This is an old revision of the document!
OpenNIC Voting Rules & Currently Ongoing Votings
Proposing a TLDBEFORE you begin a proposal, you MUST meet the following requirements:
Additionally, you MUST meet the following requirements before proposing your TLD to the community:
OPTIONALLY: You may wish to informally request feedback from the community and experienced members before pushing your TLD proposal to a formal discussion. While not required, it can help you prepare for your TLD proposal by satisfying some requests the community has before official judging.
After you have satisfied ALL of the above requirements, you may proceed to submit your TLD for formal discussion and a vote. Start a discussion by sending an email to the Mailing List, with the subject line: “[DISCUSSION] ‘.{TLD}’ Proposal” (replacing {TLD} with your namespace). This email MUST include the following:
NOTE: DO NOT send this email as a reply to another thread. You MUST start a discussion thread by sending a new message to discuss AT lists.opennicproject.org. After a minimum of 7 days following your discussion thread, you may begin a vote. A vote may be started by sending a new email (NOT a reply) to the Mailing List with the subject: “[VOTE] ‘.{TLD}’” The email MUST include the following:
|
Voting Thread FormattingFor the sake of clarity, formal Mailing List threads MUST begin with the following prefixes, depending on the content of the message:
Voting threads MUST include the following information:
They SHOULD also include the following:
Following the vote, the original author of the thread MUST summarize the results in a reply, signifying the vote has closed. The closing email SHOULD be sent as close as possible to the posted deadline, but never before. The closing email MUST include the following:
|
DNS Server Operator RequirementsTier 1 Operators (the DNS Administrators for each TLD) are expected to maintain some key components of the infrastructure. Failure to meet the following minimum requirements may result in the appointment of a temporary maintainer for your DNS space, removal of your Tier 1 server, or removal of your TLD from the OpenNIC namespace. All action subject to a community discussion and vote. Tier 1 Operators:
Tier 2 Operators (DNS Resolvers) are expected to maintain some minimum specifications for a long-term period of time to maintain stability. This section only applies to operators running public servers listed on servers.opennic.org. Tier 2 Operators:
|
OpenNIC Votings
Should OpenNIC add .epic as a new zone?
.epic is a new TLD proposal for OpenNIC. A link to the charter can be found here: https://epic.okashi.me/charter.html Voting ends at Tuesday, September 3, 2019, at 00:00 UTC. |
Should OpenNIC drop support for NameCoin
Due to numerous problems with support of NameCoin domains, along with their recent article blasting OpenNIC for supporting the .bit TLD, should we the members of OpenNIC continue to provide peering with the NameCoin group or resolve .bit domain names? -- Previous voting proposal from 2018-12-04 -- Over the past year .bit domains have started being used as malware hubs due to their anonymous nature. Since there is no way to contact the owner of those domains, it creates a backscatter effect and a number of people running public T2 servers have seen domains blacklisted, emails blocked, and shutdown notices from their providers. As an example I've recently been trying to track today why one of my domains was being blacklisted by malwarebytes, and was provided this link: https://www.hybrid-analysis.com/sample/9226d08158c1536dfa7c4f15bbed9fd6b0d6e59880eeaae2143e9025436123a0?environmentId=100 If you scroll down near the bottom to the memory forensics, you'll see a list of what I believe are DNS servers that this virus was using. I also recognize several other entries in there, including some from .fur. We know that spamhaus is also blocking IP addresses based on resolving certain .bit domains, and there is no telling how many others may also be blocking based on this sort of information. The one common thing about all of these malware scanners is that none of them have the courtesy to so much as send an email to abuse@domain to let you know that a problem was detected (one of my own pet peeves, that they claim to be trying to protect the internet but don't give the victims a chance to fix the problems). We've already seen plenty of malware spread across .bit domains, but there is one other possible scenario to consider... What if law enforcement were to take up the same stance as the malware scanners? There is the possibility of child pornography also being spread across .bit domains, and since the owners of that content cannot be found it could come back to us (opennic) as the responsible party for making that content more easily available on the internet. I'm not saying this HAS happened, just that it is worth considering as a worst-case scenario. So I want to ask if anyone else feels a need to call a vote on dropping .bit specifically, and/or consider a resolution to not peer with groups which have no ability to hold a specific party responsible for the content of their domains. Yes Opennic is supposed to be an open platform, but keep in mind that by providing .bit domains we are directly responsible for the creation of a whole new class of malware. |