faqs.org - Internet FAQ Archives

RFC 2119 - Key words for use in RFCs to Indicate Requirement Lev


Or Display the document by number



Network Working Group S. Bradner
Request for Comments: 2119 Harvard University
BCP: 14 March 1997
Category: Best Current Practice
 Key words for use in RFCs to Indicate Requirement Levels
Status of this Memo
 This document specifies an Internet Best Current Practices for the
 Internet Community, and requests discussion and suggestions for
 improvements. Distribution of this memo is unlimited.
Abstract
 In many standards track documents several words are used to signify
 the requirements in the specification. These words are often
 capitalized. This document defines these words as they should be
 interpreted in IETF documents. Authors who follow these guidelines
 should incorporate this phrase near the beginning of their document:
 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
 NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and
 "OPTIONAL" in this document are to be interpreted as described in
 RFC 2119.
 Note that the force of these words is modified by the requirement
 level of the document in which they are used.
1. MUST This word, or the terms "REQUIRED" or "SHALL", mean that the
 definition is an absolute requirement of the specification.
2. MUST NOT This phrase, or the phrase "SHALL NOT", mean that the
 definition is an absolute prohibition of the specification.
3. SHOULD This word, or the adjective "RECOMMENDED", mean that there
 may exist valid reasons in particular circumstances to ignore a
 particular item, but the full implications must be understood and
 carefully weighed before choosing a different course.
4. SHOULD NOT This phrase, or the phrase "NOT RECOMMENDED" mean that
 there may exist valid reasons in particular circumstances when the
 particular behavior is acceptable or even useful, but the full
 implications should be understood and the case carefully weighed
 before implementing any behavior described with this label.
5. MAY This word, or the adjective "OPTIONAL", mean that an item is
 truly optional. One vendor may choose to include the item because a
 particular marketplace requires it or because the vendor feels that
 it enhances the product while another vendor may omit the same item.
 An implementation which does not include a particular option MUST be
 prepared to interoperate with another implementation which does
 include the option, though perhaps with reduced functionality. In the
 same vein an implementation which does include a particular option
 MUST be prepared to interoperate with another implementation which
 does not include the option (except, of course, for the feature the
 option provides.)
6. Guidance in the use of these Imperatives
 Imperatives of the type defined in this memo must be used with care
 and sparingly. In particular, they MUST only be used where it is
 actually required for interoperation or to limit behavior which has
 potential for causing harm (e.g., limiting retransmisssions) For
 example, they must not be used to try to impose a particular method
 on implementors where the method is not required for
 interoperability.
7. Security Considerations
 These terms are frequently used to specify behavior with security
 implications. The effects on security of not implementing a MUST or
 SHOULD, or doing something the specification says MUST NOT or SHOULD
 NOT be done may be very subtle. Document authors should take the time
 to elaborate the security implications of not following
 recommendations or requirements as most implementors will not have
 had the benefit of the experience and discussion that produced the
 specification.
8. Acknowledgments
 The definitions of these terms are an amalgam of definitions taken
 from a number of RFCs. In addition, suggestions have been
 incorporated from a number of people including Robert Ullmann, Thomas
 Narten, Neal McBurnett, and Robert Elz.
9. Author's Address
 Scott Bradner
 Harvard University
 1350 Mass. Ave.
 Cambridge, MA 02138
 phone - +1 617 495 3864
 email - sob@harvard.edu

User Contributions:

1
BrianDeering
Paragraph 1, for clarity, consider changing to: This word, or the terms "REQUIRED" or "SHALL," indicates an absolute requirement of the specification.Paragraph 2, for clarity, consider changing to: This phrase, or the phrase "SHALL NOT," indicates an absolute prohibition of the specification.Paragraphs 1, 2, 3, and 5, the commas go inside the quotes.Paragraph 4 is missing a comma.Paragraphs 1, 2, 3, 5, and 4, if it had the extra comma, "mean" should be "means."Paragraph 6, consider instead, "...must be used sparingly and with care."Paragraph 7, consider a comma after "...NOT be done"
2
bikeshed
FYI-RFC's can not ever be changed once published (even if factual or typographic mistakes are present). They can be obsoleted and updated, but never change. Funny how the one thing that our comments can never change is the thing called request for comments...
3
Zaid khan
Snapchat ads, snapchat business. Snapchat data, app kit, bitmoji
Jacqueline Hartnick 41 year old female from South Africa
5
Tammy Bejano
how do I verify my domain name on the Google console or start a new email domain name? google-site-verification=nnNkFPc6HJClz-jAZb9jtXLgYe1JXRuDR8SfxWT34Fc
6
Jacqueline Hartnick
Just delete everything, I'm so tired of verifications, over and over again, or being locked out, or passwords problems, yor never thought I would struggle so much
Check all settings services servers hosting programs products and all platforms website networks search information private video photo azeri open public all Original help?
I'm being stalked in pontotoc Mississippi USA I'm misty taylor
9
Ezequiel
Analytics Made Easy - Statcounter"
referrerPolicy="no-referrer-when-downgrade
10
Destiny williams
Can someone please help me with 50-4000 I'm really having a heard time
11
Luis
[![semantic-release](https://img.shields.io/badge/%20%20%F0%9F%93%A6%F0%9F%9A%80-semantic--release-e10079.svg)](https://github.com/semantic-release/semantic-release)
12
JD Murphy
ZTE China have been working in a 5g wireless LAN connection with the help of Wuhan steel LTD
13
Chris
I need someone to listen to me that ain't a criminal you got developers that are hacking everybody stuff and they're doing illegal stuff on it they've been on my phone for the last 4 years 2 years something like that I don't know how long to be there but they're connected with the tablets that they're using in the department of corrections in Arkansas and they're connected their names will be connected to the outside world and they're talking to people through every everything my chumbu account everything my calculator they're talking to people using it like a phone that's crazy the department of corrections in Arkansas you're developers is working with them not the department of corrections but somebody somebody in prison McPherson unit the women's division and they're hacking my stuff they they're stealing everything out of my phone everything I watch them do it and I caught him on the phone earlier talking to each other through my phone that ain't even activated through the messaging app I just turned my speaker up and I'm having a conversation and then they turn my speaker down and I I take screenshots of them video chatting together through my camera just do my camera I just staple chat in the dark and it could pick it up it's like my camera is a live feed at all times they used a microdrod to hack it asome nore softwareyou see them through a window like they're talking to each other get the developers off of my devices there are criminals they're breaking the law they're the ones you hear about on the news they're the one that stealing all that Bitcoin it's connected to my devices check it out it's the truth there is over 500 apps on my phone how is that even possible I'm counted to somebody's laptop
14
Octavio
I'm here to do everything and anything legitimate
15
Sonja
May 31, 2023 @ 3:03 am
Remove my information from all information collected. I don't have a computer and don't know how to delete
16
Joshua Klein
Dec 18, 2023 @ 5:17 pm
Keep me logged in they hacking my accounts I can't take it anymore I can't even find a job because there stealing my phone
17
Mar 24, 2024 @ 10:22 pm
I can’t open my account because there is some kind of issue with my account
18
ROBINSON SANTIAGO
Mar 5, 2025 @ 3:15 pm
Remove my prosnla information my account is hacked for the 4th
time and u guy letting this happend again my information is stolen
and used if u guys dont delete my informatinon and the hacker im
im going to get a lawer and u guy are in big t

Comment about this RFC, ask questions, or add new information about this topic:




AltStyle によって変換されたページ (->オリジナル) /