Until now the holder of a domain could be found with the help of Whois services, which is based on the protocol of the same name. However, in 2015, the IETF and ICANN es­tab­lished the first RFC of the RDAP (Reg­is­tra­tion Data Access Protocol) protocol to be the main successor to Whois.

What is the Reg­is­tra­tion Data Access Protocol (RDAP)?

The concept of the Reg­is­tra­tion Data Access Protocol (RDAP) came from a work group from the Internet En­gi­neer­ing Task Force (IETF). After a project phase of nearly four years, the first version of the protocol profile (1.0) appeared on 26 July 2016, whose char­ac­ter­is­tics and ap­pli­ca­tions are outlined in the various Requests for Comments (RFC 7480-7484 and RFC 8056). RDAP offers the pos­si­bil­i­ty of accessing further in­for­ma­tion on basic internet resources, including

  • Domain names
  • IP addresses or
  • Au­tonomous System Numbers (ASNs)

as well as other related articles. For this reason, the Whois al­ter­na­tive provides the basis for sending queries to the various domain reg­istries. This includes providing your database with, for example, contact details for the domain owners, contact details for any admins (Admin C), or even the address of the name server being used, including that of the ad­min­is­tra­tor.

Why was RDAP developed?

Back in 1982 the IETF published the Whois protocol with the aim of having a request service for what at that time was called ARPANET. The fact that it is still in use a quarter of a century later, now for online queries, is something that has been a thorn in the side of many experts. Nowadays the main criticism directed at Whois is that it no longer meets the technical re­quire­ments of the internet.

One of the main problems is that the Whois protocol is incapable of working with coding, and therefore offers no support for non-Latin text. Another major downside is that access to the domain data does not take place via a secure con­nec­tion and is un­reg­u­lat­ed. Even anonymous users get full access and can get their hands on e-mail and postal addresses.

Projects like the Whois++ extension or the IRIS (Internet Registry In­for­ma­tion Service) Denic Protocol managed to deliver some im­prove­ments, however failed to establish them­selves as a solid al­ter­na­tive to Whois. After a long time and many dis­cus­sions within the ICANN community later on the necessity of further de­vel­op­ment, in September 2011 the Security and Stability Advisory Committee (SSAC) with its SAC 501 security report gave the decisive push to bring the RDAP working group to life.

In January 2023, ICANN launched a global vote to decide whether to of­fi­cial­ly replace WHOIS with RDAP. The required number of votes was reached, and the decision was made to of­fi­cial­ly enforce the switch to RDAP. As of January 2025, DNS reg­istries and reg­is­trars will no longer be required to support WHOIS.

How does RDAP work?

In order to implement RDAP, it is important to first un­der­stand how the protocol works, both on the client and server side. For this, it is worth taking a look at RFCs 7480 to 7484, where a minimal im­ple­men­ta­tion of the protocol is described in detail. In addition, there are further RFCs where RDAP protocol ex­ten­sions are described. In the following section, we roughly explain how the protocol works via HTTPS as described in RFC 7840.

Tip

To fa­cil­i­tate the im­ple­men­ta­tion of the protocol for de­vel­op­ers, ICANN has provided an RDAP Im­ple­men­ta­tion Guide.

The client’s tasks:

Im­ple­ment­ing RDAP on the client side is not complex at all. RDAP is built on HTTP, and therefore uses the already existing HTTP methods to transfer data. Clients can make requests to the server using the GET and HEAD methods. Both GET and HEAD requests should include an “Accept” header that specifies which types of JSON files are accepted by the client.

The server’s tasks:

Im­ple­men­ta­tion is a bit more complex on the server side, since the server has to cover quite a few special cases. If the request is suc­cess­ful, the server should return the requested data in the requested format with HTTP status code 200 (OK). On GET requests the server should respond with the requested owner data, and on HEAD requests it should indicate whether it has data available for this domain.

If it knows where the requested data is, but does not have it itself, it should respond with one of the status codes 301, 302, 303, or 307. The URL where the data can be found is then sent under the HTTP header “Location”.

If the server cannot process the request because the requested data is not available, it should respond with the status code 404 (Not Found). If the requested data does exist, but the server does not want to respond for some other reason, it should respond with an ap­pro­pri­ate status code from the 400 range. Requests that contain errors and therefore cannot be un­der­stood as RDAP requests should be answered with the status code 400 (Bad Request). In this case, ad­di­tion­al in­for­ma­tion can be sent in the HTTP entity body.

For more detailed in­for­ma­tion about the process as well as security and extension pos­si­bil­i­ties of the protocol you can refer to the cor­re­spond­ing RFCs. These are linked below.

What makes the Reg­is­tra­tion Data Access Protocol different?

In many ways, the RDAP has turned out to be an improved version of Whois. The IEFT working group has con­cen­trat­ed on the old protocol’s weak­ness­es, meaning that it has focused heavily on the likes of security, struc­tur­ing, and in­ter­na­tion­al­iza­tion for the new query protocol. As a result, several new features emerged, including:

  • Struc­tured request and answer semantics (including stan­dard­ized error messages)
  • Secure access to the requested contact details (e.g. via HTTPS)
  • Ex­pand­abil­i­ty (e.g. addition of output elements)
  • Boot­strap­ping” mechanism (supported by the search for a suitable au­thor­i­ta­tive DNS server)
  • Stan­dard­ized for­ward­ing of queries
  • Web-based (HTTP) and REST compliant
  • Easy trans­la­tion of output data
  • Pos­si­bil­i­ty of granting dif­fer­en­ti­at­ed access to contact details

In many aspects, the Reg­is­tra­tion Data Access Protocol has proven itself to be much more flexible than its pre­de­ces­sor. While Whois, as a text-based protocol, relies on TCP and the specific TCP port (43), RDAP uses the web standard HTTP, or even HTTPS. This means that all data is delivered in a stan­dard­ized, machine-readable JSON format. This means that on the one hand, the RDAP allows for more freedom when it comes to data queries, while also making it easier to program query services that can com­mu­ni­cate with the various reg­is­tra­tion au­thor­i­ties, while out­putting the requested data in different languages.

RDAP Whois
HTTP-based text-based
Stan­dard­ized JSON format No coding schemata
Output data is machine-readable and can be trans­lat­ed un­com­pli­cat­ed­ly Output data is in plain data and therefore cannot be further processed au­to­mat­i­cal­ly
Responses are au­to­mat­i­cal­ly sent to other reg­istries Responses contain no follow-on registry in­for­ma­tion
Possible to define access rights for different groups Different types of access to data not possible
Domain Name Reg­is­tra­tion
Build your brand on a great domain
  • Free Wildcard SSL for safer data transfers 
  • Free private reg­is­tra­tion for more privacy
  • Free Domain Connect for easy DNS setup

Option for different types of access – still a topic for dis­cus­sion

Without a doubt one of the most important new functions that was im­ple­ment­ed in the Reg­is­tra­tion Data Access Protocol is the pos­si­bil­i­ty to come up with different access rights for in­di­vid­ual user groups. This allows the registrar to regulate in detail who gets to see what in­for­ma­tion. This allows anonymous users to only enjoy limited access, while au­tho­rized users can view the entire data set. This is an aspect where many people see a need for crucial clar­i­fi­ca­tion re­quire­ments.

One of the questions it raises, among others, is what to do about criminal pros­e­cu­tors, who wish to remain anonymous while si­mul­ta­ne­ous­ly enjoying full access rights. Fur­ther­more, there are no guide­lines regarding whether in such a case access to the domain data may also be granted to those outside of a country’s borders. Above all, the priority is the pro­tec­tion of user data and the trust in the website operator who registers the domain that comes with this. And in no way should this trust be com­pro­mised by the new RDAP request tech­nol­o­gy. At the end of 2016, a number of reg­istries appealed against the im­ple­men­ta­tion period imposed by the ICANN, and this has meant that the or­ga­ni­za­tion has decided to establish contracts for RDAP with reg­is­trars and domain providers.

Domain Checker
Go to Main Menu