faqs.org - Internet FAQ Archives
RFC 2119 - Key words for use in RFCs to Indicate Requirement Lev
Network Working Group S. Bradner Request for Comments: 2119 Harvard University BCP: 14 March 1997 Category: Best Current Practice Key words for use in RFCs to Indicate Requirement Levels Status of this Memo This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. Distribution of this memo is unlimited. Abstract In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document: The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119. Note that the force of these words is modified by the requirement level of the document in which they are used. 1. MUST This word, or the terms "REQUIRED" or "SHALL", mean that the definition is an absolute requirement of the specification. 2. MUST NOT This phrase, or the phrase "SHALL NOT", mean that the definition is an absolute prohibition of the specification. 3. SHOULD This word, or the adjective "RECOMMENDED", mean that there may exist valid reasons in particular circumstances to ignore a particular item, but the full implications must be understood and carefully weighed before choosing a different course. 4. SHOULD NOT This phrase, or the phrase "NOT RECOMMENDED" mean that there may exist valid reasons in particular circumstances when the particular behavior is acceptable or even useful, but the full implications should be understood and the case carefully weighed before implementing any behavior described with this label. 5. MAY This word, or the adjective "OPTIONAL", mean that an item is truly optional. One vendor may choose to include the item because a particular marketplace requires it or because the vendor feels that it enhances the product while another vendor may omit the same item. An implementation which does not include a particular option MUST be prepared to interoperate with another implementation which does include the option, though perhaps with reduced functionality. In the same vein an implementation which does include a particular option MUST be prepared to interoperate with another implementation which does not include the option (except, of course, for the feature the option provides.) 6. Guidance in the use of these Imperatives Imperatives of the type defined in this memo must be used with care and sparingly. In particular, they MUST only be used where it is actually required for interoperation or to limit behavior which has potential for causing harm (e.g., limiting retransmisssions) For example, they must not be used to try to impose a particular method on implementors where the method is not required for interoperability. 7. Security Considerations These terms are frequently used to specify behavior with security implications. The effects on security of not implementing a MUST or SHOULD, or doing something the specification says MUST NOT or SHOULD NOT be done may be very subtle. Document authors should take the time to elaborate the security implications of not following recommendations or requirements as most implementors will not have had the benefit of the experience and discussion that produced the specification. 8. Acknowledgments The definitions of these terms are an amalgam of definitions taken from a number of RFCs. In addition, suggestions have been incorporated from a number of people including Robert Ullmann, Thomas Narten, Neal McBurnett, and Robert Elz. 9. Author's Address Scott Bradner Harvard University 1350 Mass. Ave. Cambridge, MA 02138 phone - +1 617 495 3864 email - sob@harvard.edu
User Contributions:
BrianDeering
Paragraph 1, for clarity, consider changing to: This word, or the terms "REQUIRED" or "SHALL," indicates an absolute requirement of the specification.Paragraph 2, for clarity, consider changing to: This phrase, or the phrase "SHALL NOT," indicates an absolute prohibition of the specification.Paragraphs 1, 2, 3, and 5, the commas go inside the quotes.Paragraph 4 is missing a comma.Paragraphs 1, 2, 3, 5, and 4, if it had the extra comma, "mean" should be "means."Paragraph 6, consider instead, "...must be used sparingly and with care."Paragraph 7, consider a comma after "...NOT be done"
bikeshed
FYI-RFC's can not ever be changed once published (even if factual or typographic mistakes are present). They can be obsoleted and updated, but never change. Funny how the one thing that our comments can never change is the thing called request for comments...
Zaid khan
Snapchat ads, snapchat business. Snapchat data, app kit, bitmoji
Jacqueline Hartnick 41 year old female from South Africa
Tammy Bejano
how do I verify my domain name on the Google console or start a new email domain name? google-site-verification=nnNkFPc6HJClz-jAZb9jtXLgYe1JXRuDR8SfxWT34Fc
Jacqueline Hartnick
Just delete everything, I'm so tired of verifications, over and over again, or being locked out, or passwords problems, yor never thought I would struggle so much
Check all settings services servers hosting programs products and all platforms website networks search information private video photo azeri open public all Original help?
I'm being stalked in pontotoc Mississippi USA I'm misty taylor
Ezequiel
Analytics Made Easy - Statcounter"
referrerPolicy="no-referrer-when-downgrade
referrerPolicy="no-referrer-when-downgrade
Destiny williams
Can someone please help me with 50-4000 I'm really having a heard time
Luis
[](https://github.com/semantic-release/semantic-release)
JD Murphy
ZTE China have been working in a 5g wireless LAN connection with the help of Wuhan steel LTD
Chris
I need someone to listen to me that ain't a criminal you got developers that are hacking everybody stuff and they're doing illegal stuff on it they've been on my phone for the last 4 years 2 years something like that I don't know how long to be there but they're connected with the tablets that they're using in the department of corrections in Arkansas and they're connected their names will be connected to the outside world and they're talking to people through every everything my chumbu account everything my calculator they're talking to people using it like a phone that's crazy the department of corrections in Arkansas you're developers is working with them not the department of corrections but somebody somebody in prison McPherson unit the women's division and they're hacking my stuff they they're stealing everything out of my phone everything I watch them do it and I caught him on the phone earlier talking to each other through my phone that ain't even activated through the messaging app I just turned my speaker up and I'm having a conversation and then they turn my speaker down and I I take screenshots of them video chatting together through my camera just do my camera I just staple chat in the dark and it could pick it up it's like my camera is a live feed at all times they used a microdrod to hack it asome nore softwareyou see them through a window like they're talking to each other get the developers off of my devices there are criminals they're breaking the law they're the ones you hear about on the news they're the one that stealing all that Bitcoin it's connected to my devices check it out it's the truth there is over 500 apps on my phone how is that even possible I'm counted to somebody's laptop
Octavio
I'm here to do everything and anything legitimate
Remove my information from all information collected. I don't have a computer and don't know how to delete
Keep me logged in they hacking my accounts I can't take it anymore I can't even find a job because there stealing my phone
I can’t open my account because there is some kind of issue with my account
Remove my prosnla information my account is hacked for the 4th
time and u guy letting this happend again my information is stolen
and used if u guys dont delete my informatinon and the hacker im
im going to get a lawer and u guy are in big t
time and u guy letting this happend again my information is stolen
and used if u guys dont delete my informatinon and the hacker im
im going to get a lawer and u guy are in big t