From 2ad1678423a1a625c120ded377932fec0c823fde Mon Sep 17 00:00:00 2001 From: Martin Schanzenbach Date: Sat, 19 Nov 2022 16:33:17 +0900 Subject: fixes --- draft-schanzen-gns.xml | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml index 5167f2c..787302e 100644 --- a/draft-schanzen-gns.xml +++ b/draft-schanzen-gns.xml @@ -3500,7 +3500,7 @@ Host: www.000G0037FH3QTBCK15Y8BCCNRVWPV17ZC7TSGB1C9ZG2TPGHZVFV1GMG3W In order to determine the canonical representation of the record with a zTLD, at most two queries are required: - First, it must be checked whether "www.example.gns" itself points to + First, it must be checked whether "www.example.gns.alt" itself points to a zone delegation record which would imply that the record set which was originally resolved is published under the apex label. If it does, the unique GNS name is simply the zTLD representation @@ -3522,7 +3522,7 @@ Host: 000G0037FH3QTBCK15Y8BCCNRVWPV17ZC7TSGB1C9ZG2TPGHZVFV1GMG3W If the HTTP client is a browser, the use of a unique GNS name for virtual hosting or TLS SNI does not necessarily have to be shown to the user. - For example, the name in the URL bar may remain as "www.example.gnu" + For example, the name in the URL bar may remain as "www.example.gns.alt" even if the used unique name differs. @@ -3619,8 +3619,8 @@ Host: 000G0037FH3QTBCK15Y8BCCNRVWPV17ZC7TSGB1C9ZG2TPGHZVFV1GMG3W ]]>
    -
  1. Lookup AAAA record for name: www.example.gns.
  2. -
  3. Determine start zone for www.example.gns.
  4. +
  5. Lookup AAAA record for name: www.example.gnu.gns.alt.
  6. +
  7. Determine start zone for www.example.gnu.gns.alt.
  8. Start zone: zk0 - Remainder: www.example.
  9. Calculate q0=SHA512(ZKDF(zk0, "example")) and initiate GET(q0).
  10. Retrieve and decrypt RRBLOCK consisting of a single PKEY record containing zk1.
  11. @@ -3660,11 +3660,11 @@ Host: 000G0037FH3QTBCK15Y8BCCNRVWPV17ZC7TSGB1C9ZG2TPGHZVFV1GMG3W ]]>
      -
    1. Lookup AAAA record for name: www.example.tld.
    2. -
    3. Determine start zone for www.example.tld.
    4. +
    5. Lookup AAAA record for name: www.example.tld.gns.alt.
    6. +
    7. Determine start zone for www.example.tld.gns.alt.
    8. Start zone: zk0 - Remainder: www.example.
    9. Calculate q0=SHA512(ZKDF(zk0, "example")) and initiate GET(q0).
    10. -
    11. Retrieve and decrypt RRBLOCK consisting of a single REDIRECT record containing zk1.
    12. +
    13. Retrieve and decrypt RRBLOCK consisting of a single PKEY record containing zk1.
    14. Calculate q1=SHA512(ZKDF(zk1, "www")) and initiate GET(q1).
    15. Retrieve and decrypt RRBLOCK consisting of a single REDIRECT record containing www2.+.
    16. Calculate q2=SHA512(ZKDF(zk1, "www2")) and initiate GET(q2).
    17. @@ -3703,8 +3703,8 @@ Host: 000G0037FH3QTBCK15Y8BCCNRVWPV17ZC7TSGB1C9ZG2TPGHZVFV1GMG3W ]]>
        -
      1. Lookup AAAA record for name: www.example.gnu
      2. -
      3. Determine start zone for www.example.gnu.
      4. +
      5. Lookup AAAA record for name: www.example.gnu.gns.alt
      6. +
      7. Determine start zone for www.example.gnu.gns.alt.
      8. Start zone: zk0 - Remainder: www.example.
      9. Calculate q0=SHA512(ZKDF(zk0, "example")) and initiate GET(q0).
      10. Retrieve and decrypt RRBLOCK consisting of a single GNS2DNS record containing the name example.com and the DNS server IPv4 address 192.0.2.1.
      11. -- cgit v1.2.3