aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMartin Schanzenbach <schanzen@gnunet.org>2022-06-17 21:29:32 +0200
committerMartin Schanzenbach <schanzen@gnunet.org>2022-06-17 21:29:32 +0200
commite54431f10a716a34831a5ce8963dfbb41ba60450 (patch)
treedc77e8e434207bc66998bf0918a1f4f76ae3ab8b
parentc0d9c47bf8a03b8bf6c549ef16a91e13c8c2d7a2 (diff)
downloadlsd0001-e54431f10a716a34831a5ce8963dfbb41ba60450.tar.gz
lsd0001-e54431f10a716a34831a5ce8963dfbb41ba60450.zip
petnames
-rw-r--r--draft-schanzen-gns.xml29
1 files changed, 23 insertions, 6 deletions
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml
index 4b42680..4c234b3 100644
--- a/draft-schanzen-gns.xml
+++ b/draft-schanzen-gns.xml
@@ -336,15 +336,33 @@
336 <section anchor="overview" numbered="true" toc="default"> 336 <section anchor="overview" numbered="true" toc="default">
337 <name>Overview</name> 337 <name>Overview</name>
338 <t> 338 <t>
339 GNS exhibits the three properties of a petname system:
340 </t>
341 <ol>
342 <li>
343 It provides global names through the concept of zone top-level
344 domains (zTLDs). As zones can be uniquely identified by their zone key
345 and are statistically unqiue, GNS names with a zTLD suffix are also
346 globally unique.
347 </li>
348 <li>
349 It provides memorable or "human-readable" names by enabling users to
350 configure local mappings from nicknames to zones.
351 Zone owners can publish their mappings
352 in order to enable namespace delegation and facilitate resolution of
353 memorable names.
354 </li>
355 <li>
356 It provides secure mapping from names to records as zone contents
357 are signed using blinded private keys and encrypted using derived
358 secret keys.
359 </li>
360 </ol>
361 <t>
339 In GNS, any user can create and manage one or more zones 362 In GNS, any user can create and manage one or more zones
340 (<xref target="zones"/>) as part of a zone master implementation. 363 (<xref target="zones"/>) as part of a zone master implementation.
341 Zones are uniquely identified by a zone key.
342 Zone contents are signed using blinded private keys and
343 encrypted using derived secret keys.
344 The zone type determines the respective set of cryptographic operations 364 The zone type determines the respective set of cryptographic operations
345 and the wire formats for encrypted data, public keys and signatures. 365 and the wire formats for encrypted data, public keys and signatures.
346 </t>
347 <t>
348 A zone can be populated with mappings from labels to resource records by 366 A zone can be populated with mappings from labels to resource records by
349 its owner (<xref target="rrecords"/>). 367 its owner (<xref target="rrecords"/>).
350 A label can be mapped to a delegation record which results in the 368 A label can be mapped to a delegation record which results in the
@@ -445,7 +463,6 @@
445 +---------+ | 463 +---------+ |
446 ]]></artwork> 464 ]]></artwork>
447 </figure> 465 </figure>
448
449 <t> 466 <t>
450 In the remainder of this document, the "implementer" refers to the developer building 467 In the remainder of this document, the "implementer" refers to the developer building
451 a GNS implementation including the resolver, zone master, and 468 a GNS implementation including the resolver, zone master, and