Network Working Group J. Klensin Internet-Draft February 15, 2004 Expires: August 15, 2004 A Search-based access model for the DNS draft-klensin-dns-search-06.txt Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http:// www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on August 15, 2004. Copyright Notice Copyright (C) The Internet Society (2004). All Rights Reserved. Abstract This memo discusses strategies for supporting "DNS searching" -- finding of names in the DNS, or references that will ultimately point to DNS names, by a mechanism layered above the DNS itself that permits fuzzy matching, selection that uses attributes or facets, and use of descriptive terms. Demand for these facilities appear to be increasing with growth in the Internet (and especially the web) and with requirements to move beyond the restricted subset of ASCII names that have been the traditional contents of DNS "Class=IN". This document proposes a layered system for access to DNS names in which the layers above the DNS involve search, rather than lookup (exactly known target), functions. It also discusses some of the issues and challenges in completing the design of, and deploying, such a system. Klensin Expires August 15, 2004 [Page 1] Internet-Draft A Search-based access model for the DNS February 2004 Table of Contents 1. Introduction and Executive Summary . . . . . . . . . . . . . 4 2. A multiple search-strategy environment . . . . . . . . . . . 6 2.1 Base Layer Identifiers -- a lookup system and the DNS. . . . 7 2.2 A Globally-accessible Search Component for Names . . . . . . 8 2.2.1 The facets . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.2.2 The name string . . . . . . . . . . . . . . . . . . . . . . 10 2.2.3 Case matching . . . . . . . . . . . . . . . . . . . . . . . 11 2.2.4 More complex character matching . . . . . . . . . . . . . . 13 2.2.5 Query formation and specification . . . . . . . . . . . . . 13 2.2.6 Imprecise matching . . . . . . . . . . . . . . . . . . . . . 15 2.2.7 Registration rules and query rules . . . . . . . . . . . . . 15 2.2.8 Server location . . . . . . . . . . . . . . . . . . . . . . 15 2.3 The Third Component: Locality and/or content-domain-specific data and mechanisms . . . . . . . . 16 2.4 The Non-directory Search Component: free-text searching applications . . . . . . . . . . . . . . . . . . . . . . . . 18 2.5 Database and searching differentiation . . . . . . . . . . . 19 3. Context and Model Details: Global faceted search . . . . . . 19 3.1 The data search and access model . . . . . . . . . . . . . . 19 3.2 Uniqueness of name structures in global faceted search . . . 20 3.2.1 The case for unique names . . . . . . . . . . . . . . . . . 20 3.2.2 Non-unique names . . . . . . . . . . . . . . . . . . . . . . 21 3.2.3 A middle ground approach: artificial uniqueness . . . . . . 21 3.3 Sources for controlled-vocabulary facets ("attributes") . . 22 3.3.1 Discussion of language identification . . . . . . . . . . . 23 3.3.2 Discussion of geographical identification . . . . . . . . . 23 3.3.3 Discussion of Industry Types . . . . . . . . . . . . . . . . 24 3.4 Deployment against the existing DNS base . . . . . . . . . . 24 3.5 Thoughts about user interfaces (UIs) . . . . . . . . . . . . 24 3.6 Implementation models . . . . . . . . . . . . . . . . . . . 25 3.6.1 Calling and returning values . . . . . . . . . . . . . . . . 25 3.6.2 The cache model . . . . . . . . . . . . . . . . . . . . . . 26 3.6.3 An example: Looking at Chinese Traditional-Simplified Mappings . . . . . . . . . . . . . . . . . . . . . . . . . . 28 3.6.4 An example: Distance functions and Latin-based alphabets . . 29 3.7 Older applications . . . . . . . . . . . . . . . . . . . . . 30 4. Context and model details: Localized and Topical Searching . . . . . . . . . . . . . . . . . . . . . . . . . 30 5. Comparisons to existing and proposed technology . . . . . . 30 5.1 The IDN Strawman . . . . . . . . . . . . . . . . . . . . . . 30 5.2 "Keyword" systems . . . . . . . . . . . . . . . . . . . . . 31 5.3 Client-side and server-side solutions . . . . . . . . . . . 32 6. Comments on business models . . . . . . . . . . . . . . . . 33 6.1 Faceted global searching . . . . . . . . . . . . . . . . . . 34 6.1.1 Facet listings and identification . . . . . . . . . . . . . 34 6.1.2 Registration and searching . . . . . . . . . . . . . . . . . 34 Klensin Expires August 15, 2004 [Page 2] Internet-Draft A Search-based access model for the DNS February 2004 6.2 Localized and topical databases and searching . . . . . . . 34 7. Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . 34 8. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . 35 9. IANA Considerations and related topics . . . . . . . . . . . 35 10. Security Considerations . . . . . . . . . . . . . . . . . . 35 11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . 36 12. Changes between versions . . . . . . . . . . . . . . . . . . 36 12.1 Major changes between version 05 and 06 . . . . . . . . . . 36 12.2 Major changes between version 04 and 05 . . . . . . . . . . 37 13. Placeholders . . . . . . . . . . . . . . . . . . . . . . . . 37 Normative References . . . . . . . . . . . . . . . . . . . . 38 Informative References . . . . . . . . . . . . . . . . . . . 38 Author's Address . . . . . . . . . . . . . . . . . . . . . . 41 Intellectual Property and Copyright Statements . . . . . . . 42 Klensin Expires August 15, 2004 [Page 3] Internet-Draft A Search-based access model for the DNS February 2004 1. Introduction and Executive Summary The notion of "DNS searching" is somewhat of an oxymoron: the DNS is structured to only perform exact lookups of structured strings of labels. But, as discussed elsewhere, there is considerable demand for searching facilities -- partial and fuzzy matching, selection that uses attributes or facets, and searching using descriptive terms-- and that demand appears to be increasing with growth in the Internet (and especially the web) and with requirements to move beyond the restricted subset of ASCII names that have been the traditional contents of DNS Class=IN. This document proposes a three-component system for access to DNS names. In this approach, the DNS (more or less as historically implemented) comprises the base, with the other two components (or strategies) layered on top of it, but not necessarily on each other. These new approaches involve search, rather than the DNS's very restricted lookup (known-item search), functions. It also discusses some of the issues and challenges in completing the design of, and deploying, such a system. These types of services are unnecessary as long as the problem is defined as "get non-ASCII identifiers into the DNS, but keep to a well-specified set of characters and usage so they retain strict identifier properties" --more or less the approach taken in IDNA [RFC3490]. Such approaches do not, as discussed in [RFC3467], solve the problem as perceived by many people. One non- technical way of looking at this is that the DNS is fundamentally downward-facing: it is designed to support references to network and host resources. Users want something upward-facing, i.e., that provides natural-language terminology and searching for resources of interest. And, as the IAB has pointed out [RFC2825], even if "fixing the DNS" did the job, that would be the easy part: the harder problem is considering and adjusting the applications and applications-level user interfaces. It has been suggested that introducing a "directory" or "keywords" into, or above, the DNS could be used as a solution to the IDN problem and, often, several others. Probing statements about "directories" often quickly demonstrates that their advocates don't agree on what they mean. Similarly, many of those who advocate "keyword systems" use that term to describe something very different from the traditional use of keywords in information retrieval systems. This section outlines a three-strategy search/lookup model (adding two location strategies to the one provided by the DNS, i.e., constructing a two or three-layer model, rather than continuing with the single one we have today). These new strategies consist of two layers: the current DNS and a collection of alternate methods for searching for a network resource, identified by URIs, and using different additional information and searching methods. The key one Klensin Expires August 15, 2004 [Page 4] Internet-Draft A Search-based access model for the DNS February 2004 of these is a global faceted search-capable component using an extremely simple set of facets. The other proposal is for more context-specific or localized, but broader, search approaches. The overall document is intended as a strawman for criticism and development, rather than as a specific proposal. I.e., the details, especially for localized systems, are left for IETF WG or other efforts. The document also introduces the concept of an expanded and powerful information cache, under user control, which should supercede the functions of now-traditional "address books for data", "bookmarks", lists of "favorites", and similar methods of retaining an association between a user-memorable name and a network resource. The additional power comes from retaining and utilizing, not only the name to resource binding, but also information needed to reconstruct a search and to determine when to do so. As a terminology issue, the "layers" and components described here are probably best thought of as elements of the applications layer, with actual user-facing applications lying yet above them. The term "search layer" has been used below to refer to both the faceted and localized components where it appears to be needed for clarity or emphasis. "Sublayer" and "level" are sometimes used interchangeably with terms for those components: suggestions for better terminology would be welcomed. For the two "above DNS" DNS, international ("universal") character sets and scripts are assumed and part of this initial design. Since actual or applications-applied DNS restrictions are not being inherited upward into these components, coding can be chosen for maximum utility and balance among language groups. E.g., native UCS- 4 could be used as an alternative to a secondary encoding form such as UTF-8 or an ASCII-compatible ("ACE") recoding such as that contemplated by [RFC3490]. And, of course, coding systems for [ISO10646] characters are required only in on-the-wire transactions and operations closely connected to them; we would anticipate that localized search operations in areas that use other coded character sets might be carried out largely in those locally-chosen coding systems. This document is intended to evolve into a framework and model for the layered search system, rather than a complete specification or even an approximation to one. It is complemented (for the global search system) by [Mealling-SLS], which discusses a CRNP-based [RFC2972] implementation model for that approach, by the more keyword-focused model of [Arrouye], by the caching data provided by Shi and Liu [SHI-CACHING] and, we hope, by other systems more tailored to specific languages or cultures. Additional documents are Klensin Expires August 15, 2004 [Page 5] Internet-Draft A Search-based access model for the DNS February 2004 expected to be developed that describe other aspects of all elements of this general proposal. 2. A multiple search-strategy environment The material below suggests three or more components or alternatives for name lookup and search: 1. The DNS, with the existing lookup mechanisms and a single global name space in which names are unique. Names are placed in the DNS by those who wish to use those names themselves (e.g., for identifying hosts and resources within a home, an enterprise, or cooperating groups of organizations). The DNS was never designed for searching for, or querying of, an identifier by someone who does not already know what it is. A useful analogy has been drawn between DNS names and variable names in a programming language [Austein2001]. Expanding on it, locally-memorable, and hence internationalized, identifiers are important for network engineers and operators to use in referring to resources regardless of whether they are actually valuable for end users. Such engineers and operators are used to developing identifiers using highly-restricted character (and other) rules and to remembering the identifiers they create (or having other tools to deal with them). 2. A restricted, facet-based, global search system. This system still preserves a global name space, but name strings are not expected to be unique and the set of facet values for a given entity may not be (see Section 3.2). Names are placed into this type of system by those who want to be found, or want the names or resources to be found, by others. The assumptions are neither that those others will know exactly what name they are trying to access (where the DNS requires precise knowledge of names or very good guessing) or that names will be unique (where the DNS requires uniqueness). But the search activity is still based on names (and attributes), not topics. It may be useful to think of this layer as similar to "white pages" services. This comparison is discussed in more detail below. 3. Commercial, localized, and potentially topic-specific, search environments. These environments utilize multiple, localized, name spaces. These would typically be localized by language or (physical or Klensin Expires August 15, 2004 [Page 6] Internet-Draft A Search-based access model for the DNS February 2004 political) geography, but might be structured around, e.g., specific subject matter. Names are placed into these systems by those who wish them to be found within the specific topic area context (or language or locality or combination of them). Because the environments are localized, different search terms and levels of granularity can be used in different search sites and name spaces. It may be useful to think of this layer as similar to "yellow pages" services. Again, the comparison is discussed in more detail below. 4. Something else? As discussed below, it is possible to think about the collection of automated content-based search systems that are available on the Internet -- e.g., the traditional "search engines" such as -- as components of the "search layer". The approaches described in more detail in this document utilize a "directory" approach, i.e., the information in them is put there precisely because some individual or enterprise would like to be found, and found using that information. The search engines, by contrast, rely on analysis of the content of online materials to index those materials. The following may help illustrate the relationships being proposed here. |--------------------------------------------------------------| | applications | |--------------------------------------------------------------| | | access cache | | | . . . . . . . . . . . . |-------------------| . . . . . . | | (directory-based approaches) | (free-text approaches) | | Global faceted | Topical, usually | web search | | name search | local search | | |--------------------------------------------------------------| | Domain Name System | |--------------------------------------------------------------| | Network resources (by IP Address, Port, etc.) | |--------------------------------------------------------------| 2.1 Base Layer Identifiers -- a lookup system and the DNS. In this model, the DNS remains largely as is (see Section 3.4 and following) or, perhaps, a bit closer to its original purpose and assumptions than the direction in which it has evolved in recent Klensin Expires August 15, 2004 [Page 7] Internet-Draft A Search-based access model for the DNS February 2004 years. I.e., it is a distributed database, with precise lookups, whose lookup keys are identifiers for Internet hosts and other objects. We give up the notion that these identifiers should also serve as human-useful names or at least try to abandon that notion. As an aside, note that some people have suggested that we should dehumanize DNS names entirely, e.g., prohibit the registration and use of any name that can be found in any dictionary for any language that can be represented in the DNS-acceptable character set. This proposal doesn't include that idea. But it is absent primarily because it does not appear that the transition process would be worth the time it would take to explore, rather than because it has no appeal. The goal for this base component is relatively simple, unique, identifiers. It is probably desirable that these identifiers be able to have some human mnemonic value, but less important that they be tightly bound to real-world names and descriptions. The inputs and outputs at this layer remain as they are in the DNS today. This proposal is complementary to those of [RFC3490] which accommodates non-hostname format names more or less directly in the DNS itself for circumstances in which they are deemed important for mnemomic or other purposes. "Hostname-format names" are those that are restricted to the ASCII-based "letter-digit- hyphen" (LDH) format traditionally used in Internet applications [HOSTNAME] and identified as prudent practice in section 2.3.1 of the DNS specification [RFC1035]). 2.2 A Globally-accessible Search Component for Names A faceted search system with a small number of facets, built on top of the DNS. Much of the current burden borne by the DNS would appear to be better focused on a search system that contains names and a small number of attributes represented in name facets. That DNS burden includes a wide range of non-identifier goals and constraints: names that a user can understand and find and that have significant mnemonic value, names with trademark implications, a wide variety of naming systems and, in general, helping people find the things for which they are looking. It is critical that the number of attributes be constrained to a minimal set, and that other attributes, especially those of special interest, be deferred to the third type of system, described below. The term "attribute" is used here and below to identify the controlled vocabulary or rule-defined facets as distinct from the Klensin Expires August 15, 2004 [Page 8] Internet-Draft A Search-based access model for the DNS February 2004 free-form "name-string". It is probably most useful to think about this layer in terms of a structured, multifacted, multihierarchical, thesaurus-like database with search capability (Cf. ISO IS 5127-1 and IS 5127-6 [ISO5127]), rather than as a "directory" in the sense of X.500 and its derivatives and antagonists. 2.2.1 The facets A key question is what facets to use once the major commercial product requirements are removed (to the third search component, see below). It appears to me that, to satisfy to the critical name-uniqueness and real world pressures on the DNS, candidates for identifying facets might be name-string. Characters from IS 10646, see below. language. Presumably codes as specified in RFC 3066 (see Section 3.3.1) geographical location. Country, and/or for some federal countries, country/ province ("state"). Granularity is important and there may be a case for an additional facet based in a coordinate system or for a two-level facet. See Section 3.3.2. network location. If we can figure out what that means and how to express it in a canonical way. industry category code. For companies, presumably derived from some existing official list such as the WIPO Nice Agreement list [WIPO-NICE]. The list would presumably require extension in some way to deal with non-commercial organizations and entities and to identify resources and services associated with people. See Section 3.3.3. This typology gives the trademark view of the world somewhat more precedence in looking at name conflict issues than one might like in principle. But, in practice, one of the key issues we have encountered in trying to store "names", rather than identifiers, in the DNS is that the process unreasonably flattens the space, not only from a technical standpoint but from a usability one. That "Joe's Auto Repair" and "Joe's Pizza" can co-exist in the same geographical area without conflict or confusion and that "Joe's Pizza" in one area can co-exist with "Joe's Pizza" in another, again without conflict or confusion, are the consequence of the way we name and identify things in the real world. Most trademark rules are the consequence of those naming systems, not their cause and many perceived conflicts between the trademark system and DNS usage are the result of this flattening. It is not intended that this level act as a white pages service for people. Doing so leads down several slippery slopes at once, including heightened privacy concerns and the associated requirement Klensin Expires August 15, 2004 [Page 9] Internet-Draft A Search-based access model for the DNS February 2004 to identify, authenticate, or authorize those submitting queries. The general intent is that the list of facets be fixed by protocol and that possible values for each facet be controlled vocabularies, not necessarily (and probably not) controlled from the same source (see Section 3.2). We would hope to utilize existing terminology lists where possible. For a particular record (i.e., a name and its set of attributes), and especially if requirements for uniqueness can be bypassed or relaxed, the selection (from the controlled vocabularies) of particular facet values would be the responsibility of the entity registering the names. In other words, someone registering a "name" in this system would select values for each of the facets from the controlled vocabulary for that facet as part of the process of placing the name into a database. It is important to note that the registration of that name would include all of the associated facets, although the vocabularies for all of the facets other than the "name-string" would be drawn from specific, external lists (controlled vocabularies or rules). It would not be desirable, and probably would not be feasible, for registrants to record their names in independent, facet-based, databases with one facet per database. There is also no magic in the proposed system. Names are placed in the system with particular facet sets because a registrant wants them there. A registrant who wishes to have a given name-string associated with different facet values (e.g., to identify different locations or lines of business) will make multiple registrations. While all faceted name strings would contain the same facets, there is no technical reason why one or more of these might not have a blank (or "missing") value, presumably causing a match to any search term for that facet. More important, searching for a name might omit one or more facets from the search, again matching any value that actually appeared in the database. It should be clear that there is significantly more information (from the values of the facets) at this layer than there is in the DNS. 2.2.2 The name string The names in this environment can reasonably be written in IS 10646 codes or some recoding of them. Since we would be starting more or less from scratch, we could select lengths and codings for maximum efficiency and utility, not to meet the constraints of existing software. In such a context, this author has a slight bias for direct UCS-4 coding. This is in preference to ASCII-compatible ("ACE") codes; compressed, null-octet-eliminating, systems such as Klensin Expires August 15, 2004 [Page 10] Internet-Draft A Search-based access model for the DNS February 2004 UTF-8; or surrogate introducers to hold things to 16 bits. The loss in transport efficiency is likely to be more than compensated for by gains in cleanliness and equal treatment of all scripts. And, if compression is needed, it is perhaps better to do it at the string level rather than the character one. The optimal coding may never be obvious: the "right" answer lies somewhat in the particular application and the eye of the beholder, and passions run very high on the subject. But that issue is separate from the main and important design arguments of this document. The work done to define "stringprep" [RFC3454] and, later, the DNS profile in "nameprep" [RFC3491], developed for IDNA will be necessary to determine which names to actually store in the database. But the stakes are lower here than the "get it right or fail completely" constraint of the DNS lookup environment: one can imagine search mechanisms that would apply a more liberal set of matching rules (and/or localized and language-specific ones) than the rules used to encode names (much like recent applications protocols that explicitly distinguish between the formats one is permitted to send and those one is expected to accept (Cf. [RFC2822])). At the same time, it would be sensible to permit short phrases as these "names", something which is not generally possible in the DNS (or in the IDNA standards). The necessity, in the DNS, to turn, e.g., "Lower Slobbovian University" into "LowerSlobbovianUniversity.edu", and then hope case will be preserved (or to use "lowerslobbovian.edu", or worse) is, ultimately, just another example of the unfortunate mismatch between the identifiers of the DNS and real-world naming systems. So we would assume that it is a design requirement to make it possible to use "Lower Slobbovian University" and "University of Lower Slobbovia" as stored names and, if both appear, to treat them as equivalent or approximately equivalent. 2.2.3 Case matching In the system proposed here, case-matching should be treated as just another case of fuzzy searching and matching, not a relationship with unique status. As discussed below, in all cases, the user (or her agent) would provide a string, some subset of facets, and search- method specifications as input, and would receive a set of matching results, in the form in which they are stored in the database. Case matching -- treating upper and lower case letters as identical - - is another historical DNS property that does not have a simple and unambiguous interpretation in the real world of non-ASCII character sets and a range of language applications. Some scripts contain glyph forms that clearly represent two cases, some scripts clearly do Klensin Expires August 15, 2004 [Page 11] Internet-Draft A Search-based access model for the DNS February 2004 not have case distinctions, and, as became clear during the development of IDNA, there are character-matching requirements in some languages (e.g., equality of simplified and traditional Chinese (e.g., see the work to handle preferred forms and variants for those characters [JET-Guideline], and below) for which the appropriateness of an analogy to case-matching has caused a considerable controversy, not least because of the apparent absence of a set of mapping tables that cover all of the possible character pairs. Even in scripts with clear case distinctions, it is common to find lower-case characters with no corresponding upper-case one (e.g., the German Eszet) or no upper-case character that maps uniquely to a lower case one (e.g., "A" in French may maps to either "a" and "a with accent"). Many of those who have examined the cases closely, including the working group that developed IDNA, have also discovered that, even for scripts with the presence of clear case distinctions, the matching rules sometimes differ by geographical locality. It is not completely clear how case matching should best be handled. It does appear almost obvious at this time that the IDNA model is not adequate for many situations. That model essentially results in different rules being applied to different scripts: case matching in some situations, none in others, and some but not all characters in yet other cases. It may be the best compromise given the combination of the constraints of the DNS with the idiosyncracies of Unicode, but, with or without the DNS constraints, we should strive to treat all languages and scripts in as nearly an identical, or at least non-discriminatory, way as possible. (A discussion of a generalization of the JET Guidelines system for reducing the worst impacts of different treatment for different scripts in IDNA appears in [I-D.klensin-registration].) While there are other options, it would appear to be better to handle case-matching on the server, as it is done in the DNS. As with other searching variants, it should be possible to return the form of the name as stored in the database while finding it using any of the user-acceptable variations (use of client-side string preparation for both the stored name and query formation, as a DNS internationalized on the IDNA model seems to require, loses information that some people consider important). Case-matching in the proposed faceted system could be applied (or not) as dictated either by a heuristic using the combination of the language facet and a query containing the preferred location-context of the user (see below). Or there could be an explicit query flag (or indicator carrying more than one bit of information). This author tends to prefer the latter because of a profound distrust of heuristics, but the question requires additional study. Klensin Expires August 15, 2004 [Page 12] Internet-Draft A Search-based access model for the DNS February 2004 2.2.4 More complex character matching The case-matching strategy applies to more complex cases of character matching as well. If one can establish sufficient context, and specify the types of expanded matching to be used, and permit multiple variants to be returned to the application, then one could support matching of similar-appearing characters (e.g., Latin "A" and Greek Alpha), or Latin-derived and Cyrillic-derived scripts for Serbo-Croatian, or, perhaps most important, mapping between Traditional and Simplified Chinese (see Section 3.6.3). 2.2.5 Query formation and specification As is common with systems of this type, we would anticipate the possibility of searching on any of the attributes and that searching on free-text strings would not be exact (i.e., near-match responses could be returned using any of several algorithms, with the user making choices). One could also imagine distance function calculations on appropriately structured restricted-vocabulary facets being implemented in some search engines. As is equally common, we should think about user interfaces that store both queries and response sets so that the responses could be used offline and refreshed when the client systems were attached to the Internet (see the discussion of caching in Section 3.6.2). At the same time, we would assume that a search without at least some approximation to a name string would rarely be productive and would expect search systems to be optimized accordingly. In summary, the goal at this layer is to provide tuples of human-recognizable (not just mnemonic) facets (names and attributes), but names that are relevant within the context set by the attributes, rather than a global system based on the names alone. The input at this layer is a query consisting of search values for one or more of the facets, plus information to control the search. E.g., to the extent that designers of search protocols can provide the proper tools and terminology, one would expect the query to be accompanied by rule statements about how much "fuzziness" was permitted, how "distant" names might be from the chosen ones and still be selected, whether character set or language translation (or even phonetic recognition) was to be applied (and whether translation was to be restricted to a small group of languages or made more general) and so forth. The outputs are still being discussed, but would appear to best be the full facet set of the matched tuple(s) (more than one such set if multiple tuples match) and one or more URIs [RFC2396] associated with Klensin Expires August 15, 2004 [Page 13] Internet-Draft A Search-based access model for the DNS February 2004 each tuple. These URIs, and the DNS entries which they contain and to which they refer, will generally have the same uniqueness properties of the DNS itself: while a query, or full set of matching facets, could match (and return) multiple DNS names, nothing would make the DNS names less unique than they are today (i.e., as the DNS requires). An alternative to using URIs as the return information is to simply return fully-qualified DNS names, leaving ancillary information about location of particular information and the protocols to be used with them, outside the scope of this system. The author reluctantly abandoned that approach as it became increasingly clear in discussions that the additional information was necessary: users will search for information, or a resource and the mechanisms for using it, and are little-interested in what the network might, or might not, consider as a resource. Even if URIs are returned, one of many interesting questions appeared to be whether these search systems should pass through and return the DNS records themselves (labels, class, type, and target) or whether they should return names (labels) and let the applications do the DNS lookups. The latter now appears obvious, not only because it can be anticipated that some URIs will not directly utilize DNS names, but because the data expiration properties of DNS resource records may be very different from that of a data reference or search result that can point to and rely on the DNS name. The substitution of URIs for DNS names does, however, increase complexity and the risk of recursion problems, and that tradeoff should be understood and appreciated. For the cases in which DNS-level information is the required response, a URI type might be created for that information and used to abstract the return information into something applications can then specify or decode as appropriate. As suggested above, use of such a URI would need to be carefully structured to avoid complex problems (e.g., recursion in either this system, the DNS, or both), but might be a reasonable approach. Regardless of whether the output is a URI or a DNS name, DNS extensions such as IDNA will presumably be applied to them. I.e., the process of looking up DNS names that emerge from the these search components would presumably go through the extended process specified in IDNA or its descendants. Experience with the DNS and other distributed databases also argues persuasively that these records are not forever. Unless there are no local copying and caching mechanisms (which seems unlikely and hard to enforce), some type of time to live (TTL) or other expiration or reverification mechanism will be needed. Klensin Expires August 15, 2004 [Page 14] Internet-Draft A Search-based access model for the DNS February 2004 2.2.6 Imprecise matching In addition to the methods described elsewhere in this document, there is a long history in the information retrieval field of non-exact matching systems that could be applied in a searching system, even one based on an underlying database model of fixed facets and controlled vocabularies. Ones that might be applicable include spelling and sound-alike variations, synonyms and near-synonyms, opposite terms and category negations, and others. 2.2.7 Registration rules and query rules As with the DNS, it may be more important to be conservative about what types of names are registered than to be restrictive about queries. At the same time, if there are well-known and easy to understand rules about registration restrictions (probaby implying that the same registration rules must be used globally), it should be possible to optimize query interfaces (corresponding to "resolvers" in traditional DNS terminology) to immediately return "invalid name" error messages rather than returning "not found" after a search. One could, for example, easily imagine a query interface that would maintain a local (although periodically updated) table of ISO 3166-2 codes to perform validation against the major components of geographic names before initiating a search of a remote database. Similarly, if a sublayer two database was created for a particular country and language, registrations in it would presumably be restricted to records for that country and language, and to name strings that conformed to validation rules developed for that country and language. The category lists (i.e., restricted vocabularies) for each of the facets would presumably come from different, although standardized, databases, e.g., IS 3166-2 and UN/LOCODE for geographical information, RFC 3066 for language names [RFC3066], an extended version of the WIPO-NICE code set for industry codes. But the name databases themselves would contain a complete set of tuples for the facets (some, of course, might be missing or, more precisely, "let anything match"). 2.2.8 Server location The DNS avoids the problem of server location through its strict hierarchy model: hosts are preconfigured with hints as to how to find the root servers, and all other servers are found via delegation records. Since this model contemplates relatively independent sets of servers for individual records, under separate administration, the Klensin Expires August 15, 2004 [Page 15] Internet-Draft A Search-based access model for the DNS February 2004 convenience of the DNS model is not available. Instead, some mechanism for server location is needed. At least the following models seem plausible: 1. A common directory of servers, perhaps stored as bootstrap records in the DNS. The advantage of this approach is that it appears, on first glance, to be easy and obvious. Its disadvantages include an implicit requirement for agreement on how servers for selected and the list administered. Also, information about prioritization of servers and server search would need to be provided out of band in some way. 2. Each user would need to preconfigure a server, or have that information in a client default. That server would be responsible for determining which servers were to be searched if it did not have the needed records available, those would specify further servers, and so on. This approach would be straightforward and would solve the problem of prioritization. However, especially for searches for web resources, it would tend to automatically give the suppliers of dominant browsers control of server resources and search choices. 3. Some more automated, "rootless", procedure for service location might be used, as in [Mealling-SLS]. Such an approach holds significant promise, but has never been attempted at full Internet scale. However, this issue may not be as important as would appear on first glance. Studies of user behavior indicates that they tend to be extremely impatient. If they have one preferred provider for commonly-used terms, it may be that, if that system does not find the information of interest, their course of action would be to abandon the search (or seek an entirely different method of searching), rather than to continue to other search services and databases. Conversely, it implies that a given search service will find it desirable to either be extremely comprehensive or to use multiple-server search in a way that is invisible to the user (and very fast). 2.3 The Third Component: Locality and/or content-domain-specific data and mechanisms The problem with the faceted global search model is that there are a number of usability and marketplace pressures for naming systems that offer finer granularity and a better match for user needs. For many purposes, users want localized, not global, systems. This has been confirmed in those systems which have been included in experiments or partially deployed (see, e.g., [RFC2345] and the RealNames work and its variants), which require contextual localization, not a single global environment. There are many causes for this, but requirements for very specific searches that are geographic-area, topic-area, or language or culturally specific, tend to dominate the list. Klensin Expires August 15, 2004 [Page 16] Internet-Draft A Search-based access model for the DNS February 2004 The issue is perhaps illustrated by an example. Suppose the granularity of an entry in a faceted system is {"Joe's", "UK", Restaurant,... } Now, one might want to create a business around a restaurant directory for Bristol. The developers would probably want to construct a database that contained exact locations, type of food, menu information, prices, etc., and permit people to query it that way. That type of product bears a strong relationship to traditional yellow pages services: the best attributes to collect and the optimal way to organize them will differ by topic (e.g., for most people, "menu" has no obvious analogy in an automobile repair shop) and the business models are fairly established. Part of the history of those business models is the observation that, when there are competing yellow pages services (or guidebooks, or other, similar services), those who consistently make better (and "more accurate") choices of categories and keywords tend, other things being equal, to be judged "better" and to capture larger market share. A related restaurant example may illustrate another important issue: if one looks for Chinese food in Phoenix, the search key "Chinese restaurant" may be appropriate and adequate: there are few of them, and they are not highly differentiated. In Washington, DC, enough restaurants specializing in Chinese regional cuisines are now operating that more precise categorization is needed. And, in Shanghai or Beijing, "Chinese restaurant" is presumably not a useful category at all: regional or other cooking styles would be key to finding something useful, rather than obtaining an extremely low- precision result. One can imagine many different types of keyword and (yellow pages-like) directory services of this general character, using different types of protocol mechanisms as well as different types of database content and schema. But those services are nearly ideal candidates for competition: there is no requirement that either the providers or the services be global or unique or even highly standardized. Having all three search components bound to the same data sources and perhaps to the same information retrieval interfaces (see the developing DRIS work being done by Wang Liang and his colleagues [WangLiang2003]) --inheriting values from those databases or systems if one wants to think about it that way-- would provide a degree of consistency that might be very attractive to users, so there are clearly issues here that will need to be worked out in the marketplace. Directories of these types are, of course, common and widespread outside the Internet. There is no shortage --some would say there is Klensin Expires August 15, 2004 [Page 17] Internet-Draft A Search-based access model for the DNS February 2004 a surplus-- of directories and guides to resources and services of particular types and in particular areas. Advertising or placement fees from resource owners support some of them. Others are supported by book sales or fees charged to users, and still others by a combination of approaches. Most of these directories and guides publish year after year and seem profitable. Inputs for these locally-based systems will differ by service: one can imagine free-text interfaces and menus (but see Section 2.4 ) as well as systems that more closely resemble faceted search terms. Outputs will normally be globally-valid names: URIs, DNS names, or sets of facets for the global search system. However, since users are unlikely to distinguish between global, faceted, systems and these local ones (or even between them and the DNS or other search mechanisms), it is important that these queries and results be locally cacheable on the same basis as global queries and results to preserve name and reference portability. Summary: Just as the monohierarchical identifier-lookup system at the basic DNS level should be supplemented by a multilingual, multifaceted, multihierarchy search system on a global basis, that global system should be supplemented by a collection of localized, subject- and topic-specific systems. These localized systems need not be centrally coordinated in any way, although enough similarity of function and interface to permit a common local caching environment would almost certainly make them more consistent for users and easier to market. 2.4 The Non-directory Search Component: free-text searching applications The approaches described above omit one set of techniques used today: "web searches" on full text or its equivalent. These systems have an important role (and, similar to the localized and topical searches described here, there seems no particular advantage to trying to standardize them worldwide). But their disadvantage, if seen as a DNS surrogate or replacement, is that they have difficulty distinguishing between the name of something, a pointer to it, and a reference to, or discussion of, it or how it works. The other systems discussed in this document are all "directories" in the sense that someone must make an explicit decision to put an entry in a database; they are not full text searching systems or analogues of them. If, for example, one is looking for a web site for a company, a search of the local "yellow pages" would presumably find that site (assuming the company wanted to be found). Global faceted search (or even the DNS) might find it with some guessing, but this fourth level Klensin Expires August 15, 2004 [Page 18] Internet-Draft A Search-based access model for the DNS February 2004 would (as web search engines do today) probably not reliably distinguish the company's site from sites that reference the company or its products. Locally-specialized search produces information that is explicitly bound to the query, i.e., what one is looking for, while a search engine returns values that also include sites where the subject of the query might have been mentioned. 2.5 Database and searching differentiation In both of the directory-based search components, but especially for global faceted search, we assume that "compiling databases" (i.e., registry and, if appropriate, registrar functions) and "designing and building search functions and providing search services" are separate. It would be necessary to have database interfaces be sufficiently general and well-specified that referrals were possible and different search services could rest on top of them, but we would expect some search services to be much more extensive than others and for their vendors to seek increased compensation for those more extensive servces. In many cases, the market would eventually sort out the optimal combinations of capabilities and costs. Ultimately, the term "fuzzy search", used extensively in this document and elsewhere, is handwaving. Whether heuristic or deterministic, one must devise, for each facet, systems for determining whether matches have occurred and, for inexact matches, whether the combination of query term and database entity are "close enough" together to be candidates for being returned as responses. We can imagine phonetic matching as well as character-string matching, application of contextual rules as well as simple character-pair rules for matching of Traditional and Simplified Chinese, and similar rules for matching of Kanji and kana strings. And we would presume that users, or their agents, would be able to control such decisions by choice of search providers, configuration, or choices on a per-search basis. 3. Context and Model Details: Global faceted search 3.1 The data search and access model It is interesting that recent IETF "directory" work has focused on accessing mechanisms without worrying intensely about the underlying database content, maintenance, and update issues. Those latter issues seem to be the harder ones, i.e., the difference between LDAP [RFC2251] and CNRP [RFC3467] may make less difference than how we structure, maintain, match, and distribute the relevant data. Klensin Expires August 15, 2004 [Page 19] Internet-Draft A Search-based access model for the DNS February 2004 Of course, that does not suggest that work on accessing mechanisms is not important or that it isn't required. And, to deploy the model suggested above, we will need to deal with a pair of uncomfortable problems: o CNRP looks interesting, but has not been widely implemented or deployed in production. o LDAP is widely deployed, but primarily in implementations that contain sufficient extensions and special features to be non- interoperable. Effective referral mechanisms have also not be clearly standardized in LDAP, and this might provide a barrier. Some readers of early drafts of this document have also suggested that the history of LDAP points to local extensions that will result in inconsistent search behavior, while CNRP may be better specified (or at least closer to a clean slate). If we are going to choose -- and global faceted search certainly implies a choice -- we need to figure out how to do that. 3.2 Uniqueness of name structures in global faceted search There are cases to be made both for and against uniqueness of names (more precisely, of the combination of the name-string facet and all of the other facets) at this sublayer, and even a partial middle ground, in which names are unique within a registry namespace, but there are mechanisms for identifying such spaces so that the names are unique across the Internet. The community should address the tradeoffs because no position is ideal; summaries of the extreme positions are below. In none of these cases is it necessary, or even desirable, that the name-string itself (without the additional "attribute" facet values) be unique. 3.2.1 The case for unique names The IAB's discussion of DNS root uniqueness [RFC2826] demonstrates that DNS names must be unique, i.e., that there must not be alternate or surrogate root structures if the Internet is to survive as a seamless whole and be universally addressable and accessible. Even with imprecise matching, part of that argument may apply with the faceted search component, especially if it is the first level at which names and phrases in natural languages (hence including "multilingual" names), rather than constrained identifiers, appear. The mathematical arguments aside, the main argument for uniqueness is that a given combination of name- string and facets will then yield exactly one logical host (or web page, or equivalent, an approach called "direct navigation" in some of the so-called keyword proposals, see [Arrouye]). If this is not the case, it seems inevitable that users will be faced with choices they need to resolve Klensin Expires August 15, 2004 [Page 20] Internet-Draft A Search-based access model for the DNS February 2004 even when they have an exact match for a full set of facets. Users clearly prefer such approaches. The often-cited user ideal is to be able to enter a very short and simple string and have exactly the desired resource appear, more or less on a "do (or find) what I mean" basis. Unfortunately, reality has a tendency to intrude on such systems, as discussed below and in [RFC3467]. If the name structures stored in the databases of a global system (faceted or otherwise) still must be unique, some mechanism for registries or structuring of names will be necessary to avoid conflicts. The problem is somewhat easier than the ones encountered by ICANN and its associated groups because the very structuring of the names and attributes creates opportunities for dividing up responsibilities, but the registration problems exist nonetheless and would need to be resolved. Consequently, the requirement for uniqueness is best avoided if that is possible. 3.2.2 Non-unique names Conversely, one could have multiple appearances of the same set of facets (including the name-string), such that an exact match could still yield multiple "hits". This would have the advantage of eliminating all requirements for monopoly registries or [other] technical mechanisms for guaranteeing that name conflicts did not occur. The disadvantage is that it would force more user choices or heuristics, and at least some errors in which the wrong host or site was identified would be almost inevitable. Issues of non-uniqueness, and having to seek additional information to differentiate among choices, are typical in normal life (see the discussion of "caching", below); it is unlikely that we can make the Internet different. As extensive use of intelligent per-user (or per-group) local caches or directories ("bookmarks", "favorites", etc.) evolve, which we consider almost certain, they might also make the difficulties with non-uniqueness insignificant. This would be especially likely if these directories contained not only a keyword and (DNS name or URI) target, but also a stored form of the search used so that local data could be recalculated and replenished. See Section 3.5 and Section 3.6 for some related discussion. 3.2.3 A middle ground approach: artificial uniqueness A proposal was made in the initial version of [Mealling-SLS] that an additional facet could be added to represent the registry which records the names. If this were done, names could be kept unique within registries and would be globally unique as long as the registry-identifying facet had a unique value for each registry. Klensin Expires August 15, 2004 [Page 21] Internet-Draft A Search-based access model for the DNS February 2004 There would be no need to restrict the number of registries in this model or resolve naming disputes among them -- each one could have a unique, randomly-generated and assigned identifier-- so the approach could provide some degree of technical uniqueness while still preserving most of the benefits of the non-unique approach. That model could, of course, be deployed at a "registrar" level instead, just by changing the assignment of the identifier facet from value-per-registry to value-per-registrar. Other variations are, of course, possible. Whether it is desirable or not is an open question, since it inherently turns each registry (or registrar) into an arbiter of priorities or rights to names, or requires that some outside agency perform that function. There seem to be strong arguments for avoiding those alternatives. 3.3 Sources for controlled-vocabulary facets ("attributes") We anticipate that most of the facets other than the name-string itself will have values chosen from controlled vocabularies. I.e., the user-registrants will be able to select whatever values seem to match their needs, but only from pre-defined lists of possible values. These are not intended as free-text entities; to make them free text would push the second-sublayer system toward the lowered precision of Internet search engines and other free-text search environments. The facet values that are not populated from controlled vocabularies will be determined by deterministic and unambiguous rules. For example if one of these attributes is a geographic location that uses a coordiate scheme, the definition of the coordinate scheme should be sufficient to yield a predicatable and exact value. The question, then, is how to establish the vocabulary lists and write the definining rules. It has been something of an Internet tradition, building on Jon Postel's principles for registration and registries, to try to avoid having IETF or IANA become embroiled in controversies about names, their ownership, propriety of using them, and so on. The use of IS 3166-1 alpha-2 codes as the basis for "country code" top-level domain names (see [RFC1591]) is just one instance of the application of this principle. Following this tradition, facets should be chosen, in part, on the basis of availability of pre-existing, well-known lists of names and authorities or, at worst, the ability to identify relatively non-controversial authorities who can quickly establish such lists. Klensin Expires August 15, 2004 [Page 22] Internet-Draft A Search-based access model for the DNS February 2004 Some specific possibilities are discussed in the subsections that follow. 3.3.1 Discussion of language identification The IETF already has a standard for identifying languages and dialects, documented in [RFC3066] and based on ISO Standard 636. It appears that it would be usable here, with minimum fuzziness associated with an exact match of all subtags and a higher degree of fuzziness permitting matching different (national or dialect) variations on the same language. 3.3.2 Discussion of geographical identification For larger countries, and areas with many semi-independent administrative districts, identification of the country may not provide sufficiently precise resolution. On the other hand, it is desirable to have a scheme that is hierarchical or that otherwise readily permits search expansion. Conceptually, the coding should be something like country / administrative-district / city or town Fortunately, such a system exists as a generalization of one that is in common use in the Internet. ISO 3166-2 provides a model, and list of values, for representing countries and administrative districts, and is designed to be compatible with the UN/LOCODE list when those further subdivisions are provided and satisfactory from a national point of view. Since ISO 3166 is probably even more satisfactory for this purpose than it is for its use in defining ccTLD names, it should probably be used (with the UN/LOCODE where appropriate) unless something clearly better can be found. For example, a complete coding using this approach would be something like "DE-BW-DESTR" for Stuttgart. The corresponding matching rules seem obvious, but, to review them: o If the stored record contains all three elements, then a query of (and fuzziness=exact) should imply that "country" matches everything "country and subdivision" matches all cities in that subdivision, but does not match other subdivisions "country, subdivision, city" matches only that exact stored record. o ...???... The "fuzziness" indicator should be fairly clear here, e.g., 0=exact, 10=match next level ("country, subdivision, city" matches the whole subdivision), 99=all levels ("country, subdivision, city" matches the Klensin Expires August 15, 2004 [Page 23] Internet-Draft A Search-based access model for the DNS February 2004 whole country), and intermediate values might match adjacent cities or subdivisions using some reasonable distance or adjacency function. 3.3.3 Discussion of Industry Types The WIPO codes, discussed above, are suitable for companies and industries of the types that normally use the trademark system. They are not a good model for identifying individuals, nor are they suitable for most non-profit organizations, governments, and NGOs. The facet described as "industry type" here will need to be organized so as to identify and accommodate separate classification systems for different types of entities. 3.4 Deployment against the existing DNS base As with the "new class" approach to DNS changes [NEWCLASS], the approach outlined here does not require any changes to the existing installed DNS base. But, like all solutions to the multilingual name issues, it requires changes to all relevant applications. The notion of moving from lookup to searching does imply that we will need not merely to change the code that calls the name resolution system, but also to rethink the UIs of those applications. 3.5 Thoughts about user interfaces (UIs) There are many possible models for user interfaces to be used with a system of the type proposed here. The IETF should, as usual, remain agnostic about them. At the same time, some notions about possible user interfaces are important to demonstrate that the concepts are practical and to inform the design of protocol interfaces. So, with the understanding that other approaches are possible, and may be preferable: As discussions on both DNS "searching" and under the somewhat misnamed topic of "multilingual names", and the general model presented here, have evolved, it has become apparent to some observers that these approaches would be best realized in conjunction with user-specific directories or memory with refresh capability, whether modeled on a local directory, or cache, or history file, or something else. It has been surmised that the behavior of typical users is to spend most of their time using or referencing known services and hosts (whether web sites, hosts used in email addresses, or other services) and much less time "searching" for unknown resources. If this is actually the case, then a typical reference should involve a DNS "name to address" lookup only, even though it would be desirable for the DNS name to not be visible to that user. The user might reasonably see his or her original collection of search terms, or a name assigned to that search or its results, but Klensin Expires August 15, 2004 [Page 24] Internet-Draft A Search-based access model for the DNS February 2004 actual searching would take place only as a first-time activity or in the process or refreshing the search and results (at user request or, perhaps, automatically). An approach for handling these issues appears in Section 3.6.2. 3.6 Implementation models While this document is not an implementation specification, nor is it intended to substitute for one, some remarks about implementation issues may be helpful in understanding the concepts that appear elsewhere. 3.6.1 Calling and returning values While it is not the only way to do it -- and others may be more efficient -- it is useful for this section to consider the database associated with a given server/provider as consisting of a collection of records, each of which consists of a key tuple consisting of one value for each of the facets, a URI, a text field of supplemental (or "comment") information, and an expiration date and/or TTL. The textual field is expected to be useful to the user (or an agent acting for her) in differentiating between URIs or other target information. Some structuring of it, and/or tagging of the information it contains, would probably be desirable, as would some upper bound on length. A potentially long and highly structured logical content for this field could be provided by the use of a reference via a URI, or the primary URI could provide a pointer to such information that indirects to the actual content being sought. A query to the server consists of a set of (facet, fuzziness indicator) pairs, one pair for each defined facet. A null value is defined for each facet; use of that value implies that any value for that facet in the database would be considered as matching, regardless of the fuzziness indicator value. A given server may choose to reject a query that specifies null values for one or more facets. Unless all values for the permitted level of fuzziness are set to disable fuzzy searching and matching, the list of facet values in the query need not correspond exactly to any record in the database for records to be successfully returned. The server can then return: o A "not found" response, indicating that no records were found that matched the facets within the specified fuzziness criteria. o A response that the query is not acceptable, e.g., because of null values for specific facets. This response would indicate the Klensin Expires August 15, 2004 [Page 25] Internet-Draft A Search-based access model for the DNS February 2004 facet(s) impacted. o A normal reply. That reply would contain one or more records, each consisting of * The facet values as stored in the database * The URI as stored in the database * The textual comment value, if any * A TTL for the response. This provides information about what was actually matched, suitable for caching and repeating of the query as needed as well as user selection from the records and/or immediate use of the URL. 3.6.2 The cache model The model proposed here is ultimately one of "searching" -- finding a resource in a way that may involve some interaction between the various databases and the user. It differs from the "search engine" approach because the databases are intentionally populated (not unlike the DNS, although syntax and semantics are different) and the searches are highly structured. With the "search engines", the databases are largely populated by automated processes that walk through the Internet (or the web) picking up data of possible interest. And the queries use, at most, boolean conditions, not a structured, faceted, architecture. The obvious advantage of a search technique of this sort is that it should have good odds of permitting owners or operators of resources who wish those resources to be found to have them efficiently found by those who are looking for them. But it is unlikely that the process can be made as fast or resource-minimizing as a DNS lookup where the fully-qualified domain name is already known. At the same time, the nature of the systems being proposed makes it likely that a user will think of a particular resource (or its location) in terms of the terminology used to find it. And, especially if the user needs to be involved in the search and resolution process to identify a resource (or resources) of interest from among those that match a set of facets, users will not tolerate having to go through the process on every reference. The combination of these factors makes it almost essential that it be possible to maintain a local table of references and targets (in DNS or URI terms) so that additional references soon after the first can be used by protocols to directly access recently-used targets without having to go through the search and resolution process each time. The process of locating telephone numbers may constitute a useful analogy here. Few would find it conceivable to approach the telephone system the way the DNS is often approached: to start guessing and dialing numbers, without prior hints, as the way to find the correct number for a particular enterprise or individual. Klensin Expires August 15, 2004 [Page 26] Internet-Draft A Search-based access model for the DNS February 2004 Instead, people use a number of resources that lie outside the telephone number system itself to locate a number. These resources might include: o White pages directories. These support fairly exact search, but with some cross-references, added semantics or qualifiers, and the ability to take advantage of being able to see adjacent listings. o Calling a telephone operator and asking. This is typically an indirect method of conducting a white pages search, but may involve additional mechanisms. o Yellow pages directories. These are organized by topic, with the topics varying by locality. One first finds the relevant topic, then the entity of interest. o Other sources, such as advertisements, articles, or references. o The "ask a friend" technique: find someone who knows the relevant number and ask. In each case, most users will find a way to remember the number if it will be used again. They are entered into personal address books, recorded in intelligent telephones, or remembered in "recently called" lists. These mechanisms are similar to the "cache" being posited here. And it should be noted that the mechanisms used are quite similar to those typically used for email addresses. "Guessing" may be appropriate for a number or email address that is already known, at least to some degree of certainty, but is not generally workable if the target value is unknown. Even "soon" may be quite different from our experience with the DNS. With the DNS, the resources bound to names are typically IP addresses or something similar, and these change frequently enough, often on short notice, that "time to live" (TTL) values are typically short, rarely more than a day. By contrast, the faceted name resulting from a global search, or the information from a localized one, are likely to represent a fairly long-lived relationship with the DNS names and URLs that they identify. Clearly, it should be convenient for the user to reinitiate the search when that is obviously needed (e.g., if a target goes bad) but TTLs for ordinary refreshing of a search will, in most cases, be set closer to the order of weeks than to minutes or hours, with the DNS taking responsibility for the volatile portion of the references, as it does today. A facility similar to this is provided for web browsers by the common "bookmarks" or "favorites" functions, but those support only a mapping between a user-specified name and a URI. If the URI goes bad, or the information used to determine it becomes obsolete, there is no mechanism for repeating the search other than the user's memory of what the name might have meant. Caching operations powerful enough to prevent unnecessary searches or user intervention in this environment require much greater functionality. Klensin Expires August 15, 2004 [Page 27] Internet-Draft A Search-based access model for the DNS February 2004 The facility needed here (extended "bookmarks" or "favorites" if it is useful to think of them that way) can be thought of as a local cache of queries and responses with sufficient information to both immediately locate a target associated with the user's perception of what was looked for and of "refreshing" the search if circumstances changed or values timed out. The idea of a "search" here should be very general, and might even extend to a reference such as "I asked my friend the following question" (we would not expect references of that type to be automatically repeated, but the source information is useful). In the presence of a particular query, a client system would presumably check for a matching cache entry. If one was not found, the specified search would be performed, yielding values that might require user intervention for selection. Once selected, the search, the full set of facets returned, the URIs, and any TTL information would be stored (possibly using a user-supplied name or tag) and the resource accessed via the appropriate DNS name or URI. If the search or tag was found in the cache, checks would be made for the values being current and then the DNS name or URI used directly, without going back through the search procedure. One useful consequence of this is that the number of queries to the database will be roughly proportionate to the number of new inquiries by the user (increased by the impact of TTL timeout and user-initiated repeated search). That number should be much smaller, and hence imply significantly less load, than per- reference DNS queries. 3.6.3 An example: Looking at Chinese Traditional-Simplified Mappings One of the problems that the IDN WG has been unable to solve in a satisfactory way is the requirement that strings written with Traditional Chinese ("TC") characters match those written with the corresponding Simplified Chinese ("SC") ones. The relationships among these characters have been variously described as similar to font differences that are not properly reflected in the IS 10646 coding and structure and as similar to case mapping in alphabetic scripts that support case. Although both are thought-provoking, there are significant weaknesses in both analogies. But the problem is sufficiently important that the working group has received requests to delay DNS-level internationalization implementation of all (or selected subsets of) Chinese characters. Fortunately, mapping between TC and SC is fairly easily handled at sublayer two of the system proposed here. Details and variations still need to be worked out and a specific proposal chosen and refinded, but it appears that something similar to the following outline would be one option: Klensin Expires August 15, 2004 [Page 28] Internet-Draft A Search-based access model for the DNS February 2004 Unlike the DNS, the sublayer two system will have the critical language identification information available. This eliminates the problems associated with distinguishing Chinese character usage from uses of similar characters (at the same IS10646 code points) in Japanese and Korean. Assuming that the language is Chinese, "fuzziness" could be used to determine the precision of matching required. E.g., "no fuzziness" might be construed as "exact match", i.e., no attempt at TC-SC matching. A low (but non-zero) fuzziness value might permit unambiguous single- character (i.e., "one to one") matching between TC and SC characters, but no other variations. And a higher degree of fuzziness might match more extensively, including cases in multiple characters of context or user selection from a menu or pick list were needed to determine a correct match. [[ Note in draft: Is distinguishing between these two cases actually helpful? I would think it would be useful in the design of good-quality user interfaces ]] If it were worthwhile, other variations on a sublayer two system could be used to handle different character input models as server functions. For example, use of a different language subtype (or a heuristic on the name string) could permit phonetic input (presumably Pinyin, but, if anyone wanted it, a different subtype could permit use of alternate systems such as Wade-Giles) even though the names in the database were stored in Chinese characters. Use of phonetic input of course absolutely requires matching of TC and SC characters. An interesting approach, using language-specific variant tables, appears in [JET-Guideline]. That approach is designed to work in conjunction with IDNA and involves client-based variant tables. With obvious modifications to bring the tables onto the server and to treat some of the variants as different degrees of approximations, it might be even more effective in the environment proposed here. 3.6.4 An example: Distance functions and Latin-based alphabets The discussions of case mapping for scripts in which the rules are subtle or culturally dependent has restarted the argument in some quarters as to whether the case-mapping rule of the DNS was wise. The alternate position is that users are better off with a single form of writing an identifier and that they will then "get used to getting it right". The use of fuzziness with such scripts might permit this issue to be left to the user or interface designer, e.g., no fuzziness would imply no case matching, somewhat more fuzziness would permit case matching in those cases where the rules were exact and one-to-one, and additional fuzziness would permit matching, e.g., with and without diacritical marks or across character variants. The presence of language information makes these approaches much more Klensin Expires August 15, 2004 [Page 29] Internet-Draft A Search-based access model for the DNS February 2004 workable than they would be with the DNS, even with a more complex canonicalization process than is now anticipated in "nameprep". 3.7 Older applications To fully realize the benefits of internationalized naming requires changing all relevant applications to understand the new method, whatever it is. Even the "internationalize the DNS" proposals are subject to this principle. Older applications will see distorted and unfriendly names under some systems, and no names at all under others (some approaches might cause implementations of some applications to fail entirely). The environment contemplated here is a "no international names in old applications", i.e., "no new names without upgrading", one -- applications that have not been upgraded will not see internationalized names or other natural-language phrases, nor coded surrogates for them. The advantages of a "no names without upgrading" approach are that it avoids confusion and the risk, however slight, of catastrophe. As with the original host table to DNS conversion, they provide an incentive to convert old applications to make newer naming styles, and newer names, visible. None of these transitions are ever easy, but it may be worth going through this one to get things right, rather than investing a large fraction of the pain to get a solution that doesn't quite do the job. 4. Context and model details: Localized and Topical Searching ...to be supplied??... 5. Comparisons to existing and proposed technology 5.1 The IDN Strawman After the IETF IDN working group came into being, it rapidly excluded all models not based on the assumption that internationalized name referencing issues and requirements -- including the requirements, not heretofore satified even for ASCII-based names, to be able to search for things using the DNS-- could be achieved by placing non-ASCII identifiers into the DNS itself, in some coded form. These identifiers were commonly described as "multilingual names". That terminology further complicated the work program and consensus-seeking process in that working group. Many of the problems associated with trying to overload the DNS in this way have been described in [RFC3467]. That document, and the Klensin Expires August 15, 2004 [Page 30] Internet-Draft A Search-based access model for the DNS February 2004 experience from which it is drawn, predict that the products of the IDN WG effort, specifically the IDNA standard, will ultimately fail if they are evaluated in the context of applications that require sensitivity to the characteristics of particular languages, rather than just an expanded set of characters to be used in identifiers. As implied in the "DNS role" [RFC3467] document, consideration of language-related issues and their appropriate handling was one of the primary motivations for the model developed here. However, at least from the viewpoint of this author, one important question remains: assuming that the IDN WG's work is carefully confined to characters and identifiers, does the value of local- language identifiers justify putting non-ASCII strings into the DNS even if end users never see them? We argue in section 2.1 that it is not necessary and poses some risks. However, the "variables in programming languages" analogy and the "local directory or cache" approach, both outlined above, suggest that such names would be extremely useful and fairly safe if the limits of code-point-level matching and identifier-only use are taken narrowly and observed conservatively [ICANN-Permitted]. And, if one believes the model outlined here, or any competing "keyword" model (see next section), will achieve wide deployment and use, the needs and perspectives of such systems should condition the evaluation of IDN WG-produced alternatives. So there is a serious and complex set of engineering (and, realistically, political) tradeoffs to be evaluated in making the decision as to whether wide deployment of some version of the IDN work is appropriate. 5.2 "Keyword" systems In the Internet object-referencing context, the term "keyword system" has been used to refer to many different things. Many would fit nicely into the localized search environment, but most of the existing proposals put them directly on top of the DNS, or skip the DNS entirely and go directly to IP addresses. The difficulty with these systems is that they either must be localized (e.g., a different system or database for each language, country, or smaller locality) or they don't scale well. Arguably, some don't scale well even if localized. In particular, they eventually suffer from either the "all the good names are taken" problem (of which the DNS is frequently accused) or they are very vulnerable to poor retrieval precision properties as the number of names (or keyword combinations) in the name space grows large. I.e., like so many other ideas for the global Internet, they work in constrained environments, but cannot adjust well to large scale. Adapting bibliographic styles of keyword systems to operate locally as part the models proposed here would appear to be the best way Klensin Expires August 15, 2004 [Page 31] Internet-Draft A Search-based access model for the DNS February 2004 forward for such systems. It has been observed that what most users really want most of the time is localization, and locally-oriented keyword systems could satisfy much of that requirement. Keyword systems would also be strengthened by being placed on a base of use and language-sensitive naming and searching, and a very strong local cache, rather than on the low- context, monohierarchical, DNS. Other types of keyword systems, including the one described by Arrouye and Popp [Arrouye], are really special cases of the global faceted search service. They rely on careful selection of names (and, consequently, resolution of "best fit" and "rights") to achieve uniqueness and, hence what they describe as "direct navigation" (see elsewhere in this document). Similar systems might utilize a set of keywords combined into a phrase that can be interpreted, possibly with permutation rules, in a search service. In the interest of simplification and presenting simple names to users, these systems are likely to omit most or all of the non- name string facets from user-visible search interfaces. Some further analysis, as to whether what is optimally desirable is a set of unordered keywords, or an ordered phrase that might contain such keywords, seems called for. Different answers could, of course, be implemented in different components of this model. 5.3 Client-side and server-side solutions IDNA, and other key approaches considered during the IDN WG's deliberations, are essentially client implementations, applied to names before they are placed in the DNS and to queries before they are passed to the DNS. This contrasts with the existing use and protocols of DNS in which, e.g., string matching is done on the server. Ignoring speed of deployment (which can be argued either way), the advantage of client-side implementations is that they don't require changes to the DNS fabric itself (and therefore minimize the risk of damaging existing applications that rely on that fabric). Because the mechanisms discussed here do not rely on the DNS for any searching or matching activities, and are completely new, server-side implementations are again feasible: applications will require modification to access these services (just as they would to support a client-side implementation), but older, unmodified, applications will not touch them at all. Server-side implementations have several advantages over client- side ones. If something complicated is being done, it is often possible to apply more computer resources, or larger tables, on a server, and to update those resources and tables more easily if needed. And server-side implementations tend to yield more uniformity of behavior relative to having a potentially wide mix of client implementations. Klensin Expires August 15, 2004 [Page 32] Internet-Draft A Search-based access model for the DNS February 2004 However, integrity protection procedures that depend on similar computations on client and server, such as those that rely on digital signatures computed over the data, may not eliminate the requirement for client-side computations. See Section 10 6. Comments on business models Historically, the IETF has had even less desire to involve itself with business models than it has with user interfaces (see Section 3.5). But the approach outlined here, and the protocol and operational proposals that will derive from it, face a particular challenge: the DNS works well for its intended purpose (something we don't intend to change) and arguably works at least tolerably for some purposes, including as a search engine, for which it was not intended. Many of us see its quality and capabilities, when used as a search (or, more accurately, "guessing") engine deteriorating. Collapse, if it occurs, is still in the future if it occurs at all, although recent trends seem to point to less dependence on the DNS before that system passes its critical point (see [RFC3467] for more discussion on this topic). There are also considerable vested interests -- both economic and policy control-- associated with the current DNS structure and arrangements. he ability to produce and deploy a different model, especially one that requires new work in several areas, against that backdrop will be challenging at best. Unless there are clear business models for doing so, the odds of success are quite low. So this section outlines some of the business issues and models not covered elsewhere in this document. As with the user interface discussion, it is not intended to be definitive: some of these models may fail and others may be more attractive. But it is intended to provide a sufficient demonstration of concept to perhaps permit the technical ideas to be taken seriously. We observe that a telephone system analogy may be helpful. With the telephone system, there are registries, described as national numbering databases, that record which numbers are in use and by whom. There are white pages services which, given locale and some other information (e.g., whether business or residential in some areas) and a near or exact match to a name, provide name to number lookup. And there are yellow pages services, with precise categories and organization differing somewhat from one location to another. Organizations make money at all three levels, but the greatest aggregate income occurs with the yellow pages services. At each of sublayers two and three, there are multiple services. Some of these would probably need to be operated as public goods, spreading costs over the producers of other services. Others would Klensin Expires August 15, 2004 [Page 33] Internet-Draft A Search-based access model for the DNS February 2004 presumably be directly profitable. 6.1 Faceted global searching 6.1.1 Facet listings and identification For the attribute facets that rely on controlled vocabularies, some organizational structure would be required to oversee those vocabularies. As suggested elsewhere, the ideal would be to use pre- existing organizations and pre-existing lists (the WIPO classification of goods and services [WIPO-NICE] is an example of such a list, as would be the IS 3166-1 list traditionally used for country code domain names. Where such lists did not exist, it would be necessary to build arrangements for them. The maintenance of such vocabularies would, from a global Internet standpoint, be a public good. 6.1.2 Registration and searching Actual registrations would be required for names and their attributes with, as mentioned above, multiple registrations when an individual, organization, or business wished to be registered with more than one attribute set. The economic model would presumably parallel the current registrar and registry business, with a charge for registration (since there is no intrinsic requirement for a single registry, registry services might well be competitive, eliminating the need for models that separate registries and registrars. However, lookup and search activities would be more flexible than the DNS, with extended services, including character set transposition, language translation, and potentially more extensive search variations being potential areas on which providers could compete, using fee for service or subscription models to support costs. 6.2 Localized and topical databases and searching As mentioned above, yellow pages and publication of directories and guidebooks are traditionally where the money has been made. The analogies apply: one could imagine charging for entering information into the databases, or for searching, or for information delivered, or all three of these. And all have been used for papers and related databases. 7. Glossary ...??See Placeholder... Klensin Expires August 15, 2004 [Page 34] Internet-Draft A Search-based access model for the DNS February 2004 ACE ...To be supplied... Encoding form ...To be supplied... Facet ...To be supplied... ISO10646 ...To be supplied... Keyword (see Section 5.2) Multilingual name (see Section 5.1 ) UCS-4 ...To be supplied... Unicode ...To be supplied... 8. Summary The solution to the "multilingual DNS" problem, and to a series of other limitations of the DNS relative to today's expectations for naming and searching, lies in solutions targeted to those problems, rather than superimposing additional mechanisms on the DNS in ways that, those who advocate them hope, will not cause problems with older programs and unconverted infrastructure. Inserting new search layers avoids those risks and permits a clean solution that is adapted to the problems, rather than the limitations imposed by existing properties of the DNS. 9. IANA Considerations and related topics At search layer two, it is difficult to think about how the system might function successfully without controlled vocabularies for each of the non-name facets. As discussed in section 2.2, we have already established one such registry (bound to an ISO standard), and mechanisms for utilizing it, with RFC 3066. The Madrid agreement and its predecessors [WIPO-NICE] provide classifications for types of businesses, but we would need to extend the registry for names that are not business-related. The two locational attributes are somewhat vague at this point, but controlled vocabularies would presumably be needed, and should, if possible, be drawn from stable, non-IETF, work (e.g., IS 3166-1 and 3166-2 might provide a foundation, and possibly a complete list, for the location vocabulary). Curiously, there is no technical reason why the name-strings themselves must be unique: that is one of the attractions of a model like this over attempting to overload the DNS. If conflicts or confusion occur, those are standard civil (marketplace or trademark) issues that can be resolved in their own environments, rather than posing special Internet problems. 10. Security Considerations Additional layers of naming, searching, and databases imply addition of opportunities for compromising those databases and mechanisms. Part of the challenge with the model implied here is to determine how to secure and authenticate those databases and access (especially Klensin Expires August 15, 2004 [Page 35] Internet-Draft A Search-based access model for the DNS February 2004 modify access) to them. The good news is that, since the functions are new, we should be able to design security mechanisms in, rather than --as with the DNS-- have to try to graft them on to a structure not designed for them. A particular issue is integrity protection of responses and possibly queries, analogous to the capabilities DNSSec is expected to provide for the DNS [DNSSEC??]. It would be desirable to avoid having to make potentially-complex signature computation on both clients and servers (as in DNS). One approach would be to authenticate the source and verify transmission integrity, but that may or may not be sufficient. 11. Acknowledgments This document, and some related notes, are the result of thinking that has come together and evolved since before the issue of internationalized access to domain names came onto the IETF's radar. Discussions with a number of people have led to refinements in the approach or the text, even though some of them might not recognize their contributions or agree with the conclusions I have drawn from them (indeed, some of those discussions were rooted in challenges to the general ideas expressed here). Particularly important suggestions have come from, or arisen out of conversations with, Ran Atkinson, Harald Alvestrand, Rob Austein, Fred Baker, Christine Borgman, Eric Brunner-Williams, Randy Bush, Tim Casey, Vint Cerf, Kilnam Chon, Dave Crocker, Leslie Daigle, Patrik Faltstrom, Michael Froomkin, Francis Gurry, Marti Hearst, Paul Hoffman, Kenny Huang, Marylee Jenkins, Dongman Lee, Xiaodong Lee, Karen Liu, Mao Wei, Michael Mealling, Erik Nordmark, Gary Oglesby, Mike Padlipsky, Qian Huilin, James Seng, Theresa Swinehart, Tan Tin Wee, Len Tower, and Zita Wenzel, as well as some memorable long-ago conversations with Jon Postel and J.C.R. Licklider. The first version of this Internet Draft was posted in May 2001, after fairly extensive public discussion of the underlying issues and required technology during the preceeding nine months. 12. Changes between versions 12.1 Major changes between version 05 and 06 This version continued to tune the document, completing and clarifying the transition between strict layering and alternative components above the DNS. Some other issues have been clarified and more details filled in. Klensin Expires August 15, 2004 [Page 36] Internet-Draft A Search-based access model for the DNS February 2004 12.2 Major changes between version 04 and 05 After considerable discussion (little of it, unfortunately, involving the IRNSS list) about return values and "layering", this version considerably restructures the model of both. In the return value case, the output of faceted search is now specified as containing one or more URIs, not just DNS name(s). There is some discussion of the motivation for this in the text, but the key issue is that users are almost certain to search for resources that make sense to them: the distinction between a DNS name and a URI is too subtle and the latter does not adequately locate user-visible resources. The layering issue is more significant, at least in terms of this work and how it has been presented. Our original assumption was that the localized and topical searches would rest on top of the faceted ones, producing faceted values as outputs. After more discussion and examination of likely cases, it has become clear that the two are better thought of as independent and complementary models, with each other and with web searches -- all still layered on top of the DNS. The text has been changed to reflect this, but might not yet be completely consistent with it. Pointers to omissions would be appreciated. 13. Placeholders For some reason, new ideas or approaches, or ways of presenting or clarifying existing ones, seem to arise immediately before a version of this document is submitted for posting. It has often been impossible to properly incorporate these. The following are pending, and will be picked up in the next revision: 1. A new section Section 3.3.3 on "Discussion of Industry Types" that will introduce a better model (and less handwaving) for handing industry type codes where they are appropriate and structuring data for that facet for other types of names. Version 05 contains the beginnings of that discussion. 2. The discussion of Localized and Topical Searching, for which Section 4 is a placeholder, must still be completed. 3. Section 3.6.3 should be reviewed with people who actually understand the language and issues and then rewritten (this task may have been superceded by the ongoing work with [JET-Guideline]). 4. Section 3.6.4, which is now just an outline, needs to be filled in. 5. Completion of the glossary, which seems to be necessary for readers who have not been immersed in, e.g., the discussions of the IDN WG. This work should be reviewed in the light of the definitions in [RFC3536] and elsewhere. Klensin Expires August 15, 2004 [Page 37] Internet-Draft A Search-based access model for the DNS February 2004 6. The material on calling and return values (Section 4), as originally prepared for draft version 02, was not coherent and has been replaced. The material there on the textual ("comment") field should be carefully reviewed -- it may not be right. (From 04 -- no comments yet received.) 7. The new section Section 2.2.6 may need to be expanded and discussed further. 8. In versions prior to -04, Section 3 was largely a discussion of what was then called search layer two (i.e., global faceted search) issues, with a few asides about search layer three (i.e., localized search). With version 04, that distinction has been made explicit and a new section four inserted as a placeholder for a similar discussion about search layer three. That section should be supplied for version 05. Most of the references in this document are to examples of approaches to the systems outlined here, or provide additional information about the context of some of the suggestions, or are included to give credit for particular ideas or to better identify earlier and approaches. None of those references are normative in the protocol sense typically used in the IETF. Normative References [RFC0882] Mockapetris, P., "Domain names: Concepts and facilities", RFC 882, November 1983. [RFC0883] Mockapetris, P., "Domain names: Implementation specification", RFC 883, November 1983. [RFC1035] Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, November 1987. [RFC2026] Bradner, S., "The Internet Standards Process -- Revision 3", BCP 9, RFC 2026, October 1996. [RFC2826] Internet Architecture Board, "IAB Technical Comment on the Unique DNS Root", RFC 2826, May 2000. [RFC3066] Alvestrand, H., "Tags for the Identification of Languages", BCP 47, RFC 3066, January 2001. Informative References [Arrouye] Tan, T., Lee, X. and Y. Arrouye, "Keywords Systems - Definition and Requirements", draft-arrouye-keywords-reqs-01 (work in progress), February 2002. Klensin Expires August 15, 2004 [Page 38] Internet-Draft A Search-based access model for the DNS February 2004 [Austein2001] Austein, R., "Private communication", 2002. [HOSTNAME] Harrenstien, K., Stahl, M. and E. Feinler, "Hostname Server", RFC 953, October 1985. Also Braden, R., ed. "Requirements for Internet Hosts - Application and Support", RFC 1123, October 1989. [I-D.klensin-registration] Klensin, J., "Registration of Internationalized Domain Names: Overview and Method", draft-klensin-reg-guidelines-02.txt (work in progress), February 2004. [ICANN-Permitted] ICANN IDN Committee, "Briefing Paper on IDN Permissible Code Point Problems", February 2002. Also see "Internationalized Domain Names (IDN) Committee: Final Report to the ICANN Board", http://www.icann.org/ committees/idn/final-report-27jun02.htm, 27 June 2002. [ISO10646] International Organization for Standardization, "Information Technology - Universal Multiple-octet coded Character Set (UCS) - Part 1: Architecture and Basic Multilingual Plane", ISO Standard 10646-1, May 1993. [ISO5127] International Organization for Standardization, "Information and documentation -- Vocabulary", ISO Standard 5127, 2001. [JET-Guideline] Seng, J., "Internationalized Domain Names Registration and Administration Guideline for Chinese, Japanese and Korean", draft-jseng-idn-admin-05 (work in progress), October 2003. [Mealling-SLS] Mealling, M. and L. Daigle, "Service Lookup System (SLS)", draft-mealling-sls-02 (work in progress), July 2002. [NEWCLASS] Klensin, J., "Internationalizing the DNS -- A New Class", draft-klensin-i18n-newclass-02 (work in progress), June 2002. Klensin Expires August 15, 2004 [Page 39] Internet-Draft A Search-based access model for the DNS February 2004 [RFC1591] Postel, J., "Domain Name System Structure and Delegation", RFC 1591, March 1994. [RFC1625] St. Pierre, M., Fullton, J., Gamiel, K., Goldman, J., Kahle, B., Kunze, J., Morris, H. and F. Schiettecatte, "WAIS over Z39.50-1988", RFC 1625, June 1994. [RFC2251] Wahl, M., Howes, T. and S. Kille, "Lightweight Directory Access Protocol (v3)", RFC 2251, December 1997. [RFC2345] Klensin, J., Jr, T. and G. Oglesby, "Domain Names and Company Name Retrieval", RFC 2345, May 1998. [RFC2396] Berners-Lee, T., Fielding, R. and L. Masinter, "Uniform Resource Identifiers (URI): Generic Syntax", RFC 2396, August 1998. [RFC2772] Rockell, R. and B. Fink, "6Bone Backbone Routing Guidelines", RFC 2772, February 2000. [RFC2822] Resnick, P., "Internet Message Format", RFC 2822, April 2001. [RFC2825] IAB and L. Daigle, "A Tangled Web: Issues of I18N, Domain Names, and the Other Internet protocols", RFC 2825, May 2000. [RFC2972] Popp, N., Mealling, M., Masinter, L. and K. Sollins, "Context and Goals for Common Name Resolution", RFC 2972, October 2000. [RFC3454] Hoffman, P. and M. Blanchet, "Preparation of Internationalized Strings ("stringprep")", RFC 3454, December 2002. [RFC3467] Klensin, J., "Role of the Domain Name System (DNS)", RFC 3467, February 2003. [RFC3490] Faltstrom, P., Hoffman, P. and A. Costello, "Internationalizing Domain Names in Applications (IDNA)", RFC 3490, March 2003. [RFC3491] Hoffman, P. and M. Blanchet, "Nameprep: A Stringprep Profile for Internationalized Domain Names (IDN)", RFC 3491, March 2003. [RFC3536] Hoffman, P., "Terminology Used in Internationalization in the IETF", RFC 3536, May 2003. Klensin Expires August 15, 2004 [Page 40] Internet-Draft A Search-based access model for the DNS February 2004 [SHI-CACHING] Shi, X. and K. LIU, "Caching Mechanisms in Layered DNS Search Services", draft-xhshi-dns-search-caching-00 (work in progress), October 2002. [WIPO-NICE] World Intellectual Property Organization, "", June 1957., "Nice Agreement concerning the International Classification of Goods and Services for the Purposes of the Registration of Marks", June 1957. [WangLiang2003] Wang, L., Guo, Y. and F. Fang, "Information Retrieval Protocol for Digital Resources", draft-liang-irpdl-03.txt (work in progress), November 2003. [XDLee-cnnamestr] Lee, X. and Y. WANG, "Chinese Name String in Search-based access model for the DNS", draft-xdlee-cnnamestr-01 (work in progress), November 2002. [Z39-50] American National Standards Institute, "Information Retrieval: Application Service Definition and Protocol Specification", ANSI Z39.50, ISO Standard 23950, 1995. Author's Address John C Klensin 1770 Massachusetts Ave, #322 Cambridge, MA 02140 USA Phone: +1 617 491 5735 EMail: john-ietf@jck.com Klensin Expires August 15, 2004 [Page 41] Internet-Draft A Search-based access model for the DNS February 2004 Intellectual Property Statement The IETF takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on the IETF's procedures with respect to rights in standards-track and standards-related documentation can be found in BCP-11. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementors or users of this specification can be obtained from the IETF Secretariat. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights which may cover technology that may be required to practice this standard. Please address the information to the IETF Executive Director. Full Copyright Statement Copyright (C) The Internet Society (2004). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assignees. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION Klensin Expires August 15, 2004 [Page 42] Internet-Draft A Search-based access model for the DNS February 2004 HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Acknowledgment Funding for the RFC Editor function is currently provided by the Internet Society. Klensin Expires August 15, 2004 [Page 43]