin 
to a thick registry.

* At the moment of the turn over, contact provisioning will be possible via EPP 
and domains can optionally reference contacts. This step is planned to last six 
months.
* In a second phase, contact references are mandatory for every create, update 
or renew domain commands. This step is planned to last six additional months.
* In a third phase, that is, one year after DENIC's taking over .net registry 
services, do-mains without contact references will be considered invalid. 
Sponsoring registrars will be contacted and required to update these domains in 
a timely manner.

During the thin-to-thick migration process, domain names without contact 
references will be displayed in whois with an additional line including the 
naming of the authoritative whois service as defined by the sponsoring 
registrar.

The entire .net registry will be migrated to a full thick model by the end of 
the first year. Until then, DENIC's whois will continue to return thin data for 
unmigrated domains. Thin and thick data will coexist for this period of time.

After one year, DENIC will have all thick model data from the registrars, and 
whois users will be able to gather all thick model information from DENIC whois 
without the need to reference registrar whois.

It will be impossible to provision thick information via the RRP interface, 
thus the RRP to EPP migration is closely coupled with the thin to thick 
migration. DENIC will run an RRP-to-EPP proxy for all registrars for their time 
using the thin model, but no later than by the end of the third phase mentioned 
above, this proxy will not be operative anymore. For further information 
regarding the transition refer to part 2-8: Transition Plan.
   

The applicant's response to Part 2, Section 3 will remain confidential to ICANN and the independent evaluators. ICANN will use reasonable efforts to avoid publication or release of this information, but in no circumstance will ICANN's liability for any release of this information exceed the amount of the application fee.

3. Registry Operations

Criteria: The successor .NET registry operator must provide name registration within the time specified in the Appendix D to the existing .NET registry operator agreement. This is an absolute criterion. The ability to provide additional registry services and/or the ability to provide name registration faster than the specifications on Appendix D are relative criteria. An assessment of this ability will include the evaluators’ assessment of the factors described below.

(a) Provide a full description of all registry services you propose to provide and demonstrate your technical and legal ability to provide them, including your prior experience offering these or similar services. If you propose to offer any registry services that you believe are not now offered, include for such services your assessment of the benefits and burdens associated with such new services, as those benefits and burdens apply to registrants and registrars. In addition, describe the technical components and aspects of the planned registry services, and how you will support the same.

[RESPONSE IS CONFIDENTIAL]

(b) To enable the evaluators to assess your capability (both technical and financial) to deliver the registry services you propose to provide, please include the following information:

(i) A detailed description of your current business operations, including (A) core capabilities in registry/database and Internet related operations and (B) the services and products you currently offer, with data on how long you have offered them on the current scale. To the extent this description does not fully capture your ability to provide the registry services you propose to offer, add the appropriate supplementary information to fully describe that ability.

[RESPONSE IS CONFIDENTIAL]
(ii) Whether you currently provide any domain name registration services and describe such services.

[RESPONSE IS CONFIDENTIAL]
(iii) A description (including location) of facilities (including available network capacity) available to house staff and equipment necessary to operate the registry.

[RESPONSE IS CONFIDENTIAL]
   

4. Revenue and Pricing Model; Financial Strength and Stability

Criteria: Each applicant must demonstrate sufficient financial strength and stability, based upon its existing financial condition and its proposed business model for operation of the registry, to provide reasonable certainty that it will be able to fulfill its obligations over the life of the .NET registry agreement. This is an absolute criterion. In building their financial and pricing models, applicants should assume that the following fees will be payable: (i) an annual fee to ICANN of US$132,000 for the first year, increasing by no more than 15% each year thereafter and (ii) registry-level transaction fees totaling non-refundable amounts of US$0.75 for each annual increment of an initial domain name registration and US$0.75 for each annual increment of a domain name re-registration registered by a registrar (in addition to preexisting fee obligations payable annually by registrars to ICANN), to be allocated equally to the following three purposes: (a) a special restricted fund for developing country Internet communities to enable further participation in the ICANN mission by developing country stakeholders, (b) a special restricted fund to enhance and facilitate the security and stability of the global Internet’s system of unique identifiers, and (c) general operating funds to support ICANN's mission to ensure the stable and secure operation of the global Internet's systems of unique identifiers. The per-name price charged to registrars is a relative criterion, with lower committed prices being preferable to higher prices.

All applicants should note that registration fees paid to VeriSign prior to the actual transfer of operational responsibility will not be transferred to a subsequent registry operator.

(a) Provide the following financial statements for the applicant (or, if the applicant is a wholly owed subsidiary of another entity, for the applicant and such other entity on a consolidated basis): three years of financial statements (including balance sheet, income statement, cash flow statement and statement of stockholders’ equity), audited by an independent accounting firm and prepared in accordance with either U.S. generally accepted accounting principles or the International Accounting Standards. Applicants who do not have such audited financial statements may substitute such other information and statements about their operations that are reasonably equivalent to such financial statements. The independent evaluators will be responsible for determining whether such information and statements are sufficiently equivalent to allow the evaluators to conduct an evaluation of the applicant’s financial strength comparable to the evaluation conducted on those applicants who do submit the requested financial statements.

[RESPONSE IS CONFIDENTIAL]

(b) Provide the applicant's business plan for the operation of the registry, including:

(i) a detailed description of all revenue or commercial benefit to be derived from or related to your operation of the registry, including but not limited to details of the expected or anticipated revenue and the assumptions about prices charged for services to be offered, and anticipated demand for those services at high, medium and low levels;

[RESPONSE IS CONFIDENTIAL]
(ii) staffing model, showing the number and types of employees needed at the various levels of demand and the expenses associated with that staff. Include information on (A) applicant’s hiring policy and training programs (for both new and continuing staff), (B) staffing level to handle both expected and unexpected volume levels, and react to unplanned outages, infrastructure vulnerabilities and security breaches and (C) customer service staff to support on a 24 hour basis in multiple languages;

[RESPONSE IS CONFIDENTIAL]
(iii) expense model, incorporating both the staffing expenses described above and all other anticipated expenses of the operating the registry;

[RESPONSE IS CONFIDENTIAL]
(iv) property, plant and equipment budget;

[RESPONSE IS CONFIDENTIAL]
(v) a projection for the sources and uses of cash, showing the applicant's current cash available and the sources of cash available to applicant in the future to fund operating and capital expenditures.
[RESPONSE IS CONFIDENTIAL]
   

5. Technical Competence

Criteria: The .NET registry operator must meet the specifications of the current .NET registry contained in the following sections of the current .NET registry agreement listed below (if a “thick registry” model is being proposed by applicant, the specifications for the current .org agreement, rather than the current .NET agreement, shall apply in the case of Appendices O, P and Q). This is an absolute criterion. The degree to which applicant’s proposal commits applicant to exceed these specifications shall be relative criteria:

Appendix C.4, Name server Functional Specifications

[[Note to evaluators regarding all appendices:
Enclosed are DENIC's suggestions for appendices C 4, C 5, D, E, O, P, O and R.
DENIC is also open to discuss modifications of the other appendices of the 
existing .net agreement (e.g. C 2, C 3) in negotiations with ICANN.]]


[[Note to evaluators:
Please note that this list differs from the list of documents currently 
updating 1034 and 1035 since some of those do no longer have practical 
relevance (DNSSEC 2065, 2535) or do not apply to either name servers in general 
(1101) or to the particular registry system architecture (NOTIFY, IXFR, DynUpd).
DENIC is aware of the fact that certain aspects of the current set of DNS 
specifications are subject to discussion and review within the responsible IETF 
working group(s). DENIC is prepared to actively contribute to the protocol 
development process. Should DENIC facilitate, endorse or support DNS software 
development or produce such software on its own, DENIC will ensure to the 
extent possible that such software be compliant to then state of the art IETF 
standards and be subject to interoperability tests.]]


.NET REGISTRY AGREEMENT: APPENDIX C 4

NAME SERVER FUNCTIONAL SPECIFICATIONS

Name servers operated by DENIC for the NET TLD shall conform to STD 13 
(currently RFC1034, 1035) as amended and/or clarified by RFC2181, RFC2308, 
RFC2671, RFC3596, and RFC3597 where applicable.
In addition, DNSSEC support will be based on the specification that passed the 
IESG on September 27, 2004. RFC numbers have not yet been assigned and the 
Internet Draft names are not to be cited.

Appendix C.5, Patch, Update, and Upgrade Policy

.NET REGISTRY AGREEMENT: APPENDIX C 5

PATCH, UPDATE, AND UPGRADE POLICY

Any release provided by DENIC will have a dotted schema: that of a major 
number, a minor number and a patch level (X.Y.Z)

* The first integer (X) is the major version number. Change in the major number 
indicates a significant change in the software features

* The second integer (Y) is the minor version number. Change in the minor 
number while the major number stays the same indicates a change that introduces 
noteworthy new features.

* The third integer (Z) is the patchlevel, which can consist either of a single 
patch or several patches. A change of the patchlevel - while the minor and 
major numbers remain unchanged - indicates a change that does not introduce 
anything new but fixes bugs. Patches do not require changes to the client 
applications developed by the registrars.

DENIC, in its sole discretion, will deploy patches during scheduled and 
announced Shared Registration System maintenance periods.

For Updates and Upgrades, DENIC will give each registrar notice prior to 
deploying the Updates and Upgrades into the production environment. The notice 
shall be at least sixty (60) days, except that if ICANN's registry agreements 
with all other unsponsored TLDs provide that the operators of those TLDs will 
provide at least ninety (90) days' notice, then DENIC will provide at least 
ninety (90) days' notice. Such notice (whether 60 or 90 days) will include an 
initial thirty (30) days' notice before deploying the Update that requires 
changes to client applications or the Upgrade into the Operational Test and 
Evaluation ("OT&E") environment to which all registrars have access. DENIC will 
maintain the Update or Upgrade in the OT&E environment for at least thirty (30) 
days, to allow each registrar the opportunity to modify its client applications 
and complete testing, before implementing the new code in the production 
environment.

Appendix D, Performance Specifications

.NET REGISTRY AGREEMENT: APPENDIX D

PERFORMANCE SPECIFICATIONS

DENIC complies to the following SLA metrics:

Total Registry Outage per Month:        6 hours
Unplanned Registry Outage per Month:    3 hours
Unplanned Registry Outage per Year:     9 hours
Planned Registry Outage per Week:       2 hours
Unplanned Registry Outage (per event):  < 90 minutes
Major Upgrade Outage:                   6 hours (twice per year)
Check Domain Average:                   < 100 ms (excluding round trip time)
Add Domain Average:                     < 300 ms (excluding round trip time)
Average Update Latency of 
Dedicated Public whois:                 Less than 1 second


Notes:
* Two "Major Upgrades" per year are allowed, each of which may last 6 hours.

* Registry Operator and ICANN will discuss in good faith addition of 
appropriate metrics for name server packet loss and round trip times.

* Planned Registry Outages: 2 hours per week and no more than 6 hours per month

* Unplanned Registry Outage per year implies a 99.9% availability of the 
registry service
 
* Update latency is valid for more than 98% of the updates; max. latency of 1 
minute for 99.999% of the updates

In addition, Registry Operator offers the additional Performance & Support 
Specifications illustrated in Figure 1 as SLAs.


Appendix E, Service-Level Agreement

.NET REGISTRY AGREEMENT: APPENDIX E

SERVICE LEVEL AGREEMENT (SLA) 

Registry Operator strives to provide a world-class level of service to its 
customers. This Service Level Agreement provides metrics and remedies to 
measure the performance of the .net registry and to provide accredited and 
licensed registrars with credits for certain substandard performance by 
the .net registry under the parties' registrar License and Agreement.


(A) Definitions

1) Calendar Day - a calendar day is the timeframe from midnight to the 
following midnight, beginning and ending at 00:00:00 Universal Time Coordinated 
(UTC). Each day counts as a calendar day, including weekends and public 
holidays.

2) Calendar Week - a calendar week is the timeframe of seven days from the
first calendar day of a week to the last calendar day of that same week. The 
first calendar day of a week is Monday, the last calendar day of a week is 
Sunday.

3) Calendar Month - a calendar month is the timeframe from the 	first calendar 
day of a month to the last calendar day of that same month.

4) Planned Outage - a planned outage shall mean a pre-announced occurrence when 
a part or all of the Registry Service (RS) will be taken out of service for 
maintenance or care.

5) Major Upgrade Outage - a major upgrade outage shall mean an additional 
planned outage of extended duration for major systems or software upgrades.

6) Unavailability of Registry Service (RS) - unavailability of the registry 
service shall mean that the registry service is not operational. The registry 
service is not operational if either:

a) a registrar cannot successfully establish a session with the RS gateway; 
establishing a session with the RS gateway shall be defined as:
1) Successfully complete a TCP session start
2) Successfully complete the SSL authentication handshake
3) Successfully complete the registry registrar protocol ("RRP") command and 
respectively EPP.

b) the registry does not complete check and add domain commands according to 
(B) 4). 

Notwithstanding the foregoing a planned outage, a major upgrade outage, or an 
outage due to a force majeure does not count as RS unavailability. Neither does 
it count as RS unavailability, if the inability to complete said actions is 
caused by problems outside the responsibility of .net registry.

7) Availability of Registry Service - availability of registry service shall 
mean that .net registry is not in a state of unavailability as defined in (A) 
6). 

8) Registry Service (RS) availability per month - RS availability per month 
shall mean the percentage of time of RS availability during a calendar month 
based on the total time within that calendar month.

9) Unplanned Outage Time - unplanned outage time shall mean the following:

a) the amount of time recorded between a trouble ticket first being opened by 
the .net registry in response to a registrar's claim of registry service 
unavailability for that registrar through the time that the registrar and .net 
registry agree the RS unavailability has been resolved with a final fix or a 
temporary workaround, and the trouble ticket has been closed. This will be 
considered RS unavailability only for those individual registrars impacted by 
the outage. To determine the total RS unavailability time, the unavailability 
times for the different registrars will only be accumulated, if the 
unavailability times do not overlap.

b) the amount of time recorded between a trouble ticket first being opened by 
the .net registry in the event of RS unavailability that affects all registrars 
through the time when the registry resolves the problem with a final fix or a 
temporary workaround, and the trouble ticked has been closed.

c) the amount of time that a planned outage exceeds the time limits established 
in (B) 2).

d) the amount of time that a planned outage occurs outside the window of time 
established in (B) 1).

10) Monthly Unplanned Outage Time - monthly unplanned outage time shall be the 
sum of minutes of all unplanned outage time during a calendar month. Each 
minute of unplanned outage time subtracts from the available monthly planned 
outage time as established in (B) 2) and up to the limit given therein. 

11) Registry Service (RS) Gateway - the RS gateway is the device within 
Registry Operator's network which terminates the TCP sessions used for RRP 
commands.

12) whois Service - whois service shall mean the .net registry whois service 
running on TCP port 43 of whois.denic.net.

13) Service Reply Time - the service reply time is the time between the last 
byte of a service request being received from the registrar at the machine 
processing the requested service, and the last byte of the reply to that 
request being sent out from that machine back to the registrar. Consequently, 
service reply time does specifically not include time incurred through network 
round trip times and delays outside the responsibility of .net registry.


(B) SERVICE LEVELS

1) Planned outages will usually be scheduled weekly during the following period 
of time: Wednesday between 06:00:00 and 13:00:00 UTC (the "planned outage 
period"). This planned outage period may be changed from time to time by 
the .net registry, in its sole discretion, upon prior notice to each registrar.

2) Planned outages will not exceed 2 hours per calendar week nor more than a 
total of 6 hours per calendar month.

3) Notwithstanding the limits established in (B) 2), each year Registry 
Operator may incur 2 additional planned outages of up to 6 hours each during 
the planned outage period for major upgrade outages.

4) A RRP check domain command must be executed within a service reply time of 
less than 100 milliseconds in 95% of all cases and/or a RRP add domain command 
must be executed within a service reply time of less than 300 milliseconds in 
95% of all cases, per calendar month.

5) The .net registry will provide a 99.9% RS availability during each calendar 
month.


(C) RESPONSIBILITIES OF THE PARTIES

1) Registrar must report each occurrence of alleged RS unavailability to 
the .net registry customer service helpdesk by opening a trouble ticket in the 
manner required by the .net registry (i.e. by e-mail, fax, telephone) in order 
for an occurrence to be treated as RS unavailability for purposes of the SLA. 

2) In the event that all registrars are affected by RS unavailability, the .net 
registry is responsible for opening a trouble ticket and immediately notifying 
all registrars of the trouble ticket number.

3) Both registrar and the .net registry agree to use reasonable commercial good 
faith efforts to determine the cause of any alleged RS unavailability. If it is 
mutually determined to be a .net registry problem, the issue will become part 
of the unplanned outage time.

4) .net registry will perform monitoring from at least two external locations 
as a means to verify that all RRP commands can be successfully completed. 

5) Registrar must inform the .net registry any time its estimated volume of 
transactions (excluding check domain commands) per calendar month will exceed 
registrar's previous calendar month's volume by more than 25%. In the event 
that registrar fails to inform .net registry of a forecasted increase of volume 
of transactions of 25% or more and the registrar's volume increases 25% or more 
(over the previous month); and should the total volume of transactions added up 
(by the .net registry) for all registrars for that calendar month exceed 
the .net registry's actual volume of the previous calendar month's transactions 
by more than 20%; and should the ratio of successful to unsuccessful registry 
attempts (based on registry attempts per registrar and month) exceed 99%, then 
registrar will not be eligible for any SLA credits (as defined in section D) in 
that calendar month. Registry Operator will charge an additional service fee 
for increased system load, if the 99% ratio mentioned before will be exceeded. 
The registrar provides such forecast at least 30 days prior to the first day of 
the next month. In addition, the .net registry agrees to provide monthly 
transaction summary reports.

6) The .net registry will notify the registrars of planned outages outside the 
planned outage period at least 10 calendar days in advance of such planned 
outage unless the outages occurred due to security and/ or stability issues. In 
addition, the .net registry will use reasonable commercial good faith efforts 
to maintain an accurate 30-calendar-day advance schedule of possible upcoming 
planned outages.

7) The .net registry will update the whois service nearly real-time. The .net 
registry will notify registrars in advance when changes to the whois service 
update schedule occur.

8) The .net registry will allow external monitoring of the RS via an acceptable 
means to both parties.

9) The .net registry will initiate the registry zone file transfer process 
eight times a day. These initiations will be equally distributed over the day. 
The .net registry will notify the registrars in advance when changes to the 
schedule occur. The .net registry will notify the registrars regarding any 
scheduled maintenance and unavailability of the .net name servers.

10) The .net registry will use commercially reasonable efforts to restore the 
critical systems of the RS within 12 hours in the event of a force majeure and 
restore full system functionality within 24 hours.

11) The .net registry will publish weekly system performance and availability 
reports. These reports will include system reply time for the RRP check domains 
command and RRP add domain commands for all registrars as well as a summary of 
RS availability for the previous week. This will also apply for EPP.


(D) CREDITS:

1) If RS availability is less than the limit established in (B) 5), the .net 
registry will provide a credit to the affected registrar(s) who have complied 
with sections (C) 1) and (C) 5) above as follows:

(i) In the case of RS unavailability as described in (A) 6) b), a credit will 
be given for the sum of the percentage points of total RRP add and check 
commands that fall below the 95% performance threshold established in (A) 6) 
b), if the 99% ratio of successful to unsuccessful requests is not exceeded. 
For each affected registrar, this credit will be calculated by multiplying the 
percentage points below 95% by the registrar's monthly add domain volume times 
the average initial registration price charged to that registrar during the 
month. The maximum credit to each registrar shall not exceed 5% of the 
registrar's total monthly add domain volume times that average registration 
price. 

(ii) In the case of RS unavailability as described in (A) 6) a), and following 
the calendar month when the unplanned outage began, the .net registry will 
provide a credit to the registrar by multiplying the registrar's monthly add 
domain volume times the average initial registration price charged to that 
registrar during the month and multiplying that product by the percentage of 
time that the monthly unplanned outage time exceeded 0.6% of the minutes in the 
calendar month. The maximum credit to each registrar under this subparagraph 
shall not exceed 10% of the registrar's total monthly add domain volume times 
that average registration price. 

Under no circumstances shall credits be applied when a registrar experiences RS 
unavailability caused by problems outside the responsibility of the .net 
registry.


(E) MISCELLANEOUS:

1) As an addendum to the Registry-Registrar Agreement (RRA), no provision in 
this addendum is intended to replace any term or condition in the RRA. 

2) Dispute Resolution - Any disputes arising under or in connection with this 
Agreement, including requests for specific performance, shall be resolved 
through binding arbitration conducted as provided in this Section pursuant to 
the rules of the International Court of Arbitration of the International 
Chamber of Commerce ("ICC"). The arbitration shall be conducted in the English 
language and shall occur in Paris/ France. There shall be three arbitrators: 
each party shall choose one arbitrator and, if the two arbitrators are not able 
to agree on a third arbitrator, the third shall be chosen by the ICC. The 
parties shall bear the costs of the arbitration in equal shares, subject to the 
right of the arbitrators to reallocate the costs in their award as provided in 
the ICC rules. The parties shall bear their own attorneys' fees in connection 
with the arbitration, and the arbitrators may not reallocate the attorneys' 
fees in conjunction with their award. The arbitrators shall render their 
decision within ninety days of the initiation of arbitration. For any 
litigation brought to enforce an arbitration award the sole place of venue 
shall be Paris/ France; however, the parties shall also have the right to 
enforce a judgment of such a court in any court of competent jurisdiction. For 
the purpose of aiding the arbitration and/or preserving the rights of a party 
during the pendency of an arbitration, each party shall have the right to seek 
temporary or preliminary injunctive relief from the arbitration panel or a 
court in which case Paris/ France is the sole place of venue. The initiation of 
such court proceedings shall not be a waiver of this arbitration agreement.

3) Any interruption of RS that occurs, as a direct result of the current .net 
Registry-Registrar Agreement (RRA) Sections 2.12, 5.4, or 6.3 or any other 
applicable contract term of the current .net, will not be considered RS 
Unavailability per this SLA. 

Appendix O*, Whois Specification – Public Whois

.NET REGISTRY AGREEMENT: APPENDIX O

WHOIS SPECIFICATION - PUBLIC WHOIS


Overview

The whois service is compliant with RFC3912. The primary whois services 
substantially consist of three components:
* Port 43 public whois services (thin and thick during migration, thick only 
afterwards)
* Public web-whois service
* Port 43 registrar whois services
The two public whois services are described in more detail below.

Registry Operator's whois service is the authoritative whois service for all 
second-level Internet domain names registered in the .net top-level domain. 
This service is available to anyone.

Registry Operator will initially operate the .net registry whois in a manner 
consistent with a "thin" registry.

The whois output for thick data sets is described below. For domains with only 
a thin set of data, the contact references in the domain object will not be 
shown. In order to access contact data, clients will have to follow the 
referral included in the domain output to reach the authoritative whois server 
supplied by the sponsoring registrar.

The entire .net registry will have been migrated to a full thick model at the 
end of the first year of operation. Thin and thick data will coexist until then.

Upon conclusion of the transition process, the .net whois service will provide 
a central, openly accessible system for information regarding a particular 
second level domain name registration in the .net TLD. The whois service will 
contain data transferred by registrars during the registration process for 
every registered .net domain. If a registrant changes any registration 
information relating to the registrant's domain name, the registrar will 
communicate these changes to the registry at the time they are received. This 
will provide interested parties with access to up-to-date information for 
every .net domain, under a widely deployed protocol with a consistent format.


1. Port 43 Whois Service (Thin Registry)

The format of responses for thin registry output will be similar to the 
guidelines listed below for thick-registry whois.

In the case the contact reference is missing from the domain output, the 
referral information will indicate the name of the whois server of the 
sponsoring registrar responsible for providing the contact whois information.


2. Port 43 Whois Service (Thick Registry) 

(a) Thick Registry Model and Data Output Fields

Registry Operator will deploy a thick registry model. 
There are certain mandatory information fields which will be displayed in 
public whois in order to be able to unambiguously identify the registrant, e.g. 
for legal reasons. Beyond these mandatory fields Registry Operator will enable 
registrants the option to limit the amount of information given in the public 
whois in order to protect their privacy. 

Each data object shall be represented as a set of key/value pairs, with lines 
beginning with keys, followed by the colon as a delimiter, followed by the 
value. The object descriptions found below state per field:

* First column: name of field
* Second column: fields marked "mandatory" will be present in the 
output, "optional" fields may or may not be present (NB: data may still exist, 
but publication may have been suppressed); an asterisk indicates a field 
is "optional" during transition and "mandatory" afterwards
* Third column: "single" indicates field may appear only once per object 
(exactly once in conjunction with "mandatory", at most once in conjunction 
with "optional"), "multiple" otherwise
* Fourth column marks primary and/or lookup key

DOMAIN OBJECT

Domain:        [mandatory]  [single]     [primary/lookup key]
Domain-ace:    [mandatory]  [single]     [lookup key]
Status:        [mandatory]  [multiple]   [ ]
Registrar:     [mandatory]  [single]     [ ]
Referral:      [mandatory]  [single]     [ ]
Registrant:    [optional*]  [single]     [ ]
Admin-c:       [optional*]  [single]     [ ]
Billing-c:     [optional*]  [multiple]   [ ]
Tech-c:        [optional*]  [multiple]   [ ]
Nserver:       [optional*]  [multiple]   [ ]
Created:       [mandatory]  [single]     [ ]
Changed:       [optional]   [single]     [ ]
Expiration:    [mandatory]  [single]     [ ]

CONTACT OBJECT

Handle:        [mandatory]  [single]     [primary/lookup key]
Name:          [mandatory]  [single]     [ ]
Organisation:  [optional]   [single]     [ ]
Address:       [mandatory]  [multiple]   [ ]
City:          [optional]   [single]     [ ]
State:         [optional]   [single]     [ ]
Zipcode:       [optional]   [single]     [ ]
Country:       [optional]   [single]     [ ]
Phone:         [optional]   [multiple]   [ ]
Fax:           [optional]   [multiple]   [ ]
E-mail:        [optional]   [multiple]   [ ]
Sip:           [optional]   [multiple]   [ ]
Created:       [mandatory]  [single]     [ ]
Changed:       [optional]   [single]     [ ]

NAME SERVER OBJECT

Hostname:      [mandatory]  [single]     [primary/lookup key]
Ip-address:    [optional]   [multiple]   [lookup key]
Registrar:     [mandatory]  [single]     [ ]
Created:       [mandatory]  [single]     [ ]
Changed:       [optional]   [single]     [ ]

REGISTRAR OBJECT

Registrar:     [mandatory]  [single]     [primary/lookup key]
Url:           [mandatory]  [single]     [ ]
Whois:         [mandatory]  [single]     [ ]
Admin-c:       [mandatory]  [multiple]   [ ]
Billing-c:     [mandatory]  [multiple]   [ ]
Tech-c:        [mandatory]  [multiple]   [ ]



[[Note to reviewers. 
Stated below are the reasons for the suggested limitation of the output fields.
The mandatory information fields will ensure that the registrant can be 
identified and contacted. Yet by providing only information on how to contact 
the registrant via postal mail will establish sufficiently high hurdles to 
protect the registrant from unsolicited phone calls or e-mails. Abuse of 
information by the public or by registrar is effectively prevented.
Every registrant can, at the time of registration as well as any time 
afterwards, agree for additional information to be accessible via whois. 
Examples for these additional fields are registrant phone, registrant e-mail, 
admin contact phone, admin contact e-mail, etc.
The individual privacy flags used by DENIC are a key benefit for the whole .net 
community. From the experience with .de, where 80% of the registrants do not 
disclose this data DENIC expects the vast majority of .net registrants to make 
use of this feature and limit their domain information to the basic information 
fields.]]


All objects and key types shall be specified in a publicly available 
description on the Registry Operator's website. The key names and objects 
should change as infrequently as possible, and only upon the agreement of ICANN 
and the Registry Operator.

(b) Input Syntax

IDNs can be queried natively via the whois service by using a command line flag 
(passed through to the whois server) that defines the character set with UTF-8 
as default. UTF-16, ISO-8859-1, and US-ASCII are also supported. The web whois 
identifies the appropriate character set itself and will return the appropriate 
data.

The public whois can be customized by using the flags shown below. 

Example: Query "HELP"
whois -h whois.denic.de HELP
% SYNTAX: whois [-h hostname] [-Frk] [-T types] [-C charset] key
%
% where:
%
% -h hostname	search alternate server
% -F   	fast raw output
% -r	turn off recursive lookups
% -k	establish persistent connection
% -T new	normalized output for domain descr in combination with -T[dn]
% -T ace	ACE input for domain lookup in combination with -T[dn,st]
% 
% -T type[[,type] ... ]	only look for objects of type type
%
% Available types: status (st), domain (dn) (co)
%
% -C charset	specify character set for the input/output
%
% Available charsets: US-ASCII, ISO-8859-1, UTF-8, UTF-16
%
% NOTE: There are two especial queries
%
% whois -h whois.denic.de HELP		displays text above
% whois -h whois.denic.de alive@whois	returns alive if whois-server runs 
properly


[[Note to reviewers: Above figure shows current flags for .de public whois. 
This figure is not to be included in the final Appendix O of the .net agreement 
and is presented here for demonstration of DENIC's technical abilities solely. 
DENIC proposes to offer similar flags for .net.
The final Appendix O of the .net agreement will contain the relevant flags. 
Additionally the current flags are and will always be published on DENIC's 
website.]]


3. Web Whois Service 

The Registry Operator will make available a whois interface on its website 
which can also be linked to by each ICANN-Accredited Registrar that is a party 
to a Registry-Registrar Agreement with the Registry Operator. The information 
available in the whois database will be returned as a results page on the 
website. 

Registry Operator has designed its web based whois as a two step process.

(a) Step 1 of Web Whois

The first step of Registry Operator's web whois gives information about 
availability of the requested domain only, serving the highest user demand.

(b) Step 2 of Web Whois

In the second step the user will receive domain information as described above.

When thick registry whois information is unavailable during the transition 
phase, the registry shall provide thin registry whois information, as specified 
in the whois output fields section above.

The purpose of this web interface is to provide a user-friendly interface for 
whois queries. It does neither provide any additional search capabilities nor 
reveal information beyond what is described for the port 43 whois in this 
appendix.


4. Minimum Data Update Frequency

The update frequency of whois data is specified in Appendix D.


5. Protocols through which Access is Provided 

Access to the whois data is provided through the whois protocol, TCP port 43, 
by whois.DENIC.NET supporting exact match queries for
* domain name
* registrar name
* name server hostname
* name server IP address (both IPv4 and IPv6)

All queries will be handled case insensitively with IDN rules applied where 
appropriate. IPv4 addresses must be supplied as "dotted quad", IPv6 addresses 
must be supplied in the format specified by RFC3513.

The whois data will also be accessible through the registry interface as 
described above. It is available via and through the website 
http://www.DENIC.NET.


6. Security

General security measures such as password policy, firewalls and network 
traffic monitoring systems will be provided for the whois servers and services.

The Registry whois system has been designed for robustness, availability, and 
performance. Registry Operator audits access to its whois service and reserves 
the right to respond to signs of abusive usage, like excessive numbers of 
queries from a single source to prevent resource exhaustion or breaches of 
privacy.

The security considerations of RFC3912 apply.


7. Extensible-Field Capability

Registry Operator provides additional fields for all stored data, e.g. a 
privacy flag with which the registrant can define the extent of non-mandatory 
information to be published via information services (e.g. whois).

Furthermore Registry Operator reserves the right to introduce new fields to 
support new services and/or respond to demands from the registrar or registrant 
community or the Internet community at large.


8. Technological Progress, Standards and Development

This appendix is subject to change by agreement of Registry Operator and ICANN 
during the design process as well as during the IETF standards process. 
Further, Registry Operator reserves the right to develop these services 
internally or outsource management of the facilities to an external contractor 
under terms that are consistent with the standards of the proposed service.

Appendix P*, Whois Data Specification – Independent Whois Provider

[[Note to evaluators:
DENIC can provide bulk access to whois data to an independent whois provider, 
if one of two conditions is met:
* DENIC has the explicit consent of the domain holder to allow bulk access. 
Only the domains with the individual and explicit prior consent resulting from 
an educated decision of the domain holder will be included in the bulk access.
* The transfer, handling and use of the whois data provided via bulk access to 
the third party has to comply with clearly specified rules and must be 
compliant to European and German privacy law. Uses other than the specifically 
agreed uses are to be prohibited.]]


.NET REGISTRY AGREEMENT: APPENDIX P

WHOIS SPECIFICATION -- INDEPENDENT WHOIS PROVIDER

DENIC does not specify a bulk access data exchange format because the result of 
our research suggests that any such transfer to an entity not directly related 
with the registry operations would be in conflict with national German or with 
EU legislation on data protection and privacy. Supporting material can be found 
(in German language) in section 9.2 and 9.3 of the 13. Data Protection Report 
of The State Government of Hessen (2000) and in section 8.7 of the 15. Report 
(2002).

Appendix Q*, Whois Data Specification – ICANN

[[Note to evaluators: 

Registry Operator suggests to provide ICANN with access to escrowed data 
instead of Bulk Access to whois data. If ICANN prefers to receive Bulk Access 
to whois data, Registry Operator will accommodate this requirement and will 
provide procedures, content and format of this Bulk Access to whois during the 
negotiations with ICANN.]] 


.NET REGISTRY AGREEMENT: APPENDIX Q 

WHOIS SPECIFICATION -- ICANN 

Registry Operator grants ICANN access to its escrowed data. 

The .net registry data will be transferred and stored at the escrow provider 
site according to the ICANN agreement. An overview of the schedule, content and 
format of the reports is displayed in the following:

Schedule
* Full Deposit on Sunday
* Incremental Deposit Monday through Saturday

Content Weekly Report
* Domain Object Report
* Host Object Report
* Contact Object Report
* Registrar Object Report
* Pending Transfer Report

Content Daily Report
* Transaction Report

Format:
* All Reports are generated in XML Format

Please refer to Appendix R for detailed description of the data escrow 
specifications regarding:
* Company Name of Escrow Provider
* Statement of Work
* Schedule of Escrow Deposits
* Specification of Deposit Format 
* Detailed Content Description of Full & Incremental Deposit Reports
* Escrow Transfer Process
* Escrow Verification Process

Appendix R, Data Escrow Specification

.NET REGISTRY AGREEMENT: APPENDIX R

DATA ESCROW SPECIFICATION


1. Company Name, Statement of Work, Schedule of Deposits

(a) Company Name of Escrow Provider

HanseEscrow Management GmbH
Stresemannallee 118
D-22529 Hamburg
contact@hanse-escrow.de
http://www.hanse-escrow.de

(b) Statement of Work
In addition to the backup procedure with daily full backups as well as 
transaction log backups of the registry database, Registry Operator is 
implementing a new data escrow procedure to deposit the .de registry data with 
an established European escrow provider. By the time Registry Operator takes 
over the .net registry, the new procedure will be fully in operation. For 
the .net registry data, the same escrow provider will be used. In addition to 
this European escrow provider, Registry Operator is currently evaluating 
several US escrow providers to deposit .net escrowed data in the US. The 
registry data is transferred to the designated escrow provider as weekly full 
deposits; transaction data as daily incremental deposits. A verification 
process for the transferred data will be developed and implemented by Registry 
Operator. This process will be used on both sides to ensure the completeness, 
correctness, integrity, syntax and coherence of the transferred data at the 
escrow provider. The whole escrow process will be mutually examined and 
improved to meet the requirements of the registry agreements between Registry 
Operator and ICANN.

(c) Schedule for Escrow Deposits

Full Deposit
The full deposit consists of five different reports, described in 2. reflecting 
the complete set of registry data. A full deposit is a snapshot of the registry 
data at 00:00:00 UTC every Sunday. Transactions which have not been committed 
at this point of time will not be exported. A full deposit file will be 
delivered until 06:00:00 UTC on Sunday.

Incremental Deposit
The incremental deposit consists of a report including the complete set of 
transactions that were processed by the registry system since the generation of 
the last full or incremental deposit file. The first incremental deposit after 
a full deposit covers the transactions not yet committed during the full 
deposit snapshot taken at Sunday 00:00:00 UTC and all transactions until Monday 
00:00:00 UTC. A sequence of six incremental deposits follow until Saturday 
00:00:00 UTC. Incremental deposits will be generated, verified and transferred 
until 04:00:00 UTC of the related day. 


2. Deposit Format Specification

Before describing the detailed reports, the following has to be considered: 

* Only if the related database field contains data, the respective XML element 
for a given object will be exported in combination with the opening and end 
tag. Thus, there will not be any empty elements in the reports.
* All object reports contain an XML attribute id which is used to build the 
relation between the objects in the different reports.
* XML files will be UTF-8 encoded to provide fully internationalized support.

(a) Content of Reports

Content of Full Deposit
* Domain Object Report - includes all domain objects in the registry database.
* Host Object Report - includes all host objects in the registry database.
* Contact Object Report - includes all contact objects in the registry database.
* Registrar Object Report - contains all registrar objects in the registry 
database.
* Pending Transfer Report - contains all running transfers up to the moment of 
the full deposit.

Content of  Incremental Deposit
* Transaction Report - includes all committed transaction records processed by 
the registry system since the last full or incremental deposit generation. 

(b) Format of Reports

All reports will be generated in the XML format (XML 1.0 specification). Report-
 
specific XML schemas (XML Schema 1.0 specification) will be stored separately. 
The schemas will be used for syntax and coherence checks while verifying the 
related report files.

All report files will be generated with an XML header including attribute 
values for the registry TLD, the report type and the date and time the 
report was generated. The format of the header is shown in the following 
example.

<?xml version="1.0" encoding="UTF-8" ?>
<escrow version="1.0" tld="net" report="domain" date="2005-12-
21T03:00:00+01:00">
{Here the report contains the actual data being escrowed. It contains one 
element for each type (domain, host, contact, registrar, transfer or 
transaction) covered by the report. The specific format for each report is 
described below.}
</escrow>



(c) Detailed Description of Full Deposit Reports

Domain Object Report

The following report elements are included:

* Fqdn - Fully qualified domain name.
* Status - The domain status code.
* Period - The registration period in years.
* Owned-by - An identification (the "id" attribute of the registrar element) of 
the sponsoring registrar of the domain.
* Created-by - An identification (the "id" attribute of the registrar element) 
of the registrar that originally created the domain object.
* Created-on - The date/time the domain object was originally created.
* Renewed-on - The date/time the domain was last renewed.
* Updated-by - An identification (the "id" attribute of the registrar element) 
of the registrar that last updated the domain object.
* Updated-on - The date/time the domain object was last updated.
* Transferred-by - An identification (the "id" attribute of the registrar 
element) of the registrar that last transferred the domain object.
* Transferred-on - The date/time when the domain object was last transferred.
* Host-id - An identification (the "id" attribute of the host element) of a 
name servers for the domain.
* Contact-id - Contact-ids that reference the contact records for this domain. 
Contact-id has the attribute "type" to denote the type of contact. "Type" can 
be one of: Registrant, Administrative, Technical or Billing.
* Expires-on - The date/time of the domain expiration.
* AuthInfo - The authorization information associated with the domain.
* Pending-transfer - An identification (the id" attribute of the transfer 
element) for potentially existing transfers.

An example of the domain container appears below:

<domain id="1">
<fqdn>example.net</fqdn>
<status>ACTIVE</status>
<period>1</period>
<owned-by>42</owned-by>
<created-by>42</updated-by>
<created-on>2005-08-14T12:34:56+01:00</created-on>
<updated-by>42</updated-by>
<updated-on>2005-08-23T16:14:26+01:00</updated-on>
<host-id>99</host>
<host-id>100</host>
<expires-on>2006-08-15T13:34:56+01:00</expires-on>
<contact-id type="Registrant">1</contact-id>
<contact-id type="Administrative">2</contact-id>
<contact-id type="Technical">3</contact-id>
<contact-id type="Billing">4</contact-id>
<authInfo>fooBar</authInfo>
<pending-transfer>123</pending-transfer>
</domain>


Host Object Report

The following elements are included:

* Fqdn - Fully qualified host name
* Owned-by -  An identification (the "id" attribute of the registrar element) 
of the sponsoring registrar of the host.
* Created-by - An identification (the "id" attribute of the registrar element) 
of the registrar that originally created host object.
* Created-on - The date/time the host object was originally created.
* Updated-by - An identification (the "id" attribute of the registrar element) 
of the registrar that last updated the host object.
* Updated-on - The date/time the host object was last updated.
* IP-address - Any IP addresses associated with this host, with an attribute 
type indicating whether it is an IPv4 or an IPv6 address.

An example of the host container appears below:

<host id="99">
<fqdn>dns1.example.net</fqdn>
<owned-by>42</owned-by>
<created-by>42</created-by>
<created-on>2005-08-14T12:40:32+01:00</created-on>
<updated-by>42</updated-by>
<updated-on>2005-09-24T14:21:12+01:00</updated-on>
<ip-address type="v4">192.0.2.0</ip-address>
</host>

Contact Object Report

The contact element consists of the following elements:

* Name - The name of the contact.
* Organization - The organization for the contact.
* Within the "contact" container is a sub-container named "postal" with the 
following elements:
 * Address - The street address of the contact.
 * City - The name of the city of the contact.
 * State-province -  The name of the state/province of the contact.
 * Postal-code - The postal/zip code of the contact.
 * Country - The two-letter ISO 3166-1 code for the contact's country.
* Voice - The voice phone number of the contact in E164a format.
* Fax - The fax number of the contact in E164a format.
* E-mail - The e-mail address of the contact.
* Owned-by - An identification (the "id" attribute of the registrar element) of 
the sponsoring registrar of the contact.
* Created-by - An identification (the "id" attribute of the registrar element) 
of the registrar that originally created the contact object.
* Created-on - The date/time the contact object was originally created.
* Updated-by - An identification (the "id" attribute of the registrar element) 
of the registrar that last updated the contact object.
* Updated-on - The date/time the contact object was last updated.
* Transferred-by - An identification (the "id" attribute of the registrar 
element) of the registrar that last transferred the contact object.
* Transferred-on - The date/time when the contact object was last transferred.

An example of the contact container appears below:
<contact id="1">
<name>Juergen Mustermann</name>
<organization>aol</organization>
<postal>
   <address>Musterstrasse 1</address>
   <city>Frankfurt</city>
   <state-province>Hessen</state-province>
   <postal-code>60000</postal-code>
   <country>DE</country>
</postal>
<voice>+49.691234567</voice>
<fax>+49.691234568</fax>
<email>jmustermann@example.net</email>
<owned-by>42</owned-by>
<created-by>42</created-by>
<created-on>2005-08-14T12:42:22+01:00</created-on>
<updated-by>42</updated-by>
<updated-on>2005-09-15T16:42:00+01:00</updated-on>
</contact>

Registrar Object Report

The registrar element has the attribute "id", which is a unique identifier 
assigned by the IANA., and consists of the following elements:

* Password - The password for the registrar.
* Name - The name of the registrar.
* Status - The registrar status code.
* Contact-id - Any number of contact-id associated with this registrar. Contact-
id has the attribute "type" to denote the type of contact. "Type" can be one 
of: Administrative, Technical or Billing.

An example of the registrar container appears below:
<registrar id="42">
<password>denic12345</password>
<name>REGISTRAR-FOO</name>
<status>ACTIVE</status>
<contact-id type="Administrative">10</contact-id>
<contact-id type="Administrative">11</contact-id>
<contact-id type="Technical">12</contact-id>
<contact-id type="Technical">13</contact-id>
<contact-id type="Billing">14</contact-id>
</registrar>

Pending Transfer Report

The transfer element consists of the following elements:
* Period - The extension of lifetime (in years) of the domain.
* Requested-by - An identification (the "id" attribute of the registrar 
element) of the gaining registrar

An example of the pending transfer element appears below:

<transfer id="123">
<period >1</ period >
<requested-by>43</ requested-by >
</transfer>


(d) Detailed Description of Incremental Deposit Report

The report which forms an incremental deposit is the transaction report 
consisting of all transaction records since last full or incremental deposit.

Transaction Report
The transaction element contains the properties "operation" 
and "type". "Operation" can be one of: add, modify, transfer or delete. "Type" 
can be one of: domain, host, contact or registrar. The transaction element is a 
container consisting of elements from the corresponding "type" element. For 
example, a transaction element with a "type" of "registrar" will have the same 
set of elements as a registrar element. For a "delete" operation, only the 
object ID is included in the transaction element.

An example transaction container appears below:
<transaction operation="modify" type="registrar">
<password>new password</password>
<name>REGISTRAR-FOO</name>
<status>ACTIVE</status>
<contact-id type="Administrative">10</contact-id>
<contact-id type="Administrative">11</contact-id>
<contact-id type="Technical">12</contact-id>
<contact-id type="Technical">13</contact-id>
<contact-id type="Billing">14</contact-id>
</transaction>



3. Escrow Transfer Process
For a full and an incremental deposit, the related reports will be first 
generated based on the format description above. Every report will be verified 
against the specific schema to be formed correctly (syntax and coherence).

For a full deposit, all reports will be concatenated. These concatenated 
reports form the complete deposit file. The deposit files for .net  will be 
named as NET followed by a 4-digit sequence number for the related deposit 
transfer.

During the next step of file processing, the deposit file will be split to 
produce deposit files with a file size of less than 1 GB each. This step is 
optional. 

Before the files are transferred to the escrow provider, they must be signed 
and encrypted. Registry Operator has decided to use PGP software. Registry 
Operator uses escrow provider's public key for encryption and Registry 
Operator's private key to sign the files. The encrypted files will be 
transferred to the data server of the escrow provider.


4. Escrow Verification Process
After the reception of the escrow file(s) within the specified deposit window, 
the data will be moved to the non-public area of the escrow agent's server. The 
name of the escrow file and the size must be noted. 

The file(s) will be decrypted using the private PGP key of the escrow provider 
and Registry Operator's signature will be checked. If the whole deposit was 
split into several transfer files (not to exceed 1 GB), they will be 
concatenated in the correct sequence.

The deposit file will be verified against the related XML schema. The report 
files will be encrypted with ICANN's public PGP key and signed with escrow 
providers private key. 

If the verification process was successful, the encrypted reports are stored on 
read-only media (single layer DVD) for archiving.

All decrypted files will be deleted from escrow server directories, after the 
steps of the verification process have been completed.

Along with providing the information requested below, the applicant should include its own proposed versions of appendices C, D, E, O, P, Q, and R based on the current .NET registry agreement <http://www.icann.org/tlds/agreements/verisign/net-index.htm> which the applicant would be willing to have included in the subsequent .NET registry agreement. Applicants should ensure that their proposed versions of these appendices include any relevant subsequent updates to the RFCs referenced in these appendices. For example, RFC1035 as listed in Appendix C4 has been updated by RFC2845 and RFC3645, among other updates.

(a) Outline your technical capabilities. Provide a description of your technical capabilities, including information about key technical personnel (qualifications and experience), size of technical workforce and access to systems development tools. Outline any significant prior technical achievements.

(a) Technical Capabilities

Highlights

* DENIC was the first registry with an IPv6 entry in the root zone (August 
2004), runs the highly successful ENUM trial operation for the German call-
number space (.9.4.e164.arpa) and has already more than 250,000 IDN domains.

* DENIC has highly experienced System Development, Operations and System 
Administrations Departments available.

* DENIC is committed to further Internet research and development and therefore 
maintains a R&D group.


1. Prior Technical Achievements

Since 1994, DENIC has successfully served the global Internet by managing .de, 
by far the world's largest ccTLD. Only a few other institutions can equal 
DENIC's proven experience in operating registries of a significant scale (more 
than eight million domains) in a manner that provides affordable services with 
a high degree of service responsiveness and reliability.

In the ten years of its existence, DENIC did not have any break down of 
resolution services. This stability is guaranteed for the future by DENIC's 
high redundancy of systems and its strong ongoing efforts in the area of 
security. Apart from the high security, DENIC's eleven worldwide distributed 
name server locations provide short response times for all Internet users.

From its ten years experience, DENIC gained the ability to implement advanced 
technologies to enhance the allround value of the .de TLD. DENIC for example 
has been one of the first registries with an IPv6 entry in the root zone 
(August 2004). Until now IPv6 has been rolled out in the name server locations 
in Frankfurt and Vienna and it is planned to roll it out in further locations 
in the future.

On March 1, 2004 DENIC successfully started IDN with an additional 92 new 
possible letters, chosen to meet the needs of the .de registrants. Since then, 
more than 250,000 IDN domains have been registered with DENIC. All DENIC 
systems were prepared to be fully internationalized for this occasion. Thus, it 
is possible to introduce any code point if wanted without any further efforts.

Since September 2002, DENIC has been running the ENUM trial operation for the 
German call-number space (.9.4.e164.arpa). This involves the development of an 
operational model for ENUM in Germany including the setting up of the technical 
infrastructure, being point of contact for all registrars of the trial, 
providing informational support as well as the organization of ENUM-meetings 
twice a year to initiate information exchange among all parties involved in the 
development and implementation of ENUM.
All these skills, DENIC will leverage to the full in administering .net and 
will continue to forge ahead with their further development.

2. Current Technical Capabilities

(a) DENIC in General

The management of a TLD on the scale of .net is a significant challenge for any 
organization. However, DENIC has assembled a seasoned team that possesses the 
qualifications, character and capacity to run .net and that enables it to 
fulfill its potential as the global home of innovative Internet services.
DENIC's technical employees are experts in the development of software 
applications for registry protocols, and Internet domains. Its team combines 
many years of experience in designing, building and maintaining highly 
scalable, distributed and networked transaction-based systems.
DENIC has identified a team that will perform the transition and operate .net 
in such a way as to preserve the stability of the Internet and the DNS and 
deliver technically sound, high quality services. This team will include 
registrars of the Executive Board as well as all relevant resources from the 
System Development Department, the System Administrations Department, the 
Operations Department and the R&D Group as described in the following.
For a detailed description of DENIC's technical capabilities see also Part 2-5-
b: Technical Plan.
Both full time registrars of DENIC's Executive Board, Sabine Dolderer and 
Andreas Bäß, dispose of significant experience concerning the technical 
provision of TLDs. Therefore both of them will be directly involved in the 
technical provision of .net.
For more details on the qualification and experience of Sabine Dolderer and 
Andreas Bäß refer to part 1-3-i: Persons with Direct Responsibility for the 
Registry.


(b) System Development Department

Tasks

A registry of the size of DENIC cannot handle its operation with "off the rack" 
standard software alone. It therefore has a correspondingly large development 
department, which designs and updates all the necessary applications and 
services itself in teamwork. These range from a database for online registry 
to service programs such as whois right down to the web appearance.
In the further development and the new production of applications, there is 
close cooperation with the DENIC registrars and the technical advisory council.
The System Development Department includes ten permanent employees.

Tools and Techniques

The software developers and software architects employed with DENIC's System 
Development Department are constantly working on long term development projects 
as well as on ad hoc projects. The average programming experience of the 
software developers is more than 14 years. In addition to their academic 
education and their work experience all members of the development staff are 
required to constantly enhance their abilities. Therefore, 50% of the software 
developers achieved the SUN CERTIFIED PROGRAMMER FOR THE JAVA 2 PLATFORM 
certification within the last year. It is planned that all developers gain this 
certification by June 2005.
In addition to its own workforce, DENIC's System Development Department has a 
legacy of good experience working with the external programming company plan B 
GmbH. This Karlsruhe based programming company can be consulted to compensate 
for workload peaks. It can also be used for continued support in specific areas 
on long-term projects.

Several programming languages are used by the members of the department for 
their various projects. These languages include but are not limited to:

* Java
* Ruby
* C++
* C
* Perl
* XML and co-standards
* SQL

Among the system development tools used by the department are:

* ArgoUML / Open Source UML
* NetBeans IDE
* Eclipse IDE
* Apache ANT
* CVS - source repository
* CruiseControl
* JUnit

Key Technical Personnel

Heinz-Gerhard Montag, Head of System Development
For more details on the qualification and experience of Heinz-Gerhard Montag 
refer to part 1-3-v: Other Executives or Management Persons with Significant 
Influence.

Marcos Sanz Grossón, Deputy Head of System Development
Marcos Sanz Grossón holds a master's degree in Engineer in Telecommunications 
from the Polytechnic University of Valencia, Spain.
From 1998 to 1999 he worked as a research assistant at the B-WiN Labor of 
Germany's National Research Education Network (DFN) at the University of 
Erlangen-Nuremberg. In 1999 he joined DENIC and now works as software architect 
in the system development department. During the last five years he has been 
specializing in Java technology and object oriented software design and 
development. In this period he successfully led a number of projects, ranging 
from the introduction of IDN to several surveys on the practical deployment of 
DNSSEC under .de.
Marcos Sanz Grossón represents DENIC in international communities like IETF and 
RIPE and is the author of various RFCs including the CRISP specification. He is 
a member of the Institute of Electrical and Electronics Engineers (IEEE) and an 
ISOC Advisory Council representative.


(c) System Administrations Department

Tasks

The System Administrations Department is the planning, procurement and 
maintenance of all infrastructure used at DENIC. This includes but is not 
limited to:

* Network infrastructure (leased lines, switches, WLAN, firewalls, load 
balancer etc.)
* Server (operating systems, applications)
* Data storage, data recovery
* Data centre
* Databases
* Maintenance of soft- and hardware
* Internet access
* Workstations
* Printer, copying machines, telephone network
* Administration of licenses
* Time recording system
* Electronic access control

As an internal service provider, the System Administrations Department provides 
a documentation about administered systems and and a description of service 
levels. In cooperation with the other departments, work plans get developed and 
arrangements on SLAs are made. The compliance of these SLAs is monitored 
continuously.
The System Administrations Department includes 14 permanent employees. All 
staff has an average experience of seven to ten years with comparable 
responsibilities. Some of them are with DENIC for more than five years. In 
order to keep abreast of all technical developments, these employees receive 
continuous training.


Key Technical Personnel

Michael Weiss, Head of System Administration
For more details on the qualification and experience of Michael Weiss refer to 
part 1-3-v: Other Executives or Management Persons with Significant Influence.

Elmar Bins
Elmar Bins is with DENIC since April 2002 in the function of Network 
Administration and Security Officer. He is responsible for all aspects of 
network administration including network security. Within his time with DENIC, 
he managed the conversion of the complete network to a new structure and was 
active in many projects mainly covering the development of security structures 
and external and internal routings. Before he joined DENIC, Elmar Bins was with 
Nextra Deutschland GmbH (prior IVM GmbH) for six years, where he was in charge 
of the host-master department. Prior to this Elmar Bins worked for several 
companies in the areas of software development and network administration for 
some years.
In 1997 Elmar Bins published (co-authored with Boris Piwinger) the 
book "Newsgroups" with International Thompson Publishing, dealing with the 
history, basics and technology of Usenet as well as providing information 
regarding software and the code of conduct.

Rachid Broum
Rachid Broum, database administrator at DENIC for five years, is responsible 
for the development, maintenance and administration of all database systems. 
This means in particular the installation, configuration and performance tuning 
as well as data migration, and database replication of high-availability 
database systems. He also works on backup and recovery mechanisms for all 
database instances. Database design, modeling and leading the implementations 
of enterprise database solutions complete his tasks. Rachid Broum received a 
degree in informatics from the Fachhochschule Worms in 1989 and has about 15 
years of experience in database management and the administration of software 
projects with different companies, e. g. with Warner Music Manufacturing 
Europe, WILO GmbH and Büro Actuell eG.

Jürgen Geinitz
Jürgen Geinitz became a member of the Unix Team in DENIC's System 
Administration group in July 2003. In this position, he is responsible for the 
installation and configuration of all unix and linux systems, the ldap, samba 
and mail servers, backup and data protection of all unix servers and the 
control of the ssh access.
Before joining DENIC Jürgen Geinitz was system manager at novalis media, a 
department of Vereinigte Verlagsanstalten GmbH at Düsseldorf, responsible for 
the installation and operation of server equipment and technical project 
coordinator. In 1999, Jürgen Geinitz was system and project manager at WILD 
PROJECTS Gesellschaft für audiovisuelle Kommunikation mbH. At WILD PROJECTS, he 
was responsible for setting up and operating the network infrastructure needed 
to provide Internet web- and mail-services. From 1997 to 1999, he was a member 
of the programming team at "Tele Data Electronic GmbH", developing software to 
be run on central computers used in power plants, for water supply companies 
and road tunnels. Prior to this, he gained several years of experience in the 
field of system management and system administration in research institutes 
like the Kernforschungszentrum Karlsruhe and the computing center of the 
University of Heidelberg.
Jürgen Geinitz received his academic education at the Fachhochschule Dortmund, 
where he studied Computer Engineering from 1983 to 1988.

(d) Operations Department

Tasks

The main tasks of the Operations Department are:
* Maintenance of connectivity for the registrars
* Operation of the registry system and database
* Operation and maintenance of all name servers
* Generation and distribution of the zone file
* Operation of whois
* Operation of the webserver
* Registrar Support Service
* Registrar Training
* Monitoring of all components and applications
* Quality assurance and test of new products
* Provision of technical information for the registrars

The Operations Department includes 14 permanent employees.


Key Technical Personnel

Joachim Strohbach, Head of Operations
For more details on the qualification and experience of Joachim Strohbach refer 
to part 1-3-iv: Person with Principal Technical Responsibility.

Andreas Ihl
Andreas Ihl has been a member of DENIC's Technical Monitoring Group for almost 
three years, and has been with DENIC since 2000.
His duties include the monitoring of all components and applications necessary 
for the operational and technical functions of name servers, information 
services, and the registry system. He also develops failure and fallback 
strategies and prepares the data for the quality management and risk analysis. 
He graduated from the Darmstadt University of Technology in 2000. He has 
special experiences in the setup of Information Systems and System and Network 
Administration. 

Claudia Simsek-Graf
Claudia Simsek-Graf is with DENIC since April 2004 is the function of Quality 
Assurance Officer. She is responsible for all aspects of quality assurance. 
This includes the documentation of all DENIC in- and external processes.
Before joining DENIC, Claudia Simsek-Graf worked for in the R&D department of 
Daimler Chrysler. She was mainly involved in the development of software in the 
area of quality assurance. During her employment with Daimler Chrysler, she was 
also involved in the EU-project PERFECT (Process Enhancement for Reduction of 
Software DeFECTs). In the framework of this project, Claudia Simsek-Graf was 
involved in numerous publications concerning quality assurance 
(http://www.iese.fhg.de/PERFECT/).
She holds a degree in Computer Science from the Fachhochschule Ulm.

Christoph Strabel
Christoph Strabel is part of the DENIC Operations Monitoring and Maintenance 
Team. In addition to system monitoring and control, he is responsible for the 
scheduling of maintenance work, capacity calculations and planning and the 
implementation of new features from the test environment into production. 
Christoph Strabel also is responsible for whole tracking process of technical 
problems..
He made his degree as Information Technology Officer at VR Leasing in 2003 with 
a focus on terminal server technology, and is an experienced software 
programmer since 1996.  

Sandra Stickelmann
Sandra Stickelmann has been with DENIC since 2002. She organizes and conducts 
the training courses for the DENIC registrars as well as the regular Technical 
Meetings. Overall her responsibilities encompass the technical support of and 
the non-disturbed information flow to the DENIC registrars. Thus, she also 
works on the maintenance of DENIC's specialized registrar website. 
Additionally, Sandra Stickelmann is responsible for the preparation and 
execution of in- and external trainings.
She studied Adult Education and received her degree in 1998, but already worked 
in this field since 1996, with a special emphasis on the technical sector. This 
work was accompanied by software development and customer care activities. From 
1999 to 2001 she was with m+s elektronik AG, where she was responsible for the 
organization and execution of trainings as well as for the development of 
software and the consultancy of customers regarding this software.

Diana Fritsche
Diana Fritsche has gained experience in domain administration since 1996. 
Before 2002, she worked for several registrars in Germany such as Internet 
Services GmbH & Co, ISION and Nextra in the fields of international domain 
services, software development and programming.
In 2002, she switched to the registry side and has been working for DENIC since 
then. At DENIC she is responsible for the evolution and optimization of the 
registry system. In this position, Diana Fritsche plans and manages all 
internal projects related to this topic.
Additionally, she plans and manages all projects that are conducted in 
cooperation with registrars or other external organizations. To guarantee a 
registry system that meets the demands of the registrars, she therefore works 
in very close cooperation with the registrar's technical departments.


(e) R&D Group

Tasks

As one of the largest TLD registries DENIC is committed to further Internet 
research and development.
By dedicating staff to research DENIC.
* Supports protocol development within the IETF
* Maintains close relations with groups driving progress in various areas of 
Internet technology development

DENIC research's tasks thus cover:
* Giving input to and, where appropriate, leading efforts where registry 
experience fits best
* Watching closely current trends to support system development and deployment 
of new services early and high quality


Key Technical Personnel
 
Peter Koch, R&D Group
Peter Koch is with DENIC since January 2005. He is responsible for the 
coordination of DENIC's own research activities and its participation in 
international working-groups. He is head of DENIC's R&D Group.
Peter Koch has a Master's degree in Computer Science (Diplom-Informatiker) from 
the University of Dortmund, Germany. In 1992 he worked as research assistant at 
the University of Dortmund as staff of DENIC, being a university project at 
that time. His tasks were managing registry services for the DNS top level 
domain ".de" and supervising DNS technical quality.
From 1993 until 2004 Peter Koch held a position as research assistant at the 
computing services support group of the Faculty of Technology, University of 
Bielefeld. His responsibilities included running the networking services for 
the CS department, focusing on integrated network and systems administration, 
proactive security measures and incident handling.
Peter Koch gained teaching experience by giving introductory courses about the 
Unix operating system and leading various seminars on current Internet research 
and technologies.
Peter Koch has been an active participant in various working groups (e. g. 
dnsind, dnsext, dnsop, drums, marid) of the Internet Engineering Task Force 
(IETF) and the Réseaux IP Européens (RIPE) for more than ten years. He has 
authored and co-authored Internet technical documents (RFC3123 and RIPE-
Document 203) and contributed to various others.
Peter Koch has gathered a sound DNS operational experience by running a large 
scale DNS name server in cooperation with an industry partner and by performing 
the RIPE DNS hostcount for the Top Level Domain .de (a long time Internet 
statistics project at the RIPE NCC, Amsterdam). He is currently a co-chair of 
the RIPE DNS working group.
Peter Koch acts as the chairman of the Executive Board of ISOC.DE, the German 
Chapter of the Internet Society (ISOC).

(b) Technical plan and capabilities for the proposed registry operations. In certain sections of the web-based form, applicants are permitted to make non-textual submissions together with, and as part of, their application (e.g., graphs, flowcharts, models and diagrams). Present a technical plan and capabilities outline for the proposed registry operations. The technical plan should address the following factors:

(i) General description of proposed facilities and systems. Describe all system locations. Identify the specific types of systems being used, their capacity and interoperability, general availability and level of security of technical environment. Describe in appropriate detail buildings, hardware, software systems, environmental equipment and Internet connectivity.

(i) General Description of Proposed Facilities and Systems

Highlights

* Highly reliable scalable registry solution through redundancy of all systems.

* High availability through 14 name server sites by June 30, 2005, and 19 name 
server locations by December 31, 2005 - each with multiple name servers.

* Diverse architecture between name server locations to increase reliability, 
to reduce risk of attacks and to reduce vendor dependency.

* State-of the art registry and name server facilities.

* Track record of administering the .de TLD for ten years, with over eight 
million domains in October 2004.

* Long relations with carefully selected vendors and resellers ensure 
exceptional service response times, fast delivery and replacement schedules, 
and trouble-free test system delivery.


DENIC operates modern, high security facilities worldwide. Each of the sites 
complies with DENIC's rigorous facility standards. The .net infrastructure will 
be located in the same facilities as the .de infrastructure, and the new 
dedicated .net RSL as well as the additional NSLs (see part 2-5-b-vi: 
Geographic Network Coverage) will comply to the exact same high standards.

In this section, DENIC will describe its current service locations for .de, 
which will also be used for .net, as well as additional locations dedicated to 
operating the .net TLD. 
Detailed descriptions are provided:
* Registry Service Locations (RSL) - see part 2-3-b-iii: Description of 
Facilities
* Name Server Locations (NSL) - see part 2-5-b-vi:  Geographic Network Coverage
* Service and Support Location - see part 2-5-b-vi: Geographic Network Coverage


1. Connectivity

An overview of DENIC's internal and Internet connectivity is provided in part 2-
3-b-iii: Description of Facilities.


2. Registry Service Location System Architecture

DENIC is strongly committed to best-in-class availability of its registry 
services and has installed highly scalable, secure and redundant high 
performance systems.
Being a not-for-profit cooperative, DENIC uses all revenues for operating, 
maintaining and upgrading all infrastructure - resulting in higher levels of 
investment than those of a for-profit company.

(a) RSL Network and Server Architecture

RSL layer structure
As shown in Figure 1, DENIC employs a highly stable and secure network and 
server architecture with five distinct layers at both of its RSLs. Each layer 
is serving a special purpose and in itself laid out redundantly. Should a 
system at one location fail, its counterpart in the other location takes over. 

Architecture Redundancy and Security
Having all systems installed in a redundant, load-balancing fashion allows 
DENIC to deploy additional machines to scale performance. Like all other parts, 
network components and paths are built redundantly. DENIC prefers to use all 
resources on an equal basis, so these systems have been configured with high-
availability.
Each security layer of an RSL is connected to both inter-RSL matrix switches 
for redundancy (see Figure 2).

All parts of the network have been hardened against malicious attempts through 
means of access lists, optimized scheduler configuration and appropriate 
Management access is closely monitored.

The feature summary of all layers is illustrated in Figure 3.

(i) External Routing Layer
The outermost layer takes care of Internet connectivity and routing. Packets 
come in from the Border Gateway Protocol (BGP) peers and transit providers, 
other packets leave the system. Two routers, one at each RSL site, take care of 
packet forwarding and filtering. This layer also uses a third location, DE-CIX -
 Germany's most important IP exchange point - where DENIC has deployed two 
routers in two sub-locations for peering connections only. The components are 
described in Figure 4. 

The feature summary of Layer 1 is shown in Figure 5.


(ii) Perimeter Network Layer
The Perimeter Network Layer contains the perimeter defense packet filters 
(Juniper Netscreen). They make sure that only desired packets can pass to the 
third layer and vice versa. 

The feature summary of Layer 2 is shown in Figure 6.


(iii) Service Provisioning Layer
This layer has a redundant pair of F5 load balancers, terminating all public 
service network addresses on their outside interfaces. 
The load balancers distribute the requests to the servers of both RSLs 
according to the configured scheduling schema.

1. Load Balancers
Bandwidth:		250 kreq/s (vendor information)
                        220 kreq/s (tested)
                        10-15 kreq/s average (estimated from .de experience)
System load:		1-5%

The feature summary of Layer 3 is shown in Figure 7.


2. Registry Provisioning Front-End 

The Registry Provisioning Front-End consists of several servers dealing with 
incoming transaction requests. 
For .net an EPP server, an RRP proxy, and potentially a web based registration 
front-end for registrars will be provided.

EPP Servers, RRP Proxies hardware:
Processor		2 AMD/Opteron CPUs at 2.4 GHz
Memory			4 GB
Disk for system SW	Local (RAID1)
Disk for data		Local (RAID1)
Interfaces		1 Gbps Ethernet
Software		Registry Provisioning Front-end Applications (EPP 
server)
			RRP Proxy Software (RRP proxy)

DENIC will migrate the .net TLD to a thick model based on the widely accepted 
EPP protocol while offering central RRP proxy servers at its registry 
locations. Registrars may continue to use RRP during the transition from 
VeriSign to DENIC for a limited time. 
DENIC's RRP proxy accepts incoming RRP-requests, translates them to EPP and 
forwards them to the EPP-backend in the Data Provisioning Layer.

3. Registry Information Front-End

In the Registry Information front-end, DENIC currently deploys whois servers 
and will add CRISP servers in the near future.
The whois service accesses DENIC's central database - via the Layer 4 firewall 
and a Layer 5 mediator - so whois data is always up-to-date. Details regarding 
DENIC's whois implementation are described in part 2-5-b-xii: Whois.

Whois Server
DENIC's whois runs on a cluster of servers in each RSL. Load is carefully 
monitored, additional servers can be added easily as needed.
Processor		1 UltraSPARC III at 900 MHz
Memory			4 GB
Disk for system SW	Local (RAID1)
Disk for data		Local (RAID1)
Interfaces	        100 Mbps Ethernet 4.8 GByte/s System Bus Throughput 
                        1.2 GByte/s I/O-Bandwidth
Software		Whois Server


Crisp Server
DENIC will soon start to evaluate, define, implement and deploy CRISP (RfCs 
3981-3983) parallel to whois. The server requirements are similar to those of 
the whois service. Exact system specifications will be decided upon 
introduction of the service.


4. Communication Servers

DENIC deploys web, FTP and e-mail servers in the Service Provisioning.

Web / FTP Servers
DENIC uses two Web / FTP and two e-mail servers distributed over both RSLs with 
a load balanced setup.
Processor		2 UltraSPARC IIIi at 1.3 GHz
Memory			4 GB
Disk for system SW	Local (RAID1)
Disk for data		Local (RAID1)
Interfaces		1 Gbps Ethernet
Software		Web Server, FTP Server (web servers)
			SMTP Server (e-mail server)

The feature summary of the servers in Layer 3 is shown in Figure 8.


(iv) Internal Network Layer

This layer separates the service from the Data Provisioning Layer, guarding the 
back-end application and the database systems from all unauthorized access 
attempts. Only few access relations are permitted, like from a whois server to 
its database application server. The same close control applies to outgoing 
packets.

Feature Summary
Extensive Redundancy / High Availability
* Packet filters in HA configuration
* Redundant links to switches
Advanced Security
* State-of-the-art packet filtering
* Stateful inspection
* Typical-attack defenses
* Tight policies


(v) Data Provisioning Layer
Systems in this layer make the registry databases accessible to the Service 
Provisioning Layer applications. This layer is home to the interfacing 
applications, the request processing systems, and the database systems 
themselves. 

1. Application Servers
The application servers in Layer 5 generally host several similar applications. 
These high performance servers can be extended by adding additional components 
to the hardware. They are not load balanced but operated in failover and 
cluster configurations.
Processor		4 Ultra SPARC III at 1.2 GHz 
Memory			16 GB 
Disk for system SW	Local (RAID1)
Disk for data		Local (RAID1), HDS, SAN
Interfaces	        1 Gbps Ethernet 9.6 GByte/s System Bus Throughput 
                        1.2 GByte/s I/O-Bandwidth
Software		List Generators, EPP-Backend, Whois-Backend

Registry Provisioning Backend 
All .net requests coming in via RRP-, EPP- and a possible web based 
registration server are converted to EPP in Layer 3 and forwarded to the Data 
Provisioning Layer to be processed by the EPP-Backend on the application 
servers described above.

Registry Information Backend
In the Registry Information Backend DENIC currently provides whois and will add 
CRISP backends in the near future. 

List Generation Servers
The application servers also host a variety of list generation applications:
* Zone File Generation	   - see part 2-5-b-vii: Zone File Generation
* Report Generation	   - see part 2-5-b-xix: Support and part 2-5-b-ix: 
Billing and Collection
* Escrow		   - see part 2-5-b-xi: Escrow.

2. Database and Replication Servers
Database and Replication Servers are described in detail in part 2-5-b-v: 
Database Capabilities.

(b) RSL Out of Band Management Network
Covering both RSLs and all NSLs, DENIC has implemented an out-of-band (OoB) 
management network. This network is shielded from the outside world, without a 
routing or packet forwarding path from/to the Internet or any of the layers 1-5 
above.
Geographically remote parts of the management network are always connected 
through encrypted VPN tunnels. This has two advantages: first, all 
communication is encrypted, second, VPN tunnels become independent of physical 
connectivity. As long as the sites can reach each other and exchange IPsec 
packets, VPN connectivity is available.
The OoB management network connects administrative interfaces of all networking 
and infrastructure components and makes them accessible to a group of 
management servers.


(c) RSL Storage Area Network
At DENIC the SAN connects the database servers to a high-end storage subsystem 
supplied by Hitachi Data Systems, designed to allow all changes to be done 
without any interruption of services and applications.
The SAN infrastructure is designed with no single-point-of-failure (SPOF). A 
redundant SAN infrastructure, based on high-end storage subsystems, guarantees 
a designed-in availability of >99.999%. Due to the two location strategy it 
also prevents loss of data in case of a disaster at the primary site. 
Figure 9 shows the SAN Infrastructure at DENIC and the distribution of 
components between the two RSLs.

The SAN components have the characteristics described in Figure 10.

Feature Summary SAN
Availability of Services
* State-of-the-art infrastructure based on High-End-Storage, redundant SAN-
fabrics, components and server systems from leading vendors
* Redundant access to data through dual-path server connection, mirrored or 
replicated data on two (or more) locations and a redundant physical 
infrastructure 
* Opportunity to add capacity, connectivity, servers and physical connections 
with no downtime
* Enterprise service and support strategy with 24/7/365 hardware monitoring and 
maintenance on Gold and Platinum-Level for all critical components in 
combination with solution support through external system provider

Guarantee of Security
* Best-in-class security standards through use of security features like LUN-
Mapping, Zoning and WWN-Binding within the SAN
* Use of the exceptionally secure Fiber Channel protocol


3. Name Server Locations System Architecture
The NSLs have been re-implemented in 2004 with robustness, performance and 
extensibility in mind. At normal query rates, no component of an NSL is under 
more than 5% system load, thus providing for at least a fifteen fold increase 
of query and/or packet rates in peak times or during DOS attacks.

(a) NSL Production Architecture Overview
The NSL production architecture is described in detail in part 2-5-b-ii: 
Stability and Performance.

(b) NSL Management Architecture
In the NSL Management Layer, DENIC maintains a separate IP connection to a 
qualified and reliable transit provider. The line is being terminated by a VPN 
device keeping up encrypted tunnels to the VPN tunnel hubs at the RSLs. Through 
this VPN connection the site's management network is connected to the RSLs' OoB 
management network. Management interfaces are reachable through this VPN 
connection only, there is no connection to the public Internet.
VPN traffic is filtered and monitored thoroughly. An NSL's management 
interfaces can only be accessed from the management servers and from within the 
NSL itself. This way, a compromised machine at one NSL does not pose a threat 
to any other NSL. The architecture of DENIC's NSL Management Layer is shown in 
Figure 11.

(i) Central NSL Management within RSL OoB Management Network
DENIC's OoB management network has been described in detail above as part of 
the RSL architecture. The central NSL management is located within this RSL OoB 
network. 
As NSLs are more exposed than RSLs, security is the prime concern. This is 
achieved by encrypting management traffic and allowing management access from a 
high-availability pair of NSL Management servers that take care of 
monitoring/reconfiguring the components and distributing service information 
like zone files.

Central NSL Management Servers
Processor		2 Intel CPUs at 3 GHz 
Memory			16 GB 
Disk for system SW	local (RAID1)
Disk for data		local (RAID1)
Interfaces		two 1 Gbps Ethernet
Software		Zone Distribution, Monitoring, Log collection, MRTG, 
Nagios, NSL Management

(ii) NSL OoB Management Layer
Loghost
The loghost serves as an admin access point for the NSL. Its tasks are:
* Collect system logs
* Update zone files on name servers
* Serve as backup for monitoring
* Serve as backup for real time updates to routers / load balancers.
All name servers within the NSL can replace the loghost, so in case of a 
loghost failure, one of them will take over.

Console Server
The NSLs console server allows DENIC's engineers to reach the serial console 
ports of all components at the NSL. Console functionality has been enabled on 
all servers, too, to be able to correct configuration problems in case the 
machines do not boot up properly or fail.

Remote Power Switches
DENIC has added remote-controlled power switches to the NSL. In case of a 
problem that cannot be solved through network or console access, every 
component can be remotely power-cycled.

The components in the NSL OoB Management Layer have the characteristics 
illustrated in Figure 12.

Feature Summary NSL OoB Layer
Extensive Redundancy / High Availability
* Redundant VPN tunnels 
* Additional emergency access via modem
* Redundant access paths via Console and Ethernet
Excess Capacity
* External line burstable to 100 Mbps
Advanced security
* State-of-the-art packet filtering
* Stateful inspection
* Tight policies (in and out) to shield against insider attacks

5. Network Management
(a) RSL Out-of-band management
All network equipment is managed out-of-band only. All machines have been 
equipped with appropriate filters and access lists to only allow management 
access (telnet, ssh, SNMP, http) via their dedicated management interface. 
Access is only allowed from a small range of addresses within the RSL 
management network. This prevents external as well as unauthorized internal 
access.
Console server access is also only available from this small range of IP 
addresses.
Every RSL location uses a VPN tunnel gateway to build encrypted tunnels to the 
management network. Most of the time, VPN traffic will stay on DENIC's own 
network. Only in case of a link failure, traffic will traverse transit or 
peering providers' networks.

(b) NSL Out-of-Band Management
Maintenance, configuration and internal monitoring of a machine can only be 
done over its management interface.
For security reasons the NSL OoB management network cannot be reached from the 
public Internet; it is only reachable from the RSLs' OoB management networks 
via secure VPN tunnels (see Figure 13).
Even so, configuration and monitoring of an NSL's machines can only be 
performed from the NSL management machines. This policy is enforced by strictly 
filtering the VPN tunnel traffic on both the RSL and the NSL sides.

(c) NSL Emergency Operation and Limits
In case of a VPN or transit provider failure disabling VPN access, the service 
delivery network will be undisturbed and the site will still deliver service. 
DENIC's engineers can reach the site through a modem connection to the NSL's 
console server. This does not provide a way to update the information on the 
site's servers (e. g. DNS zone data), but it can be used as an emergency device 
for analysis and - if the data goes out of sync - shutting down the NSL's 
services.
A failed NSL will not pose a problem for DNS services - neither with anycast 
nor with unicast setups. For anycast NSLs, once removed from the global routing 
table, another anycast NSL will pick up the traffic. The same holds with 
unicast NSLs, as DNS has been designed to just skip slow or unresponsive 
servers and query the ones that are working well.

6. DENIC Test Systems
In order to effectively and securely introduce new hardware and services, DENIC 
is operating a sophisticated test infrastructure. Both for RSL as well as for 
NSLs, a complete dedicated setup is installed in DENIC's headquarter location.

(a) RSL Test Architecture

(i) Internal Test Infrastructure
In its primary location DENIC has installed a complete RSL infrastructure, 
accessible for authorized DENIC developers, system administrators, and QA staff 
only (see Figure 14). Details about DENIC's four stage database environment are 
described in part 2-5-b-v: Database Capabilities.

(ii) Registrar Test Infrastructure
Once cleared by the intensive internal testing new developments are entering 
the registrar testing phase. Registrar testing is performed on dedicated 
systems in the production network. Network components are shared with the 
productive systems. All testing on database servers happens strictly on 
dedicated and completely separate test systems absolutely equivalent to the 
production architecture.

(b) NSL Test Architecture
To allow testing of new features, rolling out new services or observing the 
results of configuration changes, DENIC hosts a lab NSL, fully featured in 
every respect, so that every change to NSL setups can be tested in a real 
production-like environment without impacting public services.
Once upgrades or changes have proven their positive outcome in the lab setup, 
they are deployed to the "real" NSLs. Since the lab NSL resembles a production 
NSL - independent Internet routing, VPN tunneling, all equipment - the results 
obtained here are valid for the "real world".



(ii) Stability of resolution and performance capabilities, including: response times and packet loss targets; availability of authoritative name servers; processes, tools and automated monitoring to ensure accuracy of zone data for resolution; diversity of DNS infrastructure; diversity and redundancy of network and DNS infrastructure to handle bandwidth congestion and network failures of ISPs and host providers.

(ii) Stability of Resolution and Performance Capabilities

Highlights

* Inter location diversity

* Intra location redundancy

* Scalability through anycast setup

* DNS quality measures

* Independent monitoring

1. DNS Infrastructure

The full range of DENIC's DNS infrastructure is described in detail in
* Part 2-3-b-iii: Description of Facilities (Connectivity)
* Part 2-5-b-i: Facilities and System (NSL System Architecture).

(a) Name Server Locations (NSLs)
NSLs are designed to provide name server services for every incoming query. 
DENIC operates all its name servers compliant to the Best Current Practices for 
root name servers RFC2870. Specifically, DENIC complies with 
* technical requirements (paragraph 2)
* location security requirements (paragraph 3.1)
* network security (paragraph 3.2)
* protocol security (paragraph 3.3) 
defined in the aforementioned RFC2870.

Currently, NSLs exist at eleven locations around the world and deliver DNS 
service for the .de TLD. For .net DENIC will have 14 name server locations - 
the eleven existing .de locations plus three additional locations in North 
America - operational by June 30, 2005, and 19 locations by December 31, 2005. 
Details about planned .net name server locations and the implementation 
schedule are described in part 2-5-b-vi: Geographic Network Coverage. 

All NSL setups have been installed at professional high-quality hosting sites 
with extensive backup systems for cooling, electricity and security. DENIC has 
contracted its current eleven name server sites to ten different hosting 
companies, ensuring an unmatched provider diversity. Their specifications match 
those of the COLT Internet Service Center (ISC) described in part 2-5-b-iii: 
Description of Facilities. NSLs are placed with are DENIC eG, DE-CIX, B-CIX, 
Deutsche Telekom, VIX, Netnod, AMS-IX, LINX, MCI Worldcom and Savvis.
Details about DENIC's multi-vendor strategy are described in part 2-7-ii: 
Multiple Suppliers.

(b) NSL Connectivity

(i) Internet Connectivity
DENIC has estimated typical traffic levels at about 1-2 Mbps. Connectivity can 
be bursted to at least 100 Mbps to cater for high-load scenarios. In some 
places, DENIC will also accept peering connections from interested parties also 
hosted in the same hosting facility or connected to an Internet exchange point 
nearby.

DENIC has chosen the hosting and connectivity providers for their proven 
professionalism, stability and experience. Assessing the long term stability of 
the provider was a key component in order to ensure that the provider would not 
vanish from the market. This way, DENIC profits from those providers improving 
their own networks.

(ii) Internal Connectivity
The .net name servers at  the NSL co-located to the primary RSL are connected 
to each other and the DECIX routers via the DENIC LAN backbone. All other name 
server sites can be reached for management purposes from each of the RSLs via a 
secure VPN.
These second and completely separate connections to the name server locations 
are used for network management purposes, including remote administration of 
name servers, updating zone files, maintenance and monitoring of systems. The 
VPN access is built to allow for abundant excess capacity to always ensure fast 
and secure management access to the name server locations. 

(c) Diversity of NSL Architecture


(i) NSL Architecture Overview
The NSLs are designed with robustness, performance and extensibility in mind. 
At normal query rates, no component of an NSL will be under more than 5% system 
load, thus providing for enough excess capacity for query and/or packet rates 
in peak times or during DOS attacks.

DENIC employs two major principles for its name server setup in order to ensure 
absolute stability: intra-location setup equivalence and inter-location setup 
diversity. Thus, redundant components within one location are absolutely 
equivalent, while setups between locations differ.

At each of its initially eleven worldwide locations DENIC will deploy three 
identical name servers. Server redundancy thus exists within one location as 
well as between the NSLs. This setup results in a high availability worldwide 
and fast response times, with outages being virtually inconceivable. 

Across its locations DENIC uses three different server hardware types and 
employs both unicast and anycast technology in the network layer. Altogether 
five location architectures are currently deployed by DENIC, see Figure 1.

On top of the diversity in hardware DENIC has installed three different name 
server implementations in all of its NSLs. One of these implementations is 
productive, with the other two serving as backup. Should security 
vulnerabilities be discovered (DENIC stays in close contact with vendors and 
incident response teams), one of the backup implementations can immediately be 
started and ensure the availability of that specific NSL. As different types of 
software are running in the different NSLs, DENIC's NSLs cannot be attacked in 
their entirety.

The additional .net NSLs will be integrated into DENIC's diversified NSL setup 
strategy. Figure 2 shows the NSL architecture for the anycast setup. The 
unicast setup differs only by deploying a load balancer instead of the router 
in the External Network Layer.

In summary, the NSL architecture sports the features described in Figure 3.


(ii) External Network Layer
Most of the NSL infrastructure is identical for both anycast and unicast 
setups. There are multiple service machines installed, to which service 
requests are given load-balanced. If one machine or service instance fails, it 
will be removed from the load balancing sets. The basic difference lies only in 
the setup of the external network layer.

1. Unicast NSL
Unicast NSLs are connected to the Internet through an upstream provider. Figure 
4 illustrates the External Network Layer which consists of a load-balancer that 
terminates the service IP addresses and forwards service requests to the 
appropriate machines in the Service Provisioning Layer.

The components in the load-balanced external network layer have the following 
characteristics:

Load Balancer
Forwarding Rate:	250 kreq/s (vendor information)
			220 kreq/s (tested)
System Load:		1-3% (estimated from .de experience)

2. Anycast NSL
Anycast NSLs have been designed to insert themselves into the global network. 
The services here run on addresses from a freely routable IP network, one and 
the same for each anycast NSL. This network is being inserted into the global 
Internet routing table by Border Gateway Protocol (BGP) announcements from the 
router that makes up an anycast NSL's External Network Layer. The service 
addresses are not being terminated on the router, but are being routed, in a 
load distributing fashion, to the service machines in the Service Provisioning 
Layer.
As all anycast instances share the same name, only six different names for 
authoritative servers exist. This reduces the space occupied by name entries in 
DNS response packets, leaving more room for address records (additional data) 
while still not exceeding the 512 octet limit. 
The anycast setup for the External Network Layer of NSLs is shown in Figure 5, 
excl. management access.

The components in the anycast External Network Layer have the following 
characteristics:

Anycast Router
Bandwidth:		(no vendor information provided)
			400 Mbps sustained (maximum tested, no service impact)
			1 Mbps sustained, 3 Mbps peak (estimated from .de 
experience)	
Forwarding Rate:	500 kpps (vendor information)
			350 kpps (tested with small packets, no service impact)
System Load:		1-5% (estimated from .de experience)

3. External Network Layer - Type Differences and Common Features
An anycast NSL may vanish and reappear in the Internet routing tables without 
the public noticing, provided the remaining systems are still performing.
While the number of unicast NSLs is limited, owing to DNS/UDP response packet 
sizes, adding an anycast NSL does not change the list of DNS servers for the 
TLD, so DENIC is free to increase the number of anycast NSLs as they become 
necessary.
In summary, the NSL External Network Layer sports the features described in 
Figure 6.


(iii) Service Provisioning Layer

Intra-Location Equivalence
Each of the NSLs is initially equipped with three active name servers and one 
loghost. Within one location all name servers have exactly the same hardware 
and software setup. This intra-location equivalence ensures location stability 
and facilitates easy administration and maintenance. Should the need for 
increased DNS resolution capacity occur, DENIC will deploy additional name 
servers in the NSLs - each of which can host a maximum of eight name servers.

Inter-Location Diversity
To minimize the entire NSL construct's sensibility to operating system, 
application or hardware-induced problems, different types of server hardware 
and operating systems are installed in different NSLs alongside varying 
versions of the application software. The differences include: 
* three different server hardware types and operating systems
* three different DNS-Software implementations (BIND8, BIND9, NSD)
* IPv4 and IPv6.

This multilevel diversity increases the stability of the entire name server 
system, reduces the risk of attacks as well as vendor dependency. Concrete 
advantages of application layer diversity are:

Hardware
* If a problem with one hardware platform occurs, the whole system nevertheless 
stays operational 
* Reduced dependency from one hardware vendor
* The system has increased stability against attacks
* Increased ease of hardware upgrades.

Software
* Diverse software is harder to attack in its entirety
* Software errors have less impact on the system as a whole
* Upgrades and patches are easier to implement.

The induced performance differences between the NSLs are compensated for 
through installation of a different number of service machines in different 
NSLs - depending on the hardware and software setup.

The name servers in the Service Provisioning layer have the characteristics 
described in Figure 7.

In summary, the NSL Service Provisioning Layer sports the features shown in 
Figure 8.


2. Stability and Performance of DENIC's Resolution Capabilities

(a) Stability of DNS Resolution

Current DNS Resolution Volume of DENIC and Ability to Handle .net DNS Volume

Figure 9 to Figure 13 show the development of DNS requests to DENIC's .de name 
servers over the past year on a requests per minute scale.

Figure 9: 	DNS Requests in a One-Year Period (2004)
Figure 10: 	DNS Requests in a One-Month Period (November 2004)
Figure 11: 	DNS Requests in a Two--Day Period (November 29 to December 1, 
2004)
Figure 12: 	DNS Requests in a One-Day Period (December 1, 2004)
Figure 13: 	DNS Requests in a Two--Hour Period (December 1, 2004: 2 p.m.-4 
p.m.)

As described in part 2-5-b-vi: Geographic Network Coverage DENIC will expand 
its NSL network for .net by eight additional locations to then 19 locations 
worldwide - increasing DNS resolution capabilities even further.

Given the tremendous experience, the demonstrated ability to handle large DNS 
request volumes, and the committed investment volumes DENIC believes to have 
proven beyond any doubt its ability to handle the .net DNS request volume as 
well.

Name Server Availability
DENIC's "multiple name server per location" concept and inter-location setup 
diversity ensure highest availability of DENIC's DNS resolution capabilities. 
DENIC therefore commits to a total DNS resolution uptime of 99.999% for .net.
For a complete set of SLAs please refer to DENIC's suggestion in Appendix D: 
Performance Specifications.

(b) Response Times for DNS Requests
Currently DENIC serves the .de community with response times for DNS resolution 
requests of less than ten milliseconds (excluding round trip time) for more 
than 98% of DNS queries. DENIC commits to the same value for .net.
For .net DENIC will have 14 NSLs by June 30, 2005 and 19 NSLs by December 31, 
2005 distributed around the world, thus providing excellent DNS infrastructure 
to minimize round trip times from every location in the world.

(c) Packet Loss Targets
DENIC has the following internal targets for packet loss:
* << 1% packet loss in DENIC internal infrastructure at normal load
* < 1% packet loss in DENIC internal infrastructure at ten times normal load
As packet loss can occur anywhere in the connection, DENIC can not make any 
commitment regarding the actual packet loss within any connections, as the 
user's connectivity generally represents the bottleneck.
DENIC uses the results provided by the RIPE NCC's dnsmon project as 
representative source for packet loss measurement, see .de domain data at 
http://dnsmon.ripe.net.

3. Accuracy of Zone Data
DENIC's high DNS data quality has been documented in several studies, for 
instance in an ITU paper (http://www.itu.int/itudoc/itu-
t/workshop/cctld/cctld046.pdf). Men & Mice, a well known Iceland based DNS 
consultant, has conducted several TLD surveys proving high .de DNS data quality 
(see http://www.menandmice.com/6000/6350_eu_survey.html), too.
These positive reports about DENIC's zone accuracy and DNS quality are the 
fruit of extensive checks of data and zone files and continuous monitoring of 
all transaction and update processes.

Specifically DENIC uses the following checking mechanisms:
* Pre-delegation checks for accuracy of each domain (working connection to name 
server)
* Sanity checks of generated zones
Additionally DENIC monitors all steps in generating and distributing zone files 
to the NSLs around the world.

(a) Pre-Delegation Checks
Pre-delegation checks are mandatory for every .de domain. Upon registration, 
update, or renew, DENIC will check whether the registered domain is technically 
supported. A negative result will bring the domain into "expirable" status. The 
registrar will be informed of the expiration date (four weeks) until which the 
registrar can correct the delegation data. Failure to do so results in the 
deletion of the domain. This process prevents lame delegations and is one 
reason for DENIC being able to provide an outstanding zone quality of the .de 
zone.
For .net pre-delegation checks will not be mandatory but offered as an 
additional service free of charge to registrars. Pre-delegation checks can be 
performed for every <create>, <update> or <renew> command for a domain object. 
The checks may either be passed successfully, with a warning or an error 
result. If the registrar has chosen to sign up for the optional checks, all 
errors need to be fixed before the command will be processed by DENIC.
DENIC is offering an online interface for checking conformance with the 
requirements at http://zonecheck.denic.de/ as well as the software (AFNIC's 
zonecheck) and configuration for download.

(b) Sanity Checks
Besides pre-delegation checks DENIC will improve its domain name registration 
service quality furthermore with the following sanity checks: 
* Name server operators can request a list with all domains delegated to their 
name server(s).
* Everyone can inform DENIC about technical issues in regarding a domain 
delegation. DENIC will carry out the pre-delegation test and inform the 
relevant registrar if the test result is not positive. 

(c) Zone Consistency Checks
DENIC's extensive consistency checks of the complete zone file are described in 
detail in part 2-5-b-vii: Zone File Generation.

(d) Monitoring
To ensure accuracy and quality of zone data DENIC monitors the zone both during 
generation and distribution as well as during operations:
* Monitoring of zone file generation and distribution - described in part 2-5-b-
vii: Zone File Generation and part 2-5-b-viii: Zone File Distribution and 
Publication
* Monitoring of zone accuracy and quality on operating zones - described above 
(RIPE NCC dnsmon)



(iii) Operational scalability sufficient to handle existing registry database and projected growth; DNS queries including peak periods and projected growth; DDoS attacks, viruses, worms and spam; and restart capabilities.

(iii) Operational Scalability

Highlights
* DENIC already has more than ten years experience in successfully handling 
large databases and processing huge volumes of transactions.

* DENIC will use a database system for .net which is similar to the .de system. 

* The current system has enough excess capacity to handle 16 million domains 
which equals more than three times the number of.net domains registered today. 
Thus, the DENIC system will be dimensioned to handle the expected growth of 
the .net domains with sufficient headroom (i.e. about eight million domains 
until 2011). 

* DENIC is able to quickly respond to any higher growth by e.g. adding further 
system components to the expandable system infrastructure.

* DENIC regularly monitors and assesses the current capacities of the registry 
database. Considering results, DENIC is able to anticipate the need for 
critical resources well in advance and decide on increases in system capacity 
e.g. system modifications, extensions or changes in the system architecture at 
an early stage.

* DENIC will reserve a capacity of five TB on DENIC's primary HDS for its .net 
database, providing scalability for more than 2500% of the current database 
size.

* The registry database is not directly accessible from the outer network. 
Viruses, worms, spam or (D)DoS attacks will not affect the database as DENIC's 
well-established, extensive filtering mechanisms block these attempts.

* DENIC protects its namsystem against (D)DoS attacks and worms by providing 
very high excess capacities for all relevant components and a highly scalable 
system.

* DENIC implements extensive e-mail filtering procedures and conducts 
comprehensive virus analyses.

* To remain informed about security problems and issues as well as to enhance 
its proactive defensive procedures against e.g. (D)DOS attacks, viruses, worms 
and spam, DENIC receives and monitors various security and full disclosure 
mailing lists provided by CERT or other parties (e.g. vendors).


1. Handling of Existing Registry Database and Projected Growth 

DENIC has already acquired more than ten years experience in successfully 
handling large databases and processing huge volumes of transactions. By 
constantly monitoring, modifying and upgrading the components of the database 
system, DENIC was able to reach the current system performance. 

As the current database system for the .de registry has proven to be highly 
scalable and stable, DENIC will implement a similar database system for .net. 
The .net system will be running on a comparable, but completely separate 
infrastructure. 

Please refer to part 2-5-b-i: Facilities and Systems for a detailed description 
of the planned .net RSL architecture and part 2-5-b-xiv: Peak Capacities for 
additional information on scalability and excess capacity of the system 
components. In addition, part 2-5-b-v: Database Capabilities provides an 
overview of the registry database specifications.

(a) Handling of the Existing Registry Database

As for .de, DENIC will operate a redundant architecture for the .net database 
as it has proven to be reliable under all conditions. 

The size of the current .de production database is 169.7 GB for more than eight 
million registered domains with the largest table containing 170 million 
records. The database server setup contains eight CPUs and 48 GB main memory. 
Within the DENIC system, the database will be located in a high-performance 
mass storage system HDS.

Even the introduction of IDN which caused a peak load of more than 625,000 
registration requests in the first two days, was handled without any 
performance deterioration.

Please refer to part 2-5-b-v: Database Capabilities for further information on 
database specifications and part 2-5-b-xiv: Peak Capacities for details on IDN 
registration and handling of peak loads.


Scalability

As for .de, the .net database infrastructure will be easily and quickly 
scalable. The database server can be expanded without having to make changes to 
the infrastructure. To be able to also cover a higher-than-projected demand, 
servers with a higher capacity can be added to the infrastructure. 

Also the bound caches of the database servers for tables and indexes can be 
expanded up to the full extension of the UNIX server memory as the total size 
of the cache is limited by its memory size. The architecture and program 
interfaces are highly flexible to accommodate changing needs. Also the database 
system's peripherals such as the mass storage system or the backup system are 
highly scalable so that the .net data volume can be administrated. In the 
backup system, the number of tape drives is scalable from eight to 32, the 
number of tapes AIT-3 from 147 to 645 and the data capacity from 14.7 to 64 TB. 
Currently, only 50% of the available 14.7 TB are in use.

For the .net primary RSL and for the .net backup location, DENIC will allocate 
a disk capacity of 5 TB each. Compared to the current combined database size, 
DENIC will thereby provide an excess capacity of more than 2500% of the current 
database. 

As the current average engine busy utilization of the active database is at or 
below 40% today and less than 10% for the standby database, the .net system 
will be equipped with large excess capacity to cover the expected number 
of .net registration requests.

Please refer to part 2-5-b-v: Database Capabilities for details on the database 
architecture and systems, part 2-5-b-x: Backup for backup system specifications 
and scalability and part 2-5-b-xiv: Peak Capacities for further information on 
the database system scalability.

Capacity Planning

DENIC conducts regular assessments of the current capacities of its registry 
database (also network and other system components). During the budget planning 
phase, DENIC creates a 2-year plan for its IT architecture which is revised 
yearly. DENIC especially assesses whether assumptions and planned capacities 
have to be redefined. 

DENIC also monitors the whole database system in detail to early identify peak 
loads or increases in workload. Automated monitoring programs interpret the 
level of the critical values. According to the integrated escalation scheme, 
the monitoring system automatically sends notifications whenever the defined 
threshold values per component are exceeded. DENIC immediately reacts to these 
notifications by conducting root cause analyses.

Considering the monitoring results, DENIC is able to anticipate the need for 
critical resources well in advance and to decide on increases in system 
capacity e.g. system modifications, extensions or changes in the system 
architecture at an early stage. DENIC also holds regular meetings to develop or 
enhance the system architecture. 

Please refer to part 2-5-b-xvi: System Outage Prevention for details on 
monitoring.


(b) Projected Growth

For the .net registry, DENIC will build up a system which is similar to the 
existing .de system. The current registry database has enough excess capacity 
to handle 16 million domains which equals more than three times the current 
number of registered .net domains today (i.e. about five million domains).

DENIC currently expects the number of .net domains to grow about 60% until 2011 
according to the medium demand scenario of the business case. This equals about 
eight million domains by 2011. 

Therefore, the planned .net registry system will be dimensioned to handle the 
expected growth of the .net domains with sufficient headroom. As DENIC 
constantly monitors the growth of the .net domain number, DENIC is able to 
quickly respond to any higher growth by e.g. adding further system components 
to the expandable system infrastructure.

Please refer to part 2-4: Revenue and Pricing Model for a detailed description 
of the business case scenarios.


2. DNS Queries Including Peak Periods and Projected Growth

DNS Queries and Peak Periods

As for .de, DENIC will operate the .net name servers compliant to the standard 
for root name servers (RFC2870, paragraph 2.3).

It is part of DENIC's security and stability policy to keep the load of the 
database system components very low. DENIC committed itself to use 1.5% of the 
server response capacity under normal conditions and 5% under peak conditions 
at maximum. Therefore, DENIC currently exceeds the requirement set by RFC2870.

In addition, DENIC's comprehensive and highly effective monitoring system early 
identifies peak loads on servers. Thus, DENIC is able to adapt the components 
to the needs as required. DENIC also counteracts peak periods or increases in 
demand by constantly upgrading of the hardware components.

Projected Growth of DNS Queries

Over the past ten years, DENIC continuously tracked the number of queries at 
all .de name servers. Thus, DENIC expects a doubling of the number of queries 
every 3-4 months in the long run.

DENIC is also aware of the fact that new DNS uses or features like DNSSEC or 
Anti-Spam DNS-records are likely to further increase the query rate. Therefore, 
DENIC actively participates in relevant IETF working groups and will consider 
and point out operational consequences.

To ensure that the workload of the servers does not exceed 5% in peak periods, 
DENIC will regularly adapt its capacities to the projected growth.


3. (D)DoS Attacks, Viruses, Worms and Spam

DENIC receives and monitors various security and full disclosure mailing lists 
provided by CERT (Computer Emergency Response Team) or other parties (e.g. 
vendors). To remain informed about security problems and issues as well as to 
enhance its proactive defensive procedures, DENIC subscribed to dCERT several 
years ago, a professional service offered by T-Systems which is a subsidiary of 
Deutsche Telekom AG. dCERT regularly distributes up-to-date information on 
viruses, worms, security gaps or software bugs as well as possible solutions to 
the subscribers. (Please refer to http://www.dcert.de/index_e.html for further 
information.)

According to the priority of any issues related to (D)DOS attacks, viruses, 
worms and spam, DENIC's System Administration and Operations Team react to the 
messages and discuss appropriate procedures or solutions to protect against 
these threats.

To further protect its systems against attacks, viruses, worms or spam, DENIC 
also made comprehensive maintenance agreements with all software suppliers to 
receive relevant software upgrades when available.

In a current architecture upgrade initiative, DENIC will introduce multiple 
GBit connectivity and the appropriate new routers in order to enhance its peak 
capacities to effectively survive (D)DoS attacks. In addition to the enhanced 
network capacity, new SLAs with the ISPs ensure a quick response to protect the 
critical infrastructures.

Registry Database

As DENIC's registry database is located in layer five of the system 
architecture (see also part 2-5-b-i: Facilities and Systems), it is not 
directly accessible from the outer network. Viruses, worms, spam or (D)DoS 
attacks will not affect the database as DENIC's well-established, extensive 
filtering mechanisms block these attempts (see part 2-5-b-xiii: Security for 
details on filtering). The reaction to malicious queries is always part of the 
extensive testing all production software has to pass.

A comprehensive monitoring of the system components enables DENIC to quickly 
identify potential attacks against the DENIC system and analyze the source of 
the attacks.

DNS Queries

DENIC protects its name service against (D)DoS attacks and worms by providing 
very high excess capacities for all relevant components and a highly scalable 
system. As a consequence, the load per component is kept very low even under 
peak conditions. For example, the servers only use 1.5% of their full response 
capacity under normal and 5% under peak conditions. By providing these 
capacities, DENIC has fundamental reserves to compensate for attacks and to 
ensure a name service availability of 99.999%.

NSL Monitoring and Overload Detection

DENIC defined normal query rates for any NSL as well as for any server within 
the NSL. All NSL query rates are permanently monitored. Whenever a query rate 
exceeds the dynamically determined threshold value for more than a defined time 
period, a notification of this occurrence is sent to the Operations Team. 

DENIC automatically starts an internal analysis of the occurrence. The gathered 
data is filtered, sorted and analyzed. All results are forwarded to the 
Operations Team which then has to evaluate whether an attempt to overload one 
site or a (D)DoS attack on parts of the NSL structure or the entire NSL 
structure takes place.

Based on the results of the problem analysis, the DENIC Operations Team takes 
various actions, e.g. block the address ranges where the attacks came from.

(D)DoS Attacks on Networks

DENIC counters (D)DoS attempts in three ways. All systems are designed to 
handle excessive load. By providing these excess capacities, DENIC caters for 
simply answering the incoming requests instead of only relying on network 
mechanisms to block and filter unwanted connections.

The second way of dealing with attempts to overload the DENIC network concerns 
the network management and traffic engineering. As soon as attack sources are 
detected and grasped by the network, the incoming packets are already blocked 
in the External Network Layer. In addition, routes are blackholed as needed and 
traffic shaping is applied.

DENIC also counteracts the attempts by trying to stop them at the source. 
Therefore, DENIC cooperates with the NOCs of ISPs, either source or transport 
network owners.

The first way is the most important one in case of (D)DoS attempts, since there 
are too many sources to effectively filter or contact.

Viruses and Worms

Viruses and worms mostly affect DENIC's office environment, since this part of 
the network contains user workstations which are prone to these kinds of 
attacks. These workstations have no transparent access to DENIC's server 
systems. Viruses or worms appear in the office network only, if they were able 
to pass the office e-mail server's control mechanisms and the workstations' 
regularly updated virus detectors.

DENIC uses highly effective virus detection software to identify viruses and 
worms, and, if not removed automatically, to announce them to the workstation 
administration group. The group then immediately starts the manual process of 
cleaning any infected workstation. DENIC has never encountered a virus or worm 
spread through the office system to date. This was mainly due to the 
administrators' short response time.

For further details, please refer to part 2-5-b-xiii: Security.

Spam e-mails 

The DENIC system uses four entrance servers to handle incoming e-mail traffic. 
DENIC implements extensive state-of-the-art filtering and blocking procedures 
to avoid that the servers are attacked by spam e-mails. In addition, DENIC 
conducts comprehensive virus analyses.


4. Restart Capabilities

DENIC made comprehensive arrangements to be able to quickly restart its systems 
or components in the event of an outage. Non-critical systems can be restarted 
automatically, whereas critical systems have to be started manually e.g. to 
avoid inconsistencies.

For the event of an outage of the system or system components, DENIC ensures 
the 24/7/365 availability of the required personnel who is able to perform the 
appropriate restart procedures. A detailed description of the support concept 
including the incident and resolution policies is available in part 2-5-b-xix: 
Support. 

All authorized technical employees regularly participate in practical training 
sessions which focus on restarting the whole registry system or components of 
the system. The training also covers the switchover process between the primary 
and secondary RSL.

See also part 2-5-b-i: Facilities and Systems for a detailed description of the 
system setup, architecture and redundancy, part 2-5-b-v: Database Capabilities 
for details on the switchover process, part 2-5-b-xvi: System Outage Prevention 
for details on system redundancy, part 2-5-b-xviii: System Recovery Procedures 
for details on restarting of the system.

(iv) Describe the registry-registrar model and protocol; availability of a shared registration system, including processing times for standard queries (add, modify, delete); and duration of any planned or unplanned outages.

(iv) Registry-Registrar Model and Protocol

Highlights

* DENIC will offer a thick registry model for .net.

* DENIC's .net registry will support EPP natively.

* DENIC will support a smooth transition for registrars using RRP by 
implementing and supporting an RRP to EPP proxy for a period of time.

* DENIC is committed to implementing new additions to the standards as the 
community accepts them.


Responsibilities of Registry and Registrars

Every domain registry is responsible for the registration of domains, serving 
the community and delivering equitable, just, honest and competent services. 
Beyond these common goals there are different ways to organize a registry's 
work in general and the cooperation with the registrars in particular.

DENIC sees its main responsibility in maintaining a reliable, stable, and cost 
effective registry system with equal access to all registrars, and providing 
transparent and comprehensive information to the Internet community.

It is the task of the registrars to deal directly with the registrants, to 
offer them various services, provide them with direct support, act on behalf 
of their customers and forward their domain applications to the registry. As 
the registry provides reliable, secure, high-capacity systems and takes care of 
the technical infrastructure which is needed for running a TLD, the registrars 
can fully concentrate on the services for and direct interaction with the 
registrants.


1. Registry Model

Thick vs. Thin Model

Domain registries follow either the "thick" or the "thin" model for conducting 
registrations of domains.
With the "thin" model, only the operational data about each domain is stored in 
the central registry database while all contact data is maintained by the 
registrar who currently sponsors the domain name. The registry only knows the 
mapping from a domain name to a registrar, and knows about the name servers. 
whois services operated by the registry publish that mapping; the registrant's 
identity is then published by the registrar.
 
With a "thick model" the registry contains both the operational data for the 
domain and the contact data. Domain data is not stored by the registrars any 
longer but held up in the central registry database. Thus the registry's whois 
service publishes domain data as well as contact data. .net is currently 
designed as a thin registry, which means that information must be pulled from 
the registrars' whois service for domain information.
DENIC provides its services to the .de community by using a thick registry 
model and will implement the .net registry as a thick model as well. DENIC 
firmly believes the thick model to be superior to the currently used thin model 
of the incumbent, as it offers higher data integrity, security and increased 
performance. A detailed explanation of the advantages of the thick registry 
model can be found in part 2-5-b-xii: Whois Service.


2. Registry - Registrar Protocols and Interfaces

DENIC has a long and proud history as the .de registry.  This history means 
that DENIC has a great deal of experience with legacy applications that have 
served the community well. One such application is the e-mail interface to 
the .de registry system. This old technology is still satisfactory for a large 
number of .de registrars.
Although DENIC has the capability to provide an e-mail interface to .net, it is 
deliberately not supported for .net to are encourage universal adoption of EPP. 
If it appears in the future that an e-mail interface is desirable, this 
decision can be revisited and changed.
DENIC has a great deal of experience interacting with registrars, both on a 
technical and functional level. DENIC is known for its excellent operations and 
sensitivity to registrar issues. For the .de domain, all the technical support 
systems work seamlessly and without issue. As a result, DENIC has a very high 
degree of confidence that this history of excellence will continue and will be 
carried over to the .net domain.

The following sections describe:
* EPP - the nature of the implementation for .net
* RRP - supported via a central proxy at DENIC's RSLs
* RRI - not to be implemented for .net, a description of DENIC's current .de 
implementation to demonstrate our capabilities.

(a) Extensible Provisioning Protocol - EPP

DENIC will offer .net registrars its domain name registry functions compliant 
to RFC3730, 3731, 3732, 3733, 3734 in an EPP 1.0 implementation as well as 
Redemption Grace Periods as specified in RFC3915. Potential extensions to EPP 
performed by DENIC will follow the guidelines of RFC3735.
In order to support the thick registry functionality, contact data has to be 
supplied by means of the provisioning protocol. Therefore, all three object 
mappings (domain, host, contact) will ultimately be available ([RFC3731], [RFC
3732], [RFC3733]).

Constraints applied to the data provided through the EPP interface will be 
tightened during the migration phase from thin to thick registry. That is 
straightforward due to the modularity and flexibility of the protocol. In a 
first step, contacts are only optionally referenced by domains. In a second 
step, contact references are mandatory for every <create>, <update> or <renew> 
domain command. In a third step, every domain without contact references is 
considered invalid.

In order to define potential new features and object management capabilities, 
the guidelines described in [RFC3735] will be followed at any time. DENIC 
actively follows all initiatives that present extensions to the EPP standard 
within the IETF (e.g. DNSSEC-support like in "DNS Security Extensions Mapping 
for EPP" Internet-Draft, work in progress) and will be able to implement them 
with first-hand-knowledge if required.
The commands initially supported under DENIC's EPP installation are the 
following:

(i) Session Management 

EPP provides two commands for session management: <login> to establish a 
session with a server and <logout> to end a session with a server. The <login> 
command establishes an ongoing server session that preserves client identity 
and authorization information during the duration of the session.

* EPP <login> Command: The EPP <login> command is used to establish a session 
with an EPP server in response to a greeting issued by the server. A <login> 
command must be sent to a server before any other EPP command to establish an 
ongoing session.  A server operator may limit the number of failed login 
attempts N, 1 <= N <= infinity, after which a login failure results in the 
connection to the server (if a connection exists) being closed. A client 
identifier and initial password will be created on the server before a client 
can successfully complete a <login> command. The client identifier and initial 
password will be delivered to the client using an out-of-band method that 
protects the identifier and password from inadvertent disclosure.

* EPP <logout> Command: The EPP <logout> command is used to end a session with 
an EPP server. A server may end a session due to client inactivity or excessive 
client session longevity. 

(ii) Queries

EPP provides four commands to retrieve object information: <check> to determine 
if an object can be provisioned within a repository, <info> to retrieve 
detailed information associated with a known object, <poll> to receive service 
notifications from the server, and <transfer> to retrieve object transfer 
status information.
* EPP <check> Command: The EPP <check> command is used to determine if an 
object can be provisioned within a repository.  It provides a hint that allows 
a client to anticipate the success or failure of provisioning an object using 
the <create> command as object provisioning requirements are ultimately a 
matter of server policy
* EPP <info> Command: The EPP <info> command is used to retrieve information 
associated with an existing object.
* EPP <poll> Command: The EPP <poll> command is used to discover and retrieve 
service messages queued by a server for individual clients. If the message 
queue is not empty, a successful response to a <poll> command will return the 
first message from the message queue. 
* EPP <transfer> Query Command: The EPP <transfer> command provides a query 
operation that allows a client to determine real-time status of pending and 
completed transfer requests. 

(iii) Object Transformations 

EPP provides five commands to transform objects: <create> to create an instance 
of an object with a server, <delete> to remove an instance of an object from a 
server, <renew> to extend the validity period of an object, <update> to change 
information associated with an object, and <transfer> to manage changes in 
client sponsorship of an object.
* EPP <create> Command: The EPP <create> command is used to create an instance 
of an object. An object can be created for an indefinite period of time, or an 
object can be created for a specific validity period.
* EPP <delete> Command: The EPP <delete> command is used to remove an instance 
of an existing object.
* EPP <renew> Command: The EPP <renew> command is used to extend the validity 
period of an existing object.
* EPP <transfer> Command: The EPP <transfer> command is used to manage changes 
in client sponsorship of an existing object. Clients can initiate a transfer 
request, cancel a transfer request, approve a transfer request, and reject a 
transfer request using the "op" command attribute.
	
A client who wishes to assume sponsorship of a known object from another 
client uses the <transfer> command with the value of the "op" attribute set 
to "request". Once a transfer has been requested, the same client can cancel 
the request using a <transfer> command with the value of the "op" attribute set 
to "cancel". A request to cancel the transfer MUST be sent to the server before 
the current sponsoring client either approves or rejects the transfer request 
and before the server automatically processes the request due to responding 
client inactivity.
Once a transfer request has been received by the server, the server must notify 
the current sponsoring client of the requested transfer by queuing a service 
message for retrieval via the <poll> command. The current status of a pending 
<transfer> command for any object can be found using the <transfer> query 
command. Transfer service messages must include the object-specific elements 
specified for <transfer> command responses.
The current sponsoring client may explicitly approve or reject the transfer 
request. The client can approve the request using a  <transfer> command with 
the value of the "op" attribute set to "approve". The client can reject the 
request using a <transfer> command with the value of the "op" attribute set 
to "reject". 

A server may automatically approve or reject all transfer requests that are not 
explicitly approved or rejected by the current sponsoring client within a 
fixed amount of time. The amount of time to wait for explicit action and the 
default server behavior are local matters not specified by EPP, but they 
should be documented in a server-specific profile document that describes 
default server behavior for client information. Objects eligible for transfer 
must have associated authorization information that must be provided to 
complete a <transfer> command. 
* EPP <update> Command: The EPP <update> command is used to change information 
associated with an existing object. Its <restore> function is used to support 
the Redemption Grace Period policy.


(b) Registry Registrar Protocol - RRP 

In order to ease transition for the accredited .net registrars, DENIC will 
offer a RRP-EPP proxy that complies with VeriSign's proprietary RRP 2.0.0 [RFC
3632] and any following extensions that VeriSign will be make public (It is 
understood that VeriSign is currently using a version 2.1.2, but the 
specification is not yet public.) The proxy will be programmed and supplied by 
DENIC. Additionally it is DENIC's intention to have all registrars migrate to 
the widely accepted EPP in the medium term.
To enable the soft transfer from the current .net protocol, DENIC aspires a 
high transparency, a comprehensive documentation, how-tos, a test environment, 
help and guidance for tests and adjustment of own systems and the offer of 
several workshops. Details of the transition from RRP to EPP are described in 
the Transition Plan.

(c) Real-time Registry Interface - RRI

As described in the previous section on EPP, DENIC will comply with ICANN 
requirements and offer an EPP protocol according to the agreed standards. The 
following details on DENIC's RRI system used for the .de registry are therefore 
provided as evidence of DENIC's ability to run a real-time protocol with a 
thick model.
Currently DENIC sees no need and has no intention on supplying a RRI protocol 
interface for the .net registry. However, responsiveness to both the registrar 
and registrant community is one of DENIC's core values. Should the community 
of .net registrars request a RRI protocol for .net and should it be consistent 
with ICANN policies, DENIC is able and willing to implement this protocol in a 
short timeframe. 

Development of RRI for .de 
By statute, DENIC is required to provide a secure, solid registry interface to 
its registrars. To cope with the continuously increasing rate of transactions 
and to stay abreast of technical changes, DENIC decided to provide a real time 
interface (Real-time Registry Interface - RRI) parallel to the established and 
well proven e-mail interface.
Based on the registrars' requirements and the specific business and technical 
processes of DENIC, the new interface was defined in a joint project with 
registrars. One of the most important topics was the application protocol to 
be used.
RRI has already been implemented and deployed in our testing environment. 
Internal testing started at the end of November 2004 and registrar testing will 
start by the middle of January 2005. RRI will be operational and go live by the 
end of March 2005 at the latest.

RRI Compliance with Standards
RRI fulfills the general registry-registrar protocol requirements outlined in 
RFC3375, declares a data structure with XML and takes into account the 
recommendations for use of XML in IETF protocols stated in BCP70, RFC3470. RRI 
design took into consideration internationali-zation and localization and 
followed the relevant RFC2277, BCP18. RRI is transport independent. It can be 
used over BEEP (RFC3080) or TCP, where the latter is secured with TLS.
RRI currently supports IDNA [RFC3490], IPv6 DNS [RFC3596] and will support 
DNSSEC at the time of DNSSEC deployment in .de. RRI can be extended to support 
other emerging features due to its flexible design.


3. Performance of Registry Systems

Availability of a Shared Registry System
DENIC has consistently been able to provide high availability of the registry 
system for .de. Therefore DENIC will commit to a service level of 99.9% 
availability for the registry system for .net.

Processing Times for Standard Requests
With DENIC's EPP implementation and high performance databases all standard 
write transactions can be processed in very short time frames. Therefore DENIC 
guarantees a processing time of less than one second (excluding round trip 
time) 
for more than 98% of all add, modify, and delete and commands.

Duration of any Planned or Unplanned Outages
Complete redundancy at all levels of DENIC's registry system ensures low outage 
times. It has been DENIC's policy to always inform registrars far in advance of 
planned outages of the registry system. Current DENIC registrars have 
continuously voiced their satisfaction about DENIC's outage scheduling and 
information policy.
DENIC commits to the following SLAs for the registry system of .net:
* Total outage per month: 	<6 hours
* Unplanned outage per month:	<3 hours
* Unplanned outage per year:	<9 hours (equals 99.9% availability)
* Planned outage per week: 	<2 hours 
* Major upgrade outage: 	<6 hours (only twice per year)
With these commitments DENIC significantly improves the SLAs specified in 
Appendix D of the current .net Registry Agreement, thus committing to improve 
service for the .net community.


4. Innovation and Responsiveness to Community

Protocol Development
DENIC is actively involved in the development of new Internet standards within 
the IETF working groups. Key technical staff actively participates in the IETF 
process, and regularly attends IETF meetings.
DENIC has thus contributed significant input in the areas of protocol 
development like IDN, or DNSSEC. In the development of the CRISP service DENIC 
is assuming a leadership position within IETF. It is DENIC's outspoken goal to 
continue this active and fruitful collaboration with IETF and other 
international organizations in order to further promote the use of the Internet 
as well as its stability, performance and security.

Registrar Diversity and Interaction
DENIC currently supports more than 220 registrars in 12 different countries. 
The registrar structure is quite heterogeneous regarding the backgrounds, 
manpower, technical know how, financial strength, core work area and 
possibilities of the individual registrar. DENIC is encouraging this strong 
registrar diversity, as it is a source of different ideas, innovations, and 
abundant creativity - thus different offerings for different needs can be 
provided to the Internet user. 
Enhancements or new developments are always intensively discussed with DENIC 
accredited registrars to not discriminate against (smaller) registrars by 
changing technology that requires significant investments on the part of the 
registrars. Thus DENIC can guarantee equivalent access for a wide spectrum of 
registrars.
All registrars are informed at an early stage of a new development about 
DENIC's plans and impacts for registrars in order to enable their participation 
in the development process. Registrars' concerns are addressed at technical 
meetings, by the Technical Advisory Council, in technical web forums, joint 
work groups, etc. Details regarding the various forms of registrar interaction -
 especially in the development process - are described in detail in part 2-5-b-
xix: Support.

(v) Database capabilities including database software, size, throughput, scalability, procedures for object creation, editing, and deletion, change notifications, registrar transfer procedures, grace period implementation , availability of system with respect to unplanned outage time, response time performance; ability to handle current volumes and expected growth and reporting capabilities.

(v) Database Capabilities 

Highlights

* DENIC currently administers more than eight million domains, and has capably 
managed demand spikes, like the introduction of IDN when more than 625,000 
transactions in the first two days were handled without any performance 
deterioration. 

* DENIC has reserved a capacity of five TB on DENIC's primary HDS for its .net 
database, providing scalability for more than 2500% of the current database 
size.

* Object creations, editing and deletions are safeguarded by database stored 
procedures.

* DENIC has developed stored procedures to implement grace periods according to 
ICANN policies.

* DENIC has designed its database with the following four principles in mind:

(1) High Availability and Security
* Complete redundancy of all components
* Regionally dispersed data centers in world class hosting sites

(2)High Data Integrity
* Real-time synchronization between active and standby database
* Consistent database monitoring and maintenance to prevent data loss or 
corruption

(3) High Performance
* High excess capacities to handle peak requests
* Rapid response times through broad Internet connections and LAN backbone 
between database servers
* Perform complex operations on managed objects

(4) High Scalability and Flexibility
* DENIC's database infrastructure is easily and quickly scalable
* Flexible architecture and program interfaces to accommodate changing needs
* Fully internationalized support based on UTF8
 
DENIC uses separate databases for domain and billing data. The following 
chapter describes the currently productive .de database and the future 
productive .net database, while the billing database is described in part 2-5-b-
ix: Billing and Collection.

1. Database Architecture, Systems and Maintenance

Database Design Factors

The production .de database (NIC DB) contains over ten million domain objects 
and over 17 million contact objects. eight out of the ten million domain 
objects are active, and while the others have been closed over the time, DENIC 
keeps their history records for good business reasons. The database attributes 
are shown in Figure 1.

Ability to Handle Transaction Volumes

DENIC's .de database is currently handling between 2,000 and 2,300 write 
operations (insert, update, delete) per second.
The engine busy utilization percentage of the active database (db_active) is on 
average at or below 40%, the engine busy utilization of the standby database 
(db_standby) is on average below 10%, leaving enough capacity for transactional 
growth for all three business cases.
For the .net registration system DENIC expects an average engine utilization on 
a similar level, assuming a database size and transaction load that is 
equivalent to the .de registration system. 

Response Time Performance

Based on the current database engine utilization of the .de database, the 
response time for whois queries stays below 100 ms for status queries and below 
300 ms for domain queries. These short response times are the result of a high 
performance hardware solution combined with continuous maintenance and 
optimization of the database, all described in detail later in this chapter.
DENIC will commit to the same database response times for .net.

Ability to Handle Data Volumes

The production .de database currently uses 169.7 GB out of an allocated amount 
of 250 GB. The development of .de data growth since September 2002 is depicted 
in Figure 2. 

Under the conservative assumption of an equal data volume of .de and .net 
(currently .net is expected to be at 66% of the .de volume) there would be a 
total data volume of around 350 GB.
Planning ahead for the potential win of the .net bid DENIC has reserved a 
capacity of five TB on DENIC's primary HDS for its .net database, providing 
scalability for more than 2500% of the current database size. The HDS at the 
secondary RSL also has a disk capacity of 5 TB.

Database Structure and Data Model

Data fields will be mapped in an object oriented manner in a relational 
structure.

Server Architecture 

To ensure availability DENIC employs a redundant database setup. The two 
database servers, db_active and db_standby, are based on the exact same 
hardware (see Figure 3) and are located in different data centers. The 
databases on both servers are synchronized in real-time, so that no data loss 
can occur.

Data Storage

The NIC database is located on the HDS (StorEdge 9990) in DENIC's Storage Area 
Network. This high-end storage system is fast and has an extremely high 
availability 24/7/365. Details about the SAN technology are described in part 2-
5-b-i: Facilities and Systems.

Data Backup and Database Monitoring

DENIC's Backup and Data Escrow policies are described in part 2-5-b-x: Backup 
and in part 2-5-b-xi: Escrow, and Database Monitoring is handled in part 2-b-b-
xvi: System Outage Prevention.

Database Maintenance

The database is designed in a manner to prevent additional maintenance as much 
as possible. For instance, DENIC is using clustered indexes and locking schemas 
which prevent fragmentation. However, in rare cases DENIC has to use a 
different locking schema in order to avoid locking contention which need 
regular maintenance in order to keep the performance.
Maintenance activities include such tasks as dropping and re-creating indexes, 
performing dbcc checks, reorg on tables and indexes and updating index 
statistics.


2. Database Procedures and Functions
This chapter contains the description of the future .net database and its 
functionality.

(a) Database Integrity

Database integrity is guaranteed on several levels. On the lowest level, the 
level of the database server, all safety mechanisms of the Sybase database are 
used:
* Referential integrity by primary and foreign keys
* Transaction security
* Constraints
* Default clauses
* User and user rights management

By restrictive assignment of the user rights, manipulation of the database is 
impossible by means of ad hoc SQL commands. This helps to ensure database 
integrity during data changes made by applications as well as when changes are 
made by DENIC staff.

On the application level database integrity is ensured by abstraction of the 
objects and business processes with stored procedures which guarantee that 
related data is manipulated at the same time and that relations are always 
checked at deletion of objects. 

All objects in the .net database are managed by stored procedures. The use of 
stored procedures guarantees that all necessary references between the objects 
are maintained and protects the system against SQL-Injection attacks. With the 
stored procedures the database is protected against carelessly implemented 
applications and/or the SQL commands used therein.

By appropriate right assignment it is only possible to create, to manipulate or 
to delete objects on the database with the help of these stored procedures.
Most of the database activity will be initiated by the SRS system, which, based 
on business processes, maps the EPP commands into stored procedures. 
They also return if the transaction is chargeable for the registrar or not. The 
billing service will be called depending of the result of these queries.
The remaining object management is triggered by DENIC staff through defined 
interfaces, e.g. to create and update registrar objects and object attributes 
like authentication records. Again these business processes will be mapped into 
stored procedures.

(b) Database Objects

The object oriented database model comprises of four central objects, which 
carry the actual state of the domain data (registrar, domain, host and 
contact). For each object created, changed or deleted, a history record is 
written with the same procedure call that is part of the transaction. It 
contains the timestamp of that change as well as the type and content of it.
With the help of the history record, any past state can be determined at any 
time. It is a good and proven business practice to keep a complete 
documentation on any action undertaken.

(i) Registrar Object
The registrar object is the root object in the database. It is the only object 
which may exist without linkage to other objects.
Registrar objects contain all necessary data of the registrar.
Registrar objects may be linked to domain, contact, and history objects. 
It is ensured by means of a suitable authentication process that each registrar 
can make changes only to their own domain, contact, and host data. 
Authentication information is a part of registrar objects.

(ii) Domain Object
A domain object contains the domain name as primary key. The expire date (end 
of the paid registration time), and the status are stored as well as necessary 
data for the implementation of the grace periods.
A domain object must be linked to registrar, contact and host objects and has 
references to its history records.

(iii) Host Object
A host object contains the name server information for a domain.
A host object may be linked to a domain object or to a registrar object.

(iv) Contact Object
Contact objects are used only with  the thick registry model.
The contact object contains a complete data record (name, address, telephone, 
fax, email,...) as well as disclosure policy information about this data record.
The contact object must be linked to registrar and may be linked to domain 
objects.

(c) Database Procedures

(i) Object Creation
Database object creation is triggered by appropriate request through our SRS 
system and defined interfaces as described in Figure 4.
Where it is expedient, incorrect entries are excluded and matching entries are 
forced through the use of a primary or foreign key. 
	

(ii) Object Editing
A registrar object can be changed by a DENIC staff member if there is an 
appropriate request from the registrar. For security reasons there is no 
automatic processing for these orders. They are examined by employees and 
executed. A history record is written. This principle of manual checks also 
applies to authentication attributes.
A domain, host and contact object is edited automatically in accordance with an 
appropriate SRS request. For details refer to Figure 5.

(iii) Object Deletion
Only host and contact objects can be deleted from the database. Throughout, the 
deletion process checks will be made so that the objects subject to the 
deletion are no longer referenced. For details refer to Figure 6.

(iv) Registrar Transfer Procedures
Transfers are stored in the database and linked with domain and registrar 
information. The transfer records contain inter alia transfer grace period 
information. For details refer to Figure 7.

(v) Grace/Pending Period Implementation
All stored procedures for domain treatment examine during their execution 
whether the domain in question is within one the following periods.
Grace Periods:
* Add Grace Period -- the Add Grace Period is a specified number of calendar 
days following the initial registration of a domain.
* Renew Grace Period -- the Renew Grace Period is a specified number of 
calendar days following the renewal of a domain registration period.
* Auto-Renew Grace Period -- the Auto-Renew Grace Period is a specified number 
of calendar days following an auto-renewal.
* Transfer Grace Period -- the Transfer Grace Period is a specified number of 
calendar days following the transfer of a domain
Pending Periods:
* Redemption Grace Period -- all domains deleted outside the Add Grace Period 
will be placed in the RGP. During the RGP, the registrar who erroneously 
deleted the domain previously, may restore it.
* Redemption Hold Period (begins after redemption grace period) -- at the 
conclusion of the 30-day RGP, domains not requested for restore, are placed in 
the Redemption Hold Period for the following five days waiting for deletion. 
The database provides a stored procedure to delete these domains finally.
* Transfer Pending Period (begins after domain transfer command) -- during the 
Transfer Pending Period, the current registrar may answer to the transfer 
request, to approve or reject it.
* Restore Lock Period -- after the name has been restored, it will be placed 
into a Restore Lock Period.

(d) Change Notifications

Change notifications are handled at the application level. The database 
provides information about changes to the SRS-System, which is responsible for 
notifying interested parties.
If the registrar uses the EPP protocol, the EPP <poll> command can be used to 
get these notifications. For other registrars email notifications are sent.

(e) List Generation / Reporting Capabilities

All predefined reports and lists (e.g. zone files) are generated by using 
stored procedures. The use of stored procedures even for standardized read 
access ensures

* Data protection
(Stored procedures are a good security mechanism to control access to 
information in tables. Selects on a table can be denied, but a stored procedure 
allows to see certain rows or columns.)

* Best possible optimization of database queries
(Stored procedures run much faster than standalone statements for several 
reasons, e.g. the execution plan is saved, through design and testing it is 
assured that the best possible indexes are established and used)

* That queries generating a high load are serialized
(DENIC has implemented a mechanism that prevents concurrent use of certain 
stored procedures, that create a high load)

If reports that differ form the predefined reports are needed for any reason, 
they will be created by experienced DENIC staff having a special access right.
Details about available standard reports, access procedures, report generation 
frequency and zone file generation are described in part 2-5-b-xix: Support, 
part 2-5-b-ix: Billing and part 2-5-b-vii: Zone File Generation.


3. Architecture Redundancy and Switchover Procedures
As described in this chapter the .net database will be operated in a redundant 
fashion on two identical database servers in geographically dispersed 
locations. Should one server fail, the other will take over without any data 
loss. 
The servers are replicated and configured in warm standby mode through a 
replication server via a 100 MB LAN connection (see Figures 8 and 9).

Switchover Concept

As both databases are synchronized (see sub chapter Server Architecture above) 
they can switch the role db_active and db_standby anytime (switchover concept). 
By using the described latency monitoring, it is ensured that all data is up to 
date.
Both databases use virtual (non primary) IP addresses as endpoints for 
application connections. The switchover concept is based on the use of these 
virtual IP addresses. The applications connect to a virtual interface 
(db_active or db_standby), which is started on either one of the servers and 
will afterwards be made available to the ASE server after its restart.
In case of a switchover, the standby database is checked to be current via the 
mechanism for measuring the latency. Zero latency means all transactions from 
db_active are transferred to the standby system. 

Synchronization Checks

Once every week an executable program "rs_subcmp" compares a replicated table 
to the primary version of the table. rs_subcmp compares the primary and 
replicate rows and creates lists: 
* Missing rows - rows at the primary, but not at the replicate 
* Orphaned rows - rows at the replicate, but not at the primary.

Availability of System with Respect to Unplanned Outage Time

During the switchover procedure described above there will be a minimal down 
time for read and write applications - less than 10 minutes. These downtimes 
during unplanned switchovers are accounted for in DENIC's commitments to no 
more than three hours unplanned outage per month and no more than nine hours 
unplanned outage per year.


4. Current Database Architecture Initiatives
DENIC is consistently enhancing its architecture in order to reduce answer 
times, further strengthen reliability and increase overall stability of the 
Internet. Currently three initiatives for increased database performance are 
under evaluation:
* Improved whois service through dedicated database replicas 
* Increased database availability by addition of failover methods
* Increased availability through additional complete replica



(vi) Geographic network coverage, including physically diverse sites and support of growing and emerging markets.

(vi) Geographic Network Coverage

Highlights

* DENIC's primary registry service location is located in Frankfurt for .de 
and .net, with the .de secondary registry service location at COLT in 
Frankfurt, and the .net registry location planned at one of the major 
international access points in London, Amsterdam, or the US East Coast.

* 14 .net name server sites will be operational by June 30, each with multiple 
name servers - .net infrastructure implemented in eleven existing .de name 
server sites worldwide, three additional .net name server locations in North 
America.

* Five additional .net name server locations to be opened until the end of 
2005 - all of them in emerging markets. 

* DENIC will provide helpdesk services to registrars from two service 
locations, with DENIC's Frankfurt headquarters being the main .net service and 
support location. Additionally, DENIC will establish an second support location 
in Canada at a service provider which will be totally dedicated to the .net 
domain and focus on 24/7/365 English language support.

* DENIC is committed to consistently expand its geographic coverage as needed 
with a focus on emerging markets.


Types of Service Locations

DENIC divides its service locations into three types of locations: 
* Registry service locations (RSL) - Providing Registration Services
* Name server locations (NSL) - Providing DNS Services
* Service and Support Locations - Providing Support for Registrars and 
Registrants


1. Registry Service Locations

DENIC's primary .de Registry Service Location is located within its data center 
at the headquarters location in downtown Frankfurt. The secondary .de RSL is 
located at the COLT Internet Service Center (ISC) at the eastern end of 
Frankfurt, approximately six miles away.
The .net RSL infrastructure will be equivalent and completely independent from 
the current .de structure. The primary RSL for .net will be located within our 
data center at our Frankfurt headquarters. DENIC is committed to locate the 
secondary .net RSL at one of the major international access points. Currently 
options in London, Amsterdam, and the US East Coast are under evaluation.

DENIC will carefully assess all potential locations regarding stability, 
security and performance criteria for a RSL. DENIC's decision regarding a 
location will be finalized and letters of intent will be signed by February 
2005. If DENIC is awarded the .net registry contract, it will immediately sign 
the hosting contract with the selected provider and build the RSL in order to 
be operational by June 30, 2005.
Due to the high scalability of the current .de infrastructure, DENIC will be 
able to offer test systems for .net at a very early stage on the existing .de 
infrastructure.


2. Name Server Locations 

Current .de Locations for .net

Currently, DENIC has an extensive infrastructure with eleven authoritative name 
servers for .de distributed around the world (see Figure 1). The strong focus 
on Germany and Europe has been deliberately chosen to optimize performance for 
the .de community. One of the two Frankfurt servers is located in the primary 
RSL, the other one is directly connected to DE-CIX, Germany's biggest and 
Europe's third-biggest exchange point. All of these current .de locations will 
also serve as .net locations with equivalent but completely independent 
infrastructure.

Additional .net Locations in North America

As the .net community has a strong concentration in North America, DENIC will 
expand its name server infrastructure if awarded the .net bid. Specifically 
DENIC will deploy three additional .net name server locations at major access 
points, with the exact locations to be decided upon after a detailed analysis 
of network traffic. DENIC anticipates the following locations:
* One East Coast location
* One West Coast location 
* One location still to be decided upon 
All three new locations as well as the existing eleven .de locations will be 
operational as .net NSLs by June 30, 2005.

Additional .de and .net Locations in Developing Markets
Independently of the .net bid DENIC will expand its geographic reach by at 
least five more locations in 2005 to offer the best possible access for the .de 
community. The focus of DENIC's geographic expansion are developing and 
currently underrepresented markets. Therefore the locations to be established 
in 2005 will be:
* South Africa (likely Cape Town)
* South America (likely Brazil)
* China / India / Taiwan (tbd)
* Singapore / Australia (tbd)
* Eastern Europe / Russia (likely Moscow)

By adding these locations DENIC will minimize response times in these 
developing regions and offer equal quality of service to users around the 
world. If DENIC is awarded the .net bid, DENIC will implement these locations 
as .net NSLs as well, adding another five .net locations to its global network. 
These locations will be implemented sequentially in Q3 and Q4 of 2005 and all 
of them will be operational at the latest on December 31, 2005.

Complete .net Name Server Infrastructure

DENIC will have 14 .net name server locations operational by June 30, and 
19 .net name server locations by December 31, 2005 (see Figure 2). By providing 
this infrastructure DENIC ensures not only continued high-quality DNS 
resolution in North America but also significantly improves .net DNS services 
to Europe, Asia and other currently underrepresented markets. With its 
extensive geographic network coverage and the commitment to further expand the 
network as needed, DENIC is in an unparalleled position to provide high-class 
DNS services to the .net and general Internet community.

Provider Diversity

While geographic coverage is one key aspect of delivering reliable and fast DNS 
services, it alone will not suffice. Therefore DENIC has contracted its current 
eleven name server sites to ten different hosting companies, ensuring an 
unmatched provider diversity. Details about the name server location hosts, 
setup and infrastructure are described above in this chapter, and details about 
DENIC's multi-vendor strategy are described in part 2-7-ii: Multiple Suppliers.


3. Operations and Support Locations 

Joint .de and .net Operations and Support Location in Frankfurt
DENIC's current .de operations and Service Team in the Frankfurt headquarters 
location will be enlarged to handle both .net and .de requests. Support will be 
offered both in English and German from 6 a.m. to 8 p.m. local time (5 to 19 
UTC) for all kinds of service requests. 

Dedicated .net Operations and Support Location in North America
DENIC will establish an Operations and Support location in North America 
totally dedicated to the .net domain. This will be done at a second support 
location in Canada at a service provider which will be totally dedicated to 
the .net domain. Support will be offered in English between 16 and 7 UTC, so 
that together with the Frankfurt location support in English will be guaranteed 
24/7/365, with five hours of overlap at both switchover times.

Additionally, three call back languages (Korean, French, Spanish) will be 
introduced in either of the locations within the year 2005 to be able to 
resolve questions in the native language of the registrars.
Details on both facilities are given in part 2-3-b-iii: Description of 
Facilities, and a extensive description of offered services holds part 2-5-b-
xix: Support.


4. Commitment to Develop Emerging Markets
DENIC has a ten year track record of delivering first class service, and 
upgrading network infrastructure is one of the key aspects in fulfilling this 
mission. As described, DENIC will therefore expand its name server 
infrastructure by eight locations - five of them in developing and 
underrepresented markets - within the year 2005 to effectively serve the .net 
and the .de community. 

Furthermore DENIC is committed to consistently expand its geographic coverage 
as needed. Being a not-for-profit entity all revenue will flow into operations, 
support and upgrade of .net infrastructure - enabling DENIC to invest more into 
additional and improved infrastructure than a for-profit company. DENIC will 
also continue its support of registries of developing countries through 
sponsoring of root servers and DNS resolution services as well as through 
infrastructure donations.



(vii) Zone file generation including procedures for changes, editing by registrars and updates. Address frequency, security, process, interface, user authentication, logging and data back-up.

(vii) Zone File Generation

Highlights

* Highly secure zone file because of prohibition of manual access

* High data integrity of zone data through extensive consistency checks

* Extensive experience of DENIC in zone file generation for a larger TLD

* High zone quality as evidenced through positive independent reports

* Constant logging and monitoring of zone file generation

* Complete archiving of all created zones with unique serial numbers to enable 
unequivocal identification of individual zone files


DENIC is committed to maintaining the integrity of the zone file. As a result, 
it is DENIC's policy to not allow any direct manual write access to zone files 
whatsoever. Registrars cannot update zone information directly in the zone 
file. DENIC's zone update process happens in three defined sequential steps:

1. Updates of domain data in DENIC's registry database by the registrars via 
the registry system (see below).

2. Zone generation with several consistency checks (see below).

3. Zone distribution and publication - described in Part 2-5-b-viii: Zone File 
Distribution.


1. Data Changes and Updates of Zone File

Process

It is solely the registrars' responsibility to keep domain data up to date. 
DENIC will not initiate changes of any kind. Procedures for changes and updates 
by registrars are defined by the protocols in use (EPP and RRP) and are 
described in Part 2-3-a: Proposed Registry Services.

Security and User Authentication for Data Updates

Registrars do not access the main database directly, but rather through several 
security layers and via the Service Provisioning Layer as mediator. The layer 
structure of DENIC's RSLs is described in part 2-3-b-iii: Description of 
Facilities, with additional security aspects described in part 2-5-b-xiii: 
Security.

Changes in the domain data can only be performed by the authorized registrar - 
the one that is maintaining that specific domain. In order to initiate changes 
in domain data, registrars have to authenticate themselves to be granted 
authorization for domain data updates. The registrar authentication procedures 
are described in detail in part 2-5-b-xiii: Security. 

Access rights for DENIC staff are defined via clearly specified roles which are 
described in detail in part 2-5-b-xiii: Security.

Interface

All transactions in DENIC's main database can only be made via the registry 
system, which can be accessed for .net via RRP and EPP protocols. Support of 
these protocols is described in detail in part 2-5-b-iv: Registry-Registrar 
Model and Protocol, in part 2-2-b: Equivalent Access (Protocols) and in part 2-
8: Transition Plan.


2. Zone File Generation

(a) Process and Consistency Checks for .net Zone

The DENIC main database db_active has a real time synchronized copy db_standby, 
so redundancy exists for all domain data. All zone files will be generated from 
this main database copy.

Consistent with current .net practices, there will be no registrant 
authoritative data present in the zone, just NS records for delegation and 
potential future additions necessary to support DNSSEC as well as glue records. 

The data to be extracted from the database includes the domain name, the names 
of the name servers and the glue A and glue AAAA records where applicable. The 
SOA record is generated automatically as is the list of authoritative name 
servers for the .net zone. 

For the generation of a new zone file the domain data on DENIC's registry 
database will be read by the zone generation server from the db_standby. To 
speed up the zone file generation it is executed in parallel processes. 

To safeguard against failures or omissions during the zone generation process 
the newly created zone file will be checked for several indicators including, 
but not limited to:
* the file size in characters
* the number of lines in the file
* the number of owner names within the file
* the number of IDNs in ACE (starting xn--)
* changes of those numbers compared to previous version, i.e. first derivative.

Should any of those values differ from those of the previous zone by more than 
a specific, continuously adapted threshold, the operations team will be 
notified and the discrepancy will be analyzed before the new zone is 
distributed to the name server locations. This procedure ensures utmost data 
integrity and accuracy of distributed .de zones.

The consistency checks described above make use of heuristics trained through 
years of experience while operating the .de zone. Actual numbers and trends 
for .net will differ, but DENIC is prepared to phase in a similar process 
for .net quickly during the transition period. Cooperation from the incumbent 
operator would be helpful and appreciated.

(b) Frequency of Updates

Following .de practice there will be eight zone file updates per day in regular 
three hour intervals. DENIC has consciously decided against real-time zone file 
updates, details are described in Part 2 -5-b-viii: Zone File Distribution and 
Publication.

(c) Emergency Zone Generation Procedure

Generally the Zone File Generation Process will be started automatically in 
regular three hour intervals. However, should the need occur, the process can 
be started manually by authorized personnel within DENIC's operations 
department. 

The manual start of the Zone Generation Process is limited to emergency 
situations in which the immediate publication of a new zone is required. DENIC 
does not have either a positive or negative list of qualifying incidents and 
reserves the right to make the decision about an emergency update upon receipt 
of the update request. Incorrect zone information seriously endangering the 
stability and security of the .net zone or the Internet in general are examples 
of such instances.

It is DENIC's policy - even given special circumstances - not to allow manual 
changes to the zone file, neither from registrars nor internally from DENIC's 
own operations staff. By taking this very strong stand against direct manual 
manipulation of zone information DENIC ensures highest zone accuracy and 
effectively prevents abuse. The updated zone will be loaded on all name servers 
after less than 60 minutes from the receipt of the update request. Any changes 
to the data must have been initiated and processed through the normal channels.


3. Zone Generation Logging, Monitoring and Backup

(a) Logging and Monitoring

All steps in generating new zone files and checksums are monitored and logged 
consistently. Additionally to the consistency checks described above DENIC 
monitors the adherence to clearly defined thresholds and assesses potential 
long-term trends regarding zone file devel-opment. The operations team is 
immediately informed of errors or potential long-term threats. 

(b) Archiving and Backup

All DENIC zone files contain a unique serial number, which enables archiving 
and correct association to specific dates. Consequently, every zone that has 
been generated will be archived for future references. Based on the zone 
archive DENIC can reconstruct the content of the .net zone at every single 
point 
in time.

Archived zone files are saved to DVDs in regular monthly intervals. These 
backup DVDs are stored in safes either at the DENIC headquarters or at a third 
party location. 

Further details regarding general backup are described in Part 2-5-b-x: Backup.

(viii) Zone file distribution and publication. Locations of name servers, procedures for and means of distributing zone files to them.

(viii) Zone File Distribution and Publication
 
Highlights

* Distribution of compressed diff files instead of complete zones, therefore 
the zone distribution is fast and resilient against malfunctions in the data 
transmission

* Checks of correct zone distribution through use of several MD5 checksums

* Constant monitoring of zone distribution and server restart process

* Fast access to .net zones through 14 .net NSLs by June 30 and 19 .net NSLs by 
December 31, 2005


1. Zone File Distribution 

(a) Distribution Process

After the newly generated zone has been transferred from the Zone Generation 
Server to the central NSL Management Server, a diff zone file will be generated 
by comparing the new zone to the last zone file which is stored on the NSL 
Management Server. Another MD5 checksum is generated, this time for the zone 
diff file. 

Using SecureCopy (scp) the compressed diff file is distributed to the loghosts 
of the name server locations via the Out-of-band-Management connection (for 
details see part 2-5-b-i: Facilities and Systems). By distributing compressed 
diff files instead of complete zones the zone distribution is very fast and 
reduces the probability of data corruption. 

A new MD5 checksum of the transferred diff file is generated on the loghost and 
compared to the existing MD5 checksum of the diff file on the NSL Management 
Server. Only in case of an exact match the loghost will generate the new zone 
by merging the existing zone with the newly received diff file. Another MD5 
checksum is generated for the patched zone file and compared with the MD5 
checksum of the original zone file on the Zone Generation Server. This process 
of using two checksums ensures the integrity of the patched zone file. In case 
of checksum inconsistencies the newly patched zone file is rejected and the 
generation of a new zone file is requested from the central database.

Correct MD5 checksums will trigger the loghost to distribute zone files to the 
three name servers within the NSLs via scp. The zone reloads are run 
sequentially over the servers, always ensuring availability of at least two 
servers per location. The complete zone file distribution process is shown in 
Figure 1.

During the time of the zone reload the affected server will automatically be 
removed from the setup. The remaining two servers will pick up the additional 
load and the downtime of the individual server will not be noticed by anyone on 
the outside.

In the unlikely event that an error with the zone file has not been detected 
through the previous consistency checks and doubled MD5 checksum processes, the 
first server to be updated with the new zone can not successfully be restarted. 
The two remaining servers will then continue running with the previous zone 
file and no interruption of the service and availability of any single NSL will 
occur.

Any such unexpected event will be noticed by two separate monitoring 
mechanisms: (1) the ongoing monitoring of the name server and the restart 
process through the Operations Team, and (2) the immediate notification of the 
Operations Team through the automated monitoring feature. The Operations Team 
will then take the following actions:

* All restart attempts with the defective zone in other locations are aborted
* The Operations Team starts the missing server with the still existing 
previous zone - which is available on every server for security reasons
* The error in the zone is analyzed and the reason for the error is eliminated
* A new and correct zone is generated and the normal zone distribution process 
is initiated

(b) Monitoring of Zone File Distribution

All steps in distributing diff zone files to loghosts and servers as well as 
comparing checksums are monitored and logged consistently. Examples for 
specific monitoring activities of the zone file distribution are:

Success and Duration

Both success and duration of the zone distribution are monitored consistently. 
If the duration of the distribution to any location exceeds a defined 
threshold, information is sent to the Operations Team immediately. In case of a 
consistent increase of distribution duration to any location the logs will 
generate warnings and the Operations Team will counteract the development.

Distribution and Server Restarts

The process of zone distribution and server restarts is completely automated 
with every step being monitored. The measured data is continuously visualized 
and checked by the Operations Team. Displayed data includes per NSL: 
* current status
* serial number of the currently published zone
* currently active DNS software
* current activities (e.g. secure copy of zone, server restart)
* result of these activities
* time of last status change
* query load (q/s)

The information is depicted in different colors depending on whether the 
parameters are within the defined boundaries, within the security margin or 
outside the acceptable threshold corridor in order to immediately alert the 
Operations Team in case of potential or actual problems.

This graphic monitoring tool enables DENIC operations to permanently have an 
overview of all deployed name servers worldwide. The system is scalable both in 
terms of number of locations and name servers as well as in terms of monitored 
parameters.

(c) DENIC's Position on High Frequency Zone Updates

DENIC believes that for the operation of a registry the stability and accuracy 
of the DNS resolution process as well as the accuracy and timeliness of the 
registration process are of utmost importance. The DNS was not designed to 
distribute rapidly changing data and although features like dynamic update have 
evolved over time, DENIC believes these features not only address needs more 
dominant further down in the domain hierarchy but also imply or at least invite 
choosing operational parameters (i.e. TTL values) in a way detrimental to the 
efficiency and stability of the overall DNS if applied at the TLD level. While 
committed to quick registration, DENIC sees its responsibility in not entering 
into a competition focusing on only a small aspect of the overall registration 
process ('time-to-DNS') at the cost of jeopardizing long term stability.
As has been documented in a working document of the IETF named 'Observed DNS 
Resolution Misbehavior' based on experience made by the incumbent .net 
operator, TTL issues can put an unnecessary burden on the infrastructure.
Effectiveness and influence of DNS caches and caching are subject to research 
within the IETF and other groups and DENIC will actively participate in and 
support such efforts. DENIC will review its position regularly based on the 
latest research and developments within the DNS community.
DENIC is strongly confident that the .net TLD can and will evolve and be 
competitive with the change frequency proposed in this document.

(d) DENIC's Position on the Use of AXFR

With the current and proposed setup, all name servers for .de and .net will be 
under the sole operational control of DENIC itself. Consequently, there is no 
need to provide an interoperable, standards compliant (i.e. AXFR) way of 
accessing the zone data off a name server, the distribution mechanism is a 
private matter subject only to stability, efficiency and accuracy 
considerations. Potential future reassignment of the .net registry is not 
encumbered since a zone file compliant to STD 13 is always involved in the 
generation and distribution process.
DENIC has chosen not to use AXFR in favor of a proprietary scp based solution 
for reasons of efficiency and integrity. While the latter could have been 
achieved with TSIG (RFC2845), the amount of data to be transferred and thus the 
time needed would be unnecessary large compared to the actual changes. IXFR 
(RFC1995) is also not an option because it is still less efficient than 
compressed data transfer and it is not yet available for all our 
implementations or assumes use of other features (e.g. DNS Dynamic Update) 
not applicable in this context.


2. Name Server Locations

Today, DENIC's eleven Name Server Locations (NSLs, see part 2-5-b-vi) are 
distributed around the world with a focus on Europe to serve the .de community 
in the best possible way. New .net infrastructure - while being completely 
separate from .de - will be located in the same facilities as the .de 
infrastructure currently is.

For .net DENIC will establish three additional NSLs at major access points in 
North America in consideration of the concentration of the .net community in 
the US and Canada. These NSLs will be fully operational by June 30, 2005.
Additionally to these three NSLs and independently of the .net decision DENIC 
will expand its geographic network by five NSLs in 2005 with a focus on 
developing and currently underrepresented markets. These locations will 
sequentially be implemented in Q3 and Q4 of 2005, and all of them will be 
operational as of December 31, 2005.

Consequently, DENIC will serve the .net community with 14 NSLs as of June 30, 
2005, incrementally add additional name servers in Q3 and Q4 and have all 19 
NSLs fully operational by December 2005. The details regarding DENIC's 
geographically dispersed name server architecture are described in Part 2-5-b-
vi: Geographic Network Coverage, including graphs and network addresses. The 
NSL setup is described in part 2-5-b-ii: Stability and Performance.



(ix) Billing and collection systems. Technical characteristics, system security, accessibility.

(ix) Billing and Collection Systems

Highlights

* The .net Billing and Collection (B & C) system will be able to fulfill all 
functional .net B & C requirements such as creating individual reports, debit, 
credit and monitor registrar accounts or initiate low-balance notifications.

* All billable transactions are processed and recorded in real-time. 

* The system is able to handle the large amount of accounting information 
needed to provide a detailed and regular charging of .net registrar 
transactions.

* The billing cycles and service prices can be flexibly determined as required, 
e.g. per hour, day, month, quarter, year. 

* Invoices can be created at any time.

* New types of transactions can be added at any time.

* The B & C system will generate detailed online account reports for every 
registrar on demand for a specified time period; reports are available online 
for 24 months.

* DENIC will enforce strict security procedures on the network, the system and 
the user level.

* All invoices and reports will strictly comply with German law and standards. 
All information will be available for the current fiscal year and or a 
succeeding period of ten years.  

DENIC is highly committed to provide a fair and transparent billing process. 
Therefore, DENIC will establish a clearly defined and efficient billing and 
collection system for the .net registry services which will be fully compliant 
with international norms as well as German law and standards.

1. Functional Overview

The main target of the DENIC .net Billing and Collection (B & C) system is to 
maintain the registrars' account data which represent the basis for invoice 
creation, audit tracking and financial reports.

The DENIC B & C process is based on deposit accounts which will be established 
for each registrar client. DENIC will debit the accounts for all registrar-
related registry services payments and fee-initiating services (e.g. domain 
registrations, domain renewals) as long as the deposit account has a positive 
balance. In this context, the B & C system will be flexible in several aspects:

* The billing cycle (e.g. per hour, day, month, quarter, year) as well as the 
configuration of service prices are flexible and can be modified just as 
required.
* Invoices can be created at any time.
* New types of transactions can be added at any time.
 
The DENIC B & C system will handle all required B & C functionalities, 
including:
* Collect registrar-related account information
* Create individual reports 
* Debit and credit registrar accounts
* Monitor the registrar accounts
* Initiate low-balance notifications 
* Enable registrars to view accounts
* Online credit accounts payment
* Track and report historical information

Figure 1 provides an overview of the DENIC B & C process.


The registrar sends all requests to the .net registry system. Within the 
system, the .net registry database processes the requests. For any billable 
action the B & C system is called. The B & C system checks the registrar 
deposit at first to verify that sufficient funds are available to complete the 
transaction. If this check is successful, the B & C system returns a positive 
response to the registry system, which then processes the request. After the 
request processing has been successfully completed, the B & C system is called 
again to debit the account and record the transaction in the B & C database. If 
the account balance is insufficient, the registrar will be notified and the 
transaction will be canceled. The registrar receives a monthly invoice which 
includes an overview of all completed billable transactions. To transfer money 
to the account, the registrar can either use bank money transfer or a credit 
card transfer. The registrar is able to conduct the latter by using the 
registrar interface.

In addition to the registrars, the DENIC B & C Support Team, the B & C 
administration as well as the B & C clerks have access to the B & C system to 
e.g. provide user support, administrate the users or to create invoices and 
collections.


2. Technical Capabilities & Characteristics

The existing B & C system was developed by DENIC to fulfill the specific 
requirements of the .de billing and collection process. It will be extended to 
a scaleable and flexible solution which will also be able to fulfill the 
functional .net B & C requirements as described previously. The enhanced B & C 
system will ensure data processing accuracy and handle increasing transaction 
volumes as well as new billable transactions. The system will be ready to use 
in time for the transition and fulfill all technical .net B & C requirements: 

* Handling the large amount of accounting information needed to provide a 
detailed and regular charging of .net registrar transactions
* Support of flexible queries of the .net B & C database through registrars or 
DENIC personnel
* Reports of historical information


(a) B & C System Components

Figure 2 provides a general overview of the B & C system components. 

Billing Service
This service processes billable transactions that are delivered from the .net 
registry system and writes account data into the B & C database. 

Deposit Monitor
Monitors the registrars' accounts for sufficient deposit.

Report Generator
Generates account statements for flexible time periods, annual reports and 
customized reports. The customized reports requested by a registrar will be 
initiated from the customer service personnel and generated real-time or in a 
batch process by the report generator.
After generating the customized reports, the reports will either be displayed 
or stored by the generator in the specific area of the secured web site for the 
registrar to download.

B & C Database
For billing and collection, DENIC will set up a database which is handled 
independently from the .net registry database. This database will contain 
various data to document all performed billing processes in detail. The 
following data will be included:

* Transaction Types: In this section, the different transaction types and 
related information such as e.g. the amount to be charged will be stored.
* Registrar Information: Contains all relevant registrar information per 
registrar, e.g. name and address.
* Transaction Data: Performed billable transactions will be documented in 
combination with all related information, e.g. appropriate registrar 
information.
* Account History: Contains relevant information to document all account 
transactions (e.g. registrar information, amount received, relevant transaction 
type).
* Account Information: Includes information about the current deposit and the 
low account notification mark of a registrar.  
* User Information: Stores all user information with corresponding user roles.	

The B & C database will have the same general characteristics as the other 
databases of the .net registry system. Further details on databases (e.g. 
availability, data integrity, performance, scalability, architecture, hardware) 
are described in part 2-5-b-v: Database Capabilities.


(b) B & C Processes

The content of the B & C database will be generated by several processes. These 
can be performed by both users and systems. In this context, three different 
areas can be distinguished:
* Registrar administration
* Billable functions and services
* Event-based processes 

(i) Registrar Administration

This section will contain the following transactions: 
Account Setup: After having verified the accreditation of each registrar, 
DENIC establishes an account in the B & C system which includes all necessary 
registrar information. In addition, DENIC asks the registrar to deposit the 
required minimum amount in the debit account.
Debit Account Pre-payment: As soon as DENIC receives the minimum amount, it 
will be credited to the account stored in the B & C database.		
Update of B & C Profile: DENIC receives the update request for a registrant 
profile, validates it and executes changes in the database.


(ii) Billable Functions and Support Services

All transactions will be handled by the .net registry system. For any billable 
transaction, the registry system calls the "Billing Service" which processes 
the transactions and writes the billing data into the B & C database. In this 
context, the following billable transactions can be performed:

1. Standard Registry Functions 
Create Domain: The registrar communicates a request to create a new domain for 
a certain number of years. As this is a billable action, the .net registry 
system calls the B & C system which thereby becomes an integrated part of the 
transaction. The B & C system calculates the respective fee, checks the account 
for a positive balance and instructs the registry system to process the 
transaction. If the transaction was successfully completed, the B & C system 
debits the account with the fee and updates the B & C database. If the account 
balance is insufficient, the registry system receives a negative response from 
the B & C system. In this case, the "create domain" fails and the registrar 
will be notified.
Renew Domain (by Registrar) (including Auto-Renew): The registrar communicates 
a renewal request for a certain number of years (See "Create Domain" for 
details of the procedure).
Transfer: The registrar communicates a request on behalf of the registrant to 
change sponsorship of an object.
Restore: The registrar communicates a request for a domain to recover the 
status previous to deletion within the redemption grace period.

2. Additional Registry Functions
DomainSync - The DomainSync function enables the registrant to adjust the 
renewal date for their domains to a calendar day of their own choice.

3. Additional Support Services
Customized Reports: The customer service generates a customized report after it 
has been requested by a registrar. The B & C system calculates the fee, debits 
the registrar accounts, and publishes the report in the registrars' web portal. 
On the web site, the registrar can access the report.


(iii) Event-Based Processes

Event-based processes are initiated by several events:

* Low Account Balance: The B & C system notifies the registrar by e-mail, if 
the deposit on the registrar account falls below the agreed minimum amount.
	  
* Insufficient Funds: A transaction will not be processed, if the deposit on 
the registrar account is less than the accrued fee. In this case, the system 
cancels the transaction and notifies the registrar about the insufficient funds 
(see also description of create domain earlier and for details on the RRI: part 
2-5-b-iv: Registry-Registrar Model & Protocol).
* Reports: The B & C system will generate detailed online account reports for 
every registrar on demand for a specified time period. These reports will be 
available online for 24 months and can be generated for the following content:
* All performed billable transactions within a specified time period, including 
a summary
* All performed non-billable transactions within a specified time period, 
including a summary
* Current domain portfolio at the end of each month

The first two reports are created real-time, but the requestor also has the 
option to generate them in batch. The third report, the current domain 
portfolio will be created in batch only. This portfolio report will be 
published for each registrar in the registrars' web portal.

At the beginning of every month, DENIC will create a monthly billing report 
which shows the successful transactions for each registrar over the previous 
month. In addition, the report indicates whether the transactions were subject 
to charges according to the price list for registrars. The report will be made 
available to the affected registrar only. 


3. System Security

As security-related questions like technical and physical capabilities and 
procedures to prevent system hacks or break-ins are described in detail in 
part 2-5-b-xiii: Security, this chapter illustrates B & C-specific security 
issues only. 
To fully enforce security of the .net B & C system, DENIC will take 
comprehensive precautions on the network, the system and the user level.

(a) Network Level Security

On the network level, the communication will be mainly based on the IP protocol 
respectively the HTTP protocol. The security measures on this level include:
* Deployment of HTTP over SSL for encrypted communication
* Installation of a firewall between the internal network and public Internet

(b) System Level Security

Security on system level will be enforced through secure user login procedures. 
These procedures ensure that the B & C system will only be accessible by fully 
authorized and authenticated users. Whenever these users try to access the 
secure web server via the web interface, they have to enter their specific 
userID/ password combination. The information transmission is secured by using 
SSL encryption (see network level security). 

(c) User Level Security 
DENIC already employs well-defined and tested .de security procedures on user 
level. As these procedures have proven to be very reliable and effective, they 
will be adopted to the new .net B & C system. Every B & C system user (internal 
and external) has a unique user login account with a unique user identification 
(UserID) and a password. This userID/ password combination is used to 
authenticate the users and to control the access to system resources and 
applications. User profiles and access privileges are established and 
maintained in the database system to control the user access to the B & C 
system. DENIC has defined and approved security procedures for adding and 
deleting users and modifying login accounts, access control lists, and user 
profile access privileges depending on the functional role of the user.

System Access Privileges
For the .net B & C system, all access privileges and roles will be individually 
defined per user. The access privileges - realized with user profiles stored in 
the database - determine the operations and transactions a user is allowed to 
perform. In terms of access privileges, the following groups and roles can be 
distinguished:

Registry Employee Group
For registry employees, a separate client application will be implemented to 
perform the specific operations within the B & C system. This client will run 
on employee workstations and is connected to B & C system via LAN. 

Within the registry employee group different roles will be defined:
* B & C Administrators are responsible for user administration, configuring 
user groups and their access rights, system upgrades, and maintenance issues.
* B & C System Operators monitor and correct billing errors and provide 
registrar support. 
* Customer Service Operators monitor the billing history of each registrar, 
collect data for the B & C manager and initiate customized reports. 
* B & C Manager create adjustments, customer changes and catalog changes.
* B & C Clerks perform transactions like creating invoices and collections, but 
are not authorized to make adjustments.
* B & C Database Administrators are responsible for database updates, 
modifications, and fixing operational failures.

Registrar Group
Generally, registrars will not be authorized to perform any write operations in 
the B & C system. The only exception will be the change of their low account 
notification mark. The notification mark can be defined as an amount of money 
or in days. For defining the mark in days, the B & C System will calculate the 
amount of money that the registrar has to pay on average for a specified number 
of days. The registrars have the option to transfer money to their current 
deposit amount either by bank transfer or by credit card using the registrar 
interface. If the credit card transaction is approved, the amount will be added 
to the deposit immediately. 

In addition, the registrar is able to view his account status, statements/ 
invoices and reports as described earlier. For billing adjustments, customized 
reports or other special services that modify existing data, the registrar has 
to contact the DENIC B & C customer service personnel by e-mail, phone or fax. 
The B & C manager will execute the requests as communicated by the registrars.


4. B & C System Backup & Recovery

DENIC will perform the same procedures used for the overall .net registry 
system for the B & C system backup and recovery. For further details on data 
backup, please refer to part 2-5-b-x: Backup. 


5. B & C Audits

The DENIC billing & collection system will provide data for accounting purposes 
and auditing reports. As all invoices as well as accounting and auditing 
reports will be created in Germany, all invoices and reports will strictly 
comply with German law and standards, e.g. comply with German Commercial Law 
and section 14 of the German Act on Sales Tax and include German VAT. All 
invoices will be created in English language.
All information will be available for the current fiscal year and for a 
succeeding period of ten years.  				
To regularly verify the accuracy of the whole billing process, DENIC will 
internally audit the B & C system including data and procedures once per 
year. In addition, the cooperative association (of which DENIC is a member) 
conducts an external audit of the billing and collection process annually while 
auditing the whole cooperative.



(x) Backup. Describe frequency and procedures for backup of data. Describe hardware and systems used, data format, identity of suggested escrow agent(s) and procedures for retrieval of data/rebuild of database.

(x) Backup

Highlights

* For .net, the .net secondary RSL will be the backup location.

* The backup hardware and software for .net will be installed in the highly-
secured .net secondary RSL to increase security. The two separate .net RSLs 
will be connected via high volume links.

* Main goals of the DENIC data backup are the restoration of business relevant 
data within a few hours, restoration of server systems within a day and the 
restoration of accidentally deleted data.

* The retention time of data backups varies between the different types of data 
from 20 days to five weeks. The retention time of the tapes can be determined 
individually as required.

* A full backup of the .net registry database will be done daily; backups of 
the transaction logs are conducted every two hours. 

* For .net, DENIC will use similar hardware as for .de because the hardware of 
DENIC's backup system for the .de registry system has proven to be
reliable under all conditions.

* The .net backup server will be integrated into the SAN and directly connected 
to the HDS as central storage in the .net secondary RSL as well as to a 
SpectraLogic Tape Library with AIT-3 tapes as physical backup medium. 

* As for .de, DENIC will use Time Navigator (TiNa) as central backup software. 
This system is characterized by high availability and stability. The physical 
data backup will be carried out by the Robotic Tape Library Hardware on 147 AIT-
3 tapes with a data capacity of 14.7 TB.

* Reports about the daily backups conducted by TiNa will be sent automatically 
to all employees of the DENIC System Administration Team including information 
about backup performance and occurring problems. 

* In addition to the data backup described in this chapter, DENIC is now 
implementing a new data escrow procedure to deposit all registry data.


1. Overview of the DENIC Backup System

DENIC operates two fully equipped registry systems in two separate RSLs 
for .de. This approach will also be used for .net. The primary RSL for .net 
will shared with the facilities of the current primary RSL for .de. In 
addition, DENIC will set up a new secondary RSL for .net at one of the major 
international access points, i.e. London, Amsterdam or a US East Coast 
location. The .net secondary RSL will match the specifications of the 
current .de secondary RSL at COLT and include a full replica of the .net 
registry database system. The replica will be created with the multi-target 
functionality of the replication server. (Please refer to part 2-3-b-iii: 
Description of Facilities for a detailed description of the current 
infrastructure and the approach for .net.). For. de, the secondary RSL serves 
as .de backup location. The same principle will apply for .net  so that 
the .net secondary RSL will be the backup location for .net.  
The backup server and the tape library for .net will be installed in the highly-
secured .net secondary RSL to increase security. The two separate .net RSLs 
will be connected via high volume links (see Figure 1).

In DENIC's network infrastructure, data is stored in different segments of the 
network according to their required level of security. Logically, the network 
is divided several separate secure networks.
Main goals of the DENIC data backup are:
* Restoration of business relevant data within a few hours, 
* Restoration of server systems within a day
* Restoration of accidentally deleted data

The retention time of data backups varies between the different types of data, 
e.g. backups of the database are kept up to 20 days, other data is kept up to 
five weeks. In addition, tapes can be archived on demand. Their retention time 
can be determined individually as needed. 

As for .de, DENIC will use Time Navigator (TiNa) as central backup software. 
This system is characterized by high availability and stability. The physical 
data backup will be carried out by the Robotic Tape Library Hardware 
(SpectraLogic Gator 64) on 147 AIT-3 tapes with a data capacity of 14.7 TB. 
This library will be available to the Time Navigator Backup server via Storage 
Area Network (SAN) (See also part 2-5-b-i: Facilities & Systems for further 
information about SAN).


2. Frequency and Procedures for Backup of Data

Backups will be conducted regularly for the following system elements as 
follows:

Registry Database

* Frequency:
 * Daily full backup of the registry database for .de & .net 
 * Periodic backup of the transaction logs, every two hours 
* Retention time: 20 days
* Procedure:
 * Due to warm standby configuration, backup of active registry databases only
 * Backups conducted by automated processes
 * Backup conducted directly to AIT-3 tape drives
 * The tape drive can be selected out of six available drives; two of them will 
be exclusively reserved for the database backups

Server Systems (file system data, internal mailing system)

* Frequency:
 * Monthly full backup
 * Daily incremental backup
* Retention Time: 5 weeks

* Procedure:
 * Scheduling via TiNa server
 * Online backups
 * Backup conducted directly to AIT-3 tape drives

Accounting Databases

* Frequency:
 * Daily full backup
 * Backups of transactions every hour

* Retention Time:
 * 1 week on local hard drive
 * 5 weeks on tape

* Procedure:
 * 2 step process
 * Backups are stored on local hard drive automatically via programs
 * Via backup of server system (see file system data)

TiNa Database Catalogue 

* Frequency:
 * Daily full backup
* Retention time: 6 days	
* Procedure:
 * Scheduling via TiNa server
 * Daily export of report, including job & performance overview 
 * Report is posted daily to system administration

The e-mail archive, all zone files and log files of the applications will be 
regularly archived on CD or DVD and stored in secured locations as long as 
required. The log files will enable DENIC to reconstruct the registry system. 

In addition, the registry database will be archived via TiNa using specially 
configured "cartridge pools" (endless retention time) once a month. This 
ensures long term availability of the registry data. 


3. Backup Hardware and Software Systems

For .net, DENIC will install the TiNa software on a server dedicated to the 
backup for the .net  registry data. The backup server will be integrated into 
the SAN and directly connected to the HDS as central storage in the .net 
secondary RSL. In addition, it will have a direct connection to a SpectraLogic 
Tape Library with AIT-3 tapes as physical backup medium. 
The backup hardware and software will be installed in the DENIC .net secondary 
RSL. 


(a) Backup Hardware

For .net, DENIC will use similar hardware as for .de because the hardware of 
DENIC's backup system for the .de registry system has proven to be 
reliable under all conditions. The specifications of the current .de backup 
hardware are as follows:

Hardware

* Processor: 2 CPU à 1.28 GHz
* Memory: 4 GB
* Disc for system software: local
* Disc for TiNa data (Catalogue & Catalogue Backup): HDS/SAN
* Disc for caches: Local
* Interfaces: 1 Gbps Ethernet Adapter, 2 Gbps Channel Adapter 
* Software: TiNa Backup Software 

Tape Library

* Robotic Tape Library: Spectra Logic 64k
* Virtual libraries: 2 (for production and testing environment)
* Power supply: redundant
* Tape drives: 
 * AIT-3 current number: 8 
 * For production environment: 6 (2 are reserved for backups of the registry 
databases)
 * For testing environment: 2
* Tapes	
 * AIT-3 / current number: 147 
 * Productive environment: 100
* Data capacity: 14.7 TB (current; scalable up to 64 TB)
* Degree of utilization: ca. 50% (current)
* Scalability:
 * Number of tape drives: scalable to 32
 * Number of tapes AIT-3 scalable to 645
 * Data capacity: scalable up to 64 TB

(b) Backup Software

Product Time Navigator

Time Navigator (TiNa) is DENIC's current central .de backup software which will 
also be used for .net. TiNa consists of a server and a client component. The 
TiNa software also includes a GUI-application which can be started either from 
the UNIX server or from any client. This application facilitates the monitoring 
and administration of the whole backup system.
Furthermore, Time Navigator provides a number of toolkits for conducting 
backups from the database server directly into the TiNa Library (see Figure 2).

The system is characterized by simple administration, high availability, 
scalability and high performance. It is also compatible to a number of storage 
products, e.g. ADIC, DELL, EXABYTE, HP, SpectraLogic. 

The TiNa catalogue, which is the core database, contains all the information 
required to run Time Navigator, such as the configuration of the platforms, 
drives, libraries, users, cartridges etc. It also comprises the meta-data that 
is recorded in the catalogue during writing operations. The meta-data contains 
the descriptions and locations of all backed up files. 

For .net, the TiNa catalogue will backed up on a daily schedule. After the 
backup will be finished, a report about the backups conducted by TiNa will be 
sent automatically to all employees of the DENIC System Administration Team. 
The reports will include details on successfully completed backup jobs, 
performance information about all backups as well as occurring problems during 
the backup procedure.


4. Data Format
The backup server software TiNa is able to write the magnetic tapes in the 
following formats:
* TiNa (the only format to allow data compression and encoding)
* tar
* cpio
* sidf (LAN free Backup only)
* none (raw format)

For the backup of the .net registry database, the dump files will be written 
in "tar" format on the magnetic tapes. This format secures independence from 
TiNa in case of restoration.


5. Identity of Suggested Escrow Agent(s)

In addition to the data backup described in this chapter, DENIC is now 
implementing a data escrow procedure to deposit all registry data with the 
following escrow provider:

HanseEscrow Management GmbH
Stresemannallee 118
D-22529 Hamburg
contact@hanse-escrow.de
www.hanse-escrow.de

The .net escrow procedure will be fully in operation until the transition of 
the .net registry. In addition to this escrow provider, DENIC is currently 
evaluating several US escrow providers to also deposit .net escrowed data in 
the US. The .net registry data will be transferred to and stored at the escrow 
provider site according to the agreement with ICANN. 

Please refer to part 2-5-b-xi: Escrow for details on the escrow arrangements, 
data formats, insurance arrangements and backup plans for data recovery and 
Appendix R for details on the data escrow specifications.


6. Procedures for Retrieval of Data/ Rebuild of the Database

(a) Procedures for Retrieval of Data

All backup tapes will be stored in the tape library which will be installed in 
the secondary RSL for .net. Thus, the tapes will be kept separate from the .net 
primary RSL. 
By employing an escrow agent, the .net registry data will be also stored in an 
additional external secure location in XML-format (see part 2-5-b-xi: Escrow 
and Appendix R for details).

The procedures for data retrieval are based on the following cases:
* Resynchronization of the standby systems after the switchover procedure in 
case of the failure of the active RSL (Standby database takes over the 
functions of the primary database) 
* Recopying the full backup and the transaction log files

For .net, all these procedures will be documented in detailed checklists which 
will be available to the relevant employees in a knowledge database at any 
time. The switchover procedure as well as the re-import of backups will be 
trained regularly while conducting maintenance tasks. Checklists will be 
continuously reviewed and improved.
See part 2-5-b-v: Database Capabilities for a description of the switchover 
process.

(b) Rebuild of the Database
The rebuild of the .net registry database will be described for two failure 
scenarios (please see part 2-5-b-v: Database Capabilities for detailed 
information on database and replication systems):

(i) Scenario 1:  Failure of the Active Database

The standby system in the secondary RSL will be still available. 
* Switchover from the active database in the primary RSL (db_active in the 
following) to the standby database in the secondary RSL (db_standby in the 
following). db_standby will then become db_active. The switchover process will 
comprise a data integrity check of the standby database (see part 2-5-b-5: 
Database Capabilities for details). The highly effective replication process 
will ensure that the standby database remains the most accurate backup system. 
The transactions performed on the active database will be transferred via the 
replication server which runs on a high performance UNIX server. According to 
the regularly conducted measurements, the latency time is zero. Exceptions 
would only occur, if maintenance work or a long running query were performed on 
the standby system.

* As the replication process will be transaction-based, a high level of 
security will be achieved.
* After the switchover process has been completed, the registry processes will 
be fully available.
* The standby database will be synchronized again after the failure of the 
former active database has been corrected.
* A full backup of the new db_active will be conducted via TiNa. 
* Simultaneous activation of the replication agent thread for the new 
db_active. From that moment on, all transactions will be transferred to the 
replication server and stored in the stable queue.
* The current full backup of the new db_active will be reloaded to the new 
db_standby server via TiNa.
* The connection between the replication server and the new db_standby server 
for the database will be activated. 
* The replication can now be started as the warm standby system is available 
again. 
* If necessary, the roles of the new db_active and db_standby can be switched 
back using the same procedure.
In this scenario, a downtime of approximately ten minutes will occur during the 
switchover process. DENIC currently works on decreasing the switchover time.


(ii) Scenario 2: Logical Errors in the Registry Database

DENIC only deploys registry applications which have passed through multiple 
quality assurance procedures. Therefore, logical errors have not occurred at 
DENIC to date.

Despite the comprehensive quality assurance procedures and standards, it is 
still possible that logical errors occur in the registry database - e.g. due to 
defective software - which are transferred to the standby system through 
replication.

In this case, the .net registry database will be rebuilt as follows: 
* All applications as well as the replication process will be stopped. 
* A backup of the transaction log in the active database will be conducted. In 
addition, the time of the first logical error in the database will be 
determined. 
* The last full backup conducted prior to the failure will be restored to the 
active database via TiNa. 
* Then, all following transaction logs up to the time the error occurred will 
be restored via TiNa (point-in-time recovery)
* All changes which occur until the setup of the database will have to be 
reconstructed with the help of the application log on application level.
* All applications will be restarted, the registry system will now be available 
again. 
* Finally, the synchronization of the standby system will be conducted as 
described in scenario 1. 
(Please also refer to part 2-5-b-v: Database Capabilities)



(xi) Escrow. Describe arrangements for data escrow, or equivalent data backup security, data formats, insurance arrangements and backup plans for data recovery.

(xi) Escrow

Highlights

* DENIC is implementing a new data escrow procedure. 

* The complete verification process which is used at the escrow provider's site 
to ensure completeness and integrity of the transferred data will be developed 
and implemented by DENIC.

* The reports for a full deposit will be generated once a week as a snapshot of 
the registry data. 

* For the full deposit, the domain, host, contact, registrar object and pending 
transfer reports will be concatenated.

* The incremental deposit consists of a report including the complete set of 
transactions that were processed by the registry system since the generation of 
the last full or incremental deposit file.

* All reports of the full and incremental deposit will be exported from the 
database into XML format according to the XML 1.0 specification. 

* DENIC will create PGP encrypted and signed data files which will be 
transferred to the escrow provider.

* DENIC will verify and review escrowed data every three months and will make 
the results of these reviews available to ICANN and the public.

* To ensure the serviceability of the transferred data files, DENIC will also 
document the content and structure of the reports together with the related 
schemas. Schemas will be stored separately from XML data files and updated 
immediately at the escrow provider site, if the data file structure was updated 
or changed. 

* For the recovery of reports, DENIC provides the schemas for the description 
of the report files, a full documentation of its own database structure as well 
as the process of exporting data from the database to the XML escrow data files 
to the escrow provider. 

* DENIC additionally escrows the source code of self-developed software, all 
relevant documentation, all business and technical procedures needed to restore 
all technical facilities.


1. Data Escrow Arrangements

In addition to the backup procedure with daily full backups as well as 
transaction log backups of the registry database, DENIC is now implementing a 
new data escrow procedure to deposit the .de registry data with an established 
European escrow provider. By the time DENIC takes over the .net registry, the 
new procedure will be fully in operation. For .net registry data, the same 
escrow provider will be used. In addition to this European escrow provider, 
DENIC is currently evaluating several US escrow providers to deposit .net 
escrowed data in the US. The .net registry data will be transferred and stored 
at the escrow provider site according to the ICANN agreement. The whole escrow 
process will be mutually examined and improved to meet the requirements of the 
registry agreements between Registry Operator and ICANN.

Further details on the escrow agreement are described in appendix R.
Schedule
* Full Deposit on Sunday
* Incremental Deposit Monday through Saturday

Content Weekly Report
* Domain Object Report
* Host Object Report
* Contact Object Report
* Registrar Object Report
* Pending Transfer Report

Content Daily Report	
* Transaction Report

Format 
* All Reports are generated in XML format


The report files of a full deposit will be verified against the respective XML 
schema (XML Schema 1.0 specification) to ensure correct data format and 
integrity. Before the reports of a full deposit are transferred to the escrow 
agent, they will be concatenated to a single file. For the .net data, files 
will be named NET followed by a 4-digit sequence number for the related deposit 
transfer. The deposit files are encrypted and signed using PGP.

The encrypted and signed file will be transferred to the escrow agent to a 
nonpublic secure ftp server area.

The complete verification process which is used at the escrow provider's site 
to ensure completeness and integrity of the transferred data will be developed 
and implemented by DENIC. During the steps of the verification process, the 
signature will be checked. The transferred data file must be decrypted and 
split into the different reports. The report files will be verified using the 
related report specific XML schema. 

Schedule for Full Deposit
The five reports for a full deposit will be generated once a week on Sunday 
00:00:00 UTC as a snapshot of the registry data. Database transactions which 
have not been committed by this point in time, will not be exported to the 
reports. The reports will be delivered by 06:00:00 UTC on Sunday.

Schedule for Incremental Deposit
The incremental deposit consists of a report including the complete set of 
transactions that were processed by the registry system since the generation of 
the last full or incremental deposit file. The first incremental deposit after 
a full deposit covers the transactions not yet committed during the full 
deposit snapshot taken at Sunday 00:00:00 UTC and all transactions until Monday 
00:00:00 UTC. A sequence of six incremental deposits follows until Saturday 
00:00:00 UTC. Incremental deposits will be generated, verified and transferred 
until 04:00:00 UTC of the related day. 


2. Data Formats

All reports of the full and incremental deposit will be exported from the 
database into XML format according to the XML 1.0 specification. The XML format 
is common for data exchange and storage on an application independent basis. 

For the full deposit which is formed by the five different reports, a specific 
schema exists for each of them. These schemas will be used for description of 
the related report. The respective schema is the basis for the verification 
process at DENIC and at the escrow provider. With the help of an XML-parser, 
the reports will be checked for completeness, correctness, integrity, syntax 
and coherence. The full deposit is described on database field level below.

Before describing the detailed reports, the following has to be considered: 
* Only if the related database field contains data, the respective XML element 
for a given object will be exported in combination with the opening and end 
tag. Thus, there will not be any empty elements in the reports.
* All object reports contain an XML attribute id which is used to build the 
relation between the objects in the different reports.
* XML files will be UTF-8 encoded to provide fully internationalized support.

(a) Content of Full Deposit 

The reports which will be concatenated to a full deposit are:
* Domain Object Report - contains all domain objects in the registry database.
* Host Object Report - contains all host objects in the registry database.
* Contact Object Report - contains all contact objects in the registry database.
* Registrar Object Report - contains all registrar objects in the registry 
database.
* Pending Transfer Report - contains all running transfers up to the moment of 
the full deposit.

Domain Object Report
The following elements are included:
* Fqdn - Fully qualified domain name.
* Status - The domain status code.
* Period - The registration period in years.
* Owned-by - An identification (the "id" attribute of the registrar element) of 
the sponsoring registrar of the domain.
* Created-by - An identification (the "id" attribute of the registrar element) 
of the registrar that originally created the domain object.
* Created-on - The date/time the domain object was originally created.
* Renewed-on - The date/time the domain was last renewed.
* Updated-by - An identification (the "id" attribute of the registrar element) 
of the registrar that last updated the domain object.
* Updated-on - The date/time the domain object was last updated.
* Transferred-by - An identification (the "id" attribute of the registrar 
element) of the registrar that last transferred the domain object.
* Transferred-on - The date/time when the domain object was last transferred.
* Host-id - An identification (the "id" attribute of the host element) of a 
name servers for the domain.
* Contact-id - Contact-ids that reference the contact records for this domain. 
Contact-id has the attribute "type" to denote the type of contact. "Type" can 
be one of: Registrant, Administrative, Technical or Billing.
* Expires-on - The date/time of the domain expiration.
* AuthInfo - The authorization information associated with the domain.
* Pending-transfer - An identification (the id" attribute of the transfer 
element) for potentially existing transfers.

An example of the domain container appears below:

<domain id="1">
<fqdn>example.net</fqdn>
<status>ACTIVE</status>
<period>1</period>
<owned-by>42</owned-by>
<created-by>42</updated-by>
<created-on>2005-08-14T12:34:56+01:00</created-on>
<updated-by>42</updated-by>
<updated-on>2005-08-15T13:23:56+01:00</updated-on>
<host-id>99</host>
<host-id>100</host>
<expires-on>2006-08-15T13:34:56+01:00</expires-on>
<contact-id type="Registrant">1</contact-id>
<contact-id type="Administrative">2</contact-id>
<contact-id type="Technical">3</contact-id>
<contact-id type="Billing">4</contact-id>
<authInfo>fooBar</authInfo>
<pending-transfer>123</pending-transfer>
</domain>


Host Object Report
 The following elements are included:
* Fqdn - Fully qualified host name.
* Owned-by -  An identification (the "id" attribute of the registrar element) 
of the sponsoring registrar of the host.
* Created-by - An identification (the "id" attribute of the registrar element) 
of the registrar that originally created host object.
* Created-on - The date/time the host object was originally created.
* Updated-by - An identification (the "id" attribute of the registrar element) 
of the registrar that last updated the host object.
* Updated-on - The date/time the host object was last updated.
* IP-address - Any IP addresses associated with this host, with an attribute 
type indicating whether it is an IPv4 or an IPv6 address.

An example of the host container appears below:

<host id="99">
<fqdn>dns1.example.net</fqdn>
<owned-by>42</owned-by>
<created-by>42</created-by>
<created-on>2005-08-14T12:40:32+01:00</created-on>
<updated-by>42</updated-by>
<updated-on>2005-09-14T12:25:12+01:00</updated-on>
<ip-address type="v4">192.0.2.0</ip-address>
</host>


Contact Object Report
The contact element consists of the following elements:
* Name - The name of the contact.
* Organization - The organization for the contact.
* Within the "contact" container is a sub-container named "postal" with the 
following elements:
 * Address - The street address of the contact.
 * City - The name of the city of the contact.
 * State-province -  The name of the state/province of the contact.
 * Postal-code - The postal/zip code of the contact.
 * Country - The two-letter ISO 3166-1 code for the contact's country.
* Voice - The voice phone number of the contact in E164a format.
* Fax - The fax number of the contact in E164a format.
* Email - The e-mail address of the contact.
* Owned-by - An identification (the "id" attribute of the registrar element) of 
the sponsoring registrar of the contact.
* Created-by - An identification (the "id" attribute of the registrar element) 
of the registrar that originally created the contact object.
* Created-on - The date/time the contact object was originally created.
* Updated-by - An identification (the "id" attribute of the registrar element) 
of the registrar that last updated the contact object.
* Updated-on - The date/time the contact object was last updated.
* Transferred-by - An identification (the "id" attribute of the registrar 
element) of the registrar that last transferred the contact object.
* Transferred-on - The date/time when the contact object was last transferred.

An example of the contact container appears below:
<contact id="1">
<name>Juergen Mustermann</name>
<organization>aol</organization>
<postal>
   <address>Musterstrasse 1</address>
   <city>Frankfurt</city>
   <state-province>Hessen</state-province>
   <postal-code>60000</postal-code>
   <country>DE</country>
</postal>
<voice>+49.691234567</voice>
<fax>+49.691234568</fax>
<email>jmustermann@example.net</email>
<owned-by>42</owned-by>
<created-by>42</created-by>
<created-on>2005-08-14T12:42:22+01:00</created-on>
<updated-by>42</updated-by>
<updated-on>2005-09-14T19:21:22+01:00</updated-on>
</contact>


Registrar Object Report
The registrar element has the attribute "id", which is a unique identifier 
assigned by the IANA., and consists of the following elements:
* Password - The password for the registrar.
* Name - The name of the registrar.
* Status - The registrar status code.
* Contact-id - Any number of contact-id associated with this registrar. Contact-
id has the attribute "type" to denote the type of contact. "Type" can be one 
of: Administrative, Technical or Billing.

An example of the registrar container appears below:
<registrar id="42">
<password>denic12345</password>
<name>REGISTRAR-FOO</name>
<status>ACTIVE</status>
<contact-id type="Administrative">10</contact-id>
<contact-id type="Administrative">11</contact-id>
<contact-id type="Technical">12</contact-id>
<contact-id type="Technical">13</contact-id>
<contact-id type="Billing">14</contact-id>
</registrar>


Pending Transfer Report
The transfer element consists of the following elements:
* Period - The extension of lifetime (in years) of the domain.
* Requested-by - An identification (the "id" attribute of the registrar 
element) of the gaining registrar.

An example of the pending transfer element appears below:
<transfer id="123">
<period >1</ period >
<requested-by>43</ requested-by >
</transfer>


(b) Content of Incremental Deposit 
The report which forms an incremental deposit is:
* Transaction Report - consists of all transaction records since last full or 
incremental Deposit.


Transaction Report
The transaction element contains the properties "operation" 
and "type". "Operation" can be one of: add, modify, transfer or delete. "Type" 
can be one of: domain, host, contact or registrar. The transaction element is a 
container consisting of elements from the corresponding "type" element. For 
example, a transaction element with a "type" of "registrar" will have the same 
set of elements as a registrar element. For a "delete" operation, only the 
object ID is included in the transaction element.

An example transaction container appears below:
<transaction operation="modify" type="registrar">
<password>new password</password>
<name>REGISTRAR-FOO</name>
<status>ACTIVE</status>
<contact-id type="Administrative">10</contact-id>
<contact-id type="Administrative">11</contact-id>
<contact-id type="Technical">12</contact-id>
<contact-id type="Technical">13</contact-id>
<contact-id type="Billing">14</contact-id>
</transaction>


3. Insurance Arrangements

DENIC will create PGP encrypted and signed data files which will be transferred 
to the escrow provider. The encryption provides confidentiality and the 
signature for integrity and authentication of deposit files. (Please refer to 
Appendix R for a description of the usage of private and public keys.)
To ensure the successful completion of the data transfer from DENIC to the 
escrow provider, the files, which will be sent, will not exceed a size of 1 GB. 
The escrow provider checks the signature, decrypts the file, and splits it into 
the different reports. Every report will then be verified for completeness, 
correctness, integrity, syntax and coherence using the related report-specific 
XML schema. Upon successful verification the reports will be stored encrypted 
on two separate DVDs using ICANN's public key. The escrow provider uses single 
layer DVDs with a storage capacity of 4.7 GB. These read-only media will be 
checked for legibility. The created storage media will be transferred to 
different bank safe deposits.   
For the verification process the transferred data will be stored on a local 
hard disk. After the verification process has been completed, the data will be 
deleted from this hard disk. 
In addition, DENIC will verify and review the escrowed data every three months. 
The results of these reviews will be made available to ICANN and to the public.
To ensure the serviceability of the transferred data files, DENIC will also 
document the content and structure of the reports together with the related 
schemas. Schemas will be stored separately from XML data files and updated 
immediately at the escrow provider site, if the data file structure was updated 
or changed. 
The content of the escrow contract also determines ICANN as the beneficiary who 
is entitled to receive the escrowed data and the cases in which the delivery of 
the escrowed data is permitted. The beneficiary is one of the contracting 
parties.
The escrow provider also effected an insurance for its business operations 
covering an amount of loss up to 1 million Euro. This insurance explicitly 
covers the loss of escrowed data. 


4. Backup Plans for Recovery

The data files are stored for a period of 42 days at the bank safe deposits of 
the escrow agent. For the recovery of the reports, DENIC provides the schemas 
for the description of the report files as well as a full documentation of its 
own database structure. In addition, the process of exporting data from the 
database to the XML escrow data files will be included, as the export process 
is specific for the DENIC data model of the registry database. To prepare a 
domain object report file from the registry database, the data must be read 
from several tables. This documentation provides any third party, who is 
entitled to receive escrow data, with helpful information to rebuild the 
registry database based on the original data model or on a different model.  
The data specification is a central part of the transition plan for the 
transfer of the registry from the incumbent registry operator to DENIC. This 
specification is based on the incumbent registry operator's data escrow 
activities. A detailed data description will also be part of the documentation 
deposited at the escrow provider. 
Please refer also to part 2-5b-x: Backup for a detailed description of database 
recovery from daily full backups and incremental transaction log dumps. 


5. Escrowing of Software, Procedures & Documentation
As part of its .net disaster recovery plan, DENIC also escrows the following 
additional information:
* Source code of self-developed software
* All relevant documentation
* All business and technical procedures needed to restore all technical 
facilities
This information is weekly escrowed and deposited at the defined escrow 
provider (see Appendix R for details).

(xii) Publicly accessible WHOIS service. Address software and hardware, connection speed, search capabilities and coordination with other WHOIS systems. Frequency of WHOIS updates, availability and processing times. Identify whether you propose to use a “thick” registry model or “thin” registry model, and explain why you believe your choice is preferable.

(xii) Publicly Accessible Whois Service

Highlights

* Scalable, fast, near real time whois service.

* Thick data model to enable one-stop-service for complete, standardized 
information about each domain.

* Thick data model for increased availability - no dependency on third parties.

* Privacy flags to enable registrants to individually decide to which degree 
contact data will be made available (still within the boundaries set by ICANN 
for mandatory information fields).

* Separate registrar whois with direct read access to the active database.

* Privacy flags also honored when displaying data to others but the sponsoring 
registrar.

* Clear migration path from thin to thick model.

* Strong commitment to work on whois successor CRISP/IRIS.

The complete documentation of DENIC's current whois service for the .de TLD can 
be found at http://www.denic.de/en/domains/technik/denic_whois-
server/index.html.


1. Whois Architecture

Current Whois Architecture
Both public and registrar whois service are currently installed on servers in 
the Service Provisioning Layer with direct access to DENIC's registry 
databases. DENIC deploys clusters of whois servers at the primary and secondary 
RSL which are operated in a load balancing fashion (see Figure 1).

These servers directly access the NIC database of the active database server 
via a firewall and the whois backend. This direct whois access to the registry 
database ensures real-time information accuracy for all whois requests.

Future .net and .de Whois Architecture
DENIC currently enhances the whois architecture by moving the public whois to 
dedicated servers in the Service Provisioning Layer (see Figure 2). These 
servers are integrated into the replication system of the database with the 
replications customized to fit the exact needs of the public whois service. The 
production databases will experience a significant load decrease through this 
new setup leading to shorter response times for public whois. While generally 
the advantage of dedicated whois servers is paid for by publishing only less 
current data on the whois servers, this is not the case in DENIC's system. The 
integration into the replication system ensures whois data is availability in 
near real time with an average latency of few milliseconds and a maximum 
latency of one minute. This transition is planned to be finished by the end of 
2005 latest.

For details regarding DENIC's complete Registry Service Location System 
Architecture with descriptions of the individual layers please see part 2-5-b-
i: Facilities and Systems.


2. Registry Model

Advantages of the Thick Registry Model
DENIC provides its services to the .de community following the thick registry 
model and will implement the .net registry under the thick model as well. DENIC 
firmly believes the thick model to be superior to the thin model currently 
followed by the incumbent as it offers higher data integrity, security and 
increased performance.

Specifically DENIC sees the following advantages:
* Complete, standardized information about each domain
* Overall scale effects, significantly reducing costs for registrars
* Opportunity to significantly streamline inter-registrar functions, such as 
domain transfer
* Immediate registrant data availability in case registrar vanishes, enabling 
faster transfer
* Less latency, shorter response times since only a single server needs to be 
queried
* Easier escrow supervision since only a single party is responsible
* Ease of registry-level transfer enforcement.

Additionally, by implementing the thick model DENIC can implement the privacy 
policy the registrant requests by centrally setting privacy flags. DENIC sees 
this feature as one of the most important aspects for helping the registrant to 
individually choose his or her privacy policy. From the experience with .de, 
DENIC expects the vast majority of .net registrants to make use of this feature 
and limit their domain information to the basic information fields. Currently 
80% of .de registrants make use of that feature.


3. Whois Data Objects and Fields
While allowing for both RRP and EPP and both thin and thick data models in the 
beginning, DENIC will migrate all registrars to EPP and to the thick model. 
Details regarding protocols are described in part 2-2-b: Equivalent Access, in 
part 2-5-b-iv: Registry-Registrar Model and Protocol and in part 2-8: 
Transition Plan.

(a) Data Objects for .net Domains

Our whois for .net will fulfill all ICANN requirements regarding data objects 
as specified for RRP as well as EPP. DENIC will build the .net database based 
on EPP and a thick model. However, as outlined in detail in part 2-8: 
Transition Plan and part 2-2: Equivalent Access, DENIC will provide a RRP to 
EPP proxy for a transition time of four months after taking over responsibility 
for the .net registry. 

Registrars will have twelve months to migrate from the thin to the thick data 
model. Therefore there will be different whois data outputs for thin and thick 
data sets in these first twelve months depending on the migration stage of the 
sponsoring registrar.

At the start of the migration phase registrars will have the option of 
registering domains following either of both models. The whois output for thick 
data sets is described in Appendix O. For domains with only a thin set of data, 
the contact references in the domain object will not be shown. In order to 
access contact data, clients will have to follow the referral included in the 
domain output to reach the authoritative whois server supplied by the 
sponsoring registrar.
All thin data sets will have to be updated to thick data sets and all data has 
to be stored in DENIC's registry database twelve months after takeover of the 
registry. All whois data output will then follow the thick model only.


(b) Current Data Objects for .de Domains

The current data object structure for .de will be made available upon request.


4. DENIC's Flexible Thick Data Output Model

As part of DENIC's thick registry model, DENIC will give registrants more 
options to protect their privacy by limiting the amount of information given in 
the public whois. Advantages of the flexible thick data output model for 
the .net community are described below in detail.

Nevertheless there are certain mandatory information fields which will be 
displayed in public whois in order to be able to unambiguously identify the 
registrant, e.g. for legal reasons. The suggested mandatory fields are 
identified in the proposed Appendix O.

The mandatory information fields will ensure that the domain holder can be 
identified and contacted. Only providing information how to contact the domain 
holder via regular mail will establish sufficiently high hurdles to protect the 
registrant from unsolicited phone call or e-mails. Abuse of information by the 
public or by registrar is effectively prevented.

The administering registrar will have access to the complete set of fields 
regardless of the privacy settings.
The following fields are always displayed, if available, for all contacts:
* Name
* Address
* Zipcode
* City
* State
* Country
For the registrant contact, this field will also be shown, if available:
* Organization
For technical contacts these fields will be displayed, if available:
* Phone
* Fax
* E-mail


5. Whois Query Options

The whois service is used by two different user groups (registrars and public) 
and can be accessed via two different means (command line and web servlet). 
Since a registrar web whois does not exist, the whois requests originate from 
three different query options: web whois, public whois via whois protocol and 
registrar whois via whois protocol. 
The query options described below represent current status for .de domains. 
For .net DENIC will offer essentially the same options and make adjustments 
where necessary (e.g. in regard to needed flags).
The public whois via whois protocol is by far the most widely used query 
option, as shown in Figure 3.

Access Control Lists
DENIC uses Access Control Lists (ACLs) to prevent the whois service from being 
overloaded by a high number of requests. If the request frequency of a source 
exceeds a certain threshold value, the network will be blocked for a period of 
time. The threshold values and time limits are defined by DENIC and adapted 
regularly. The use of ACLs protects whois from grabbers or (D)DoS attacks, 
ensures equal access of all users and prevents mass requests from reducing 
whois performance.

(a) Public Whois via Web Servlet

In order to optimize its public whois services DENIC conducted a study among 
Internet users about their interest in the whois service. This study suggested 
that more than 90% of the public users are only interested in whether the 
domain is already registered or still available. Therefore DENIC has designed 
its web based whois as a two step process, first only giving the availability 
information (see Figure 4). 

For receiving additional information the user has to agree to terms and 
conditions of use. Approximately 10% of public users actually use the second 
step of the whois service. At a minimum, information about the domain holder, 
administrative and technical contact, the zone administrator and technical data 
is given (see Figure 5). The example below shows the current minimal whois data 
output for .de according to the DENIC domain- and registration guidelines. 
Additionally privacy flags can be set by the domain holder, the admin-c, tech-
c, and billing-c for their respective personal data. 

A side benefit of introducing this two step procedure has been a significantly 
reduced load on the database, as the majority only uses the first query 
function to find out the status of the domain.


(b) Public Whois via Command Line

While individual users mainly use whois via the web servlet - as described 
above - registrars checking for available domain mainly use the public whois 
via whois protocol. As these registrars are requesting information about 
domains they are not administering, they are treated like public users and the 
same privacy regulations apply.

Query for Domain Status 
The query for domain status resembles the first step of the web based whois 
query. Only the status (available, registered, blocked,...) is returned.

Query for Domain Data
The query for domain data basically equals the second step of the web based 
whois. The privacy policies are the same, only the mandatory set of data plus 
data marked as public by the domain holder is returned. However, within these 
limits the information output can be customized by the whois user via several 
flags, which are describe later in detail.

(c) Registrar Whois via Command Line

The Registrar whois output only differs from the public whois output when a 
registrar requests information about a domain administered by himself. While 
this will not happen in the thin model (here the registrars hold their own 
data), it is an important function in the thick data model. 
After address based authorization the registrar has unlimited access to all 
domain, contact and technical information of the domains it is maintaining. 
While registrar whois is mainly used for domain queries, status queries are 
also possible. 
The same set of command line flags applies to both public and registrar whois. 

(d) Additional Queries and Flags

Help Query and Flags
By setting flags for whois requests via the command line, data output can be 
customized. The help query outputs all the flag options that can be used in 
combination with whois queries and has the following syntax:
whois -h whois.member.denic.de HELP

Figure 6 shows the command line flags currently supported for .de whois as 
output of the help query.

The syntax for these whois requests with flags is the following:
whois [-h hostname] [-Frk] [-T types] [-i attr] [-C charset] key

As described above these flags set by the whois user do not override privacy 
settings by the domain holder. Data output is only being customized within the 
limits defined by the registrant. Registrars are only granted access to 
complete information for the domains they administer themselves.

Character Set Flags
The default output format of the registrar whois information is UTF-8; UTF-16, 
ISO-8859-1, US-ASCII are also supported.


6. Availability, Response Times, and Monitoring

(a) Availability

The whois application is running in parallel on clustered servers. Via load 
balancers the requests are distributed evenly to all servers which ensures a 
whois availability of 99.99%.
DENIC is continuously upgrading hardware and software to enhance performance. 
Extensive monitoring of the whole registry system and the whois service 
ensures, that increasing demands are detected well in advance and will be 
counteracted appropriately, so that demand can always be served. In the short 
term the counteractions can be the introduction of an additional server, in the 
long term the complete setup might be reengineered to meet the consistently 
higher demands. 
Figure 7 shows a load graph of the four whois servers in calendar week 49. New 
whois servers can be added at any time (for details see RSL level 3 in part 2-5-
b-i: Facilities and Systems) to increase whois capacity to meet the needs of 
the community.

In the long run use of DENIC's whois service has developed as shown in Figure 
8. After the introduction of access control limits in June 2003 the number of 
total whois requests dropped sharply, indicating that DENIC's measure about 
limiting mass whois requests by few registrars had been effective. 
However, as the number of whois requests has consistently been on the rise 
again, DENIC had to act in order to provide enough capacity for all requests to 
be served. The number of whois servers has therefore been doubled, and will be 
increased as soon as the need arises.

(b) Response Times

Response times depend on the type of query. Status queries are answered in less 
than 100 milliseconds (excluding round trip time outside DENIC's systems) for 
more than 98% of all queries. These status queries represent about 85% of all 
whois queries. Domain queries are answered in less than 300 milliseconds 
(excluding round trip time outside DENIC's systems) for more than 98% of all 
queries. User perceived total round trip times may vary due to factors outside 
the sphere of influence of the registry operator.

(c) Performance Monitoring

DENIC is consistently monitoring its whois service for security and performance 
reasons. Details regarding security of DENIC's whois service are described in 
part 2-5-b-xiii: Security, and details regarding performance monitoring are 
described in part 2-5-b-xvi: Outage Prevention. In all monitoring activities, 
the applicable national and EU data protection legislation is honored.


7. Development of Additional Query Services
The nicname protocol (whois) is currently specified in RFC3912 which superseded 
RFC954 without substantially modifying the protocol. The limitations of whois 
discovered in recent years still apply, e.g. lack in security, structure or 
internationalization support.
Feeling that the whois protocol at its current stage does not address the 
requirements of a modern protocol, DENIC has actively supported the development 
of the IRIS protocol in the Cross Registry Internet Service Protocol (CRISP) 
IETF working group.  Now that the specification has been published as RFC3981, 
RFC3982, RFC3983, DENIC will soon start to evaluate, define, implement and 
deploy IRIS as an information service parallel and superior to whois.



(xiii) System security and physical security. Technical and physical capabilities and procedures to prevent system hacks, break-ins, data tampering and other disruptions to operations.

The applicant's response to Part 2, Section 5, Subsection b, Question xiii will remain confidential to ICANN and the independent evaluators. ICANN will use reasonable efforts to avoid publication or release of this information, but in no circumstance will ICANN's liability for any release of this information exceed the amount of the application fee.


[RESPONSE IS CONFIDENTIAL]


(xiv) Peak capacities. Technical capability for handling a larger-than-projected demand for registration or load. Effects on load on servers, databases, back-up systems, support systems, escrow systems, maintenance and personnel.

(xiv) Peak Capacities

Highlights

* Due to the comprehensive monitoring of components and services, DENIC is able 
to early identify and dissolve peaks.

* For the .net registry system, DENIC will assign large excess capacity to all 
system components, including the backup and escrow system as well as the 
support systems enabling the system to handle peaks without any performance 
deterioration.

* The planned .net database will be equipped with very large excess capacity to 
handle the transactional growth for all three business case scenarios.

* As DENIC closely cooperates with its registrars, no planned mass requests or 
any other planned peaks should occur during maintenance periods.

* DENIC will respond to peak load situations by dynamically reassigning teams 
and actively communicating internally and externally (i.e. to the registrars).

* DENIC personnel has profound experience in handling peak loads, e.g. 
introduction of IDN.


While operating the .de registry, DENIC was able to acquire profound experience 
in planning and managing a registry that is fully reliable also in peak load 
situations.

DENIC relies on continuous capacity planning which bases on assessing the 
current capacities of the registry system. A 2-year plan for the IT 
architecture is created during the yearly budget planning phase. The plan is 
revised yearly to find out whether assumptions and planned capacities have to 
be redefined.

DENIC also permanently monitors all relevant system parameters for .net. DENIC 
uses the system monitoring results to identify resources that tend to critical 
utilization ratio in peak situations well in advance and to decide upon 
capacity increases e.g. system modifications, extensions or changes in the 
system architecture.

For each parameter, DENIC defined a threshold value. The levels of the values 
are interpreted by automated monitoring programs. Whenever the defined 
threshold values per component are reached or exceeded, system-generated 
notifications are sent automatically according to the integrated escalation 
scheme.

For .net, DENIC will also establish continuous capacity planning and system 
monitoring.
See also part 2-5-b-iii: Operational Scalability for details on capacity 
planning and system scalability. Part 2-5-b-xvi: System Outage Prevention 
outlines details on the monitoring System.


1. Network & Servers

(a) Network

(i) RSLs
For .net, DENIC will strictly monitor its network components so that peak loads 
can be identified early. To ensure that the system is also able to handle peak 
loads, DENIC will provide high excess capacities for the .net RSL components 
similar to those for the current .de system. The excess capacities for the 
relevant .de components are as follows:

Layer 1: External Routing Layer
* 400 Mbps transit capacity (vendor); typical usage: 15-20 Mbps
* Routers at 1-3% of tested bandwidth
* Core routers at 5-12% of packet forwarding capacity

Layer 2: Perimeter Network Layer
* Packet filters at 8-15% system load
* Packet filters at 0-2% of forwarding capacity
* Packet filters at 3-10% of session setup capacity

Layer 3: Service Provisioning Layer
* Switches: System load at 1-5%
* Server: Scalable by load balancers and clusters (additional servers)

Layer 4:  Internal Network Layer
* Packet filters at 0-1% system load
* Packet filters at 3-5% of forwarding capacity
* Packet filters at 2-8% of session setup capacity
* Switches at <1% of forwarding capacity
* Inter-RSL links at 1-10% of available bandwidth
* Processing reserve on all components

Layer 5:  Data Provisioning Layer
* Switches: System load between 1% and 2% for all switches
* Application Servers: Scalable by installation of additional components (add 
CPU, I/O, server)

See also part 2-5-b-i: Facilities & Systems for details.

In addition, DENIC will ensure a stable and highly-available connection to the 
Internet for .net. Several providers will be selected so that connectivity will 
be still guaranteed, also if one provider fails. As for. de, each of the core 
routers at the .net RSLs will have two transit providers connected by at least 
100 Mbps lines whose capacity will be only used by 2.5%.

See part 2-3-b-iii: Description of Facilities for details.


(ii) NSLs

As for .de, the .net NSLs will be implemented considering robustness, 
performance and extensibility. The .net NSL components will operate at less 
than 5% workload at normal query rates. Thus, high excess capacity of query or 
packet rates in peak times or during (D)DoS attacks will be provided. The 
excess capacities for the relevant components currently used for .de are as 
follows:

1. NSL Architecture
* Switches at <1% of forwarding capacity and system load
* Processing reserve on all components

2. NSL Production Architecture
Layer 1:  External Network Layer
* External lines are burstable to 100 Mbps
* Typical bandwidth use is 1% of burst
* Router/Load balancer at max. 3% typical load
* BGP router (in anycast setups) equipped with memory for at least 500,000 
routes; typically carries 1,000 routes
Layer 2: Service Provisioning Layer
* Switch is at about 1% system load
* Servers are at max. 5% system load under normal conditions

3. NSL Management Architecture
 Central NSL OoB Management
* 4 additional Disc Bays available
* 2 additional CPU Slots available
* max. 5% system load under normal conditions
* External line is burstable to 100 Mbps
* Maximum tunnel throughput is about 22 Mbps
* Typical VPN tunnel traffic 200 Kbps
* All components are at minimal system load

 NSL OoB Management Layer
* 4 additional Disc Bays available
* 2 additional CPU Slots available
* max. 5% system load under normal conditions
* External line is burstable to 100 Mbps
* Maximum tunnel throughput is about 22 Mbps
* Typical VPN tunnel traffic 200 Kbps
* All components are at minimal system load

See part 2-5-b-i: Facilities & Systems and part 2-5-b-ii: Stability & 
Performance for details.


(b) Server

Name Server
DENIC permanently monitors the data throughput for each server. Currently, the 
name servers have an average workload of 1.5% (see Figure 1). As this average 
workload leaves high excess capacity to handle peak loads, DENIC plans to 
deploy the same capacities for the .net registry.

whois
In the current .de setup, clusters of UNIX servers handle the whois requests. 
Load balancers ensure the equal distribution of the requests to all servers. 
Due to the comprehensive and regular monitoring of the whois service, DENIC is 
able to identify any increases or peaks in request volume early and quickly 
respond to the higher volume. Short term reactions include the deployment of 
additional UNIX servers which can be added to the current highly-scalable 
architecture.

For .net, the whois service will be implemented with the same setup (including 
the monitoring system) to ensure that sufficient capacities will be available 
to handle peaks or increases in request volume.

Figure 2 illustrates the number of queries per minute and whois server.

To be able to provide a whois data availability in near real-time (average 
latency of few milliseconds and a maximum latency of one minute), DENIC 
currently enhances the whois architecture by moving the public whois to 
dedicated whois servers in the Service Provisioning Layer. These dedicated 
whois servers will be integrated into the replication system of the database 
and the replications on the servers will be adapted to the demand of the public 
whois service.

This new set up will take a significant part of the public whois queries from 
the production databases and, thus, shorten the response times for the public 
whois.

Please refer to part 2-5-b-xii: Whois for details.

Application Server
Just as in the .de current setup, DENIC plans to deploy two application servers 
for .net which will be configured similar to the server of .de. Currently, the 
average workload of the CPU on the application servers (with 4 CPUs and 8 GB 
memory) is about 30% with an average e-mail request processing time of three 
minutes (see Figure 3). The servers will be scalable to 8 CPU and 64 GB memory.


2. Database System

DENIC will establish the .net database system based on the experience with .de.

The .de production database currently uses 169.7 GB out of an allocated amount 
of 250 GB. DENIC expects the .net data volume to be around 66% of the 
current .de data volume (based on five million .net domains vs. eight 
million .de domains). Assuming an equal data volume for .de and .net, this 
refers to an anticipated total data volume of around 350 GB for .de and .net.

For the .net registry system, DENIC expects an average engine busy utilization 
on a similar level to .de (i.e. currently at or below 40% of the active 
database and less than 10% of the standby database), assuming a database size 
and transaction load that is equivalent to the .de registration system.

DENIC will assign a capacity of five TB on the primary HDS and five TB on the 
secondary HDS providing an excess capacity of more than 2500% compared to the 
current database size.

Considering these aspects, the planned .net database will be equipped with very 
large excess capacity to handle the transactional growth for all three business 
case scenarios.

Due to its comprehensive monitoring system, which automatically sends e-mail 
notifications according to the integrated escalation scheme, DENIC is always 
aware of the database system status. Thus, DENIC is able to detect critical 
workloads well in advance and increase the capacity of the database system 
appropriately. The database system is well protected against outages caused by 
peak loads.

See part 2-5-b-v: Database Capabilities for details on the database system and 
part 2-5-b-xiv: System Outage Prevention for details on monitoring. Part 2-4: 
Revenue and Pricing Model contains information on the business case scenarios.


3. Backup Systems

For the .net registry, DENIC will establish comprehensive backup procedures 
which are based on the highly effective and reliable backup processes DENIC 
currently uses for the .de registry. The .net secondary RSL will serve as 
the .net backup location.

The currently operating backup system is expandable from eight to 32 devices 
regarding the tape drives. The number of administrable AIT-3 magnetic tapes can 
be increased from 147 to 645 and the data capacity from 14.7 to 64 TB. 
Currently, only 50% of the available 14.7 TB are in use. Thus, there will be 
sufficient reserves for the backup system at hand to save handle peaks. 
 See part 2-5-b-x: Backup for details.


4. Support Systems

For .net, DENIC will provide helpdesk services to registrars from two 
locations. An operations and support location will be built up at a service 
provider in Canada. Support services for .net and .de will be provided from the 
current helpdesk location in Frankfurt/ Germany. DENIC is highly committed to 
offer the same well established and highly accepted support service through its 
central helpdesk for .net registrars as currently for .de.

The helpdesk can be contacted by telephone, VoIP telephony, e-mail, web, the 
ticketing system, post and fax. Currently, the central helpdesk handles about 
200 telephone requests per day with an average handling time of three minutes.

As for .de, DENIC will ensure the availability of support systems for .net that 
will be equipped with high excess capacity to also handle significant increases 
in traffic. These capacities will be planned considering the past experience 
with the .de registry as the support service and systems served the registrars 
and registrants of eight million domains (compared to five million .net 
domains).

See part 2-5-b-vi: Geographic Network Coverage and part 2-5-b-xviv: Support for 
details.
 

Telephone & Fax System
DENIC's office PBX currently is equipped with two PRIs providing for up to 60 
simultaneous external calls which represents 10% of the capacity that DENIC's 
telephone system can handle. Just 53% of the 320 possible individual phone hook-
ups are utilized. If necessary, the system can be expanded to handle 800 such 
equipment connections.

During the IDN-Launch, the support service demonstrated its high class 
potential as it handled  1,000 calls per day with an average handling time of 
just over three minutes and a longest queue time of 1.5 minutes.

The system for processing incoming faxes is also expandable up to eightfold of 
its current capacity with the installation of additional modems.

Call Distribution
At present, the call-center software distributes an average of just over 200 
calls per day to five processing groups in a three level priority system. Up to 
100 agents can be registered in the call-center simultaneously. Currently, 
however, only 15 agents are logged-in on average at any one time. With only 
this 15% of potential utilized, the maximum waiting time is under two minutes. 
Should it become necessary to use them further, the waiting queues can handle 
an unlimited number of calls.

E-mail
At present, DENIC has four servers handling incoming e-mail traffic. They 
currently process an average of 150 incoming e-mails per minute including 
registration requests and support e-mails. This represents approximately 1% of 
the available capacity. During the implementation of IDN, over 6,000 e-mail 
requests were handled per minute with just one server processing these requests.


5. Escrow Systems

DENIC is currently implementing a data escrow procedure with a European Escrow 
Provider. DENIC expects that the deposit file size will be affected by registry 
volume peaks. To cover any expansion of the transferred data volume, DENIC 
included contractual clauses which determine the handling of data volume peaks. 

Please refer to part 2-5-b-xi: Escrow and Appendix R for details.


6. Maintenance

DENIC generally cares for reducing possible service or system outages due to 
maintenance operations to an absolute minimum.

Maintenance operations for .net will always be pre-announced and conducted in 
separate maintenance windows. As DENIC closely cooperates with its registrars, 
no planned mass requests or any other planned peaks should occur during 
maintenance periods. Thus, effects of peak loads on maintenance are minimized. 
If peaks overlap with any maintenance operations, DENIC is very flexible in 
delaying the maintenance.

To increase system availability and to avoid any performance deterioration of 
the system, DENIC normally waives system redundancy while conducting 
maintenance operations.


7. Personnel

At DENIC, particularly the technical and support teams will be affected by peak 
load situations. DENIC will respond to these situations by dynamically 
reassigning teams and actively communicating internally and externally (i.e. to 
the registrars) to enhance the exchange of information. The reassignment of the 
employees is facilitated by the broad education of the DENIC employees.

DENIC will also actively communicate with the registrars via mailing lists, 
messages posted on the web site or recorded announcements to keep registrars 
updated on the development during a peak load situation and, thus, to decrease 
the number of calls at the helpdesk.

To make the personnel available that is required to ensure a quick solution of 
the peak load situation, DENIC will also instruct to work overtime, if needed. 

DENIC employees also regularly attend specific training sessions in which the 
procedures of handling of peak load situations are practiced. Therefore, the 
staff is able to built up a profound experience in handling peak load situation 
as the trainings keep the employees updated with state of the art problem-
solving processes. Additionally, every employee participates in the trainings 
offered to the registrars.

Additionally, DENIC will use a knowledge database that will be available to all 
employees over the intranet. It will contain a detailed documentation of proven 
processes and solutions to handle peak loads, i.e. reducing reaction time to 
future occurrences.

For the .net registry, DENIC will increase the number of its support and 
technical personnel to provide a 24/7/365 support. Support teams for .net will 
be available in Frankfurt/ Germany and Canada.

Please refer to part 2-5-b-xix: Support for details.


8. Prevention of Peak Loads

Registrar Trainings

DENIC will offer training and workshop sessions as well as technical meetings 
to all .net registrars. These will aim at improving the registrars' knowledge 
about topics such as the DENIC registry processes, handling of peak load 
situations, system upgrades or contract issues. The trainings will improve the 
contact to and cooperation with the registrars and help DENIC to receive 
feedback or suggestions e.g. on current processes. In turn, the registrars 
better understand DENIC's processes and will be able to prevent or to early 
announce peak load situations.

See part 2-5-b-xix: Support for details.

Customer Relations Team
If peak load situations such as seasonal promotions occur at registrars, they 
should directly contact the DENIC Customer Relations Team. In cooperation 
between the team and the registrar, solutions for handling the peaks will be 
determined to avoid any performance loss for the other registrars, i.e. to 
guarantee equivalent system access for all registrars.

Even if there was no prior consultation with the registrar service, the 
comprehensive monitoring system would quickly identify peaks. DENIC will 
immediately analyze the reasons for the peak and contact the originator to 
resolve any failures. DENIC will also provide additional system resources at 
short notice.

See part 2-5-b-xvi: System Outage Prevention for details.


9. Handling Peak Loads: Introduction of IDN

On March 1, 2004, DENIC started to register IDNs. DENIC was the only registry 
which was able to handle the introduction of IDN on a large scale. Within two 
days, the e-mail interface of the DENIC registry system processed more than 
625,000 IDN requests. Figure 4 shows a sample distribution for incoming 
registration requests. The highest registration rate was more than 300 requests 
per domain. As of today, IDN has already become a common standard within 
the .de domain.

Due to a detailed planning of the processes and comprehensive testing well 
before the registry start, the IDN registration was handled without any 
performance deterioration. Tests included peak load tests on all programs, 
processes and interfaces to test the functionality and behavior of the system 
in peak load situations.

During the IDN registration, the incoming requests were processed using the 
first-come-first-serve principle. Every request was marked by a precise (i.e. 
exact to the microsecond) entry date stamp and handled according to this order. 
DENIC was fully compliant to the first-come-first-serve principle over the full 
handling period.

In addition, DENIC conducted pre-delegation checks for all registration 
requests to ensure that a newly delegated or updated domain had no impact on 
the .de DNS system.

The equivalent access of all registrars (i.e. the availability of a guaranteed 
minimum bandwidth per registrar to successfully post registration requests) to 
the system was fully guaranteed at all times during the IDN registration Bulk 
requests sent by a few registrars did not cause any performance loss of the 
registry system for other registrars.



(xv) System reliability. Define, analyze and quantify quality of service.

(xv) System Reliability

Highlights

* DENIC guarantees a 99.9% availability of its registry service, a 99.99% 
availability of its whois service and a 99.999% availability of the name 
service.

* To further improve its already high service levels, DENIC will introduce a 
comprehensive service level management system (SLM) for the .net and registry.

* DENIC already gathered extensive experience in developing services for 
registrars and thus will ensure professional and reliable processes as well 
as an exceptional high quality of service for the .net registry operations.

* For determining the relationship between the helpdesk and the internal 
support teams, DENIC will develop Operational Level Agreements (OLAs).

* Software development at DENIC for .net will strictly follow a formal 
standardized process to assure quality and enable quantitative quality 
measurements.

* All services will be tested by the departments and the registrars in an 
internal test environment before they are released.

* All deployed hardware will tested for adequacy, stability, performance and 
scalability.

* For testing, DENIC uses a customized testing suite which consists of self-
developed and standardized testing software.

* For the Object-Oriented (OO) analysis and design, DENIC uses UML (ArgoUML-
Open Source UML Tool). The predominant programming language is JAVA.

* For .net, DENIC will operate a comprehensive monitoring system with 24/7/365 
availability which will constantly measure the system and network components as 
well as database operations. Registrars will always have access to current 
monitoring information on the DENIC registrars' web portal.

* For constantly improving the processes in line with the Quality Improvement 
Program and for generating quantitative statistics, DENIC uses the Goal 
Question Metric (GQM) method.


DENIC is fully committed to ensure a high availability and reliability of its 
services. Therefore, DENIC guarantees a 99.9% availability of its registry and 
a 99.99% availability of its whois service.

During the operation of the .de registry, DENIC gathered extensive experience 
in developing services for registrars and, thus, will ensure professional and 
reliable processes as well as an exceptional high quality of service for 
the .net registry operations.

To be able to meet these service levels, DENIC offers redundant RSLs which are 
kept on the same data status through replication. Each RSL will have redundant 
network and telecommunications components.

International name server locations as well as geographically separated RSLs 
will contribute to minimizing the possibility of outages through natural or man-
made disasters. The two .net RSLs will be connected via high volume links. All 
other name server sites can be reached from each of the RSLs via a secure 
Virtual Private Network. 

Please refer to part 2-3-b-iii: Description of Facilities for details on RSL 
connectivity, part 2-5-b-i: Facilities & System on RSL architecture, part 2-5-b-
ii: Stability & Performance for NSL connectivity and architecture.


1. Defining & Quantifying Quality of Service

DENIC defines quality of service as high availability, reliability and 
performance of all its services perceived by the registrars, registrants and 
Internet users.

To further improve its already high service levels, DENIC will introduce a 
comprehensive service level management system (SLM) for the .net registry. For 
this purpose, service level agreements (SLAs) will be defined which reflect 
DENIC's service goals. SLAs have been developed and include the following 
information:

* Description of the respective service and its characteristics
* Agreed service times
* Response and removal times for failures and service disruptions 
* Availability, security and continuity goals for the service
* Registrar duties
* Critical business hours and exceptions (e.g. public holidays, escalation 
procedures etc.)

DENIC is committed to comply with the following performance indicators:
* 99.9% availability of the registry service
* 99.99% availability of the whois service 
* 99.999% availability of the name service
* add domain average: < 300 ms (excluding round trip time)
* Update frequency zone file: eight times per day

Please refer to Appendix D for a full overview of the SLAs offered by DENIC to 
ICANN. 
The SLM system will also monitor and control the actual service levels to 
detect whether DENIC is compliant to its SLAs.
For determining the relationship between the helpdesk and the internal support 
teams, DENIC will further develop Operational Level Agreements (OLAs).

Software Development Process

Software development for .de strictly follows a formal standardized process at 
DENIC to assure quality and enable quality measurements. For .net, DENIC will 
implement the same proven standardized procedure. 
At DENIC, the Development and the Operations Teams participate in this 
development process. In this clearly defined process, several points are 
established for quantitatively measuring quality. Measurements include error 
frequency in each phase of the software development process. The results are 
used for continuously improving and refining the process steps. Before a new 
software package is released, it is internally tested at first and then tested 
by registrars. 
DENIC conducts all steps of the required testing processes in its dedicated 
test environments. In the location of its headquarters, DENIC installed a 
complete setup for the RSL as well as for the NSL. DENIC will replicate this 
setup for .net and provide both a dedicated .net NSL and .net RSL test setup. 
(Please refer to part 2-5-b-i: Facilities & Systems for a detailed description 
of the RSL and NSL test architecture.)

Whenever DENIC develops new software or upgrades, the correct functionality is 
checked by comprehensive test scenarios before the software is deployed into 
the production environment. Applications which might be affected by the new 
software are also considered in the scenarios. 
Figure 1 illustrates one of the DENIC testing procedures. DENIC's Operations 
Team is responsible for determining the software specifications as well as for 
developing appropriate testing scenarios. To accelerate the software 
development process, the testing scenarios are defined parallel to the software 
development so that the software testing can be started immediately after the 
software has been developed.

In the development environment, the software is checked for functional 
correctness. Then, the software is installed in a test environment which is 
nearly identical to the production system (i.e. different hardware is used). 
The Quality Assurance Team carries out comprehensive functional tests which 
check the system's response to the submission of valid, invalid or inconsistent 
data. The software has to prove its stability and react correctly to all (i.e. 
100%) test cases. For example, the software must not crash and has to write its 
data correctly to the database or react to invalid input with an error message. 
All functional tests are carried out with the help of a customized testing 
suite which consists of self-developed and standardized testing software.

Performance tests are conducted to find out whether the software acts correctly 
in normal and peak load situations. Collected data include the number of 
requests handled within a determined time frame and the impacts to the database 
or other applications.
If problems occur, trouble tickets are opened. These are sent to the Software 
Development Team for analysis and bugfixing. After that, all tests are 
repeated. 
When no further bugs occur, the registrars are informed about the upcoming 
software changes and the software is installed in the registrar test 
environment, so that they also have the possibility to update and test their 
programs. The test phase takes about four weeks depending on the complexity of 
the software. Finally, the software is deployed to the production environment. 
Registrars are generally informed early about changes. 
DENIC comprehensively documents all its testing processes and results. The 
documentation is updated regularly and analyzed to improve the testing 
scenarios and procedures. The information is available to all employees.
DENIC conducts all steps of the test process in its dedicated test 
environments. In its headquarters, DENIC installed a complete setup for the RSL 
as well as for the NSL. DENIC will replicate this setup for .net and provide 
both a dedicated .net NSL and .net RSL Test setup. (Please refer to part 2-5-b-
i: Facilities & Systems for a detailed description of the RSL and NSL test 
architecture.)

Test Scenarios for Hardware

Before new hardware is deployed, it is tested for adequacy. Therefore, several 
manufactures are asked to provide test hardware of different architectures, 
like x86 (Intel, AMD), Sparc and PowerPC. DENIC then installs the software that 
will be running on the hardware in the DENIC production environment. The 
hardware is tested for stability, performance and scalability. In the test 
laboratory an infrastructure is arranged which complies with the planned setup 
or comes close, e.g. includes other servers, routers, load balancers and peak 
generators.

Development Tools

For the Object-Oriented (OO) analysis and design, DENIC uses UML (ArgoUML-Open 
Source UML Tool). The predominant programming language is JAVA.
DENIC uses the two following tools for software development:
* Source Repository: CVS - Concurrent Version System
* Build Process & Version: ApplicationGenerator (developed by DENIC)
 
The build process automatically models projects from the start i.e. it checks 
the sources of the CVS, compiles them and creates applicable versions.
In the build phase, extensive unit and integration tests are conducted for all 
modules. Furthermore, DENIC uses the "Continuous Integration" process. This 
process ensures an early identification of bugs. Whenever project modules have 
to be changed, the whole project is rebuilt. All unit tests are rebuilt and re-
executed. 
In addition to the unit and integration tests, DENIC also conducts validation 
and verification, error recovery, performance and usability tests.
DENIC also uses an internal bug tracking system.


2. Analyzing Quality of Service

For .net, DENIC will operate a comprehensive monitoring system with 24/7/365 
availability which will enable the company to conduct multifaceted measurements 
of the system, network or database operations. DENIC will constantly monitor 
e.g. response times, availability of systems or components, database 
utilization ratios, up-times, processed requests etc. The data will be stored 
in the monitoring tools which then generate numerous pre-programmed reports. 
The monitoring approach will allow DENIC to immediately solve errors and 
malfunctions. In addition, DENIC will use the generated reports to prove its 
compliance to the SLAs as well as for planning future technical and 
organizational capacity enhancements. To be able to plan capacities according 
to future needs, the monitoring system will automatically send notification 
messages whenever the defined threshold values per component, e.g. for 
component workloads, are exceeded. For example, additional servers will be 
deployed to the infrastructure when the workload per component meets or exceeds 
5%.

For .net, DENIC will also create monthly reports on the basis of the collected 
data. (Please refer to part 2-5-b-xvi: System Outage Prevention for a detailed 
description of the DENIC monitoring system). 

For constantly improving the processes in line with the Quality Improvement 
Program and for generating quantitative statistics, DENIC uses the Goal 
Question Metric (GQM) method. 

DENIC also saves diagnosis and solution approaches in a designated knowledge 
database. This database is available to all employees on the intranet. The 
collected information is used to improve reactions to future bugs as well as to 
conduct quality and long-term analyses. (Please refer to part 2-5-b-xix: 
Support for details on the knowledge database.)

Registrars will always have access to current monitoring information on the 
DENIC registrars' web portal. So, every registrar can find out about the 
availability of the services. In addition, the monthly registrar newsletter 
will publish statistics about quality aspects such as the availability of the 
name server, response times of the robots, downtimes etc. 

Furthermore, registrars will be able to directly influence new developments by 
discussing them in the registrars' discussion forum, in technical meetings or 
via mailing lists.

The technical employees continuously participate in trainings to be regularly 
updated on the latest technological developments. Furthermore, the personnel is 
closely involved in the improvement processes to assure quality. Therefore, 
DENIC regularly conducts workshops and practical training sessions. DENIC 
encourages its employees to make suggestions for improvements and honors them. 
Please refer to part 2-5-b-xix: Support for details on the DENIC support 
concept.



(xvi) System outage prevention. Procedures for problem detection, redundancy of all systems, backup power supply, facility security and technical security. Outline the availability of backup software, operating system and hardware. Outline system monitoring, technical maintenance staff and server locations.

(xvi) System Outage Prevention

Highlights

* To detect problems early, DENIC will operate a comprehensive service and 
performance monitoring system for monitoring the network, systems, services, 
components and applications.

* As of a DENIC-specific principle, all caches, queues etc. of the .net 
registry system will be largely scaled.

* To prevent system outages, DENIC will only deploy high-quality and 
comprehensively tested software.

* DENIC will establish a .net secondary RSL which will provide full redundancy 
of the  network and system components.

* DENIC will employ the concepts of intra-location setup equivalence and inter-
location setup diversity of hardware and software components to ensure full 
stability and availability of the .net name service.

* At the .net primary and secondary RSL, DENIC ensures uninterruptible power 
supply.

* For the .net backup system, DENIC will deploy highly available backup 
software, hardware and operating system components.

* DENIC will establish a dedicated Monitoring Team within the Operations Team 
being responsible for system monitoring and outage prevention at the RSLs and 
NSLs.


DENIC currently operates a highly redundant infrastructure for the .de 
registry. Due to the record of excellent system performance, this concept will 
also be implemented for the .net registry operations. Thus, DENIC will be able 
to provide a highly-available .net registry service reducing the risk of 
outages to a minimum.  
Major features for the .net registry system include a standby database which is 
kept on the same status as the primary database by replication, redundant 
system components, a comprehensive data backup and escrow system. 

1. Procedures for Problem Detection

Comprehensive Monitoring
For .net, DENIC will automatically monitor all network and system components as 
well as services and applications. For each measured indicator, DENIC will 
define a threshold value. Whenever a threshold value is reached or exceeded, 
the technical personnel will immediately be informed by system-generated 
notification messages (24/7/365). Thus, the personnel will have sufficient time 
to solve the problem before a system outage occurs. 
Scalable Systems
As of a DENIC-specific principle, all caches, queues etc. of the .net registry 
system will be largely scaled. Thus, three - four days can be bridged without 
causing a system outage, if a subordinated component such as the backup system 
fails. The transaction log of the registry database will be designed so that a 
multi-day failure of e.g. the backup system, which will be used for saving and 
deleting log information, does not cause a database server outage. Therefore, 
the log will be backed up and emptied regularly. The stable queues of the 
replication server will be sized large to save the transactions of about seven 
days. 
See part 2-5-b-xiv: Peak Capacities for details.

Software Development
To prevent the .net registry system from outages, DENIC will only deploy high-
quality and comprehensively tested software. Therefore, DENIC relies on the 
broad experience in developing stable .de registry software. DENIC strictly 
complies to standardized software development procedures. 
See part 2-5-b-xv: System Reliability for details.

2. Redundancy of all Systems

RSLs
For .net, DENIC will establish a secondary RSL which will provide full 
redundancy of the  network and system components such as the registry database, 
servers or power supply to the primary RSL. Both database servers will be 
configured identically. All changes of the configuration or user administration 
in the active database will be transferred to the standby system. The databases 
will be logically interconnected for replication.
See part 2-5-b-i: Facilities & Services and part 2-5-b-v: Database Capabilities 
for details.

With the help of a switchover procedure between the two databases that is 
currently used for .de and will also be used for .net, DENIC will be able to 
quickly change between the two RSLs. The procedure is based on virtual 
interfaces. For training and maintenance purposes, the procedure will be 
practiced regularly. (See part 2-5-b-v: Database Capabilities.)
In 2005, DENIC will deploy an additional database server with a second full 
replica as well as an additional special replica of the public whois. For this 
purpose, the replication server technique will be used to minimize latency 
times. The replication server tool also checks whether the active and standby 
database are identical by comparing the results of SQL-select statements.
NSLs

As for .de, DENIC will employ the concepts of intra-location setup equivalence 
and inter-location setup diversity of hardware and software components to 
ensure full stability and availability of the .net name service. Therefore, 
DENIC will not only operate server redundancy within one location but also 
between the NSLs.
Each NSL consists of at least three active name servers and one log host. As 
the name servers have exactly the same hardware and software setup within a 
NSL, administration and maintenance is facilitated.
In each NSL, DENIC installed three different types of server hardware, 
operating systems and DNS software. Only one software implementation is active 
at a time. In case of a failure of one software type, DENIC is able to quickly 
switch to the other software types.
This setup highly contributes to minimizing the sensibility of the whole NSL 
system to operating system, application or hardware-induced problems. 
Additionally, the risk of attacks as well as the dependency on vendors are 
reduced. There would also be no impact on the name service, if a component 
within a location failed.
See part 2-5-b-ii: Stability & Performance for details. 

3. Backup Power Supply

Primary RSL 
At the .net primary RSL, DENIC uses two separate power inputs which lead into 
an uninterruptible power supply and are connected to two independent power 
stations (see Figure 1). The switchover process from the main input to the 
reserve input is automated. A battery buffer is able to bridge a power supply 
disruption for up to 120 minutes. This time period depends on the number of 
devices in operation. Currently, DENIC uses less than 50% of the available 
capacity. If the capacity was fully used, the available battery buffer would be 
reduced to 45 minutes. Due to the highly stable and reliable power supply in 
Frankfurt/ Germany, the buffer never had to be used, i.e. no DENIC location 
ever had to operate on emergency power supply. The power supplier of Frankfurt 
(i.e. "Mainova") also guarantees to switch between the two power stations 
within one second.

Secondary RSL
DENIC will operate its .net secondary RSL in a professionally operated state-of-
the-art hosting center which will meet or exceed the specifications of the 
current .de secondary RSL hosted by COLT Telecom GmbH. 
This hosting center is equipped with a fully fault-tolerant power supply 
architecture to keep the center alive in the absence of electrical grid power. 
The average working voltage supply consists of two 10 KV rings and three oil 
transformers (one backup) of 1,000 kVA provided by the energy supplier. The low 
voltage supply comprises two redundant main supplies with an utilization of 50% 
each. They are separated due to fire protection purposes. As reactive current 
compensation, COLT is equipped with a protective conductor which is separated 
from the neutral conductor starting at the master switch.

To guarantee an uninterrupted power supply, a power-thyristor switch switches 
to feed-ins (N+1 redundant power feeds with failover capacity) without any 
performance deterioration. Additionally, N +1 diesel generators with twelve 
cylinders each, 1,600 HP, a current power output of 1,400 kVA and 72h of fuel 
supply are available. Handover batteries bridge the warm-up phase of the 
generator. Within the energy control system (PLC), voltage, electricity and 
performance are monitored by a digital bus system.
See part 2-3-b-iii: Description of Facilities for details.

4. Facility Security

Primary RSL
The primary RSL for .net will be located in DENIC'S current primary RSL 
for .de. In this RSL, DENIC enforced comprehensive security policies and 
standards.

These include:
* Multi-level physical access restrictions, enforced by electromagnetic badges 
and readers 
* Strict access limitations of DENIC personnel and visitors to rooms with 
technical infrastructure
* Uninterruptible power supply
* An alarm system protecting the office areas; an additional alarm system for 
the server rooms
* Two alarm codes required for entering the server rooms out of office hours
* Surveillance of server rooms and corridors by cameras and motion detectors; 
monitoring by the contracted professional surveillance company which supplies 
the alarm system 
* Effective air conditioning, temperature and fire control systems

See part 2-3-b-iii: Description of Facilities and part 2-5-b-xiii: Security for 
details. 

Secondary RSL 
The .net secondary RSL will be equipped with the same state-of-the-art security 
specifications regarding physical access restrictions, surveillance, security 
personnel, power supply, environmental and physical security as the current .de 
secondary RSL which is located in a highly secure and modern hosting center.
See part 2-5-b-i: Description of Facilities and part 2-5-b-xiii: Security for 
details. 

5. Technical Security

DENIC enforced strict security policies that comply with ISO1799 and include 
the rigid definition of protocols, extensive filtering, access limitations and 
password policies.
Part 2-5-b-xiii: Security provides a detailed description of network, system 
and application security at the RSLs and NSLs as well as an outline of database 
security. 

6. Availability of Backup Software, Operating System & Hardware

For the .net registry, DENIC will set up similar highly effective and reliable 
backup procedures as currently used for .de. DENIC will deploy the same highly 
available backup software, hardware and operating system components as for .de 
because the components proved to be reliable under all conditions. All 
components will be highly scalable and, thus, provide high excess capacities. 
The .net backup server and tape library system will be installed in the highly 
secure secondary RSL located at the premises of a state-of-the-art housing 
provider. As the two RSLs are geographically separated from each other, the 
availability of at least one RSL in the event of an emergency in ensured. The 
two separate .net RSLs will be connected via high volume links.
The TiNa software will be installed on a dedicated .net backup server which 
will be integrated into the SAN and directly connected to the HDS as central 
storage. It will also have a direct connection to a SpectraLogic Tape Library 
with AIT-3 tapes as physical backup medium. 
Part 2-5-b-x: Backup for further details.

7. Monitoring

DENIC operates a comprehensive service and performance monitoring system that 
regularly monitors the network, systems, services, components and applications. 
Due to these monitoring procedures, DENIC is able to early identify, track and 
document system problems and outages. DENIC also uses the monitoring data to 
prevent future outages. A similar system will also be established for the .net 
registry.

(a) Network Monitoring

(i) RSL Network & Service Monitoring

All RSL network components are monitored for abnormal behavior by centrally 
storing and processing syslog messages, catching SNMP traps and notifying the 
operators quickly in case of any event that could cause a service degradation 
or interruption.
Network monitoring currently takes place from a central location, while a copy 
of syslog messages is stored in the local buffer of every machine. In the 
future, monitoring and logging will be performed decentrally to avoid missed 
messages or traps, if a part of the management network is temporarily 
unreachable. This logging mechanism will first be implemented in the NSLs.
Service monitoring is already performed from various points of the network 
topology. Services are monitored and, if necessary, modified from the inside. 
Log files are written and processed locally and the engineers are notified upon 
any incident occurring in the service or machine log files. This will also move 
to a decentralized logging structure implemented on redundant log storage and 
processing servers.
Log file monitoring is not only used for the detection of emergency situations, 
but also for  performance and functionality monitoring. Thus, DENIC can change 
or add resources to specific services before a service degrades noticeably.

(ii) NSL Network & Service Monitoring

NSL monitoring is two-staged process. The NSL log host collects all data per 
NSL locally and real-time. It filters and classifies all collected data and 
sends them to central collectors. Decentral systems consolidate all incoming 
information.
Reachability of the NSLs is monitored from the RSLs both for the NSL management 
network and for the provided service. The service is also monitored from 
external locations. For anycast NSLs, this external monitoring is located close 
to the NSLs because of the nature of anycast.
DENIC is working on an agreement with the RIPE NCC to use their worldwide 
monitoring infrastructure to check and ensure .de and .net DNS service quality. 
RIPE NCC monitors the name servers of the root zone and of selected TLDs such 
as .de. Therefore, RIPE NCC sends requests to DENIC's name servers from many 
worldwide locations and analyzes the responses. The results are put into 
graphics and made available to the public by RIPE NCC.
Visualized results are available under http://dnsmon.ripe.net.

(b) System Monitoring 
DENIC uses Sightline as the main monitoring software tool for monitoring server 
system parameters, services, log files as well as for data analysis. Additional 
programs developed by DENIC monitor run times or perform functional tests. 
The Network Team conducts additional post-mortem analyses of log files for 
tracking failures. The log files include:
* Log messages of the components
* SNMP-Traps in case of events (e.g. Interface up/down, BGP-Session  start/stop)
* Packet filter rules 
* Used bandwidth on switch and router ports (graphical)

Potential additional tools such as Nagios (i.e. controls services and 
availabilities of services and components) are continuously evaluated.
The collected data is stored (e.g. live data for six days, engine data for six 
weeks, long history files for years) and used for root cause analysis of system 
problems and outages. In addition, it allows a comprehensive capacity planning 
as data is documented and reported over time. 
Monitoring statistics are available to DENIC registrars on the respective 
registrars' web portal.
In defined intervals ranging from 30 - 60 seconds, DENIC frequently collects 
extensive data on system parameters such as CPU, network, memory, process, 
kernel, I/O metrics as well as disk controller or file system information on 
relevant servers.. These servers include: 
* Name servers
* Application servers
* Database servers
* Replication server
* whois servers
* E-mail servers
* Web & FTP servers

DENIC also monitors selected services such as http and https, smtp, ftp, dns, 
whois. Collected data include round trip times, response times or error 
indicators. 
Additionally, the following information is automatically gathered, visualized 
and archived to continuously monitor the compliance to the SLAs:
* whois and name server query load
* Web whois utilization
* whois response time
* Service reply time (registry service availability) 
* Sychronization check of the two registry databases
* Functional tests of all service

The data is transferred to Sightline for visualization, to send notification 
messages and to archive them.
All indicators are permanently monitored. If error messages or critical entries 
occur, notification messages are sent to the Operations Team. The e-mail 
servers generate a daily activity report documenting the activities of the 
previous day. DENIC uses this data as basis for detecting potential future 
bottle necks. 
The availability of the DENIC services is also monitored from several external 
locations to e.g. check the way the registry requests are coming to the system.

(c) Database Monitoring
DENIC permanently monitors the complete database system by automated programs. 
The following parameters are continuously read from the database, verified and 
written into the appropriate logfiles.
* memory space and degrees of utilization
* free space of the database
* database processors
* error logs of the database and replication server
* success control of database backups, full and transaction log backup
* runtime and data volume of backups
* database replication
* replication agent threads
* utilization of the replication queues
* latency times

Performance reports of the monitored indicators (e.g. engine busy utilization) 
on the registrars' web portal ensure a high transparency regarding the database 
status. 
For critical parameters like the number of required locks, an escalation scheme 
was integrated. Depending on the value, the appropriate message is sent to the 
responsible employees. In the unlikely event of an error, the 24/7/365 
available Emergency Team initiates the appropriate actions at once.
Errors in one of the databases are always treated with the utmost urgency. An 
incident in the database will be classified as priority 1 or 2. The incident 
prioritization scheme and escalation policies are described in detail in Part 2-
5-b-xix: Support.

8. Technical Maintenance Staff
For .net, DENIC will establish a dedicated Monitoring Team within the 
Operations Team being responsible for system monitoring and outage prevention 
at the RSLs and NSLs. This team will conduct comprehensive analyses of the 
monitoring data and of past system failures to help prevent future outages and 
to continuously improve the current infrastructure. 
In case of a system failure, the 24/7/365 available team will receive 
notification messages and be able to instantly react according to the DENIC 
emergency procedure. DENIC will also set up an Emergency Team offering a 
24/7/365 standby service for the registrars.

9. Server Locations
For the .net operations, the primary RSL will share the facilities of the .de 
registry in Frankfurt/ Germany; the .net secondary RSL will be either located 
in Amsterdam, London or a US East Coast location at the premises of a 
professional hosting provider. The distance between the two .net RSLs increases 
security as the dependence from single points of failure is minimized.
For the name service, DENIC will provide 14 .net NSLs operational by June 30 
and 19 .net NSLs by December 31, 2005:
* Each site will be equipped with multiple name servers.
* The .net infrastructure will be implemented in eleven existing .de NSLs 
worldwide
* Three additional .net NSLs in North America.
* Five additional .net NSLs to be opened until the end of 2005 - all of them in 
emerging markets.

DENIC operates all its name servers compliant to the standards of root name 
servers [RFC2870].
All NSL setups will be installed at professional high-quality hosting sites 
with extensive backup systems for cooling, electricity and security. 
See also part 2-5-b-vi: Geographic Network Coverage and part 2-3-b-iii: 
Description of Facilities for details.



(xvii) Ability to support current feature functionality of .NET (to the extent publicly or otherwise available to the applicant, including IDNs, support of IPv6, DNSSEC.

(xvii) Ability to support current feature functionality of .NET

Highlights

* DENIC will support current feature functionality for .net, including IDN, 
IPv6 and DNSSEC.

* DENIC has been registering IDN since March 2004 for .de domains and will 
expand this service to .net domains.

* DENIC is currently running two name servers on IPv6 and is ready to adapt the 
infrastructure to a potential increase in demand. DENIC will offer whois and 
other services on IPv6 in the near future.

* DENIC has been researching DNSSEC for more than five years and has evaluated 
Secure DNS for the .de operations. DENIC is prepared to respond to the needs of 
the Internet community in this area.


1. IDN Registration 

DENIC will offer IDN (Internationalized Domain Names) registration for .net 
domains based on the ICANN guidelines as published on June 20, 2003 at 
http://www.icann.org/general/idn-guidelines-20jun03.htm. DENIC will comply to 
these guidelines and will implement its IDN offering in the following way:

 (1) DENIC will implement a solution according to the Proposed Standards RFC 
3490, 3491, and 3492 (collectively the "IDN standards") and will not follow any 
IDN approach which is not sanctioned by the IETF (e.g. responses to 8-bit DNS 
queries, either in different local encodings or UTF-8).

 (2) In terms of allowed domain name characters it is, according to the IDN 
Standards, generally possible to generate any domain name that consists of 
Unicode codepoints (see http://www.unicode.org/charts/). However, some 
characters will be mapped after applying a normalization (nameprep) to them 
(e.g. in German dass.net: daß.net becomes dass.net after normalization). Taking 
this into account, all Unicode codepoints which can be mapped after applying 
nameprep should be allowed and be admitted on the respective positive lists. 

 (3) The Unicode tables contain language related definitions, too. This area 
defines tables that are valid and allowed for a certain language. So, when a 
registrant states a language tag for its domain it can only use the codepoints 
from the accordant language specific code tables. A Unicode/codepoint-language 
matrix will support and simplify the validation process of using characters in 
the context of a specific language. 

 (4) DENIC will collaborate with other registries, regional bodies and cultural 
communities to develop language-specific registration policies.

 (5) DENIC's Unicode/Codepoint-Language matrix will ensure that, for every 
initial implementation, only character-sets can be used that are permitted for 
the specific language.

 (6) DENIC will offer registrar support as described in part 2-5-b-xix: 
Support. Registrars will offer support to registrants for .net in the 
respective languages.

DENIC has been offering its .de IDN services since March 2004. DENIC's web site 
gives more information on the start and some details on the status of IDN 
(http://www.denic.de/en/domains/idns/).


2. IPv6 Support

DENIC is committed to supporting the IPv6 protocol. The focus of DENIC's 
efforts is on supporting community use of IPv6 for their business by providing 
the necessary services.

For .de domains, DENIC has been offering IPv6 DNS resolution service since 
December 2003. DENIC currently operates two name servers on IPv6. DENIC was one 
of the first TLDs applying for the inclusion of an AAAA record in the root zone 
on July 27, 2004 after IANA enabled records in the root zone on July 12, 2004. 
The first DENIC server with an AAAA record has been in the root zone since 
October 2004 and the second name server since December 2004. DENIC constantly 
monitors DNS queries received over IPv6 and will add capacity in sync with 
increasing IPv6 demand. For instance, DENIC will offer AAAA glue in the records 
in the .de zone in the first quarter of 2005, now that first registrant demand 
has appeared. For this offering, the database and zone generation is ready for 
operations. This functionality obviously will also be offered for .net.
Furthermore, DENIC will offer a whois server, web presence and registry 
services on IPv6 protocol in the near future.


3. DNSSEC Support

DENIC will take over the complete data stock of the test bed from VeriSign and 
will continue and further develop DNSSEC for .net. For a smooth data transfer 
it will be important that detailed information on the status of the pilot be 
handed to DENIC immediately after the decision about the new registry operator 
on March 30, 2005.

DENIC is committed to broaden the DNSSEC development from a purely server 
focused approach as currently followed by VeriSign to a holistic DNSSEC 
approach. Real security can only be gained if servers as well as resolver 
software and all applications are integrated into the DNSSEC concept. DENIC 
will foster the DNSSEC development with such a holistic approach and will 
cooperate with software and application providers to enable a fully secure 
environment.

DENIC has been working on DNSSEC topic for several years to understand and 
evaluate this protocol for its benefits and deployment options for .de 
operations. In 2000, DENIC did a first study on the deployment of DNSSEC 
for .de. The following link directs to a presentation on an update of this 
study in 2001 (http://www.dfn-cert.de/dfn/berichte/db092/DFN-Praesentation-
160501_03.pdf). In 2003, DENIC in cooperation with the Research Center for 
Information Technology (FZI) and the German Federal Department for Security in 
the Information Technology (BSI) has done a study on "Security for the top 
level domain .de through Secure DNS" 
(http://www.bsi.de/literat/studien/securedns/). 
DENIC is committed to further develop and to provide DNSSEC functionality to 
the scope, breadth and in the form as it is requested and demanded by the 
Internet community.

(xviii) System recovery procedures. Procedures for restoring the system to operation in the event of a system outage, both expected and unexpected. Identify redundant/diverse systems for providing service in the event of an outage and describe the process for recovery from various types of failures. Describe the training of technical staff that will perform these tasks, the availability and backup of software and operating systems needed to restore the system to operation and the availability of the hardware needed to restore and run the system. Describe backup electrical power systems and the projected time for system restoration. Describe procedures for testing the process of restoring the system to operation in the event of an outage, the documentation kept on system outages and on potential system problems that could result in outages.

(xviii) System Recovery Procedures

Highlights

* DENIC has a disaster recovery plan in place that aims at ensuring the quick 
full recovery and resumption of the normal operations within predefined time 
frames following an unpredictable event.

* For .net, DENIC is committed to set up a highly reliable system architecture 
and to apply and - if appropriate - enhance the recovery procedures.

* DENIC will define a standardized problem resolution procedure to be able to 
quickly resolve failures.

* DENIC will operate redundant components on all architecture layers. 
Therefore, expected and unexpected outages will be handled by switching the 
failed component from the primary RSL to the secondary RSL without having to 
perform comprehensive recovery procedures.

* DENIC applies the concepts of intra-location setup equivalence and inter-
location setup diversity of hardware and software components to ensure full 
stability and availability of its name service.

* For the RSLs and NSLs, DENIC uses a mixture of spare components and 
preconfigured systems as well as vendor service contracts to ensure a quick 
reestablishment of redundancy in case of hardware failures.

* The concept for a prompt resumption, including cold recovery of the .net 
registry operations in the case of a disaster, is based on escrowed information 
(i.e. data, production versions of DENIC's developed software, the latest DRP 
including procedures and documentation etc.) and the placement of a contract 
with an RSL operator.

* The responsible DENIC technical staff has already built up a profound 
knowledge in recovering the systems, as the staff has several years of 
experience in executing routine recovery procedures.

* For training purposes, scenarios causing a disaster are tested once a year.

* DENIC will introduce a database to fully document and analyze system outages 
as well as to document the related solutions.

* For .net, DENIC will compile an instruction manual of the .net processes and 
procedures that enables DENIC or any entitled third party to restore the 
services in case of a disaster.


1. Procedures for Restoring the System to Operation in the Event of a System 
Outage 

For .net, DENIC will operate a highly redundant architecture for all system 
components. In addition, only intensively tested high-quality hardware and 
software products will be deployed to the production environment. Thus, DENIC 
is able to reduce potential outages to a minimum. 

For the unlikely event of an outage, DENIC defined appropriate system recovery 
procedures for the .de operations, which are exercised during regular training 
sessions. 

For .net, DENIC is committed to apply and - if appropriate - enhance the 
recovery procedures. Details on recovery procedures are presented in this 
chapter. 

As for .de, DENIC will also set up all .net systems to be compliant to well-
accepted standards such as ITIL or the IT security guidelines issued by the BSI 
(i.e. German Federal Office for Information Security) to further increase 
system stability or security.

(See http://www.bsi.bund.de/gshb/english/etc/index.htm for details on the IT 
Baseline Protection Manual.)

 
(a) Disaster Recovery Plan

DENIC is committed to protecting all business information, processes and 
registry data from unpredictable events. Therefore, the primary and backup 
registry system for .net will be prepared and tested to ensure the ability to 
continue the operation in the event of a business interruption. 
As for .de, the .net RSLs will also be designed to: 
* Recover DENIC's technology infrastructure and information
* Prevent the loss of information and transactions
* Allow DENIC to continue conducting its primary business functions

DENIC`s Disaster Recovery Plan (DRP) aims at ensuring the quick full recovery 
and resumption of the normal operations within predefined time frames following 
an unpredictable event.
To accomplish this, DENIC has 
* developed formal processes that allow the continuation or prompt resumption 
of critical business functions and
* established procedures for data backup, software, documentation and 
procedures.

The plan is reevaluated once a year. DENIC always reviews all parts of the plan 
in detail. In addition, the plan is tested on a regular basis and enhancements 
are continuously added. The Disaster Recovery Coordinator is responsible for 
monitoring the accomplishment of the recovery plan. The coordinator also 
ensures that the plan meets standards (ISO 17799) and is consistent with the 
rest of the plan. 

(b) Problem Resolution Procedure

For .de, DENIC defined a standardized problem resolution procedure to be able 
to quickly resolve failures. This procedure will also be applied for .net and 
enhanced and/or modified, if required.

Whenever a problem occurs, DENIC scans its Outage and Solution Database for 
similar entries. If the problem occurred in the past, an entry will be found 
including a solution procedure. Otherwise, a new entry is created, categorized 
and prioritized. This entry keeps track of all activities until problem 
resolution.

For documenting the outage in detail, a respective failure report is added to 
the database including date and time of the occurrence, the removal process as 
well as the employee who removed the failure.

To continuously improve the problem resolution process, DENIC also performs 
periodical analyses of incidents including the resolution status, time of 
resolution and frequency sorted by category and priority. 

(c) Whois Service

For .net, DENIC will use clusters of whois servers in the primary RSL and in 
the secondary RSL. Requests will be distributed to the servers by load 
balancers. This setup can be scaled by adding whois servers as required.
For recovering the server system, the following steps will have to be completed:
* Automatic installation of the operating system via installation server 
* installation of specific software from repository
* adding the server to the cluster after verification

Load balancers will also be redundant in the whois cluster. As the load 
balancers monitor each other constantly, one automatically replaces the other 
in case of a failure.
Please refer to part 2-5-b-xii: Whois for further details.


2. Redundant/ Diverse Systems for Providing Service in the Event of an Outage

Registry Service Locations (RSL)

For .net, DENIC will establish two separate and independently operating RSLs 
with a complete database and registry system available in Frankfurt/ Germany 
(primary RSL) and at a major international access point, e.g. Amsterdam, London 
or a US East Coast location (secondary RSL). The databases will be kept on the 
same data status through replication. Upgrades and changes of the registry 
system will be conducted on both RSLs in parallel. 

For .net, DENIC will operate redundant components on all architecture layers 
(see Part 2-5-b-i: Facilities and Systems for additional details). Therefore, 
expected and unexpected outages will be handled by switching the failed 
component from the primary RSL to the secondary RSL without having to perform 
comprehensive recovery procedures. DENIC regularly switches between the two 
RSLs in order to test the recovery plan.

In case some parts, applications, components etc. or even a whole RSL fail, the 
redundant component(s)/ RSL take over the functionality immediately. The switch 
from one component to the other is a semi-automated process, as there are 
consistency checks to perform. The switchover process of the RSL has already 
become a DENIC standard procedure which is regularly practiced.

Due to this technical architecture, failures of e.g. a web server processor, 
the authentication server or VPN link will not impact the production 
environment as the redundant component replaces the functionalities of the 
failed one. 

For the RSLs, DENIC relies on spare components and preconfigured systems as 
well as vendor service contracts to quickly reestablish the redundancy in case 
of hardware failures.

Please see part 2-5-b-i: Facilities and Systems for detailed information on RSL 
architecture and redundancy, part 2-5-b-xvi: System Outage Prevention for 
details on redundancy, part 2-5-b-v: Database Capabilities for the setup of the 
database system and switchover process and part 2-5-b-x: Backup for details on 
recovery procedures of the database. 

Name Server Locations (NSL)

As for .de, DENIC will apply the concepts of intra-location setup equivalence 
and inter-location setup diversity of hardware and software components to 
ensure full stability and availability of the .net name service. 

Therefore, DENIC will not only operate redundant servers within one location, 
but also between the currently eleven name server locations (14 .net locations 
by June 30, 2005 and 19 .net locations by December 31, 2005). The redundant 
components within one location will be absolutely equivalent, while setups 
between locations will differ.

There will be a cluster of at least three identical active name servers and one 
log host in each location. The failure of one server will not cause any 
outages, as the cluster management software disables the failed server. The 
data processing will continue on the remaining servers. 

To ensure a quick reestablishment of redundancy in the event of hardware 
failures, DENIC uses a mixture of spare components and preconfigured systems as 
well as vendor service contracts. A failed device will be replaced within one 
day inside Europe and within four days outside Europe on average.

In each location, DENIC will install three different types of software. Across 
these locations, different types of software will be active at a time. It will 
be possible to immediately switch an NSL cluster from one software to another, 
e.g. in case of known software exploitation. Additionally, DENIC will use three 
different server types across its locations and employ both unicast and anycast 
technology in the network layer. To keep the name service responsive to client 
requests, DENIC will deploy every known technology.

Due to the setup of all NSLs (e.g. three types of DNS software, three server 
hardware types, IPv4 and IPv6 per location) as well as the high excess 
processor capacity (NSL servers have a maximum workload of 5%), a failure of 
the name service due to Distributed Denial of Service [(D)DoS] attacks or 
hardware/ network problems is very unlikely.

Please refer to part 2-5-b-i: Facilities and Systems and part 2-5-b-ii: 
Stability and Performance for detailed information on NSL architecture, 
connectivity and functionality. Part 2-5-b-xvi: System Outage Prevention for 
further details on NSL redundancy, part 2-5-b-vi: Geographic Network Coverage 
for details on name server locations. Part 2-5-b-iii: Operational Scalability 
provides additional information on (D)DoS attacks.

3. Process for Recovery from Various Types of Failures

According to DENIC's DRP, it is possible to quickly resume the full operations 
after the rather unlikely case of total breakdown of both RSLs. This concept 
will also be applied to the .net registry operations. 

Even in case of a disaster, the name service operations for .net can be 
sustained with the database status at the time the disaster happened. Only the 
registry service would be affected by this outage.

The concept for a prompt resumption, including cold recovery of the .net 
registry operations in the case of a disaster, is based on the following 
prerequisites. Most of them are already in place; the remaining will be put in 
place during 2005:

* The production versions of DENIC's developed software is always deposited at 
DENIC's escrow provider, as well as the latest DRP including procedures and 
documentation.
* In case of a disaster, a contract will be placed with an RSL operator, who 
can provide the required capacities of server systems and data memory 
(including network connectivity) as well as the necessary capacity of 
workstations (including network connectivity). Thus, all registry 
functionalities (e.g. registration, support, etc.) could be restored.
* All data required for the resumption of the registry operations will be 
transferred to these systems. This data covers:
* Software packages for standard software (system software and software close 
to the system, e.g. database server, replication server, application servers) 
including configuration data
* Software for special registry services including configuration data
* Backup or escrowed data of the registry database
* Metadata of the registry database, e.g. DDL scripts for the generation of the 
database and all database objects (e.g. tables, indices, constraints, trigger)
* Network configuration data
* Installation instructions, which provide a detailed description of the system 
implementation procedure so that these procedures can be carried out by DENIC's 
qualified personnel
* Diagnostic and startup programs


4. Technical Staff who Perform Recovery Procedures

Immediately following an incident, a planned sequence of events begins. Key 
personnel are notified and necessary recovery teams are grouped to carry out 
the plan. Personnel currently employed are listed in the relevant checklists 
and DRP.

At DENIC, the responsible technical staff (Operations, System Administration 
and Emergency Team) has already built up a profound knowledge in recovering the 
systems, as the staff has several years of experience in executing routine 
recovery procedures.

For training purposes, scenarios causing a disaster are tested once a year. 
Certain recovery procedures such as the switchover from one RSL to the other 
are practiced regularly. In addition, all team members regularly attend .de-
specific training sessions, which will be extended by .net-specific trainings, 
to regularly practice the recovery procedures.


5. Software and Operating Systems for Restoring System Operations

DENIC keeps replacement components for the name servers at the headquarters in 
Frankfurt/ Germany to facilitate the exchange of components in case of a 
failure. Usually, one or two devices with the appropriate configurations are 
available per server. These servers will be shipped and implemented within one 
day inside Europe and within four days outside Europe on average.

As all systems are redundant on all levels, the failure of a system component 
or the whole system will not cause any service outages. The redundant device 
will take over the functionalities of the failed one until its replacement. 

Switchovers between the RSLs or its components are regularly performed. In 
addition, DENIC operates a comprehensive testing environment.

See part 2-5-b-i: Facilities and Systems and part 2-5-b-ii: Stability and 
Performance for details on system redundancy and the testing environment and 
part 2-5-b-v: Database Capabilities for details on the switchover process.


6. Documentation of System Outages and Potential Problems 

Outage and Solution Database

As for .de, DENIC will also introduce a database to fully document and analyze 
system outages as well as to document the related solutions.

All historic outages are documented in this database including a detailed 
description of the outage and its resolution. The database is constantly 
available to all employees.

The documented problems and outages are regularly reviewed and mainly used for 
comprehensive root cause analyses, future capacity planning, performance 
management or trend analyses. On the basis of all the collected information, 
DENIC is fully enabled to develop strategies for the future prevention of the 
outages.

Instruction Manual

As part of the DRP, DENIC developed a detailed instruction manual for its .de 
processes. The technical departments documented their procedures and processes 
for the day-to-day operations as well as for the restoration of services, e.g. 
configurations of all system components in case of disasters.

For .net, DENIC will also compile a similar instruction manual that enables 
DENIC or any entitled third party to restore the services in case of a disaster.

Trouble Ticketing and Knowledge Database

To guarantee the permanent monitoring and possible escalation of all .net-
related requests that enter the second level support, DENIC will log and manage 
them all in a central ticketing system (see Figure 1). Tickets will be closed 
as soon as the second level support was able to solve the requests. If a new 
request or a new solution appears, it will be entered into the knowledge 
database. 

As for .de, this database will contain know-how on process handling as well as 
a Frequently Asked Question Section, e.g. how to restart a server. All 
employees will have access to this database. Thereby, DENIC is able to reduce 
response times as the resolution of technical problems or outages or the 
recovery of applications can be accomplished faster. To offer a demand-oriented 
selection of information, DENIC continuously analyzes all requests. 

Please see also part 2-5-b-xix: Support for details on the ticketing system and 
knowledge database.

Risk Management System

Two years ago, DENIC built up an extensive risk management system to document 
potential risks, the protection against these risks as well as procedures and 
processes for resolving the risks. For .net, DENIC will also develop a risk 
management system which will be based on the existing one.  

DENIC regularly lists and evaluates potential risks for all of its business 
operations and also assesses the probability of occurrence per risk. In this 
case, risks include e.g. fires, burglaries, environmental or man-made 
disasters. Furthermore, the resolution procedures and escalation processes are 
described in detail for each risk and employees who will be responsible for 
conducting the procedures correctly in case of emergency are assigned.

All of the information mentioned above is summarized in DENIC's risk manual, 
which is audited by the Cooperatives Association once per year.

DENIC also uses the regular risk reviews to continuously enhance and improve 
its resolution and recovery procedures as well as to minimize the risk 
occurrence. 

Performance Monitoring System

For .net, DENIC will operate a comprehensive service and performance management 
system which will be based on the current monitoring system. 

The system extensively monitors all systems, services, components, and 
applications. Due to these monitoring procedures, DENIC is able to early 
identify, track and document system problems and outages. 

Please refer to part 2-5-b-xvi: System Outage Prevention for a detailed 
description of the DENIC monitoring system.



(xix) Technical and other support. Support for registrars and for Internet users and registrants. Describe technical help systems, personnel accessibility, web-based, telephone and other support services to be offered, time availability of support and language-availability of support. Ability to support new and emerging technologies.

(xix) Technical and Other Support

Highlights

* Complete web site support in Arabic, Chinese, English, French, German, 
Korean and Spanish for .net.

* 24/7/365 customer service in English, support in German from 5 to 19 UTC 
seven days, together covering 90% of all registered .net domains and 70% of 
all .net registrars in their native language.

* Support in three further languages (Korean, Spanish, French) through call 
back, additional languages will be added later upon need.

* Leading edge three level support structure with a 98% first contact 
resolution rate at 1st and 2nd levels.

* Long track record of customer service for registrars and registrants with 
excellent service levels (e.g. 1,000 calls a day at peak with average 
resolution times of three minutes).

* Very close contact to registrars to ensure service quality and further 
development of services.

* Full compliance with all ICANN policies, e.g. the agreed UDRP.


Support for Public Internet Users and Registrants
DENIC is committed to delivering high quality and reliable service to all 
registrants and the Internet community as a whole. Therefore DENIC provides 
support via several interfaces and communication channels, namely web, e-mail, 
letter and fax.

Public Web Site
The future .net web site will contain equivalent information to the current 
public .de web site (http://www.denic.de/en/index.html) with all information 
available in Arabic, Chinese, English, French, German, Korean and 
Spanish.

In addition to this general information, several tools are publicly available 
on the web site, such as an "IDN-Converter" to find the ACE form of an IDN 
domain, a "Zone Check" tool developed by AFNIC to check zones and name server 
configurations. DENIC will also offer "Reporting Lame Delegations" to allow 
users to report domains with incorrect delegations.
A public whois service is also provided. (see part 2-5-b-xii: Whois Service for 
details).

The web site offers an extensive FAQ section as well as a contact form which 
sends a help request to DENIC's central helpdesk.
DENIC's websites enable output on Braille converters to accommodate the needs 
of the visually impaired and blind. All websites are designed to meet the 
relevant standards.

Central Helpdesk
DENIC is currently offering a well established, experienced and highly accepted 
support service for .de via its central helpdesk for registrants, registrars 
and the interested public.
The central helpdesk currently handles about 200 requests per day with an 
average handling time of three minutes and about 4,000 e-mails per month. The 
support service demonstrated its high potential on the IDN-launch by handling 
approx. 1,000 calls in one day with an average handling time of three minutes 
and a longest queue time of 1.5 minutes. DENIC's central helpdesk has 
consistently been able to answer 98% of all questions directly.
As DENIC will not have contractual agreements with registrants, the main focus 
of our .net Support Team is dedicated to the registrars. Nevertheless, DENIC 
places high importance on the information and support of the general public.

Mailing Lists
Registrants and other Internet users can subscribe to DENIC's public mailing 
lists which provide information about DENIC, new developments in the registry 
environment, as well as planned maintenance and other relevant topics. If 
subscribed, users can also send messages to the complete list and thus interact 
with other users and/or DENIC. DENIC will offer similar mailing lists 
customized to the needs of the .net registrant community.

Dispute Resolution 
The Uniform Domain-Name Dispute Resolution Policy (UDRP) has been adopted by 
ICANN-accredited registrars for all gTLDs. DENIC will fully implement the UDRP 
for all .net domains as specified in ICANN policies 
(http://www.icann.org/dndr/udrp/policy.htm). Therefore, DENIC will employ a 
fulltime employee in its Frankfurt headquarters to overlook the ICANN policy 
compliance including UDRP of DENIC for all .net services.

AuthInfo Code Support 
For every domain a unique AuthInfo Code will be generated and saved. Domain 
transfers can only be executed when this AuthInfo Code is stated by the 
registrant to prevent unauthorized transfers. The registrar is committed to 
give the AuthInfo Codes to its registrants. Additionally DENIC will offer a 
service for registrants who forgot or lost their AuthInfo Code to recover the 
code or to generate a new code.


2. Support for Registrars

DENIC is experienced in supporting registrars of all backgrounds and sizes.
In its special position as German ccTLD registry DENIC is offering direct 
registrar services for .de to the public, as described in part 2-b-i: 
Description of Current Business Operations. While these services are not at the 
core of its philosophy, DENIC gains valuable insights into the activities and 
concerns of registrars through this.
The Support Team maintains a database with registrar contact information. The 
data is treated with the utmost confidentiality and is only used internally for 
conflict resolution between registrars.

(a) Registrar Administration

Registrar administration refers to two separate processes:
* Adding, activating, updating, deactivating or deleting registrars
* Updating accredited registrar's data, e.g. contact addresses, status and 
technical details
While the activities listed first are solely performed by DENIC's central 
helpdesk, the update of specific registrar information can be done by each 
registrar via DENIC's secure web access. The registrar web portal is described 
in detail later in this chapter.

(b) Report Generation

DENIC generates regular reports and statistics that contain relevant 
information for registrars. They can be accessed in the registrar area of the 
DENIC intranet or received via mail. Currently, the following reports are 
available:
* Domain portfolio
* Domain activity list
* Object list
* Billing reports
* Customized reports

The standard reports for .net are going to be defined by DENIC in close 
cooperation with the registrars.

(c) Web Portal

In addition to the public web sites, registrars have access to a separate 
secure web portal via SSL. (For reference, a password can be requested by the 
evaluators to review the existing portal for .de registrars at 
https://member.secure.denic.de/en/index.html).

General Information Area of Registrar Web Portal
The web portal consists of a general registrars area with information relevant 
for the whole registrar community. Specifically, the following information is 
available:
* News
* Technical background information
* Documentation of the registry system and How Tos
* Help for administrative questions
* Tools (name server check, IDN converter, cryptpw)
* Statistics about registry performance
* Lists with registrars and their contact information 
* System overviews and maintenance information
* Information about upcoming events
* Minutes and presentations of meetings, workgroups, etc.
* Archive of mailing lists
* Project plan, roadmap and implementation rollout
* FAQs

Registrar Forum
DENIC provides a registrar forum where registrars have the ability to exchange 
opinions and information with other registrars and with DENIC. Registrars can 
comment about new developments and address open questions to DENIC.

Individual Information and Administration Area of Registrar Web Portal
The second area in the web portal is a private area for each registrar. Here 
DENIC will make available individual registrar data and customized information, 
e.g.: 
* Standardized and customized domain reports
* Accounting and billing data
* Individual messages
* Registrars will also be able to perform registrar administration functions 
like updating contact billing and other relevant information via the web portal.

(d) Mailing Lists and Newsletters

As is the current practice for .de, DENIC will maintain several mailing lists 
for .net for providing information to and encouraging interaction between the 
registrars. DENIC maintains two types of mailing lists, announcement lists and 
discussions lists for various topics. Furthermore, once per month DENIC 
provides a newsletter with the highlights of that month's discussions and 
events.

(e) Central Registrar Helpdesk

DENIC's central .net helpdesk will be strongly dedicated to the needs of 
registrars, which can access our dedicated 24/7/365 support service via phone, 
mail, fax or the web. Our three tiered support (see Figure 1) ensures call 
resolution in the shortest possible time.

The Support Teams of 1st and 2nd level are affiliated to the appropriate 
technical and administrative departments to have direct insight to the 
workflows and processes. Thus, they have been able to resolve 98% of all 
requests, with only 2% of issues having to be forwarded to 3rd level support in 
the respective functional departments. This high performance has been upheld 
over many years and was also maintained during major land rushes like the 
introduction of IDN.
Additionally, DENIC's 1st and 2nd level support will also provide customized 
reports and other information via e-mail to registrars upon requests.
As problems with registration and other requests by registrars are considered 
time-critical by DENIC, all registrars have a direct access number to DENIC's 
2nd level technical helpdesk.
DENIC's 3rd level support takes care of complex problems mainly of technical 
nature. This support is provided by the experts in the functional departments. 
If not immediately reachable, call backs are guaranteed according to our 
escalation policies.

Ticketing System and Knowledge Base
All requests that enter our 2nd level support are logged and managed in the 
central ticketing system.. Tickets which cannot be closed will be forwarded to 
the 3rd level support and resolved according to the assigned priority. Details 
about DENIC's prioritization and escalation policies are described later in 
this chapter.
Every employee has access to the knowledge base with all previous calls and 
their solutions. It enables the Support Team to react to changes in the 
structure and content of questions through focused trainings and updates via 
web sites or mailing lists. Information about new upcoming support themes will 
be made available immediately as website topics or a HowTo/FAQ, thus improving 
self help opportunities.

Service Locations
DENIC will provide helpdesk services to registrars from two service locations, 
with the main location being at DENIC's Frankfurt headquarters. There, the 
complete range of service and support requests will be handled, comprising of:
* Registrar support including helpdesk
* Monitoring and alert management 
* Account management
* Billing and Accounting
* Marketing
* Training

As described in part 2-3-b-iii: Description of Facilities, DENIC will establish 
an additional support location in Canada at a service provider which will be 
totally dedicated to .net. Functional responsibilities of this location will 
include:
* Registrar support including helpdesk
* Monitoring and alert management 
* Marketing assistance
* Training assistance

DENIC has opted to subcontract these functionalities to better serve the large 
North American .net community and to offer support in English 24/7/365. With 
this solution DENIC also wins a cooperation partner for marketing and training 
in North America. The contract negotiations between DENIC and this Canadian 
provider are in an advanced status and will be finalized shortly after the 
decision of the ICANN.

Languages and Accessibility
The Frankfurt service location will be available from 5 to 19 UTC and the 
Canadian location from 16 to 7 UTC seven days year round. This results in 
English support 24/7/365 with five hours overlap between the locations, and 
German support from 5 until 19 UTC. With these two languages DENIC offers 70% 
of current .net registrars and 90% of .net registrants support in their native 
language.
DENIC will also introduce three call back languages (Korean, Spanish, French). 
Currently, DENIC can already offer Spanish and French call back service at its 
Frankfurt location. Including the call back languages 83% of current .net 
registrars and 95% of .net registrants can be supported in their native 
language. DENIC will expand the call back languages into full support languages 
and introduce further call back languages as the need arrives.
DENIC will have access phone numbers in Germany and North America that route 
the caller to the active support location. To minimize costs for registrars, 
DENIC's ticketing system will be opened for registrars so that registrars can 
open own tickets to request a call back. Furthermore, DENIC's support is also 
reachable through Voice over IP telephony.

(f) Training

DENIC provides trainings and workshops with different content to convey all 
aspects of the cooperation with DENIC to the accredited registrars. Training 
topics include, but are not limited to:
* Basic technical information 
* Technical enhancements
* Introduction of new systems and services
* Troubleshooting
* Registrar administration
* Privacy regulations
* Legal and contractual topics
* General DENIC information
Trainings are offered both in English and German with the complete training 
material available in both languages. Excerpts from our comprehensive training 
material can be made available to the evaluators on request.
198 participants from 116 different registrars had attended DENIC's training 
program in 2004 by the end of October. In total 84% of DENIC's members have 
participated in the trainings, and the vast majority of them certified more 
than one employee.

(g) Test Environment

A test environment which resembles the production system is provided free of 
charge for every registrar. There, the registrars' technical processes can be 
tested and optimized. As potential changes are introduced in the test 
environment, the registrars have the possibility to adapt their system at an 
early stage to new standards and minimize go live problems. The Support Team 
offers help in case of problems and questions and detailed roadmaps which 
define and recommend the adequate tests for the given situation and system.

(h) Registrar Toolkit

DENIC will provide a Registrar Toolkit for the registrars immediately after the 
bid decision. It will consist of a working Java and C API and samples for the 
registrars to communicate with the registry system. There will be an RRP API 
with samples as well as for EPP. The software will provide the basis for a 
reference implementation that conforms to the Registry-Registrar Protocol.
The Registrar Tool Kit will be licensed under the GNU Lesser General Public 
License.
DENIC may issue new releases of the Registrar Toolkit and the provided APIs 
which will follow the same release rules as any other software developed by 
DENIC. The rules and notification timelines regarding patches, updates and 
upgrades are described in DENIC's suggestion for Appendix C, section 5: Patch, 
update, and upgrade policies.


3. Emergency Support and Escalation Policies 

Emergency Team and Access
In the extremely unlikely event of an outage of the registry system, DENIC's 
monitoring system will immediately alert the 24/7/365 Emergency Team, which 
will take the necessary steps to resolve the problem. Registrars will be 
informed immediately via e-mail and information will be posted prominently on 
the registrars web portal.
For problems undetectable by DENIC (e.g. problems of individual registrars with 
DENIC's services) registrars can contact DENIC's Emergency Team 24/7/365 via an 
emergency number distributed only to accredited registrars.

Incident Prioritization, Resolution and Escalation Procedures
DENIC categorizes support incidents in five priority levels. Depending on the 
priority DENIC guarantees different Response and Resolution Times. DENIC 
employs the standard resolution procedures, escalation and registrar 
notification policies. A detailed description is given in Figures 2 to 5.


4. Proactive DENIC-Registrar Interaction and Support for new Technologies
To continuously improve our services DENIC encourages registrars to participate 
in technical, legal and other relevant discussions. Therefore, DENIC regularly 
organizes events with a focus on information exchange, enhancement of registrar 
interaction as well as integration of registrar's feedback and recommendations.

Technical Registrar Meetings
Once or twice per year DENIC invites all registrars to a technical meeting, 
where current technical topics are presented and discussed. DENIC provides a 
preview on its activities for the next six to twelve months. These meetings 
will be organized parallel to ICANN conferences in the future to facilitate 
participation for all .net registrars.

Registrar Advisory Councils
DENIC has instituted a technical advisory board in which a representative 
sample of registrars meet on a bimonthly schedule to discuss technical issues, 
potential future developments and, if applicable, issue recommendations for 
DENIC's future work. Key DENIC personnel (CEO, CTO, Operations Manager) 
participates in these meetings. As for technical questions a legal registrar 
advisory board is also implemented.

Joint DENIC-Registrar Work Groups
Work groups of DENIC employees and registrars are formed for topics of special 
concern to the registrars. Such a work group was recently held for the 
development of the Real time Registry Protocol. These work groups jointly 
analyze issues, prepare specifications and recommendations and document 
decisions. They are also intimately involved in facilitating the implementation 
of the selected solutions.

DENIC's Commitment for .net
Despite the geographically dispersed structure of .net registrars, DENIC is 
committed to provide an equal opportunity for information and interaction 
for .net registrars. Jointly with the accredited .net registrars DENIC will 
develop a plan on how to best serve the needs of the registrar community 
through the various means of interaction.

DENIC's Commitment to Provide Support for New Technologies
Several of DENIC's employees participate in relevant international 
organizations and panels (IETF, CENTR) and actively contribute to the 
development of new technologies and standards. Examples of DENIC's contribution 
to the development of new technologies and standards are described in part 2-5-
b-iv: Registry-Registrar Model and Protocol and part 2-5-b-xii: Whois Service. 
DENIC is therefore highly committed to implement developed technologies, 
standards and services and to offer the appropriate support for these services.
As described, DENIC has a long track record of early involvement of all .de 
registrars in the implementation of new technologies. This ensures that 
registrars with different technical and financial abilities can voice their 
opinions about and define support requirements for the new technology early in 
the implementation process, enabling DENIC to customize its services and 
support offers to fit the needs of the diverse registrar community and to 
preserve the existing variety of registrars.
The means for discussions and providing feedback are mailing lists, web portal 
discussion forums, the technical advisory board, the semiannual technical 
meeting and the joint DENIC-Registrar workgroups.


   

6. Security and Stability

Criteria: The entity chosen to operate the .NET registry must: (i) maintain .NET registry functions efficiently and reliably, (ii) demonstrate disaster recovery capability and (iii) deliver high quality of service for all .NET users worldwide. Providing documentation for procedures insuring a very high level of security and stability is an absolute criterion.

(a) Provision for Registry Failure. Describe in detail how you would assure continuity of operations in the event of operational failure of the registry and make provision for contingencies and a failsafe back-up plan. A commitment to provide ICANN with escrowed data, in and of itself, will not satisfy the absolute criterion.

a) Provision for Registry Failure

Highlights

* DENIC is highly committed to preventing any failure of the .net registry. 
Therefore, DENIC will only operate modern and highly secure facilities 
worldwide which strictly comply with the latest facility security standards.

* The highly redundant .net registry system architecture will reduce the 
probability of major outages to an absolute minimum and assure the continuity 
of operations in case of a registry failure.

* DENIC will establish comprehensive backup procedures for the .net registry 
which are based on the highly effective and reliable backup processes DENIC 
currently uses for the .de registry. 

* In case of an outage of both RSLs, the registry system can be set up either 
by DENIC or any entitled third party.

* To facilitate a quick setup of the registry system and to ensure service 
continuity, DENIC will keep backup copies of the registry data, a full 
documentation of the DENIC database structure, the schemas for the description 
of the report files as well as the process of exporting data from the database 
to the XML escrow data files at the .net secondary RSL as well as at an escrow 
provider. 
 
* In the very unlikely event of its insolvency, DENIC will provide its services 
to the Internet community until a potential successor will be determined and 
fully brought into operation within a three to four month handover period.

* DENIC will extend its current comprehensive set of insurance policies 
protecting the operation of the .de registry against e.g. major problems such 
as water damage, fire or even additional costs in case of loss of office space 
to the .net registry operations by. e.g. increasing the maximum amount of 
liability.


1. Continuity of Operations in the Event of Operational Failure of the Registry
 
DENIC is highly committed to preventing any failure of the .net registry. 
Therefore, DENIC will only operate modern and highly secure facilities 
worldwide which strictly comply with the latest facility security standards.

Redundancy of the Registry Service Locations

DENIC will operate a highly redundant registry system for .net which reduces 
the probability of major outages of the registry to an absolute minimum.
The architecture will be planned on the basis of the experiences with the 
current system which DENIC designed and has been using successfully for the .de 
registry operations for the last years. The infrastructure for .net will 
partially share the same facilities of the .de infrastructure, but the server 
hardware will be completely independent from the current .de structure. For 
example, the primary .net RSL will be at the same location as the current .de 
primary facilities. As backup, DENIC will establish a secondary RSL for .net 
close to one of the major international exchange points. Currently, DENIC 
considers Amsterdam, London or a major US East Coast location as possible 
location for a secondary RSL. 

The distance between the locations also increases security as the secondary RSL 
will be still available even if a major disaster occurred at the primary RSL.
This secondary RSL for .net will match or exceed the specifications of the 
current secondary .de RSL, the COLT Internet Service Center, as outlined in 
part-2-3-b-iii: Description of Facilities.

Both .net RSLs will be fully redundant to each other so that in the event of a 
failure of one RSL, the other RSL will be able to take over the complete 
functionality of the failed one. Therefore, DENIC is able to assure the 
continuity of operations even in case of a major registry failure at one 
location. The switchover process from one RSL to the other is a standardized 
procedure that is practiced regularly.

See part 2-5-b-i: Facilities & Systems for details on the RSL architecture and 
part 2-5-b-xvi: System Outage Prevention for details on redundancy of the RSLs 
and part 2-5-b-v: Database Capabilities for further information on the 
switchover process.

Redundancy of the Registry System

In addition to the complete redundancy of the RSLs, DENIC will also implement 
highly redundant system components for all system elements. In the event of a 
component outage, the redundant components will be able to quickly take over 
the functionality of any failed system element. As a consequence, registry 
system outages due to component failure will be very unlikely. 
See part 2-5-b-i: Facilities & Systems for details on the RSL architecture and 
part 2-5-b-xvi: System Outage Prevention for details on redundancy of the 
registry system components.

Backup

DENIC will establish comprehensive backup procedures for the .net registry 
which are based on the highly effective and reliable backup processes DENIC 
currently uses for the .de registry. 
The DENIC data backup mainly aims at restoring the business relevant data 
within a few hours, restoring the server systems within a day and restoring the 
accidentally deleted data. Full backups of the .net registry database will be 
done on a daily basis. Every two hours, DENIC will conduct backups of 
transaction logs.

The .de backup systems, i.e. the backup server and the tape library are 
currently installed in the highly-secured  .de secondary RSL which is located 
on a different site than the .de primary RSL. 
For the .net registry, DENIC will apply the same principle and implement the 
backup system in the highly-secured .net secondary RSL to guarantee the same 
high security standards as for the .de registry. The two separate .net RSLs 
will be connected via high volume links.
A comprehensive description of the DENIC backup infrastructure, backup 
procedures (e.g. frequency, retention times, etc.), backup hardware and 
software, data formats as well as procedures for data retrieval and the rebuild 
of the database is provided in part 2-5-b-x: Backup.

Escrow

DENIC is now implementing a state-of-the art data escrow procedure for the .net 
registry to be able to provide registry data to the ICANN in the event of an 
operational failure of the registry. To ensure that the escrowed data can be 
quickly used for setting up the .net registry, DENIC will not only escrow the 
registry data, but also a full documentation of the DENIC database structure, 
the schemas for the description of the report files, as well as the process of 
exporting data from the database to the XML escrow data files. The 
documentation provides any third party, who is entitled to receive escrowed 
data, with helpful information to rebuild the registry database based on the 
original data model or an a different model.   
See part 2-5-b-xi: Escrow for details on the escrow arrangements, data formats, 
escrow files, insurance arrangements and backup plans for data recovery and 
Appendix R for details on the data escrow specification.


2. Provision for Contingency and Failsafe Backup Plan

(a) Outage of one RSL

Due to the highly redundant registry system architecture, the secondary .net 
RSL will take over the functionality of the primary RSL in the event of an 
outage. The switchover from the active to the standby RSL is a standard 
procedure within DENIC and will be also conducted regularly for training 
purposes.
Please refer to part 2-5-b-i: Facilities & Systems for further information on 
the RSL architecture and redundancy, part 2-5-b-v: Database Capabilities for a 
detailed description of the database system redundancy and the switchover 
process and part 2-5-b-xvi: System Outage Prevention for further details on 
system redundancy.

(b) Rebuild of the RSL

In the unlikely event of an outage of both .net RSLs, only the registry service 
would be affected as the name service operations are highly redundant and 
geographically dispersed. Therefore, the .net name service operations can be 
kept running with the database status at the time of the failure. 
(See part 2-5-b-i: Facilities & Systems for details on the RSL architecture and 
part 2-5-b-ii: Stability & Performance for details on NSL architecture and part 
2-5-b-vi: Geographic Network Coverage for details on the NSL locations). 

Setup by DENIC

DENIC will set up a new RSL by installing a new database and registry system. 
DENIC has already gained deep experience in building up a RSL when setting up 
the current primary and secondary RSL for .de.
For a new setup of the .net registry system, the servers will have to be 
installed. Before operations can be fully resumed, the operations team will 
conduct comprehensive consistency checks. At first, the version numbers of the 
installed programs and tools will be compared with secured lists of the 
applications per server as soon as all programs and tools are reinstalled in 
their latest version in the production system. This procedure ensures that the 
correct version of each application is installed on the servers. Then, a 
consistency check of the newly-generated zone with the last zone generated 
before the system failure as well as the whois and zone-generating processes 
will be initiated. By sending test requests to the applications, the processes 
writing into the database will also be started and the results will be checked. 
Meanwhile, the registry system will not accessible for the registrars. Then, 
the system will be released for external requests by activating the MRI and RRI 
interfaces. 
The backup, resynchronization and copy procedures are fully documented in 
detailed checklists. These are available to the relevant employees in a 
knowledgebase at any time and also continuously reviewed and improved. The 
switchover and recopy procedures are also regularly trained. 
Please refer to part 2-5-b-x: Backup for a detailed description of data 
retrieval and rebuild of the database. Part 2-5-b-v: Database Capabilities 
provides details on the database setup and the switchover process.

Setup by a Third Party

DENIC will enable any third party who is entitled to receive the escrowed 
information to rebuild the registry database based on the original data model 
or an a different model. 
To facilitate a quick setup of the registry system and to ensure service 
continuity, DENIC will keep backup copies of the registry data, a full 
documentation of the DENIC database structure, the schemas for the description 
of the report files as well as the process of exporting data from the database 
to the XML escrow data files at the .net secondary RSL as well as at an escrow 
provider. 
In addition, DENIC will provide the source code of self-developed software, all 
relevant documentation and all business and technical procedures needed to 
restore all technical facilities. This information will be escrowed weekly and 
also deposited at DENIC's escrow provider.

Please refer to part 2-5-b-xi: Escrow for details on escrow arrangements and 
backup plans for data recovery, Appendix R for the data escrow specifications 
and part 2-5-b-xiii: System Recovery Procedures for details on system 
documentation. Part 2-5-b-x: Backup reveals details on data retrieval and the 
rebuild of the database in case of the failure of the active database or 
logical errors in the database.

(c) Contingency Provisions
 
Transition Plan

In the very unlikely event of its insolvency, DENIC will provide its services 
to the Internet community until a potential successor will be determined and 
fully brought into operation within a three to four month handover period.
DENIC will provide all information required for the transition to the 
succeeding operator and willingly facilitate the setup of the operator without 
any service deterioration for the Internet community.
The basis for this potential handover of operations would be the transition 
plan that has been developed for the takeover of .net registry operations from 
the incumbent registry operator. 
Please refer to part 2-6-b: Business Failure for details on the DENIC 
procedures to prevent insolvency as well as the handover plans to another 
provider. A full outline of the transition plan is provided in part 2-8: 
Transition Plan.

Contingency Insurances

DENIC already has a comprehensive set of insurance policies protecting the 
operations of the .de registry against e.g. major problems such as water damage 
or fire or even additional costs in case of loss of office space. The insurance 
portfolio will be extended according to the needs of .net by e.g. increasing 
the maximum amount of liability. 
The current insurance portfolio covers the following items:
* Pecuniary Damage Liability, including environmental coverage
* Commercial Third Party Liability
* Directors' and Officers' Liability
* Fidelity Guarantee Claims
* Fire Consequential Loss (pd & bi insurance)
* Fire, Vandalism, Burglary, Water Damage, Glass, Windstorms & Hail
* Telephone system and computer hardware (including notebooks)

(b) Provision for Business Failure. Describe in detail what advance arrangements you will implement to ensure that, if your operation of the .NET registry becomes financially non-viable, the registry operations will be quickly, smoothly and efficiently transferred to another operator so as to minimize disruption of the registry functions.

(b) Provision for Business Failure

Highlights

* DENIC has a long track record of successfully operating the second largest 
TLD worldwide. All this time, DENIC has never been in any financial problems, 
even when faced with difficult situations such as the insolvency of large 
registrars. Hence, the insolvency of DENIC is only a theoretical possibility.

* Many aspects make insolvency very unlikely, e.g. the legal form as a 
cooperative with registrars being the owners of the business, the safety 
focused management structure and the very experienced and highly motivated 
staff and management team, financial rules such as subsequent payment 
obligation of members, member deposits and monthly payment schedules.

* In the unlikely event of an insolvency, DENIC as a cooperative would follow a 
strict insolvency scenario which protects the business operations as the major 
asset as long as possible. ICANN and the registrar community would have the 
option to be involved in the decisions as a potential debtor.

* DENIC is committed and prepared to follow a similar transition plan for 
handing over the .net operations as suggested in part 2-8: Transition Plan. In 
this case, the overall timeline for a transition of three to four months could 
possibly be reduced as DENIC would hand over operations based on EPP standard 
and on a thick data model.

DENIC has been successfully operating the registry for the German Top Level 
Domain .de since 1994. In that respect, DENIC acts as a neutral not-for-profit 
service provider for the German Internet community. Regarding all its duties 
and responsibilities, DENIC strictly complies with all relevant Internet 
standards and RFCs as well as the well-established best practices for the 
domain administration which enable the successful operation of a TLD. 

As DENIC has always been heavily concerned about preventing insolvency of its 
operations, the cooperative has already taken comprehensive precautions and 
mechanisms to prevent insolvency. DENIC never had to consider insolvency as a 
major risk to date. Thus, insolvency is only treated as a theoretical 
consideration.


1. Insolvency Prevention

(a) Legal Aspects

Cooperative as Legal Form 

DENIC chose its legal form to be a registered cooperative to ensure an open 
structure for the registry. Companies wanting to become a .de registrar can 
join the cooperative at any time as new members. Generally, the members enjoy 
broad influence and can actively participate in shaping the cooperative. The 
cooperative structure brings many advantages for the stability of DENIC's 
operation:

* Registrars as DENIC members depend on a smooth operation of DENIC as the 
registry, therefore .de registrars fully support DENIC
* Every member hedges its payment liabilities to DENIC to protect DENIC from 
bad debts (see also the part Subsequent Payment of Members below in this 
chapter)
* The risk of DENIC's operation is not on anonymous shareholders caring about 
their dividends but on personally known members who depend on the functioning 
of DENIC's operations.

Supervision by Cooperative Association
As a cooperative, DENIC underlies the German Cooperatives Act. According to 
section 54 of this Act, DENIC has to be a member of a cooperative association. 
Although the association does not interfere with DENIC's business activities, 
the association is required by the Cooperatives Act to comprehensively audit 
the cooperative retrospectively once per year. The audit comprises a broad and 
independent assessment of the company's financial reports as well as its 
technological, legal and economic risks. In addition, the decisions of the 
Executive and Supervisory Board are reviewed for formal correctness and 
legitimacy. The association summarizes the results in an auditing report which 
DENIC has to submit to the General Assembly of the cooperative (Section 55).

This detailed analysis provides DENIC with a comprehensive external evaluation 
of its situation and even supports DENIC in identifying further potential risks.
To date, DENIC received the association's certificate of approval without any 
problems every year.


(b) Management Structure and Capabilities

Managing the .de registry since 1994, DENIC has significant experience in 
successfully running registry services for the Internet community.
All levels of DENIC's management structure are highly committed to ensure the 
successful operation of the registry services today and in the future:

* The General Assembly -- which consists of DENIC's members and is responsible 
for electing the Supervisory Board - has by vast majority supported the 
decision to apply for the .net registry operations at an extraordinary meeting 
on November 22, 2004.
* The Supervisory Board -- which is responsible for supervising and appointing 
the executive board - fully supports the application.
* The Executive Board -- which mainly focuses on the day-to-day business and 
has deep experience in building up and managing registry services - gave the 
strategic direction to the application.
* DENIC's staff is highly committed, motivated and skilled to operate the .de 
registry (as proven in the past) and to additionally provide the .net community 
with the registry services.

DENIC's management structure is depicted in an extensive organ chart at 
http://www.denic.de/en/denic/wir_ueber_uns/organigramm/index.html. This 
management structure with the General Assembly electing the supervisory board 
which appoints and supervises the executive board has several mechanisms to 
secure sound and secure decision making:
* Every major decision has to be approved by the two Boards (double check).
* Important decisions such as the election of the Supervisory Board or entering 
new business areas - such as the application for .net registry operations - 
have to pass DENIC's General Assembly.
* Both Boards aim at minimizing risks for DENIC.
* All Board members also are members of the DENIC eG and with that are 
personally subject to their management decisions.
* The Boards are supported in making their decisions by a Technical and Legal 
Advisory Council.

Furthermore, DENIC's whole management team and its staff is highly experienced 
in the Internet business. One example is that three of the five Executive Board 
members actively participated in the sustainable development of the Internet, 
e.g. had own Internet companies and were "Internet pioneers".


(c) Financial Strength & Stability

Over the past years, DENIC was able to build up a secure financial position 
while managing the .de registry. Some key financial data as of December 31, 
2003 supports this impressively:
* Turnover: 24 million Euro
* Financial Reserve: 3.47 million Euro, incl. a hidden reserve of 1.32 million 
Euro
* Cash Flow (average annual free cash flow): 7.7 million Euro
* Risk Reserve: 6 million Euro
* Securities: 7.6 million Euro

The risk reserve is normally reimbursed to the DENIC members at the end of the 
year, if it is not used for further investments.
Based on this sound financial position, insolvency of DENIC has never been an 
issue in the .de community  even in the downturn of the Internet business.
On May 29, 2002, one of the biggest registrars of DENIC, KPNQwest, became 
insolvent. At this time, KPNQwest was managing 1.5 million .de domains, DENIC 
managed this difficult situation without any substantial financial losses and 
without any service disruptions to registrants. Also in this difficult 
situation, neither German official authorities nor the .de community were 
questioning the technical stability and security or the financial soundness of 
DENIC's operation.
Although DENIC has grown significantly due to the increase in numbers of 
registrations from more than one million in 1999 to eight million in 2004, the 
cooperative does not have any liabilities other than to its members. DENIC is 
in a good position to easily cope with scenarios like stagnating numbers of 
registrations which might occur in the future. The substantial reserves enable 
DENIC to further operate the business, especially if risk reserves are not 
fully reimbursed to the membership.


(d) Business Case

Due to its experience with the .de registry, DENIC will also be able to 
successfully operate the .net registry. As already accomplished for .de, DENIC 
has prepared a detailed business plan to minimize potential future risks for 
the .net registry. The business plan has been based on three scenarios, which 
are all calculated with conservative assumptions (for details please refer to 
part 2-4-b: Business Plan). All three scenarios show a positive cumulated cash 
flow for DENIC as a risk buffer. Additionally, all scenarios follow ambitious 
price decrease patterns. For instance, the medium demand scenario starts with a 
per domain price of 5.40 US$ from 2005 until 2009 and shows price reductions to 
3.60 US$ after 2009. Hence, in the case of a financial shortage DENIC in close 
coordination with ICANN has the option not to reduce prices until the financial 
situation has relaxed.


(e) Monthly Billing & Member Deposits 

DENIC runs a monthly billing cycle with short times of payment as well as clear 
grace and redemption periods to assure regular payments and revenues (see also 
Appendix C.2 and C.3). As these payments are mainly generated by service fees 
for maintaining existing domains, DENIC operates independently of the number of 
domains being newly registered every month. Additionally, the cooperative is 
enabled by its accounting tools to constantly track and monitor its financial 
situation in detail.

In the case of registrars not paying their bills, DENIC has effective and 
staged means to avoid losses. In the first step, DENIC can deny to newly 
register domains for that registrar. In a second step, DENIC can temporarily 
stop all services to the registrar. And the last step would be the cancellation 
of the registry-registrar agreement with this registrar (and for .de 
registrars, finally the exclusion from the cooperative). The respective domain 
names could then be transferred to other, solvent registrars. As DENIC 
maintains a thick registry concept, DENIC has all necessary registrant data to 
directly contact the domain holders and to initiate the registrar transfer.

In this way, DENIC would be able to quickly restore its revenues without any 
losses, as the transition period would be covered by member deposits (see 
below).

Furthermore, from each member DENIC demands a security deposit of the amount of 
420 percent of the last monthly invoice to the respective member to cover their 
payment liabilities and thus to protect DENIC from their insolvency. The 
security deposit can be made either in cash or by bank guarantee and  is 
available to DENIC in the case of members not paying their liabilities to 
DENIC. If the quadruple of the last monthly invoice exceeds the deposit (e.g. 
if a registrar vastly increased the number of domains administered by them), a 
supplementary payment into this security will be necessary to regain the 420 
percent.

Currently, DENIC has access to about eight million Euros of member deposits. 
With that, even in the very unlikely case that all registrars stop their 
payments on one day, DENIC would be able to maintain its operations without 
limitations for about ten months (considering monthly financial needs of 
820,000 Euro - as of October 31, 2004 according to DENIC's monthly report).


2. Insolvency Procedures

In the very unlikely and theoretical case of DENIC becoming insolvent, the 
provisions of German law on insolvency in general and the insolvency of 
cooperatives in particular would lead to DENIC continuously being able to 
maintain its operations. German law provides comprehensive regulations such as 
subsequent payments or a detailed action plan which are aimed at enabling 
cooperatives like DENIC to continue their operations.

(a) Insolvency Scenario

According to the German Insolvency Act, for an illiquid company a formal 
insolvency procedure is being initiated and constantly supervised by court. One 
of its first steps is that the de-facto management of the company gets taken 
over by an insolvency administrator selected and appointed by the responsible 
court. Since the reformation of the German Insolvency Act in 1994, insolvency 
procedures are primarily aimed at recapitalizing the insolvent company instead 
of liquidating it. Therefore, the insolvency administrator ensures that the 
company continues its service provision to enable its recapitalization. In the 
case of DENIC this would mean, even if the administrator found that a 
recapitalization was impossible and, thus, decided to liquidate DENIC, he would 
still keep up DENIC's operations in order to protect its assets (i.e. the 
registry functionality) against devaluation. Hence, registry operations itself 
would remain untouched for a long time during an insolvency scenario so that 
ICANN and the .net community would have sufficient time to react to this 
situation.
To determine how the cooperative can be recapitalized, the administrator's main 
duty is to set up an insolvency plan. The creditors' assembly then passes the 
plan and is also considered whenever the insolvency administrator has to make 
important decisions.
As ICANN would have receivables against DENIC (e.g. through the fees to be paid 
per .net domain), ICANN would be a member of the creditors' assembly and would, 
therefore, directly participate in the insolvency procedure and all related 
decisions.

(b) Subsequent Payments of Members

Considering Section 105 of the German Cooperatives Act, all DENIC members are 
assessable in case of insolvency. The members are obliged to make subsequent 
payments to the insolvency's estate provided such payments are incorporated in 
the insolvency plan. The payments aim at supporting DENIC's recapitalization 
since they remain at the cooperative and do not have to be paid back to 
members. In case of an insolvency, every member is obliged to pay up to 15,000 
Euro to strengthen DENIC's financial position. With currently 225 DENIC 
members, this would amount to up to 3.375 million Euro of additional funding.


3. Transition Plan

DENIC is fully committed to provide highly available registry services and is 
aware of the importance of its services to the Internet community. Therefore, 
in case of its insolvency DENIC will provide its services until a potential 
successor has been determined and fully brought into operation.

DENIC will ensure that a potential successor to the DENIC .net registry 
services will be able to take over the services without any service 
deterioration for the internet community. Therefore, the transition plan 
developed for the takeover of .net registry operations from VeriSign would also 
be the basis for a potential handover of operations in the unlikely case of 
DENIC's insolvency. This means, that after a three to four month hand-over 
period, a new registry operator could be fully operational. For details of the 
transition plan, please confer to part 2-8: Transition Plan.

Once EPP is in use with all .net registrars a handover from DENIC to a 
potential successor would even be less complicated, as DENIC then would hand 
over operations based only on EPP instead of a proprietary protocol. 
Furthermore, DENIC will operate a thick data model and hence all required 
information on affected parties such as contact data would be immediately 
available.

(c) Describe in detail your arrangements to provide a secure environment in which the registry infrastructure is to be operated.

The applicant's response to Part 2, Section 6, Question c will remain confidential to ICANN and the independent evaluators. ICANN will use reasonable efforts to avoid publication or release of this information, but in no circumstance will ICANN's liability for any release of this information exceed the amount of the application fee.

[RESPONSE IS CONFIDENTIAL]
   

7. Additional Relative Criteria

The following are additional relative criteria: (i) the degree to which the applicant’s proposal promotes competition in the registration of domain names, (ii) the degree to which an applicant’s business model relies on multiple, rather than sole source, suppliers, to reduce the impact of failure by any one supplier, and (iii) the degree to which an applicant’s proposal results in improved implementation of, and support for, GNSO policies, such as transfers and deletes.

Provide a detailed explanation of the manner and degree to which your proposal accomplishes the three relative criteria described above.

7. Additional Relative Criteria


Highlights

* DENIC as the .net registry provider will enhance competition on the registry 
level by establishing a new international player in the gTLD market with a not-
for-profit business approach.

* DENIC as the .net registry provider will enhance competition on the registrar 
level by establishing a neutral .net registry, providing easy processes for 
registrar changes and equal access for all registrars.

* DENIC is following a multiple sourcing policy in all possible areas to reduce 
dependencies from single suppliers and to reduce the risk of failure.

* In the area of registry services, DENIC has asked a third party to run its 
secondary Registry Service Location (RSL) independently of DENIC operations. 
Furthermore, DENIC uses hardware and software of multiple vendors to provide 
registry services.

* For resolution services, DENIC has built network hosted NSLs (Name Server 
Locations) across the globe which are run by different operators. DENIC has 
developed a sophisticated NSL architecture to reduce risk and dependency on 
single vendors.


(i) Enhancement of Competition

1. Enhancement of Competition - Registry Level

DENIC has a history of a successful ccTLD promotion. With more than 8,000,000 
domains, .de is not only the largest ccTLD by absolute number. With about 
9,700 .de domains per 100,000 residents, Germany after Denmark also has the 
second highest ccTLD penetration per resident (of ccTLDs with more than 200,000 
domains).

DENIC as registry of the largest ccTLD will guarantee high quality of services 
for .net, too. Though ccTLDs generally have a mainly local focus, DENIC is 
truly international. Except from Germany, DENIC has registrars in Australia, 
Austria, Canada, Denmark, Great-Britain, Italy, Luxembourg, the Netherlands, 
Sweden, Switzerland and the U.S. Therefore more than 150,000 .de domains are 
registered for registrants outside of Germany. Because of .de's international 
nature, DENIC operates name servers in Austria, Germany, Great-Britain, Japan, 
the Netherlands and the U.S. By its international registrar structure, its 
international registrant structure and its international infrastructure DENIC 
has proven its expertise to run a TLD on an international scale.

DENIC as .net registry would bring in all its experience from a national and 
international ten year success story as ccTLD registry to promote .net. This 
would lead to a fundamental increase of competition in the gTLD market.

By assigning .net to DENIC:

* .net will be run by a company with no conflicting other gTLD that can focus 
100% on the promotion of one gTLD
* Competition among different business models will be generated on the 
infrastructure level and increased on the policy level
* The number of relevant competitors (dominating more than 99% of the whole 
gTLD market) will increase from 3 to 4
* The number of companies in the gTLD market will increase from 8 to 9
* The market share that is not dominated by the incumbent will almost double

Even though all operational requirements are the same for gTLDs and ccTLDs, the 
targeted communities of these kinds of TLDs are different. The targeted 
community of .net as an unrestricted gTLD is the same as of .com, .org 
or .info. Therefore, though DENIC is the second largest registry with more than 
8,000,000 .de domains, the targeted communities of .de and .net are very 
different. For that reason, DENIC could concentrate its effort in the gTLD area 
100% on the promotion of .net and by this increase the competition among 
registries.

Increase in competition also means increase in competition among different 
business models. Up to now all gTLD-registries have had a for-profit business 
model (though PIR, a subsidiary of ISOC and the registry operator of .org, is 
not-for-profit, the technical operator of .org, Afilias, has a for-profit 
business model). By choosing DENIC, the not-for-profit business model would be 
used for .net on the policy as well as on the infrastructure level.

The market share of the three major gTLD registries is more than 99%. By 
assigning .net to one of these companies the number of relevant competitors 
would not change. With DENIC running .net the number of relevant competitors 
would increase from three to four.

With DENIC running .net, the number of registries running gTLDs will increase 
from eight to nine. So in contrast to only shifting market share among 
companies that 
are already active in the gTLD market, competition will grow more significant 
with an additional company entering the market.

The market share of the biggest registry in the gTLD market, VeriSign, will 
decline from 86% to 74%. Therefore the market share not dominated by the 
incumbent will almost double.


2. Enhancement of Competition - Registrar Level

By assigning .net to DENIC:

* An easy access for registrars to registry services will be guaranteed
* Neutrality of DENIC and only providing truly necessary services create an 
optimal framework for competition

DENIC will guarantee an easy access to the .net registry services for all 
registrars. It will use an EPP-based protocol. By using this generally accepted 
standard, possible changes will be easy to implement in the future.

Because of the thick-registry-model all data is centrally stored at the 
registry. So a standardized and complete structure of all data is achieved. By 
this, DENIC minimizes barriers for registrants to change from one registrar to 
another. Because of this easy to perform registrar change, competition among 
registrars will be increased.

At the moment DENIC works together with about 225 registrars from twelve 
countries. 
By being organized as a cooperative DENIC combines all positive aspects for 
these 225 registrars which are necessary for a stable and smooth operation of a 
major infrastructure for the Internet.

Due to DENIC's organizational structure as a cooperative, each of the 225 
registrars is a DENIC member. Each of them is given the same voice in DENIC's 
decision making process.

Because every interested registrar is included in the process of making 
technical and organizational decisions, the most efficient way for all 
registrars is found to handle registrations, changes of providers etc. Changes 
in existing services and implementation of new services therefore only get 
accomplished if the majority of registrars are sure of a need for them.

The experiences DENIC has gained from this very tight connection to all 
registrars concerned, it will apply for the administration of .net. DENIC 
therefore can guarantee to be a truly neutral partner for all registrars. This 
neutrality combined with supplying only services really needed by the 
registrars create an environment that addresses only the true demands of the 
registries and neither privileges nor discriminates anyone. It therefore 
creates an optimal framework for strong competition among the registries.


(ii) Cooperation with Multiple Suppliers

DENIC is following a multiple sourcing policy in all possible areas to reduce 
dependencies from single suppliers and to reduce the risk of failure if a 
supplier vanishes from the market. This is especially true for critical 
services and hardware components as well as for software. The following 
chapters give a short summary of the highlights on DENIC's multiple sourcing 
approach.


1. Sourcing and Suppliers for RSLs

(a) RSL Hosting

The primary RSL (Registry Service Location) is located at DENIC's headquarters 
in Frankfurt. The secondary .de RSL is operated by COLT ISC in another part of 
Frankfurt. DENIC is committed to select a second hosting provider for the 
secondary .net RSL with the same very high level of service at another 
geographic location. Currently, options in London, Amsterdam and the U.S. East 
Coast are evaluated. For detailed descriptions please refer 2-3-b-iii: 
Description of Facilities.

(b) RSL Hardware and Software

DENIC uses network components such as routers, firewalls, load balancers and 
switches from several vendors. Currently, network components manufactured by 
Cisco, Juniper, F5 Inc. and other vendors are operational. DENIC uses servers 
from Sun, Dell and IBM in its production system. The storage sub system is 
based on hardware of Hitachi Data Systems. For future investments, DENIC will 
follow its strict multi-vendor policy and will further minimize its dependency 
from single suppliers.

DENIC is also aiming to minimize dependencies in the software area. For 
instance, the RRP proxy will be developed by DENIC itself. Whois applications 
are programmed in Java and are hence platform independent.

2. Sourcing and Suppliers for NSLs

(a) NSL Hosting

DENIC currently operates its name servers for .de on eleven locations around 
the globe and plans to expands its NSL (Name Server Location) network by three 
additional locations in June 2005 and another five locations at the end of 2005 
(for details and a location map see part 2-5-b-vi: Geographic Network 
Coverage). Anticipating a different demand distribution for .net DENIC will 
strengthen its presence in the US (in June 2005) and will expand the NSL 
coverage to other locations with higher .net demand, such as South Africa, 
Brazil, China, Eastern Europe and Australia (December 2005). 

DENIC has contracted a broad variety of different high quality hosting 
providers to run the NSLs - DENIC eG, DE-CIX, Versatel, Deutsche Telekom, 
University of Vienna, Netnod, Nikhef, Telefonica, MCI Worldcom and Savvis. On 
every location another hosting provider is delivering this service for DENIC, 
except for MCI Worldcom who is currently running two locations.

(b) NSL Architecture

DENIC has developed and implemented a sophisticated architecture for its name 
server cluster. Besides the principle of intra-location setup equivalence the 
principle of inter-location setup diversity is supported by DENIC's multi-
vendor, risk reducing strategy. For more information please refer to part 2-5-b-
ii: Stability and Performance. Below the setup is briefly summarized. The setup 
diversity is driven on three levels:

* Two network setups ("anycast" load-balanced on Cisco Systems routing 
equipment and unicast load-balanced dedicated F5 Inc. Big-IP load balancers).
* Three server types (Two Sun models, one IBM model)
* Three name server implementations (BIND 8, BIND 9 and NSD)

The resulting different setups guarantee an unmatched availability, security 
and independence from single vendors.


(iii) Implementation and Support of GNSO Policies

By the use of DENIC's processes and authorities to guarantee compliance with 
all policies relevant for the .net registry, not only an absolute compliance 
with these policies but also a quick and efficient implementation of them will 
be guaranteed (for a more information regarding DENIC's activities to guarantee 
policy compliance grace period control see part 2-5-b-v: Database Capabilities).
   

8. Transition and Migration Plans

Criteria: Applicants should document their plan for (i) migrating .NET from the current registry operator (if applicable) with specific attention paid to maintaining existing functional capabilities as defined at the time of the RFP, including the existing RRP and (ii) for implementing support for Version 1.0 of EPP.

Present a detailed plan for the transition of the registry function from the current facilities and services provided by VeriSign, Inc., to the facilities and services you propose. Issues that should be discussed in this detailed plan include:

8. Transition Plan


Highlights

DENIC, as a part of its ongoing commitment to quality operations and uptime, 
views the transition plan as one of the most critical elements of its proposal. 
It is obvious that DENIC is capable of operating a large scale TLD, and DENIC 
understands that any technical transition demands special care. In this 
section, DENIC will demonstrate that it has the resources, competencies and 
foresight to oversee and implement a seamless transition through

* A detailed transition plan addressing stability and continuity across all 
existing and future registry services.

* Understanding of and commitment to balancing the needs of all .net 
stakeholders.

* Organizational structure, procedures and proven skilled personnel to manage a 
transition of this nature.

* Anticipation of potential sources of risk and provisioning of personnel, 
resources, and plans to effectively manage these contingencies.

* A strong commitment to minimizing service interruptions.


1. Steps of Transition Plan
As an underlying core value, DENIC aims to minimize impact of the .net 
transition to the Internet community, the registrants, and ICANN's accredited 
registrars, while placing the burden on DENIC and VeriSign. This transition 
plan is the result of an in-depth analysis of past TLD migrations from VeriSign 
(for instance, .org), DENIC's relevant experience with similar transitions, and 
the review of a multidisciplinary council of experts ranging from project 
managers, DNS specialists, software architects, system administrators and 
developers, database administrators to security experts.

In the following DENIC provides a description of (1) the transition by area and 
(2) a chronological step-by-step description of the technical transition. 
Figure 2 gives a chronological overview of the steps of the transition plan 
while Figure 1 depicts a risk assessment and shows mitigation measures for 
these potential risks for every step.

(a) Transition Areas

The key areas to consider during a transition of this nature are:

* Domain Name System (DNS) transition
* The Shared Registry System (SRS)/.net database transition
* The whois service transition
* Overall Transition Management
* Transition of Support Functions/Registrar Relations/Internet Community 
Relations.

(i) Domain Name System Transition

The DNS transition is the most critical element of the overall program, since 
an outage would not only impact .net resolutions, but also effect other domains 
that depend on .net labeled name servers.

Among the criteria considered when formulating the plan for DNS transition are 
uninterrupted resolution, maintenance of resolution performance levels, 
accurate resolution, and resolution consistency with WHOIS and the SRS. Also, 
overall system security during and after the transition is also a key 
consideration.

The objective of the DENIC DNS server migration plan is to ensure a smooth 
transition without interruption to DNS resolution service. The usual method of 
operating and announcing (via NS records) both sets of servers in parallel 
during transition is not applicable in this case due to the number of NS 
records needed in total and the well known packet size limitations. The plan is 
therefore centered around a phased, incremental approach in order to minimize 
risk. This plan rolls out as follows:

* Two weeks before the June 30 turn over date, DENIC will feed all name servers 
with a copy of the .net  zone file (to be supplied regularly by VeriSign in the 
master file format specified by RFC1035). These name servers will be able and 
start to serve .net authoritatively.

* Upon verification of proper operation (same day) selected DENIC servers will 
be added to the .net NS RRset in both the .net zone and the root zone. At the 
same time, as many of the incumbent's name servers as necessary (with packet 
size and load considerations in mind) will be removed from the NS RRsets. Since 
VeriSign currently announces 13 name servers while DENIC will only make use of 
six (five unicast and one anycast announcements), on average two of VeriSign's 
name servers will be replaced by one DENIC name server. The exact exchange 
pairs will be determined based on information provided by VeriSign regarding 
exact topological placement, query load distribution, and IPv6 capabilities of 
the current set.

* As soon as the source of zone data is switched from VeriSign's to DENIC's 
registry database (turn over date), the SOA MNAME field for the .net zone will 
be adjusted to reflect this change, i.e. a DENIC name server will be announced 
as primary master for .net. At the same time, the SOA RNAME field will be 
changed to show a DENIC point of contact.

* Upon change of the primary master DENIC will supply VeriSign with a copy of 
the .net zone in RFC1035 format regularly until the end of the DNS transition.

* VeriSign will need to maintain every name server operational and with current 
data for a period of at least two days after removal of this server from the NS 
RRset in both the .net and the root zone. The day of removal shall count as an 
additional day. This allows for TTL expiration given today's TTL values and 
avoids stale data and lame delegation effects.

* Two weeks after turn over date, the remaining VeriSign name servers will be 
replaced in the .net NS RRset with not yet announced DENIC name servers, if 
any. This change will be applied to both the .net and the root zone. Post 
change maintenance is necessary as outlined above.

* There will be a total of 2 delegation change requests to IANA, scheduled in 
advance. These requests will occur at (T-14) and (T+14) days, with T 
representing turn over date.


The plan maintains consistency of the delegation as well as it minimizes IANA 
interaction.
There are two additional options to this plan:

1. A more gradual approach would replace in multiple (up to six) steps 
VeriSign's name servers by DENIC name servers, evenly spread over the four 
weeks. All changes will be reflected in the .net zone immediately, while IANA 
delegation change requests would occur at (T) and (T+14) only. It should be 
noted that, although there would be a mismatch between the NS RRset at the 
parent (the root zone) and at the child (the .net zone) during this transition, 
this mismatch would have no adverse effects on the normal DNS resolution 
process. There is a minimal chance of confusion on the side of operators of 
third party name servers, due to e.g. messages from automated watchdogs. This 
can proactively be countered by publishing this plan widely, e.g. on DNS 
related and operators' mailing lists.

2. Consistency can be enhanced by adding more IANA delegation requests to step 
1, i.e. each of the multiple steps would immediately be reflected in the root 
zone.

It should be noted that, although there is a mismatch between the NS RRset at 
the parent (the root zone) and at the child (the .net zone) at a certain point, 
this step has no direct relevance to the normal DNS resolution process, as long 
as all servers provide authoritative data.

DENIC currently operates eleven geographically dispersed name server locations 
worldwide for .de. In addition, DENIC will bring live 3 additional locations in 
North America at major access points. These will be operational by June 30, 
2005.

This name server replacement plan raises an interesting point from a 
contractual perspective.  VeriSign's contract ends on June 30, so strictly 
speaking they have no legal obligation to maintain DNS servers after that date. 
By the same logic, DENIC's contract will begin on July 1, so strictly speaking 
DENIC has no legal obligation to provide live production name servers before 
that date.  However, it is obvious from a technical perspective that it would 
be impossible to manage an organized migration if the switchover were made 
abruptly at midnight on June 30. It is in the best interests of the Internet 
community for both DENIC and VeriSign to maintain redundant infrastructure in 
the period just before and just after the turn over date. As a result, DENIC 
proposes that the transition occur over a period of 4 weeks - two weeks before 
and two weeks after the June 30 turn over date - so that DENIC and VeriSign 
share the additional responsibility equally.

There are two fallback scenarios for this gradual approach, both less or not 
desirable:

1. If a continuation of service of the incumbent cannot be agreed upon, the 
transition window can be shortened from four to two weeks with the change of 
source (the "primary master", even though that is in fact the registry 
database) at the end (i.e. the turn over date). Post change maintenance 
considerations apply (see above).

2. Using a flag date, all .net delegation data in the root zone would be 
changed at once, as well as the authoritative .net NS RRset. Again, the TTLs of 
the NS RRsets (in both the root and the .net zone) would have to be dealt with. 
This approach would not serve the community well and is listed as the lower end 
of the scale only.

(ii) Shared Registry Service (SRS)/.net Database Transition

Technically speaking, one of the most challenging areas to transition is the 
SRS system that acts as the interface between the registrars and the .net 
database. Planned or unplanned outages would impact key stakeholders: the 
registrars, and inconvenience the Internet community. DENIC understands the 
linkages that must be made between the SRS system and other repositories such 
as whois and zone files, and has planned for these.

Among the criteria considered when formulating the plan for SRS transition are 
provision of accurate DNS and whois databases, support for all standard SRS 
functionality (such as adds, deletes, transfers, modifies, and renewals), 
provision of accurate and timely billing and payment posting, and provision of 
untainted and complete registrant and registrar information.

The DENIC plan will have VeriSign transfer the entire database before the 
transition time.   Then, at regular intervals, VeriSign will transfer 
incremental updates. While this increases the amount of work that DENIC and 
VeriSign must do, it decreases the inconvenience to the Internet community. 
DENIC has budgeted 24 hours to complete the transition of the SRS database, but 
believes it can be done even more quickly.

The new .net registry will conform to the latest version of the Extensible 
Provisioning Protocol (EPP). DENIC's support for the current RRP protocol 
interface into the .net registry will be achieved via an RRP-to-EPP proxy. RRP 
key-value pairs will be translated into EPP-XML using the extension framework 
where needed to transmit RRP specific items to the actual EPP "thick" registry 
service. The RRP-to-EPP proxy will act as a temporary migration interface and 
will be phased out in favor of direct EPP connectivity in the future. This 
approach would minimize the impact of the new .net "thick" registry to all 
existing registrars.

Preparations for the SRS turn over will begin immediately after the decision 
(testbed setup, transfer of data, etc), as demonstrated in the step-by-step 
description below.

(iii) Whois Service

whois is another service which must be transitioned in a precise and 
professional manner. Consistency and maintenance of service levels are the key 
considerations in this area. DENIC has already considered these issues when 
planning its transition testbed.

Among the criteria considered when formulating the plan for whois transition 
are uninterrupted response, support of expected performance levels, accurate 
response, response that is consistent with DNS resolution, and response that is 
consistent with the SRS .net database.

DENIC plans to bring its whois service live as soon as it is clear that the SRS 
database is stable. VeriSign's whois service will remain operational but a 
referral to DENIC's whois service should be introduced for all .net objects. 

As mentioned above, the DENIC .net registry implementation will use a "thick" 
model - a rich object store managed by the central registry. Use of the of 
thick registry model results in very efficient whois data change propagation. 
This database will provide a central location for all .net authoritative TLD 
information.  

The next step will be to gather the data needed to populate DENIC's "thick 
model" database.  This will occur after the transition from VeriSign. As part 
of the migration to EPP, authoritative registrars will be required to populate 
the DENIC database with full contact information required for thick registry 
whois services.

(iv) Overall Transition Management

A successful transition is not something that happens accidentally. The proper 
project and program management institutions must be in place for the planning, 
testing, and execution of the transition. These groups should also play 
critical and well-defined roles in case escalation is required or some 
contingency plan needs to be executed. Other roles include communication of 
status, coordination of regular meetings with VeriSign and other stakeholders, 
monitoring of fulfillment of success criteria, overall risk evaluation and 
general issue resolution.

DENIC clearly has planned to get maximum effectiveness from its transition 
personnel by organizing the following teams:

* Program Management - to plan the overall transition and coordinate the DENIC 
technical and functional workgroups.
* Customer Support - to provide support for registrars and wider community to 
make the transition as seamless as possible.  Includes customer service 
representatives, technical support representatives, registrar relations 
personnel, and billing personnel.
* Communications and Marketing - to actively propagate information about the 
transition to the wider Internet Community.
* ICANN Liaison - Industry experts to work with ICANN to be sure that DENIC is 
responsive to ICANN requirements.
* Policy Group - to support  contract compliance from a legal perspective
* Transition Technical Team - to do the technical transition. Split into two 
teams working together to achieve a seamless transition:
* Development - SRS Developers, DNS experts, architects, Customers Service 
System developers, Billing System experts, Network Engineers, Security 
Engineers, etc.
* Operations - DBAs, Network engineers, Security Engineers, System 
Administrators, Application Support Experts, etc.


(v) Transition of Support Functions/ Registrar Relations/ Internet Community 
Relations

The importance of support functions must not be underestimated. In the event of 
any unexpected error, the support group represents the "front line" for 
managing relations, as well as for directing error conditions to the personnel 
who are best suited to handle them. Customers and partners need to know who 
they should call if they have a question or problem. DENIC is committed to 
having trained support on hand throughout the transition.

Registrars are key stakeholders and are critical to the success of the 
transition. Therefore, DENIC is committed to a strong working relationship with 
registrars. In support of this relationship, DENIC will plan to communicate 
critical dates in a proactive and timely manner, provide tools and information 
to support registrars transition to the new system, facilitate full and equal 
access to all registrars, in particular provide full and equal access to 
testbed environment, and provide general  support for registrars. The vehicle 
used to transmit and share this information will be the Registrar Transition 
Council. 

Although the wider Internet community does not participate directly with DENIC 
in the transition, it is important that the community as a whole be kept 
informed of critical dates, service outages, service changes and service 
improvements. DENIC will work closely with registrars and ICANN through its 
marketing department to reach as many Internet users as possible to manage 
expectations.

(b) Activities Prior to Turn Over

(i) Data-Centric Specification

DENIC and  VeriSign will cooperate to identify all necessary data and 
information for the migration. This data includes (but is not limited to):

* the current .net information available via whois (thin model)
* the information necessary to build a .net zone file, 
* .net pending transfer requests and pending dispute resolutions, 
* registrars' stored profiles.

Information stored by registrars does not play a role in this step of the 
transition. 

The format of the data for subsequent bidirectional communication will follow 
the XML data format as described in ICANN's Data Escrow Registry Agreements as 
much as possible, in order to keep the necessity of new development to a 
minimum. The security of data exchange mechanisms will be addressed: only 
authenticated and authorized parties will be able to access this data.  
Integrity and confidentiality of the data will be guaranteed at the 
communication channel level (e.g. via PGP or SSL). The identification of the 
data, the adoption of the exact bidirectional communication format and the 
agreement on security mechanisms will take place within three working days 
following the bid decision.

(ii) Registrar Accreditation

Once the bid decision has been made, DENIC will begin working with all ICANN 
accredited registrars to prepare for the transition to the new registry. The 
DENIC Customer Relations Team will begin this process by distributing 
contracts, detailed information about further steps, the planned transition, 
important dates and facts, forms and questionnaires to the registrars. All 
ICANN accredited registrars currently approved to do registrations in the .net 
top-level domain will be contacted to become accredited with DENIC. The 
Customer Relations Team will assist all registrars in all aspects of the 
transition to become convenient and successful. It will also collect data 
needed by the registry (e.g. registrar contacts, registrar whois access control 
information, PGP keys and certificates) from the registrars. To achieve a 
smooth transition this data should be available to DENIC no later than two 
weeks prior to the turn over.

Once all required data and documents have been made available to DENIC, the 
registrar will receive the accounts and other information necessary to access 
the DENIC test environment and the registrar website. Now the registrar can 
start to prepare, test and migrate their systems and APIs for use on DENIC's 
production system. DENIC's Customer Relations Team has gained many years of 
experience with assisting registrars from the work with .de registrars. These 
employees will support the registrars in a highly qualified manner to get their 
systems switched to the new registry. 

In this first period of preparation of the transition there also will be an 
online training possible. This training will be developed, held and supported 
by the Customer Relations Team, again backed by the significant experience from 
the .de trainings. DENIC will announce by e-mail the dates of training courses 
for ICANN accredited registrars including the online training during the 
preparation period. Information will be available from the registrar website as 
well. The same communication channels will be used to disseminate detailed 
information about the transition plan, the roadmap, technical documentation of 
DENIC's services and processes and important dates and facts. An FAQ list will 
be maintained and made available on the DENIC .net website.

During the first two months after .net reassignment (April and May 2005) 
DENIC's Customer Relations Team will accept phone calls as well as process e-
mails and faxes from 5 to 19 UTC (office hours), Monday to Friday. The third 
and last month before turn over (June 2005) the Customer Relations Team will 
deliver 24 hour service to registrars (24/7). 

This preparation period will be very important for the transition. Hence DENIC 
will attach prime importance to it by providing the registrars with personal 
contacts from the DENIC's customer Relations and Account Management Teams, who 
have significant experience from the committed and dedicated work with the .de 
registrars.


(iii) Registrar Transition Council Formation

DENIC will issue a request for applications to form a council of registrars, 
which will work with DENIC with the .net transition by means of feedback on the 
transition plan, participation in the development and use of the testbed 
environment. 

DENIC is committed to including enough members for the Transition Council to 
have representatives of all registrars groups, with different size, technical 
skills and economical capacities, representing each of their interests. Thus, a 
focused team will work in a clear interest-driven manner, and all registrars 
voices and concerns will be represented. The Transition Council will provide an 
additional forum through which DENIC can interface formally with VeriSign, as 
they will be members of the Council. The formation of the Transition Council 
will take place immediately and will convene within three weeks following the 
bid decision.


(iv) Transition Testbed Setup

A registry testbed for .net domains will be set up and checked to conform to 
the set of test data agreed on in step 1. An SRS, including whois and DNS 
services, will be made operative in the testbed. 

The testbed will have sufficient capacity to facilitate the registrar's tests. 
Detailed information about the issues to be tested, common problems and 
solutions, common test scenarios, and other opportunities for knowledge sharing 
will be posted regularly on the portal. The testbed will be regularly updated 
to reflect the best practices identified by DENIC and the registrars. These 
changes to the testbed will be carefully logged to make rollback possible if 
necessary.

The setup of the Transition Testbed will take place in parallel to step 2 and 
will be concluded no later than five weeks following the bid decision.


(v) VeriSign's Test Dataset Transfer

After two weeks following the bid decision, DENIC expects a full dump from the 
actual .net environment of the data set defined in step 1 and with the agreed 
mechanisms there, so that real data can be loaded into the Transition Testbed 
and close-to-real conditions apply to the next transition steps. Accurate time 
measurements of dump and transmission duration will be made, so that the time 
of registry services interruption can be estimated.


(vi) VeriSign's Test Dataset Import

Once step 4 has been concluded, the whole set of data will be loaded, parsed, 
quality-checked, converted and imported into the Transition Testbed. The 
results of the test quality-checks, including heuristic methods for compliance 
with ICANN's whois Data Reminder Policy (WDRP), will be delivered back to 
VeriSign, in order for them to act accordingly. Accurate time measurements of 
import duration will be made, so that the time of registry services 
interruption can be estimated. DENIC expects to complete this process no later 
than four weeks after bid decision.


(vii) Transition Testbed Inauguration

Once step 5 has been concluded, the Transition Testbed will be open to all 
accredited registrars, including the Transition Council. The importance of the 
Transition Testbed cannot be overemphasized, as in this step the following 
areas must be thoroughly tested:

* Correct registrar profiles, credentials, digital certificate installations, 
etc.
* Correct and reliable functioning of RRP-to-EPP proxy,
* Correct and reliable EPP backend transaction processing,
* Correct and reliable whois service functioning with near real time 
propagation of data modifications from the registry interface,
* Correct and reliable DNS services, with a maximum delay of three hours of the 
data modifications from the registry interface, and
* Correct and reliable accounting, billing, reporting and data escrowing.

Problems found during this step will be ticketed into DENIC's bug tracking 
system. This bug tracking system is open to all registrars, so that their input 
can be accounted for. Bugs will be fixed as soon as possible according to their 
priority, so that the testability of the Transition Testbed is permanently 
guaranteed. Software patches will follow the same QA standards as DENIC's 
software releases and will be deployed in a timely manner. DENIC expects to 
complete this process no later than five weeks from bid decision.


(viii) Registrar Support and Registrar Information Portal

DENIC will make a number of support services available to the Transition 
Council. Immediately after the bid decision, DENIC will build a Registrar 
Information Portal where detailed information about the ongoing transition, a 
roadmap with a timetable, as well as test guidelines can be found. When new 
dates, details, and experiences are available, they will be made available to 
the registrars via the Portal and through the regular meetings. DENIC will work 
closely with registrars to ensure that appropriate help is provided, that 
registrars are able to perform testing of the new system to their satisfaction, 
and that there is a defined feedback channel through which identified issues 
can be fed back to DENIC. 

In addition, DENIC will provide a Registrar Toolkit, which will consist of a 
set of Java and C APIs, samples, and supporting documentation to facilitate 
registrar's interface to the DENIC Registry System.


(ix) Transition Testbed Reloaded

Once step 6 has been concluded, no later than nine weeks after the bid 
decision, a decision will be taken by DENIC as to whether any further issues 
remain in the Transition Testbed. This step can be viewed as an optional 
precautionary step taken to minimize the chance of issues arising during the 
actual transition.

Once an affirmative determination has been made, DENIC will drop the testbed 
content, rerun all its own tests, and again require the Transition Council to 
verify the correct and reliable functionality. This step will last one week 
(ten weeks after initial bid decision).


(x) VeriSign's Production Dataset Import

Two weeks before turn over date, VeriSign will provide another full dump from 
the actual .net environment of the data set defined in step 1 and with the 
agreed mechanisms there, so that real data can be checked and imported as 
described in step 5, but this time into the production environment.


(xi) VeriSign's Incremental Dump

Right after the full dump described in step 9, VeriSign must start documenting 
any changes to the .net registry set of data in a differential process until 
VeriSign's SRS shutdown occurs. This differential process creates incremental 
dumps which must be audited in the same format as full dumps, as defined in 
step 1. The use of incremental dumps represents an additional burden on DENIC 
and VeriSign but provides for minimizing total turn over time.


(c) Activities during Turn Over

(i) VeriSign's SRS Shutdown

At the pre-agreed, defined time of the turn over, VeriSign will shut down their 
registry services. All out-of-band messages defined in RRP (mainly transfer 
requests and responses, cf. RFC2832, section 9) will be delivered for the 
shutdown to be considered complete. VeriSign's whois service and name servers 
must remain operational.

(ii) VeriSign's Incremental Dump Import

VeriSign will create the incremental dump described in step 10 and deliver it 
to DENIC. DENIC will incrementally load the data into the production 
environment described in step 9 undergoing the same quality assurance 
procedures. Verifications of accuracy and consistency will be performed.


(iii) DNS Phased Migration
Two weeks before the June 30 turn over date, DENIC will feed all name servers 
with a copy of the .net  zone file (to be supplied regularly by VeriSign in the 
master file format specified by RFC1035). These name servers will be able and 
start to serve .net authoritatively.

Upon verification of proper operation (same day) selected DENIC servers will be 
added to the .net NS RRset in both the .net zone and the root zone. At the same 
time, as many of the incumbent's name servers as necessary (with packet size 
and load considerations in mind) will be removed from the NS RRsets. Since 
VeriSign currently announces 13 name servers while DENIC will only make use of 
six (five unicast and one anycast announcements), on average two of VeriSign's 
name servers will be replaced by one DENIC name server. The exact exchange 
pairs will be determined based on information provided by VeriSign regarding 
exact topological placement, query load distribution, and IPv6 capabilities of 
the current set.

As soon as the source of zone data is switched from VeriSign's to DENIC's 
registry database (turn over date), the SOA MNAME field for the .net zone will 
be adjusted to reflect this change, i.e. a DENIC name server will be announced 
as primary master for .net. At the same time, the SOA RNAME field will be 
changed to show a DENIC point of contact.

Upon change of the primary master DENIC will supply VeriSign with a copy of 
the .net zone in RFC1035 format regularly until the end of the DNS transition.  
VeriSign will need to maintain every name server operational and with current 
data for a period of at least two days after removal of this server from the NS 
RRset in both the .net and the root zone. The day of removal shall count as an 
additional day. This allows for TTL expiration given today's TTL values and 
avoids stale data and lame delegation effects.

Two weeks after turn over date, the remaining VeriSign name servers will be 
replaced in the .net NS RRset with not yet announced DENIC name servers, if 
any. This change will be applied to both the .net and the root zone. Post 
change maintenance is necessary as outlined above.


(iv) DENIC's SRS and Whois Startup

DENIC will bring live its production SRS and whois services and perform a short 
functionality test before releasing them to the registrar community. This is 
the last step in the turn over and is expected to be completed not later than 
24 hours after the start of step 11.


(d) Activities after Turn Over

(i) VeriSign Redundant Whois Referral

VeriSign whois service will remain operational but a referral to DENIC's whois 
service will be introduced for all .net objects as a security mechanism. This 
referral should be maintained for three weeks.

(ii) RRP-to-EPP Migration 

All registrars are expected to abandon VeriSign's proprietary RRP protocol as 
soon as possible and no later than six months after DENIC's taking over .net 
registry services. Up to that time DENIC will provide support for the 
registrars to accomplish that migration including (but not limited to) a RRP-to-
EPP proxy and registrar EPP toolkits, as described in part 2-8: RRP-EPP 
Migration.

(iii) Thin-to-Thick Migration

DENIC will follow a three-step procedure to migrate from a thin to a thick 
registtrya model. This procedure is described in more detail in part 2-8: RRP-
EPP Migration.


2. Interruption of Registry Function

The interruption of the registry services will be reduced to a minimum. This 
minimal time frame amounts to the addition of:
* Time for VeriSign to shutdown registry and create an incremental backup of 
the data modified since the last full backup,
* Time for VeriSign to transmit this data to DENIC,
* Time for DENIC to parse and load this data into the registry database,
* Time for DENIC to start up the registry services, and
* Time for VeriSign to introduce a whois referral.

The sum of turn over registry downtime is not expected to exceed one day (24 
hours). It is probable that downtime could be even shorter than this, if the 
transition runs according to the schedule defined during the previous tests. To 
be cautious, contingency is built into this estimate.

The core registry services, namely, DNS resolution of the .net TLD and the 
whois server will not endure any downtime. Data being delivered via DNS and 
whois will be frozen during turn over and show the state previous to VeriSign's 
SRS shutdown for the duration of the turn over registry downtime.

Secondary registry functions including customer support and web presence will 
not suffer any downtime either.


3. Contingency Plans

DENIC's step-by-step transition plan, by its very nature, builds in 
contingency. Critical steps are repeated more than once prior to the turn over 
so that issues can be anticipated, downtime minimized, and potential hazards 
can be identified and eliminated. 

The individual steps of the transition plan are analyzed separately to 
demonstrate how contingency is built in. Figure 1 dissects each step, together 
with the expected impact and expected probability, so that adequate reaction 
measures can be described.


4. Effect of Transition

Upon completion of the transition, registrants of .net domain names will be in 
the capable hands of one of the most experienced registries worldwide. DENIC by 
far exceeds the requirements outlined in the SLA document. Registration to 
resolution times will equal or exceed the current times of VeriSign's Rapid 
Update facility with an initial worst-case delay of three hours between 
successful registration and DNS reachability. The update of information 
services like whois will take place instantaneously after registrations or 
updates.

Users trying to resolve .net domain names will have a top rate DNS 
infrastructure at their disposal, with:

* redundant name servers carefully distributed throughout the network topology 
* End-to-end monitoring infrastructure and processes
* IPv6 presence
* state-of-the-art anycast technology 
* guarantees for minimal round time trips and resolution latency.

Users directly seeking to resolve .net-domain names will not be the only ones 
to benefit from this infrastructure. Anyone using a domain delegated to name 
servers located under .net will experience the advantage, too. 44% of the total 
of Internet hosts, including 37 of the top 100 .com-sites (according to 
VeriSign) will rely on the rock-solid skills and infrastructure which already 
serves the German TLD.

Registrars will benefit from other positive effects. Once the complete 
conversion to a thick registry model has been completed, they will not need to 
operate whois services themselves. Also, they will be relieved of the duty and 
expense of operating cumbersome data storage and escrow services. End users 
will find this registry one-stop service convenient. Once the migration from 
thin model to thick model has been completed, they will be able to retrieve all 
whois information without being redirected to the registrar to complete the 
lookup. 


5. Cooperation from VeriSign

Collaboration of VeriSign will play a crucial role for a successful migration 
process. In order to minimize the burden on the community of users and 
registrars, this transition plan leverages the experience and technical 
competence of DENIC and VeriSign, so that cooperation from the latter is needed 
in the following form:

* Onsite participation in initial planning meetings by key VeriSign personnel 
(within five business days of decision).
* Collaboration to agree on a data exchange format and data communication 
channel as described in step 1 (within five business days of decision).
* Data schema of existing .net database (within five business days of decision).
* List of contact information for all .net registrars. (within ten business 
days of decision).
* List of all .net related websites and content. (within ten business days of 
decision).
* Production data dumps of the .net registry, as described in steps 4, 9 and 
11, both full and incremental dumps. (beginning within 15 business days of 
decision).
* Collaboration in the Transition Council. The Transition Council would benefit 
from VeriSign's expertise in its proprietary protocol RRP.
* DNS name services. For a period of two weeks and two days after the turn over 
date, VeriSign is asked to keep on offering DNS services to .net.
* Whois service continuation. For the actual duration of the turn over time, 
VeriSign's whois services must stay online. Once DENIC's whois service is 
declared operative just after turn over, the Internet community would benefit 
from a whois referral mechanism similar to that described in the document RIPE-
252 for a recommended period of three weeks. A twofold effect would be reached: 
queries to the old whois server would not remain unanswered and at the same 
time the location of the new whois server could be communicated. Nevertheless 
DENIC would start to announce the location of the new .net whois server by 
means of an SRV record in the DNS immediately after turn over.
* List of IDN variant tables. In case VeriSign makes use of some domain variant 
tables or domain variant generation algorithms like the ones described in 
RFC3743, detailed information about them will be needed in order to ensure a 
smooth continuation of the IDN services without any impact in the affected 
speaker community.
* Pro-rated payment of revenues from customers who have paid for service in 
advance.
* Cooperation in order to take over all areas related to domain registry 
services like websites, various information forums, customer support, 
registration policies, ongoing dispute resolution information, etc.
* List of outstanding billing issues with relevant background.
* List of outstanding customer service issues with relevant background.
* List of outstanding legal issues with relevant background.


6. Experience in Performing Similar Transitions

Experience #1: RIPE/DENIC Migration

During 2001, a huge international migration effort coordinated between Réseaux 
IP Européens (RIPE), headquarters in the Netherlands, and DENIC was 
accomplished successfully. Initially ca 2.4 million contact objects stored in 
the RIPE database and referenced by domain objects stored in the DENIC database 
were reallocated to the DENIC repository. Queries for .de domains to the RIPE 
whois service were redirected to the DENIC whois by means of a whois referral. 
In a subsequent period of 4 months, and without service interruption, the RIPE 
database kept being the database master and all object modifications taking 
place were mirrored in near real time with RPSL syntax to the DENIC premises. 
Mirrored data was continuously collated with the original via RIPE whois 
service. During that time, DENIC set up its own testbed for contact 
registration together with a whois service for the mirrored contact data. 
Punctually at the end of that grace period, DENIC took over the authority of 
that data, added the contact registration/modification feature to its SRS 
interface and switched off the mirroring. On the September 21, after DENIC's 
confirmation of full operability, RIPE erased all 2.4 million unreferenced 
contact objects from their database. This is an excellent example of a flawless 
planning and execution of a procedure in the same order of magnitude as the 
future .net transition and from which experience has flown into this transition 
plan.

Experience #2: Registry Repository Restructuring

In 2002, DENIC carried a major restructuring of its registry repository, 
migrating from a file system storage to a RDBMS. At that time, more than five 
million domain names (about the current size of .net) were registered; 1.5 GB 
of legacy data comprising all registry transactions up to that time together 
with a snapshot of the current registry status were loaded, analyzed, quality-
checked, audited and imported in the database in an iterative process which 
resembles the steps described in the .net transition plan. All kinds of quality 
checks were carried out: from name server reachability to contact data 
plausibility. Erroneous entries were detected, corrected and tests were 
restarted. For four months both repositories were kept synchronous and 
continuously collated through various mechanisms. Recovery strategies were 
developed in case a failure should occur. At the end of the evaluation period, 
and without any interruption of the registry, whois or DNS services, the 
authoritative registry repository was switched. End users and registrars 
experienced a sudden improvement of QoS without any downside.

Experience #3: IDN Introduction

In 2004, DENIC introduced Internationalized Domain Names (IDN) registration 
without making use of any lottery mechanisms or land rush period. On the 
announced day, March 1, and without any kind of adjournment, IDN registration 
was opened and turned into a real big bang. Within 48 hours more than 600,000 
requests rushed into the registry systems. In this project, DENIC mastered a 
brilliant coordination effort of the introduction of a new technology together 
with a massive customer demand. Intense collaboration with a selected numbers 
of registrars, with their focus directed towards DENIC's testbed, helped to 
identify deployment issues.


7. Proposed Criteria for Evaluation of Transition

The success of the transition is not just a matter of the eventual activation 
of .net registry at DENIC's SRS, together with discontinued DNS and query 
services, but it involves as well a perception of how much time, money and 
nerves of all involved stakeholders (registrants, registrars and end users) 
were spent on the way to that target. Thus both objective operational metrics 
together with subjective impressions of implicated parties will form the 
evaluation criteria for success and will be made public as soon as they are 
available. In addition to the criteria already listed as part of the transition 
element descriptions, DENIC proposes the following criteria:

* Zone file collation program. A continuous DNS monitoring of answers from 
VeriSign's name servers and DENIC's name servers will be carried up to the time 
of completion of the turn over. Lack of divergences will be an objective 
indicator of success.
* DNS total availability program. A monitoring of the availability and the 
responsiveness of VeriSign's and DENIC's name servers will take place up to the 
time of completion of the turn over. A lack of visible DNS service disruption 
from distributed geographical locations will confirm a flawless transition 
process.
* whois total availability program. Distributed clients will systematically 
query the authoritative whois server on a regular schedule, and will evaluate 
the availability and the responsiveness of the service. Response curves must 
not show any degradation of service quality for the duration of the transition 
and after.
* whois data collation program. Automated clients will carry out a variety of 
object operations through both the EPP backend and the RRP-to-EPP proxies and 
will compare the whois output with their expected results. Matching 
expectations on a statistically significant sample of queries will rule out 
registry malfunction with a high level of confidence.
* Registrar feedback. As part of the DENIC support effort, registrars will be 
able to evaluate the smoothness of the transition by means of dedicated polls 
at their registrar portal. Different aspects ranging from specific technical 
problems to overall satisfaction or concerns with the various aspects of the 
migration process will be gathered and evaluated.
* Thin remnants. The number of registrars needed to be contacted by DENIC, 
together with the total number of affected domains will be an indicator of the 
registrar support and services offered by DENIC in the process of migration 
from a thin to a thick registry.


8. Conclusion

Backed by its experience with the .de TLD, it is evident that DENIC can design, 
build, test, and operate a world-class operation under conditions of 
exponential growth. This transition plan also demonstrates that DENIC can apply 
its skills, resources, and experiences to enable a smooth and seamless 
transition from the incumbent to DENIC's top-rate infrastructure.


Provide a detailed description of your plan for supporting RRP at the time of transition, for supporting EPP 1.0, and for providing registrars with a smooth, low-cost migration path from RRP to EPP.

8. RRP-EPP Migration

Highlights

* RRP-to-EPP transition is an integral part of the overall transition and 
contingency plans.

* DENIC will support a smooth transition for registrars using RRP by 
implementing and supporting an RRP to EPP proxy for a period of time.

* DENIC plans to migrate the current thin to a thick registry model within 
twelve months and offers a direct as well as an indirect migration path to 
registrars.


DENIC has developed a clearly structured transition plan as well as a 
contingency plan addressing all risks of the transition for all steps of the 
transition phase. Two major aspects covered by these plans are the RRP-to-EPP 
migration and the migration from a thin to a thick registry model. These two 
aspects are highlighted separately in this chapter but will remain a vital part 
of the transition and contingency plans.


(i) RRP-to-EPP Migration 

The new .net registry will conform to the latest version of the Extensible 
Provisioning Protocol (EPP). In order to ease transition for the 
accredited .net registrars, DENIC will offer a RRP-EPP proxy that complies with 
VeriSign's proprietary RRP 2.0.0 [RFC 3632] and any following extensions that 
VeriSign will be make public (it is understood that VeriSign is currently using 
a version 2.1.2, but the specification is not yet public.) RRP key-value pairs 
will be translated into EPP-XML using the extension framework where needed to 
transmit RRP specific items to the actual EPP thick registry service. The RRP-
to-EPP proxy will act as a temporary migration interface and will be phased out 
in favor of direct EPP connectivity in the future.

The proxy will be programmed and operated by DENIC. This approach will minimize 
the impact of the new .net thick registry to all existing registrars. It is 
DENIC's intention to have all registrars migrate to the widely accepted EPP in 
the medium term.

To enable the soft transfer from the current .net protocol, DENIC aspires high 
transparency, a comprehensive documentation, how-to manuals, a test 
environment, help and guidance for tests and adjustment of own systems and the 
offer of several workshops. Furthermore, registrar EPP toolkits will be 
provided to support a smooth transition.

It will be impossible to provision thick information via the RRP interface, 
thus the RRP to EPP migration is closely coupled with the thin-to-thick 
migration, as described below.


(ii) Thin-to-Thick Migration

A three-step procedure will be followed to accomplish the migration from a thin 
to a thick registry.

* At the moment of the turn over, contact provisioning will be possible via EPP 
and domains can optionally reference contacts. This step is planned to last six 
months.

* In a second phase, contact references are mandatory for every create, update, 
transfer or renew domain commands. Hence, these selected commands will be only 
possible via EPP. This step is planned to last six additional months.

* In a third phase, that is, one year after DENIC's taking over .net registry 
services, domains without contact references will be considered invalid. 
Sponsoring registrars will be contacted and required to update these domains in 
a timely manner. 

If it becomes clear during the transition process that registrars need more 
time for a full transition to EPP (especially phase 2 and phase 3) DENIC will 
reconsider the timeframe of the third phase together with registrars.

DENIC will also allow newly accredited registrars to start using RRP during the 
first six months to guarantee equivalent access for new and already established 
registrars.

During the thin-to-thick migration process, domain names without contact 
references will be displayed in whois with an additional line including the 
referral to the authoritative whois service as defined by the sponsoring 
registrar. The DENIC whois listing will contain all the categories associated 
with thick model display.

DENIC is aware that some registrars store contact information with different 
structure compared to the one defined by the registry interface and displayed 
by whois (see Appendix O). To address this, certain fields in the contact 
object will be optional during the transition period for legacy data. These 
fields are contact:city, contact:pc, contact:sp, contact:cc.

The entire .net registry will be migrated to a full thick model after one year. 
Until then, DENIC's whois will continue to return thin data for yet unmigrated 
domains. Thin and thick data will coexist for this period of time.

After one year, DENIC will have all thick model data from the registrars, and 
whois users will be able to gather all thick model information from DENIC whois 
without the need to reference registrar whois. 


(iii)	Migration Path Overview

The path that DENIC proposes for the transition from RRP to EPP and 
from a thin to a thick model is a direct transition from RRP to "thick" EPP, 
as described above. However, DENIC will also allow registrars a second 
transition path from RRP to thin "EPP" as a first step during the first six 
months followed by an expansion of the "thin" EPP to a "thick" EPP model (see 
Figure 1). This indirect transition path gives registrars the opportunity to 
introduce EPP earlier or to leverage existing EPP implementations also for .net 
registrations.

DENIC's migration approach allows registrars to choose the time of 
transitioning to EPP freely within the first six months.


   

Please check that you have completed all the following steps to ensure you have fulfilled the requirements of the Request for Proposals:

  1. Submitted by wire transfer the application fee
  2. Downloaded and completed all the application materials.
  3. Affirmatively evidenced your agreement to all terms and conditions included in the Request for Proposal.
  4. Printed, signed and sent to ICANN the final copy of your application.
  5. Kept a copy for your records.

When you complete this application and finalize it for sending to ICANN, you will need to confirm the following:

  1. By checking this box the applicant agrees (if selected as the successor registry operator for .NET) to the following:
  2. By checking this box, the applicant certifies that (a) he or she has full authority to make this application on behalf of the applicant and to make and fulfill all agreements, representations, waivers, and undertakings stated in this transmittal form and accompanying materials; copies of the documents demonstrating this authority are attached and (b) all information contained in this application transmittal form and accompanying documents is true, accurate and complete to the best of the person's and the applicant's knowledge and information. The undersigned acknowledges on his or her own behalf and that of the applicant that any material misstatement or misrepresentation (or omission of material information) will reflect negatively on any application.

  3. By checking this box, the applicant acknowledges that there are five parts of the Request for Proposals that have been thoroughly reviewed and considered in their entirety by the applicant. The applicant (or, if there are multiple applicants, each applicant) understands that failure to fully follow instructions or the requirements set forth for each of the documents transmitted with this Application Form will be a factor negatively affecting consideration of this application.

  4. By checking this box, the applicant (or, if there are multiple applicants, each applicant) hereby authorizes ICANN to:
  5. By checking this box the applicant (or, if there are multiple applicants, each applicant) understands that difficulties encountered by ICANN in verifying, elaborating on, supplementing, analyzing, assessing, investigating, or otherwise evaluating any aspect within or related to this application may reflect negatively on the application. In consideration of the review of the application conducted on behalf of ICANN, the applicant (or, if there are multiple applicants, each applicant) hereby releases ICANN (and each of its officers, directors, employees, consultants, attorneys evaluators, attorneys, accountants, and agents, hereinafter jointly referred to as "ICANN Affiliated Parties") from any and all claims by any applicant that arise out of, are based upon, or are in any way related to, any action, or failure to act, by ICANN or any ICANN Affiliated Party in connection with ICANN’s review of this application, investigation or verification, any characterization or description of applicant or the information in the application, or the decision by ICANN to determine the next .NET registry operator. Each applicant further indemnifies ICANN and the ICANN Affiliated Parties from any and all liability to applicant in any way related to or in connection with, any of such matters, provided, however that this shall not diminish any preexisting contractual rights a party may have to challenge such matters.

  6. By checking this box the applicant (or, if there are multiple applicants, each applicant) hereby authorizes ICANN and ICANN Affiliated Parties to publish on ICANN's web site, and to disclose or publicize in any other manner, any materials submitted to, or obtained or generated by, ICANN and the ICANN Affiliated Parties in connection with the application, including ICANN's (or their) evaluations and analyses in connection with the application or ICANN's investigation or evaluation of the application, other than the confidential material included in Part 2, which will remain confidential to ICANN and the independent evaluators. The applicant(s) further certify that it has obtained permission for the posting of any personally identifying information included in the application materials. The applicant understands and acknowledges that ICANN does not and will not agree to keep any portion of the application or materials submitted with the application confidential except for the material specifically identified in Part 2. The applicant (or, if there are multiple applicants, each applicant) grants ICANN and ICANN Affiliated Parties a license to use any copyright or other intellectual property that applicant may have in any portion of the application for this purpose.

  7. By checking this box the applicant (or, if there are multiple applicants, each applicant) hereby gives ICANN permission to use the applicant's name, descriptive materials and/or logo in ICANN's public announcements (including informational web pages) relating to top-level domain space expansion.

  8. The applicant agrees that the applicant information, certified by the undersigned (a) that he or she has authority to do so on behalf of the applicant and, on his or her own behalf and on behalf of the applicant, (b) that all information contained in this proposal is true and accurate to the best of its knowledge and information. The applicant understands that any material misstatement or misrepresentation (or omission of material information) will reflect negatively on any application of which this proposal is a part and may cause cancellation of any selection to operate a registry based on such an application.

Signature: ___________________________________________________________________________
Title: ___________________________________________________________________________
Organization: ___________________________________________________________________________
Date: ___________________________________________________________________________


Please report any problems with this application to
net-rfp@icann.org

© 2005 The Internet Corporation for Assigned Names and Numbers