From 5fa428ac9ada2f4d32d709704d0562779f89691d Mon Sep 17 00:00:00 2001 From: Martin Schanzenbach Date: Sat, 4 Dec 2021 09:55:29 +0100 Subject: title case, dns reference to top --- draft-schanzen-gns.xml | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml index d51e138..04b404d 100644 --- a/draft-schanzen-gns.xml +++ b/draft-schanzen-gns.xml @@ -97,8 +97,9 @@
Introduction - The Domain Name System (DNS) is a unique distributed database and a vital - service for most Internet applications. While DNS is distributed, it + The Domain Name System (DNS) is a unique + distributed database and a vital service for most Internet applications. + While DNS is distributed, it relies on centralized, trusted registrars to provide globally unique names. As the awareness of the central role DNS plays on the Internet rises, various institutions are using their power (including legal means) @@ -1329,7 +1330,7 @@ q := SHA512 (HDKD-Public(zk, label))
- Encountering zone delegation records + Encountering Zone Delegation Records When the resolver encounters a record of a supported zone delegation record type (such as PKEY or EDKEY) @@ -1894,7 +1895,7 @@ example.com = zk2
- Abuse mitigation + Abuse Mitigation GNS names are UTF-8 strings. Consequently, GNS faces similar issues with respect to name spoofing as DNS does for internationalized @@ -1914,7 +1915,7 @@ example.com = zk2
- Zone management + Zone Management In GNS, zone administrators need to manage and protect their zone keys. Once a zone key is lost it cannot be recovered. Once it is @@ -1939,7 +1940,7 @@ example.com = zk2
- Impact of underlying DHT + Impact of underlying DHTs This document does not specifiy the properties of the underlying distributed hash table (DHT) which is required by any GNS -- cgit v1.2.3