lsd0001

LSD0001: GNU Name System
Log | Files | Refs | README

commit 5fa428ac9ada2f4d32d709704d0562779f89691d
parent 7942bb6f71d0ad26458e23362337e5f9ee4fbc38
Author: Martin Schanzenbach <schanzen@gnunet.org>
Date:   Sat,  4 Dec 2021 09:55:29 +0100

title case, dns reference to top

Diffstat:
Mdraft-schanzen-gns.xml | 13+++++++------
1 file changed, 7 insertions(+), 6 deletions(-)

diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml @@ -97,8 +97,9 @@ <section anchor="introduction" numbered="true" toc="default"> <name>Introduction</name> <t> - The Domain Name System (DNS) is a unique distributed database and a vital - service for most Internet applications. While DNS is distributed, it + The Domain Name System (DNS) <xref target="RFC1035" /> is a unique + distributed database and a vital service for most Internet applications. + While DNS is distributed, it relies on centralized, trusted registrars to provide globally unique names. As the awareness of the central role DNS plays on the Internet rises, various institutions are using their power (including legal means) @@ -1329,7 +1330,7 @@ q := SHA512 (HDKD-Public(zk, label)) </li> </ol> <section anchor="delegation_processing" numbered="true" toc="default"> - <name>Encountering zone delegation records</name> + <name>Encountering Zone Delegation Records</name> <t> When the resolver encounters a record of a supported zone delegation record type (such as PKEY or EDKEY) @@ -1894,7 +1895,7 @@ example.com = zk2 </t> </section> <section anchor="security_abuse" numbered="true" toc="default"> - <name>Abuse mitigation</name> + <name>Abuse Mitigation</name> <t> GNS names are UTF-8 strings. Consequently, GNS faces similar issues with respect to name spoofing as DNS does for internationalized @@ -1914,7 +1915,7 @@ example.com = zk2 </t> </section> <section anchor="security_keymanagement" numbered="true" toc="default"> - <name>Zone management</name> + <name>Zone Management</name> <t> In GNS, zone administrators need to manage and protect their zone keys. Once a zone key is lost it cannot be recovered. Once it is @@ -1939,7 +1940,7 @@ example.com = zk2 </t> </section> <section anchor="security_dht" numbered="true" toc="default"> - <name>Impact of underlying DHT</name> + <name>Impact of underlying DHTs</name> <t> This document does not specifiy the properties of the underlying distributed hash table (DHT) which is required by any GNS