Aux root: Difference between revisions
No edit summary |
No edit summary |
||
Line 25: | Line 25: | ||
adding the following name servers, which are non-recursive, in desired order to your active resolver(s): | adding the following name servers, which are non-recursive, in desired order to your active resolver(s): | ||
* | *ns.<IANA_ZONE> | ||
* . . . | * . . . | ||
*ns<n>.<IANA_ZONE> | *ns<n>.<IANA_ZONE> | ||
where «IANA_ZONE» is the linking zone in the priced name system and, <n> is currently | where «IANA_ZONE» is the linking zone in the priced name system and, <n> is currently 1, or their ip addresses if your resolver requires it and | ||
</blockquote><blockquote style="color: yellow;font-weight: 600;">where the linking zone uses the designated | </blockquote><blockquote style="color: yellow;font-weight: 600;">where the linking zone uses the designated | ||
<IANA_ZONE> | <IANA_ZONE> |
Revision as of 07:08, 22 May 2020
.dom
Domain Engineering TLD
KASTALIEN peer-peer name system ¹
Beginning in 2019, a migration of content from random distribution over my longstanding 3 ICANN domains*, is in progress, with the goal of almost all content being alt-routed, either same named, ICANN suffix to .dom, or the ICANN/IANA TLD just dropped. As used here. alt root refers to an autonomous peerage that routes TLDs upon discretion of the operators. A reasonable effort for a free service level is committed that just works by:adding the following name servers, which are non-recursive, in desired order to your active resolver(s):
- ns.<IANA_ZONE>
- . . .
- ns<n>.<IANA_ZONE>
where «IANA_ZONE» is the linking zone in the priced name system and, <n> is currently 1, or their ip addresses if your resolver requires it and
where the linking zone uses the designated
<IANA_ZONE>
- Neustar meansofproduction.biz thru 2020-10;**
- Donuts sameboat.live thru 2021-10;
- Neustar ai-integration.biz thru 2025-02
The changing linking zone is key to my version of the alt root concept. Stability is supplied by continued support of the name while it appears in the list above and ofc the underlying content.
Names within the alt system not subject to this change, only the alt-public/wild boundary is affected.
* An example is thoughtcrime.biz, thoughtcrime.dom is already the reference domain but tcb.biz will route publicly for a while and then only via my root for the .biz suffix. ** will be routed publicly via Neustar for a while after but not as linking zone.
Paid²[2]users have access from recursion and additional basic name services for users below developer class up to continuous live maintenance by intelligent agency for operators.
As used here, the background operation of the public priced name systems are assumed as needed, excluded where desirable, e.g. for privacy or security. Our system is constructed using the standard unix networking software and forms a superspace of the public name system with these properties:
- Individual operators of the system determine which TLDs they recognize. The system administered here only allocates the TLDs FCFS to operators, it doesn't have the intent of acting as a sole authoritative source even for the .dom name, which operators may override to establish cooperating alt roots. The TLD operators in essence agree to a common real TLD space which they may present internally differently, but which starts with the common public systems plus a single reserved name: ".dom" for their private/peer namespace.
- IPV6 and TLS are defaults, 4 and plain text special cases.
- Simple name seeking registrars are prohibited. Registrars must offer the name service free bundled with value added services.
- A rich default common systems application environment which operators may optionally use is provided in which all users are identified and at least in principle, traceable.
An equivalent function is assumed for peer operators, as provided by my DNS/EPP tooling merged with the FRED Czech NIC software as maintained by me for my Ubuntu LTS targets. End users of the "sameboat/C-六" core PHP-Python CMS have significant consumer level DNS functionality upon sufficient entitlement.
³ "clean" means a newly formatted host OS instance; Our modifications of various elements such as letsencrypt included in the SaaS, woven through various process such as SSO, registration, etc.