Aux root: Difference between revisions

From Cibernética Americana
Jump to navigationJump to search
No edit summary
No edit summary
Line 33: Line 33:
As used here, the background operation of the public priced name systems are assumed as needed, excluded where prohibited, e.g. for privacy or security. Our system is constructed using the standard unix networking software and forms a superspace of the public name system with these properties:
As used here, the background operation of the public priced name systems are assumed as needed, excluded where prohibited, e.g. for privacy or security. Our system is constructed using the standard unix networking software and forms a superspace of the public name system with these properties:
<ul>
<ul>
<li>Individual operators of the system determine which TLDs they recognize. The system administered here only allocates the TLDs FCFS to operators, it doesn't have the intent of acting  as a sole authoritative source even for the .dom name, which operators may override to establish cooperating alt roots. The TLD operators in essence agree to a common real TLD space which they may present internally differently, but which starts with the common public systems plus a single reserved name: ".dom".</li>
<li>Individual operators of the system determine which TLDs they recognize. The system administered here only allocates the TLDs FCFS to operators, it doesn't have the intent of acting  as a sole authoritative source even for the .dom name, which operators may override to establish cooperating alt roots. The TLD operators in essence agree to a common real TLD space which they may present internally differently, but which starts with the common public systems plus a single reserved name: ".dom" for their private/peer namespace.</li>
<li>IPV6 and TLS are defaults, 4 and plain text special cases.</li>
<li>IPV6 and TLS are defaults, 4 and plain text special cases.</li>
<li>A rich default common systems application environment which operators may optionally use is provided in which all users are identified and at least in principle, traceable.</li>
<li>A rich default common systems application environment which operators may optionally use is provided in which all users are identified and at least in principle, traceable.</li>