RFC 1835 (rfc1835) - Page 2 of 41


Architecture of the WHOIS++ service



Alternative Format: Original Text Document



RFC 1835          Architecture of the WHOIS++ service        August 1995


   1.7.  Reporting Warnings and Errors ....................... 11
   1.8.  Privacy and Security Issues ......................... 11
   Part II - WHOIS++ Implementation .......................... 12
   2.1.  The WHOIS++ interaction model ....................... 12
   2.2.  The WHOIS++ Command set ............................. 12
   2.2.1.  System Commands ................................... 13
   2.2.1.1.  The COMMANDS command ............................ 14
   2.2.1.2.  The CONSTRAINTS command ......................... 15
   2.2.1.3.  The DESCRIBE command ............................ 15
   2.2.1.4.  The HELP command ................................ 15
   2.2.1.5.  The LIST command ................................ 15
   2.2.1.6.  The POLLED-BY command ........................... 15
   2.2.1.7.  The POLLED-FOR command .......................... 16
   2.2.1.8.  The SHOW command ................................ 16
   2.2.1.9.  The VERSION command ............................. 16
   2.2.2.  The Search Command ................................ 16
   2.2.2.1.  Format of a Search Term ......................... 17
   2.2.2.2.  Format of a Search String ....................... 18
   2.3.  WHOIS++ Constraints ................................. 19
   2.3.1.  Required Constraints .............................. 20
   2.3.2.  Optional CONSTRAINTS .............................. 21
   2.3.2.1.  The SEARCH Constraint ........................... 22
   2.3.2.2.  The FORMAT Constraint ........................... 22
   2.3.2.3.  The MAXFULL Constraint .......................... 22
   2.3.2.4.  The MAXHITS Constraint .......................... 23
   2.3.2.5.  The CASE Constraint ............................. 23
   2.3.2.6.  The AUTHENTICATE Constraint ..................... 23
   2.3.2.7.  The NAME Constraint ............................. 23
   2.3.2.8.  The PASSWORD Constraint ......................... 23
   2.3.2.9.  The LANGUAGE Constraint ......................... 23
   2.3.2.10.  The INCHARSET Constraint ....................... 24
   2.3.2.11.  The IGNORE Constraint .......................... 24
   2.3.2.12.  The INCLUDE Constraint ......................... 24
   2.4.  Server Response Modes ............................... 24
   2.4.1.  Default Responses ................................. 25
   2.4.2.  Format of Responses ............................... 25
   2.4.3.  Syntax of a Formatted Response .................... 26
   2.4.3.1.  A FULL format response .......................... 26
   2.4.3.2.  ABRIDGED Format Response ........................ 27
   2.4.3.3.  HANDLE Format Response .......................... 27
   2.4.3.4.  SUMMARY Format Response ......................... 27
   2.4.3.5.  SERVERS-TO-ASK Response ......................... 28
   2.4.4.  System Generated Messages ......................... 28
   2.5.  Compatibility with Older WHOIS Servers .............. 29
   3.  Miscellaneous ......................................... 29
   3.1.  Acknowledgements .................................... 29
   3.2.  References .......................................... 29
   3.3.  Authors' Addresses .................................. 30



Deutsch, et al              Standards Track