rfc8932v3.txt   rfc8932.txt 
skipping to change at line 244 skipping to change at line 244
relevant documents is listed in Appendix A for reference. relevant documents is listed in Appendix A for reference.
4. Terminology 4. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP "OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here. capitals, as shown here.
DNS terminology is as described in [RFC8499] except that the DNS terminology is as described in [RFC8499], except with regard to
definition of privacy-enabling DNS server in Section 6 of [RFC8310] the definition of privacy-enabling DNS server in Section 6 of
is modified. We restate it to include the requirement that a DNS [RFC8499]. In this document we use the full definition of a DNS over
over (D)TLS server should also offer at least one of the credentials (D)TLS privacy-enabling DNS server as given in [RFC8310], i.e., that
such a server should also offer at least one of the credentials
described in Section 8 of [RFC8310] and implement the (D)TLS profile described in Section 8 of [RFC8310] and implement the (D)TLS profile
described in Section 9 of [RFC8310]. described in Section 9 of [RFC8310].
Other Terms: Other Terms:
RPS: Recursive operator Privacy Statement; see Section 6. RPS: Recursive operator Privacy Statement; see Section 6.
DNS privacy service: The service that is offered via a privacy- DNS privacy service: The service that is offered via a privacy-
enabling DNS server and is documented either in an informal enabling DNS server and is documented either in an informal
statement of policy and practice with regard to users privacy or a statement of policy and practice with regard to users privacy or a
skipping to change at line 1465 skipping to change at line 1466
the specific techniques and the categorizations are described in more the specific techniques and the categorizations are described in more
detail in the following sections. The list of techniques includes detail in the following sections. The list of techniques includes
the main techniques in current use but does not claim to be the main techniques in current use but does not claim to be
comprehensive. comprehensive.
+===========================+====+===+====+===+====+===+===+ +===========================+====+===+====+===+====+===+===+
| Categorization/Property | GA | d | TC | C | TS | i | B | | Categorization/Property | GA | d | TC | C | TS | i | B |
+===========================+====+===+====+===+====+===+===+ +===========================+====+===+====+===+====+===+===+
| Anonymization | X | X | X | | | | X | | Anonymization | X | X | X | | | | X |
+---------------------------+----+---+----+---+----+---+---+ +---------------------------+----+---+----+---+----+---+---+
| Pseudoanonymization | | | | X | X | X | | | Pseudonymization | | | | X | X | X | |
+---------------------------+----+---+----+---+----+---+---+ +---------------------------+----+---+----+---+----+---+---+
| Format preserving | X | X | X | X | X | X | | | Format preserving | X | X | X | X | X | X | |
+---------------------------+----+---+----+---+----+---+---+ +---------------------------+----+---+----+---+----+---+---+
| Prefix preserving | | | X | X | X | | | | Prefix preserving | | | X | X | X | | |
+---------------------------+----+---+----+---+----+---+---+ +---------------------------+----+---+----+---+----+---+---+
| Replacement | | | X | | | | | | Replacement | | | X | | | | |
+---------------------------+----+---+----+---+----+---+---+ +---------------------------+----+---+----+---+----+---+---+
| Filtering | X | | | | | | | | Filtering | X | | | | | | |
+---------------------------+----+---+----+---+----+---+---+ +---------------------------+----+---+----+---+----+---+---+
| Generalization | | | | | | | X | | Generalization | | | | | | | X |
skipping to change at line 1763 skipping to change at line 1764
b. Data collected in logs. We do keep some generalized location b. Data collected in logs. We do keep some generalized location
information (at the city / metropolitan-area level) so that information (at the city / metropolitan-area level) so that
we can conduct debugging and analyze abuse phenomena. We we can conduct debugging and analyze abuse phenomena. We
also use the collected information for the creation and also use the collected information for the creation and
sharing of telemetry (timestamp, geolocation, number of hits, sharing of telemetry (timestamp, geolocation, number of hits,
first seen, last seen) for contributors, public publishing of first seen, last seen) for contributors, public publishing of
general statistics of system use (protections, threat types, general statistics of system use (protections, threat types,
counts, etc.). When you use our DNS services, here is the counts, etc.). When you use our DNS services, here is the
full list of items that are included in our logs: full list of items that are included in our logs:
* Request domain name -- e.g., example.net * Requested domain name -- e.g., example.net
* Record type of requested domain -- e.g., A, AAAA, NS, MX, * Record type of requested domain -- e.g., A, AAAA, NS, MX,
TXT, etc. TXT, etc.
* Transport protocol on which the request arrived -- i.e., * Transport protocol on which the request arrived -- i.e.,
UDP, TCP, DoT, DoH UDP, TCP, DoT, DoH
* Origin IP general geolocation information -- i.e., * Origin IP general geolocation information -- i.e.,
geocode, region ID, city ID, and metro code geocode, region ID, city ID, and metro code
 End of changes. 3 change blocks. 
6 lines changed or deleted 7 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/