< draft-ietf-idnabis-rationale-12.txt   draft-ietf-idnabis-rationale-13.txt >
Network Working Group J. Klensin Network Working Group J. Klensin
Internet-Draft September 10, 2009 Internet-Draft September 13, 2009
Intended status: Informational Intended status: Informational
Expires: March 14, 2010 Expires: March 17, 2010
Internationalized Domain Names for Applications (IDNA): Background, Internationalized Domain Names for Applications (IDNA): Background,
Explanation, and Rationale Explanation, and Rationale
draft-ietf-idnabis-rationale-12.txt draft-ietf-idnabis-rationale-13.txt
Status of this Memo Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. This document may contain material provisions of BCP 78 and BCP 79. This document may contain material
from IETF Documents or IETF Contributions published or made publicly from IETF Documents or IETF Contributions published or made publicly
available before November 10, 2008. The person(s) controlling the available before November 10, 2008. The person(s) controlling the
copyright in some of this material may not have granted the IETF copyright in some of this material may not have granted the IETF
Trust the right to allow modifications of such material outside the Trust the right to allow modifications of such material outside the
IETF Standards Process. Without obtaining an adequate license from IETF Standards Process. Without obtaining an adequate license from
skipping to change at page 1, line 43 skipping to change at page 1, line 43
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on March 14, 2010. This Internet-Draft will expire on March 17, 2010.
Copyright Notice Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info). publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your rights Please review these documents carefully, as they describe your rights
skipping to change at page 3, line 50 skipping to change at page 3, line 50
A.3. Version -03 . . . . . . . . . . . . . . . . . . . . . . . 43 A.3. Version -03 . . . . . . . . . . . . . . . . . . . . . . . 43
A.4. Version -04 . . . . . . . . . . . . . . . . . . . . . . . 44 A.4. Version -04 . . . . . . . . . . . . . . . . . . . . . . . 44
A.5. Version -05 . . . . . . . . . . . . . . . . . . . . . . . 44 A.5. Version -05 . . . . . . . . . . . . . . . . . . . . . . . 44
A.6. Version -06 . . . . . . . . . . . . . . . . . . . . . . . 45 A.6. Version -06 . . . . . . . . . . . . . . . . . . . . . . . 45
A.7. Version -07 . . . . . . . . . . . . . . . . . . . . . . . 45 A.7. Version -07 . . . . . . . . . . . . . . . . . . . . . . . 45
A.8. Version -08 . . . . . . . . . . . . . . . . . . . . . . . 45 A.8. Version -08 . . . . . . . . . . . . . . . . . . . . . . . 45
A.9. Version -09 . . . . . . . . . . . . . . . . . . . . . . . 46 A.9. Version -09 . . . . . . . . . . . . . . . . . . . . . . . 46
A.10. Version -10 . . . . . . . . . . . . . . . . . . . . . . . 46 A.10. Version -10 . . . . . . . . . . . . . . . . . . . . . . . 46
A.11. Version -11 . . . . . . . . . . . . . . . . . . . . . . . 46 A.11. Version -11 . . . . . . . . . . . . . . . . . . . . . . . 46
A.12. Version -12 . . . . . . . . . . . . . . . . . . . . . . . 47 A.12. Version -12 . . . . . . . . . . . . . . . . . . . . . . . 47
A.13. Version -13 . . . . . . . . . . . . . . . . . . . . . . . 47
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 47 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 47
1. Introduction 1. Introduction
1.1. Context and Overview 1.1. Context and Overview
Internationalized Domain Names in Applications (IDNA) is a collection Internationalized Domain Names in Applications (IDNA) is a collection
of standards that allow client applications to convert some Unicode of standards that allow client applications to convert some Unicode
mnemonics to an ASCII-compatible encoding form ("ACE") which is a mnemonics to an ASCII-compatible encoding form ("ACE") which is a
valid DNS label containing only letters, digits, and hyphens. The valid DNS label containing only letters, digits, and hyphens. The
skipping to change at page 12, line 32 skipping to change at page 12, line 32
the previous and subsequent characters have the DFG property". the previous and subsequent characters have the DFG property".
Because it is easier to identify these characters than to know that Because it is easier to identify these characters than to know that
they are actually needed in IDNs or how to establish exactly the they are actually needed in IDNs or how to establish exactly the
right rules for each one, a rule may have a null value in a given right rules for each one, a rule may have a null value in a given
version of the tables. Characters associated with null rules are not version of the tables. Characters associated with null rules are not
permitted to appear in putative labels for either registration or permitted to appear in putative labels for either registration or
lookup. Of course, a later version of the tables might contain a lookup. Of course, a later version of the tables might contain a
non-null rule. non-null rule.
The actual rules and their descriptions are in [IDNA2008-Tables]. The actual rules and their descriptions are in Sections 2 and 3 of
[[anchor9: ??? Section number would be good here.]] That document [IDNA2008-Tables]. That document also specifies the creation of a
also specifies the creation of a registry for future rules. registry for future rules.
3.1.3. DISALLOWED 3.1.3. DISALLOWED
Some characters are inappropriate for use in IDNs and are thus Some characters are inappropriate for use in IDNs and are thus
excluded for both registration and lookup (i.e., IDNA-conforming excluded for both registration and lookup (i.e., IDNA-conforming
applications performing name lookup should verify that these applications performing name lookup should verify that these
characters are absent; if they are present, the label strings should characters are absent; if they are present, the label strings should
be rejected rather than converted to A-labels and looked up. Some of be rejected rather than converted to A-labels and looked up. Some of
these characters are problematic for use in IDNs (such as the these characters are problematic for use in IDNs (such as the
FRACTION SLASH character, U+2044), while some of them (such as the FRACTION SLASH character, U+2044), while some of them (such as the
skipping to change at page 14, line 30 skipping to change at page 14, line 30
from scripts that are well-understood by the registry or its from scripts that are well-understood by the registry or its
advisers. If a registry decides to reduce opportunities for advisers. If a registry decides to reduce opportunities for
confusion by constructing policies that disallow characters used in confusion by constructing policies that disallow characters used in
historic writing systems or characters whose use is restricted to historic writing systems or characters whose use is restricted to
specialized, highly technical contexts, some relevant information may specialized, highly technical contexts, some relevant information may
be found in Section 2.4 "Specific Character Adjustments", Table 4 be found in Section 2.4 "Specific Character Adjustments", Table 4
"Candidate Characters for Exclusion from Identifiers" of "Candidate Characters for Exclusion from Identifiers" of
[Unicode-UAX31] and Section 3.1. "General Security Profile for [Unicode-UAX31] and Section 3.1. "General Security Profile for
Identifiers" in [Unicode-Security]. Identifiers" in [Unicode-Security].
The requirement (in [IDNA2008-Protocol] [[anchor10: ?? Section The requirement (in Section 4.1 of [IDNA2008-Protocol]) that
number]]) that registration procedures use only U-labels and/or registration procedures use only U-labels and/or A-labels is intended
A-labels is intended to ensure that registrants are fully aware of to ensure that registrants are fully aware of exactly what is being
exactly what is being registered as well as encouraging use of those registered as well as encouraging use of those canonical forms. That
canonical forms. That provision should not be interpreted as provision should not be interpreted as requiring that registrant need
requiring that registrant need to provide characters in a particular to provide characters in a particular code sequence. Registrant
code sequence. Registrant input conventions and management are part input conventions and management are part of registrant-registrar
of registrant-registrar interactions and relationships between interactions and relationships between registries and registrars and
registries and registrars and are outside the scope of these are outside the scope of these standards.
standards.
It is worth stressing that these principles of policy development and It is worth stressing that these principles of policy development and
application apply at all levels of the DNS, not only, e.g., TLD or application apply at all levels of the DNS, not only, e.g., TLD or
SLD registrations and that even a trivial, "anything is permitted SLD registrations. Even a trivial, "anything is permitted that is
that is valid under the protocol" policy is helpful in that it helps valid under the protocol" policy is helpful in that it helps users
users and application developers know what to expect. and application developers know what to expect.
3.3. Layered Restrictions: Tables, Context, Registration, Applications 3.3. Layered Restrictions: Tables, Context, Registration, Applications
The character rules in IDNA2008 are based on the realization that The character rules in IDNA2008 are based on the realization that
there is no single magic bullet for any of the security, there is no single magic bullet for any of the security,
confusability, or other issues associated with IDNs. Instead, the confusability, or other issues associated with IDNs. Instead, the
specifications define a variety of approaches. The character tables specifications define a variety of approaches. The character tables
are the first mechanism, protocol rules about how those characters are the first mechanism, protocol rules about how those characters
are applied or restricted in context are the second, and those two in are applied or restricted in context are the second, and those two in
combination constitute the limits of what can be done in the combination constitute the limits of what can be done in the
skipping to change at page 47, line 36 skipping to change at page 47, line 36
concept was needed, the text now says "valid under IDNA" or concept was needed, the text now says "valid under IDNA" or
equivalent. equivalent.
o Adjusted Acknowledgments to remove Mark Davis's name, per his o Adjusted Acknowledgments to remove Mark Davis's name, per his
request and advice from IETF Trust Counsel. request and advice from IETF Trust Counsel.
o Incorporated other changes from WG Last Call. o Incorporated other changes from WG Last Call.
o Small typographical and editorial corrections. o Small typographical and editorial corrections.
A.13. Version -13
o Substituted in Section numbers to references to other IDNA2008
documents.
Author's Address Author's Address
John C Klensin John C Klensin
1770 Massachusetts Ave, Ste 322 1770 Massachusetts Ave, Ste 322
Cambridge, MA 02140 Cambridge, MA 02140
USA USA
Phone: +1 617 245 1457 Phone: +1 617 245 1457
Email: john+ietf@jck.com Email: john+ietf@jck.com
 End of changes. 9 change blocks. 
20 lines changed or deleted 25 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/