Aux root: Difference between revisions

From Cibernética Americana
Jump to navigationJump to search
No edit summary
No edit summary
Line 33: Line 33:
As used here, the background operation of the public priced name systems are assumed as needed, excluded where prohibited, e.g. for privacy or security. Our system is constructed using the standard unix networking software and forms a superspace of the public name system with these properties:
As used here, the background operation of the public priced name systems are assumed as needed, excluded where prohibited, e.g. for privacy or security. Our system is constructed using the standard unix networking software and forms a superspace of the public name system with these properties:
<ul>
<ul>
<li>Individual operators of the system determine which TLDs they recognize. The system administered here only allocates the TLDs FCFS to operators, it doesn't have the intent of acting  as a sole authoritative source even for the .dom name, which operators may override to establish cooperating alt roots. The TLD operators in essence agree to a common TLD space which they may present internally to users as desired.</li>
<li>Individual operators of the system determine which TLDs they recognize. The system administered here only allocates the TLDs FCFS to operators, it doesn't have the intent of acting  as a sole authoritative source even for the .dom name, which operators may override to establish cooperating alt roots. The TLD operators in essence agree to a common TLD space which they may present internally to users as desired, but operationally the top level of name space starts with a single reserved name: "dom".</li>
<li>IPV6 and TLS are defaults</li>
<li>IPV6 and TLS are defaults</li>
<li>A rich default common systems application environment is provided in which all users are identified, traceable, at least in principal.</li>
<li>A rich default common systems application environment is provided in which all users are identified, traceable, at least in principal.</li>