diff options
author | Schanzenbach, Martin <mschanzenbach@posteo.de> | 2019-10-05 12:43:57 +0200 |
---|---|---|
committer | Schanzenbach, Martin <mschanzenbach@posteo.de> | 2019-10-05 12:43:57 +0200 |
commit | 050c36f8b667809ebc282b2a718e3322d128ec6b (patch) | |
tree | 779ebdc5a2cbd232157ca444bf5b4583c6d71ede | |
parent | 4157862beeb82b13919eb29fdcae79c43ba926a0 (diff) | |
download | lsd0001-050c36f8b667809ebc282b2a718e3322d128ec6b.tar.gz lsd0001-050c36f8b667809ebc282b2a718e3322d128ec6b.zip |
update punycode refs
-rw-r--r-- | draft-schanzen-gns.html | 8 | ||||
-rw-r--r-- | draft-schanzen-gns.txt | 12 | ||||
-rw-r--r-- | draft-schanzen-gns.xml | 4 |
3 files changed, 12 insertions, 12 deletions
diff --git a/draft-schanzen-gns.html b/draft-schanzen-gns.html index 3b5b8cc..ed0302e 100644 --- a/draft-schanzen-gns.html +++ b/draft-schanzen-gns.html | |||
@@ -1451,7 +1451,7 @@ async function addMetadata(){try{const e=document.styleSheets[0].cssRules;for(le | |||
1451 | <p id="section-3.3-3"> | 1451 | <p id="section-3.3-3"> |
1452 | NOTE: If an application uses a LEHO value in an HTTP request header | 1452 | NOTE: If an application uses a LEHO value in an HTTP request header |
1453 | (e.g. "Host:" header) it must be converted to a punycode representation | 1453 | (e.g. "Host:" header) it must be converted to a punycode representation |
1454 | <span>[<a href="#RFC3492" class="xref">RFC3492</a>]</span>.<a href="#section-3.3-3" class="pilcrow">¶</a></p> | 1454 | <span>[<a href="#RFC5891" class="xref">RFC5891</a>]</span>.<a href="#section-3.3-3" class="pilcrow">¶</a></p> |
1455 | </section> | 1455 | </section> |
1456 | </div> | 1456 | </div> |
1457 | <div id="gnsrecords_nick"> | 1457 | <div id="gnsrecords_nick"> |
@@ -2144,9 +2144,6 @@ async function addMetadata(){try{const e=document.styleSheets[0].cssRules;for(le | |||
2144 | <dt id="RFC1035">[RFC1035]</dt> | 2144 | <dt id="RFC1035">[RFC1035]</dt> |
2145 | <dd> | 2145 | <dd> |
2146 | <span class="refAuthor">Mockapetris, P.</span>, <span class="refTitle">"Domain names - implementation and specification"</span>, <span class="seriesInfo">STD 13</span>, <span class="seriesInfo">RFC 1035</span>, <span class="seriesInfo">DOI 10.17487/RFC1035</span>, <time datetime="1987-11">November 1987</time>, <span><<a href="https://www.rfc-editor.org/info/rfc1035">https://www.rfc-editor.org/info/rfc1035</a>></span>. </dd> | 2146 | <span class="refAuthor">Mockapetris, P.</span>, <span class="refTitle">"Domain names - implementation and specification"</span>, <span class="seriesInfo">STD 13</span>, <span class="seriesInfo">RFC 1035</span>, <span class="seriesInfo">DOI 10.17487/RFC1035</span>, <time datetime="1987-11">November 1987</time>, <span><<a href="https://www.rfc-editor.org/info/rfc1035">https://www.rfc-editor.org/info/rfc1035</a>></span>. </dd> |
2147 | <dt id="RFC3492">[RFC3492]</dt> | ||
2148 | <dd> | ||
2149 | <span class="refAuthor">Costello, A.</span>, <span class="refTitle">"Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA)"</span>, <span class="seriesInfo">RFC 3492</span>, <span class="seriesInfo">DOI 10.17487/RFC3492</span>, <time datetime="2003-03">March 2003</time>, <span><<a href="https://www.rfc-editor.org/info/rfc3492">https://www.rfc-editor.org/info/rfc3492</a>></span>. </dd> | ||
2150 | <dt id="RFC3629">[RFC3629]</dt> | 2147 | <dt id="RFC3629">[RFC3629]</dt> |
2151 | <dd> | 2148 | <dd> |
2152 | <span class="refAuthor">Yergeau, F.</span>, <span class="refTitle">"UTF-8, a transformation format of ISO 10646"</span>, <span class="seriesInfo">STD 63</span>, <span class="seriesInfo">RFC 3629</span>, <span class="seriesInfo">DOI 10.17487/RFC3629</span>, <time datetime="2003-11">November 2003</time>, <span><<a href="https://www.rfc-editor.org/info/rfc3629">https://www.rfc-editor.org/info/rfc3629</a>></span>. </dd> | 2149 | <span class="refAuthor">Yergeau, F.</span>, <span class="refTitle">"UTF-8, a transformation format of ISO 10646"</span>, <span class="seriesInfo">STD 63</span>, <span class="seriesInfo">RFC 3629</span>, <span class="seriesInfo">DOI 10.17487/RFC3629</span>, <time datetime="2003-11">November 2003</time>, <span><<a href="https://www.rfc-editor.org/info/rfc3629">https://www.rfc-editor.org/info/rfc3629</a>></span>. </dd> |
@@ -2161,6 +2158,9 @@ async function addMetadata(){try{const e=document.styleSheets[0].cssRules;for(le | |||
2161 | <dt id="RFC5890">[RFC5890]</dt> | 2158 | <dt id="RFC5890">[RFC5890]</dt> |
2162 | <dd> | 2159 | <dd> |
2163 | <span class="refAuthor">Klensin, J.</span>, <span class="refTitle">"Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework"</span>, <span class="seriesInfo">RFC 5890</span>, <span class="seriesInfo">DOI 10.17487/RFC5890</span>, <time datetime="2010-08">August 2010</time>, <span><<a href="https://www.rfc-editor.org/info/rfc5890">https://www.rfc-editor.org/info/rfc5890</a>></span>. </dd> | 2160 | <span class="refAuthor">Klensin, J.</span>, <span class="refTitle">"Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework"</span>, <span class="seriesInfo">RFC 5890</span>, <span class="seriesInfo">DOI 10.17487/RFC5890</span>, <time datetime="2010-08">August 2010</time>, <span><<a href="https://www.rfc-editor.org/info/rfc5890">https://www.rfc-editor.org/info/rfc5890</a>></span>. </dd> |
2161 | <dt id="RFC5891">[RFC5891]</dt> | ||
2162 | <dd> | ||
2163 | <span class="refAuthor">Klensin, J.</span>, <span class="refTitle">"Internationalized Domain Names in Applications (IDNA): Protocol"</span>, <span class="seriesInfo">RFC 5891</span>, <span class="seriesInfo">DOI 10.17487/RFC5891</span>, <time datetime="2010-08">August 2010</time>, <span><<a href="https://www.rfc-editor.org/info/rfc5891">https://www.rfc-editor.org/info/rfc5891</a>></span>. </dd> | ||
2164 | <dt id="RFC6895">[RFC6895]</dt> | 2164 | <dt id="RFC6895">[RFC6895]</dt> |
2165 | <dd> | 2165 | <dd> |
2166 | <span class="refAuthor">Eastlake 3rd, D.</span>, <span class="refTitle">"Domain Name System (DNS) IANA Considerations"</span>, <span class="seriesInfo">BCP 42</span>, <span class="seriesInfo">RFC 6895</span>, <span class="seriesInfo">DOI 10.17487/RFC6895</span>, <time datetime="2013-04">April 2013</time>, <span><<a href="https://www.rfc-editor.org/info/rfc6895">https://www.rfc-editor.org/info/rfc6895</a>></span>. </dd> | 2166 | <span class="refAuthor">Eastlake 3rd, D.</span>, <span class="refTitle">"Domain Name System (DNS) IANA Considerations"</span>, <span class="seriesInfo">BCP 42</span>, <span class="seriesInfo">RFC 6895</span>, <span class="seriesInfo">DOI 10.17487/RFC6895</span>, <time datetime="2013-04">April 2013</time>, <span><<a href="https://www.rfc-editor.org/info/rfc6895">https://www.rfc-editor.org/info/rfc6895</a>></span>. </dd> |
diff --git a/draft-schanzen-gns.txt b/draft-schanzen-gns.txt index c6b7677..5a92bc1 100644 --- a/draft-schanzen-gns.txt +++ b/draft-schanzen-gns.txt | |||
@@ -350,7 +350,7 @@ Internet-Draft The GNU Name System July 2019 | |||
350 | 350 | ||
351 | NOTE: If an application uses a LEHO value in an HTTP request header | 351 | NOTE: If an application uses a LEHO value in an HTTP request header |
352 | (e.g. "Host:" header) it must be converted to a punycode | 352 | (e.g. "Host:" header) it must be converted to a punycode |
353 | representation [RFC3492]. | 353 | representation [RFC5891]. |
354 | 354 | ||
355 | 3.4. NICK | 355 | 3.4. NICK |
356 | 356 | ||
@@ -978,11 +978,6 @@ Internet-Draft The GNU Name System July 2019 | |||
978 | specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, | 978 | specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, |
979 | November 1987, <https://www.rfc-editor.org/info/rfc1035>. | 979 | November 1987, <https://www.rfc-editor.org/info/rfc1035>. |
980 | 980 | ||
981 | [RFC3492] Costello, A., "Punycode: A Bootstring encoding of Unicode | ||
982 | for Internationalized Domain Names in Applications | ||
983 | (IDNA)", RFC 3492, DOI 10.17487/RFC3492, March 2003, | ||
984 | <https://www.rfc-editor.org/info/rfc3492>. | ||
985 | |||
986 | [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO | 981 | [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO |
987 | 10646", STD 63, RFC 3629, DOI 10.17487/RFC3629, November | 982 | 10646", STD 63, RFC 3629, DOI 10.17487/RFC3629, November |
988 | 2003, <https://www.rfc-editor.org/info/rfc3629>. | 983 | 2003, <https://www.rfc-editor.org/info/rfc3629>. |
@@ -1003,6 +998,11 @@ Internet-Draft The GNU Name System July 2019 | |||
1003 | RFC 5890, DOI 10.17487/RFC5890, August 2010, | 998 | RFC 5890, DOI 10.17487/RFC5890, August 2010, |
1004 | <https://www.rfc-editor.org/info/rfc5890>. | 999 | <https://www.rfc-editor.org/info/rfc5890>. |
1005 | 1000 | ||
1001 | [RFC5891] Klensin, J., "Internationalized Domain Names in | ||
1002 | Applications (IDNA): Protocol", RFC 5891, | ||
1003 | DOI 10.17487/RFC5891, August 2010, | ||
1004 | <https://www.rfc-editor.org/info/rfc5891>. | ||
1005 | |||
1006 | 1006 | ||
1007 | 1007 | ||
1008 | Schanzenbach, et al. Expires 24 January 2020 [Page 18] | 1008 | Schanzenbach, et al. Expires 24 January 2020 [Page 18] |
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml index 2165422..8bcec1e 100644 --- a/draft-schanzen-gns.xml +++ b/draft-schanzen-gns.xml | |||
@@ -342,7 +342,7 @@ | |||
342 | <t> | 342 | <t> |
343 | NOTE: If an application uses a LEHO value in an HTTP request header | 343 | NOTE: If an application uses a LEHO value in an HTTP request header |
344 | (e.g. "Host:" header) it must be converted to a punycode representation | 344 | (e.g. "Host:" header) it must be converted to a punycode representation |
345 | <xref target="RFC3492" />. | 345 | <xref target="RFC5891" />. |
346 | </t> | 346 | </t> |
347 | </section> | 347 | </section> |
348 | <section anchor="gnsrecords_nick" numbered="true" toc="default"> | 348 | <section anchor="gnsrecords_nick" numbered="true" toc="default"> |
@@ -977,10 +977,10 @@ | |||
977 | <back> | 977 | <back> |
978 | <references> | 978 | <references> |
979 | <name>Normative References</name> | 979 | <name>Normative References</name> |
980 | <reference anchor="RFC3492" target="https://www.rfc-editor.org/info/rfc3492"><front><title>Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA)</title><author initials="A." surname="Costello" fullname="A. Costello"><organization/></author><date year="2003" month="March"/><abstract><t>Punycode is a simple and efficient transfer encoding syntax designed for use with Internationalized Domain Names in Applications (IDNA). It uniquely and reversibly transforms a Unicode string into an ASCII string. ASCII characters in the Unicode string are represented literally, and non-ASCII characters are represented by ASCII characters that are allowed in host name labels (letters, digits, and hyphens). This document defines a general algorithm called Bootstring that allows a string of basic code points to uniquely represent any string of code points drawn from a larger set. Punycode is an instance of Bootstring that uses particular parameter values specified by this document, appropriate for IDNA. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="3492"/><seriesInfo name="DOI" value="10.17487/RFC3492"/></reference> | ||
981 | <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748"><front><title>Elliptic Curves for Security</title><author initials="A." surname="Langley" fullname="A. Langley"><organization/></author><author initials="M." surname="Hamburg" fullname="M. Hamburg"><organization/></author><author initials="S." surname="Turner" fullname="S. Turner"><organization/></author><date year="2016" month="January"/><abstract><t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t></abstract></front><seriesInfo name="RFC" value="7748"/><seriesInfo name="DOI" value="10.17487/RFC7748"/></reference> | 980 | <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748"><front><title>Elliptic Curves for Security</title><author initials="A." surname="Langley" fullname="A. Langley"><organization/></author><author initials="M." surname="Hamburg" fullname="M. Hamburg"><organization/></author><author initials="S." surname="Turner" fullname="S. Turner"><organization/></author><date year="2016" month="January"/><abstract><t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t></abstract></front><seriesInfo name="RFC" value="7748"/><seriesInfo name="DOI" value="10.17487/RFC7748"/></reference> |
982 | <reference anchor="RFC3826" target="https://www.rfc-editor.org/info/rfc3826"><front><title>The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model</title><author initials="U." surname="Blumenthal" fullname="U. Blumenthal"><organization/></author><author initials="F." surname="Maino" fullname="F. Maino"><organization/></author><author initials="K." surname="McCloghrie" fullname="K. McCloghrie"><organization/></author><date year="2004" month="June"/><abstract><t>This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cipher FeedBack Mode (CFB), with a key size of 128 bits. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="3826"/><seriesInfo name="DOI" value="10.17487/RFC3826"/></reference> | 981 | <reference anchor="RFC3826" target="https://www.rfc-editor.org/info/rfc3826"><front><title>The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model</title><author initials="U." surname="Blumenthal" fullname="U. Blumenthal"><organization/></author><author initials="F." surname="Maino" fullname="F. Maino"><organization/></author><author initials="K." surname="McCloghrie" fullname="K. McCloghrie"><organization/></author><date year="2004" month="June"/><abstract><t>This document describes a symmetric encryption protocol that supplements the protocols described in the User-based Security Model (USM), which is a Security Subsystem for version 3 of the Simple Network Management Protocol for use in the SNMP Architecture. The symmetric encryption protocol described in this document is based on the Advanced Encryption Standard (AES) cipher algorithm used in Cipher FeedBack Mode (CFB), with a key size of 128 bits. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="3826"/><seriesInfo name="DOI" value="10.17487/RFC3826"/></reference> |
983 | <reference anchor="RFC5890" target="https://www.rfc-editor.org/info/rfc5890"><front><title>Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework</title><author initials="J." surname="Klensin" fullname="J. Klensin"><organization/></author><date year="2010" month="August"/><abstract><t>This document is one of a collection that, together, describe the protocol and usage context for a revision of Internationalized Domain Names for Applications (IDNA), superseding the earlier version. It describes the document collection and provides definitions and other material that are common to the set. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5890"/><seriesInfo name="DOI" value="10.17487/RFC5890"/></reference> | 982 | <reference anchor="RFC5890" target="https://www.rfc-editor.org/info/rfc5890"><front><title>Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework</title><author initials="J." surname="Klensin" fullname="J. Klensin"><organization/></author><date year="2010" month="August"/><abstract><t>This document is one of a collection that, together, describe the protocol and usage context for a revision of Internationalized Domain Names for Applications (IDNA), superseding the earlier version. It describes the document collection and provides definitions and other material that are common to the set. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5890"/><seriesInfo name="DOI" value="10.17487/RFC5890"/></reference> |
983 | <reference anchor="RFC5891" target="https://www.rfc-editor.org/info/rfc5891"><front><title>Internationalized Domain Names in Applications (IDNA): Protocol</title><author initials="J." surname="Klensin" fullname="J. Klensin"><organization/></author><date year="2010" month="August"/><abstract><t>This document is the revised protocol definition for Internationalized Domain Names (IDNs). The rationale for changes, the relationship to the older specification, and important terminology are provided in other documents. This document specifies the protocol mechanism, called Internationalized Domain Names in Applications (IDNA), for registering and looking up IDNs in a way that does not require changes to the DNS itself. IDNA is only meant for processing domain names, not free text. [STANDARDS-TRACK]</t></abstract></front><seriesInfo name="RFC" value="5891"/><seriesInfo name="DOI" value="10.17487/RFC5891"/></reference> | ||
984 | <reference anchor="RFC5869" target="https://www.rfc-editor.org/info/rfc5869"> | 984 | <reference anchor="RFC5869" target="https://www.rfc-editor.org/info/rfc5869"> |
985 | <front> | 985 | <front> |
986 | <title> | 986 | <title> |