commit 6516229db4b593de20eb0558e93a22fd8b0f504f
parent d976a9e2585e241e335a8a3dde59b867a12ed168
Author: Christian Grothoff <christian@grothoff.org>
Date: Sat, 1 Jul 2023 00:33:39 +0200
fix English
Diffstat:
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml
@@ -2547,7 +2547,7 @@ NICK: john (supplemental)
<t>
In terms of crypto-agility, whenever the need for an updated cryptographic
scheme arises to, for example, replace ECDSA over Ed25519 for
- PKEY records it can simply be introduced
+ PKEY records, it can simply be introduced
through a new record type.
Zone administrators can then replace
the delegation record type for future records.
@@ -2603,7 +2603,7 @@ NICK: john (supplemental)
of the last published resource block. Implementations <bcp14>MAY</bcp14> define
and use a special record type as a tombstone that preserves the last
absolute expiration time, but then <bcp14>MUST</bcp14> take care to not publish a
- block with this record.
+ block with such a tombstone record.
When new records are added under this label later, the implementation
<bcp14>MUST</bcp14> ensure that the expiration times are after the last published
block.
@@ -2625,7 +2625,7 @@ NICK: john (supplemental)
incorporate rules in order to mitigate it.
</t>
<t>
- Further, DNS can be used to combat illegal content on the internet
+ Further, DNS can be used to combat illegal content on the Internet
by having the respective domains seized by authorities.
However, the same mechanisms can also be abused in order to impose
state censorship.