A Procedure for Cautious Delegation of a DNS Name

Document Type Expired Internet-Draft (individual)
Authors Olaf Kolkman  , Andrew Sullivan  , Warren Kumari 
Last updated 2014-02-02 (latest revision 2013-08-01)
Stream (None)
Intended RFC status (None)
Expired & archived
pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


NOTE: The authors recognize that the statistical models that would inform the process are not well understood and that the possibilities to game the system might be unmountable. Unless we reach more insights on how to deal with this details this work is abandoned. Sometimes, a DNS name is known to be in use in the wild even though it was never properly delegated. This situation appears particularly, but not only, true in certain domains near the root of the tree: people have independently used those non-existent top-level domains as private namespaces. If those names are to be delegated in the public DNS, prudence dictates that collisions between the private uses and the public use be minimized. We outline a procedure to evaluate the harm of delegation.


Olaf Kolkman (olaf@nlnetlabs.nl)
Andrew Sullivan (asullivan@dyn.com)
Warren Kumari (warren@kumari.net)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)