In the past few years, the issue of registry continuity has been carefully considered in the gTLD and ccTLD spaces. Various organizations have carried out risk analyses and developed business continuity plans to deal with those risks, should they materialize.
One of the solutions considered and used, especially in the gTLD space, is Registry Data Escrow as a way to ensure the continuity of registry services in the extreme case of registry failure.
So far, almost every registry that uses Registry Data Escrow has its own specification. It is anticipated that more registries will be implementing escrow, especially with an increasing number of domain registries coming into service, adding complexity to this issue.
It would seem beneficial to have a standardized specification for Registry Data Escrow that can be used by any registry to submit its deposits.
While the domain name industry has been the main target for this specification, it has been designed to be as general as possible.
Specifications covering the objects used by registration organizations shall identify the format and contents of the deposits a registry has to make, such that a different registry would be able to rebuild the registration services of the former, without its help, in a timely manner and with minimum disruption to its users.
Since the details of the registration services provided vary from registry to registry, specifications covering the objects used by registration organizations shall provide mechanisms that allow extensibility to accommodate variations and extensions of the registration services.
Given the requirement for confidentiality and the importance of accuracy of the information that is handled in order to offer registration services, parties using this specification shall define confidentiality and integrity mechanisms for handling the registration data.
Specifications covering the objects used by registration organizations shall not include in the specification transient objects that can be recreated by the new registry, particularly those of delicate confidentiality, e.g., DNSSEC KSK/ZSK (Key Signing Key / Zone Signing Key) private keys.
Details that are a matter of policy should be identified as such for the benefit of the implementers.
Non-technical issues concerning data escrow, such as whether to escrow data and for what purposes the data may be used, are outside the scope of this document.
Parties using this specification shall use a signaling mechanism to control the transmission, reception, and validation of data escrow deposits. The definition of such a signaling mechanism is outside the scope of this document.