Skip to main content

DNS Terminology
draft-ietf-dnsop-terminology-bis-14

Revision differences

Document history

Date Rev. By Action
2019-01-02
14 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2018-11-08
14 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2018-10-24
14 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2018-09-20
14 Tero Kivinen Closed request for Last Call review by SECDIR with state 'No Response'
2018-09-17
14 (System) RFC Editor state changed to EDIT
2018-09-17
14 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2018-09-17
14 (System) Announcement was received by RFC Editor
2018-09-17
14 (System) IANA Action state changed to No IANA Actions from In Progress
2018-09-17
14 (System) IANA Action state changed to In Progress
2018-09-17
14 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2018-09-17
14 Amy Vezza IESG has approved the document
2018-09-17
14 Amy Vezza Closed "Approve" ballot
2018-09-17
14 Warren Kumari IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup
2018-09-17
14 Amy Vezza Ballot approval text was generated
2018-09-17
14 Amy Vezza Ballot writeup was changed
2018-09-17
14 Magnus Westerlund Closed request for Telechat review by TSVART with state 'Overtaken by Events'
2018-09-13
14 (System) Sub state has been changed to AD Followup from Revised ID Needed
2018-09-13
14 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-14.txt
2018-09-13
14 (System) New version approved
2018-09-13
14 (System) Request for posting confirmation emailed to previous authors: Andrew Sullivan , Paul Hoffman , Kazunori Fujiwara
2018-09-13
14 Paul Hoffman Uploaded new revision
2018-08-30
13 Cindy Morgan IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation
2018-08-30
13 Ignas Bagdonas [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas
2018-08-30
13 Alexey Melnikov
[Ballot comment]
Thank you for this document!

I was also confused by many of comments raised by Ekr. So I think some minor changes/clarifications would …
[Ballot comment]
Thank you for this document!

I was also confused by many of comments raised by Ekr. So I think some minor changes/clarifications would be useful.
2018-08-30
13 Alexey Melnikov [Ballot Position Update] New position, Yes, has been recorded for Alexey Melnikov
2018-08-30
13 Adam Roach
[Ballot comment]

Thanks for the time and effort that went into this document. I agree with other
reviewers that this document is well-presented and informative. …
[Ballot comment]

Thanks for the time and effort that went into this document. I agree with other
reviewers that this document is well-presented and informative.

---------------------------------------------------------------------------

General:

The document seems to omit a definition for the term "class," although it is
used in many places an clearly has a very precise meaning in DNS parlance. It
would be nice to see one added, as I got a bit confused when I hit the
definition for "Class independent" in section 5 and realized that I'd been
conflating "RR type" with "Class" -- and couldn't find guidance in this document
to clarify the difference.

---------------------------------------------------------------------------

§2:

>  Multicast DNS:  "Multicast DNS (mDNS) provides the ability to perform
>    DNS-like operations on the local link in the absence of any
>    conventional Unicast DNS server.

This definition seems to be a little oversimplified in light of the mechanisms
described by draft-ietf-dnssd-hybrid and draft-ietf-dnssd-mdns-relay.

---------------------------------------------------------------------------

§5:

>  Master file:  "Master files are text files that contain RRs in text
>    form.  Since the contents of a zone can be expressed in the form
>    of a list of RRs a master file is most often used to define

Nit: "...list of RRs, a master..."
                    ^

---------------------------------------------------------------------------

§5:
>  Owner:  The domain name where a RR is found ([RFC1034], Section 3.6).

Nit: "...an RR..." (see RFC 7322 §1, CMOS 10.9)

---------------------------------------------------------------------------

§6:

>    The idea of a primary master is only used by [RFC2136],
>    and is considered archaic in other parts of the DNS.
>
>    The idea of a primary master is only used in [RFC1996] and
>    [RFC2136].

These sentences seem redundant and partially contradictory. I suspect the first
one should be removed.

---------------------------------------------------------------------------

§6:

>  Privacy-enabling DNS server:  "A DNS server that implements DNS over
>    TLS [RFC7858] and may optionally implement DNS over DTLS
>    [RFC8094]."  (Quoted from [RFC8310], Section 2)

This definition seems incomplete in light of the mechanism defined in
draft-ietf-doh-dns-over-https.

---------------------------------------------------------------------------

Acknowledgements:

>  The following is the Acknowledgements for RFC 7719.  Additional
>  acknowledgements may be added as this draft is worked on.

This feels out of date. Consider removing.
2018-08-30
13 Adam Roach [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach
2018-08-29
13 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2018-08-29
13 Terry Manderson [Ballot Position Update] New position, Yes, has been recorded for Terry Manderson
2018-08-29
13 Eric Rescorla
[Ballot comment]
Rich version of this review at:
https://mozphab-ietf.devsvcdev.mozaws.net/D3131



IMPORTANT
S 6.
>        [RFC5358]

>      Split DNS:  …
[Ballot comment]
Rich version of this review at:
https://mozphab-ietf.devsvcdev.mozaws.net/D3131



IMPORTANT
S 6.
>        [RFC5358]

>      Split DNS:  The terms "split DNS" and "split-horizon DNS" have long
>        been used in the DNS community without formal definition.  In
>        general, they refer to situations in which DNS servers that are
>        authoritative for a particular set of domains provide partly or

What about ones that aren't authoritative. Apparently this exists in
VPN settings.

COMMENTS
S 2.
>      learn the DNS by reading this document.

>  2.  Names

>      Naming system:  A naming system associates names with data.  Naming
>        systems have many significant facets that help differentiate them.

From each other? Or from other systems that aren't naming systems?


S 2.
>        The need for the term "fully qualified domain name" comes from the
>        existence of partially qualified domain names, which are names
>        where one or more of the earliest labels in the ordered list are
>        omitted (for example, a name of "www" derived from
>        "www.example.net").  Such relative names are understood only by
>        context.

I think we agree here but I had to read it several times, because
"earliest" in the list is not earliest in the presentation format.
Perhaps you should say "less specific" or "closest to the root" are
omitted  instead.


S 2.
>      Subdomain:  "A domain is a subdomain of another domain if it is
>        contained within that domain.  This relationship can be tested by
>        seeing if the subdomain's name ends with the containing domain's
>        name."  (Quoted from [RFC1034], Section 3.1).  For example, in the
>        host name "nnn.mmm.example.com", both "mmm.example.com" and
>        "nnn.mmm.example.com" are subdomains of "example.com".

It might be worth noting that whole component matches are required
here.


S 2.

>      Canonical name:  A CNAME resource record "identifies its owner name
>        as an alias, and specifies the corresponding canonical name in the
>        RDATA section of the RR."  (Quoted from [RFC1034], Section 3.6.2)
>        This usage of the word "canonical" is related to the mathematical
>        concept of "canonical form".

This paragraph didn't seem very clear. Perhaps an explanatory sentence
or two about what a CNAME is for woudl help.


S 4.
>            the name originally queried, or a name received in a CNAME
>            chain response.

>        *  QNAME (final): The name actually resolved, which is either the
>            name actually queried or else the last name in a CNAME chain
>            response.

So to be clear, the QNAME (final) is always one of the QNAME
(effective) sets?


S 6.
>        name server side (which is what answers the query) and a resolver
>        side (which performs the resolution function).  Systems operating
>        in this mode are commonly called "recursive servers".  Sometimes
>        they are called "recursive resolvers".  While strictly the
>        difference between these is that one of them sends queries to
>        another recursive server and the other does not, in practice it is

Which one does which?


S 6.
>        general, a recursive resolver is expected to cache the answers it
>        receives (which would make it a full-service resolver), but some
>        recursive resolvers might not cache.

>        [RFC4697] tried to differentiate between a recursive resolver and
>        an iterative resolver.

Did it fail?


S 6.
>        client to another server and lets the client pursue the query
>        there.  (See Section 2.3 of [RFC1034].)

>        In iterative resolution, the client repeatedly makes non-recursive
>        queries and follows referrals and/or aliases.  The iterative
>        resolution algorithm is described in Section 5.3.3 of [RFC1034].

This may just be my confusion, but it seems like this is still a bit
hard to follow.

Say that I send a query to a server X with the recursive bit set, and
that server in fact decides to give me a full answer (as opposed to
failing). At that point it could either:

(1) send the query to another server with the recursive bit set
(2) resolve the query entirely itself using iterative queries

Am I right so far?

Are both of these termed "recursive resolvers"?




S 6.
>        Internet; it is not listed in the NS RRset."  (Quoted from
>        [RFC6781], Section 3.4.3).  An earlier RFC, [RFC4641], said that
>        the hidden master's name "appears in the SOA RRs MNAME field",
>        although in some setups, the name does not appear at all in the
>        public DNS.  A hidden master can also be a secondary server for
>        the zone itself.

I'm not understanding this last sentence. Can you elaborate?


S 7.
>        if the name server's name is 'below' the cut, and are only used as
>        part of a referral response."  Without glue "we could be faced
>        with the situation where the NS RRs tell us that in order to learn
>        a name server's address, we should contact the server using the
>        address we wish to learn."  (Definition from [RFC1034],
>        Section 4.2.1)

An example might help here.


S 10.
>        Policy (if such exists), and it states how the management of a
>        given zone implements procedures and controls at a high level."
>        (Quoted from [RFC6841], Section 2)

>      Hardware security module (HSM):  A specialized piece of hardware that
>        is used to create keys for signatures and to sign messages.  In

It's probably worth mentioning that the idea here is that it doesn't
disclose the keys, as opposed to just creating them.
2018-08-29
13 Eric Rescorla [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla
2018-08-28
13 Ben Campbell
[Ballot comment]
Many thanks to the authors for making what I expected to be a dry terminology document into an adventure of discovery.

I agree …
[Ballot comment]
Many thanks to the authors for making what I expected to be a dry terminology document into an adventure of discovery.

I agree with Mirja's assessment about whether this really updates 2308. I also agree with Alvaro's wish to rethink the BCP status (including his disinclination to stand in the way of publication this far into the process.)

§2"
- Definition of "Domain Name": I don't profess to be a naming expert, but this definition doesn't seem very satisfying.  It potentially defines things that I wouldn't consider domain names. Is there no representation, intent, or other context that distinguishes an ordered list of labels that is a domain name from your garden variety ordered lists of labels? (or is the point of this that they cannot be distinguished?)

- Definition of IDN: 'The current standard, normally called "IDNA2008"...'
That may not age well. I suggest  something to the effect of "The current standard at the time of this writing, ..."
2018-08-28
13 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2018-08-28
13 Deborah Brungard
[Ballot comment]
Thanks for writing! Agree with the suggested tweaks, Spencer's, clarifying "update" and Ben's comments.

On Informational vs. BCP, I'm leaning towards BCP. As …
[Ballot comment]
Thanks for writing! Agree with the suggested tweaks, Spencer's, clarifying "update" and Ben's comments.

On Informational vs. BCP, I'm leaning towards BCP. As noted in the Shepherd writeup, this is based on practice and improving interoperability, to me, it is a different "type" of terminology document than others which are labeled informational.
2018-08-28
13 Deborah Brungard [Ballot Position Update] New position, Yes, has been recorded for Deborah Brungard
2018-08-27
13 Spencer Dawkins
[Ballot comment]
This is definitively a labor of love. Thanks for doing the work!

I have some musings. Do the right thing, of course.

Thank …
[Ballot comment]
This is definitively a labor of love. Thanks for doing the work!

I have some musings. Do the right thing, of course.

Thank you for producing this valuable doc.

In this text,

2.  Names

...

      The common display format is used in applications and free text.
      It is the same as the presentation format, but showing the root
      label and the "." before it is optional and is rarely done.  For
      example, in common display format, a fully-qualified domain name
      with two non-root labels is usually shown as "example.tld" instead
      of "example.tld.".  Names in the common display format are
      normally written such that the directionality of the writing
      system presents labels by decreasing distance from the root (so,
      in both English and C the root or TLD label in the ordered list is
      right-most; but in Arabic it may be left-most, depending on local
      conventions).

I bet I know what you mean by "C", but I'm guessing. Perhaps it's worth providing a reference, for all the Javascript and Python programmers who skipped over C?

I'm looking at

    Administration of names -- Administration is specified by
      delegation (see the definition of "delegation" in Section 7).
      Policies for administration of the root zone in the global DNS are
      determined by the names operational community, which convenes
      itself in the Internet Corporation for Assigned Names and Numbers
      (ICANN).  The names operational community selects the IANA
      Functions Operator for the global DNS root zone.  At the time this
      document is published, that operator is Public Technical
      Identifiers (PTI).  (See  for more
      information about PTI operating the IANA Functions.)  The name
      servers that serve the root zone are provided by independent root
      operators.  Other zones in the global DNS have their own policies
      for administration.

and wondering what the stability of an ICANN URL that refers to the name of the current IANA Functions Operator will be in 5-10 years. I'm not sure what else you can do to make that more useful if a different operator is selected, but if you can do something, maybe that would be useful.

I'm looking at this text:

  Passive DNS:  A mechanism to collect DNS data by storing DNS
      responses from name servers.  Some of these systems also collect
      the DNS queries associated with the responses, although doing so
      raises some privacy concerns. 

and thinking that the problem isn't collecting DNS queries associated with responses, it's that it's possible to collect DNS queries associated with responses (so, if one of these systems stops collecting DNS queries, you still have an exposure; it's just not happening now). Is that wrong?

I'm looking at this text:

  Privacy-enabling DNS server:  "A DNS server that implements DNS over
      TLS [RFC7858] and may optionally implement DNS over DTLS
      [RFC8094]."  (Quoted from [RFC8310], Section 2)

and seeing a race condition with https://datatracker.ietf.org/doc/draft-ietf-doh-dns-over-https/ (which isn't news to the authors who contributed to both specifications). Is it worth a mention here, given that the DOH draft is already in the RFC Editor queue?

I may be misreading this text:

  Parent:  "The domain in which the Child is registered."  (Quoted from
      [RFC7344], Section 1.1) Earlier, "parent name server" was defined
      in [RFC0882] as "the name server that has authority over the place
      in the domain name space that will hold the new domain".  (Note
      that [RFC0882] was obsoleted by [RFC1034] and [RFC1035].)
      [RFC0819] also has some description of the relationship between
      parents and children.

but I'm reading it as "the definition in RFC 882 was obsoleted by RFC 1034-5 in 1987, and there was no definition until RFC 7344 in 2014". If that's what's intended, great, but if that's not your point, perhaps we should talk …

"Ostensive" is a perfectly good word according to https://www.merriam-webster.com/dictionary/ostensive, but I didn't know what it meant without Googling it. You guys know your intended audience, of course …

In this text,

  Closest provable encloser:  "The longest ancestor of a name that can
      be proven to exist.  Note that this is only different from the
      closest encloser in an Opt-Out zone."  (Quoted from [RFC5155],
      Section 1.3)

"Opt-Out zone" wasn't familiar to me, but it's defined later in the document. Perhaps adding a pointer to Section 10 would be helpful to readers who lack clue as I do.
2018-08-27
13 Spencer Dawkins Ballot comment text updated for Spencer Dawkins
2018-08-27
13 Spencer Dawkins
[Ballot comment]
This is definitively a labor of love. Thanks for doing the work!

I have some musings. Do the right thing, of course.

Thank …
[Ballot comment]
This is definitively a labor of love. Thanks for doing the work!

I have some musings. Do the right thing, of course.

Thank you for producing this valuable doc.

In this text,

2.  Names

...

      The common display format is used in applications and free text.
      It is the same as the presentation format, but showing the root
      label and the "." before it is optional and is rarely done.  For
      example, in common display format, a fully-qualified domain name
      with two non-root labels is usually shown as "example.tld" instead
      of "example.tld.".  Names in the common display format are
      normally written such that the directionality of the writing
      system presents labels by decreasing distance from the root (so,
      in both English and C the root or TLD label in the ordered list is
      right-most; but in Arabic it may be left-most, depending on local
      conventions).

I bet I know what you mean by "C", but I'm guessing. Perhaps it's worth providing a reference, for all the Javascript and Python programmers who skipped over C?

I'm looking at

    Administration of names -- Administration is specified by
      delegation (see the definition of "delegation" in Section 7).
      Policies for administration of the root zone in the global DNS are
      determined by the names operational community, which convenes
      itself in the Internet Corporation for Assigned Names and Numbers
      (ICANN).  The names operational community selects the IANA
      Functions Operator for the global DNS root zone.  At the time this
      document is published, that operator is Public Technical
      Identifiers (PTI).  (See  for more
      information about PTI operating the IANA Functions.)  The name
      servers that serve the root zone are provided by independent root
      operators.  Other zones in the global DNS have their own policies
      for administration.

and wondering what the stability of an ICANN URL that refers to the name of the current IANA Functions Operator will be in 5-10 years. I'm not sure what else you can do to make that more useful if a different operator is selected, but if you can do something, maybe that would be useful.
I'm looking at this text:

  Passive DNS:  A mechanism to collect DNS data by storing DNS
      responses from name servers.  Some of these systems also collect
      the DNS queries associated with the responses, although doing so
      raises some privacy concerns. 

and thinking that the problem isn't collecting DNS queries associated with responses, it's that it's possible to collect DNS queries associated with responses (so, if one of these systems stops collecting DNS queries, you still have an exposure; it's just not happening now). Is that wrong?

I'm looking at this text:

  Privacy-enabling DNS server:  "A DNS server that implements DNS over
      TLS [RFC7858] and may optionally implement DNS over DTLS
      [RFC8094]."  (Quoted from [RFC8310], Section 2)

and seeing a race condition with https://datatracker.ietf.org/doc/draft-ietf-doh-dns-over-https/ (which isn't news to the authors who contributed to both specifications). Is it worth a mention here, given that the DOH draft is already in the RFC Editor queue?

I may be misreading this text:

  Parent:  "The domain in which the Child is registered."  (Quoted from
      [RFC7344], Section 1.1) Earlier, "parent name server" was defined
      in [RFC0882] as "the name server that has authority over the place
      in the domain name space that will hold the new domain".  (Note
      that [RFC0882] was obsoleted by [RFC1034] and [RFC1035].)
      [RFC0819] also has some description of the relationship between
      parents and children.

but I'm reading it as "the definition in RFC 882 was obsoleted by RFC 1034-5 in 1987, and there was no definition until RFC 7344 in 2014". If that's what's intended, great, but if that's not your point, perhaps we should talk …

"Ostensive" is a perfectly good word according to https://www.merriam-webster.com/dictionary/ostensive, but I didn't know what it meant without Googling it. You guys know your intended audience, of course …

In this text,

  Closest provable encloser:  "The longest ancestor of a name that can
      be proven to exist.  Note that this is only different from the
      closest encloser in an Opt-Out zone."  (Quoted from [RFC5155],
      Section 1.3)

"Opt-Out zone" wasn't familiar to me, but it's defined later in the document. Perhaps adding a pointer to Section 10 would be helpful to readers who lack clue as I do.
2018-08-27
13 Spencer Dawkins [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins
2018-08-27
13 Benjamin Kaduk
[Ballot comment]
First off, thank you all for the effort that went into this document -- it's quite helpful to
have a central resource to …
[Ballot comment]
First off, thank you all for the effort that went into this document -- it's quite helpful to
have a central resource to refer to.

I agree with Mirja about further clarity for the 2308 updates being nice, and about the "primary master"
definition's clarification.  (The latter seems like it would meet a DISCUSS criterion, as internal inconsistency
makes it difficult to have a clear specification.  But it would be absurd to apply it here when the fix is clear.)

I appreciate that "privacy of names" and "privacy of data associated with names" are called out as potential
facets of a naming system to consider, but I would like to understand better why they are not given more treatment
in this document.  The surrounding text seems to imply that they are not needed to describe the DNS and that
a pure lexicon need not explore the privacy considerations of the terms being defined; is this correct, and was
there much discussion on this question?

In a similar vein, it was a little surprising to only see the facets be expounded upon for the global DNS and not
the other related naming systems, though it's unclear that there would be much non-overlap for the other systems
considered.

In Section 6:

I'm a little confused about the interaction between "stealth server"
and "hidden master" -- if a hidden master is a stealth server, it is "like
a slave" and would thus be expected to get its configuration from yet
another master?  But this doesn't jibe with being listed as the MNAME.
I accept that DNS terminology is a complicated area and there may not
be a right answer, of course.

The "privacy-enabling DNS server" definition seems too narrowly scoped to
particular existing technologies as opposed to describing the properties
provided (or mentioning the possibility for future protocols to be
included).  Is a DNS-over-HTTP server "privacy-enabling"?  How about DNS-over-QUIC?

Section 8

Interesting to see the term "Opt-Out zone" used but not defined in this
document.  (No action needed, and I do see the definition of "Opt-Out".)


Finally, I am somewhat sympathetic to the indications that this document may
(also) be appropriate as Informational; I look forward to seeing how that discussion
unfolds.
2018-08-27
13 Benjamin Kaduk [Ballot Position Update] New position, No Objection, has been recorded for Benjamin Kaduk
2018-08-27
13 Alvaro Retana
[Ballot comment]
I agree with Mirja on her point about this document not seeming to Update rfc2308.

Both the IETF Last Call thread [1] …
[Ballot comment]
I agree with Mirja on her point about this document not seeming to Update rfc2308.

Both the IETF Last Call thread [1] and the Shepherd's writeup point at having this document not be Informational so it can Update rfc2308.  Putting that point aside, I don't think this document needs to be published as a BCP to reflect the current evolution of the DNS vocabulary.  I would prefer it if the status was reconsidered.

Given that we're already past IETF LC, I won't stand in the way as I am probably in the rough.  I am then balloting "No Objection" because I think this is a clear and important document.

[1] https://mailarchive.ietf.org/arch/msg/dnsop/9KsgYjBAxz5kzdeFLbht0IWjPkM
2018-08-27
13 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2018-08-25
13 Roni Even Request for Telechat review by GENART Completed: Ready. Reviewer: Roni Even. Sent review to list.
2018-08-24
13 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2018-08-24
13 Mirja Kühlewind
[Ballot comment]
I'm actually not sure if this doc really updates RFC2308 because the two definitions (Forwarder and QNAME) only say someting like "it is …
[Ballot comment]
I'm actually not sure if this doc really updates RFC2308 because the two definitions (Forwarder and QNAME) only say someting like "it is used differently today" but seem not really to actually update the existing definitions. I would recommend to either not use the "update" tag or clarify these definitions. 

Thanks for the clarification added based on the TSV-ART review (and thanks Allison!).

(Potential) nits:
1) OLD:
A set of resource records with the same label, class and
      type, but with different data.  (Definition from [RFC2181])
MAYBE use quotes here at least for the last part of the sentence:
A set of resource records "with the same label, class and
      type, but with different data."  (Definition from [RFC2181])

2) s/Section 4.3.1 of of [RFC1034] /Section 4.3.1 of [RFC1034]/

3) Probably the first sentence should be removed:
"The idea of a primary master is only used by [RFC2136],
      and is considered archaic in other parts of the DNS.

      The idea of a primary master is only used in [RFC1996] and
      [RFC2136]. "

4) Why is there (a) and (b) for the definition of Origin?
2018-08-24
13 Mirja Kühlewind Ballot comment text updated for Mirja Kühlewind
2018-08-24
13 Mirja Kühlewind
[Ballot comment]
I'm actually not sure if this doc really updates RFC2308 because the two definitions (Forwarder and QNAME) only say someting like "it is …
[Ballot comment]
I'm actually not sure if this doc really updates RFC2308 because the two definitions (Forwarder and QNAME) only say someting like "it is used different today" but seem not really to actually update the existing definition. I would recommend to either not use the "update" tag or clarify these definitions. 

Thanks for the clarification added based on the TSV-ART review (and thanks Allison!).

(Potential) nits:
1) OLD:
A set of resource records with the same label, class and
      type, but with different data.  (Definition from [RFC2181])
MAYBE use quotes here at least for the last part of the sentence:
A set of resource records "with the same label, class and
      type, but with different data."  (Definition from [RFC2181])

2) s/Section 4.3.1 of of [RFC1034] /Section 4.3.1 of [RFC1034]/

3) Probably the first sentence should be removed:
"The idea of a primary master is only used by [RFC2136],
      and is considered archaic in other parts of the DNS.

      The idea of a primary master is only used in [RFC1996] and
      [RFC2136]. "

4) Why is there (a) and (b) for the definition of Origin?
2018-08-24
13 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2018-08-23
13 Jean Mahoney Request for Telechat review by GENART is assigned to Roni Even
2018-08-23
13 Jean Mahoney Request for Telechat review by GENART is assigned to Roni Even
2018-08-23
13 Magnus Westerlund Request for Telechat review by TSVART is assigned to Allison Mankin
2018-08-23
13 Magnus Westerlund Request for Telechat review by TSVART is assigned to Allison Mankin
2018-08-20
13 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-13.txt
2018-08-20
13 (System) New version approved
2018-08-20
13 (System) Request for posting confirmation emailed to previous authors: Andrew Sullivan , Paul Hoffman , Kazunori Fujiwara
2018-08-20
13 Paul Hoffman Uploaded new revision
2018-08-20
12 Warren Kumari IESG state changed to IESG Evaluation from Waiting for Writeup
2018-08-20
12 Cindy Morgan Placed on agenda for telechat - 2018-08-30
2018-08-20
12 Warren Kumari Ballot has been issued
2018-08-20
12 Warren Kumari [Ballot Position Update] New position, Yes, has been recorded for Warren Kumari
2018-08-20
12 Warren Kumari Created "Approve" ballot
2018-08-20
12 Warren Kumari Ballot writeup was changed
2018-08-13
12 Allison Mankin Request for Last Call review by TSVART Completed: Almost Ready. Reviewer: Allison Mankin. Sent review to list.
2018-08-13
12 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2018-08-13
12 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-12.txt
2018-08-13
12 (System) New version approved
2018-08-13
12 (System) Request for posting confirmation emailed to previous authors: Andrew Sullivan , dnsop-chairs@ietf.org, Paul Hoffman , Kazunori Fujiwara
2018-08-13
12 Paul Hoffman Uploaded new revision
2018-08-13
11 (System) IESG state changed to Waiting for Writeup from In Last Call
2018-08-08
11 Roni Even Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Roni Even. Sent review to list.
2018-08-06
11 Dan Romascanu Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Dan Romascanu. Sent review to list.
2018-08-03
11 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2018-08-03
11 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-dnsop-terminology-bis-11, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-dnsop-terminology-bis-11, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
Senior IANA Services Specialist
2018-08-02
11 Tero Kivinen Request for Last Call review by SECDIR is assigned to Russ Mundy
2018-08-02
11 Tero Kivinen Request for Last Call review by SECDIR is assigned to Russ Mundy
2018-07-31
11 Wesley Eddy Request for Last Call review by TSVART is assigned to Allison Mankin
2018-07-31
11 Wesley Eddy Request for Last Call review by TSVART is assigned to Allison Mankin
2018-07-31
11 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Dan Romascanu
2018-07-31
11 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Dan Romascanu
2018-07-30
11 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2018-07-30
11 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2018-07-30
11 Cindy Morgan IANA Review state changed to IANA - Review Needed
2018-07-30
11 Cindy Morgan
The following Last Call announcement was sent out (ends 2018-08-13):

From: The IESG
To: IETF-Announce
CC: dnsop-chairs@ietf.org, dnsop@ietf.org, suzworldwide@gmail.com, Suzanne Woolf , …
The following Last Call announcement was sent out (ends 2018-08-13):

From: The IESG
To: IETF-Announce
CC: dnsop-chairs@ietf.org, dnsop@ietf.org, suzworldwide@gmail.com, Suzanne Woolf , warren@kumari.net, draft-ietf-dnsop-terminology-bis@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (DNS Terminology) to Best Current Practice


The IESG has received a request from the Domain Name System Operations WG
(dnsop) to consider the following document: - 'DNS Terminology'
  as Best Current Practice

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2018-08-13. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  The domain name system (DNS) is defined in literally dozens of
  different RFCs.  The terminology used by implementers and developers
  of DNS protocols, and by operators of DNS systems, has sometimes
  changed in the decades since the DNS was first defined.  This
  document gives current definitions for many of the terms used in the
  DNS in a single document.

  This document will be the successor to RFC 7719, and thus will
  obsolete RFC 7719.  It will also update RFC 2308.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-dnsop-terminology-bis/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-dnsop-terminology-bis/ballot/


No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
    rfc2308: Negative Caching of DNS Queries (DNS NCACHE) (Proposed Standard - IETF stream)
    rfc2181: Clarifications to the DNS Specification (Proposed Standard - IETF stream)
    rfc1996: A Mechanism for Prompt Notification of Zone Changes (DNS NOTIFY) (Proposed Standard - IETF stream)
    rfc1912: Common DNS Operational and Configuration Errors (Informational - Legacy stream)
    rfc882: Domain names: Concepts and facilities (Unknown - Legacy stream)
    rfc6561: Recommendations for the Remediation of Bots in ISP Networks (Informational - IETF stream)
    rfc6781: DNSSEC Operational Practices, Version 2 (Informational - IETF stream)
    rfc4592: The Role of Wildcards in the Domain Name System (Proposed Standard - IETF stream)
    rfc6840: Clarifications and Implementation Notes for DNS Security (DNSSEC) (Proposed Standard - IETF stream)
    rfc3731: Extensible Provisioning Protocol (EPP) Domain Name Mapping (Proposed Standard - IETF stream)
    rfc7719: DNS Terminology (Informational - IETF stream)
    rfc2136: Dynamic Updates in the Domain Name System (DNS UPDATE) (Proposed Standard - IETF stream)
    rfc5155: DNS Security (DNSSEC) Hashed Authenticated Denial of Existence (Proposed Standard - IETF stream)
    rfc7344: Automating DNSSEC Delegation Trust Maintenance (Proposed Standard - IETF stream)
    rfc4035: Protocol Modifications for the DNS Security Extensions (Proposed Standard - IETF stream)
    rfc4034: Resource Records for the DNS Security Extensions (Proposed Standard - IETF stream)
    rfc8310: Usage Profiles for DNS over TLS and DNS over DTLS (Proposed Standard - IETF stream)
    rfc4033: DNS Security Introduction and Requirements (Proposed Standard - IETF stream)
    rfc6841: A Framework for DNSSEC Policies and DNSSEC Practice Statements (Informational - IETF stream)
    rfc5936: DNS Zone Transfer Protocol (AXFR) (Proposed Standard - IETF stream)



2018-07-30
11 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2018-07-30
11 Suzanne Woolf
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

(1) What type of RFC is being requested?
BCP …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

(1) What type of RFC is being requested?
BCP

Why is this the proper type of RFC? 
It's an effort to collect a large number of terms from a large number of sources, primarily RFCs but also common usage by practitioners. As such, it aims to improve interoperability among implementations and operational configuration of the DNS by giving implementers and practitioners a common reference vocabulary. Clearly the more people use it, the more useful it will be, so BCP seems right.

In addition, from the process perspective, the document's status is BCP because it updates RFC 2308, which is a Proposed Standard.

Is this type of RFC indicated in the title page header?
Yes.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up.

Technical Summary

The domain name system (DNS) is defined in literally dozens of
  different RFCs.  The terminology used by implementers and developers
  of DNS protocols, and by operators of DNS systems, has sometimes
  changed in the decades since the DNS was first defined.  This
  document gives current definitions for many of the terms used in the
  DNS in a single document, in the interests of improving interoperability among
  implementations, operational configuration conventions, and other code or documents
  based on the DNS protocol.

Working Group Summary

  This document has proceeded through the WG remarkably smoothly. The editors have done an enormous amount of work, as have the
  reviewers. The editors were open with the WG in taking input and mostly incorporating it. A terminology document for a 30yo protocol
  covered by dozens of existing documents and used by millions of hosts and billions of users every day is a particularly thankless task
  and it's been done very well. It was written expressly to obsolete 7719, which was Informational and tackled only those definitions that
  were unambiguous; this document extends them in an attempt to resolve some such ambiguities to recommend "best practice".

Document Quality

  Are there existing implementations of the protocol?
The document attempts to describe both the standard and practice for a protocol that's been in use for 30 years and dozens of
inplementations.  Attention in the WG came from both operators and implementers.

Personnel

  Who is the Document Shepherd? Suzanne Woolf
  Who is the Responsible Area Director?  Warren Kumari

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The shepherd was a co-chair of the DNSOP WG for both this document and RFC 7719. The shepherd has read it several times, and
reviewed the document and the WG discussion on it for the writeup. Some nits remain but it's ready to go.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No. It's a large complex document but a great deal of expertise has been applied to it, and much of the effort in RFC 7719 has
carried over.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization?

No.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of?

No. It has a straightforward purpose and has been carefully written for that purpose.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

We don't believe there's any applicable disclosure to make. The document uses extensive quotes from other documents, but
all are RFCs or other references whose terms allow this quoting without further process required. Authors have confirmed that to
their knowledge, there's no IPR disclosure required.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

DNSOP is a very large, active WG so "a few individuals" can still be pretty broad engagement. We had a good
diversity of contributors to discussion, including some who don't normally participate much on the list.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent?

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

There are a number of idnits errors on normative downrefs and references to obsolete RFCs. These are deliberate and occur because the document is citing the original
definitions of the terms it's discussing, even when those appeared in Informational documents or documents that are now obsolete. Those references should stand as
normative, since they are for this document.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

N/A

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

idnits identifies:

  ** Downref: Normative reference to an Informational RFC: RFC 1912
  ** Downref: Normative reference to an Informational RFC: RFC 6561
  ** Downref: Normative reference to an Informational RFC: RFC 6781
  ** Downref: Normative reference to an Informational RFC: RFC 6841
  ** Downref: Normative reference to an Informational RFC: RFC 7719

As noted above, these aren't downrefs in the usual sense, but legitimate references to documents that define terms used normatively while not being standards track.

The editors, and the WG chairs, feel these references are correct as they stand.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

The status changes are properly reflected in the headers and the abstract. They're not discussed
specifically in the introduction, but are inherent in the general nature of the document as described
there. As a terminology document for a protocol that spans dozens of RFCs, the document flags which RFCs it's
quoting, and providing commentary for (including updating RFC 2308), in the appropriate locations throughout
the text.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document.

This document contains no IANA Considerations.

(18) List any new IANA registries that require Expert Review for future
allocations.

N/A

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

N/A
2018-07-30
11 Warren Kumari Last call was requested
2018-07-30
11 Warren Kumari Last call announcement was generated
2018-07-30
11 Warren Kumari Ballot approval text was generated
2018-07-30
11 Warren Kumari Ballot writeup was generated
2018-07-30
11 Warren Kumari IESG state changed to Last Call Requested from Publication Requested
2018-07-30
11 Warren Kumari Changed consensus to Yes from Unknown
2018-07-23
11 Suzanne Woolf
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

(1) What type of RFC is being requested?
BCP …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

(1) What type of RFC is being requested?
BCP

Why is this the proper type of RFC? 
It's an effort to collect a large number of terms from a large number of sources, primarily RFCs but also common usage by practitioners. As such, it aims to improve interoperability among implementations and operational configuration of the DNS by giving implementers and practitioners a common reference vocabulary. Clearly the more people use it, the more useful it will be, so BCP seems right.

Is this type of RFC indicated in the title page header?
Yes.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up.

Technical Summary

The domain name system (DNS) is defined in literally dozens of
  different RFCs.  The terminology used by implementers and developers
  of DNS protocols, and by operators of DNS systems, has sometimes
  changed in the decades since the DNS was first defined.  This
  document gives current definitions for many of the terms used in the
  DNS in a single document, in the interests of improving interoperability among
  implementations, operational configuration conventions, and other code or documents
  based on the DNS protocol.

Working Group Summary

  This document has proceeded through the WG remarkably smoothly. The editors have done an enormous amount of work, as have the
  reviewers. The editors were open with the WG in taking input and mostly incorporating it. A terminology document for a 30yo protocol
  covered by dozens of existing documents and used by millions of hosts and billions of users every day is a particularly thankless task
  and it's been done very well. It was written expressly to obsolete 7719, which was Informational and tackled only those definitions that
  were unambiguous; this document extends them in an attempt to resolve some such ambiguities to recommend "best practice".

Document Quality

  Are there existing implementations of the protocol?
The document attempts to describe both the standard and practice for a protocol that's been in use for 30 years and dozens of
inplementations.  Attention in the WG came from both operators and implementers.

Personnel

  Who is the Document Shepherd? Suzanne Woolf
  Who is the Responsible Area Director?  Warren Kumari

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The shepherd was a co-chair of the DNSOP WG for both this document and RFC 7719. The shepherd has read it several times, and
reviewed the document and the WG discussion on it for the writeup. Some nits remain but it's ready to go.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No. It's a large complex document but a great deal of expertise has been applied to it, and much of the effort in RFC 7719 has
carried over.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization?

No.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of?

No. It has a straightforward purpose and has been carefully written for that purpose.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

We don't believe there's any applicable disclosure to make. The document uses extensive quotes from other documents, but
all are RFCs or other references whose terms allow this quoting without further process required. Authors have confirmed that to
their knowledge, there's no IPR disclosure required.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it? 

DNSOP is a very large, active WG so "a few individuals" can still be pretty broad engagement. We had a good
diversity of contributors to discussion, including some who don't normally participate much on the list.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent?

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

There are a number of idnits errors on normative downrefs and references to obsolete RFCs. These are deliberate and occur because the document is citing the original
definitions of the terms it's discussing, even when those appeared in Informational documents or documents that are now obsolete. Those references should stand as
normative, since they are for this document.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

N/A

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

idnits identifies:

  ** Downref: Normative reference to an Informational RFC: RFC 1912
  ** Downref: Normative reference to an Informational RFC: RFC 6561
  ** Downref: Normative reference to an Informational RFC: RFC 6781
  ** Downref: Normative reference to an Informational RFC: RFC 6841
  ** Downref: Normative reference to an Informational RFC: RFC 7719

As noted above, these aren't downrefs in the usual sense, but legitimate references to documents that define terms used normatively while not being standards track.

The editors, and the WG chairs, feel these references are correct as they stand.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

The status changes are properly reflected in the headers and the abstract. They're not discussed
specifically in the introduction, but are inherent in the general nature of the document as described
there. As a terminology document for a protocol that spans dozens of RFCs, the document flags which RFCs it's
quoting, and providing commentary for (including updating RFC 2308), in the appropriate locations throughout
the text.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document.

This document contains no IANA Considerations.

(18) List any new IANA registries that require Expert Review for future
allocations.

N/A

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

N/A
2018-07-23
11 Suzanne Woolf Responsible AD changed to Warren Kumari
2018-07-23
11 Suzanne Woolf IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2018-07-23
11 Suzanne Woolf IESG state changed to Publication Requested
2018-07-23
11 Suzanne Woolf IESG process started in state Publication Requested
2018-07-23
11 Suzanne Woolf Changed document writeup
2018-07-17
11 Tim Wicinski IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2018-07-17
11 Tim Wicinski Removed from session: IETF-102: dnsop  Wed-0930
2018-07-16
11 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-11.txt
2018-07-16
11 (System) New version approved
2018-07-16
11 (System) Request for posting confirmation emailed to previous authors: Andrew Sullivan , Paul Hoffman , Kazunori Fujiwara
2018-07-16
11 Paul Hoffman Uploaded new revision
2018-07-10
10 Tim Wicinski Added to session: IETF-102: dnsop  Wed-0930
2018-06-25
10 Benno Overeinder Notification list changed to Suzanne Woolf <suzworldwide@gmail.com>
2018-06-25
10 Benno Overeinder Document shepherd changed to Suzanne Woolf
2018-06-25
10 Benno Overeinder IETF WG state changed to In WG Last Call from WG Document
2018-04-27
10 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-10.txt
2018-04-27
10 (System) New version approved
2018-04-27
10 (System) Request for posting confirmation emailed to previous authors: Andrew Sullivan , Paul Hoffman , Kazunori Fujiwara
2018-04-27
10 Paul Hoffman Uploaded new revision
2018-03-05
09 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-09.txt
2018-03-05
09 (System) New version approved
2018-03-05
09 (System) Request for posting confirmation emailed to previous authors: Andrew Sullivan , Paul Hoffman , Kazunori Fujiwara
2018-03-05
09 Paul Hoffman Uploaded new revision
2017-11-27
08 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-08.txt
2017-11-27
08 (System) New version approved
2017-11-27
08 (System) Request for posting confirmation emailed to previous authors: Andrew Sullivan , Paul Hoffman , Kazunori Fujiwara
2017-11-27
08 Paul Hoffman Uploaded new revision
2017-11-12
07 Tim Wicinski Added to session: IETF-100: dnsop  Mon-0930
2017-10-18
07 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-07.txt
2017-10-18
07 (System) New version approved
2017-10-18
07 (System) Request for posting confirmation emailed to previous authors: Andrew Sullivan , Paul Hoffman , Kazunori Fujiwara
2017-10-18
07 Paul Hoffman Uploaded new revision
2017-07-01
06 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-06.txt
2017-07-01
06 (System) New version approved
2017-07-01
06 (System) Request for posting confirmation emailed to previous authors: Andrew Sullivan , dnsop-chairs@ietf.org, Paul Hoffman , Kazunori Fujiwara
2017-07-01
06 Paul Hoffman Uploaded new revision
2017-03-13
05 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-05.txt
2017-03-13
05 (System) New version approved
2017-03-13
05 (System) Request for posting confirmation emailed to previous authors: Andrew Sullivan , Paul Hoffman , Kazunori Fujiwara
2017-03-13
05 Paul Hoffman Uploaded new revision
2017-01-27
04 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-04.txt
2017-01-27
04 (System) New version approved
2017-01-27
04 (System) Request for posting confirmation emailed to previous authors: "Paul Hoffman" , "Kazunori Fujiwara" , "Andrew Sullivan"
2017-01-27
04 Paul Hoffman Uploaded new revision
2016-10-31
03 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-03.txt
2016-10-31
03 (System) New version approved
2016-10-31
02 (System) Request for posting confirmation emailed to previous authors: "Paul Hoffman" , "Kazunori Fujiwara" , "Andrew Sullivan"
2016-10-31
02 Paul Hoffman Uploaded new revision
2016-08-04
02 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-02.txt
2016-07-08
01 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-01.txt
2016-01-12
00 Tim Wicinski Intended Status changed to Best Current Practice from None
2016-01-12
00 Paul Hoffman New version available: draft-ietf-dnsop-terminology-bis-00.txt