Applicant Information
| Full Legal Name: |
Tucows.com Co |
| Doing Business As: |
Tucows Registry Services |
| Business URL: |
https://www.tucowsregistry.com/ |
| Primary Business Phone: |
+1 800 371-6992 |
| Primary Business Email: |
ry-services@tucows.com |
| Country Code of Location: |
CA |
| Application Type |
PROXY |
| Application Status |
Cleared |
| Technical Screening Status |
Cleared |
| RST Status |
Cleared |
PROXY.1.1.Third-Party Certificate
Does or will this RSP have a publicly verifiable, 3rd party certification (e.g. ISO 27001) held directly by the organization and relevant to the registry services under application?
Response
Yes
PROXY.1.3.Physical Access Controls
Does or will this RSP have processes and controls to manage physical access to infrastructure and systems, including building access controls, security cameras and/or other sensors, physical environmental monitoring and safety equipment, and alarm systems related to the physical infrastructure?
Response
Yes
PROXY.1.4.System Access Controls
Does or will this RSP have processes and controls to manage non-physical access to infrastructure, including network access from both internal systems and external Internet systems, intrusion detection systems, security information and event management systems, network firewalls, network segmentation and isolation, user identification and authentication, and authorization schemes?
Response
Yes
PROXY.1.5.Vendor Management
Does or will this RSP have processes and controls pertaining to the selection of vendors and equipment suppliers, management and maintenance of assets while in use, procurement of assets, and safe disposal of assets?
Response
Yes
PROXY.1.6.Cryptographic Material
Does or will this RSP routinely renew and keep safe all cryptographic material necessary for the operation of the RSP?
Response
Yes
PROXY.1.7.Secure Data At-Rest
Does or will this RSP secure (e.g. encryption, tamper detection, etc…) at-rest data relevant to the operation of the RSP, including but not limited to DNSSEC if applicable?
Response
Yes
PROXY.1.8.Secure Data In-Transit
Does or will this RSP secure (e.g. encryption, tamper detection, etc…) in-transit data relevant to the operation of the RSP, including but not limited to DNSSEC if applicable?
Response
Yes
PROXY.1.9.Virtualization Controls
If applicable, does or will this RSP have security controls for data in virtualized environments, including controls relevant to both on-premises or private virtualization environments as well as public clouds, network isolation, memory isolation, process isolation, and hypervisor access controls?
Response
Yes
PROXY.1.10.CISO
Does or will this RSP have a senior executive primarily in charge of and responsible for security?
Response
Yes
PROXY.1.12.Background Checks
Does or will this RSP conduct background checks, both initial and on-going, of personnel and vendors relevant to the registry services under application?
Response
Yes
PROXY.1.14.BCP 38
Does or will this RSP implement BCP 38?
Response
Yes
PROXY.1.15.Secure Routing
Does or will this RSP implement routing security of some nature, such as automated route filters, RPKI route origin validation, or other operational practices defined by the Internet Society and Global Cyber Alliance’s Mutually Agreed Norms for Routing Security (MANRS)?
Response
Yes
PROXY.2.2.Standard Hardware Maintenance
Does or will this RSP have documented, regular, and active practices for the maintenance of hardware relevant to the registry services under application?
Response
Yes
PROXY.2.3.Standard Software Maintenance
Does or will this RSP have documented, regular, and active practices for the maintenance, upgrading, and patching of software relevant to the registry services under application?
Response
Yes
PROXY.2.4.Standard Hardware Lifecycle
Does or will this RSP have documented, regular, and active practices for the lifecycle of hardware relevant to the registry services under application?
Response
Yes
PROXY.2.5.Secure Software Development
Does or will this RSP have documented, regular, and active practices for the secure development of software?
Response
Yes
PROXY.2.6.Hardware Maintenance Contingency
Does or will this RSP have documented contingency plans for extraordinary scenarios regarding the maintenance of hardware relevant to the registry services under application?
Response
Yes
PROXY.2.7.Software Maintenance Contingency
Does or will this RSP have documented contingency plans for extraordinary scenarios regarding the maintenance, upgrading, and patching of software relevant to the registry services under application?
Response
Yes
PROXY.2.8.Hardware Lifecycle Contingency
Does or will this RSP have documented contingency plans for extraordinary scenarios regarding the lifecycle of hardware relevant to the registry services under application?
Response
Yes
PROXY.2.9.Software Development Contingency
Does or will this RSP have documented contingency plans for extraordinary scenarios regarding the development of software?
Response
Yes
PROXY.2.10.IaC
Does or will this RSP use Infrastructure-as-Code (IaC) to manage all systems relevant to operation of the registry services under application?
Response
Yes
PROXY.2.11.Automated Orchestration
Does or will this RSP use automated orchestration to manage all systems relevant to the operation of the registry services under application?
Response
Yes
PROXY.3.3.Tier III Data Center
Does or will this RSP have at least two Tier III (as defined here: https://uptimeinstitute.com/tiers) or equivalent data centers having no inter-dependencies?
Response
Yes
Attachments
PROXY.4.1.RFC 5730
Does or will this RSP implement RFC 5730 (“Extensible Provisioning Protocol (EPP)”)?
Response
Yes
PROXY.4.2.RFC 5731
Does or will this RSP implement RFC 5731 (“Extensible Provisioning Protocol (EPP) Domain Name Mapping”)?
Response
Yes
PROXY.4.3.RFC 5734
Does or will this RSP implement RFC 5734 (“Extensible Provisioning Protocol (EPP) Transport over TCP”)?
Response
Yes
PROXY.4.4.RFC 5910
Does or will this RSP implement RFC 5910 (“Domain Name System (DNS) Security Extensions Mapping for the Extensible Provisioning Protocol (EPP)”)?
Response
Yes
PROXY.4.5.RFC 5732
If applicable, does or will this RSP implement RFC 5732 (“Extensible Provisioning Protocol (EPP) Host Mapping”)?
Response
Yes
PROXY.4.6.RFC 5733
If applicable, does or will this RSP implement RFC 5733 (“Extensible Provisioning Protocol (EPP) Contact Mapping”)?
Response
Yes
PROXY.4.7.RFC 8334
If applicable, does or will this RSP implement RFC 8334 (“Launch Phase Mapping for the Extensible Provisioning Protocol (EPP)”)?
Response
Yes
PROXY.4.8.RFC 8334 Mechanisms
If RFC 8334 (“Launch Phase Mapping for the Extensible Provisioning Protocol (EPP)”) is not applicable to this RSP, describe the mechanism to support sunrise and claims in EPP. Please answer with “Not Applicable” or “N/A” if this RSP does or will implement RFC 8334.
Response
Not Applicable
PROXY.4.9.RFC 8748
If applicable, does or will this RSP implement RFC 8748 (“Registry Fee Extension for the Extensible Provisioning Protocol (EPP)”)?
Response
Yes
PROXY.4.10.EPP Extensions
Provide a list of all EPP extensions to be used that are registered in the IANA EPP extensions registry, and an attestation that all EPP extensions to be used are registered with the IANA as per RFC 7451 (“Extension Registry for the Extensible Provisioning Protocol”).
Response
TRS SRS supports the following IANA-registered EPP extensions: urn:ietf:params:xml:ns:secDNS-1.1 (RFC 5910), urn:ietf:params:xml:ns:idn-1.0, urn:ietf:params:xml:ns:rgp-1.0 (RFC 3915), urn:ietf:params:xml:ns:launch-1.0 (RFC 8334), and urn:ietf:params:xml:ns:fee-1.0 (RFC 8748). All extensions deployed are verified against the IANA EPP Extension Registry at https://www.iana.org/assignments/epp-extensions/epp-extensions.xhtml prior to production use. TRS configures EPP extensions per registry policy and only activates extensions that meet both IANA registration requirements and client operational needs.
PROXY.4.11.Unregistered EPP Extensions
Does or will this RSP forgo the use of any EPP extensions which are not registered with the IANA as per RFC 7451 (“Extension Registry for the Extensible Provisioning Protocol”)?
Response
Yes
PROXY.4.12.EPP Performance
Does or will this RSP implement and operate EPP according to the performance requirements defined in the standards established in Specification 10 of the ICANN Registry Agreement (version)?
Response
Yes
PROXY.4.13.EPP Equal Access
Does or will this RSP have controls to prevent EPP misuse and ensure all registrars have fair and equal access to EPP per the standards established in Specification 9 of the ICANN Registry Agreement (version 2024)?
Response
Yes
PROXY.4.15.EPP 9325
Does or will this RSP implement RFC 9325 (“Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)”) notwithstanding RFC 5734 (“Extensible Provisioning Protocol (EPP) Transport over TCP”)?
Response
Yes
PROXY.4.16.EPP Cryptographic Material Renewal
Does or will this RSP regularly and frequently renew the cryptographic material used to secure EPP communications in accordance with industry best common practices?
Response
Yes
PROXY.4.17.EPP Cryptographic Material Handling
Does or will this RSP keep safe the cryptographic material used to secure EPP communication in accordance with industry best common practices?
Response
Yes
PROXY.4.18.EPP Reporting
Does or will this RSP the standards established in Specification 3 of the ICANN Registry Agreement (version 2024) with respect to EPP?
Response
Yes
PROXY.4.19.EPP Virtualization
Does or will this RSP compartmentalize (e.g. virtualization) the EPP service in such a manner that each compartment (e.g. containers, virtual machines, physical machines) is dedicated to EPP (excluding system services such as monitoring, remote access and NTP)?
Response
Yes
PROXY.5.1.RFC 7480
Does or will this RSP implement RFC 7480 (“HTTP Usage in the Registration Data Access Protocol (RDAP)”)?
Response
Yes
PROXY.5.2.RFC 7481
Does or will this RSP implement RFC 7481 (“Security Services for the Registration Data Access Protocol (RDAP)”)?
Response
Yes
PROXY.5.3.RFC 9082
Does or will this RSP implement RFC 9082 (“Registration Data Access Protocol (RDAP) Query Format”)?
Response
Yes
PROXY.5.4.RFC 9083
Does or will this RSP implement RFC 9083 (“JSON Responses for the Registration Data Access Protocol (RDAP)”)?
Response
Yes
PROXY.5.5.RDAP Technical Implementation Guide
Does or will this RSP implement the ICANN gTLD RDAP Technical Implementation Guide?
Response
Yes
PROXY.5.6.RDAP Response Profile
Does or will this RSP implement the ICANN gTLD RDAP Response Profile?
Response
Yes
PROXY.5.7.RDAP Extensions
Provide a list of all RDAP extensions to be used.
Response
TRS SRS implements RDAP extensions in compliance with the February 2024 gTLD RDAP Profile specification. We support the following extensions: icann_rdap_technical_implementation_guide_1 (ICANN gTLD RDAP Technical Implementation Guide version 1 per the February 2024 profile), icann_rdap_response_profile_1 (February 2024 gTLD RDAP Response Profile version 1), and redacted (RFC 9537 for contact information redaction as required by the profile).
TRS maintains active monitoring of ICANN specification updates and implements changes to remain compliant with current requirements. Our RDAP implementation is updated in coordination with registry change management procedures to ensure continuity of service during transitions to new profile versions.
PROXY.5.8.Unregistered RDAP Extensions
Does or will this RSP forgo the use of any RDAP extensions which are not registered with the IANA as per RFC 7480 (“HTTP Usage in the Registration Data Access Protocol (RDAP)”)?
Response
Yes
PROXY.5.9.RDAP Performance
Does or will this RSP meet the standards established in the Service Level Agreements defined in Specification 10 of the ICANN Registry Agreement (version 2024) with regard to RDAP?
Response
Yes
PROXY.5.10.RDAP Data Mining
Does or will this RSP implement methods to prevent mining of registration data via RDAP?
Response
Yes
PROXY.5.11.RFC 9325
Does or will this RSP implement RFC 9325 (“Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)”) with respect to RDAP?
Response
Yes
PROXY.5.12.RFC Cryptographic Material Renewal
Does or will this RSP regularly and frequently renew the cryptographic material used to secure RDAP communications in accordance with industry best common practices?
Response
Yes
PROXY.5.13.RFC Cryptographic Material Handling
Does or will this RSP keep safe the cryptographic material used to secure RDAP communication in accordance with industry best common practices?
Response
Yes
PROXY.5.14.RDAP Reporting
Does or will this RSP meet the standards established in Specification 3 of the ICANN Registry Agreement (version 2024) with respect to RDAP?
Response
Yes
PROXY.5.15.RDAP Virtualization
Does or will this RSP compartmentalize (e.g. virtualization) the RDAP service in such a manner that each compartment (e.g. containers, virtual machines, physical machines) is dedicated to RDAP (excluding system services such as monitoring, remote access and NTP)?
Response
Yes
PROXY.6.3.IPv4 RDAP
Does or will this RSP meet the standards established in Specification 10 of the ICANN Registry Agreement (version 2024) with regard to RDAP and IPv4?
Response
Yes
PROXY.6.4.IPv4 EPP
Does or will this RSP meet the standards established in Specification 10 of the ICANN Registry Agreement (version 2024) with regard to EPP and IPv4?
Response
Yes
PROXY.6.5.IPv6 RDAP
Does or will this RSP meet the standards established in Specification 10 of the ICANN Registry Agreement (version 2024) with regard to RDAP and IPv6?
Response
Yes
PROXY.6.6.IPv6 EPP
Will this RSP meet the standards established in Specification 10 of the ICANN Registry Agreement (version 2024) with regard to EPP and IPv6 if requested by a registrar?
Response
Yes
PROXY.7.1.Registration Lifecycle
Describe all potential registration lifecycle(s) of domain names supported in the system.
Response
TRS SRS natively implements the full Registry Grace Period (RGP) lifecycle as defined in RFC 3915, while remaining flexible to support any additional or alternative lifecycle models that a registry may require. The attached "DomainNameLifecycle" file is a diagram that we use to capture parameters and design the domain lifecycle that will be applied to a specific registry instance.
1. Standard EPP Lifecycle
• Create – New domain registration is provisioned.
• Renew – Registration period is extended.
• Transfer – Registration is moved between registrars following EPP transfer flow.
• Delete – Domain is removed from the active zone upon expiration or explicit delete command.
The attached RFC-3915 state diagram file is an excerpt that illustrates how TRS SRS manages its statuses to implement the baseline RGP domain lifecycle.
2. Registry Grace Period (RGP) Phases (RFC 3915)
• Add Grace Period – Immediately after Create, allowing free cancellations.
• Renew Grace Period – Immediately after Renew, allowing free renewal reversals.
• Transfer Grace Period – Immediately after Transfer, allowing transfer rejections.
• Redemption Grace Period – Follows Delete, during which a domain may be restored (“Pending Restore”).
• Pending Delete – After Redemption expires, domain enters a brief non-recoverable purge window before final removal.
3. Autorenew and AutoDelete
• Auto-Renew – At expiration, domains may be automatically renewed and billed per policy.
• Auto-Delete – Domains that reach end of Pending Delete are purged without manual intervention.
4. URS and Other Suspension Flows
• Uniform Rapid Suspension (URS) – Special suspension lifecycle for clear-cut abusive registrations, marking domains as Held and prohibited per policy.
• Optional Suspension or Quarantine – Registries may define custom suspension lifecycles for compliance or dispute resolution.
5. Custom or Registry-Specific Lifecycles
TRS SRS can be configured to support additional grace periods, client-types of suspensions, phased launches (e.g., Sunrise and Landrush), or other bespoke lifecycles required by national or brand-TLD policies. All such variants plug into the same underlying EPP-state machine and database schema.
By building on the standardized RGP model from RFC 3915 and offering a modular grace-period engine alongside fully configurable lifecycle hooks, TRS SRS ensures that every registry’s required domain-name lifecycles can be accurately enforced and transparently audited.
Attachments
PROXY.7.2.Domain Registration Values
Describe the registration lifecycle(s) of domain names with respect to EPP status values and RDAP status values.
Response
Domain registrations progress through well-defined lifecycle states, each reflected in both EPP status values and corresponding RDAP status labels per RFC 8056:
Initial Registration: EPP pendingCreate during processing, then ok; RDAP pending create, then active.
Normal Operation: EPP ok; RDAP active.
Updates: EPP clientUpdateProhibited or serverUpdateProhibited when locked, reverting to ok when released; RDAP client update prohibited or server update prohibited, then active.
Transfer: EPP pendingTransfer while in progress, then clientTransferProhibited/serverTransferProhibited if locked, finally ok; RDAP pending transfer, client transfer prohibited/server transfer prohibited, then active.
Grace Periods/Redemption (RGP): EPP pendingRenew (renew grace), pendingDelete (after deletion), pendingRestore (redemption), with required prohibitions until restore completes; RDAP pending renew, pending delete, pending restore with corresponding prohibited flags.
Expiration/Deletion: EPP pendingDelete during purge, then serverDeleteProhibited until removal; RDAP pending delete, server delete prohibited.
Suspension (Abuse/URS): EPP clientHold/serverHold combined with update/transfer/delete prohibitions; RDAP client hold/server hold plus corresponding prohibited flags.
Final Removal: Object removed from registry (no EPP status); RDAP returns HTTP 404 not found.
All EPP statuses enforce permitted/prohibited operations; RDAP mirrors these in its status array per RFC 8056 ensuring clients see identical lifecycle state via either protocol.
PROXY.7.3.Nameserver Registration Values
Describe the nameserver host lifecycle, including relevance to EPP and RDAP status values, with respect to the lifecycle of domain names. This should include a description of nameservers as either attributes of domains or as host objects.
Response
Host (nameserver) objects follow a simplified lifecycle with EPP status values and corresponding RDAP status labels per RFC 8056:
Creation and Active Use: EPP ok when created; RDAP active.
Updates: EPP clientUpdateProhibited or serverUpdateProhibited when locked, preventing changes until released; RDAP client update prohibited or server update prohibited. Updates propagate to DNS zones on next publish.
Deletion: Hosts can only be deleted when not referenced by any active domain. EPP clientDeleteProhibited or serverDeleteProhibited can prevent deletion; RDAP client delete prohibited or server delete prohibited.
Transfer Restriction: Host objects are not transferable independently per RFC 5732; they may only transfer as part of their superordinate domain transfer.
Throughout all stages, EPP statuses enforce permitted/prohibited operations and RDAP mirrors these in its status array per RFC 8056, ensuring consistent visibility across protocols.
Regarding parent domain deletion and orphan hosts: TRS default configuration prevents deletion of domains with subordinate host objects. When a registrar attempts to delete a domain with subordinate hosts, the operation fails with EPP result code 2305 ("Object association prohibits operation") per RFC 5731 § 3.2.2. TRS works with registrars to orderly eliminate any conflicting objects to allow domain deletion. This includes identifying domains using the subordinate hosts as nameservers and facilitating migration to alternative nameservers before host deletion can proceed. This approach prevents orphaned host scenarios and maintains DNS resolution stability for all affected domains.
TRS is actively working on safe automated approaches to address this use case supported by a wide risk-based approach. This includes following https://datatracker.ietf.org/doc/rfc9874/
PROXY.7.4.Contact Registration Values
If applicable, describe the contact lifecycle, including relevance to EPP and RDAP status values, with respect to the lifecycle of domain names and nameservers. Include a description of the deletion of orphaned contacts.
Response
Contact objects follow a reference-driven lifecycle with EPP status values and corresponding RDAP status labels per RFC 8056:
Creation and Active Use: EPP ok when created and referenced by domains or other objects; RDAP active.
Updates and Locks: EPP clientUpdateProhibited or serverUpdateProhibited applied during disputes or investigations, preventing changes until resolved; RDAP client update prohibited or server update prohibited.
Transfers Between Registrars: EPP pendingTransfer during transfer process, then ok upon completion; RDAP pending transfer, then active.
Additional Protections: EPP clientUpdateProhibited/serverUpdateProhibited, clientDeleteProhibited/serverDeleteProhibited, or clientTransferProhibited/serverTransferProhibited can be applied to prevent specific operations; RDAP client update prohibited/server update prohibited, client delete prohibited/server delete prohibited, or client transfer prohibited/server transfer prohibited.
Orphaned Contacts: When a contact is no longer referenced by any domain, host, or other registry object, it enters an orphaned state. Orphaned contacts remain accessible to the sponsoring registrar for potential reuse, facilitating operational efficiency. After a configurable retention period defined by registry policy—with TRS recommending a 30-day baseline—unreferenced contacts are automatically purged from the SRS (Shared Registry System). This approach balances registrar operational needs with database hygiene and privacy considerations per GDPR Article 5(1)(e) and similar data minimization principles.
Throughout all stages, EPP statuses enforce permitted and prohibited operations while RDAP mirrors these in its status array per RFC 8056, ensuring consistent visibility across protocols. The RDAP redacted extension (RFC 9537) applies when contact data is suppressed under policy.
PROXY.7.5.Orphaned Glue
Does or will this RSP be capable of removing orphaned glue in accordance with the standards established in Specification 6 of the ICANN Registry Agreement (version 2024)?
Response
Yes
PROXY.7.7.Data Escrow
Describe how this RSP will meet the standards established in Specification 2 of the ICANN Registry Agreement (version 2024), and describe any other data escrow processes. This includes escrow extensions for data related additional registry services.
Response
To satisfy Specification 2’s escrow requirements, TRS will partner with any ICANN-accredited Data Escrow Agent that supports the Registry Data Escrow (RyDE) format. At the prescribed cadence (at minimum daily), TRS SRS will generate RyDE‐compliant deposit files containing the full registry data set—domains, hosts, contacts, history objects, and billing records—and deliver them via secure channels (SFTP or HTTPS) to the agent. Each deposit includes a manifest and cryptographic checksum to guarantee completeness and integrity. TRS SRS only generates full deposits as we believe this is the most robust option for recovering a failed registry.
In addition to the standard RyDE deposits, TRS maintains its own redundant, off-site archives of every escrow file. These archives are stored fully encrypted under FIPS-approved algorithms in geographically separated data centers. Should the primary escrow agent or any archive location become unavailable, we can immediately recover any deposit from our secondary vaults.
TRS SRS also supports uploading deposits to multiple DEAs, or multiple stakeholders, to align with environments with more strict risk avoidance criteria.
All escrow processes are fully audited and monitored. Automated alerts notify operations and compliance teams if any deposit fails or manifests a checksum mismatch. Periodic restore drills validate that both RyDE deposits and our internal archives can be reconstituted into a working SRS environment within the recovery-time and recovery-point objectives mandated by Specification 2. Continuous review of RyDE standards ensures that TRS remains compatible with any future escrow format enhancements.
PROXY.8.1.Registry Continuity Exercise
Does or will this RSP regularly exercise registry continuity actions?
Response
Yes
PROXY.9.1.Internal Monitoring
Does or will this RSP monitor for faults inside its own network?
Response
Yes
PROXY.9.2.External Monitoring
Does or will this RSP monitor for faults from a point outside any of its own networks?
Response
Yes
PROXY.9.3.Fault Triage
Does or will this RSP have documented processes for aggregation and triage of faults?
Response
Yes
PROXY.9.4.Fault Mitigation
Does or will this RSP have documented processes to mitigate faults once detected?
Response
Yes
PROXY.9.5.Fault Minimization
Does or will this RSP have processes to minimize faults during maintenance of systems, including both automated processes and manual change control processes?
Response
Yes
PROXY.9.6.On-call Staff
Does or will this RSP have personnel capable of reacting to and mitigating faults 24 hours per day of every day of every year of service?
Response
Yes
PROXY.9.7.Service Disruptions
Provide documentation regarding any RSP functions currently being served for any gTLD, the domain names of the gTLDs, and all service disruptions for each gTLD in the past six months, where a service disruption is defined by Specification 10 of the Registry Agreement (version 2024).
Response
We provide registry services including RDAP/RDDS, EPP, DNS, DNSSEC, RyDE, BRDA, reporting and all ancilliary services to the following gTLDs. There have been no outages on services under our responsibility during the requested period. TRS does not track failure statistics prior to the engagement of our services so we cannot make representations on recently onboarded registries.
* bar
* blockbuster
* click
* cloud
* coop
* country
* creditunion
* data
* dish
* diy
* dot
* dtv
* dvr
* feedback
* food
* forum
* gift
* hiphop
* hiv
* juegos
* latino
* lifestyle
* link
* living
* locker
* love
* mobile
* music
* observer
* ollo
* ott
* phone
* pid
* property
* realty
* rest
* sexy
* sling
* trust
* vana