aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSchanzenbach, Martin <mschanzenbach@posteo.de>2019-10-05 12:43:57 +0200
committerSchanzenbach, Martin <mschanzenbach@posteo.de>2019-10-05 12:43:57 +0200
commit050c36f8b667809ebc282b2a718e3322d128ec6b (patch)
tree779ebdc5a2cbd232157ca444bf5b4583c6d71ede
parent4157862beeb82b13919eb29fdcae79c43ba926a0 (diff)
downloadlsd0001-050c36f8b667809ebc282b2a718e3322d128ec6b.tar.gz
lsd0001-050c36f8b667809ebc282b2a718e3322d128ec6b.zip
update punycode refs
-rw-r--r--draft-schanzen-gns.html8
-rw-r--r--draft-schanzen-gns.txt12
-rw-r--r--draft-schanzen-gns.xml4
3 files changed, 12 insertions, 12 deletions
diff --git a/draft-schanzen-gns.html b/draft-schanzen-gns.html
index 3b5b8cc..ed0302e 100644
--- a/draft-schanzen-gns.html
+++ b/draft-schanzen-gns.html
@@ -1451,7 +1451,7 @@ async function addMetadata(){try{const e=document.styleSheets[0].cssRules;for(le
1451<p id="section-3.3-3"> 1451<p id="section-3.3-3">
1452 NOTE: If an application uses a LEHO value in an HTTP request header 1452 NOTE: If an application uses a LEHO value in an HTTP request header
1453 (e.g. "Host:" header) it must be converted to a punycode representation 1453 (e.g. "Host:" header) it must be converted to a punycode representation
1454 <span>[<a href="#RFC3492" class="xref">RFC3492</a>]</span>.<a href="#section-3.3-3" class="pilcrow">¶</a></p> 1454 <span>[<a href="#RFC5891" class="xref">RFC5891</a>]</span>.<a href="#section-3.3-3" class="pilcrow">¶</a></p>
1455</section> 1455</section>
1456</div> 1456</div>
1457<div id="gnsrecords_nick"> 1457<div id="gnsrecords_nick">
@@ -2144,9 +2144,6 @@ async function addMetadata(){try{const e=document.styleSheets[0].cssRules;for(le
2144<dt id="RFC1035">[RFC1035]</dt> 2144<dt id="RFC1035">[RFC1035]</dt>
2145 <dd> 2145 <dd>
2146<span class="refAuthor">Mockapetris, P.</span>, <span class="refTitle">"Domain names - implementation and specification"</span>, <span class="seriesInfo">STD 13</span>, <span class="seriesInfo">RFC 1035</span>, <span class="seriesInfo">DOI 10.17487/RFC1035</span>, <time datetime="1987-11">November 1987</time>, <span>&lt;<a href="https://www.rfc-editor.org/info/rfc1035">https://www.rfc-editor.org/info/rfc1035</a>&gt;</span>. </dd> 2146<span class="refAuthor">Mockapetris, P.</span>, <span class="refTitle">"Domain names - implementation and specification"</span>, <span class="seriesInfo">STD 13</span>, <span class="seriesInfo">RFC 1035</span>, <span class="seriesInfo">DOI 10.17487/RFC1035</span>, <time datetime="1987-11">November 1987</time>, <span>&lt;<a href="https://www.rfc-editor.org/info/rfc1035">https://www.rfc-editor.org/info/rfc1035</a>&gt;</span>. </dd>
2147<dt id="RFC3492">[RFC3492]</dt>
2148 <dd>
2149<span class="refAuthor">Costello, A.</span>, <span class="refTitle">"Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA)"</span>, <span class="seriesInfo">RFC 3492</span>, <span class="seriesInfo">DOI 10.17487/RFC3492</span>, <time datetime="2003-03">March 2003</time>, <span>&lt;<a href="https://www.rfc-editor.org/info/rfc3492">https://www.rfc-editor.org/info/rfc3492</a>&gt;</span>. </dd>
2150<dt id="RFC3629">[RFC3629]</dt> 2147<dt id="RFC3629">[RFC3629]</dt>
2151 <dd> 2148 <dd>
2152<span class="refAuthor">Yergeau, F.</span>, <span class="refTitle">"UTF-8, a transformation format of ISO 10646"</span>, <span class="seriesInfo">STD 63</span>, <span class="seriesInfo">RFC 3629</span>, <span class="seriesInfo">DOI 10.17487/RFC3629</span>, <time datetime="2003-11">November 2003</time>, <span>&lt;<a href="https://www.rfc-editor.org/info/rfc3629">https://www.rfc-editor.org/info/rfc3629</a>&gt;</span>. </dd> 2149<span class="refAuthor">Yergeau, F.</span>, <span class="refTitle">"UTF-8, a transformation format of ISO 10646"</span>, <span class="seriesInfo">STD 63</span>, <span class="seriesInfo">RFC 3629</span>, <span class="seriesInfo">DOI 10.17487/RFC3629</span>, <time datetime="2003-11">November 2003</time>, <span>&lt;<a href="https://www.rfc-editor.org/info/rfc3629">https://www.rfc-editor.org/info/rfc3629</a>&gt;</span>. </dd>
@@ -2161,6 +2158,9 @@ async function addMetadata(){try{const e=document.styleSheets[0].cssRules;for(le
2161<dt id="RFC5890">[RFC5890]</dt> 2158<dt id="RFC5890">[RFC5890]</dt>
2162 <dd> 2159 <dd>
2163<span class="refAuthor">Klensin, J.</span>, <span class="refTitle">"Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework"</span>, <span class="seriesInfo">RFC 5890</span>, <span class="seriesInfo">DOI 10.17487/RFC5890</span>, <time datetime="2010-08">August 2010</time>, <span>&lt;<a href="https://www.rfc-editor.org/info/rfc5890">https://www.rfc-editor.org/info/rfc5890</a>&gt;</span>. </dd> 2160<span class="refAuthor">Klensin, J.</span>, <span class="refTitle">"Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework"</span>, <span class="seriesInfo">RFC 5890</span>, <span class="seriesInfo">DOI 10.17487/RFC5890</span>, <time datetime="2010-08">August 2010</time>, <span>&lt;<a href="https://www.rfc-editor.org/info/rfc5890">https://www.rfc-editor.org/info/rfc5890</a>&gt;</span>. </dd>
2161<dt id="RFC5891">[RFC5891]</dt>
2162 <dd>
2163<span class="refAuthor">Klensin, J.</span>, <span class="refTitle">"Internationalized Domain Names in Applications (IDNA): Protocol"</span>, <span class="seriesInfo">RFC 5891</span>, <span class="seriesInfo">DOI 10.17487/RFC5891</span>, <time datetime="2010-08">August 2010</time>, <span>&lt;<a href="https://www.rfc-editor.org/info/rfc5891">https://www.rfc-editor.org/info/rfc5891</a>&gt;</span>. </dd>
2164<dt id="RFC6895">[RFC6895]</dt> 2164<dt id="RFC6895">[RFC6895]</dt>
2165 <dd> 2165 <dd>
2166<span class="refAuthor">Eastlake 3rd, D.</span>, <span class="refTitle">"Domain Name System (DNS) IANA Considerations"</span>, <span class="seriesInfo">BCP 42</span>, <span class="seriesInfo">RFC 6895</span>, <span class="seriesInfo">DOI 10.17487/RFC6895</span>, <time datetime="2013-04">April 2013</time>, <span>&lt;<a href="https://www.rfc-editor.org/info/rfc6895">https://www.rfc-editor.org/info/rfc6895</a>&gt;</span>. </dd> 2166<span class="refAuthor">Eastlake 3rd, D.</span>, <span class="refTitle">"Domain Name System (DNS) IANA Considerations"</span>, <span class="seriesInfo">BCP 42</span>, <span class="seriesInfo">RFC 6895</span>, <span class="seriesInfo">DOI 10.17487/RFC6895</span>, <time datetime="2013-04">April 2013</time>, <span>&lt;<a href="https://www.rfc-editor.org/info/rfc6895">https://www.rfc-editor.org/info/rfc6895</a>&gt;</span>. </dd>
diff --git a/draft-schanzen-gns.txt b/draft-schanzen-gns.txt
index c6b7677..5a92bc1 100644
--- a/draft-schanzen-gns.txt
+++ b/draft-schanzen-gns.txt
@@ -350,7 +350,7 @@ Internet-Draft The GNU Name System July 2019
350 350
351 NOTE: If an application uses a LEHO value in an HTTP request header 351 NOTE: If an application uses a LEHO value in an HTTP request header
352 (e.g. "Host:" header) it must be converted to a punycode 352 (e.g. "Host:" header) it must be converted to a punycode
353 representation [RFC3492]. 353 representation [RFC5891].
354 354
3553.4. NICK 3553.4. NICK
356 356
@@ -978,11 +978,6 @@ Internet-Draft The GNU Name System July 2019
978 specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, 978 specification", STD 13, RFC 1035, DOI 10.17487/RFC1035,
979 November 1987, <https://www.rfc-editor.org/info/rfc1035>. 979 November 1987, <https://www.rfc-editor.org/info/rfc1035>.
980 980
981 [RFC3492] Costello, A., "Punycode: A Bootstring encoding of Unicode
982 for Internationalized Domain Names in Applications
983 (IDNA)", RFC 3492, DOI 10.17487/RFC3492, March 2003,
984 <https://www.rfc-editor.org/info/rfc3492>.
985
986 [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO 981 [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
987 10646", STD 63, RFC 3629, DOI 10.17487/RFC3629, November 982 10646", STD 63, RFC 3629, DOI 10.17487/RFC3629, November
988 2003, <https://www.rfc-editor.org/info/rfc3629>. 983 2003, <https://www.rfc-editor.org/info/rfc3629>.
@@ -1003,6 +998,11 @@ Internet-Draft The GNU Name System July 2019
1003 RFC 5890, DOI 10.17487/RFC5890, August 2010, 998 RFC 5890, DOI 10.17487/RFC5890, August 2010,
1004 <https://www.rfc-editor.org/info/rfc5890>. 999 <https://www.rfc-editor.org/info/rfc5890>.
1005 1000
1001 [RFC5891] Klensin, J., "Internationalized Domain Names in
1002 Applications (IDNA): Protocol", RFC 5891,
1003 DOI 10.17487/RFC5891, August 2010,
1004 <https://www.rfc-editor.org/info/rfc5891>.
1005
1006 1006
1007 1007
1008Schanzenbach, et al. Expires 24 January 2020 [Page 18] 1008Schanzenbach, et al. Expires 24 January 2020 [Page 18]
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml
index 2165422..8bcec1e 100644
--- a/draft-schanzen-gns.xml
+++ b/draft-schanzen-gns.xml
@@ -342,7 +342,7 @@
342 <t> 342 <t>
343 NOTE: If an application uses a LEHO value in an HTTP request header 343 NOTE: If an application uses a LEHO value in an HTTP request header
344 (e.g. "Host:" header) it must be converted to a punycode representation 344 (e.g. "Host:" header) it must be converted to a punycode representation
345 <xref target="RFC3492" />. 345 <xref target="RFC5891" />.
346 </t> 346 </t>
347 </section> 347 </section>
348 <section anchor="gnsrecords_nick" numbered="true" toc="default"> 348 <section anchor="gnsrecords_nick" numbered="true" toc="default">
@@ -977,10 +977,10 @@
977 <back> 977 <back>
978 <references> 978 <references>
979 <name>Normative References</name> 979 <name>Normative References</name>
980 <reference anchor="RFC3492" target="https://www.rfc-editor.org/info/rfc3492"><front><title>Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA)</title><author initials="A." surname="Costello" fullname="A. Costello"><organization/></author><date year="2003" month="March"/><abstract><t>Punycode is a simple and efficient transfer encoding syntax designed for use with Internationalized Domain Names in Applications (IDNA). It uniquely and reversibly transforms a Unicode string into an ASCII string. ASCII characters in the Unicode string are represented literally, and non-ASCII characters are represented by ASCII characters that are allowed in host name labels (letters, digits, and hyphens). This document defines a general algorithm called Bootstring that allows a string of basic code points to uniquely represent any string of code points drawn from a larger set. Punycode is an instance of Bootstring that uses particular parameter values specified by this document, appropriate for IDNA. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="3492"/><seriesInfo name="DOI" value="10.17487/RFC3492"/></reference>
981 <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748"><front><title>Elliptic Curves for Security</title><author initials="A." surname="Langley" fullname="A. Langley"><organization/></author><author initials="M." surname="Hamburg" fullname="M. Hamburg"><organization/></author><author initials="S." surname="Turner" fullname="S. Turner"><organization/></author><date year="2016" month="January"/><abstract><t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t></abstract></front><seriesInfo name="RFC" value="7748"/><seriesInfo name="DOI" value="10.17487/RFC7748"/></reference> 980 <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748"><front><title>Elliptic Curves for Security</title><author initials="A." surname="Langley" fullname="A. Langley"><organization/></author><author initials="M." surname="Hamburg" fullname="M. Hamburg"><organization/></author><author initials="S." surname="Turner" fullname="S. Turner"><organization/></author><date year="2016" month="January"/><abstract><t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t></abstract></front><seriesInfo name="RFC" value="7748"/><seriesInfo name="DOI" value="10.17487/RFC7748"/></reference>
982 <reference anchor="RFC3826" target="https://www.rfc-editor.org/info/rfc3826"><front><title>The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model</title><author initials="U." surname="Blumenthal" fullname="U. Blumenthal"><organization/></author><author initials="F." surname="Maino" fullname="F. Maino"><organization/></author><author initials="K." surname="McCloghrie" fullname="K. McCloghrie"><organization/></author><date year="2004" month="June"/><abstract><t>This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cipher FeedBack Mode (CFB), with a key size of 128 bits. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="3826"/><seriesInfo name="DOI" value="10.17487/RFC3826"/></reference> 981 <reference anchor="RFC3826" target="https://www.rfc-editor.org/info/rfc3826"><front><title>The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model</title><author initials="U." surname="Blumenthal" fullname="U. Blumenthal"><organization/></author><author initials="F." surname="Maino" fullname="F. Maino"><organization/></author><author initials="K." surname="McCloghrie" fullname="K. McCloghrie"><organization/></author><date year="2004" month="June"/><abstract><t>This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cipher FeedBack Mode (CFB), with a key size of 128 bits. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="3826"/><seriesInfo name="DOI" value="10.17487/RFC3826"/></reference>
983 <reference anchor="RFC5890" target="https://www.rfc-editor.org/info/rfc5890"><front><title>Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework</title><author initials="J." surname="Klensin" fullname="J. Klensin"><organization/></author><date year="2010" month="August"/><abstract><t>This document is one of a collection that, together, describe the protocol and usage context for a revision of Internationalized Domain Names for Applications (IDNA), superseding the earlier version. It describes the document collection and provides definitions and other material that are common to the set. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5890"/><seriesInfo name="DOI" value="10.17487/RFC5890"/></reference> 982 <reference anchor="RFC5890" target="https://www.rfc-editor.org/info/rfc5890"><front><title>Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework</title><author initials="J." surname="Klensin" fullname="J. Klensin"><organization/></author><date year="2010" month="August"/><abstract><t>This document is one of a collection that, together, describe the protocol and usage context for a revision of Internationalized Domain Names for Applications (IDNA), superseding the earlier version. It describes the document collection and provides definitions and other material that are common to the set. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5890"/><seriesInfo name="DOI" value="10.17487/RFC5890"/></reference>
983 <reference anchor="RFC5891" target="https://www.rfc-editor.org/info/rfc5891"><front><title>Internationalized Domain Names in Applications (IDNA): Protocol</title><author initials="J." surname="Klensin" fullname="J. Klensin"><organization/></author><date year="2010" month="August"/><abstract><t>This document is the revised protocol definition for Internationalized Domain Names (IDNs). The rationale for changes, the relationship to the older specification, and important terminology are provided in other documents. This document specifies the protocol mechanism, called Internationalized Domain Names in Applications (IDNA), for registering and looking up IDNs in a way that does not require changes to the DNS itself. IDNA is only meant for processing domain names, not free text. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5891"/><seriesInfo name="DOI" value="10.17487/RFC5891"/></reference>
984 <reference anchor="RFC5869" target="https://www.rfc-editor.org/info/rfc5869"> 984 <reference anchor="RFC5869" target="https://www.rfc-editor.org/info/rfc5869">
985 <front> 985 <front>
986 <title> 986 <title>