@simontatham The key words "MUST (BUT WE KNOW YOU WON'T)", "SHOULD CONSIDER", "REALLY SHOULD NOT", "OUGHT TO", "WOULD PROBABLY", "MAY WISH TO", "COULD", "POSSIBLE", and "MIGHT" in this document are to be interpreted as described in RFC 6919.
RFC 2119 defines a standard set of key words for describing requirements of a specification. Many IETF documents have found that these words cannot accurately capture the nuanced requirements of their specification. This document defines additional key words that can be used to address alternative requirements scenarios. Authors who follow these guidelines should incorporate this phrase near the beginning of their document: The key words "MUST (BUT WE KNOW YOU WON\'T)", "SHOULD CONSIDER", "REALLY SHOULD NOT", "OUGHT TO", "WOULD PROBABLY", "MAY WISH TO", "COULD", "POSSIBLE", and "MIGHT" in this document are to be interpreted as described in RFC 6919.
@anticomposite @EdG @simontatham Is there any form of humor more absolutely niche than IETF RFC jokes? Like these are for an audience of dozens…luckily we are all on Fedi.
I was actually online on the morning of April 1, 1990 when the canonical example, “RFC 1149 - A Standard for the Transmission of IP Datagrams on Avian Carriers” dropped*, and it is deeply embedded in my headcanon Internet Timeline of Important Events. But I run into supposed industry professionals (even network and security admins!) who are completely unaware of this seminal document with alarming frequency.
(*) the standard has since updated twice, once to add Quality of Service and once to add IPv6 support. A real world implementation was only partially successful, as latency and packet loss were substantial. The whole protocol is nerdvana and the commitment to the bit is exemplary…
@
@dwenius @anticomposite @EdG avian carriers are all very well, but I think 418 I'm A Teapot is more iconic.
I proposed a 1st April RFC myself once, but it wasn't accepted. At the time SSH-2 was still considering a "none" cipher, for countries outlawing encryption: you wouldn't encrypt, but would still MAC, so the spooks could read but not hijack your session. I proposed adding the "rot13" cipher instead, to protect network-monitoring sysadmins from movie spoilers and distractingly juicy gossip.