Skip to main content

A Procedure for Cautious Delegation of a DNS Name

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Olaf Kolkman , Andrew Sullivan , Warren "Ace" Kumari
Last updated 2014-02-02 (Latest revision 2013-08-01)
RFC stream (None)
Intended RFC status (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


NOTE: The authors recognize that the statistical models that would inform the process are not well understood and that the possibilities to game the system might be unmountable. Unless we reach more insights on how to deal with this details this work is abandoned. Sometimes, a DNS name is known to be in use in the wild even though it was never properly delegated. This situation appears particularly, but not only, true in certain domains near the root of the tree: people have independently used those non-existent top-level domains as private namespaces. If those names are to be delegated in the public DNS, prudence dictates that collisions between the private uses and the public use be minimized. We outline a procedure to evaluate the harm of delegation.


Olaf Kolkman
Andrew Sullivan
Warren "Ace" Kumari

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)