diff options
Diffstat (limited to 'draft-schanzen-gns.xml')
-rw-r--r-- | draft-schanzen-gns.xml | 22 |
1 files changed, 10 insertions, 12 deletions
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml index 6e4fd57..c6942e5 100644 --- a/draft-schanzen-gns.xml +++ b/draft-schanzen-gns.xml | |||
@@ -128,23 +128,21 @@ | |||
128 | particular X.509 for the Web. | 128 | particular X.509 for the Web. |
129 | </t> | 129 | </t> |
130 | <t> | 130 | <t> |
131 | The design of GNS incorporates the capability to interoperate with the | 131 | In DNS terminology, GNS roughly follows the idea of a local |
132 | DNS protocol. | 132 | root zone deployment (see <xref target="RFC8806"/>), with the difference |
133 | It is based on the principle of a petname system where users can assign | 133 | that the protocol does not mandate that all deployments use the same |
134 | names to zones. | 134 | or any specific root zone. |
135 | Users can autonomously and freely delegate control of names to | ||
136 | zones through their local configurations. | ||
137 | </t> | ||
138 | <t> | ||
139 | Name resolution and zone dissemination is based on the principle of a | ||
140 | petname system where users can assign local names to zones. | ||
135 | It builds on ideas from the Simple Distributed Security | 141 | It builds on ideas from the Simple Distributed Security |
136 | Infrastructure <xref target="SDSI" />, enabling the decentralized | 142 | Infrastructure <xref target="SDSI" />, enabling the decentralized |
137 | mapping of secure identifiers to memorable names. | 143 | mapping of secure identifiers to memorable names. |
138 | </t> | 144 | </t> |
139 | <t> | 145 | <t> |
140 | In DNS terminology, GNS roughly follows the idea of a local | ||
141 | root zone deployment (see <xref target="RFC8806"/>), with the difference | ||
142 | that the protocol defined here does not mandate that all deployments use | ||
143 | the same root zone. | ||
144 | Users can easily delegate control of arbitrary domain names to | ||
145 | arbitrary zones through their local configurations. | ||
146 | </t> | ||
147 | <t> | ||
148 | This document defines the normative wire format of resource records, resolution processes, | 146 | This document defines the normative wire format of resource records, resolution processes, |
149 | cryptographic routines and security considerations for use by implementers. | 147 | cryptographic routines and security considerations for use by implementers. |
150 | </t> | 148 | </t> |