Folks

Here is the first cut at the minutes. Additions and corrections to me, please

Nigel
Minutes of DB-WG, RIPE 70, 14th May 2015, Amsterdam

A. Administrative Matters
   . Welcome
   . Select scribe (Nigel)
   . Finalise agenda (V3 has been published, no additions)
   . approval of minutes from previous WG meeting(s)
   . review of action list (Nigel Titley)
      AP67.4 [WW144] Take the issue of geolocation to the RIPE NCC Services 
Working Group as it does not seem to be heavily used (subsumed into AP69.3)
      AP67.5 [WW144] To check that the Anti-Abuse Working Group has properly 
specified both what should be done with mail that is sent to the abuse contact 
and (possibly) its format. (Passed onto Anti-Abuse (Brian Nisbet) who will 
return it when done)
      AP67.6 [WW144] To bring to the attention of the Routing WG the fact that 
the routing data as recorded in the DB is generally very poor (Report by 
Alexander Azimov) (Discharged)
      AP68.1 [RIPE NCC] Remove the referral-by attribute (Discharged)
      AP69.1 [RIPE NCC] Produce a self contained document describing migration 
of the changed: attribute to the last-modified:/created: attributes (Ongoing)
      AP69.2 [RIPE NCC] Come up with some straw man proposals for displaying 
history for objects where available (Ongoing)
      AP69.3 [RIPE NCC] To examine and report on possible solutions to 
improving geolocation data in the RIPE DB (Ongoing)

B. Data Base Operational Update (Tim Bruijnzeels, RIPE NCC)
  See presentation.
  Release candidate environment has been deployed for some time and is used to 
do trial deployments for 2 weeks prior to release. There is a release notes 
page describing what is coming up.
  Five releases since last meeting of which only 3 have been deployed (one 
rolled back and another not deployed)
  A question was raised about the fact that 74% of email updates are authorised 
with clear text passwords and perhaps this should be deprecated, although it 
was noted that the value of the database entries was not particularly high and 
could be rolled back. It was also noted that many of these emails were TLS 
protected and single hop and the security issue is probably not serious.
  Would it be possible to not allow password authentication on creation of new 
maintainer objects?
  AP70.1 [All] Discuss deprecation of plain text passwords in email 


C. New DB-Software functionality (Tim Bruijnzeels, RIPE NCC)
   (See presentation)
    . referral-by deprecation
     - where are we now?
      referral-by is now optional and deprecated.
     - what are next steps (timeline)
      It will be removed by early July after a long period in the RC testbed.
    . from "changed:" to "last-modified:" / "created:"
     - where are we now?
      last-modified: is now added
     - what are next steps (timeline)
      changed: is about to be made optional (early July)
      it will be deprecated six weeks later (Mid August)
    . RIPE NCC to stop enforcing accurate organisation names in "descr:" 
attribute
      Only RIPE NCC can edit org: and org-name: of referenced non-RIPE 
organisations
      Once these entries are all sorted out the enforcement of descr: will cease
    . Improving Usability
      Work is being done to make the database easier to use
    . Business Rules
      A document describing the business rules will be published later this 
year.
    . Restrict usage of RIPE-NCC-RPSL-MNT
    . new MNTNER - RIPE-NCC-LEGACY-MNT
      This is added to legacy resources to ensure correctness of certain 
attributes
    . other aspects
      Adding shared maintainers on LIR organisation and allocations could clean 
up the business rules associated with updating organisation details and make it 
easier to update organisational details. 
      Choosing which maintainer to use is a decision that needs to be made. 
Perhaps a "default" maintainer with all LIR portal users on it.

  Comments from the room agreed with this. Publishing of the business rules 
will help users to decide if this is appropriate.
  Addng the maintainer on legacy resources means that it is not possible for a 
legacy owner can no longer delete sub-assignments. This was not believed to be 
the case. Taken offline.
  RV pointed out again that he needs more notice of releases in order to do 
appropriate planning and testing. 



D. Personalised authentication (Tim Bruijnzeels, RIPE NCC)
  (See presentation)
  This will allow one click creation of person objects
  Maintain credentials in one place.
  Allow better auditing.
  Done by extending person object to have multiple optional auth: attribute
  This will ultimately allow existing auth: sso references to be cleaned up
  Last auth: attribute should not be removed from a person object that is used 
in an authorisation context.

  Should this be extended to the role object as well? This would involve 
additional business rules but is technically possible.
  It would be useful to record what credential (maintainer) was used to make a 
particular change to an object and this change would facilitate this. RV was 
asked to raise this on the mailing list.


E. New proposals (Piotr Strzyżewski)
   . UTF-8 in the DB
      Two suggestions: add to present attribues or add to complementary 
attributes
      Mostly positive feedback
        Could help with getting correct data for LEAs
        or could break everything?
        Bear in mind that the underlying transport may not be 8 bit clean
        The encoding needs to be specified.
        Note that searching is also impacted.
   . same INET(6)NUM objects with different status
      There is a problem that it is not possible to put two inet(6)num objects 
on the same space. This is particularly awkward for /22 allocations. Little 
feedback and one vote against. A possible approach would be to add multiple 
value for status field.       
   . cleanup some hacks with status values
      Examples ALLOCATED-BY-RIR
      No feedback so will ask RIPE NCC to come up with a suggestion
      AP70.2 [RIPE NCC] Come up with a proposal to fix this
   . make phone number optional in person objects
      Discussion to make more attributes options
      RFC2622 says this is mandatory. However we aren't compliant with it anyway
   . clean up historical "abuse-mailbox:" attributes
      It was noted that this should only be done once the use of the abuse-c: 
attribute is properly documented
      Should legacy holders add abuse-c:?

F. Orphaned Objects (William Sylvester)
  (See presentation)
  Some inetnum objects have no ability to maintain their own records due to 
data decay. 
  The proposal is to try and fix this.
  This particularly affects ERX holders and the suggestion is that if further 
discussion takes place on the ERX holders list then PS should relay it (without 
representing the ERX holders). It was suggested that we let this run for 6 
months and see what emerges.
  It was pointed out that delaying this is delaying the cleanup of the database 
which is a Bad Thing.
  Caution was advised however as for legacy space we may not be certain about 
the ownership of a particular allocation or the conditions under which it may 
be used and the owners of the data are almost certainly not a part of this 
community.
  Some disagreement took place about the level of checking that was necessary 
in order to recover control over "orphaned" sub assignments. It was pointed out 
that there is a difference between leaf nodes and nodes higher up in the system.

G. Using RPKI for signing RPSL objects (Robert Kisteleki, RIPE NCC)
  (See presentation)
  This mechanism would allow you to use RPKI to sign RPSL objects
  It would not replace RPSS but would be used in combination with it.

H. "source: field for non RIPE address space" (Job Snijders)
  See presentation
  Extend the source: attribute to for example be RIPE-NONAUTH for objects for 
which RIPE is not authoritative.
  Many of these are for Afrinic and so we should have considerable patience 
while they get their RR in order.
  Much work needs to be done to determine the rules to be applied to such 
objects.

I. Use of the RIPE-NCC-RPSL-MNT maintainer
  See presentation
  The maintainer RIPE-NCC-RPSL-MNT has a well known password and is used in a 
number of DB objects
  This is actually to allow registration of alien objects but probably cannot 
be just ripped out.
  The proposal is to keep the maintainer to create objects but immediately they 
have been created remove the attribute.
  For existing objects it would be necessary to add an additional maintainer.

J. IRR Homing project
  See presentation
  Objects belong in the appropriate database and should be rehomed to where 
they belong.
  This would be done by a bulk migration followed by mirroring of the data for 
at least 12 months.
  Nice idea but this may well involve a new take on RPSL.
  Comments welcome on the mailing list.


Y. Input from other Working Groups and/or Task Forces
   . Cross-registry Authentication for IRR Data BoF (Job Snijders)
      See notes of the BoF (circulated on the mailing list)
      Feedback on the mailing list is welcomed

Z. AOB

Reply via email to