At 4/26/01 5:24 AM, William X. Walsh wrote:

>OpenSRS has obligations to the end user, regardless of how you cut it.
>They have done a great job balancing that, but there are some people
>who think that they should have all of the rights and privileges of
>fully accredited registrars, and the same type of relationship between
>customer and registrar, by simply being a reseller of another
>registrar.
>
>You can draw all the analogies you want, the ICANN Accreditation
>agreements make this relationship between the three parties an
>absolutely unique one.
>
>Some companies are more willing to be overly loose in viewing their
>obligations to domain holders.

Hmmm. When this has been discussed to death in the past, it has often 
ended with someone from OpenSRS suggesting that if the reseller cares 
about this, he or she could set up a system that either records the 
end-user passwords, or inserts an intermediate system that allows only 
the reseller to know the true password.

So OpenSRS has actually encouraged some resellers to take full control of 
the domains (and many have done so; it allows you to provide much greater 
support to your end-users, especially if they are hosting customers) -- 
but they aren't directly offering this functionality themselves.

The only reason I can think of that OpenSRS would encourage resellers to 
do this, but refuse to offer it themselves due to policy reasons, is so 
that if something goes wrong (such as a domain hijack by an Evil 
Reseller), they can blame the reseller and say "Our system doesn't 
normally allow you to do that. The guy was stealing people's passwords! 
We're shocked -- shocked -- to find that anyone would do such a thing".

I understand the rationale, but it's basically just a cover-your-ass 
move. It allows OpenSRS to say they haven't provided a method to allow 
Evil Resellers to hijack a domain, even though there's actually nothing 
to prevent it from happening in the real world. (Surely if you actually 
are an Evil Reseller, you'll add the three lines of code that allows you 
to capture end-user passwords; it would take all of five minutes.)

The end result is that the honest resellers have to suffer (either by not 
being able to help customers as much as they'd like, or modifying the 
scripts to capture/manipulate passwords) so that OpenSRS can pretend the 
system is more secure.

I also have done stupid things to make lawyers happy; it's a hazard of 
this modern world, and I don't really blame OpenSRS. But when otherwise 
smart people such as William act as if this "let's pretend it's secure so 
we can't be blamed if it goes wrong" charade actually makes OpenSRS more 
secure than other registrars that support resellers...

>As a domain holder, I find that to be a reason NOT to do business with
>that registrar, and to recommend to people that they not register
>names with resellers of that registrar.

... I have to wonder what you're all smoking.

Evil OpenSRS resellers could trivially hijack a domain despite OpenSRS's 
policy not to give resellers full control. If it happened, OpenSRS (and 
other registrars involved if the domain was transferred away) would 
presumably restore the domain to the correct person and 
terminate/prosecute the Evil Reseller; it would be annoying and a 
scandal, but not the end of the world.

Thinking about it, the reseller system other registrars have (where the 
reseller can make any change to a domain) may actually be MORE secure 
than the OpenSRS system.

With OpenSRS, if an Evil Reseller captures the password and makes 
changes, OpenSRS has no way to tell that the end user didn't make that 
change. With the other registrars' systems, it's (at least theoretically) 
possible for the registrar to record that the change was made by the 
reseller, not the end-user. If the end-user later complains that his or 
her domain was stolen via reseller changes, there's an audit trail 
showing who did what, making it potentially easier to reverse the 
unauthorized changes.

--
Robert L Mathews, Tiger Technologies

Reply via email to