rfc2048.txt

来自「<VC++网络游戏建摸与实现>源代码」· 文本 代码 · 共 1,181 行 · 第 1/3 页

TXT
1,181
字号
   registration of additional access types to accommodate new retrieval   mechanisms.3.1.  Registration Requirements   New access type specifications must conform to a number of   requirements as described below.3.1.1.  Naming Requirements   Each access type must have a unique name.  This name appears in the   access-type parameter in the message/external-body content-type   header field, and must conform to MIME content type parameter syntax.3.1.2.  Mechanism Specification Requirements   All of the protocols, transports, and procedures used by a given   access type must be described, either in the specification of the   access type itself or in some other publicly available specification,   in sufficient detail for the access type to be implemented by any   competent implementor.  Use of secret and/or proprietary methods in   access types are expressly prohibited. The restrictions imposed by   RFC 1602 on the standardization of patented algorithms must be   respected as well.3.1.3.  Publication Requirements   All access types must be described by an RFC. The RFC may be   informational rather than standards-track, although standard-track   review and approval are encouraged for all access types.3.1.4.  Security Requirements   Any known security issues that arise from the use of the access type   must be completely and fully described. It is not required that the   access type be secure or that it be free from risks, but that the   known risks be identified.  Publication of a new access type does not   require an exhaustive security review, and the security   considerations section is subject to continuing evaluation.   Additional security considerations should be addressed by publishing   revised versions of the access type specification.3.2.  Registration Procedure   Registration of a new access type starts with the construction of a   draft of an RFC.Freed, et. al.           Best Current Practice                 [Page 15]RFC 2048              MIME Registration Procedures         November 19963.2.1.  Present the Access Type to the Community   Send a proposed access type specification to the "ietf-   types@iana.org" mailing list for a two week review period.  This   mailing list has been established for the purpose of reviewing   proposed access and media types.  Proposed access types are not   formally registered and must not be used.   The intent of the public posting is to solicit comments and feedback   on the access type specification and a review of any security   considerations.3.2.2.  Access Type Reviewer   When the two week period has passed, the access type reviewer, who is   appointed by the IETF Applications Area Director, either forwards the   request to iana@isi.edu, or rejects it because of significant   objections raised on the list.   Decisions made by the reviewer must be posted to the ietf-types   mailing list within 14 days. Decisions made by the reviewer may be   appealed to the IESG.3.2.3.  IANA Registration   Provided that the access type has either passed review or has been   successfully appealed to the IESG, the IANA will register the access   type and make the registration available to the community. The   specification of the access type must also be published as an RFC.   Informational RFCs are published by sending them to "rfc-   editor@isi.edu" (please follow the instructions to RFC authors [RFC-   1543]).3.3.  Location of Registered Access Type List   Access type registrations will be posted in the anonymous FTP   directory "ftp://ftp.isi.edu/in-notes/iana/assignments/access-types/"   and all registered access types will be listed in the periodically   issued "Assigned Numbers" RFC [currently RFC-1700].3.4.  IANA Procedures for Registering Access Types   The identity of the access type reviewer is communicated to the IANA   by the IESG.  The IANA then only acts in response to access type   definitions that either are approved by the access type reviewer and   forwarded by the reviewer to the IANA for registration, or in   response to a communication from the IESG that an access type   definition appeal has overturned the access type reviewer's ruling.Freed, et. al.           Best Current Practice                 [Page 16]RFC 2048              MIME Registration Procedures         November 19964.  Transfer Encodings   Transfer encodings are tranformations applied to MIME media types   after conversion to the media type's canonical form.  Transfer   encodings are used for several purposes:    (1)   Many transports, especially message transports, can          only handle data consisting of relatively short lines          of text. There can also be severe restrictions on what          characters can be used in these lines of text -- some          transports are restricted to a small subset of US-ASCII          and others cannot handle certain character sequences.          Transfer encodings are used to transform binary data          into textual form that can survive such transports.          Examples of this sort of transfer encoding include the          base64 and quoted-printable transfer encodings defined          in RFC 2045.    (2)   Image, audio, video, and even application entities are          sometimes quite large. Compression algorithms are often          quite effective in reducing the size of large entities.          Transfer encodings can be used to apply general-purpose          non-lossy compression algorithms to MIME entities.    (3)   Transport encodings can be defined as a means of          representing existing encoding formats in a MIME          context.   IMPORTANT:  The standardization of a large numbers of different   transfer encodings is seen as a significant barrier to widespread   interoperability and is expressely discouraged.  Nevertheless, the   following procedure has been defined to provide a means of defining   additional transfer encodings, should standardization actually be   justified.4.1.  Transfer Encoding Requirements   Transfer encoding specifications must conform to a number of   requirements as described below.4.1.1.  Naming Requirements   Each transfer encoding must have a unique name.  This name appears in   the Content-Transfer-Encoding header field and must conform to the   syntax of that field.Freed, et. al.           Best Current Practice                 [Page 17]RFC 2048              MIME Registration Procedures         November 19964.1.2.  Algorithm Specification Requirements   All of the algorithms used in a transfer encoding (e.g.  conversion   to printable form, compression) must be described in their entirety   in the transfer encoding specification.  Use of secret and/or   proprietary algorithms in standardized transfer encodings are   expressly prohibited. The restrictions imposed by RFC 1602 on the   standardization of patented algorithms must be respected as well.4.1.3.  Input Domain Requirements   All transfer encodings must be applicable to an arbitrary sequence of   octets of any length.  Dependence on particular input forms is not   allowed.   It should be noted that the 7bit and 8bit encodings do not conform to   this requirement. Aside from the undesireability of having   specialized encodings, the intent here is to forbid the addition of   additional encodings along the lines of 7bit and 8bit.4.1.4.  Output Range Requirements   There is no requirement that a particular tranfer encoding produce a   particular form of encoded output.  However, the output format for   each transfer encoding must be fully and completely documented.  In   particular, each specification must clearly state whether the output   format always lies within the confines of 7bit data, 8bit data, or is   simply pure binary data.4.1.5.  Data Integrity and Generality Requirements   All transfer encodings must be fully invertible on any platform; it   must be possible for anyone to recover the original data by   performing the corresponding decoding operation.  Note that this   requirement effectively excludes all forms of lossy compression as   well as all forms of encryption from use as a transfer encoding.4.1.6.  New Functionality Requirements   All transfer encodings must provide some sort of new functionality.   Some degree of functionality overlap with previously defined transfer   encodings is acceptable, but any new transfer encoding must also   offer something no other transfer encoding provides.Freed, et. al.           Best Current Practice                 [Page 18]RFC 2048              MIME Registration Procedures         November 19964.2.  Transfer Encoding Definition Procedure   Definition of a new transfer encoding starts with the construction of   a draft of a standards-track RFC.  The RFC must define the transfer   encoding precisely and completely, and must also provide substantial   justification for defining and standardizing a new transfer encoding.   This specification must then be presented to the IESG for   consideration.  The IESG can    (1)   reject the specification outright as being          inappropriate for standardization,    (2)   approve the formation of an IETF working group to work          on the specification in accordance with IETF          procedures, or,    (3)   accept the specification as-is and put it directly on          the standards track.   Transfer encoding specifications on the standards track follow normal   IETF rules for standards track documents.  A transfer encoding is   considered to be defined and available for use once it is on the   standards track.4.3.  IANA Procedures for Transfer Encoding Registration   There is no need for a special procedure for registering Transfer   Encodings with the IANA. All legitimate transfer encoding   registrations must appear as a standards-track RFC, so it is the   IESG's responsibility to notify the IANA when a new transfer encoding   has been approved.4.4.  Location of Registered Transfer Encodings List   Transfer encoding registrations will be posted in the anonymous FTP   directory "ftp://ftp.isi.edu/in-notes/iana/assignments/transfer-   encodings/" and all registered transfer encodings will be listed in   the periodically issued "Assigned Numbers" RFC [currently RFC-1700].Freed, et. al.           Best Current Practice                 [Page 19]RFC 2048              MIME Registration Procedures         November 19965.  Authors' Addresses   For more information, the authors of this document are best   contacted via Internet mail:   Ned Freed   Innosoft International, Inc.   1050 East Garvey Avenue South   West Covina, CA 91790   USA   Phone: +1 818 919 3600   Fax:   +1 818 919 3614   EMail: ned@innosoft.com   John Klensin   MCI   2100 Reston Parkway   Reston, VA 22091   Phone: +1 703 715-7361   Fax:   +1 703 715-7436   EMail: klensin@mci.net   Jon Postel   USC/Information Sciences Institute   4676 Admiralty Way   Marina del Rey, CA  90292   USA   Phone: +1 310 822 1511   Fax:   +1 310 823 6714   EMail: Postel@ISI.EDUFreed, et. al.           Best Current Practice                 [Page 20]RFC 2048              MIME Registration Procedures         November 1996Appendix A -- Grandfathered Media Types   A number of media types, registered prior to 1996, would, if   registered under the guidelines in this document, be placed into   either the vendor or personal trees.  Reregistration of those types   to reflect the appropriate trees is encouraged, but not required.   Ownership and change control principles outlined in this document   apply to those types as if they had been registered in the trees   described above.Freed, et. al.           Best Current Practice                 [Page 21]

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?