Internet-Draft | The GNU Name System | June 2023 |
Schanzenbach, et al. | Expires 31 December 2023 | [Page] |
This document contains the GNU Name System (GNS) technical specification. GNS is a decentralized and censorship-resistant domain name resolution protocol that provides a privacy-enhancing alternative to the Domain Name System (DNS) protocols.¶
This document defines the normative wire format of resource records, resolution processes, cryptographic routines and security considerations for use by implementers.¶
This specification was developed outside the IETF and does not have IETF consensus. It is published here to inform readers about the function of GNS, guide future GNS implementations, and ensure interoperability among implementations including with the pre-existing GNUnet implementation.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 31 December 2023.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
This specification describes the GNU Name System (GNS), a censorship-resistant, privacy-preserving and decentralized domain name resolution protocol. GNS can bind names to any kind of cryptographically secured token, enabling it to double in some respects as an alternative to some of today's public key infrastructures.¶
In the terminology of the Domain Name System (DNS) [RFC1035], GNS roughly follows the idea of a local root zone deployment (see [RFC8806]), with the difference that the design encourages alternative roots and does not expect all deployments to use the same or any specific root zone. In the GNS reference implementation, users can autonomously and freely delegate control of names to zones through their local configurations. In this model, users are expected to manage their local configurations, so as to avoid any confusion as to how names are resolved.¶
Name resolution and zone dissemination is based on the principle of a petname system where users can assign local names to zones. The GNS has its roots in ideas from the Simple Distributed Security Infrastructure [SDSI], enabling the decentralized mapping of secure identifiers to memorable names. A first academic description of the cryptographic ideas behind GNS can be found in [GNS].¶
This document defines the normative wire format of resource records, resolution processes, cryptographic routines and security considerations for use by implementers.¶
This specification was developed outside the IETF and does not have IETF consensus. It is published here to guide implementers of GNS and to ensure interoperability among implementations.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
GNS exhibits the three properties that are commonly used to describe a petname system:¶
It follows from the above that GNS does not support names which are simultaneously global, secure and human-readable. Instead, names are either global and not human-readable or not globally unique and human-readable. An example for a global name pointing to the record "example" in a zone is:¶
example.000G006K2TJNMD9VTCYRX7BRVV3HAEPS15E6NHDXKPJA1KAJJEG9AFF884¶
Now consider the petname "pet.gns.alt" for the example zone of the name above. The following name would point to the same record as the globally unique name above but it is only valid locally:¶
example.pet.gns.alt¶
The delegation of petnames and subsequent resolution of delegation builds on ideas from the Simple Distributed Security Infrastructure [SDSI]. In GNS, any user can create and manage one or more zones (Section 4) as part of a zone master implementation. The zone type determines the respective set of cryptographic operations and the wire formats for encrypted data, public keys and signatures. A zone can be populated with mappings from labels to resource records by its owner (Section 5). A label can be mapped to a delegation record which results in the corresponding subdomain being delegated to another zone. Circular delegations are explicitly allowed, including delegating a subdomain to its immediate parent zone. In order to support (legacy) applications as well as to facilitate the use of petnames, GNS defines auxiliary record types in addition to supporting existing DNS records.¶
Zone contents are encrypted and signed before being published in a key-value storage (Section 6) as illustrated in Figure 1. In this process, unique zone identification is hidden from the network through the use of key blinding. Key blinding allows the creation of signatures for zone contents using a blinded public/private key pair. This blinding is realized using a deterministic key derivation from the original zone key and corresponding private key using record label values as blinding factors. Specifically, the zone owner can derive blinded private keys for each record set published under a label, and a resolver can derive the corresponding blinded public keys. It is expected that GNS implementations use distributed or decentralized storages such as distributed hash tables (DHT) in order to facilitate availability within a network without the need for dedicated infrastructure. Specification of such a distributed or decentralized storage is out of scope of this document, but possible existing implementations include those based on [RFC7363], [Kademlia] or [R5N].¶
Applications use the resolver to lookup GNS names. Starting from a configurable start zone, names are resolved by following zone delegations recursively as illustrated in Figure 2. For each label in a name, the recursive GNS resolver fetches the respective record from the storage layer (Section 7). Without knowledge of the label values and the zone keys, the different derived keys are unlinkable both to the original zone key and to each other. This prevents zone enumeration (except via impractical online brute force attacks) and requires knowledge of both the zone key and the label to confirm affiliation of a query or the corresponding encrypted record set with a specific zone. At the same time, the blinded zone key provides resolvers with the ability to verify the integrity of the published information without disclosing the originating zone.¶
In the remainder of this document, the "implementer" refers to the developer building a GNS implementation including the resolver, zone master, and supporting configuration such as start zones (Section 7.1).¶
A zone master implementation SHOULD enable the zone owners to create and manage zones. If this functionality is not implemented, names can still be resolved if zone keys for the initial step in the name resolution are available (see Section 7).¶
A zone in GNS is uniquely identified by its zone type and zone key. Each zone can be represented by a Zone Top-Level Domain (zTLD) string. A zone type (ztype) is a unique 32-bit number. This number corresponds to a resource record type number identifying a delegation record type in the GANA "GNS Record Types" registry [GANA]. The ztype is a unique identifier for the set cryptographic functions of the zone and the format of the delegation record type. Any ztype MUST define the following set of cryptographic functions:¶
The cryptographic functions of the default ztypes are specified with their corresponding delegation records in Section 5.1. In order to support cryptographic agility, additional ztypes MAY be defined in the future which replace or update the default ztypes defined in this document. All ztypes MUST be registered as dedicated zone delegation record types in the GANA "GNS Record Types" registry (see [GANA]). When defining new record types the cryptographic security considerations of this document apply, in particular Section 9.3.¶
The zTLD is the Zone Top-Level Domain. It is a string which encodes the zone type and zone key into a domain name. The zTLD is used as a globally unique reference to a specific zone in the process of name resolution. It is created by encoding a binary concatenation of the zone type and zone key (see Figure 3). The used encoding is a variation of the Crockford Base32 encoding [CrockfordB32] called Base32GNS. The encoding and decoding symbols for Base32GNS including this modification are defined in the table found in Figure 30. The functions for encoding and decoding based on this table are called Base32GNS-Encode and Base32GNS-Decode, respectively.¶
Consequently, a zTLD is encoded and decoded as follows:¶
zTLD := Base32GNS-Encode(ztype||zkey) ztype||zkey := Base32GNS-Decode(zTLD)¶
where "||" is the concatenation operator.¶
The zTLD can be used as-is as a rightmost label in a GNS name. If an application wants to ensure DNS compatibility of the name, it MAY also represent the zTLD as follows: If the zTLD is less than or equal to 63 characters, it can be used as a zTLD as-is. If the zTLD is longer than 63 characters, the zTLD is divided into smaller labels separated by the label separator. Here, the most significant bytes of the "ztype||zkey" concatenation must be contained in the rightmost label of the resulting string and the least significant bytes in the leftmost label of the resulting string. This allows the resolver to determine the ztype and zTLD length from the rightmost label and to subsequently determine how many labels the zTLD should span. A GNS implementation MUST support the division of zTLDs in DNS compatible label lengths. For example, assuming a zTLD of 130 characters, the division is:¶
zTLD[126..129].zTLD[63..125].zTLD[0..62]¶
In order to revoke a zone key, a signed revocation message MUST be published. This message MUST be signed using the private key. The revocation message is broadcast to the network. The specification of the broadcast mechanism is out of scope for this document. A possible broadcast mechanism for efficient flooding in a distributed network is implemented in [GNUnet]. Alternatively, revocation messages could also be distributed via a distributed ledger or a trusted central server. To prevent flooding attacks, the revocation message MUST contain a proof of work (PoW). The revocation message including the PoW MAY be calculated ahead of time to support timely revocation.¶
For all occurrences below, "Argon2id" is the Password-based Key Derivation Function as defined in [RFC9106]. For the PoW calculations the algorithm is instantiated with the following parameters:¶
Figure 4 illustrates the format of the data "P" on which the PoW is calculated.¶
Usually, PoW schemes require to find one POW value such that a specific number of leading zeroes are found in the hash result. This number is then referred to as the difficulty of the PoW. In order to reduce the variance in time it takes to calculate the PoW, a valid GNS revocation requires that a number Z different PoWs must be found that on average have D leading zeroes.¶
The resulting proofs are ready for dissemination. The concrete dissemination and publication methods are out of scope of this document. Given an average difficulty of D, the proofs have an expiration time of EPOCH. With each additional bit difficulty, the lifetime of the proof is prolonged for another EPOCH. Consequently, by calculating a more difficult PoW, the lifetime of the proof can be increased on demand by the zone owner.¶
The parameters are defined as follows:¶
The revocation message wire format is illustrated in Figure 5.¶
The signature over the public key covers a 32-bit header prefixed to the time stamp and public key fields. The header includes the key length and signature purpose. The wire format is illustrated in Figure 6.¶
In order to validate a revocation the following steps MUST be taken:¶
The TTL field in the revocation message is informational. A revocation MAY be discarded without checking the POW values or the signature if the TTL (in combination with TIMESTAMP) indicates that the revocation has already expired. The actual validity period of the revocation MUST be determined by examining the leading zeroes in the POW values.¶
The validity period of the revocation is calculated as (D'-D+1) * EPOCH * 1.1. The EPOCH is extended by 10% in order to deal with unsynchronized clocks. The validity period added on top of the TIMESTAMP yields the expiration date. If the current time is after the expiration date, the revocation is considered stale.¶
Verified revocations MUST be stored locally. The implementation MAY discard stale revocations and evict then from the local store at any time.¶
Implementations MUST broadcast received revocations if they are valid and not stale. Should the calculated validity period differ from the TTL field value, the calculated value MUST be used as TTL field value when forwarding the revocation message. Systems might disagree on the current time, so implementations MAY use stale but otherwise valid revocations but SHOULD NOT broadcast them. Forwarded stale revocations MAY be discarded.¶
Any locally stored revocation MUST be considered during delegation record processing (Section 7.3.4).¶
A GNS implementation SHOULD provide a mechanism to create and manage local zones as well as a persistence mechanism such as a database for resource records. A new local zone is established by selecting a zone type and creating a zone key pair. If this mechanism is not implemented, no zones can be published in the storage (Section 6) and name resolution is limited to non-local start zones (Section 7.1).¶
A GNS resource record holds the data of a specific record in a zone. The resource record format is defined in Figure 7.¶
Flags indicate metadata surrounding the resource record. An application creating resource records MUST set all bits to 0 unless it wants to set the respective flag. As additional flags can be defined in future protocol versions, if an application or implementation encounters a flag which it does not recognize, it MUST be ignored. Any combination of the flags specified below are valid. Figure 8 illustrates the flag distribution in the 16-bit flag field of a resource record:¶
This section defines the initial set of zone delegation record types. Any implementation SHOULD support all zone types defined here and MAY support any number of additional delegation records defined in the GANA "GNS Record Types" registry (see [GANA]). Not supporting some zone types will result in resolution failures in case the respective zone type is encountered. This can be a valid choice if some zone delegation record types have been determined to be cryptographically insecure. Zone delegation records MUST NOT be stored and published under the apex label. A zone delegation record type value is the same as the respective ztype value. The ztype defines the cryptographic primitives for the zone that is being delegated to. A zone delegation record payload contains the public key of the zone to delegate to. A zone delegation record MUST have the CRITICAL flag set and MUST be the only non-supplemental record under a label. There MAY be inactive records of the same type which have the SHADOW flag set in order to facilitate smooth key rollovers.¶
In the following, "||" is the concatenation operator of two byte strings. The algorithm specification uses character strings such as GNS labels or constant values. When used in concatenations or as input to functions the null-terminator of the character strings MUST NOT be included.¶
In GNS, a delegation of a label to a zone of type "PKEY" is represented through a PKEY record. The PKEY DATA entry wire format can be found in Figure 9.¶
For PKEY zones the zone key material is derived using the curve parameters of the twisted Edwards representation of Curve25519 [RFC7748] (the reasoning behind choosing this curve can be found in Section 9.3) with the ECDSA scheme [RFC6979]. The following naming convention is used for the cryptographic primitives of PKEY zones:¶
The zone type and zone key of a PKEY are 4 + 32 bytes in length. This means that a zTLD will always fit into a single label and does not need any further conversion. Given a label, the output zk' of the ZKDF(zk,label) function is calculated as follows for PKEY zones:¶
ZKDF(zk,label): PRK_h := HKDF-Extract ("key-derivation", zk) h := HKDF-Expand (PRK_h, label || "gns", 512 / 8) zk' := (h mod L) * zk return zk'¶
The PKEY cryptosystem uses a hash-based key derivation function (HKDF) as defined in [RFC5869], using SHA-512 [RFC6234] for the extraction phase and SHA-256 [RFC6234] for the expansion phase. PRK_h is key material retrieved using an HKDF using the string "key-derivation" as salt and the zone key as initial keying material. h is the 512-bit HKDF expansion result and must be interpreted in network byte order. The expansion information input is a concatenation of the label and the string "gns". The multiplication of zk with h is a point multiplication, while the multiplication of d with h is a scalar multiplication.¶
The Sign() and Verify() functions for PKEY zones are implemented using 512-bit ECDSA deterministic signatures as specified in [RFC6979]. The same functions can be used for derived keys:¶
SignDerived(d,label,message): zk := d * G PRK_h := HKDF-Extract ("key-derivation", zk) h := HKDF-Expand (PRK_h, label || "gns", 512 / 8) d' := (h * d) mod L return Sign(d',message)¶
A signature (R,S) is valid if the following holds:¶
VerifyDerived(zk,label,message,signature): zk' := ZKDF(zk,label) return Verify(zk',message,signature)¶
The S-Encrypt() and S-Decrypt() functions use AES in counter mode as defined in [MODES] (CTR-AES-256):¶
S-Encrypt(zk,label,expiration,plaintext): PRK_k := HKDF-Extract ("gns-aes-ctx-key", zk) PRK_n := HKDF-Extract ("gns-aes-ctx-iv", zk) K := HKDF-Expand (PRK_k, label, 256 / 8) NONCE := HKDF-Expand (PRK_n, label, 32 / 8) IV := NONCE || expiration || 0x0000000000000001 return CTR-AES256(K, IV, plaintext) S-Decrypt(zk,label,expiration,ciphertext): PRK_k := HKDF-Extract ("gns-aes-ctx-key", zk) PRK_n := HKDF-Extract ("gns-aes-ctx-iv", zk) K := HKDF-Expand (PRK_k, label, 256 / 8) NONCE := HKDF-Expand (PRK_n, label, 32 / 8) IV := NONCE || expiration || 0x0000000000000001 return CTR-AES256(K, IV, ciphertext)¶
The key K and counter IV are derived from the record label and the zone key zk using a hash-based key derivation function (HKDF) as defined in [RFC5869]. SHA-512 [RFC6234] is used for the extraction phase and SHA-256 [RFC6234] for the expansion phase. The output keying material is 32 bytes (256 bits) for the symmetric key and 4 bytes (32 bits) for the nonce. The symmetric key K is a 256-bit AES [RFC3826] key.¶
The nonce is combined with a 64-bit initialization vector and a 32-bit block counter as defined in [RFC3686]. The block counter begins with the value of 1, and it is incremented to generate subsequent portions of the key stream. The block counter is a 32-bit integer value in network byte order. The initialization vector is the expiration time of the resource record block in network byte order. The resulting counter (IV) wire format can be found in Figure 10.¶
In GNS, a delegation of a label to a zone of type "EDKEY" is represented through a EDKEY record. The EDKEY DATA entry wire format is illustrated in Figure 11.¶
For EDKEY zones the zone key material is derived using the curve parameters of the twisted edwards representation of Curve25519 [RFC7748] (a.k.a. Ed25519) with the Ed25519 scheme [ed25519] as specified in [RFC8032]. The following naming convention is used for the cryptographic primitives of EDKEY zones:¶
The zone type and zone key of an EDKEY are 4 + 32 bytes in length. This means that a zTLD will always fit into a single label and does not need any further conversion.¶
The "EDKEY" ZKDF instantiation is based on [Tor224]. The calculation of a is defined in Section 5.1.5 of [RFC8032]. Given a label, the output of the ZKDF function is calculated as follows:¶
ZKDF(zk,label): /* Calculate the blinding factor */ PRK_h := HKDF-Extract ("key-derivation", zk) h := HKDF-Expand (PRK_h, label || "gns", 512 / 8) /* Ensure that h == h mod L */ h[31] &= 7 zk' := h * zk return zk'¶
Implementers SHOULD employ a constant time scalar multiplication for the constructions above to protect against timing attacks. Otherwise, timing attacks could leak private key material if an attacker can predict when a system starts the publication process.¶
The EDKEY cryptosystem uses a hash-based key derivation function (HKDF) as defined in [RFC5869], using SHA-512 [RFC6234] for the extraction phase and HMAC-SHA256 [RFC6234] for the expansion phase. PRK_h is key material retrieved using an HKDF using the string "key-derivation" as salt and the zone key as initial keying material. The blinding factor h is the 512-bit HKDF expansion result. The expansion information input is a concatenation of the label and the string "gns". The result of the HKDF must be clamped and interpreted in network byte order. a is the 256-bit integer corresponding to the 256-bit private key d. The multiplication of zk with h is a point multiplication, while the division and multiplication of a and a1 with the co-factor are integer operations.¶
The Sign(d,message) and Verify(zk,message,signature) procedures MUST be implemented as defined in [RFC8032].¶
Signatures for EDKEY zones use a derived private scalar d' which is not compliant with [RFC8032]. As the corresponding private key to the derived private scalar is not known, it is not possible to deterministically derive the signature part R according to [RFC8032]. Instead, signatures MUST be generated as follows for any given message and private zone key: A nonce is calculated from the highest 32 bytes of the expansion of the private key d and the blinding factor h. The nonce is then hashed with the message to r. This way, the full derivation path is included in the calculation of the R value of the signature, ensuring that it is never reused for two different derivation paths or messages.¶
SignDerived(d,label,message): /* Key expansion */ dh := SHA-512 (d) /* EdDSA clamping */ a := dh[0..31] a[0] &= 248 a[31] &= 127 a[31] |= 64 /* Calculate zk corresponding to d */ zk := a * G /* Calculate blinding factor */ PRK_h := HKDF-Extract ("key-derivation", zk) h := HKDF-Expand (PRK_h, label || "gns", 512 / 8) /* Ensure that h == h mod L */ h[31] &= 7 zk' := h * zk a1 := a >> 3 a2 := (h * a1) mod L d' := a2 << 3 nonce := SHA-256 (dh[32..63] || h) r := SHA-512 (nonce || message) R := r * G S := r + SHA-512(R || zk' || message) * d' mod L return (R,S)¶
A signature (R,S) is valid if the following holds:¶
VerifyDerived(zk,label,message,signature): zk' := ZKDF(zk,label) (R,S) := signature return S * G == R + SHA-512(R, zk', message) * zk'¶
The S-Encrypt() and S-Decrypt() functions use XSalsa20 as defined in [XSalsa20] (XSalsa20-Poly1305):¶
S-Encrypt(zk,label,expiration,message): PRK_k := HKDF-Extract ("gns-xsalsa-ctx-key", zk) PRK_n := HKDF-Extract ("gns-xsalsa-ctx-iv", zk) K := HKDF-Expand (PRK_k, label, 256 / 8) NONCE := HKDF-Expand (PRK_n, label, 128 / 8) IV := NONCE || expiration return XSalsa20-Poly1305(K, IV, message) S-Decrypt(zk,label,expiration,ciphertext): PRK_k := HKDF-Extract ("gns-xsalsa-ctx-key", zk) PRK_n := HKDF-Extract ("gns-xsalsa-ctx-iv", zk) K := HKDF-Expand (PRK_k, label, 256 / 8) NONCE := HKDF-Expand (PRK_n, label, 128 / 8) IV := NONCE || expiration return XSalsa20-Poly1305(K, IV, ciphertext)¶
The result of the XSalsa20-Poly1305 encryption function is the encrypted ciphertext followed by the 128-bit authentication tag. Accordingly, the length of encrypted data equals the length of the data plus the 16 bytes of the authentication tag.¶
The key K and counter IV are derived from the record label and the zone key zk using a hash-based key derivation function (HKDF) as defined in [RFC5869]. SHA-512 [RFC6234] is used for the extraction phase and SHA-256 [RFC6234] for the expansion phase. The output keying material is 32 bytes (256 bits) for the symmetric key and 16 bytes (128 bits) for the NONCE. The symmetric key K is a 256-bit XSalsa20 [XSalsa20] key. No additional authenticated data (AAD) is used.¶
The nonce is combined with an 8 byte initialization vector. The initialization vector is the expiration time of the resource record block in network byte order. The resulting counter (IV) wire format is illustrated in Figure 12.¶
Redirect records are used to redirect resolution. Any implementation SHOULD support all redirection record types defined here and MAY support any number of additional redirection records defined in the GANA "GNS Record Types" registry [GANA]. Redirection records MUST have the CRITICAL flag set. Not supporting some record types can result in resolution failures. This can be a valid choice if some redirection record types have been determined to be insecure, or if an application has reasons to not support redirection to DNS for reasons such as complexity or security. Redirection records MUST NOT be stored and published under the apex label.¶
A REDIRECT record is the GNS equivalent of a CNAME record in DNS. A REDIRECT record MUST be the only non-supplemental record under a label. There MAY be inactive records of the same type which have the SHADOW flag set in order to facilitate smooth changes of redirection targets. No other records are allowed. Details on processing of this record is defined in Section 7.3.1. A REDIRECT DATA entry is illustrated in Figure 13.¶
It is possible to delegate a label back into DNS through a GNS2DNS record. The resource record contains a DNS name for the resolver to continue with in DNS followed by a DNS server. Both names are in the format defined in [RFC1034] for DNS names. There MAY be multiple GNS2DNS records under a label. There MAY also be DNSSEC DS records or any other records used to secure the connection with the DNS servers under the same label. There MAY be inactive records of the same type(s) which have the SHADOW flag set in order to facilitate smooth changes of redirection targets. No other non-supplemental record types are allowed in the same record set. A GNS2DNS DATA entry is illustrated in Figure 14.¶
NOTE: If an application uses DNS names obtained from GNS2DNS records in a DNS request they MUST first be converted to an IDNA compliant representation [RFC5890].¶
This section defines the initial set of auxiliary GNS record types. Any implementation SHOULD be able to process the specified record types according to Section 7.3.¶
This record is used to provide a hint for LEgacy HOstnames: Applications can use the GNS to lookup IPv4 or IPv6 addresses of internet services. However, sometimes connecting to such services does not only require the knowledge of an address and port, but also requires the canonical DNS name of the service to be transmitted over the transport protocol. In GNS, legacy host name records provide applications the DNS name that is required to establish a connection to such a service. The most common use case is HTTP virtual hosting and TLS Server Name Indication [RFC6066], where a DNS name must be supplied in the HTTP "Host"-header and the TLS handshake, respectively. Using a GNS name in those cases might not work as it might not be globally unique. Furthermore, even if uniqueness is not an issue, the legacy service might not even be aware of GNS.¶
A LEHO resource record is expected to be found together in a single resource record with an IPv4 or IPv6 address. A LEHO DATA entry is illustrated in Figure 15.¶
NOTE: If an application uses a LEHO value in an HTTP request header (e.g. "Host:" header) it MUST be converted to an IDNA compliant representation [RFC5890].¶
Nickname records can be used by zone administrators to publish a label that a zone prefers to have used when it is referred to. This is a suggestion to other zones what label to use when creating a delegation record (Section 5.1) containing this zone key. This record SHOULD only be stored under the apex label "@" but MAY be returned with record sets under any label as a supplemental record. Section 7.3.5 details how a resolver must process supplemental and non-supplemental NICK records. A NICK DATA entry is illustrated in Figure 16.¶
GNS lookups are expected to return all of the required useful information in one record set. This avoids unnecessary additional lookups and cryptographically ties together information that belongs together, making it impossible for an adversarial storage to provide partial answers that might omit information critical for security.¶
This general strategy is incompatible with the special labels used by DNS for SRV and TLSA records. Thus, GNS defines the BOX record format to box up SRV and TLSA records and include them in the record set of the label they are associated with. For example, a TLSA record for "_https._tcp.example.org" will be stored in the record set of "example.org" as a BOX record with service (SVC) 443 (https) and protocol (PROTO) 6 (tcp) and record TYPE "TLSA". For reference, see also [RFC2782]. A BOX DATA entry is illustrated in Figure 17.¶
Any API which allows storing a value under a 512-bit key and retrieving one or more values from the key can be used by an implementation for record storage. To be useful, the API MUST permit storing at least 176 byte values to be able to support the defined zone delegation record encodings, and SHOULD allow at least 1024 byte values. In the following, it is assumed that an implementation realizes two procedures on top of a storage:¶
PUT(key,value) GET(key) -> value¶
There is no explicit delete function as the deletion of a non-expired record would require a revocation of the record. In GNS, zones can only be revoked as a whole. Records automatically expire and it is under the discretion of the storage as to when to delete the record. The GNS implementation MUST NOT publish expired resource records. Any GNS resolver MUST discard expired records returned from the storage.¶
Resource records are grouped by their respective labels, encrypted and published together in a single records block (RRBLOCK) in the storage under a storage key q as illustrated in Figure 18. The implementation MUST use the PUT storage procedure in order to update the zone contents accordingly.¶
The storage key is derived from the zone key and the respective label of the contained records. The required knowledge of both zone key and label in combination with the similarly derived symmetric secret keys and blinded zone keys ensure query privacy (see [RFC8324], Section 3.5). The storage Key derivation and records block creation using is specified in the following sections and a high-level overview is illustrated in Figure 19.¶
Given a label, the storage key q is derived as follows:¶
q := SHA-512 (ZKDF(zk, label))¶
GNS records are grouped by their labels and published as a single block in the storage. The grouped record sets MAY be paired with any number of supplemental records. Supplemental records MUST have the supplemental flag set (See Section 5). The contained resource records are encrypted using a symmetric encryption scheme. A GNS implementation publishes RRBLOCKs in accordance to the properties and recommendations of the underlying storage. This can include a periodic refresh operation to ensure the availability of the published RRBLOCKs. The GNS RRBLOCK wire format is illustrated in Figure 20.¶
The signature over the public key covers a 32-bit pseudo header conceptually prefixed to the EXPIRATION and the BDATA fields. The wire format is illustrated in Figure 21.¶
A symmetric encryption scheme is used to encrypt the resource records set RDATA into the BDATA field of a GNS RRBLOCK. The wire format of the RDATA is illustrated in Figure 22.¶
Names in GNS are resolved by recursively querying the record storage. Recursive in this context means that a resolver does not provide intermediate results for a query to the application. Instead, it MUST respond to a resolution request with either the requested resource record or an error message in case the resolution fails. Figure 23 illustrates how an application requests the lookup of a GNS name (1). The application MAY provide a desired record type to the resolver. Subsequently, the Start Zone is determined (2) and the recursive resolution process started. This is where the desired record type is used to guide processing. For example, if a zone delegation record type is requested, the resolution of the apex label in that zone must be skipped, as the desired record is already found. Details on how the resolution process is initiated and each iterative result (3a,3b) in the resolution is processed are provided in the sections below. The results of the lookup are eventually returned to the application (4). The implementation MUST NOT filter results according to the desired record type. Filtering of record sets is typically done by the application.¶
The resolution of a GNS name starts by identifying the start zone suffix. Once the start zone suffix is identified, recursive resolution of the remainder of the name is initiated (Section 7.2). There are two types of start zone suffixes: zTLDs and local suffix-to-zone mappings. The choice of available suffix-to-zone mappings is at the sole discretion of the local system administrator or user. This property addresses the issue of a single hierarchy with a centrally controlled root and the related issue of distribution and management of root servers in DNS (see [RFC8324], Section 3.10 and 3.12).¶
For names ending with a zTLD the start zone is explicitly given in the suffix of the name to resolve. In order to ensure uniqueness of names with zTLDs any implementation MUST use the given zone as start zone. An implementation MUST first try to interpret the rightmost label of the given name as the beginning of a zTLD (Section 4.1). If the rightmost label cannot be (partially) decoded or if it does not indicate a supported ztype, the name is treated as a normal name and start zone discovery MUST continue with finding a local suffix-to-zone mapping. If a valid ztype can be found in the rightmost label, the implementation MUST try to synthesize and decode the zTLD to retrieve the start zone key according to Section 4.1. If the zTLD cannot be synthesized or decoded, the resolution of the name fails and an error is returned to the application. Otherwise, the zone key MUST be used as the start zone:¶
Example name: www.example.<zTLD> => Start zone: zk of type ztype => Name to resolve from start zone: www.example¶
For names not ending with a zTLD the resolver MUST determine the start zone through a local suffix-to-zone mapping. Suffix-to-zone mappings MUST be configurable through a local configuration file or database by the user or system administrator. A suffix MAY consist of multiple GNS labels concatenated with a label separator. If multiple suffixes match the name to resolve, the longest matching suffix MUST be used. The suffix length of two results MUST NOT be equal. This indicates a misconfiguration and the implementation MUST return an error. The following is a non-normative example mapping of start zones:¶
Example name: www.example.xyz.gns.alt Local suffix mappings: xyz.gns.alt = zTLD0 := Base32GNS(ztype0||zk0) example.xyz.gns.alt = zTLD1 := Base32GNS(ztype1||zk1) example.com.gns.alt = zTLD2 := Base32GNS(ztype2||zk2) ... => Start zone: zk1 => Name to resolve from start zone: www¶
The process given above MAY be supplemented with other mechanisms if the particular application requires a different process. If no start zone can be discovered, resolution MUST fail and an error MUST be returned to the application.¶
In each step of the recursive name resolution, there is an authoritative zone zk and a name to resolve. The name MAY be empty. If the name is empty, it is interpreted as the apex label "@". Initially, the authoritative zone is the start zone.¶
From here, the following steps are recursively executed, in order:¶
Upon receiving the RRBLOCK from the storage, as part of verifying the provided signature, the resolver MUST check that the SHA-512 hash of the derived authoritative zone key zk' from the RRBLOCK matches the query q and that the block is not yet expired. If the signature does not match or the block is expired, the RRBLOCK MUST be ignored and, if applicable, the storage lookup GET(q) MUST continue to look for other RRBLOCKs.¶
Record processing occurs once a well-formed block has been decrypted. In record processing, only the valid records obtained are considered. To filter records by validity, the resolver MUST at least check the expiration time and the FLAGS field of the respective record. In particular, SHADOW and SUPPLEMENTAL flags can exclude the record from being considered. If the resolver encounters a record with the CRITICAL flag set and does not support the record type the resolution MUST be aborted and an error MUST be returned. The information that the critical record could not be processed SHOULD be returned in the error description. The implementation MAY choose not to return the reason for the failure, merely complicating troubleshooting for the user.¶
The next steps depend on the context of the name that is being resolved:¶
If the remaining name is empty and the desired record type is REDIRECT, in which case the resolution concludes with the REDIRECT record. If the rightmost label of the redirect name is the extension label (U+002B, "+"), resolution continues in GNS with the new name in the current zone. Otherwise, the resulting name is resolved via the default operating system name resolution process. This can in turn trigger a GNS name resolution process depending on the system configuration. In case resolution continues in DNS, the name MUST first be converted to an IDNA compliant representation [RFC5890].¶
In order to prevent infinite loops, the resolver MUST implement loop detection or limit the number of recursive resolution steps. The loop detection MUST be effective even if a REDIRECT found in GNS triggers subsequent GNS lookups via the default operating system name resolution process.¶
When a resolver encounters one or more GNS2DNS records and the remaining name is empty and the desired record type is GNS2DNS, the GNS2DNS records are returned.¶
Otherwise, it is expected that the resolver first resolves the IP addresses of the specified DNS name servers. The DNS name MUST be converted to an IDNA compliant representation [RFC5890] for resolution in DNS. GNS2DNS records MAY contain numeric IPv4 or IPv6 addresses, allowing the resolver to skip this step. The DNS server names might themselves be names in GNS or DNS. If the rightmost label of the DNS server name is the extension label (U+002B, "+"), the rest of the name is to be interpreted relative to the zone of the GNS2DNS record. If the DNS server name ends in a label representation of a zone key, the DNS server name is to be resolved against the GNS zone zk.¶
Multiple GNS2DNS records can be stored under the same label, in which case the resolver MUST try all of them. The resolver MAY try them in any order or even in parallel. If multiple GNS2DNS records are present, the DNS name MUST be identical for all of them. Otherwise, it is not clear which name the resolver is supposed to follow. If multiple DNS names are present the resolution fails and an appropriate error is SHOULD be returned to the application.¶
If there are DNSSEC DS records or any other records used to secure the connection with the DNS servers stored under the label, the DNS resolver SHOULD use them to secure the connection with the DNS server.¶
Once the IP addresses of the DNS servers have been determined, the DNS name from the GNS2DNS record is appended to the remainder of the name to be resolved, and resolved by querying the DNS name server(s). The synthesized name has to be converted to an IDNA compliant representation [RFC5890] for resolution in DNS. If such a conversion is not possible, the resolution MUST be aborted and an error MUST be returned. The information that the critical record could not be processed SHOULD be returned in the error description. The implementation MAY choose not to return the reason for the failure, merely complicating troubleshooting for the user.¶
As the DNS servers specified are possibly authoritative DNS servers, the GNS resolver MUST support recursive DNS resolution and MUST NOT delegate this to the authoritative DNS servers. The first successful recursive name resolution result is returned to the application. In addition, the resolver SHOULD return the queried DNS name as a supplemental LEHO record (see Section 5.3.1) with a relative expiration time of one hour.¶
Once the transition from GNS into DNS is made through a GNS2DNS record, there is no "going back". The (possibly recursive) resolution of the DNS name MUST NOT delegate back into GNS and should only follow the DNS specifications. For example, names contained in DNS CNAME records MUST NOT be interpreted by resolvers that support both DNS and GNS as GNS names.¶
GNS resolvers SHOULD offer a configuration option to disable DNS processing to avoid information leakage and provide a consistent security profile for all name resolutions. Such resolvers would return an empty record set upon encountering a GNS2DNS record during the recursion. However, if GNS2DNS records are encountered in the record set for the apex label and a GNS2DNS record is explicitly requested by the application, such records MUST still be returned, even if DNS support is disabled by the GNS resolver configuration.¶
When a BOX record is received, a GNS resolver must unbox it if the name to be resolved continues with "_SERVICE._PROTO". Otherwise, the BOX record is to be left untouched. This way, TLSA (and SRV) records do not require a separate network request, and TLSA records become inseparable from the corresponding address records.¶
When the resolver encounters a record of a supported zone delegation record type (such as PKEY or EDKEY) and the remainder of the name is not empty, resolution continues recursively with the remainder of the name in the GNS zone specified in the delegation record.¶
Whenever a resolver encounters a new GNS zone, it MUST check against the local revocation list whether the respective zone key has been revoked. If the zone key was revoked, the resolution MUST fail with an empty result set.¶
Implementations MUST NOT allow multiple different zone delegations under a single label. Implementations MAY support any subset of ztypes. Handling of Implementations MUST NOT process zone delegation for the apex label "@". Upon encountering a zone delegation record under this label, resolution fails and an error MUST be returned. The implementation MAY choose not to return the reason for the failure, merely impacting troubleshooting information for the user.¶
If the remainder of the name to resolve is empty and a record set was received containing only a single delegation record, the recursion is continued with the record value as authoritative zone and the apex label "@" as remaining name. Except in the case where the desired record type as specified by the application is equal to the ztype, in which case the delegation record is returned.¶
NICK records are only relevant to the recursive resolver if the record set in question is the final result which is to be returned to the application. The encountered NICK records can either be supplemental (see Section 5) or non-supplemental. If the NICK record is supplemental, the resolver only returns the record set if one of the non-supplemental records matches the queried record type. It is possible that one record set contains both supplemental and non-supplemental NICK records.¶
The differentiation between a supplemental and non-supplemental NICK record allows the application to match the record to the authoritative zone. Consider the following example:¶
Query: alice.example.gns.alt (type=A) Result: A: 192.0.2.1 NICK: eve (non-Supplemental)¶
In this example, the returned NICK record is non-supplemental. For the application, this means that the NICK belongs to the zone "alice.example.gns.alt" and is published under the apex label along with an A record. The NICK record is interpreted as: The zone defined by "alice.example.gns.alt" wants to be referred to as "eve". In contrast, consider the following:¶
Query: alice.example.gns.alt (type=AAAA) Result: AAAA: 2001:DB8::1 NICK: john (Supplemental)¶
In this case, the NICK record is marked as supplemental. This means that the NICK record belongs to the zone "example.gns.alt" and is published under the label "alice" along with an A record. The NICK record should be interpreted as: The zone defined by "example.gns.alt" wants to be referred to as "john". This distinction is likely useful for other records published as supplemental.¶
All names in GNS are encoded in UTF-8 [RFC3629]. Labels MUST be canonicalized using Normalization Form C (NFC) [Unicode-UAX15]. This does not include any DNS names found in DNS records, such as CNAME record data, which is internationalized through the IDNA specifications [RFC5890].¶
In order to ensure availability of records beyond their absolute expiration times, implementations MAY allow to locally define relative expiration time values of records. Records can then be published recurringly with updated absolute expiration times by the implementation.¶
Implementations MAY allow users to manage private records in their zones that are not published in the storage. Private records are considered just like regular records when resolving labels in local zones, but their data is completely unavailable to non-local users.¶
The security of cryptographic systems depends on both the strength of the cryptographic algorithms chosen and the strength of the keys used with those algorithms. The security also depends on the engineering of the protocol used by the system to ensure that there are no non-cryptographic ways to bypass the security of the overall system. This is why developers of applications managing GNS zones SHOULD select a default ztype considered secure at the time of releasing the software. For applications targeting end users that are not expected to understand cryptography, the application developer MUST NOT leave the ztype selection of new zones to end users.¶
This document concerns itself with the selection of cryptographic algorithms used in GNS. The algorithms identified in this document are not known to be broken (in the cryptographic sense) at the current time, and cryptographic research so far leads us to believe that they are likely to remain secure into the foreseeable future. However, this is not necessarily forever, and it is expected that new revisions of this document will be issued from time to time to reflect the current best practices in this area.¶
In terms of crypto-agility, whenever the need for an updated cryptographic scheme arises to, for example, replace ECDSA over Ed25519 for PKEY records it can simply be introduced through a new record type. Zone administrators can then replace the delegation record type for future records. The old record type remains and zones can iteratively migrate to the updated zone keys. To ensure that implementations correctly generate an error message when encountering a ztype that they do not support, current and future delegation records must always have the CRITICAL flag set.¶
The following considerations provide background on the design choices of the ztypes specified in this document. When specifying new ztypes as per Section 4, the same considerations apply.¶
GNS PKEY zone keys use ECDSA over Ed25519. This is an unconventional choice, as ECDSA is usually used with other curves. However, standardized ECDSA curves are problematic for a range of reasons described in the Curve25519 and EdDSA papers [ed25519]. Using EdDSA directly is also not possible, as a hash function is used on the private key which destroys the linearity that the key blinding in GNS depends upon. We are not aware of anyone suggesting that using Ed25519 instead of another common curve of similar size would lower the security of ECDSA. GNS uses 256-bit curves because that way the encoded (public) keys fit into a single DNS label, which is good for usability.¶
In order to ensure ciphertext indistinguishability, care must be taken with respect to the initialization vector in the counter block. In our design, the IV always includes the expiration time of the record block. When applications store records with relative expiration times, monotonicity is implicitly ensured because each time a block is published into the storage, its IV is unique as the expiration time is calculated dynamically and increases monotonically with the system time. Still, an implementation MUST ensure that when relative expiration times are decreased, the expiration time of the next record block MUST be after the last published block. For records where an absolute expiration time is used, the implementation MUST ensure that the expiration time is always increased when the record data changes. For example, the expiration time on the wire could be increased by a single microsecond even if the user did not request a change. In case of deletion of all resource records under a label, the implementation MUST keep track of the last absolute expiration time of the last published resource block. Implementations MAY define and use a special record type as a tombstone that preserves the last absolute expiration time, but then MUST take care to not publish a block with this record. When new records are added under this label later, the implementation MUST ensure that the expiration times are after the last published block. Finally, in order to ensure monotonically increasing expiration times the implementation MUST keep a local record of the last time obtained from the system clock, so as to construct a monotonic clock in case the system clock jumps backwards.¶
GNS names are UTF-8 strings. Consequently, GNS faces similar issues with respect to name spoofing as DNS does for internationalized domain names. In DNS, attackers can register similar sounding or looking names (see above) in order to execute phishing attacks. GNS zone administrators must take into account this attack vector and incorporate rules in order to mitigate it.¶
Further, DNS can be used to combat illegal content on the internet by having the respective domains seized by authorities. However, the same mechanisms can also be abused in order to impose state censorship. Avoiding that possibility is one of the motivations behind GNS. In GNS, TLDs are not enumerable. By design, the start zone of the resolver is defined locally and hence such a seizure is difficult and ineffective in GNS.¶
In GNS, zone administrators need to manage and protect their zone keys. Once a zone key is lost, it cannot be recovered or revoked. Revocation messages can be pre-calculated if revocation is required in case a zone key is lost. Zone administrators, and for GNS this includes end-users, are required to responsibly and diligently protect their cryptographic keys. GNS supports signing records in advance ("offline") in order to support processes which aim to protect private keys such as air gaps.¶
Similarly, users are required to manage their local start zone configuration. In order to ensure integrity and availability or names, users must ensure that their local start zone information is not compromised or outdated. It can be expected that the processing of zone revocations and an initial start zone is provided with a GNS implementation ("drop shipping"). Shipping an initial start zone configuration effectively establishes a root zone. Extension and customization of the zone is at the full discretion of the user.¶
While implementations following this specification will be interoperable, if two implementations connect to different storages they are mutually unreachable. This can lead to a state where a record exists in the global namespace for a particular name, but the implementation is not communicating with the storage and is hence unable to resolve it. This situation is similar to a split-horizon DNS configuration. Which storages are implemented usually depends on the application it is built for. The storage used will most likely depend on the specific application context using GNS resolution. For example, one application is the resolution of hidden services within the Tor network, which would suggest using Tor routers for storage. Implementations of "aggregated" storages are conceivable, but are expected to be the exception.¶
This document does not specify the properties of the underlying storage which is required by any GNS implementation. It is important to note that the properties of the underlying storage are directly inherited by the GNS implementation. This includes both security as well as other non-functional properties such as scalability and performance. Implementers should take great care when selecting or implementing a DHT for use as storage in a GNS implementation. DHTs with reasonable security and performance properties exist [R5N]. It should also be taken into consideration that GNS implementations which build upon different DHT overlays are unlikely to be interoperable with each other.¶
Zone administrators are advised to pre-generate zone revocations and to securely store the revocation information in case the zone key is lost, compromised or replaced in the future. Pre-calculated revocations can cease to be valid due to expirations or protocol changes such as epoch adjustments. Consequently, implementers and users must take precautions in order to manage revocations accordingly.¶
Revocation payloads do not include a 'new' key for key replacement. Inclusion of such a key would have two major disadvantages:¶
GNS does not support authenticated denial of existence of names within a zone. Record blocks are published in encrypted form using keys derived from the zone key and record label. Zone administrators should carefully consider if the label and zone key is public or if those should be used and considered as a shared secret. Unlike zone keys, labels can also be guessed by an attacker in the network observing queries and responses. Given a known and targeted zone key, the use of well known or easily guessable labels effectively results in general disclosure of the records to the public. If the labels and hence the records should be kept secret except to those knowing a secret label and the zone in which to look, the label must be chosen accordingly. It is recommended to then use a label with sufficient entropy as to prevent guessing attacks.¶
It should be noted that this attack on labels only applies if the zone key is somehow disclosed to the adversary. GNS itself does not disclose it during a lookup or when resource records are published as the zone keys are blinded beforehand. However, zone keys do become public during revocation.¶
While DNS is distributed, in practice it relies on centralized, trusted registrars to provide globally unique names. As the awareness of the central role DNS plays on the Internet rises, various institutions are using their power (including legal means) to engage in attacks on the DNS, thus threatening the global availability and integrity of information on the Internet. While a wider discussion of this issue is out of scope for this document, analyses and investigations can be found in recent academic research works including [SecureNS].¶
GNS is designed to provide a secure, privacy-enhancing alternative to the DNS name resolution protocol, especially when censorship or manipulation is encountered. In particular, it directly addresses concerns in DNS with respect to query privacy. However, depending on the governance of the root zone, any deployment will likely suffer from the issues of a "Single Hierarchy with a Centrally Controlled Root" and "Distribution and Management of Root Servers" as raised in [RFC8324]. In DNS, those issues are a direct result from the centralized root zone governance at the Internet Corporation for Assigned Names and Numbers (ICANN) which allows it to provide globally unique names.¶
In GNS, start zones give users local authority over their preferred root zone governance. It enables users to replace or enhance a trusted root zone configuration provided by a third party (e.g. the implementer or a multi-stakeholder governance body like ICANN) with secure delegation of authority using local petnames while operating under a very strong adversary model. In combination with zTLDs, this provides users of GNS with a global, secure and memorable mapping without a trusted authority.¶
Any GNS implementation MAY provide a default governance model in the form of an initial start zone mapping.¶
Technically, the GNS protocol can be used to resolve names in the namespace of the global DNS. However, this would require the respective governance bodies and stakeholders (e.g. IETF and ICANN) to standardize the use of GNS for this particular use case.¶
However, this capability implies that GNS names may be indistinguishable from DNS names in their respective common display format [RFC8499] or other special-use domain names [RFC6761] if a local start zone configuration maps suffixes from the global DNS to GNS zones. For applications, it is then ambiguous which name system should be used in order to resolve a given name. This poses a risk when trying to resolve a name through DNS when it is actually a GNS name as discussed in [RFC8244]. In such a case, the GNS name is likely to be leaked as part of the DNS resolution.¶
In order to prevent disclosure of queried GNS names it is RECOMMENDED that GNS-aware applications try to resolve a given name in GNS before any other method taking into account potential suffix-to-zone mappings and zTLDs. Suffix-to-zone mappings are expected to be configured by the user or local administrator and as such the resolution in GNS is in line with user expectations even if the name could also be resolved through DNS. If no suffix-to-zone mapping for the name exists and no zTLD is found, resolution MAY continue with other methods such as DNS. If a suffix-to-zone mapping for the name exists or the name ends with a zTLD, it MUST be resolved using GNS and resolution MUST NOT continue by any other means independent of the GNS resolution result.¶
Mechanisms such as the Name Service Switch (NSS) of Unix-like operating systems are an example of how such a resolution process can be implemented and used. It allows system administrators to configure host name resolution precedence and is integrated with the system resolver implementation.¶
For use cases where GNS names may be confused with names of other name resolution mechanisms (in particular DNS), the ".gns.alt" domain SHOULD be used. For use cases like implementing sinkholes to block malware sites or serving DNS domains via GNS to bypass censorship, GNS MAY be deliberately used in ways that interfere with resolution of another name system.¶
GANA has assigned signature purposes in its "GNUnet Signature Purpose" registry as listed in Figure 24.¶
GANA [GANA] manages the "GNS Record Types" registry. Each entry has the following format:¶
The registration policy for this registry is "First Come First Served". This policy is modeled on that described in [RFC8126], and describes the actions taken by GANA:¶
Adding new entries is possible after review by any authorized GANA contributor, using a first-come-first-served policy for unique name allocation. Reviewers are responsible to ensure that the chosen "Name" is appropriate for the record type. The registry will define a unique number for the entry.¶
Authorized GANA contributors for review of new entries are reachable at gns-registry@gnunet.org.¶
Any request MUST contain a unique name and a point of contact. The contact information MAY be added to the registry given the consent of the requester. The request MAY optionally also contain relevant references as well as a descriptive comment as defined above.¶
GANA has assigned numbers for the record types defined in this specification in the "GNU Name System Record Types" registry as listed in Figure 25.¶
GANA [GANA] manages the ".alt Subdomains" registry. Each entry has the following format:¶
The registration policy for this registry is "First Come First Served". This policy is modeled on that described in [RFC8126], and describes the actions taken by GANA:¶
Adding new entries is possible after review by any authorized GANA contributor, using a first-come-first-served policy for unique subdomain allocation. Reviewers are responsible to ensure that the chosen "Subdomain" is appropriate for the purpose.¶
Authorized GANA contributors for review of new entries are reachable at alt-registry@gnunet.org.¶
Any request MUST contain a unique subdomain and a point of contact. The contact information MAY be added to the registry given the consent of the requester. The request MAY optionally also contain relevant references as well as a descriptive comment as defined above.¶
GANA has assigned the subdomain defined in this specification in the ".alt subdomains" registry as listed in Figure 26.¶
This document makes no requests for IANA action. This section may be removed on publication as an RFC.¶
There are two implementations conforming to this specification written in C and Go, respectively. The C implementation as part of GNUnet [GNUnetGNS] represents the original and reference implementation. The Go implementation [GoGNS] demonstrates how two implementations of GNS are interoperable if they are built on top of the same underlying DHT storage.¶
Currently, the GNUnet peer-to-peer network [GNUnet] is an active deployment of GNS on top of its [R5N] DHT. The [GoGNS] implementation uses this deployment by building on top of the GNUnet DHT services available on any GNUnet peer. It shows how GNS implementations can attach to this existing deployment and participate in name resolution as well as zone publication.¶
The self-sovereign identity system re:claimID [reclaim] is using GNS in order to selectively share identity attributes and attestations with third parties.¶
The Ascension tool [Ascension] facilitates the migration of DNS zones to GNS zones by translating information retrieved from a DNS zone transfer into a GNS zone.¶
The authors thank all reviewers for their comments. In particular, we thank D. J. Bernstein, S. Bortzmeyer, A. Farrel, E. Lear and R. Salz for their insightful and detailed technical reviews. We thank J. Yao and J. Klensin for the internationalization reviews. We thank NLnet and NGI DISCOVERY for funding work on the GNU Name System.¶
This section outlines a number of specific use cases which may help readers of the technical specification to understand the protocol better. The considerations below are not meant to be normative for the GNS protocol in any way. Instead, they are provided in order to give context and to provide some background on what the intended use of the protocol is by its designers. Further, this section contains pointers to migration paths.¶
In order to become a zone owner, it is sufficient to generate a zone key and a corresponding secret key using a GNS implementation. At this point, the zone owner can manage GNS resource records in a local zone database. The resource records can then be published by a GNS implementation as defined in Section 6. For other users to resolve the resource records, respective zone information must be disseminated first. The zone owner may decide to make the zone key and labels known to a selected set of users only or to make this information available to the general public.¶
Sharing zone information directly with specific users not only allows to potentially preserve zone and record privacy, but also allows the zone owner and the user to establish strong trust relationships. For example, a bank may send a customer letter with a QR code which contains the GNS zone of the bank. This allows the user to scan the QR code and establish a strong link to the zone of the bank and with it, for example, the IP address of the online banking web site.¶
Most Internet services likely want to make their zones available to the general public as efficiently as possible. First, it is reasonable to assume that zones which are commanding high levels of reputation and trust are likely included in the default suffix-to-zone mappings of implementations. Hence dissemination of a zone through delegation under such zones can be a viable path in order to disseminate a zone publicly. For example, it is conceivable that organizations such as ICANN or country-code top-level domain registrars also manage GNS zones and offer registration or delegation services.¶
Following best practices in particularly those relating to security and abuse mitigation are methods which allow zone owners and aspiring registrars to gain a good reputation and eventually trust. This includes, of course, diligent protection of private zone key material. Formalizing such best practices is out of scope of this specification and should be addressed in a separate document and take Section 9 into account.¶
A user is expected to install a GNS implementation if it is not already provided through other means such as the operating system or the browser. It is likely that the implementation ships with a default start zone configuration. This means that the user is able to resolve GNS names ending on a zTLD or ending on any suffix-to-name mapping that is part of the default start zone configuration. At this point the user may delete or otherwise modify the implementation's default configuration:¶
Deletion of suffix-to-zone mappings may become necessary of the zone owner referenced by the mapping has lost the trust of the user. For example, this could be due to lax registration policies resulting in phishing activities. Modification and addition of new mappings are means to heal the namespace perforation which would occur in the case of a deletion or to simply establish a strong direct trust relationship. However, this requires the user's knowledge of the respective zone keys. This information must be retrieved out of band, as illustrated in Appendix A.1: A bank may send the user a letter with a QR code which contains the GNS zone of the bank. The user scans the QR code and adds a new suffix-to-name mapping using a chosen local name for his bank. Other examples include scanning zone information off the device of a friend, from a storefront, or an advertisement. The level of trust in the respective zone is contextual and likely varies from user to user. Trust in a zone provided through a letter from a bank which may also include a credit card is certainly different from a zone found on a random advertisement in the streets. However, this trust is immediately tangible to the user and can be reflected in the local naming as well.¶
User clients should facilitate the modification of the start zone configuration, for example by providing a QR code reader or other import mechanisms. Implementations are ideally implemented according to best practices and addressing applicable points from Section 9. Formalizing such best practices is out of scope of this specification.¶
HTTP virtual hosting and TLS Server Name Indication are common use cases on the Web. HTTP clients supply a DNS name in the HTTP "Host"-header or as part of the TLS handshake, respectively. This allows the HTTP server to serve the indicated virtual host with a matching TLS certificate. The global uniqueness of DNS names are a prerequisite of those use cases.¶
Not all GNS names are globally unique. But, any resource record in GNS can be represented as a concatenation of of a GNS label and the zTLD of the zone. While not human-readable, this globally unique GNS name can be leveraged in order to facilitate the same use cases. Consider the GNS name "www.example.gns" entered in a GNS-aware HTTP client. At first, "www.example.gns" is resolved using GNS yielding a record set. Then, the HTTP client determines the virtual host as follows:¶
If there is a LEHO record (Section 5.3.1) containing "www.example.com" in the record set, then the HTTP client uses this as the value of the "Host"-header field of the HTTP request:¶
GET / HTTP/1.1 Host: www.example.com¶
If there is no LEHO record in the record set, then the HTTP client tries to find the zone of the record and translates the GNS name into a globally unique zTLD-representation before using it in the "Host"-header field of the HTTP request:¶
GET / HTTP/1.1 Host: www.000G0037FH3QTBCK15Y8BCCNRVWPV17ZC7TSGB1C9ZG2TPGHZVFV1GMG3W¶
In order to determine the canonical representation of the record with a zTLD, at most two queries are required: First, it must be checked whether "www.example.gns.alt" itself points to a zone delegation record which would imply that the record set which was originally resolved is published under the apex label. If it does, the unique GNS name is simply the zTLD representation of the delegated zone:¶
GET / HTTP/1.1 Host: 000G0037FH3QTBCK15Y8BCCNRVWPV17ZC7TSGB1C9ZG2TPGHZVFV1GMG3W¶
If it does not, the unique GNS name is the concatenation of the label "www" and the zTLD representation of the zone as given in the example above. In any case, this representation is globally unique. As such, it can be configured by the HTTP server administrator as a virtual host name and respective certificates may be issued.¶
If the HTTP client is a browser, the use of a unique GNS name for virtual hosting or TLS SNI does not necessarily have to be shown to the user. For example, the name in the URL bar may remain as "www.example.gns.alt" even if the used unique name differs.¶
DNS resolution is built into a variety of existing software components. Most significantly operating systems and HTTP clients. This section illustrates possible migration paths for both in order to enable "legacy" applications to resolve GNS names.¶
One way to efficiently facilitate the resolution of GNS names are GNS-enabled DNS server implementations. Local DNS queries are thereby either rerouted or explicitly configured to be resolved by a "DNS-to-GNS" server that runs locally. This DNS server tries to interpret any incoming query for a name as a GNS resolution request. If no start zone can be found for the name and it does not end in a zTLD, the server tries to resolve the name in DNS. Otherwise, the name is resolved in GNS. In the latter case, the resulting record set is converted to a DNS answer packet and is returned accordingly. An implementation of a DNS-to-GNS server can be found in [GNUnet].¶
A similar approach is to use operating systems extensions such as the name service switch [nsswitch]. It allows the system administrator to configure plugins which are used for hostname resolution. A GNS name service switch plugin can be used in a similar fashion as the "DNS-to-GNS" server. An implementation of a glibc-compatible nsswitch plugin for GNS can be found in [GNUnet].¶
The methods above are usually also effective for HTTP client software. However, HTTP clients are commonly used in combination with TLS. TLS certificate validation and in particular server name indication (SNI) requires additional logic in HTTP clients when GNS names are in play (Appendix A.3). In order to transparently enable this functionality for migration purposes, a local GNS-aware SOCKS5 proxy [RFC1928] can be configured to resolve domain names. The SOCKS5 proxy, similar to the DNS-to-GNS server, is capable of resolving both GNS and DNS names. In the event of a TLS connection request with a GNS name, the SOCKS5 proxy can act as a man-in-the-middle, terminating the TLS connection and establishing a secure connection against the requested host. In order to establish a secure connection, the proxy may use LEHO and TLSA records stored in the record set under the GNS name. The proxy must provide a locally trusted certificate for the GNS name to the HTTP client which usually requires the generation and configuration of a local trust anchor in the browser. An implementation of this SOCKS5 proxy can be found in [GNUnet].¶
This table defines the encode symbol and decode symbol for a given symbol value. It can be used to implement the encoding by reading it as: A character "A" or "a" is decoded to a 5 bit value 10 when decoding. A 5 bit block with a value of 18 is encoded to the character "J" when encoding. If the bit length of the byte string to encode is not a multiple of 5 it is padded to the next multiple with zeroes. In order to further increase tolerance for failures in character recognition, the letter "U" MUST be decoded to the same value as the letter "V" in Base32GNS.¶
The following test vectors can be used by implementations to test for conformance with this specification. Unless indicated otherwise, the test vectors are provided as hexadecimal byte arrays.¶
Encoding (⇀) converts a byte array into a string; decoding (↽) converts
a string into a byte array. Decoding fails if the input string has
characters outside the defined Base32GNS character set ([0..9][A-Z][a-z]
).
(N.B.: Strings are encoded without \0
terminator)¶
59 40 B3 2D B8 86 61 C2 ⇌ B50B6BDRGSGW4 48 65 6c 6c 6f 20 57 6f 72 6c 64 ⇌ 91JPRV3F41BPYWKCCG H e l l o W o r l d 48 65 6c 6c 6f 20 57 6f 72 6c 64 ↽ 91JPRU3F4IBPYWKCCG H e l l o W o r l d **FAILURE** ↽ 91JPR+3F4!BPYWKCCG¶
The test vectors include record sets with a variety of record types and flags for both PKEY and EDKEY zones. This includes labels with UTF-8 characters to demonstrate internationalized labels.¶
(1) PKEY zone with ASCII label and one delegation record¶
Zone private key (d, big-endian): 98 fd fa 25 79 90 fa 50 d4 e7 c8 78 21 a0 71 21 95 e5 85 97 90 96 73 f3 df ea ef a4 52 b6 d7 50 Zone identifier (ztype|zkey): 00 01 00 00 67 7c 47 7d 2d 93 09 7c 85 b1 95 c6 f9 6d 84 ff 61 f5 98 2c 2c 4f e0 2d 5a 11 fe df b0 c2 90 1f zTLD: 000G0037FH3QTBCK15Y8BCCNRVWPV17ZC7TSGB1C9ZG2TPGHZVFV1GMG3W Label: 74 65 73 74 64 65 6c 65 67 61 74 69 6f 6e Number of records (integer): 1 Record #0 := ( EXPIRATION: 2463385894000000 us 00 08 c0 6f b9 28 15 80 DATA_SIZE: 00 20 TYPE: 00 01 00 00 FLAGS: 00 01 DATA: 21 e3 b3 0f f9 3b c6 d3 5a c8 c6 e0 e1 3a fd ff 79 4c b7 b4 4b bb c7 48 d2 59 d0 a0 28 4d be 84 ) RDATA: 00 08 c0 6f b9 28 15 80 00 20 00 01 00 01 00 00 21 e3 b3 0f f9 3b c6 d3 5a c8 c6 e0 e1 3a fd ff 79 4c b7 b4 4b bb c7 48 d2 59 d0 a0 28 4d be 84 Encryption NONCE|EXPIRATION|BLOCK COUNTER: e9 0a 00 61 00 08 c0 6f b9 28 15 80 00 00 00 01 Encryption key (K): 86 4e 71 38 ea e7 fd 91 a3 01 36 89 9c 13 2b 23 ac eb db 2c ef 43 cb 19 f6 bf 55 b6 7d b9 b3 b3 Storage key (q): 62 42 2a 42 e2 7d ae 64 91 9c e1 6a 94 af d0 96 89 2b d4 55 1a 8a a2 d5 79 ab 83 3d 93 1d a9 b6 48 2c 21 c9 ac 9f 5d 12 d3 69 c6 0c 5e df 27 e2 bf 8d b2 44 f4 88 82 2f c3 14 c1 22 5d 94 b9 dc BDATA: 41 dc 7b 5f 21 76 ba 59 19 98 af b9 e3 c8 25 79 50 50 af c4 b5 3d 68 e4 1e d9 21 da 89 de 51 e7 da 35 a2 95 b5 9c 2b 8a ae a4 39 91 48 d5 0c ff RRBLOCK: 00 00 00 a0 00 01 00 00 18 2b b6 36 ed a7 9f 79 57 11 bc 27 08 ad bb 24 2a 60 44 6a d3 c3 08 03 12 1d 03 d3 48 b7 ce b6 01 be ab 94 4a ff 7c cc 51 bf fb 21 27 79 c3 41 87 66 0c 62 5d 1c eb 59 d5 a0 a9 a2 df e4 07 2d 0f 08 cd 2a b1 e9 ed 63 d3 89 8f f7 32 52 1b 57 31 7a 6c 49 50 e1 98 4d 74 df 01 5f 9e b7 2c 4a 00 08 c0 6f b9 28 15 80 41 dc 7b 5f 21 76 ba 59 19 98 af b9 e3 c8 25 79 50 50 af c4 b5 3d 68 e4 1e d9 21 da 89 de 51 e7 da 35 a2 95 b5 9c 2b 8a ae a4 39 91 48 d5 0c ff¶
(2) PKEY zone with UTF-8 label and three records¶
Zone private key (d, big-endian): 98 fd fa 25 79 90 fa 50 d4 e7 c8 78 21 a0 71 21 95 e5 85 97 90 96 73 f3 df ea ef a4 52 b6 d7 50 Zone identifier (ztype|zkey): 00 01 00 00 67 7c 47 7d 2d 93 09 7c 85 b1 95 c6 f9 6d 84 ff 61 f5 98 2c 2c 4f e0 2d 5a 11 fe df b0 c2 90 1f zTLD: 000G0037FH3QTBCK15Y8BCCNRVWPV17ZC7TSGB1C9ZG2TPGHZVFV1GMG3W Label: e5 a4 a9 e4 b8 8b e7 84 a1 e6 95 b5 Number of records (integer): 3 Record #0 := ( EXPIRATION: 2463385894000000 us 00 08 c0 6f b9 28 15 80 DATA_SIZE: 00 10 TYPE: 00 00 00 1c FLAGS: 00 00 DATA: 00 00 00 00 00 00 00 00 00 00 00 00 de ad be ef ) Record #1 := ( EXPIRATION: 49556645701000000 us 00 b0 0f 81 b7 44 9b 40 DATA_SIZE: 00 06 TYPE: 00 01 00 01 FLAGS: 80 00 DATA: e6 84 9b e7 a7 b0 ) Record #2 := ( EXPIRATION: 43021688829000000 us 00 98 d7 ff 80 4a 39 40 DATA_SIZE: 00 0b TYPE: 00 00 00 10 FLAGS: 00 04 DATA: 48 65 6c 6c 6f 20 57 6f 72 6c 64 ) RDATA: 00 08 c0 6f b9 28 15 80 00 10 00 00 00 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 de ad be ef 00 b0 0f 81 b7 44 9b 40 00 06 80 00 00 01 00 01 e6 84 9b e7 a7 b0 00 98 d7 ff 80 4a 39 40 00 0b 00 04 00 00 00 10 48 65 6c 6c 6f 20 57 6f 72 6c 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Encryption NONCE|EXPIRATION|BLOCK COUNTER: ee 96 33 c1 00 08 c0 6f b9 28 15 80 00 00 00 01 Encryption key (K): fb 3a b5 de 23 bd da e1 99 7a af 7b 92 c2 d2 71 51 40 8b 77 af 7a 41 ac 79 05 7c 4d f5 38 3d 01 Storage key (q): 78 0a ea 93 75 f0 72 b7 ec 11 66 70 b1 25 c8 d6 41 c4 c4 ac 9d c9 90 1e bb 40 b4 3d 0e d2 6e 24 ba f8 da 38 2e 80 70 29 66 ed b9 b5 20 0c 02 c4 f9 2b 81 57 2b 07 42 34 4f d2 8f 50 46 8b 8d c0 BDATA: a1 f9 4f 65 c7 20 2b 86 2b 75 0d 89 53 1c 66 5d 1b 7f 5e 90 92 9b d8 a4 d9 24 e6 52 5d bd 6b 2f 81 8c 43 b2 2e 2a c7 08 2b 6e 69 60 27 6f 41 ca cf 0b 27 b2 50 2b 58 90 c8 03 9e b6 b5 74 22 06 88 d5 43 b4 f4 51 9f 4a c4 76 d2 a5 77 e9 bd 59 d6 f4 72 bc 93 a2 fe 66 16 11 75 9c ca f2 d6 72 60 c1 db 4a 03 53 1b 86 7d fa 35 f7 bc 30 02 b8 f4 00 0e 4e 7c 7d 91 7a d2 29 f7 9b 2a ee e3 f1 RRBLOCK: 00 00 00 f0 00 01 00 00 a5 12 96 df 75 7e e2 75 ca 11 8d 4f 07 fa 7a ae 55 08 bc f5 12 aa 41 12 14 29 d4 a0 de 9d 05 7e 05 92 83 aa bf 02 a7 88 54 d4 8b ee 22 43 6f ea f6 e5 9f b7 94 7a 44 d6 cf aa 21 a0 a3 f2 e9 14 0c fb d4 32 47 c4 9a 98 e0 12 aa 50 53 d7 4d 3a 0c b3 7d 11 73 b9 f4 f9 b5 97 53 b8 d0 b4 8b 10 00 08 c0 6f b9 28 15 80 a1 f9 4f 65 c7 20 2b 86 2b 75 0d 89 53 1c 66 5d 1b 7f 5e 90 92 9b d8 a4 d9 24 e6 52 5d bd 6b 2f 81 8c 43 b2 2e 2a c7 08 2b 6e 69 60 27 6f 41 ca cf 0b 27 b2 50 2b 58 90 c8 03 9e b6 b5 74 22 06 88 d5 43 b4 f4 51 9f 4a c4 76 d2 a5 77 e9 bd 59 d6 f4 72 bc 93 a2 fe 66 16 11 75 9c ca f2 d6 72 60 c1 db 4a 03 53 1b 86 7d fa 35 f7 bc 30 02 b8 f4 00 0e 4e 7c 7d 91 7a d2 29 f7 9b 2a ee e3 f1¶
(3) EDKEY zone with ASCII label and delegation record¶
Zone private key (d): 5a f7 02 0e e1 91 60 32 88 32 35 2b bc 6a 68 a8 d7 1a 7c be 1b 92 99 69 a7 c6 6d 41 5a 0d 8f 65 Zone identifier (ztype|zkey): 00 01 00 14 3c f4 b9 24 03 20 22 f0 dc 50 58 14 53 b8 5d 93 b0 47 b6 3d 44 6c 58 45 cb 48 44 5d db 96 68 8f zTLD: 000G051WYJWJ80S04BRDRM2R2H9VGQCKP13VCFA4DHC4BJT88HEXQ5K8HW Label: 74 65 73 74 64 65 6c 65 67 61 74 69 6f 6e Number of records (integer): 1 Record #0 := ( EXPIRATION: 2463385894000000 us 00 08 c0 6f b9 28 15 80 DATA_SIZE: 00 20 TYPE: 00 01 00 00 FLAGS: 00 01 DATA: 21 e3 b3 0f f9 3b c6 d3 5a c8 c6 e0 e1 3a fd ff 79 4c b7 b4 4b bb c7 48 d2 59 d0 a0 28 4d be 84 ) RDATA: 00 08 c0 6f b9 28 15 80 00 20 00 01 00 01 00 00 21 e3 b3 0f f9 3b c6 d3 5a c8 c6 e0 e1 3a fd ff 79 4c b7 b4 4b bb c7 48 d2 59 d0 a0 28 4d be 84 Encryption NONCE|EXPIRATION: 98 13 2e a8 68 59 d3 5c 88 bf d3 17 fa 99 1b cb 00 08 c0 6f b9 28 15 80 Encryption key (K): 85 c4 29 a9 56 7a a6 33 41 1a 96 91 e9 09 4c 45 28 16 72 be 58 60 34 aa e4 a2 a2 cc 71 61 59 e2 Storage key (q): c0 e1 57 1a 06 ec 37 2f 0f 9a 8f 69 a2 bb 2f 68 ad 11 83 5c 4f 48 ef 0e 19 1b 4b 8a 95 1c a5 e9 89 1a 9c ed 93 5b b6 2c e0 b6 cf 22 9d c5 96 75 64 56 1a e0 c5 c8 14 9e a1 3e ae 93 b4 cc 46 89 BDATA: 9c c4 55 a1 29 33 19 43 59 93 cb 3d 67 17 9e c0 6e a8 d8 89 4e 90 4a 0c 35 e9 1c 5c 2f f2 ed 93 9c c2 f8 30 12 31 f4 4e 59 2a 4a c8 7e 49 98 b9 46 25 c6 4a f5 16 86 a2 b3 6a 2b 28 92 d4 4f 2d RRBLOCK: 00 00 00 b0 00 01 00 14 9b f2 33 19 8c 6d 53 bb db ac 49 5c ab d9 10 49 a6 84 af 3f 40 51 ba ca b0 dc f2 1c 8c f2 7a 1a 44 d2 40 d0 79 02 f4 90 b7 c4 3e f0 07 58 ab ce 88 51 c1 8c 70 ac 6d f9 7a 88 f7 92 11 cf 87 5f 78 48 85 ca 3e 34 9e c4 ca 89 2b 9f f0 84 c5 35 89 65 b8 e7 4a 23 15 95 2d 4c 8c 06 52 1c 2f 0c 00 08 c0 6f b9 28 15 80 9c c4 55 a1 29 33 19 43 59 93 cb 3d 67 17 9e c0 6e a8 d8 89 4e 90 4a 0c 35 e9 1c 5c 2f f2 ed 93 9c c2 f8 30 12 31 f4 4e 59 2a 4a c8 7e 49 98 b9 46 25 c6 4a f5 16 86 a2 b3 6a 2b 28 92 d4 4f 2d¶
(4) EDKEY zone with UTF-8 label and three records¶
Zone private key (d): 5a f7 02 0e e1 91 60 32 88 32 35 2b bc 6a 68 a8 d7 1a 7c be 1b 92 99 69 a7 c6 6d 41 5a 0d 8f 65 Zone identifier (ztype|zkey): 00 01 00 14 3c f4 b9 24 03 20 22 f0 dc 50 58 14 53 b8 5d 93 b0 47 b6 3d 44 6c 58 45 cb 48 44 5d db 96 68 8f zTLD: 000G051WYJWJ80S04BRDRM2R2H9VGQCKP13VCFA4DHC4BJT88HEXQ5K8HW Label: e5 a4 a9 e4 b8 8b e7 84 a1 e6 95 b5 Number of records (integer): 3 Record #0 := ( EXPIRATION: 2463385894000000 us 00 08 c0 6f b9 28 15 80 DATA_SIZE: 00 10 TYPE: 00 00 00 1c FLAGS: 00 00 DATA: 00 00 00 00 00 00 00 00 00 00 00 00 de ad be ef ) Record #1 := ( EXPIRATION: 49556645701000000 us 00 b0 0f 81 b7 44 9b 40 DATA_SIZE: 00 06 TYPE: 00 01 00 01 FLAGS: 80 00 DATA: e6 84 9b e7 a7 b0 ) Record #2 := ( EXPIRATION: 43021688829000000 us 00 98 d7 ff 80 4a 39 40 DATA_SIZE: 00 0b TYPE: 00 00 00 10 FLAGS: 00 04 DATA: 48 65 6c 6c 6f 20 57 6f 72 6c 64 ) RDATA: 00 08 c0 6f b9 28 15 80 00 10 00 00 00 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 de ad be ef 00 b0 0f 81 b7 44 9b 40 00 06 80 00 00 01 00 01 e6 84 9b e7 a7 b0 00 98 d7 ff 80 4a 39 40 00 0b 00 04 00 00 00 10 48 65 6c 6c 6f 20 57 6f 72 6c 64 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Encryption NONCE|EXPIRATION: bb 0d 3f 0f bd 22 42 77 50 da 5d 69 12 16 e6 c9 00 08 c0 6f b9 28 15 80 Encryption key (K): 3d f8 05 bd 66 87 aa 14 20 96 28 c2 44 b1 11 91 88 c3 92 56 37 a4 1e 5d 76 49 6c 29 45 dc 37 7b Storage key (q): 6f a7 65 1a dc 01 79 e2 64 36 e6 4b 58 6c bf 4f 7b 23 5e 33 b6 34 ac fc 91 b9 bc 68 53 34 05 bc 2f dc a0 9a 6d cf 1a f6 6b f3 29 5b 62 50 9c eb 3f 13 47 e7 c3 75 c5 6b 64 34 55 79 c9 5e 0a c0 BDATA: 70 2a 19 6f 58 2b 72 94 77 71 98 d0 a8 ab 30 09 ef ca b8 15 be 77 a7 5c 68 c8 00 aa 9f c2 58 8a e9 d7 c7 14 56 54 c4 41 eb 2e 31 88 db 3d ce cd f3 33 33 25 64 b6 dd d3 f0 37 a6 78 dd b7 42 27 79 aa 89 09 d7 59 29 97 02 1e 5f 7a 43 fa 9c bc 73 e4 17 86 5b ec ae 97 df c5 26 0f cc f5 3c ae 3f b1 9b f1 18 93 17 de 2f d9 e0 1a 73 ea 8e 48 99 b4 54 d6 73 4c 92 b7 42 5a 8b 87 16 1f d7 38 21 c9 58 38 41 86 1d 4d 5a e8 02 c4 14 14 ba 04 RRBLOCK: 00 00 01 00 00 01 00 14 74 f9 00 68 f1 67 69 53 52 a8 a6 c2 eb 98 48 98 c5 3a cc a0 98 04 70 c6 c8 12 64 cb dd 78 ad 11 84 61 91 1b 40 65 c1 08 c6 5d 75 0a 60 d4 32 a3 13 38 b2 02 6c 35 8c 2d 62 15 e4 a9 0d 48 f1 8c f2 cf b1 8d 3d 11 10 41 cc 0e ee 64 9c d9 08 b8 28 0e 44 39 3f 4e bd 98 7a d0 2a b8 4a 8c 61 06 00 08 c0 6f b9 28 15 80 70 2a 19 6f 58 2b 72 94 77 71 98 d0 a8 ab 30 09 ef ca b8 15 be 77 a7 5c 68 c8 00 aa 9f c2 58 8a e9 d7 c7 14 56 54 c4 41 eb 2e 31 88 db 3d ce cd f3 33 33 25 64 b6 dd d3 f0 37 a6 78 dd b7 42 27 79 aa 89 09 d7 59 29 97 02 1e 5f 7a 43 fa 9c bc 73 e4 17 86 5b ec ae 97 df c5 26 0f cc f5 3c ae 3f b1 9b f1 18 93 17 de 2f d9 e0 1a 73 ea 8e 48 99 b4 54 d6 73 4c 92 b7 42 5a 8b 87 16 1f d7 38 21 c9 58 38 41 86 1d 4d 5a e8 02 c4 14 14 ba 04¶
The following is an example revocation for a zone:¶
Zone private key (d, big-endian scalar): 70 ed 98 b9 07 8c 47 f7 d5 78 3b 26 cc f9 8b 7d d5 5f 60 88 d1 53 95 97 fa 8b f5 5a c0 32 ea 6f Zone identifier (ztype|zkey): 00 01 00 00 2c a2 23 e8 79 ec c4 bb de b5 da 17 31 92 81 d6 3b 2e 3b 69 55 f1 c3 77 5c 80 4a 98 d5 f8 dd aa Encoded zone identifier (zkl = zTLD): 000G001CM8HYGYFCRJXXXDET2WRS50EP7CQ3PTANY71QEQ409ACDBY6XN8 Difficulty (5 base difficulty + 2 epochs): 7 Signed message: 00 00 00 34 00 00 00 03 00 05 fe b4 6d 86 5c 1c 00 01 00 00 2c a2 23 e8 79 ec c4 bb de b5 da 17 31 92 81 d6 3b 2e 3b 69 55 f1 c3 77 5c 80 4a 98 d5 f8 dd aa Proof: 00 05 fe b4 6d 86 5c 1c 00 00 39 5d 18 27 c0 00 e6 6a 57 0b cc d4 b3 93 e6 6a 57 0b cc d4 b3 ea e6 6a 57 0b cc d4 b5 36 e6 6a 57 0b cc d4 b5 42 e6 6a 57 0b cc d4 b6 13 e6 6a 57 0b cc d4 b6 5f e6 6a 57 0b cc d4 b6 72 e6 6a 57 0b cc d4 b7 0a e6 6a 57 0b cc d4 b7 1a e6 6a 57 0b cc d4 b7 23 e6 6a 57 0b cc d4 b7 47 e6 6a 57 0b cc d4 b7 77 e6 6a 57 0b cc d4 b7 85 e6 6a 57 0b cc d4 b7 89 e6 6a 57 0b cc d4 b7 cf e6 6a 57 0b cc d4 b7 dc e6 6a 57 0b cc d4 b9 3a e6 6a 57 0b cc d4 b9 56 e6 6a 57 0b cc d4 ba 4a e6 6a 57 0b cc d4 ba 9d e6 6a 57 0b cc d4 bb 28 e6 6a 57 0b cc d4 bb 5a e6 6a 57 0b cc d4 bb 92 e6 6a 57 0b cc d4 bb a2 e6 6a 57 0b cc d4 bb d8 e6 6a 57 0b cc d4 bb e2 e6 6a 57 0b cc d4 bc 93 e6 6a 57 0b cc d4 bc 94 e6 6a 57 0b cc d4 bd 0f e6 6a 57 0b cc d4 bd ce e6 6a 57 0b cc d4 be 6a e6 6a 57 0b cc d4 be 73 00 01 00 00 2c a2 23 e8 79 ec c4 bb de b5 da 17 31 92 81 d6 3b 2e 3b 69 55 f1 c3 77 5c 80 4a 98 d5 f8 dd aa 04 4a 87 8a 15 8b 40 f0 c8 41 d9 f9 78 cb 13 72 ea ee 51 99 a3 d8 7e 5e 2b db c7 2a 6c 8c 73 d0 00 18 1d fc 39 c3 aa a4 81 66 7b 16 5b 58 44 e4 50 71 3d 8a b6 a3 b2 ba 8f ef 44 7b 65 07 6a 0f¶