Network Working Group                                          T. Hansen
Internet-Draft                                         AT&T Laboratories
Expires: April 15, 2005                                        T. Hardie
                                                          Qualcomm, Inc.
                                                             L. Masinter
                                                           Adobe Systems
                                                        October 15, 2004



       Guidelines and Registration Procedures for new URI Schemes
           draft-hansen-2717bis-2718bis-uri-guidelines-00.txt


Status of this Memo


   This document is an Internet-Draft and is subject to all provisions
   of section 3 of RFC 3667.  By submitting this Internet-Draft, each
   author represents that any applicable patent or other IPR claims of
   which he or she is aware have been or will be disclosed, and any of
   which he or she become aware will be disclosed, in accordance with
   RFC 3668.


   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as
   Internet-Drafts.


   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."


   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.


   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.


   This Internet-Draft will expire on April 15, 2005.


Copyright Notice


   Copyright (C) The Internet Society (2004).


Abstract


   This document provides guidelines and recommendations for the
   definition of new URI schemes, and a mechanism to register those URI
   schemes.





Hansen, et al.           Expires April 15, 2005                 [Page 1]


Internet-Draft              New URI Schemes                 October 2004



   This is a first draft attempt to capture the sense of direction for
   updates to RFC 2717 and RFC 2718.  These changes were discussed at
   the August 26, 2004 URIREV4 BOF: see
   http://lists.w3.org/Archives/Public/uri/2004Aug/0007.html for the
   minutes.  Please send comments to uri@w3.org.


Table of Contents


   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  4
   2.  Guidelines for new URI schemes . . . . . . . . . . . . . . . .  5
     2.1   Important Considerations . . . . . . . . . . . . . . . . .  5
       2.1.1   non-Locator schemes  . . . . . . . . . . . . . . . . .  5
       2.1.2   Demonstratable, new, long-lived utility  . . . . . . .  5
       2.1.3   Syntactic compatibility  . . . . . . . . . . . . . . .  5
       2.1.4   Avoid improper use of "//" following "<scheme>:" . . .  6
       2.1.5   Compatibility with relative URIs . . . . . . . . . . .  6
     2.2   Is the scheme well defined?  . . . . . . . . . . . . . . .  6
       2.2.1   Clear mapping from other name spaces . . . . . . . . .  6
       2.2.2   URI schemes associated with network protocols  . . . .  7
       2.2.3   Definition of non-protocol URI schemes . . . . . . . .  7
       2.2.4   Definition of URI schemes not associated with data
               resources  . . . . . . . . . . . . . . . . . . . . . .  7
       2.2.5   Character encoding . . . . . . . . . . . . . . . . . .  7
       2.2.6   Definition of operations . . . . . . . . . . . . . . .  8
     2.3   Demonstrated utility . . . . . . . . . . . . . . . . . . .  8
       2.3.1   Proxy into HTTP/HTML . . . . . . . . . . . . . . . . .  8
     2.4   Are there security considerations? . . . . . . . . . . . .  9
     2.5   Does it start with UR? . . . . . . . . . . . . . . . . . .  9
     2.6   Non-considerations . . . . . . . . . . . . . . . . . . . .  9
       2.6.1   Are all objects accessible?  . . . . . . . . . . . . .  9
   3.  URI Scheme Name Registration . . . . . . . . . . . . . . . . . 10
     3.1   General  . . . . . . . . . . . . . . . . . . . . . . . . . 10
       3.1.1   The Permanent URI Scheme Name Status . . . . . . . . . 10
       3.1.2   The Provisional URI Scheme Name Status . . . . . . . . 10
     3.2   Requirements for Scheme Name Registration  . . . . . . . . 10
       3.2.1   General Requirements . . . . . . . . . . . . . . . . . 10
       3.2.2   Permanent URI Scheme Names . . . . . . . . . . . . . . 11
       3.2.3   Provisional URI Scheme Names . . . . . . . . . . . . . 11
     3.3   Registration Procedures  . . . . . . . . . . . . . . . . . 12
       3.3.1   Permanent URI Scheme Names . . . . . . . . . . . . . . 12
       3.3.2   Provisional URI Scheme Names . . . . . . . . . . . . . 13
       3.3.3   Objections to Registration . . . . . . . . . . . . . . 13
     3.4   Change Control . . . . . . . . . . . . . . . . . . . . . . 14
       3.4.1   Permanent URI Scheme Names . . . . . . . . . . . . . . 14
       3.4.2   Provisional URI Scheme Names . . . . . . . . . . . . . 14
     3.5   New URI Scheme Registration Template . . . . . . . . . . . 15
   4.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 16
   5.  Security Considerations  . . . . . . . . . . . . . . . . . . . 16




Hansen, et al.           Expires April 15, 2005                 [Page 2]


Internet-Draft              New URI Schemes                 October 2004



   6.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 16
   7.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
   7.1   Normative References . . . . . . . . . . . . . . . . . . . . 16
   7.2   Informative References . . . . . . . . . . . . . . . . . . . 17
       Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 17
       Intellectual Property and Copyright Statements . . . . . . . . 19














































Hansen, et al.           Expires April 15, 2005                 [Page 3]


Internet-Draft              New URI Schemes                 October 2004



1.  Introduction


   A Uniform Resource Identifier (URI) is a compact string
   representation for identifying resources.  RFC XXXX [6] defines the
   general syntax of URIs.  This document provides guidelines for the
   definition of new URI schemes (for consideration by those who are
   defining and registering or evaluating those definitions), and a
   process and mechanism for registering URI schemes.  This document
   replaces RFCs 2717 [2] and 2718 [3].


   The original terminology for the URI protocol element attempted to
   draw a distinction between 'locators': identifiers used for accessing
   resources available on the Internet, and 'names': identifiers used
   for naming possibly abstract resources, independent of any mechanism
   for accessing them.  The intent was to use the designation "URL"
   (Uniform Resource Locator) for those identifiers that were locators,
   and "URN" (Uniform Resource Name) for those identifiers that were
   names.  In practice, the line between 'locator' and 'name' cannot be
   drawn precisely: locators can be used as names, and names can be used
   as locators.


   As a result, recent documents have used the term "URI" for all
   resource identifiers following the definition of RFC XXXX [6],
   avoiding the term "URL", and reserving the term "URN" explicitly for
   those URIs using the "urn" scheme name (RFC 2141 [1]).  URNs remain a
   distinct class of URIs because of the requirements set out in RFC
   3406 [8]; this document's procedures do not update or supersede the
   procedures set out in RFC 3406.


   RFC 2717 defined a set of registration trees in which URI schemes
   could be registered, one of which was called the IETF Tree, to be
   managed by IANA.  The registration process is needed to ensure that
   the names of all such new schemes are guaranteed not to collide.
   Further, the registration process ensures that URI schemes intended
   for wide spread, public use are developed in an orderly,
   well-specified, and public manner.


   RFC 2717 also allowed additional registration trees to be approved by
   the IESG, although no such registration trees have been approved.


   This document eliminates the distinction between different 'trees'
   for URI schemes, and instead establishes a single namespace for
   registered values.  Within that namespace, there are values that are
   approved as meeting a set of criteria for URI schemes; other scheme
   names may also be registered provisionally or without necessarily
   passing the review process or criteria.  Its intent is to:
   o  provide a central point of discovery for established URI scheme
      names, and easy location of their defining documents;




Hansen, et al.           Expires April 15, 2005                 [Page 4]


Internet-Draft              New URI Schemes                 October 2004



   o  discourage multiple definitions of URI scheme names for different
      purposes;
   o  and to help those proposing new URI scheme names to discern
      established trends and conventions, and to avoid names that might
      be confused with existing ones.


2.  Guidelines for new URI schemes


2.1  Important Considerations


   This section lists important considerations for URI scheme
   definitions.  It is useful for all URI definitions, whether standards
   track or not, to follow these guidelines.  The review process for
   IETF standards track URI schemes may require review against these
   criteria.


2.1.1  non-Locator schemes


   While it is acknowledged that URIs may or may not be useful as
   locators, it is important that the URI scheme definition itself be
   clear as to how it is expected to function.  Schemes that are not
   intended to be used as locators must describe how the resource
   identified should be interpreted by software that obtains a URI of
   that scheme.


2.1.2  Demonstratable, new, long-lived utility


   Because URI schemes are a single, global namespace, the unbounded
   registration of new schemes is harmful to the Internet community.
   For this reason, new URI schemes should have clear utility to the
   broad Internet community, beyond that available with already
   registered URI schemes.


2.1.3  Syntactic compatibility


   RFC XXXX [6] defines a generic syntax for URI schemes with
   hierarchical components and a naming authority.  New URI schemes
   should follow this syntax if appropriate.  The generic handling of
   relative URIs depends on this.


   URI schemes that are not intended for use with relative URIs should
   avoid use of the forward slash "/" character, which is used for
   hierarchical delimiters.


   In some circumstances, when a URI scheme does not fit into the
   existing RFC XXXX syntax, the new scheme definition should follow the
   syntax of other previously registered schemes, if possible.





Hansen, et al.           Expires April 15, 2005                 [Page 5]


Internet-Draft              New URI Schemes                 October 2004



2.1.4  Avoid improper use of "//" following "<scheme>:"


   The use of double slashes as the first component of the
   <scheme-specific-part> of a URI is not simply an artistic indicator
   that what follows is a URI: Double slashes are used ONLY when the
   syntax of the URI's <scheme-specific-part> contains a hierarchical
   structure as described in RFC XXXX.  In URIs from such schemes, the
   use of double slashes indicates that what follows is the top
   hierarchical element for a naming authority.  (See section ???? of
   RFC XXXX for more details.) URI schemes which do not contain a
   conformant hierarchical structure in their <scheme-specific-part>
   should not use double slashes following the "<scheme>:" string.


2.1.5  Compatibility with relative URIs


   URI schemes should use the generic URI syntax if they are intended to
   be used with relative URIs.  A description of the allowed relative
   forms should be included in the scheme's definition.  Many
   applications use relative URIs extensively.  Specifically,
   o  Can the scheme be parsed according to RFC XXXX - for example, if
      the tokens "//", "/", ";", or "?" are used, do they have the
      meaning given in RFC XXXX?
   o  Does the scheme make sense to use it in relative URIs like those
      RFC XXXX specifies?
   o  If the scheme syntax is designed to be broken into pieces, does
      the documentation for the scheme's syntax specify what those
      pieces are, why it should be broken in this way, and why the
      breaks aren't where RFC XXXX says that they usually should be?
   o  If the scheme has a hierarchy, does it go left-to-right and with
      slash separators like RFC XXXX?


2.2  Is the scheme well defined?


   It is important that the semantics of the "resource" that a URI
   "locates" be well defined.  This might mean different things
   depending on the nature of the URI scheme.


2.2.1  Clear mapping from other name spaces


   In many cases, new URI schemes are defined as ways to translate other
   protocols and name spaces into the general framework of URIs.  The
   "ftp" URI scheme translates from the FTP protocol, while the "mid"
   URI scheme translates from the Message-ID field of messages.


   In either case, the description of the mapping must be complete, must
   describe how characters get encoded or not in URIs, must describe
   exactly how all legal values of the base standard can be represented
   using the URI scheme, and exactly which modifiers, alternate forms




Hansen, et al.           Expires April 15, 2005                 [Page 6]


Internet-Draft              New URI Schemes                 October 2004



   and other artifacts from the base standards are included or not
   included.  These requirements are elaborated below.


2.2.2  URI schemes associated with network protocols


   Most new URI schemes are associated with network resources that have
   one or several network protocols that can access them.  The 'ftp',
   'news', and 'http' schemes are of this nature.  For such schemes, the
   specification should completely describe how URIs are translated into
   protocol actions in sufficient detail to make the access of the
   network resource unambiguous.  If an implementation of the URI scheme
   requires some configuration, the configuration elements must be
   clearly identified.  (For example, the 'news' scheme, if implemented
   using NTTP, requires configuration of the NTTP server.)


2.2.3  Definition of non-protocol URI schemes


   In some cases, URI schemes do not have particular network protocols
   associated with them, because their use is limited to contexts where
   the access method is understood.  This is the case, for example, with
   the "cid" and "mid" URI schemes.  For these URI schemes, the
   specification should describe the notation of the scheme and a
   complete mapping of the locator from its source.


2.2.4  Definition of URI schemes not associated with data resources


   Most URI schemes locate Internet resources that correspond to data
   objects that can be retrieved or modified.  This is the case with
   "ftp" and "http", for example.  However, some URI schemes do not; for
   example, the "mailto" URI scheme corresponds to an Internet mail
   address.


   If a new URI scheme does not locate resources that are data objects,
   the properties of names in the new space must be clearly defined.


2.2.5  Character encoding


   When describing URI schemes in which (some of) the elements of the
   URI are actually representations of sequences of characters, care
   should be taken not to introduce unnecessary variety in the ways in
   which characters are encoded into octets and then into URI
   characters.  Unless there is some compelling reason for a particular
   scheme to do otherwise, translating character sequences into UTF-8
   (RFC 2279 [4]) and then subsequently using the %HH encoding for
   unsafe octets is recommended.







Hansen, et al.           Expires April 15, 2005                 [Page 7]


Internet-Draft              New URI Schemes                 October 2004



2.2.6  Definition of operations


   In some contexts (for example, HTML forms) it is possible to specify
   any one of a list of operations to be performed on a specific URI.
   (Outside forms, it is generally assumed to be something you GET.)


   The URI scheme definition should describe all well-defined operations
   on the URI identifier, and what they are supposed to do.


   Some URI schemes (for example, "telnet") provide location information
   for hooking onto bi-directional data streams, and don't fit the
   "infoaccess" paradigm of most URIs very well; this should be
   documented.


   NOTE: It is perfectly valid to say that "no operation apart from GET
   is defined for this URI".  It is also valid to say that "there's only
   one operation defined for this URI, and it's not very GET-like".  The
   important point is that what is defined on this type is described.


2.3  Demonstrated utility


   URI schemes should have demonstrated utility.  New URI schemes are
   expensive things to support.  Often they require special code in
   browsers, proxies, and/or servers.  Having a lot of ways to say the
   same thing needless complicates these programs without adding value
   to the Internet.


   The kinds of things that are useful include:
   o  Things that cannot be referred to in any other way.
   o  Things where it is much easier to get at them using this scheme
      than (for instance) a proxy gateway.


2.3.1  Proxy into HTTP/HTML


   One way to provide a demonstration of utility is via a gateway which
   provides objects in the new scheme for clients using an existing
   protocol.  It is much easier to deploy gateways to a new service than
   it is to deploy browsers that understand the new URI object.


   Things to look for when thinking about a proxy are:
   o  Is there a single global resolution mechanism whereby any proxy
      can find the referenced object?
   o  If not, is there a way in which the user can find any object of
      this type, and "run his own proxy"?
   o  Are the operations mappable one-to-one (or possibly using
      modifiers) to HTTP operations?
   o  Is the type of returned objects well defined?





Hansen, et al.           Expires April 15, 2005                 [Page 8]


Internet-Draft              New URI Schemes                 October 2004



      *  as MIME content-types?
      *  as something that can be translated to HTML?
   o  Is there running code for a proxy?


2.4  Are there security considerations?


   Above and beyond the security considerations of the base mechanism a
   scheme builds upon, one must think of things that can happen in the
   normal course of URI usage.


   In particular:
   o  Does the user need to be warned that such a thing is happening
      without an explicit request (GET for the source of an IMG tag, for
      instance)? This has implications for the design of a proxy
      gateway, of course.
   o  Is it possible to fake URIs of this type that point to different
      things in a dangerous way?
   o  Are there mechanisms for identifying the requester that can be
      used or need to be used with this mechanism (the From: field in a
      mailto: URI, or the Kerberos login required for AFS access in the
      AFS: URI, for instance)?
   o  Does the mechanism contain passwords or other security information
      that are passed inside the referring document in the clear (as in
      the "ftp" URI, for instance)?


2.5  Does it start with UR?


   Any scheme starting with the letters "U" and "R", in particular if it
   attaches any of the meanings "uniform", "universal" or "unifying" to
   the first letter, is going to cause intense debate, and generate much
   heat (but maybe little light).


   Any such proposal should either make sure that there is a large
   consensus behind it that it will be the only scheme of its type, or
   pick another name.


2.6  Non-considerations


   Some issues that are often raised but are not relevant to new URI
   schemes include the following.


2.6.1  Are all objects accessible?


   Can all objects in the world that are validly identified by a scheme
   be accessed by any UA implementing it?


   Sometimes the answer will be yes and sometimes no; often it will
   depend on factors (like firewalls or client configuration) not




Hansen, et al.           Expires April 15, 2005                 [Page 9]


Internet-Draft              New URI Schemes                 October 2004



   directly related to the scheme itself.


3.  URI Scheme Name Registration


3.1  General


   In order to increase the efficiency and flexibility of the URI scheme
   name registration process, the need is recognized for multiple
   registration statuses.  The registration requirements and specific
   registration procedures for each status differ, allowing the overall
   registration procedure to accommodate the different natural
   requirements for URI schemes.  For example, a scheme that will be
   recommended for wide support and implementation by the Internet
   community requires a more complete review than a scheme intended to
   be used for resources associated with proprietary software.


   The first step in registering a new URI scheme name is to determine
   which status the scheme should be registered with.  Determination of
   the proper category is based on the intended use for the new scheme
   and the desired syntax for the scheme name.


   There are two statuses of URI scheme name registration defined in
   this document: permanent and provisional.


3.1.1  The Permanent URI Scheme Name Status


   The permanent URI scheme name status is intended for URI schemes of
   general interest to the Internet community.  The status exists for
   URI schemes that require a substantive review and approval process.
   It is expected that applicability statements for particular
   applications will be published from time to time that recommend
   implementation of, and support for, URI schemes that have proven
   particularly useful in those contexts.


3.1.2  The Provisional URI Scheme Name Status


   The Provisional URI scheme name category is intended for any URI
   scheme proposed by any developer, without making any claim about its
   usefulness or the quality of its definition.  These URI scheme names
   are intended for private or experimental use.


3.2  Requirements for Scheme Name Registration


3.2.1  General Requirements


   All new URI schemes, regardless of registration status, MUST conform
   to the generic syntax for URIs as specified in RFC XXXX.





Hansen, et al.           Expires April 15, 2005                [Page 10]


Internet-Draft              New URI Schemes                 October 2004



3.2.2  Permanent URI Scheme Names


   Permanent registration of a URI scheme requires publication of the
   URI scheme syntax and semantics in either an Informational or
   Standards Track RFC.  In general, the creation of a new permanent URI
   scheme requires a Standards Track RFC.  An Informational RFC may be
   employed for registration only in the case of a URI scheme which is
   already in wide usage and meets other standards set forth in Section
   2, such as "demonstrated utility" within the Internet Architecture;
   the IESG shall have broad discretion in determining whether an
   Informational RFC is suitable in any given case, and may either
   recommend changes to such document prior to publication, or reject it
   for publication.  An Informational RFC purporting to describe a URI
   scheme shall not be published without IESG approval.  This is a
   departure from practice for Informational RFCs as set forth in RFC
   2026 [7], for the purpose of ensuring that the registration of URI
   schemes shall serve the best interests of the Internet community.


   The NAMES of permanent URI name schemes MUST NOT contain the dash
   (also known as the hyphen and minus sign) character ('-') USASCII
   value 2Dh.  Use of this character can cause confusion with private
   URI name schemes.


   An analysis of the security issues inherent in the new URI scheme is
   REQUIRED.  (This is in accordance with the basic requirements for all
   IETF protocols.) Permanent URI name schemes should not introduce
   additional security risks into the Internet Architecture.  For
   example, URIs should not embed information which should remain
   confidential, such as passwords, nor should new schemes subvert the
   security of existing schemes or protocols (i.e.  by layering or
   tunneling).


   The "owner" of a permanet URI scheme name is assumed to be the IETF
   itself.  Modification or alteration of the specification requires the
   same level of processing (e.g.  Informational or Standards Track RFC)
   as used for the initial registration.  Schemes originally defined via
   an Informational RFC may, however, be replaced with Standards Track
   documents.


3.2.3  Provisional URI Scheme Names


   Registration of a provisional URI scheme does not imply any kind of
   endorsement by the IETF, IANA or any other body.


   The main requirements for a provisional URI scheme are that it SHOULD
   have a citable specification, and there MUST NOT be a corresponding
   entry (with the same URI scheme name) with a permanent status.





Hansen, et al.           Expires April 15, 2005                [Page 11]


Internet-Draft              New URI Schemes                 October 2004



   The specification SHOULD indicate an email address for sending
   technical comments and discussion of the proposed URI scheme.


   Provisional URI name schemes MUST conform to the generic URI syntax,
   RFC XXXX.  The provisional URI name scheme's defining document MAY
   set forth additional syntax and semantics requirements above and
   beyond those specified in RFC XXXX.


   All new provisional URI schemes SHOULD follow the Guidelines for URI
   Schemes, set forth in Section 2.


   An analysis of the security issues inherent in the new URI scheme is
   encouraged.  Regardless of what security analysis is or is not
   performed, all descriptions of security issues must be as accurate as
   possible.  In particular, a statement that there are "no security
   issues associated with this scheme" must not be confused with "the
   security issues associates with this scheme have not been assessed"
   or "the security issues associated with this scheme cannot be
   predicted because of <reason>".


   There is absolutely no requirement that provisional URI name schemes
   be secure or completely free from risks.  Nevertheless, the URI name
   scheme's defining document must set forth the standard for security
   considerations, and in any event all known security risks SHOULD be
   identified.


3.3  Registration Procedures


3.3.1  Permanent URI Scheme Names


   The first step in registering a new permanent URI scheme is to
   publish an IETF Internet-Draft detailing the syntax and semantics of
   the proposed scheme.  The draft must, minimally, address all of the
   items covered by the template provided in Section 3.5 of this
   document.  There must be an IANA considerations section in the
   Internet-Draft calling for registration of the URI scheme and
   referencing information as required by the registration template
   within the same document.


   After all issues raised during a review period of no less than 4
   weeks have been addressed, submit the draft to the IESG for review.


   The IESG will review the proposed new scheme and either refer the
   scheme to a working group (existing or new) or directly present the
   scheme to the IESG for a last call.  In the former case, the working
   group is responsible for submitting a final version of the draft to
   the IESG for approval at such time as it has received adequate review
   and deliberation.




Hansen, et al.           Expires April 15, 2005                [Page 12]


Internet-Draft              New URI Schemes                 October 2004



   Registration of the URI scheme is then processed as part of the RFC
   publication process.


3.3.2  Provisional URI Scheme Names


   Registration of provisional URI scheme names may be submitted by one
   of the following methods:
   o  An IANA considerations section in a defining RFC, calling for
      registration of the URI scheme and referencing information as
      required by the registration template within the same document.
      Registration of the URI scheme is then processed as part of the
      RFC publication process.
   o  Send a copy of the template to the designated email discussion
      list [????].  Allow a reasonable period - at least 2 weeks - for
      discussion and comments, then send the template to IANA at the
      designated email address [????].  IANA will publish the template
      information if the requested name and the specification document
      meet the criteria noted in Section 3.2.3, unless the IESG or their
      designated expert have requested that it not be published (see
      Section 3.3.3).  IESG's designated expert should confirm to IANA
      that the registration criteria have been satisfied.


   When a new permanent URI scheme name is recorded, IANA will remove
   any corresponding entries (with the same URI scheme name and
   protocol) from the provisional registry.


   Companies and other bodies that desire a private name space for URI
   scheme names are encouraged to use a prefix based on their domain
   name, expressed in reverse order.  For example, a URI scheme name of
   com-example-info might be registered by the vendor that owns the
   example.com domain name.


3.3.3  Objections to Registration


   Listing of an entry in the provisional repository should not be
   lightly refused.  An entry MAY be refused if there is some credible
   reason to believe that such registration will be harmful.  In the
   absence of such objection, IANA SHOULD allow any registration that
   meets the criteria set out in Section 3.2.2 and Section Section
   3.2.3.  Some reasonable grounds for refusal might be:
   o  There is IETF consensus that publication is considered likely to
      harm the Internet technical infrastructure in some way.
   o  Disreputable or frivolous use of the registration facilities.
   o  The proposal is sufficiently lacking in purpose, or misleading
      about its purpose, that it can be held to be a waste of time and
      effort.
   o  Conflict with some current IETF activity.





Hansen, et al.           Expires April 15, 2005                [Page 13]


Internet-Draft              New URI Schemes                 October 2004



   Note that objections or disagreements about technical detail are not,
   of themselves, considered grounds to refuse listing in the
   provisional repository.  After all, one of its purposes is to allow
   developers to communicate with a view to combining their ideas,
   expertise and energy to the maximum benefit of the Internet
   community.


   Publication in an RFC or other form of Open Standard document (per
   RFC 2026 [7], section 7) is sufficient grounds for publication in the
   permanent registry.


   To assist IANA in determining whether or not there is a sustainable
   objection to any registration, IESG nominates a designated expert to
   liaise with IANA about new registrations.  For the most part, the
   designated expert's role is to confirm to IANA that the registration
   criteria have been satisfied.


   The IESG or their designated expert MAY require any change or
   commentary to be attached to any registry entry.


   Note: It is not an error for two different entities to register the
   same provisional URI scheme name for two different purposes.  One of
   the purposes for this registry is to help make people aware of what
   URI scheme names are being used by other entities.


   The IESG is the final arbiter of any objection.


3.4  Change Control


3.4.1  Permanent URI Scheme Names


   Permanent URI name schemes are "owned" by the IETF itself and may be
   changed, as needed, by updating the RFC that describes them.  Schemes
   described by Standards Track RFC may be replaced with new Standards
   Track RFCs.  Informational RFCs may be replaced by new Informational
   RFCs or Standards Track RFCs.


3.4.2  Provisional URI Scheme Names


   Provisional URL schemes that are undocumented may be changed by their
   owner at any time without notifying the IETF.


   Provisional URL schemes that have been documented by an Informational
   RFC, may be changed at any time by the owner.  However, an updated
   Informational RFC which details the changes made, must be submitted
   to the IESG.


   The owner of a provisional URL scheme and documented by an




Hansen, et al.           Expires April 15, 2005                [Page 14]


Internet-Draft              New URI Schemes                 October 2004



   Informational RFC may pass responsibility for the registration to
   another person or agency by informing the IESG.


   The IESG may reassign responsibility for a provisional URL scheme
   registered in an alternative tree and documented by an Informational
   RFC.  The most common case of this will be to enable changes to be
   made to schemes where the scheme name is privately owned, and the
   owner of the scheme name has died, moved out of contact or is
   otherwise unable to make changes that are important to the community.


   The IESG may reclassify a provisional URL scheme and documented via
   an Informational RFC as "historic", if it determines that the scheme
   is no longer in use.


   IANA MAY remove any provisional URI scheme entry whose corresponding
   specification document is no longer available (e.g., expired
   Internet-draft, or URI not resolvable).  Anyone may notify IANA of
   any such cases by sending an email to the designated email address
   [????].  Before removing an entry for this reason, IANA SHOULD
   contact the registered Author/Change controller to determine whether
   a replacement for the specification document (consistent with the
   requirements of section Section 3.2) is available.


3.5  New URI Scheme Registration Template


   The following issues should be addressed when documenting a new URI
   scheme:
   URI scheme name.
   Status.  This will be one of 'permanent', 'provisional' or
      'historic'.
   URI scheme syntax.  This should be expressed in a clear and concise
      manner.  The use of ABNF is encouraged.  Please refer to Section
      2.1 for guidance on designing and explaining your scheme's syntax.
   Character encoding considerations.  It is important to identify what
      your scheme supports in this regard.  It is obvious that for
      interoperability, it is best if there is a means to support
      character sets beyond USASCII, but especially for private schemes,
      this may not be the case.
   Intended usage.  What sort of resource is being identified? If this
      is not a 'resource' type of URI (e.g.  mailto:), explain the
      action that should be initiated by the consumer of the URI.  If
      there is a MIME type associated with this resource, please
      identify it.
   Applications and/or protocols which use this URI scheme name.
      Including references to documentation which defines the
      applications and/or protocols cited is especially useful.






Hansen, et al.           Expires April 15, 2005                [Page 15]


Internet-Draft              New URI Schemes                 October 2004



   Interoperability considerations.  If you are aware of any details
      regarding your scheme which might impact interoperability, please
      identify them here.  For example: proprietary or uncommon encoding
      method; inability to support multibyte character sets;
      incompatibility with types or versions of underlying protocol (if
      scheme is tunneled over another protocol).
   Security considerations.
   Relevant publications.
   Contact.  Person & email address to contact for further information.
   Author/Change controller.
   Application/protocol.  Applications and/or protocols which use this
      URI scheme name.


4.  IANA Considerations


   This document updates the Uniform Resource Identifier (URI) Schemes
   registration table.  The template has an additional field for the
   status of the URI name scheme, and the procedures for entering new
   name schemes have been augmented.  All existing URI name schemes in
   the existing table should be given the status of 'permanent'.


5.  Security Considerations


   New URI schemes are required to address all security considerations
   in their definitions.


   Information that creates or updates a registration needs to be
   authenticated.


   Information concerning possible security vulnerabilities of a
   protocol may change over time.  Consequently, claims as to the
   security properties of a registered URI scheme may change as well.
   As new vulnerabilities are discovered, information about such
   vulnerabilities may need to be attached to existing documentation, so
   that users are not misled as to the true security properties of a
   registered URI scheme.


6.  Acknowledgements


   Some of the text for the provisional registration status is based on
   [9].


7.  References


7.1  Normative References


   [1]  Moats, R., "URN Syntax", RFC 2141, May 1997.





Hansen, et al.           Expires April 15, 2005                [Page 16]


Internet-Draft              New URI Schemes                 October 2004



   [2]  Petke, R. and I. King, "Registration Procedures for URL Scheme
        Names", BCP 35, RFC 2717, November 1999.


   [3]  Masinter, L., Alvestrand, H., Zigmond, D. and R. Petke,
        "Guidelines for new URL Schemes", RFC 2718, November 1999.


   [4]  Yergeau, F., "UTF-8, a transformation format of ISO 10646", RFC
        2279, January 1998.


   [5]  Berners-Lee, T., Fielding, R. and L. Masinter, "Uniform Resource
        Identifiers (URI): Generic Syntax", RFC 2396, August 1998.


   [6]  "Uniform Resource Identifiers (URI): Generic Syntax", ????.


7.2  Informative References


   [7]  Bradner, S., "The Internet Standards Process -- Revision 3", BCP
        9, RFC 2026, October 1996.


   [8]  Daigle, L., van Gulik, D., Iannella, R. and P. Faltstrom,
        "Uniform Resource Names (URN) Namespace Definition Mechanisms",
        BCP 66, RFC 3406, October 2002.


   [9]  Klyne, G., Nottingham, M. and J. Mogul, "Registration Procedures
        for Message Header Fields", BCP 90, RFC 3864, September 2004.



Authors' Addresses


   Tony Hansen
   AT&T Laboratories
   200 Laurel Ave.
   Middletown, NJ  07748
   USA


   EMail: tony+urireg@maillennium.att.com



   Ted Hardie
   Qualcomm, Inc.
   675 Campbell Technology Parkway
   Suite 200
   Campbell, CA
   USA


   EMail: hardie@qualcomm.com






Hansen, et al.           Expires April 15, 2005                [Page 17]


Internet-Draft              New URI Schemes                 October 2004



   Larry Masinter
   Adobe Systems
   345 Park Ave
   San Jose, CA  95110
   US


   Phone: +1 408 536 3024
   EMail: LMM@acm.org
   URI:   http://larry.masinter.net











































Hansen, et al.           Expires April 15, 2005                [Page 18]


Internet-Draft              New URI Schemes                 October 2004



Intellectual Property Statement


   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.


   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.


   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.



Disclaimer of Validity


   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.



Copyright Statement


   Copyright (C) The Internet Society (2004).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.



Acknowledgment


   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Hansen, et al.           Expires April 15, 2005                [Page 19]