The project will select up to 13 ccTLD operators to participate in the DNSSEC Roadshows Project. However, please note that the application window for the initial seven slots, which were available for ICANN fiscal year 2024 (July 2023 - June 2024), is now closed.
Selected ccTLD operators will receive technical training and support for DNSSEC deployment and validation. They will also be invited to co-host a training session for Internet Service Providers and network operators in their respective countries to build awareness and understanding of the importance of the DNSSEC.
Eligibility
African ccTLD operators interested in DNSSEC deployment and validation and in promoting DNSSEC adoption in their respective countries.
Requirements
- ccTLD operator has an up to date documentation of the current ccTLD infrastructure (e.g., registry model, network architecture, zone distribution flow, protocols in use, etc.) which can be shared with the assigned DNSSEC roadshow consultant.
- ccTLD operator has a stable (properly working) DNS infrastructure (registry system and DNS service). Operators may go through the KINDNS platform to self-assess themselves and improve their operational practices before submitting their application. Alternatively, they can also run online tools such as Zonemaster and fix any issue detected.
- Confirmation of engagement and endorsement of the registry manager on the project implementation.
- Appointment of a project manager by the Registry for this project.
Additional Supporting Information - Optional
- Evidence on the existence of additional documentation such as operational policies, technical procedures (backup, monitoring, DRP, etc.), if available.
- Evidence of the technical team maturity in running DNS (training received, project delivered, etc.), if available.
- Description of the ccTLD engagement with the local community (registrars, ISPs, network operators, etc.).
- Any additional information to support your application.
This opportunity is available for ccTLDs that have not yet adopted DNSSEC, as well as for those looking to increase the uptake of DNSSEC at the second and third levels of domain names.