faqs.org - Internet FAQ Archives

RFC 2119 - Key words for use in RFCs to Indicate Requirement Lev


Or Display the document by number




Network Working Group                                         S. Bradner
Request for Comments: 2119                            Harvard University
BCP: 14                                                       March 1997
Category: Best Current Practice

        Key words for use in RFCs to Indicate Requirement Levels

Status of this Memo

   This document specifies an Internet Best Current Practices for the
   Internet Community, and requests discussion and suggestions for
   improvements.  Distribution of this memo is unlimited.

Abstract

   In many standards track documents several words are used to signify
   the requirements in the specification.  These words are often
   capitalized.  This document defines these words as they should be
   interpreted in IETF documents.  Authors who follow these guidelines
   should incorporate this phrase near the beginning of their document:

      The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
      NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and
      "OPTIONAL" in this document are to be interpreted as described in
      RFC 2119.

   Note that the force of these words is modified by the requirement
   level of the document in which they are used.

1. MUST   This word, or the terms "REQUIRED" or "SHALL", mean that the
   definition is an absolute requirement of the specification.

2. MUST NOT   This phrase, or the phrase "SHALL NOT", mean that the
   definition is an absolute prohibition of the specification.

3. SHOULD   This word, or the adjective "RECOMMENDED", mean that there
   may exist valid reasons in particular circumstances to ignore a
   particular item, but the full implications must be understood and
   carefully weighed before choosing a different course.

4. SHOULD NOT   This phrase, or the phrase "NOT RECOMMENDED" mean that
   there may exist valid reasons in particular circumstances when the
   particular behavior is acceptable or even useful, but the full
   implications should be understood and the case carefully weighed
   before implementing any behavior described with this label.

5. MAY   This word, or the adjective "OPTIONAL", mean that an item is
   truly optional.  One vendor may choose to include the item because a
   particular marketplace requires it or because the vendor feels that
   it enhances the product while another vendor may omit the same item.
   An implementation which does not include a particular option MUST be
   prepared to interoperate with another implementation which does
   include the option, though perhaps with reduced functionality. In the
   same vein an implementation which does include a particular option
   MUST be prepared to interoperate with another implementation which
   does not include the option (except, of course, for the feature the
   option provides.)

6. Guidance in the use of these Imperatives

   Imperatives of the type defined in this memo must be used with care
   and sparingly.  In particular, they MUST only be used where it is
   actually required for interoperation or to limit behavior which has
   potential for causing harm (e.g., limiting retransmisssions)  For
   example, they must not be used to try to impose a particular method
   on implementors where the method is not required for
   interoperability.

7. Security Considerations

   These terms are frequently used to specify behavior with security
   implications.  The effects on security of not implementing a MUST or
   SHOULD, or doing something the specification says MUST NOT or SHOULD
   NOT be done may be very subtle. Document authors should take the time
   to elaborate the security implications of not following
   recommendations or requirements as most implementors will not have
   had the benefit of the experience and discussion that produced the
   specification.

8. Acknowledgments

   The definitions of these terms are an amalgam of definitions taken
   from a number of RFCs.  In addition, suggestions have been
   incorporated from a number of people including Robert Ullmann, Thomas
   Narten, Neal McBurnett, and Robert Elz.

9. Author's Address

      Scott Bradner
      Harvard University
      1350 Mass. Ave.
      Cambridge, MA 02138

      phone -  1 617 495 3864

      email - [email protected]

 

User Contributions:

1
BrianDeering
Paragraph 1, for clarity, consider changing to: This word, or the terms "REQUIRED" or "SHALL," indicates an absolute requirement of the specification.Paragraph 2, for clarity, consider changing to: This phrase, or the phrase "SHALL NOT," indicates an absolute prohibition of the specification.Paragraphs 1, 2, 3, and 5, the commas go inside the quotes.Paragraph 4 is missing a comma.Paragraphs 1, 2, 3, 5, and 4, if it had the extra comma, "mean" should be "means."Paragraph 6, consider instead, "...must be used sparingly and with care."Paragraph 7, consider a comma after "...NOT be done"
2
bikeshed
FYI-RFC's can not ever be changed once published (even if factual or typographic mistakes are present).  They can be obsoleted and updated, but never change.  Funny how the one thing that our comments can never change is the thing called request for comments...
3
Zaid khan
Snapchat ads, snapchat business. Snapchat data, app kit, bitmoji
Jacqueline Hartnick 41 year old female from South Africa
5
Tammy Bejano
how do I verify my domain name on the Google console or start a new email domain name? google-site-verification=nnNkFPc6HJClz-jAZb9jtXLgYe1JXRuDR8SfxWT34Fc
6
Jacqueline Hartnick
Just delete everything, I'm so tired of verifications, over and over again, or being locked out, or passwords problems, yor never thought I would struggle so much
Check all settings services servers hosting programs products and all platforms website networks search information private video photo azeri open public all Original help?
I'm being stalked in pontotoc Mississippi USA I'm misty taylor
9
Ezequiel
Analytics Made Easy - Statcounter"
referrerPolicy="no-referrer-when-downgrade
10
Destiny williams
Mar 16, 2022 @ 6:18 pm
Can someone please help me with 50-4000 I'm really having a heard time
11
Luis
Apr 26, 2022 @ 10:10 am
[![semantic-release](https://img.shields.io/badge/ 📦🚀-semantic--release-e10079.svg)](https://github.com/semantic-release/semantic-release)
12
JD Murphy
Jul 23, 2022 @ 11:23 pm
ZTE China have been working in a 5g wireless LAN connection with the help of Wuhan steel LTD
13
Chris
Aug 18, 2022 @ 8:20 pm
I need someone to listen to me that ain't a criminal you got developers that are hacking everybody stuff and they're doing illegal stuff on it they've been on my phone for the last 4 years 2 years something like that I don't know how long to be there but they're connected with the tablets that they're using in the department of corrections in Arkansas and they're connected their names will be connected to the outside world and they're talking to people through every everything my chumbu account everything my calculator they're talking to people using it like a phone that's crazy the department of corrections in Arkansas you're developers is working with them not the department of corrections but somebody somebody in prison McPherson unit the women's division and they're hacking my stuff they they're stealing everything out of my phone everything I watch them do it and I caught him on the phone earlier talking to each other through my phone that ain't even activated through the messaging app I just turned my speaker up and I'm having a conversation and then they turn my speaker down and I I take screenshots of them video chatting together through my camera just do my camera I just staple chat in the dark and it could pick it up it's like my camera is a live feed at all times they used a microdrod to hack it asome nore softwareyou see them through a window like they're talking to each other get the developers off of my devices there are criminals they're breaking the law they're the ones you hear about on the news they're the one that stealing all that Bitcoin it's connected to my devices check it out it's the truth there is over 500 apps on my phone how is that even possible I'm counted to somebody's laptop
14
Octavio
Oct 31, 2022 @ 11:23 pm
I'm here to do everything and anything legitimate
15
Sonja
May 31, 2023 @ 3:03 am
Remove my information from all information collected. I don't have a computer and don't know how to delete
16
Joshua Klein
Dec 18, 2023 @ 5:17 pm
Keep me logged in they hacking my accounts I can't take it anymore I can't even find a job because there stealing my phone
17
Mar 24, 2024 @ 10:22 pm
I can’t open my account because there is some kind of issue with my account

Comment about this RFC, ask questions, or add new information about this topic: