A
Request for Comments
A Request for Comments (RFC) is a publication in a series from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force (IETF). An RFC is authored by individuals or ...
(RFC), in the context of
Internet governance
Internet governance is the effort by governments, the private sector, civil society, and technical actors to develop and apply shared principles, norms, rules, and decision-making procedures that shape the evolution and use of the Internet. This ...
, is a type of publication from the
Internet Engineering Task Force
The Internet Engineering Task Force (IETF) is a standards organization for the Internet standard, Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster ...
(IETF) and the
Internet Society
The Internet Society (ISOC) is an American non-profit advocacy organization founded in 1992 with local chapters around the world. It has offices in Reston, Virginia, United States, and Geneva, Switzerland.
Organization
The Internet Society ...
(ISOC), usually describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.
Almost every
April Fools' Day
April Fools' Day or April Fool's Day (rarely called All Fools' Day) is an annual custom on the 1st of April consisting of practical jokes, hoaxes, and pranks. Jokesters often expose their actions by shouting "April Fool " at the recipient. ...
(1 April) since 1989, the Internet
RFC Editor has published one or more humorous
Request for Comments
A Request for Comments (RFC) is a publication in a series from the principal technical development and standards-setting bodies for the Internet, most prominently the Internet Engineering Task Force (IETF). An RFC is authored by individuals or ...
(RFC) documents, following in the path blazed by the June 1973 RFC called ARPAWOCKY, a
parody
A parody is a creative work designed to imitate, comment on, and/or mock its subject by means of satire, satirical or irony, ironic imitation. Often its subject is an Originality, original work or some aspect of it (theme/content, author, style, e ...
of
Lewis Carroll
Charles Lutwidge Dodgson (27 January 1832 – 14 January 1898), better known by his pen name Lewis Carroll, was an English author, poet, mathematician, photographer and reluctant Anglicanism, Anglican deacon. His most notable works are ''Alice ...
's
nonsense poem "
Jabberwocky
"Jabberwocky" is a Nonsense verse, nonsense poem written by Lewis Carroll about the killing of a creature named "the Jabberwock". It was included in his 1871 novel ''Through the Looking-Glass'', the sequel to ''Alice's Adventures in Wonderland' ...
". The following list also includes
humor
Humour ( Commonwealth English) or humor (American English) is the tendency of experiences to provoke laughter and provide amusement. The term derives from the humoral medicine of the ancient Greeks, which taught that the balance of fluids i ...
ous RFCs published on other dates.
List of April Fools' Day RFCs
*
:: A parody of the
TCP/IP
The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are ...
documentation style. For a long time it was specially marked in the RFC index with "note date of issue".
*
*
:: Updated by RFC 2549 in 1999; see below. Describes protocol for transmitting IP packets by
homing pigeon.
:: In 2001, RFC 1149 was actually implemented by members of the
Bergen
Bergen (, ) is a city and municipalities of Norway, municipality in Vestland county on the Western Norway, west coast of Norway. Bergen is the list of towns and cities in Norway, second-largest city in Norway after the capital Oslo.
By May 20 ...
Linux User Group.
:: See also RFC 6214, as noted below. Describes the adaptation of RFC 1149 for
IPv6
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communication protocol, communications protocol that provides an identification and location system for computers on networks and routes traffic ...
.
:
*
*
*
*
*
*
::Attributed to
William Shakespeare
William Shakespeare ( 23 April 1564 – 23 April 1616) was an English playwright, poet and actor. He is widely regarded as the greatest writer in the English language and the world's pre-eminent dramatist. He is often called England's nation ...
.
*
*
*
*
*
*
*
*
*
*
:: This RFC is not solely for entertainment; the described protocol has regularly been implemented at hacker events in Europe.
*
* Updated by RFC 7168 in 2014.
:
*
* Updates RFC 1149.
:
*
* Obsoletes MCMXCIX.
*
:: Concerning the practicalities of the
infinite monkey theorem
The infinite monkey theorem states that a monkey hitting keys independently and at randomness, random on a typewriter keyboard for an infinity, infinite amount of time will almost surely type any given text, including the complete works of Willi ...
.
*
*
*
*
::Parody of "Everything over IP and IP over Everything" and the
2000–2001 California electricity crisis.
*
*
:: Proposal for the '
evil bit', as an option in the
IPv4 packet header. Later, this became a synonym for all attempts to seek simple technical solutions for difficult human social problems which require the willing participation of malicious actors.
:
*
*
*
::Notable for containing
PDP-10
Digital Equipment Corporation (DEC)'s PDP-10, later marketed as the DECsystem-10, is a mainframe computer family manufactured beginning in 1966 and discontinued in 1983. 1970s models and beyond were marketed under the DECsystem-10 name, especi ...
assembly language code nearly 22 years after the manufacturer ceased production of the PDP-10, and for being technically possible as opposed to many of these other proposals.
*RFC Draft: "IP over Burrito Carriers"
::An
internet protocol
The Internet Protocol (IP) is the network layer communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.
IP ...
recipe, to communicate while eating.
:An April 1st RFC was not published this year, but an
/www.ietf.org/mail-archive/web/ietf/current/msg41460.html announcement on the IETF listabout the appointment of the ''
Sesame Street
''Sesame Street'' is an American educational television, educational children's television series that combines live-action, sketch comedy, animation, and puppetry. It is produced by Sesame Workshop (known as the Children's Television Worksh ...
'' character
Bert as member of the IAB appears to have been the April Fools' Day 2006 stunt.
*
:
:
*
*
*
*
:: Implemented on
Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
by the author, in the process of writing the RFC.
*
*
:
*
*
::Although mentioned in several networking protocols (like
MPEG-2,
RTP, or
RTCP) the Null Packet has never been formally defined. This RFC corrects that omission by providing an empty definition. Null packets are zero-dimensional, zero length, benign packets (i.e. lacking an ''Evil bit''), that can be quite elusive. Interestingly, the rate at which Null Packets are sent does not increase the bit rate of the Null Packet traffic.
*
::Most services eagerly choose to be fully visible in the network so users may find them easily (by means of one of the many
service discovery techniques), but "an apathetic, playful, overwhelmed, or shy service might prefer a hide or hint engagement, instead of directly showing itself." To do so, this RFC introduces a
hide-and-seek paradigm, where the service (the "hider") has the option of several techniques for hiding from the client (in this scenario called "it"). DPS packets are sent over
TCP with the ''Mood'' set to 'Sneaky' (see above) and with their ''Evil bit'' set (see above). The latter now ambiguously means "I am not sure" to further enhance the protocol.
*
::Enhances the ability of the RFC's author to also convey intention and purpose in a more informal way, with (in)directive key words, like: "MUST (BUT WE KNOW YOU WON'T)" (when you know beforehand you will be ignored, but to come out morally superior anyway) and "REALLY SHOULD NOT" (when it is to be expected that 'boys will be boys').
*
::When it becomes possible to send packets over the Internet
faster than light
Faster-than-light (superluminal or supercausal) travel and communication are the conjectural propagation of matter or information faster than the speed of light in vacuum (). The special theory of relativity implies that only particles with zero ...
, they may be received before they are sent (due to
time reversal), which will have major impact on many protocols in use today. With sufficient speed (and corresponding negative time shift), a complete communication may have taken place before it even has started. The RFC reviews the design principles of those protocols, to prevent future breakdown of communication. Most likely, we should have started upgrading them yesterday.
:
:
*
::Updates for
coffee machines which are also capable of brewing
tea. Also defines the
HTTP response code ''418 I'm a Teapot'', for
teapots to use when unable to brew
coffee
Coffee is a beverage brewed from roasted, ground coffee beans. Darkly colored, bitter, and slightly acidic, coffee has a stimulating effect on humans, primarily due to its caffeine content, but decaffeinated coffee is also commercially a ...
.
:
*
::Although generally unwanted,
private key counterparts of
X509 digital certificates may have been or have been shared with a third party, for
lawful interception or other reasons. Users may now be notified of this fact with a new certificate extension, specifying the
boolean value
ext-KeyUsage
. When 'true', the private key has been shared; when 'false', the signer abstains from commenting on whether or not sharing has taken place.
*
::
Green IT has become increasingly important. In a
win-win proposition, for packets and the environment alike, this RFC defines a way to allow packets to be
routed through the air, to get as much sunlight and fresh air possible. Sending packets over
Wi-Fi
Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
or by
pigeons will help them escape their torturous routine of assembly and disassembly, and being shot through dark
fibers
Fiber (spelled fibre in British English; from ) is a natural or artificial substance that is significantly longer than it is wide. Fibers are often used in the manufacture of other materials. The strongest engineering materials often inco ...
and
copper cables all the time.
*
::In an approach similar to the now deprecated
ICMP Source Quench, it reuses that packet's 'Type' field (4) to tell the sender (really more explicitly than
ECN) to shut up. The user responsible for the traffic MUST be made aware of the contents of an RECN message by means of
text-to-speech
Speech synthesis is the artificial production of human speech. A computer system used for this purpose is called a speech synthesizer, and can be implemented in software or Computer hardware, hardware products. A text-to-speech (TTS) system conv ...
, or
pop-ups if the audio channel is muted.
: An April 1st RFC was not published this year.
*
::Takes a rather mathematical approach to use the 128-bit
IPv6 address space in other ways than the traditional one, to ultimately arrive at Complex Addresses. You may use the imaginary part of a
complex
Complex commonly refers to:
* Complexity, the behaviour of a system whose components interact in multiple ways so possible interactions are difficult to describe
** Complex system, a system composed of many components which may interact with each ...
address (with
polar coordinates
In mathematics, the polar coordinate system specifies a given point (mathematics), point in a plane (mathematics), plane by using a distance and an angle as its two coordinate system, coordinates. These are
*the point's distance from a reference ...
as the real part) to reach
Santa Claus
Santa Claus (also known as Saint Nicholas, Saint Nick, Father Christmas, Kris Kringle or Santa) is a legendary figure originating in Western Christian culture who is said to bring gifts during the late evening and overnight hours on Chris ...
, for example. It also proposes to use Flying Addresses for end hosts using
IP over avian carriers.
*
::As the
Internet Architecture Board
The Internet Architecture Board (IAB) is a committee of the Internet Engineering Task Force (IETF) and an advisory body of the Internet Society (ISOC). Its responsibilities include architectural oversight of IETF activities, Internet Standards ...
intends to relax requirements for compatibility with
IPv4
Internet Protocol version 4 (IPv4) is the first version of the Internet Protocol (IP) as a standalone specification. It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. ...
for new or extended protocols, this RFC helps the adoption of
IPv6
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communication protocol, communications protocol that provides an identification and location system for computers on networks and routes traffic ...
by setting the
evil bit for all IPv4 packets to , making sure that
dual stack hosts will favor IPv6, as will the
Happy Eyeballs algorithm. To maintain functional equivalence between IPv4 and IPv6, the 'security flag' of should be included in the
IPv6 header. Advanced security options may be specified in a new
hop-by-hop option header.
*
::
ASCII art in its most splendid form. Depicts and annotates
fruit bats, the
Loch Ness monster
The Loch Ness Monster (), known affectionately as Nessie, is a mythical creature in Scottish folklore that is said to inhabit Loch Ness in the Scottish Highlands. It is often described as large, long-necked, and with one or more humps protrud ...
, some fundamental
Bauhaus
The Staatliches Bauhaus (), commonly known as the , was a German art school operational from 1919 to 1933 that combined Decorative arts, crafts and the fine arts.Oxford Dictionary of Art and Artists (Oxford: Oxford University Press, 4th edn., ...
elements, and even a flock of
avian carriers.
*
::A heartfelt cry to end packet discrimination at the IP level, where they frequently (even in this day and age) are terminated prematurely, based on color,
length
Length is a measure of distance. In the International System of Quantities, length is a quantity with Dimension (physical quantity), dimension distance. In most systems of measurement a Base unit (measurement), base unit for length is chosen, ...
,
age
Age or AGE may refer to:
Time and its effects
* Age, the amount of time someone has been alive or something has existed
** East Asian age reckoning, an Asian system of marking age starting at 1
* Ageing or aging, the process of becoming older
...
, etcetera, or even by
IP version!
*
::Proposes to use 128-bit
Unicode
Unicode or ''The Unicode Standard'' or TUS is a character encoding standard maintained by the Unicode Consortium designed to support the use of text in all of the world's writing systems that can be digitized. Version 16.0 defines 154,998 Char ...
to facilitate internationalization of
IPv6
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communication protocol, communications protocol that provides an identification and location system for computers on networks and routes traffic ...
, since the 1.114.112 code points of the current implementation of Unicode is deemed insufficient for the future.
IPv6 addresses may be represented by a single U+128
glyph
A glyph ( ) is any kind of purposeful mark. In typography, a glyph is "the specific shape, design, or representation of a character". It is a particular graphical representation, in a particular typeface, of an element of written language. A ...
, to reduce stress on the eyes of network administrators.
::If implemented, it would obsolete , because "
was found to be too complex to implement anyway".
*
:: A 'response/request' protocol similar to
HTTP/1.1 but where clients send a response to the server (e.g. "Hello World. My payload includes a trailing CRLF.") to which the server answers with a request (e.g. GET /hello.txt), like in the
Jeopardy!
''Jeopardy!'' is an American television game show created by Merv Griffin. The show is a quiz competition that reverses the traditional question-and-answer format of many quiz shows. Rather than being given questions, contestants are instead g ...
game. The Hypertext Double Jeopardy Protocol (HTJ2P) (described in Appendix A) inverses the semantics of HTJP again.
*
:: The authors contend that the
DNS (secured with
DNSSEC) is most suited to globally and reliably provide information to help maintain a high
quality of experience for
CPE (among others). With the definition of four new DNS
RR types (
password
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
,
credit card number,
social security number
In the United States, a Social Security number (SSN) is a nine-digit number issued to United States nationality law, U.S. citizens, Permanent residence (United States), permanent residents, and temporary (working) residents under section 205(c)(2 ...
, and an SSN
pointer record) they hope to create end-to-end, holistic network management.
*
::A proposal to use
UTF-8
UTF-8 is a character encoding standard used for electronic communication. Defined by the Unicode Standard, the name is derived from ''Unicode Transformation Format 8-bit''. Almost every webpage is transmitted as UTF-8.
UTF-8 supports all 1,112,0 ...
to obfuscate (and help replace) textual
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es, to coerce a small minority of people to use the
DNS instead of sticking to (and mixing up) plain IP addresses.
*
::Dismisses with the notion that considering time travel for
faster-than-light packet delivery is "amusing" but impossible as a concept. Instead, it focuses on real life
quantum entanglement
Quantum entanglement is the phenomenon where the quantum state of each Subatomic particle, particle in a group cannot be described independently of the state of the others, even when the particles are separated by a large distance. The topic o ...
in relation to
packet round trip times, which (depending on the observer) could reach zero. This may cause havoc among several protocols, which should be fixed "in time" before things break.
*
::Since the
Internet Engineering Task Force
The Internet Engineering Task Force (IETF) is a standards organization for the Internet standard, Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster ...
claims it "is not the Protocol Police", it is formally established here. It polices various aspects of protocol definitions laid out by the RFC series, and enforces adherence to them. They are sanctioned to access
walled gardens and may even resort to traffic imprisonment. By the way: if you are interested in joining the Protocol Police, contact your
localhost
In computer networking, localhost is a hostname that refers to the current computer used to access it. The name ''localhost'' is reserved for loopback purposes.
It is used to access the network services that are running on the host via t ...
.
*
::Discourages the practice of introducing
software defects, to reduce costs and lessen security impacts. By introducing some
best current practices the authors hope to get rid of them: "Authors MUST NOT implement bugs. If bugs are introduced in code, they MUST be clearly documented."
*
::Known problems with
hexadecimal
Hexadecimal (also known as base-16 or simply hex) is a Numeral system#Positional systems in detail, positional numeral system that represents numbers using a radix (base) of sixteen. Unlike the decimal system representing numbers using ten symbo ...
representation of numbers can be avoided by replacing its
alphabet
An alphabet is a standard set of letter (alphabet), letters written to represent particular sounds in a spoken language. Specifically, letters largely correspond to phonemes as the smallest sound segments that can distinguish one word from a ...
of 0-9 and A-F with two
octal
Octal (base 8) is a numeral system with eight as the base.
In the decimal system, each place is a power of ten. For example:
: \mathbf_ = \mathbf \times 10^1 + \mathbf \times 10^0
In the octal system, each place is a power of eight. For ex ...
ranges: 0-7 and the letters 'cjzwfsbv' (to represent values 8-15 in a bitwise elegant way).
*
::As is customary in
light novel
A is a type of Genre fiction, popular literature novel from Japan usually classified as young adult fiction, generally targeting Adolescence, teens to Young adult, twenties or older. The definition is very vague, and wide-ranging.
The abbr ...
s, a 'death flag' indicates the increased likelihood of a swift demise of the character. Transferred to
TCP, the DTH flag in the
packet header
In information technology, header is supplemental data placed at the beginning of a block of data being stored or transmitted. In data transmission, the data following the header is sometimes called the '' payload'' or '' body''.
It is vital that ...
could lead to smoother and more attractive session narratives.
*
::Finally, a formalized way (with a
ABNF grammar
In linguistics, grammar is the set of rules for how a natural language is structured, as demonstrated by its speakers or writers. Grammar rules may concern the use of clauses, phrases, and words. The term may also refer to the study of such rul ...
description) to properly describe the interaction between
cats and
container
A container is any receptacle or enclosure for holding a product used in storage, packaging, and transportation, including shipping.
Things kept inside of a container are protected on several sides by being inside of its structure. The term ...
s, including the occasional ball of
yarn
Yarn is a long continuous length of interlocked fibres, used in sewing, crocheting, knitting, weaving, embroidery, ropemaking, and the production of textiles. '' Thread'' is a type of yarn intended for sewing by hand or machine. Modern ...
.
*
::The AI Sarcasm Detection Protocol (ASDP) is a
framework for detecting
sarcasm in
AI systems (written with the help of
ChatGPT
ChatGPT is a generative artificial intelligence chatbot developed by OpenAI and released on November 30, 2022. It uses large language models (LLMs) such as GPT-4o as well as other Multimodal learning, multimodal models to create human-like re ...
). Detecting sarcasm may help improve AI - human intercommunication.
*
::The recent advances in artificial intelligence (AI) such as large language models enable the design of the Faster than Light speed Protocol (FLIP) for Internet. FLIP provides a way to avoid congestion, enhance security, and deliver faster packets on the Internet by using AI to predict future packets at the receiving peer before they arrive. This document describes the protocol, its various encapsulations, and some operational considerations.
*
::Estimating time requirements for tasks, both critical and mundane, remains a challenge in engineering, business, and everyday communication. Existing models fail due to inherent unpredictability and inconsistencies in human estimation. This document introduces the Two-Week Principle (TWP), a novel, universally adaptable time scale that seeks to standardize all temporal references to a singular, uniform duration. TWP ensures clarity, predictability, and synchronization across all sectors that rely on time-based scheduling.
Other humorous RFCs
*
::Transcript of a talk of the
schizophrenic
Schizophrenia () is a mental disorder characterized variously by hallucinations (typically, Auditory hallucination#Schizophrenia, hearing voices), delusions, thought disorder, disorganized thinking and behavior, and Reduced affect display, f ...
chatbot
A chatbot (originally chatterbot) is a software application or web interface designed to have textual or spoken conversations. Modern chatbots are typically online and use generative artificial intelligence systems that are capable of main ...
PARRY with the
computer simulated psychiatrist
A psychiatrist is a physician who specializes in psychiatry. Psychiatrists are physicians who evaluate patients to determine whether their symptoms are the result of a physical illness, a combination of physical and mental ailments or strictly ...
ELIZA (a.k.a. 'The Doctor') which both fail the
Turing test
The Turing test, originally called the imitation game by Alan Turing in 1949,. Turing wrote about the ‘imitation game’ centrally and extensively throughout his 1950 text, but apparently retired the term thereafter. He referred to ‘ iste ...
with flying colours.
*
::A very '
ARPA-ish' parody of
Lewis Caroll's
nonsense poem '
Jabberwocky
"Jabberwocky" is a Nonsense verse, nonsense poem written by Lewis Carroll about the killing of a creature named "the Jabberwock". It was included in his 1871 novel ''Through the Looking-Glass'', the sequel to ''Alice's Adventures in Wonderland' ...
'.
*
::A
poem
Poetry (from the Greek language, Greek word ''poiesis'', "making") is a form of literature, literary art that uses aesthetics, aesthetic and often rhythmic qualities of language to evoke meaning (linguistics), meanings in addition to, or in ...
that discusses problems that arise, and debugging techniques used, in bringing a new network into operation. It shows that
array indexing is problematic since the olden days.
*
::A parody of the
Christmas carol
A Christmas carol is a Carol (music), carol on the theme of Christmas, traditionally sung at Christmas itself or during the surrounding Christmas and holiday season. The term noel has sometimes been used, especially for carols of French or ...
'
The Twelve Days of Christmas', where computer problems pile up and the IT staff is swamped, like on a regular day.
*
::Introducing the
NULL encryption algorithm,
mathematically defined as the
Identity function
Graph of the identity function on the real numbers
In mathematics, an identity function, also called an identity relation, identity map or identity transformation, is a function that always returns the value that was used as its argument, unc ...
: , provides the means for
Encapsulating Security Payload to provide
authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
and
integrity
Integrity is the quality of being honest and having a consistent and uncompromising adherence to strong moral and ethical principles and values.
In ethics, integrity is regarded as the honesty and Honesty, truthfulness or of one's actions. Integr ...
, but without
confidentiality
Confidentiality involves a set of rules or a promise sometimes executed through confidentiality agreements that limits the access to or places restrictions on the distribution of certain types of information.
Legal confidentiality
By law, la ...
.
Submission of April Fools' Day RFCs
The RFC Editor accepts submission of properly formatted April Fools' Day RFCs from the general public, and considers them for publication in the same year if received at least two weeks prior to April 1st.
This practice of publishing April Fool's Day RFCs is specifically acknowledged in the instructions memo for RFC authors, with a tongue-in-cheek note saying: "Note that in past years the RFC Editor has sometimes published serious documents with April 1 dates. Readers who cannot distinguish satire by reading the text may have a future in marketing."
References
Further reading
*
/www.rfc-editor.org/ RFC Editor home page– hosts individual RFCs
External links
* – on RFC 3751 and April Fools' Day RFCs in general.
* {{cite book , title=The Complete April Fools' Day RFCs , last= Limoncelli , first= Thomas A., author2=Peter H. Salus , year= 2007, publisher= Peer-to-Peer Communications, isbn= 978-1-57398-042-5
April Fools' Day jokes
Request for Comments
Computer humour
Hacker culture