Re: [weirds] REST-pect-ful
Andy Newton <andy@arin.net> Thu, 12 July 2012 14:07 UTC
Return-Path: <andy@arin.net>
X-Original-To: weirds@ietfa.amsl.com
Delivered-To: weirds@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1CCC21F8847 for <weirds@ietfa.amsl.com>; Thu, 12 Jul 2012 07:07:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 03VafsyFTKoZ for <weirds@ietfa.amsl.com>; Thu, 12 Jul 2012 07:07:39 -0700 (PDT)
Received: from smtp1.arin.net (smtp1.arin.net [IPv6:2001:500:4:13::33]) by ietfa.amsl.com (Postfix) with ESMTP id B01BD21F883B for <weirds@ietf.org>; Thu, 12 Jul 2012 07:07:38 -0700 (PDT)
Received: by smtp1.arin.net (Postfix, from userid 323) id 86B631651E5; Thu, 12 Jul 2012 10:08:04 -0400 (EDT)
Received: from CHAXCH06.corp.arin.net (chaxch06.corp.arin.net [192.149.252.95]) by smtp1.arin.net (Postfix) with ESMTP id E79771651D5; Thu, 12 Jul 2012 10:08:03 -0400 (EDT)
Received: from CHAXCH04.corp.arin.net (10.1.30.19) by CHAXCH06.corp.arin.net (192.149.252.95) with Microsoft SMTP Server (TLS) id 14.2.283.3; Thu, 12 Jul 2012 10:07:13 -0400
Received: from CHAXCH01.corp.arin.net ([169.254.1.88]) by CHAXCH04.corp.arin.net ([10.1.30.19]) with mapi id 14.02.0298.004; Thu, 12 Jul 2012 10:07:57 -0400
From: Andy Newton <andy@arin.net>
To: "<patrick@vande-walle.eu>" <patrick@vande-walle.eu>
Thread-Topic: [weirds] REST-pect-ful
Thread-Index: AQHNX6F71F8aVuhTGkWUHYArFUAeHZckyDQAgAAGEwCAAKIzAIAAecKA
Date: Thu, 12 Jul 2012 14:07:56 +0000
Message-ID: <B7F3A589-86A5-45D1-9AA2-02EE91C59B60@arin.net>
References: <20120711201734.48396.qmail@joyce.lan> <D3D8582E-BE04-4BCF-88D9-B73A3813003E@arin.net> <4FFE6C86.8040504@vande-walle.eu>
In-Reply-To: <4FFE6C86.8040504@vande-walle.eu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [192.149.252.96]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <E5390ADA375EE74E8A611C48D861B478@corp.arin.net>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "<weirds@ietf.org>" <weirds@ietf.org>
Subject: Re: [weirds] REST-pect-ful
X-BeenThere: weirds@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "WHOIS-based Extensible Internet Registration Data Service \(WEIRDS\)" <weirds.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/weirds>, <mailto:weirds-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/weirds>
List-Post: <mailto:weirds@ietf.org>
List-Help: <mailto:weirds-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/weirds>, <mailto:weirds-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Jul 2012 14:07:41 -0000
On Jul 12, 2012, at 2:19 AM, Patrick Vande Walle wrote: > Agree with Andy and others that multiple queries may cause additional load that could possibly be avoided. > > On 11/07/12 22:39, Andy Newton wrote: >> I lean more toward this approach as well. Though filling strings with "REFUSED" just leads some to think that a persons last name might be "REFUSED", > > Indeed. Especially if that person's name happens to be "Refused", which could happen. I do not like the idea of having magic strings in lieu of field data. > In the case of a field whose content should be hidden by policy, I suggest the field data should be empty, but we could add an optional sub-structure related to policy. > > I just made up the example below for the purpose of demonstration: > > { > "BillingTelNum": { > "Description": "Billing Contact phone number", > "TelNum": > "Data": "", > "Policy": { > "Status": "REDACTED", > "Info": "See http://www.example.org/weirds-policy" > }}}}} > > Patrick Vande Walle > >From the soon-to-be draft-designteam-weirds-using-http-01 9. Common Data Structures This section defines two common data structures to be used by DNRD-AP, NRRD-AP, and other RD-AP protocols. As such, the names identifying these data structures are not to be redefined by any registry specific RD-AP specifications. Each of these datatypes MAY appear within any other data object of a response, but the intended purpose is that they will be mostly used in the top-most data object of a response. The first data structure is named "rdapConformance" and is simply an array of strings, each providing a hint as to the specifications used in the construction of the response. An example rdapConformance data structure. "rdapConformance" : [ "nrrdap_level_0" ] Figure 9 The second data structure is named "notices" and is an array of "notice" objects. Each "notice" object contains a "title" string representing the title of the notice object, an array of strings named "description" for the purposes of conveying any descriptive text about the notice, and a "uri" string holding a URI referencing any a service that may provide additional information about the notice. An exmaple of the notices data structure. "notices" : [ "notice" : { "title" : "Terms of Use", "description" : [ "This service is subject to The Registry of the Moons", "terms of service." ], "uri" : "http://example.com/our-terms-of-use" } ] Figure 10 This is an example response with both rdapConformance and notices embedded. { "rdapConformance" : [ "nrrdap_level_0" ] "notices" : [ "notice" : { "title" : "Content Redacted", "description" : [ "Without full authorization, content has been redacted.", "Sorry, dude!" ], "uri" : "http://example.com/our-redaction-policies" } ] "startAddress" : "10.0.0.0", "endAddress" : "10.0.0.255", "remarks" : [ "she sells seas shells", "down by the seashore" ], "uris" : [ { "type" : "source", "uri" : "http://whois-rws.net/network/xxxx" }, { "type" : "parent", "uri" : "http://whois-rws.net/network/yyyy" } ] } -andy
- Re: [weirds] Authentication Methods John Levine
- [weirds] REST-pect-ful Olaf Kolkman
- Re: [weirds] REST-pect-ful John Levine
- Re: [weirds] REST-pect-ful Andy Newton
- Re: [weirds] REST-pect-ful James Mitchell
- Re: [weirds] REST-pect-ful Patrick Vande Walle
- Re: [weirds] REST-pect-ful Jim Galvin
- Re: [weirds] REST-pect-ful "Michele Neylon :: Blacknight"
- Re: [weirds] REST-pect-ful Andy Newton
- Re: [weirds] REST-pect-ful John Levine
- Re: [weirds] REST-pect-ful Ning Kong
- Re: [weirds] REST-pect-ful John R Levine
- Re: [weirds] REST-pect-ful Ning Kong
- Re: [weirds] REST-pect-ful Arturo Servin
- [weirds] Authentication Methods Olaf Kolkman
- Re: [weirds] REST-pect-ful Ning Kong
- Re: [weirds] REST-pect-ful SM
- Re: [weirds] Authentication Methods Jim Galvin
- Re: [weirds] Authentication Methods Ning Kong
- Re: [weirds] Authentication Methods Ray Bellis
- Re: [weirds] Authentication Methods John Levine
- Re: [weirds] Authentication Methods Peter Koch
- Re: [weirds] Authentication Methods Andy Newton
- Re: [weirds] Authentication Methods John R Levine
- Re: [weirds] Authentication Methods Andy Newton
- Re: [weirds] Authentication Methods John R Levine
- Re: [weirds] Authentication Methods Andrew Sullivan
- Re: [weirds] Authentication Methods Avri Doria
- Re: [weirds] Authentication Methods Andrew Sullivan
- Re: [weirds] Authentication Methods Linlin Zhou
- Re: [weirds] Authentication Methods Ray Bellis
- Re: [weirds] Authentication Methods Andy Newton
- Re: [weirds] Authentication Methods John Levine
- Re: [weirds] Authentication Methods Andrew Sullivan
- Re: [weirds] Authentication Methods Warren Kumari
- Re: [weirds] REST-pect-ful Peter Koch
- Re: [weirds] Authentication Methods Ray Bellis
- Re: [weirds] REST-pect-ful Ray Bellis
- Re: [weirds] Authentication Methods Jim Galvin
- Re: [weirds] Authentication Methods Ray Bellis
- Re: [weirds] Authentication Methods John Levine
- Re: [weirds] Authentication Methods Ray Bellis
- Re: [weirds] Authentication Methods Andrew Sullivan
- Re: [weirds] Authentication Methods John Levine
- Re: [weirds] Authentication Methods Peter Koch
- Re: [weirds] Authentication Methods SM