One document matched: draft-ietf-weirds-using-http-13.xml
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc SYSTEM "http://xml.resource.org/authoring/rfc2629.dtd"
[
<!ENTITY RFC2119 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml'>
<!ENTITY RFC3912 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3912.xml'>
<!ENTITY RFC3986 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3986.xml'>
<!ENTITY RFC3987 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.3987.xml'>
<!ENTITY RFC5226 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.5226.xml'>
<!ENTITY RFC5234 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.5234.xml'>
<!ENTITY RFC5890 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.5890.xml'>
<!ENTITY RFC6585 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.6585.xml'>
<!ENTITY RFC7159 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.7159.xml'>
<!ENTITY RFC7230 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.7230.xml'>
<!ENTITY RFC7231 PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml/reference.RFC.7231.xml'>
<!ENTITY I-D.ietf-weirds-rdap-query PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-weirds-rdap-query.xml'>
<!ENTITY I-D.ietf-weirds-json-response PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-weirds-json-response.xml'>
<!ENTITY I-D.ietf-weirds-rdap-sec PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-weirds-rdap-sec.xml'>
<!ENTITY I-D.ietf-weirds-bootstrap PUBLIC ''
'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-weirds-bootstrap.xml'>
]>
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<rfc category="std" docName="draft-ietf-weirds-using-http-13" ipr="trust200902">
<front>
<title abbrev="RDAP over HTTP">
HTTP usage in the Registration Data Access Protocol (RDAP)
</title>
<author fullname="Andrew Lee Newton" initials="A.L." surname="Newton">
<organization abbrev="ARIN">American Registry for Internet Numbers</organization>
<address>
<postal>
<street>3635 Concorde Parkway</street>
<city>Chantilly</city>
<region>VA</region>
<country>US</country>
<code>20151</code>
</postal>
<email>andy@arin.net</email>
<uri>http://www.arin.net</uri>
</address>
</author>
<author fullname="Byron J. Ellacott" initials="B.J." surname="Ellacott">
<organization abbrev="APNIC">Asia Pacific Network Information Center</organization>
<address>
<postal>
<street>6 Cordelia Street</street>
<city>South Brisbane</city>
<country>Australia</country>
<code>QLD 4101</code>
</postal>
<email>bje@apnic.net</email>
<uri>http://www.apnic.net</uri>
</address>
</author>
<author initials="N." surname="Kong" fullname="Ning Kong">
<organization abbrev="CNNIC">
China Internet Network Information Center
</organization>
<address>
<postal>
<street>4 South 4th Street, Zhongguancun, Haidian District </street>
<country>China</country>
<code>100190</code> <city>Beijing</city>
</postal>
<phone>+86 10 5881 3147</phone>
<email>nkong@cnnic.cn</email>
</address>
</author>
<date/>
<abstract>
<t>
This document is one of a collection that together describe the
Registration Data Access Protocol (RDAP). It describes
how RDAP is transported using the Hypertext Transfer Protocol (HTTP).
RDAP is a successor protocol to the very old WHOIS protocol.
The purpose of this document is to clarify the use of standard HTTP
mechanisms for this application.
</t>
</abstract>
</front>
<middle>
<section title="Introduction">
<t>
This document describes the usage of the Hypertext Transfer Protocol (HTTP)
<xref target="RFC7230"></xref> for registration data
directory services. The goal of this document is to tie
together usage patterns of HTTP into a common profile applicable to
the various types of directory services serving registration data
using practices informed by the Representational State Transfer <xref target="REST">REST</xref>
architectural style. By giving the various directory services
common behavior, a single client is better able to retrieve data from
directory services adhering to this behavior.
</t>
<t>
The registration data expected to be presented by this service is
Internet resource registration data - registration of domain names
and Internet number resources. These data is typically provided by
<xref target="RFC3912">WHOIS</xref> services, but the WHOIS protocol is
insufficient to modern registration data service requirements. A
replacement protocol is expected to retain the simple transactional
nature of WHOIS, while providing a specification for queries and
responses, redirection to authoritative sources, support for
Internationalized Domain Names (IDNs, <xref target="RFC5890"/>), and
support for localized registration data such as addresses and
organisation or person names.
</t>
<t>
In designing these common usage patterns, this document introduces
considerations for a simple use of HTTP. Where complexity may reside,
it is the goal of this document to place it upon the server and to keep
the client as simple as possible. A client implementation should be
possible using common operating system scripting tools (e.g. bash and wget).
</t>
<t>
This is the basic usage pattern for this protocol:
<list style="numbers">
<t>
A client determines an appropriate server to query along with
the appropriate base URL to use in such queries.
<xref target="I-D.ietf-weirds-bootstrap"></xref> describes one method to determine the
server and the base URL. See <xref target="bootstrapping_redirection"></xref> for more information.
</t>
<t>
A client issues an HTTP (or HTTPS) query using GET <xref target="RFC7231"></xref>. As an example, a query for
the network registration 192.0.2.0 might be
<list style="none">
<t>http://example.com/rdap/ip/192.0.2.0</t>
</list>
<xref target="I-D.ietf-weirds-rdap-query"></xref> details the various queries used in RDAP.
</t>
<t>
If the receiving server has the information for the query, it examines
the Accept header field of the query and returns a 200 response with a response
entity appropriate for the requested format.
<xref target="I-D.ietf-weirds-json-response"></xref> details a response in JavaScript Object Notation
(JSON).
</t>
<t>If the receiving server does not have the information for the query but does
have knowledge of where the information can be found, it will return a
redirection response (3xx) with the Location: header field containing an HTTP(S) URL
(Uniform Resource Locator) pointing to the information or another server known to
have knowledge of the location of the information. The client is expected to re-query
using that HTTP URL.</t>
<t>If the receiving server does not have the information being requested and
does not have knowledge of where the information can be found, it returns
a 404 response.</t>
<t>If the receiving server will not answer a request for policy reasons, it will
return an error response (4xx) indicating the reason for giving no answer.</t>
</list>
</t>
<t>
It is not the intent of this document to redefine the
meaning and semantics of HTTP. The purpose of this document is to clarify the use
of standard HTTP mechanisms for this application.
</t>
</section>
<section title="Terminology">
<t>
The key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT",
"RECOMMENDED", "MAY", and "OPTIONAL" in this document
are to be interpreted as described in RFC 2119 <xref target="RFC2119"/>.
</t>
<t>
As is noted in <xref target="SAC-051">Security and Stability Advisory Committee (SSAC)
Report on WHOIS Terminology and Structure</xref>,
the term "WHOIS" is overloaded, often referring to a protocol, a service and data.
In accordance with <xref target="SAC-051"></xref>, this document describes the base
behavior for a Registration Data Access Protocol (RDAP).
<xref target="SAC-051"></xref> describes a protocol profile of RDAP for Domain Name
Registries (DNRs), the Domain Name Registration Data Access Protocol (DNRD-AP).
</t>
<t>
In this document, an RDAP client is an HTTP user agent performing an RDAP query, and
an RDAP server is an HTTP server providing an RDAP response. RDAP query and response
formats are described in <xref target="I-D.ietf-weirds-rdap-query"></xref> and
<xref target="I-D.ietf-weirds-json-response"></xref>, while
this document describes how RDAP clients and servers use HTTP to exchange queries and
responses. <xref target="I-D.ietf-weirds-rdap-sec"></xref> describes security
considerations for RDAP.
</t>
</section>
<section title="Design Intents">
<t>
There are a few design criteria this document attempts to meet.
</t>
<t>
First, each query is meant to return only one path of execution to obtain an
answer. A response may contain an answer, no answer, or a redirect, and
clients are not expected to fork multiple paths of execution to satisfy a query.
</t>
<t>
Second, the semantics of the request/response allow for future and/or non-standard
response formats. In this document, only a <xref target="RFC7159">JSON</xref>
response media type is noted, with the response contents to be described separately
(see <xref target="I-D.ietf-weirds-json-response"></xref>).
This document only describes how RDAP is transported using HTTP with this format.
</t>
<t>
Third, this protocol is intended to be able to make use of the range of mechanisms
available for use with HTTP. HTTP offers a number of mechanisms not described further
in this document. Operators are able to make use of these mechanisms according to
their local policy, including cache control, authorization, compression, and
redirection. HTTP also benefits from widespread investment in scalability,
reliability, and performance, and widespread programmer understanding of client
behaviours for web services styled after <xref target="REST">REST</xref>,
reducing the cost to deploy Registration Data
Directory Services and clients.
</t>
</section>
<section title="Queries">
<section title="HTTP Methods" anchor="http_methods">
<t>
Clients use the GET method to retrieve a response body and use the
HEAD method to determine existence of data on the server. Clients
SHOULD use either the HTTP GET or HEAD methods (see <xref target="RFC7231"></xref>).
Servers are under
no obligation to support other HTTP methods, therefore
clients using other methods will likely not interoperate
properly.
</t>
<t>
Clients MUST support HTTPS as well as HTTP.
</t>
</section>
<section title="Accept Header" anchor="accept_header">
<t>
To indicate to servers that an RDAP response is desired, clients
include an Accept: header field with an RDAP specific JSON media type,
the generic JSON media type, or both. Servers receiving an RDAP
request return an entity with a Content-Type: header containing
the RDAP specific JSON media type.
</t>
<t>
This specification does not define the responses a server returns to
a request with any other media types in the Accept: header field, or with no
Accept: header field. One possibility would be to return a response in
a media type suitable for rendering in a web browser.
</t>
</section>
<section title="Query Parameters" anchor="parameters">
<t>
Servers MUST ignore unknown query parameters. Use of unknown query
parameters for cache-busting is described in <xref target="cache-busting"></xref>.
</t>
</section>
</section>
<section title="Types of HTTP Response" anchor="http_responses">
<t>
This section describes the various types of responses a server may send to a client.
While no standard HTTP response code is forbidden in usage,
this section defines the minimal set of response codes in common use
by servers that a client will need to understand.
While some clients may be constructed with simple
tooling that does not account for all of these response codes, a more robust
client accounting for these codes will likely provide a better user experience.
It is expected that
usage of response codes and types for this application not defined here will be
described in subsequent documents.
</t>
<section title="Positive Answers">
<t>
If a server has the information requested by the client and wishes to respond
to the client with the information according to its policies, it returns that
answer in the body of a 200 response.
</t>
</section>
<section title="Redirects">
<t>
If a server wishes to inform a client that the answer to a given query can be found
elsewhere, it returns either a 301 response code to indicate a permanent move, or a
302, 303 or 307 response code to indicate a non-permanent redirection, and it includes
an HTTP(s) URL in the Location: header field. The client is expected to issue a
subsequent request to satisfy the original query using the given URL without any
processing of the URL. In other words, the server is to hand back a complete URL and
the client should not have to transform the URL to follow it. Servers are under
no obligation to return a URL conformant to <xref target="I-D.ietf-weirds-rdap-query"></xref>.
</t>
<t>
For this application, such an example of a permanent move might be a Top Level Domain
(TLD) operator informing a client the information being sought can be found with
another TLD operator (i.e. a query for the domain bar in foo.example is found at
http://foo.example/domain/bar).
</t>
<t>
For example, if the client sends
<list>
<t>http://serv1.example.com/weirds/domain/example.com</t>
</list>
the server redirecting to
<list>
<t>https://serv2.example.net/weirds2/</t>
</list> would set the
Location: field to the value
<list>
<t>https://serv2.example.net/weirds2/domain/example.com</t>
</list>
</t>
</section>
<section title="Negative Answers">
<t>
If a server wishes to respond that it has an empty result set
(that is, no data appropriately satisfying the query),
it returns a 404 response code. Optionally, it MAY include additional
information regarding the negative answer in the HTTP entity body.
</t>
<t>
If a server wishes to inform the client that information about the query
is available, but cannot include the information in the response to the
client for policy reasons, the server MUST respond with an appropriate
response code out of HTTP's 4xx range. Clients MAY retry the query based
on the respective response code.
</t>
</section>
<section title="Malformed Queries">
<t>
If a server receives a query which it cannot interpret as an RDAP query, it
returns a 400 response code. Optionally, it MAY include additional information
regarding this negative answer in the HTTP entity body.
</t>
</section>
<section title="Rate Limits" anchor="rate-limits">
<t>
Some servers apply rate limits to deter address scraping and other
abuses. When a server declines to answer a query due to rate limits,
it returns a 429 response code as described in <xref target="RFC6585"></xref>.
A client that receives a 429 response SHOULD decrease its query rate,
and honor the Retry-After header field if one is present.
Servers may place stricter limits upon clients that do not honor the Retry-After header.
</t>
<t>
Note that this is not a defense against denial-of-service attacks,
since a malicious client could ignore the code and continue to send
queries at a high rate. A server might use another response code if
it did not wish to reveal to a client that rate limiting is the reason
for the denial of a reply.
</t>
</section>
<section title="Cross-Origin Resource Sharing" anchor="cors">
<t>
When responding to queries, it is RECOMMENDED that servers use the
Access-Control-Allow-Origin header field, as specified by <xref target="W3C.CR-cors-20130129"/>.
As the use of RDAP is for public resources, a value of "*" is
suitable for most cases.
</t>
<t>
This header (often called the CORS header) helps in-browser web applications
by lifting the "same-origin" restriction.
</t>
</section>
</section>
<section title="Extensibility" anchor="extensibility">
<t>
For extensibility purposes, this document defines an IANA registry for prefixes
used in <xref target="RFC7159">JSON</xref> data serialization and URI path
segments (see <xref target="iana_considerations"></xref>).
</t>
<t>
Prefixes and identifiers SHOULD only consist of the alphabetic ASCII characters A through Z in
both uppercase and lowercase, the numerical digits 0 through 9, underscore
characters, and SHOULD NOT begin with
an underscore character, numerical digit or the characters "xml". The following
describes the production of JSON names in <xref target="RFC5234">ABNF</xref>.</t>
<figure anchor="json_name_abnf">
<preamble>
ABNF for JSON names
</preamble>
<artwork>
name = ALPHA *( ALPHA / DIGIT / "_" )
</artwork>
</figure>
<t> This restriction is a union
of the Ruby programming language identifier syntax and the XML element name
syntax and has two purposes. First, client implementers using modern programming
languages such as Ruby or Java can use libraries that automatically promote JSON
names to first order object attributes or members.
Second, a clean mapping between JSON and XML is easy to accomplish using these
rules.
</t>
</section>
<section title="Security Considerations" anchor="security_considerations">
<t>
This document does not pose strong security requirements to the RDAP
protocol. However, it does not restrict against the use of security
mechanisms offered by the HTTP protocol. It does require the RDAP clients
MUST support HTTPS.
</t>
<t>
This document made recommendations for server implementations against
denial-of-service (<xref target="rate-limits"/>) and interoperability with existing
security mechanism in HTTP clients (<xref target="cors"/>).
</t>
<t>
Additional security considerations to the RDAP protocol are
covered in <xref target="I-D.ietf-weirds-rdap-sec"></xref>.
</t>
</section>
<section title="IANA Considerations" anchor="iana_considerations">
<section title="RDAP Extensions Registry">
<t>
This specification proposes an IANA registry for RDAP extensions. The
purpose of this registry is to ensure uniqueness of extension identifiers.
The extension identifier is used as a prefix in JSON names and as a prefix
of path segments in RDAP URLs.
</t>
<t>
The production rule for these identifiers is specified in <xref target="extensibility"/>.
</t>
<t>
In accordance with <xref target="RFC5226"></xref>, the IANA policy for assigning new values shall
be Specification Required: values and their meanings must be documented in
an RFC or in some other permanent and readily available reference, in
sufficient detail that interoperability between independent implementations
is possible.
</t>
<t>
The following is a preliminary template for an RDAP extension registration:
<list style="empty">
<t>Extension identifier: the identifier of the extension</t>
<t>Registry operator: the name of the registry operator</t>
<t>Published specification: RFC number, bibliographical reference or URL
to a permanent and readily available specification</t>
<t>Person & email address to contact for further information:
The names and email addresses of individuals for contact regarding this registry entry
</t>
<t>Intended usage: brief reasons for this registry entry (as defined by
<xref target="RFC5226"></xref>.</t>
</list>
</t>
<t>
The following is an example of a registration in the RDAP extension registry:
<list style="empty">
<t>Extension identifier: lunarNic</t>
<t>Registry operator: The Registry of the Moon, LLC</t>
<t>Published specification: http://www.example/moon_apis/rdap</t>
<t>Person & email address to contact for further information:
Professor Bernardo de la Paz <berny@moon.example>
</t>
<t>Intended usage: COMMON</t>
</list>
</t>
</section>
</section>
<section title="Internationalization Considerations">
<section title="URIs and IRIs">
<t>
Clients can use <xref target="RFC3987">IRIs</xref> for internal use as they see fit,
but MUST transform them to <xref target="RFC3986">URIs</xref> for interaction with
RDAP servers. RDAP servers MUST use URIs in all responses, and again clients can
transform these URIs to IRIs for internal use as they see fit.
</t>
</section>
<section title="Language Identifiers in Queries and Responses"
anchor="language_identifiers_in_queries_and_responses">
<t>
Under most scenarios, clients requesting data will not signal
that the data be returned in a particular language or script.
On the other hand, when servers return data and have knowledge
that the data is in a language or script, the data SHOULD be
annotated with language identifiers whenever they are available,
thus allowing clients to process and display the data accordingly.
</t>
<t>
<xref target="I-D.ietf-weirds-json-response"></xref> provides such a mechanism.
</t>
</section>
<section title="Language Identifiers in HTTP Headers" anchor="language_identifiers_in_http_headers">
<t>
Given the description of the use of language identifiers in
<xref target="language_identifiers_in_queries_and_responses"></xref>,
unless otherwise specified, servers SHOULD ignore the
<xref target="RFC7231">HTTP</xref> Accept-Language header field when
formulating HTTP entity responses, so that clients do not conflate
the Accept-Language header with the 'lang' values in the entity
body.
</t>
<t>
However, servers MAY return language identifiers in the
Content-Language header field so as to inform clients of the
intended language of HTTP layer messages.
</t>
</section>
</section>
<section title="Contributing Authors and Acknowledgements">
<t>
John Levine provided text to tighten up the Accept header field usage and the
text for the section on 429 responses.
</t>
<t>
Marc Blanchet provided some clarifying text regarding the use of URLs
with redirects, as well as very useful feedback during WGLC.
</t>
<t>
Normative language reviews were provided by Murray S. Kucherawy, Andrew Sullivan,
Tom Harrison, Ed Lewis, and Alexander Mayrhofer.
</t>
<t>
Jean-Phillipe Dionne provided text for the Security Considerations section.
</t>
<t>
The concept of the redirector server informatively discussed in
<xref target="bootstrapping_redirection"></xref> was documented by
Carlos M. Martinez and Gerardo Rada of LACNIC and Linlin Zhou of CNNIC
and subsequently incorporated into this document.
</t>
<t>
This document is the work product of the IETF's WEIRDS working group, of
which Olaf Kolkman and Murray Kucherawy were chairs.
</t>
</section>
</middle>
<back>
<references title="Normative References">
&RFC2119;
&RFC3986;
&RFC3987;
&RFC5226;
&RFC6585;
&RFC7230;
&RFC7231;
<reference anchor='W3C.CR-cors-20130129'
target='http://www.w3.org/TR/2013/CR-cors-20130129'>
<front>
<title>Cross-Origin Resource Sharing</title>
<author initials='A.' surname='Kesteren' fullname='Anne van Kesteren'>
<organization />
</author>
<date month='January' day='29' year='2013' />
</front>
<seriesInfo name='World Wide Web Consortium Candidate Recommendation' value='CR-cors-20130129' />
<format type='HTML' target='http://www.w3.org/TR/2012/CR-cors-20130129' />
</reference>
&I-D.ietf-weirds-rdap-query;
&I-D.ietf-weirds-json-response;
&I-D.ietf-weirds-rdap-sec;
&I-D.ietf-weirds-bootstrap;
</references>
<references title="Informative References">
<reference anchor="SAC-051">
<front>
<title>SSAC Report on Domain Name WHOIS Terminology and Structure</title>
<author initials="D." surname="Piscitello" role="editor" />
<date day="19" month="September" year="2011"/>
</front>
</reference>
&RFC3912;
&RFC5234;
&RFC5890;
&RFC7159;
<reference anchor="REST">
<front>
<title>Principled Design of the Modern Web Architecture</title>
<author initials="R." surname="Fielding" fullname="Roy Fielding"></author>
<author initials="R." surname="Taylor" fullname="Richard Fielding"></author>
<date month="May" year="2002" />
</front>
<seriesInfo name="ACM Transactions on Internet Technology" value="Vol. 2, No. 2" />
</reference>
<reference anchor="lacnic-joint-whois" target="ftp://anonymous@ftp.registro.br/pub/gter/gter20/02-jwhois-lacnic.pdf">
<front>
<title>LACNIC Joint WHOIS Implementation</title>
<author>
<organization>LACNIC</organization>
</author>
<date year="2005" />
</front>
</reference>
</references>
<section title="Protocol Example" anchor="protocol-example">
<t>
To demonstrate typical behaviour of an RDAP client and server, the following
is an example of an exchange, including a redirect. The data in the response
has been elided for brevity, as the data format is not described in this
document. The media type used here is described in <xref target="I-D.ietf-weirds-json-response"></xref>.
</t>
<figure>
<preamble>
An example of an RDAP client and server exchange:
</preamble>
<artwork>
Client:
<TCP connect to rdap.example.com port 80>
GET /rdap/ip/203.0.113.0/24 HTTP/1.1
Host: rdap.example.com
Accept: application/rdap+json
rdap.example.com:
HTTP/1.1 301 Moved Permanently
Location: http://rdap-ip.example.com/rdap/ip/203.0.113.0/24
Content-Length: 0
Content-Type: application/rdap+json
<TCP disconnect>
Client:
<TCP connect to rdap-ip.example.com port 80>
GET /rdap/ip/203.0.113.0/24 HTTP/1.1
Host: rdap-ip.example.com
Accept: application/rdap+json
rdap-ip.example.com:
HTTP/1.1 200 OK
Content-Type: application/rdap+json
Content-Length: 9001
{ ... }
<TCP disconnect>
</artwork>
</figure>
</section>
<section title="Cache Busting" anchor="cache-busting">
<t>
Some <xref target="RFC7230">HTTP</xref> cache infrastructure does not adhere to caching standards
adequately, and could cache responses longer than is intended by the server. To overcome these
issues, clients can use an adhoc and improbably used query parameter with a random value of their
choosing. As <xref target="parameters"></xref> instructs servers to ignore unknown parameters,
this is unlikely to have any known side effects.
</t>
<figure>
<preamble>
An example of using an unknown query parameter to bust caches:
</preamble>
<artwork>
http://example.com/ip/192.0.2.0?__fuhgetaboutit=xyz123
</artwork>
</figure>
<t>
Use of an unknown parameter to overcome misbehaving caches is not part of any specification
and is offered here for informational purposes.
</t>
</section>
<section title="Bootstrapping and Redirection" anchor="bootstrapping_redirection">
<t>
The traditional deployment model of WHOIS <xref target="RFC3912"></xref>
does not provide a mechanism for determining the authoritative source
for information.
</t>
<t>
Some approaches have been implemented in the
past, most notably the Joint WHOIS <xref target="lacnic-joint-whois"></xref> initiative.
However, among other shortcomings, Joint WHOIS is implemented using
proxies and server-side referrals.
</t>
<t>
These issues are solved in RDAP using HTTP redirects and bootstrapping.
Bootstrapping is discussed in <xref target="I-D.ietf-weirds-bootstrap"></xref>. In
constrained environments, the processes outlined in <xref target="I-D.ietf-weirds-bootstrap"></xref>
may not be viable and there may be need for servers acting as a "redirector".
</t>
<t>
Redirector servers issue HTTP redirects to clients using a redirection table
informed by <xref target="I-D.ietf-weirds-bootstrap"></xref>.
<xref target="redir_example"></xref> diagrams a client using a redirector
for bootstrapping.
</t>
<figure align="center" anchor="redir_example">
<artwork xml:space="preserve"><![CDATA[
REDIRECTOR ARIN
RDAP RDAP
. .
| |
Q: 23.1.1.1? -----------------> | |
| |
<---------- HTTP 301 --------| |
('Try ARIN RDAP') | |
| |
|
Q: 23.1.1.1? -------------------------------> |
|
<---------- HTTP 200 --------------------- |
(JSON response is returned) |
|
|
.
]]></artwork>
<postamble>Querying RDAP data for 23.1.1.1</postamble>
</figure>
<t>
In some cases, particularly sub-delegations made between RIRs
known as "ERX space" and transfers of networks, multiple HTTP
redirects will be issued. <xref target="mim_redirector_example"></xref>
shows such a scenario.
</t>
<figure align="center" anchor="mim_redirector_example">
<artwork xml:space="preserve"><![CDATA[
REDIRECTOR LACNIC ARIN
RDAP RDAP RDAP
. . .
Q: 23.1.1.1? ----> | | |
| | |
<-- HTTP 301 --- | | |
('Try LACNIC') | | |
| | |
| | |
Q: 23.1.1.1? -----------------> | |
| |
<---------- HTTP 301 --------| |
('Try ARIN RDAP') | |
| |
|
Q: 23.1.1.1? -------------------------------> |
|
<---------- HTTP 200 --------------------- |
(JSON response is returned) |
|
|
.
]]></artwork>
<postamble>Querying RDAP data for data that has been transfered</postamble>
</figure>
</section>
<section title="Changelog">
<t>
RFC Editor: Please remove this section.
</t>
<t>
<list style="hanging">
<t hangText="Initial WG -00:">Updated to working group document 2012-September-20</t>
<t hangText="-01">
<list style="symbols">
<t>Updated for the sections moved to the JSON responses draft.</t>
<t>Simplified media type, removed "level" parameter.</t>
<t>Updated 2119 language and added boilerplate.</t>
<t>In section 1, noted that redirects can go to redirect servers as well.</t>
<t>Added <xref target="language_identifiers_in_queries_and_responses"></xref>
and <xref target="language_identifiers_in_http_headers"></xref>.</t>
</list>
</t>
<t hangText="-02">
<list style="symbols">
<t>Added a section on 429 response codes.</t>
<t>Changed Accept header language in section 4.1</t>
<t>Removed reference to the now dead requirements draft.</t>
<t>Added contributing authors and acknowledgements section.</t>
<t>Added some clarifying text regarding complete URLs in the redirect section.</t>
<t>Changed media type to application/rdap+json</t>
<t>Added media type registration</t>
</list>
</t>
<t hangText="-03">
<list style="symbols">
<t>Removed forward reference to draft-ietf-weirds-json-response.</t>
<t>Added reference and recommended usage of CORS</t>
</list>
</t>
<t hangText="-04">
<list style="symbols">
<t>Revised introduction and abstract.</t>
<t>Added negative responses other than 404.</t>
<t>Added security considerations.</t>
<t>Added and corrected references: CORS, RFC3912, RFC3987, RFC5890.</t>
<t>Expanded on first use several acronyms.</t>
<t>Updated 2119 language.</t>
</list>
</t>
<t hangText="-05">
<list style="symbols">
<t>Update the media type registration.</t>
<t>Further explained the SHOULD in section 5.</t>
<t>Split the references into normative and informative.</t>
<t>Other minor fixes.</t>
</list>
</t>
<t hangText="-06">
<list style="symbols">
<t>Rewritten the third paragraph in Section 3 to avoid contradictions</t>
<t>Simplified the wording in Seciton 5.1.</t>
<t>Removed some RFC 2119 words in Section 5.2, 5.3, 5.4 and 5.5.</t>
<t>Corrected RFC 6839 as an informative reference.</t>
<t>Replaced MAYs with cans in Seciton 9.1.</t>
<t>Replaced MAY with can in Appendix B.</t>
<t>Added a note in in Appendix C for the RFC Editor to remove this section.</t>
</list>
</t>
<t hangText="-07">
<list style="symbols">
<t>Dropped reference to MUST with application/rdap+json</t>
<t>Dropped IANA registration of application/rdap+json</t>
</list>
</t>
<t hangText="-08">
<list style="symbols">
<t>Keep alive version.</t>
</list>
</t>
<t hangText="-09">
<list style="symbols">
<t>Changed status lines in example to include http version number.</t>
<t>Removed charset from media types in examples.</t>
<t>Changed wording of 404 negative response to specifically say "empty result set".</t>
<t>Changed references to HTTP.</t>
</list>
</t>
<t hangText="-10">
<list style="symbols">
<t>Corrected references to HTTP.</t>
<t>Added a reference to draft-ietf-weirds-json-response (discuss item from Barry Leiba)</t>
<t>Added a reference to draft-ietf-weirds-rdap-query (discuss item from Barry Leiba)</t>
<t>Noted that redirect URLs do not have to conform to draft-ietf-weirds-rdap-query (comment by Richard Barnes)</t>
<t>Noted that CORS header is most likely to be "*" (comment by Richard Barnes)</t>
<t>Added reference to draft-ietf-weirds-rdap-sec (comment by Richard Barnes)</t>
<t>Added a sentence to the abstract explaining the purpose of RDAP (comment by Stephen Farrell)</t>
<t>Added further references to draft-ietf-weirds-rdap-query and draft-ietf-weirds-json-response (comment by Stephen Farrell)</t>
<t>Added comment regarding the use of the CORS header (comment by Stephen Farrell)</t>
<t>Explanded SSAC (comment by Sean Turner)</t>
<t>Added text about HEAD and GET.</t>
</list>
</t>
<t hangText="-11">
<list style="symbols">
<t>Changed JSON reference to RFC 7159.</t>
<t>Noted that clients MUST support HTTPS.</t>
</list>
</t>
<t hangText="-12">
<list style="symbols">
<t>Added reference to REST.</t>
<t>Numerous textual clarifications.</t>
<t>Added an actual reference to RFC 5226 instead of just talking about it.</t>
<t>A reference to draft-ietf-weirds-bootstrap was added.</t>
<t>Included a section on redirectors.</t>
</list>
</t>
<t hangText="-13">
<list style="symbols">
<t>Addressed AD feedback.</t>
</list>
</t>
</list>
</t>
</section>
</back>
</rfc>
| PAFTECH AB 2003-2026 | 2026-04-24 00:49:52 |