diff options
author | Martin Schanzenbach <schanzen@gnunet.org> | 2022-06-17 21:29:32 +0200 |
---|---|---|
committer | Martin Schanzenbach <schanzen@gnunet.org> | 2022-06-17 21:29:32 +0200 |
commit | e54431f10a716a34831a5ce8963dfbb41ba60450 (patch) | |
tree | dc77e8e434207bc66998bf0918a1f4f76ae3ab8b | |
parent | c0d9c47bf8a03b8bf6c549ef16a91e13c8c2d7a2 (diff) | |
download | lsd0001-e54431f10a716a34831a5ce8963dfbb41ba60450.tar.gz lsd0001-e54431f10a716a34831a5ce8963dfbb41ba60450.zip |
petnames
-rw-r--r-- | draft-schanzen-gns.xml | 29 |
1 files changed, 23 insertions, 6 deletions
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml index 4b42680..4c234b3 100644 --- a/draft-schanzen-gns.xml +++ b/draft-schanzen-gns.xml | |||
@@ -336,15 +336,33 @@ | |||
336 | <section anchor="overview" numbered="true" toc="default"> | 336 | <section anchor="overview" numbered="true" toc="default"> |
337 | <name>Overview</name> | 337 | <name>Overview</name> |
338 | <t> | 338 | <t> |
339 | GNS exhibits the three properties of a petname system: | ||
340 | </t> | ||
341 | <ol> | ||
342 | <li> | ||
343 | It provides global names through the concept of zone top-level | ||
344 | domains (zTLDs). As zones can be uniquely identified by their zone key | ||
345 | and are statistically unqiue, GNS names with a zTLD suffix are also | ||
346 | globally unique. | ||
347 | </li> | ||
348 | <li> | ||
349 | It provides memorable or "human-readable" names by enabling users to | ||
350 | configure local mappings from nicknames to zones. | ||
351 | Zone owners can publish their mappings | ||
352 | in order to enable namespace delegation and facilitate resolution of | ||
353 | memorable names. | ||
354 | </li> | ||
355 | <li> | ||
356 | It provides secure mapping from names to records as zone contents | ||
357 | are signed using blinded private keys and encrypted using derived | ||
358 | secret keys. | ||
359 | </li> | ||
360 | </ol> | ||
361 | <t> | ||
339 | In GNS, any user can create and manage one or more zones | 362 | In GNS, any user can create and manage one or more zones |
340 | (<xref target="zones"/>) as part of a zone master implementation. | 363 | (<xref target="zones"/>) as part of a zone master implementation. |
341 | Zones are uniquely identified by a zone key. | ||
342 | Zone contents are signed using blinded private keys and | ||
343 | encrypted using derived secret keys. | ||
344 | The zone type determines the respective set of cryptographic operations | 364 | The zone type determines the respective set of cryptographic operations |
345 | and the wire formats for encrypted data, public keys and signatures. | 365 | and the wire formats for encrypted data, public keys and signatures. |
346 | </t> | ||
347 | <t> | ||
348 | A zone can be populated with mappings from labels to resource records by | 366 | A zone can be populated with mappings from labels to resource records by |
349 | its owner (<xref target="rrecords"/>). | 367 | its owner (<xref target="rrecords"/>). |
350 | A label can be mapped to a delegation record which results in the | 368 | A label can be mapped to a delegation record which results in the |
@@ -445,7 +463,6 @@ | |||
445 | +---------+ | | 463 | +---------+ | |
446 | ]]></artwork> | 464 | ]]></artwork> |
447 | </figure> | 465 | </figure> |
448 | |||
449 | <t> | 466 | <t> |
450 | In the remainder of this document, the "implementer" refers to the developer building | 467 | In the remainder of this document, the "implementer" refers to the developer building |
451 | a GNS implementation including the resolver, zone master, and | 468 | a GNS implementation including the resolver, zone master, and |