mirror of
https://gitee.com/acl-dev/acl.git
synced 2024-11-30 10:57:34 +08:00
3078 lines
120 KiB
Plaintext
3078 lines
120 KiB
Plaintext
Network Working Group P. Mockapetris
|
||
Request for Comments: 1035 ISI
|
||
November 1987
|
||
Obsoletes: RFCs 882, 883, 973
|
||
|
||
DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION
|
||
|
||
|
||
1. STATUS OF THIS MEMO
|
||
|
||
This RFC describes the details of the domain system and protocol, and
|
||
assumes that the reader is familiar with the concepts discussed in a
|
||
companion RFC, "Domain Names - Concepts and Facilities" [RFC-1034].
|
||
|
||
The domain system is a mixture of functions and data types which are an
|
||
official protocol and functions and data types which are still
|
||
experimental. Since the domain system is intentionally extensible, new
|
||
data types and experimental behavior should always be expected in parts
|
||
of the system beyond the official protocol. The official protocol parts
|
||
include standard queries, responses and the Internet class RR data
|
||
formats (e.g., host addresses). Since the previous RFC set, several
|
||
definitions have changed, so some previous definitions are obsolete.
|
||
|
||
Experimental or obsolete features are clearly marked in these RFCs, and
|
||
such information should be used with caution.
|
||
|
||
The reader is especially cautioned not to depend on the values which
|
||
appear in examples to be current or complete, since their purpose is
|
||
primarily pedagogical. Distribution of this memo is unlimited.
|
||
|
||
Table of Contents
|
||
|
||
1. STATUS OF THIS MEMO 1
|
||
2. INTRODUCTION 3
|
||
2.1. Overview 3
|
||
2.2. Common configurations 4
|
||
2.3. Conventions 7
|
||
2.3.1. Preferred name syntax 7
|
||
2.3.2. Data Transmission Order 8
|
||
2.3.3. Character Case 9
|
||
2.3.4. Size limits 10
|
||
3. DOMAIN NAME SPACE AND RR DEFINITIONS 10
|
||
3.1. Name space definitions 10
|
||
3.2. RR definitions 11
|
||
3.2.1. Format 11
|
||
3.2.2. TYPE values 12
|
||
3.2.3. QTYPE values 12
|
||
3.2.4. CLASS values 13
|
||
|
||
|
||
|
||
Mockapetris [Page 1]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
3.2.5. QCLASS values 13
|
||
3.3. Standard RRs 13
|
||
3.3.1. CNAME RDATA format 14
|
||
3.3.2. HINFO RDATA format 14
|
||
3.3.3. MB RDATA format (EXPERIMENTAL) 14
|
||
3.3.4. MD RDATA format (Obsolete) 15
|
||
3.3.5. MF RDATA format (Obsolete) 15
|
||
3.3.6. MG RDATA format (EXPERIMENTAL) 16
|
||
3.3.7. MINFO RDATA format (EXPERIMENTAL) 16
|
||
3.3.8. MR RDATA format (EXPERIMENTAL) 17
|
||
3.3.9. MX RDATA format 17
|
||
3.3.10. NULL RDATA format (EXPERIMENTAL) 17
|
||
3.3.11. NS RDATA format 18
|
||
3.3.12. PTR RDATA format 18
|
||
3.3.13. SOA RDATA format 19
|
||
3.3.14. TXT RDATA format 20
|
||
3.4. ARPA Internet specific RRs 20
|
||
3.4.1. A RDATA format 20
|
||
3.4.2. WKS RDATA format 21
|
||
3.5. IN-ADDR.ARPA domain 22
|
||
3.6. Defining new types, classes, and special namespaces 24
|
||
4. MESSAGES 25
|
||
4.1. Format 25
|
||
4.1.1. Header section format 26
|
||
4.1.2. Question section format 28
|
||
4.1.3. Resource record format 29
|
||
4.1.4. Message compression 30
|
||
4.2. Transport 32
|
||
4.2.1. UDP usage 32
|
||
4.2.2. TCP usage 32
|
||
5. MASTER FILES 33
|
||
5.1. Format 33
|
||
5.2. Use of master files to define zones 35
|
||
5.3. Master file example 36
|
||
6. NAME SERVER IMPLEMENTATION 37
|
||
6.1. Architecture 37
|
||
6.1.1. Control 37
|
||
6.1.2. Database 37
|
||
6.1.3. Time 39
|
||
6.2. Standard query processing 39
|
||
6.3. Zone refresh and reload processing 39
|
||
6.4. Inverse queries (Optional) 40
|
||
6.4.1. The contents of inverse queries and responses 40
|
||
6.4.2. Inverse query and response example 41
|
||
6.4.3. Inverse query processing 42
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 2]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
6.5. Completion queries and responses 42
|
||
7. RESOLVER IMPLEMENTATION 43
|
||
7.1. Transforming a user request into a query 43
|
||
7.2. Sending the queries 44
|
||
7.3. Processing responses 46
|
||
7.4. Using the cache 47
|
||
8. MAIL SUPPORT 47
|
||
8.1. Mail exchange binding 48
|
||
8.2. Mailbox binding (Experimental) 48
|
||
9. REFERENCES and BIBLIOGRAPHY 50
|
||
Index 54
|
||
|
||
2. INTRODUCTION
|
||
|
||
2.1. Overview
|
||
|
||
The goal of domain names is to provide a mechanism for naming resources
|
||
in such a way that the names are usable in different hosts, networks,
|
||
protocol families, internets, and administrative organizations.
|
||
|
||
From the user's point of view, domain names are useful as arguments to a
|
||
local agent, called a resolver, which retrieves information associated
|
||
with the domain name. Thus a user might ask for the host address or
|
||
mail information associated with a particular domain name. To enable
|
||
the user to request a particular type of information, an appropriate
|
||
query type is passed to the resolver with the domain name. To the user,
|
||
the domain tree is a single information space; the resolver is
|
||
responsible for hiding the distribution of data among name servers from
|
||
the user.
|
||
|
||
From the resolver's point of view, the database that makes up the domain
|
||
space is distributed among various name servers. Different parts of the
|
||
domain space are stored in different name servers, although a particular
|
||
data item will be stored redundantly in two or more name servers. The
|
||
resolver starts with knowledge of at least one name server. When the
|
||
resolver processes a user query it asks a known name server for the
|
||
information; in return, the resolver either receives the desired
|
||
information or a referral to another name server. Using these
|
||
referrals, resolvers learn the identities and contents of other name
|
||
servers. Resolvers are responsible for dealing with the distribution of
|
||
the domain space and dealing with the effects of name server failure by
|
||
consulting redundant databases in other servers.
|
||
|
||
Name servers manage two kinds of data. The first kind of data held in
|
||
sets called zones; each zone is the complete database for a particular
|
||
"pruned" subtree of the domain space. This data is called
|
||
authoritative. A name server periodically checks to make sure that its
|
||
zones are up to date, and if not, obtains a new copy of updated zones
|
||
|
||
|
||
|
||
Mockapetris [Page 3]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
from master files stored locally or in another name server. The second
|
||
kind of data is cached data which was acquired by a local resolver.
|
||
This data may be incomplete, but improves the performance of the
|
||
retrieval process when non-local data is repeatedly accessed. Cached
|
||
data is eventually discarded by a timeout mechanism.
|
||
|
||
This functional structure isolates the problems of user interface,
|
||
failure recovery, and distribution in the resolvers and isolates the
|
||
database update and refresh problems in the name servers.
|
||
|
||
2.2. Common configurations
|
||
|
||
A host can participate in the domain name system in a number of ways,
|
||
depending on whether the host runs programs that retrieve information
|
||
from the domain system, name servers that answer queries from other
|
||
hosts, or various combinations of both functions. The simplest, and
|
||
perhaps most typical, configuration is shown below:
|
||
|
||
Local Host | Foreign
|
||
|
|
||
+---------+ +----------+ | +--------+
|
||
| | user queries | |queries | | |
|
||
| User |-------------->| |---------|->|Foreign |
|
||
| Program | | Resolver | | | Name |
|
||
| |<--------------| |<--------|--| Server |
|
||
| | user responses| |responses| | |
|
||
+---------+ +----------+ | +--------+
|
||
| A |
|
||
cache additions | | references |
|
||
V | |
|
||
+----------+ |
|
||
| cache | |
|
||
+----------+ |
|
||
|
||
User programs interact with the domain name space through resolvers; the
|
||
format of user queries and user responses is specific to the host and
|
||
its operating system. User queries will typically be operating system
|
||
calls, and the resolver and its cache will be part of the host operating
|
||
system. Less capable hosts may choose to implement the resolver as a
|
||
subroutine to be linked in with every program that needs its services.
|
||
Resolvers answer user queries with information they acquire via queries
|
||
to foreign name servers and the local cache.
|
||
|
||
Note that the resolver may have to make several queries to several
|
||
different foreign name servers to answer a particular user query, and
|
||
hence the resolution of a user query may involve several network
|
||
accesses and an arbitrary amount of time. The queries to foreign name
|
||
servers and the corresponding responses have a standard format described
|
||
|
||
|
||
|
||
Mockapetris [Page 4]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
in this memo, and may be datagrams.
|
||
|
||
Depending on its capabilities, a name server could be a stand alone
|
||
program on a dedicated machine or a process or processes on a large
|
||
timeshared host. A simple configuration might be:
|
||
|
||
Local Host | Foreign
|
||
|
|
||
+---------+ |
|
||
/ /| |
|
||
+---------+ | +----------+ | +--------+
|
||
| | | | |responses| | |
|
||
| | | | Name |---------|->|Foreign |
|
||
| Master |-------------->| Server | | |Resolver|
|
||
| files | | | |<--------|--| |
|
||
| |/ | | queries | +--------+
|
||
+---------+ +----------+ |
|
||
|
||
Here a primary name server acquires information about one or more zones
|
||
by reading master files from its local file system, and answers queries
|
||
about those zones that arrive from foreign resolvers.
|
||
|
||
The DNS requires that all zones be redundantly supported by more than
|
||
one name server. Designated secondary servers can acquire zones and
|
||
check for updates from the primary server using the zone transfer
|
||
protocol of the DNS. This configuration is shown below:
|
||
|
||
Local Host | Foreign
|
||
|
|
||
+---------+ |
|
||
/ /| |
|
||
+---------+ | +----------+ | +--------+
|
||
| | | | |responses| | |
|
||
| | | | Name |---------|->|Foreign |
|
||
| Master |-------------->| Server | | |Resolver|
|
||
| files | | | |<--------|--| |
|
||
| |/ | | queries | +--------+
|
||
+---------+ +----------+ |
|
||
A |maintenance | +--------+
|
||
| +------------|->| |
|
||
| queries | |Foreign |
|
||
| | | Name |
|
||
+------------------|--| Server |
|
||
maintenance responses | +--------+
|
||
|
||
In this configuration, the name server periodically establishes a
|
||
virtual circuit to a foreign name server to acquire a copy of a zone or
|
||
to check that an existing copy has not changed. The messages sent for
|
||
|
||
|
||
|
||
Mockapetris [Page 5]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
these maintenance activities follow the same form as queries and
|
||
responses, but the message sequences are somewhat different.
|
||
|
||
The information flow in a host that supports all aspects of the domain
|
||
name system is shown below:
|
||
|
||
Local Host | Foreign
|
||
|
|
||
+---------+ +----------+ | +--------+
|
||
| | user queries | |queries | | |
|
||
| User |-------------->| |---------|->|Foreign |
|
||
| Program | | Resolver | | | Name |
|
||
| |<--------------| |<--------|--| Server |
|
||
| | user responses| |responses| | |
|
||
+---------+ +----------+ | +--------+
|
||
| A |
|
||
cache additions | | references |
|
||
V | |
|
||
+----------+ |
|
||
| Shared | |
|
||
| database | |
|
||
+----------+ |
|
||
A | |
|
||
+---------+ refreshes | | references |
|
||
/ /| | V |
|
||
+---------+ | +----------+ | +--------+
|
||
| | | | |responses| | |
|
||
| | | | Name |---------|->|Foreign |
|
||
| Master |-------------->| Server | | |Resolver|
|
||
| files | | | |<--------|--| |
|
||
| |/ | | queries | +--------+
|
||
+---------+ +----------+ |
|
||
A |maintenance | +--------+
|
||
| +------------|->| |
|
||
| queries | |Foreign |
|
||
| | | Name |
|
||
+------------------|--| Server |
|
||
maintenance responses | +--------+
|
||
|
||
The shared database holds domain space data for the local name server
|
||
and resolver. The contents of the shared database will typically be a
|
||
mixture of authoritative data maintained by the periodic refresh
|
||
operations of the name server and cached data from previous resolver
|
||
requests. The structure of the domain data and the necessity for
|
||
synchronization between name servers and resolvers imply the general
|
||
characteristics of this database, but the actual format is up to the
|
||
local implementor.
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 6]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
Information flow can also be tailored so that a group of hosts act
|
||
together to optimize activities. Sometimes this is done to offload less
|
||
capable hosts so that they do not have to implement a full resolver.
|
||
This can be appropriate for PCs or hosts which want to minimize the
|
||
amount of new network code which is required. This scheme can also
|
||
allow a group of hosts can share a small number of caches rather than
|
||
maintaining a large number of separate caches, on the premise that the
|
||
centralized caches will have a higher hit ratio. In either case,
|
||
resolvers are replaced with stub resolvers which act as front ends to
|
||
resolvers located in a recursive server in one or more name servers
|
||
known to perform that service:
|
||
|
||
Local Hosts | Foreign
|
||
|
|
||
+---------+ |
|
||
| | responses |
|
||
| Stub |<--------------------+ |
|
||
| Resolver| | |
|
||
| |----------------+ | |
|
||
+---------+ recursive | | |
|
||
queries | | |
|
||
V | |
|
||
+---------+ recursive +----------+ | +--------+
|
||
| | queries | |queries | | |
|
||
| Stub |-------------->| Recursive|---------|->|Foreign |
|
||
| Resolver| | Server | | | Name |
|
||
| |<--------------| |<--------|--| Server |
|
||
+---------+ responses | |responses| | |
|
||
+----------+ | +--------+
|
||
| Central | |
|
||
| cache | |
|
||
+----------+ |
|
||
|
||
In any case, note that domain components are always replicated for
|
||
reliability whenever possible.
|
||
|
||
2.3. Conventions
|
||
|
||
The domain system has several conventions dealing with low-level, but
|
||
fundamental, issues. While the implementor is free to violate these
|
||
conventions WITHIN HIS OWN SYSTEM, he must observe these conventions in
|
||
ALL behavior observed from other hosts.
|
||
|
||
2.3.1. Preferred name syntax
|
||
|
||
The DNS specifications attempt to be as general as possible in the rules
|
||
for constructing domain names. The idea is that the name of any
|
||
existing object can be expressed as a domain name with minimal changes.
|
||
|
||
|
||
|
||
Mockapetris [Page 7]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
However, when assigning a domain name for an object, the prudent user
|
||
will select a name which satisfies both the rules of the domain system
|
||
and any existing rules for the object, whether these rules are published
|
||
or implied by existing programs.
|
||
|
||
For example, when naming a mail domain, the user should satisfy both the
|
||
rules of this memo and those in RFC-822. When creating a new host name,
|
||
the old rules for HOSTS.TXT should be followed. This avoids problems
|
||
when old software is converted to use domain names.
|
||
|
||
The following syntax will result in fewer problems with many
|
||
|
||
applications that use domain names (e.g., mail, TELNET).
|
||
|
||
<domain> ::= <subdomain> | " "
|
||
|
||
<subdomain> ::= <label> | <subdomain> "." <label>
|
||
|
||
<label> ::= <letter> [ [ <ldh-str> ] <let-dig> ]
|
||
|
||
<ldh-str> ::= <let-dig-hyp> | <let-dig-hyp> <ldh-str>
|
||
|
||
<let-dig-hyp> ::= <let-dig> | "-"
|
||
|
||
<let-dig> ::= <letter> | <digit>
|
||
|
||
<letter> ::= any one of the 52 alphabetic characters A through Z in
|
||
upper case and a through z in lower case
|
||
|
||
<digit> ::= any one of the ten digits 0 through 9
|
||
|
||
Note that while upper and lower case letters are allowed in domain
|
||
names, no significance is attached to the case. That is, two names with
|
||
the same spelling but different case are to be treated as if identical.
|
||
|
||
The labels must follow the rules for ARPANET host names. They must
|
||
start with a letter, end with a letter or digit, and have as interior
|
||
characters only letters, digits, and hyphen. There are also some
|
||
restrictions on the length. Labels must be 63 characters or less.
|
||
|
||
For example, the following strings identify hosts in the Internet:
|
||
|
||
A.ISI.EDU XX.LCS.MIT.EDU SRI-NIC.ARPA
|
||
|
||
2.3.2. Data Transmission Order
|
||
|
||
The order of transmission of the header and data described in this
|
||
document is resolved to the octet level. Whenever a diagram shows a
|
||
|
||
|
||
|
||
Mockapetris [Page 8]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
group of octets, the order of transmission of those octets is the normal
|
||
order in which they are read in English. For example, in the following
|
||
diagram, the octets are transmitted in the order they are numbered.
|
||
|
||
0 1
|
||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
|
||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||
| 1 | 2 |
|
||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||
| 3 | 4 |
|
||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||
| 5 | 6 |
|
||
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
||
|
||
Whenever an octet represents a numeric quantity, the left most bit in
|
||
the diagram is the high order or most significant bit. That is, the bit
|
||
labeled 0 is the most significant bit. For example, the following
|
||
diagram represents the value 170 (decimal).
|
||
|
||
0 1 2 3 4 5 6 7
|
||
+-+-+-+-+-+-+-+-+
|
||
|1 0 1 0 1 0 1 0|
|
||
+-+-+-+-+-+-+-+-+
|
||
|
||
Similarly, whenever a multi-octet field represents a numeric quantity
|
||
the left most bit of the whole field is the most significant bit. When
|
||
a multi-octet quantity is transmitted the most significant octet is
|
||
transmitted first.
|
||
|
||
2.3.3. Character Case
|
||
|
||
For all parts of the DNS that are part of the official protocol, all
|
||
comparisons between character strings (e.g., labels, domain names, etc.)
|
||
are done in a case-insensitive manner. At present, this rule is in
|
||
force throughout the domain system without exception. However, future
|
||
additions beyond current usage may need to use the full binary octet
|
||
capabilities in names, so attempts to store domain names in 7-bit ASCII
|
||
or use of special bytes to terminate labels, etc., should be avoided.
|
||
|
||
When data enters the domain system, its original case should be
|
||
preserved whenever possible. In certain circumstances this cannot be
|
||
done. For example, if two RRs are stored in a database, one at x.y and
|
||
one at X.Y, they are actually stored at the same place in the database,
|
||
and hence only one casing would be preserved. The basic rule is that
|
||
case can be discarded only when data is used to define structure in a
|
||
database, and two names are identical when compared in a case
|
||
insensitive manner.
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 9]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
Loss of case sensitive data must be minimized. Thus while data for x.y
|
||
and X.Y may both be stored under a single location x.y or X.Y, data for
|
||
a.x and B.X would never be stored under A.x, A.X, b.x, or b.X. In
|
||
general, this preserves the case of the first label of a domain name,
|
||
but forces standardization of interior node labels.
|
||
|
||
Systems administrators who enter data into the domain database should
|
||
take care to represent the data they supply to the domain system in a
|
||
case-consistent manner if their system is case-sensitive. The data
|
||
distribution system in the domain system will ensure that consistent
|
||
representations are preserved.
|
||
|
||
2.3.4. Size limits
|
||
|
||
Various objects and parameters in the DNS have size limits. They are
|
||
listed below. Some could be easily changed, others are more
|
||
fundamental.
|
||
|
||
labels 63 octets or less
|
||
|
||
names 255 octets or less
|
||
|
||
TTL positive values of a signed 32 bit number.
|
||
|
||
UDP messages 512 octets or less
|
||
|
||
3. DOMAIN NAME SPACE AND RR DEFINITIONS
|
||
|
||
3.1. Name space definitions
|
||
|
||
Domain names in messages are expressed in terms of a sequence of labels.
|
||
Each label is represented as a one octet length field followed by that
|
||
number of octets. Since every domain name ends with the null label of
|
||
the root, a domain name is terminated by a length byte of zero. The
|
||
high order two bits of every length octet must be zero, and the
|
||
remaining six bits of the length field limit the label to 63 octets or
|
||
less.
|
||
|
||
To simplify implementations, the total length of a domain name (i.e.,
|
||
label octets and label length octets) is restricted to 255 octets or
|
||
less.
|
||
|
||
Although labels can contain any 8 bit values in octets that make up a
|
||
label, it is strongly recommended that labels follow the preferred
|
||
syntax described elsewhere in this memo, which is compatible with
|
||
existing host naming conventions. Name servers and resolvers must
|
||
compare labels in a case-insensitive manner (i.e., A=a), assuming ASCII
|
||
with zero parity. Non-alphabetic codes must match exactly.
|
||
|
||
|
||
|
||
Mockapetris [Page 10]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
3.2. RR definitions
|
||
|
||
3.2.1. Format
|
||
|
||
All RRs have the same top level format shown below:
|
||
|
||
1 1 1 1 1 1
|
||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| |
|
||
/ /
|
||
/ NAME /
|
||
| |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| TYPE |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| CLASS |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| TTL |
|
||
| |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| RDLENGTH |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--|
|
||
/ RDATA /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
|
||
where:
|
||
|
||
NAME an owner name, i.e., the name of the node to which this
|
||
resource record pertains.
|
||
|
||
TYPE two octets containing one of the RR TYPE codes.
|
||
|
||
CLASS two octets containing one of the RR CLASS codes.
|
||
|
||
TTL a 32 bit signed integer that specifies the time interval
|
||
that the resource record may be cached before the source
|
||
of the information should again be consulted. Zero
|
||
values are interpreted to mean that the RR can only be
|
||
used for the transaction in progress, and should not be
|
||
cached. For example, SOA records are always distributed
|
||
with a zero TTL to prohibit caching. Zero values can
|
||
also be used for extremely volatile data.
|
||
|
||
RDLENGTH an unsigned 16 bit integer that specifies the length in
|
||
octets of the RDATA field.
|
||
|
||
|
||
|
||
Mockapetris [Page 11]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
RDATA a variable length string of octets that describes the
|
||
resource. The format of this information varies
|
||
according to the TYPE and CLASS of the resource record.
|
||
|
||
3.2.2. TYPE values
|
||
|
||
TYPE fields are used in resource records. Note that these types are a
|
||
subset of QTYPEs.
|
||
|
||
TYPE value and meaning
|
||
|
||
A 1 a host address
|
||
|
||
NS 2 an authoritative name server
|
||
|
||
MD 3 a mail destination (Obsolete - use MX)
|
||
|
||
MF 4 a mail forwarder (Obsolete - use MX)
|
||
|
||
CNAME 5 the canonical name for an alias
|
||
|
||
SOA 6 marks the start of a zone of authority
|
||
|
||
MB 7 a mailbox domain name (EXPERIMENTAL)
|
||
|
||
MG 8 a mail group member (EXPERIMENTAL)
|
||
|
||
MR 9 a mail rename domain name (EXPERIMENTAL)
|
||
|
||
NULL 10 a null RR (EXPERIMENTAL)
|
||
|
||
WKS 11 a well known service description
|
||
|
||
PTR 12 a domain name pointer
|
||
|
||
HINFO 13 host information
|
||
|
||
MINFO 14 mailbox or mail list information
|
||
|
||
MX 15 mail exchange
|
||
|
||
TXT 16 text strings
|
||
|
||
3.2.3. QTYPE values
|
||
|
||
QTYPE fields appear in the question part of a query. QTYPES are a
|
||
superset of TYPEs, hence all TYPEs are valid QTYPEs. In addition, the
|
||
following QTYPEs are defined:
|
||
|
||
|
||
|
||
Mockapetris [Page 12]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
AXFR 252 A request for a transfer of an entire zone
|
||
|
||
MAILB 253 A request for mailbox-related records (MB, MG or MR)
|
||
|
||
MAILA 254 A request for mail agent RRs (Obsolete - see MX)
|
||
|
||
* 255 A request for all records
|
||
|
||
3.2.4. CLASS values
|
||
|
||
CLASS fields appear in resource records. The following CLASS mnemonics
|
||
and values are defined:
|
||
|
||
IN 1 the Internet
|
||
|
||
CS 2 the CSNET class (Obsolete - used only for examples in
|
||
some obsolete RFCs)
|
||
|
||
CH 3 the CHAOS class
|
||
|
||
HS 4 Hesiod [Dyer 87]
|
||
|
||
3.2.5. QCLASS values
|
||
|
||
QCLASS fields appear in the question section of a query. QCLASS values
|
||
are a superset of CLASS values; every CLASS is a valid QCLASS. In
|
||
addition to CLASS values, the following QCLASSes are defined:
|
||
|
||
* 255 any class
|
||
|
||
3.3. Standard RRs
|
||
|
||
The following RR definitions are expected to occur, at least
|
||
potentially, in all classes. In particular, NS, SOA, CNAME, and PTR
|
||
will be used in all classes, and have the same format in all classes.
|
||
Because their RDATA format is known, all domain names in the RDATA
|
||
section of these RRs may be compressed.
|
||
|
||
<domain-name> is a domain name represented as a series of labels, and
|
||
terminated by a label with zero length. <character-string> is a single
|
||
length octet followed by that number of characters. <character-string>
|
||
is treated as binary information, and can be up to 256 characters in
|
||
length (including the length octet).
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 13]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
3.3.1. CNAME RDATA format
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ CNAME /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
CNAME A <domain-name> which specifies the canonical or primary
|
||
name for the owner. The owner name is an alias.
|
||
|
||
CNAME RRs cause no additional section processing, but name servers may
|
||
choose to restart the query at the canonical name in certain cases. See
|
||
the description of name server logic in [RFC-1034] for details.
|
||
|
||
3.3.2. HINFO RDATA format
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ CPU /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ OS /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
CPU A <character-string> which specifies the CPU type.
|
||
|
||
OS A <character-string> which specifies the operating
|
||
system type.
|
||
|
||
Standard values for CPU and OS can be found in [RFC-1010].
|
||
|
||
HINFO records are used to acquire general information about a host. The
|
||
main use is for protocols such as FTP that can use special procedures
|
||
when talking between machines or operating systems of the same type.
|
||
|
||
3.3.3. MB RDATA format (EXPERIMENTAL)
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ MADNAME /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
MADNAME A <domain-name> which specifies a host which has the
|
||
specified mailbox.
|
||
|
||
|
||
|
||
Mockapetris [Page 14]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
MB records cause additional section processing which looks up an A type
|
||
RRs corresponding to MADNAME.
|
||
|
||
3.3.4. MD RDATA format (Obsolete)
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ MADNAME /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
MADNAME A <domain-name> which specifies a host which has a mail
|
||
agent for the domain which should be able to deliver
|
||
mail for the domain.
|
||
|
||
MD records cause additional section processing which looks up an A type
|
||
record corresponding to MADNAME.
|
||
|
||
MD is obsolete. See the definition of MX and [RFC-974] for details of
|
||
the new scheme. The recommended policy for dealing with MD RRs found in
|
||
a master file is to reject them, or to convert them to MX RRs with a
|
||
preference of 0.
|
||
|
||
3.3.5. MF RDATA format (Obsolete)
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ MADNAME /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
MADNAME A <domain-name> which specifies a host which has a mail
|
||
agent for the domain which will accept mail for
|
||
forwarding to the domain.
|
||
|
||
MF records cause additional section processing which looks up an A type
|
||
record corresponding to MADNAME.
|
||
|
||
MF is obsolete. See the definition of MX and [RFC-974] for details ofw
|
||
the new scheme. The recommended policy for dealing with MD RRs found in
|
||
a master file is to reject them, or to convert them to MX RRs with a
|
||
preference of 10.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 15]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
3.3.6. MG RDATA format (EXPERIMENTAL)
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ MGMNAME /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
MGMNAME A <domain-name> which specifies a mailbox which is a
|
||
member of the mail group specified by the domain name.
|
||
|
||
MG records cause no additional section processing.
|
||
|
||
3.3.7. MINFO RDATA format (EXPERIMENTAL)
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ RMAILBX /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ EMAILBX /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
RMAILBX A <domain-name> which specifies a mailbox which is
|
||
responsible for the mailing list or mailbox. If this
|
||
domain name names the root, the owner of the MINFO RR is
|
||
responsible for itself. Note that many existing mailing
|
||
lists use a mailbox X-request for the RMAILBX field of
|
||
mailing list X, e.g., Msgroup-request for Msgroup. This
|
||
field provides a more general mechanism.
|
||
|
||
|
||
EMAILBX A <domain-name> which specifies a mailbox which is to
|
||
receive error messages related to the mailing list or
|
||
mailbox specified by the owner of the MINFO RR (similar
|
||
to the ERRORS-TO: field which has been proposed). If
|
||
this domain name names the root, errors should be
|
||
returned to the sender of the message.
|
||
|
||
MINFO records cause no additional section processing. Although these
|
||
records can be associated with a simple mailbox, they are usually used
|
||
with a mailing list.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 16]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
3.3.8. MR RDATA format (EXPERIMENTAL)
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ NEWNAME /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
NEWNAME A <domain-name> which specifies a mailbox which is the
|
||
proper rename of the specified mailbox.
|
||
|
||
MR records cause no additional section processing. The main use for MR
|
||
is as a forwarding entry for a user who has moved to a different
|
||
mailbox.
|
||
|
||
3.3.9. MX RDATA format
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| PREFERENCE |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ EXCHANGE /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
PREFERENCE A 16 bit integer which specifies the preference given to
|
||
this RR among others at the same owner. Lower values
|
||
are preferred.
|
||
|
||
EXCHANGE A <domain-name> which specifies a host willing to act as
|
||
a mail exchange for the owner name.
|
||
|
||
MX records cause type A additional section processing for the host
|
||
specified by EXCHANGE. The use of MX RRs is explained in detail in
|
||
[RFC-974].
|
||
|
||
3.3.10. NULL RDATA format (EXPERIMENTAL)
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ <anything> /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
Anything at all may be in the RDATA field so long as it is 65535 octets
|
||
or less.
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 17]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
NULL records cause no additional section processing. NULL RRs are not
|
||
allowed in master files. NULLs are used as placeholders in some
|
||
experimental extensions of the DNS.
|
||
|
||
3.3.11. NS RDATA format
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ NSDNAME /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
NSDNAME A <domain-name> which specifies a host which should be
|
||
authoritative for the specified class and domain.
|
||
|
||
NS records cause both the usual additional section processing to locate
|
||
a type A record, and, when used in a referral, a special search of the
|
||
zone in which they reside for glue information.
|
||
|
||
The NS RR states that the named host should be expected to have a zone
|
||
starting at owner name of the specified class. Note that the class may
|
||
not indicate the protocol family which should be used to communicate
|
||
with the host, although it is typically a strong hint. For example,
|
||
hosts which are name servers for either Internet (IN) or Hesiod (HS)
|
||
class information are normally queried using IN class protocols.
|
||
|
||
3.3.12. PTR RDATA format
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ PTRDNAME /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
PTRDNAME A <domain-name> which points to some location in the
|
||
domain name space.
|
||
|
||
PTR records cause no additional section processing. These RRs are used
|
||
in special domains to point to some other location in the domain space.
|
||
These records are simple data, and don't imply any special processing
|
||
similar to that performed by CNAME, which identifies aliases. See the
|
||
description of the IN-ADDR.ARPA domain for an example.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 18]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
3.3.13. SOA RDATA format
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ MNAME /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ RNAME /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| SERIAL |
|
||
| |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| REFRESH |
|
||
| |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| RETRY |
|
||
| |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| EXPIRE |
|
||
| |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| MINIMUM |
|
||
| |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
MNAME The <domain-name> of the name server that was the
|
||
original or primary source of data for this zone.
|
||
|
||
RNAME A <domain-name> which specifies the mailbox of the
|
||
person responsible for this zone.
|
||
|
||
SERIAL The unsigned 32 bit version number of the original copy
|
||
of the zone. Zone transfers preserve this value. This
|
||
value wraps and should be compared using sequence space
|
||
arithmetic.
|
||
|
||
REFRESH A 32 bit time interval before the zone should be
|
||
refreshed.
|
||
|
||
RETRY A 32 bit time interval that should elapse before a
|
||
failed refresh should be retried.
|
||
|
||
EXPIRE A 32 bit time value that specifies the upper limit on
|
||
the time interval that can elapse before the zone is no
|
||
longer authoritative.
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 19]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
MINIMUM The unsigned 32 bit minimum TTL field that should be
|
||
exported with any RR from this zone.
|
||
|
||
SOA records cause no additional section processing.
|
||
|
||
All times are in units of seconds.
|
||
|
||
Most of these fields are pertinent only for name server maintenance
|
||
operations. However, MINIMUM is used in all query operations that
|
||
retrieve RRs from a zone. Whenever a RR is sent in a response to a
|
||
query, the TTL field is set to the maximum of the TTL field from the RR
|
||
and the MINIMUM field in the appropriate SOA. Thus MINIMUM is a lower
|
||
bound on the TTL field for all RRs in a zone. Note that this use of
|
||
MINIMUM should occur when the RRs are copied into the response and not
|
||
when the zone is loaded from a master file or via a zone transfer. The
|
||
reason for this provison is to allow future dynamic update facilities to
|
||
change the SOA RR with known semantics.
|
||
|
||
|
||
3.3.14. TXT RDATA format
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
/ TXT-DATA /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
TXT-DATA One or more <character-string>s.
|
||
|
||
TXT RRs are used to hold descriptive text. The semantics of the text
|
||
depends on the domain where it is found.
|
||
|
||
3.4. Internet specific RRs
|
||
|
||
3.4.1. A RDATA format
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| ADDRESS |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
ADDRESS A 32 bit Internet address.
|
||
|
||
Hosts that have multiple Internet addresses will have multiple A
|
||
records.
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 20]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
A records cause no additional section processing. The RDATA section of
|
||
an A line in a master file is an Internet address expressed as four
|
||
decimal numbers separated by dots without any imbedded spaces (e.g.,
|
||
"10.2.0.52" or "192.0.5.6").
|
||
|
||
3.4.2. WKS RDATA format
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| ADDRESS |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| PROTOCOL | |
|
||
+--+--+--+--+--+--+--+--+ |
|
||
| |
|
||
/ <BIT MAP> /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
ADDRESS An 32 bit Internet address
|
||
|
||
PROTOCOL An 8 bit IP protocol number
|
||
|
||
<BIT MAP> A variable length bit map. The bit map must be a
|
||
multiple of 8 bits long.
|
||
|
||
The WKS record is used to describe the well known services supported by
|
||
a particular protocol on a particular internet address. The PROTOCOL
|
||
field specifies an IP protocol number, and the bit map has one bit per
|
||
port of the specified protocol. The first bit corresponds to port 0,
|
||
the second to port 1, etc. If the bit map does not include a bit for a
|
||
protocol of interest, that bit is assumed zero. The appropriate values
|
||
and mnemonics for ports and protocols are specified in [RFC-1010].
|
||
|
||
For example, if PROTOCOL=TCP (6), the 26th bit corresponds to TCP port
|
||
25 (SMTP). If this bit is set, a SMTP server should be listening on TCP
|
||
port 25; if zero, SMTP service is not supported on the specified
|
||
address.
|
||
|
||
The purpose of WKS RRs is to provide availability information for
|
||
servers for TCP and UDP. If a server supports both TCP and UDP, or has
|
||
multiple Internet addresses, then multiple WKS RRs are used.
|
||
|
||
WKS RRs cause no additional section processing.
|
||
|
||
In master files, both ports and protocols are expressed using mnemonics
|
||
or decimal numbers.
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 21]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
3.5. IN-ADDR.ARPA domain
|
||
|
||
The Internet uses a special domain to support gateway location and
|
||
Internet address to host mapping. Other classes may employ a similar
|
||
strategy in other domains. The intent of this domain is to provide a
|
||
guaranteed method to perform host address to host name mapping, and to
|
||
facilitate queries to locate all gateways on a particular network in the
|
||
Internet.
|
||
|
||
Note that both of these services are similar to functions that could be
|
||
performed by inverse queries; the difference is that this part of the
|
||
domain name space is structured according to address, and hence can
|
||
guarantee that the appropriate data can be located without an exhaustive
|
||
search of the domain space.
|
||
|
||
The domain begins at IN-ADDR.ARPA and has a substructure which follows
|
||
the Internet addressing structure.
|
||
|
||
Domain names in the IN-ADDR.ARPA domain are defined to have up to four
|
||
labels in addition to the IN-ADDR.ARPA suffix. Each label represents
|
||
one octet of an Internet address, and is expressed as a character string
|
||
for a decimal value in the range 0-255 (with leading zeros omitted
|
||
except in the case of a zero octet which is represented by a single
|
||
zero).
|
||
|
||
Host addresses are represented by domain names that have all four labels
|
||
specified. Thus data for Internet address 10.2.0.52 is located at
|
||
domain name 52.0.2.10.IN-ADDR.ARPA. The reversal, though awkward to
|
||
read, allows zones to be delegated which are exactly one network of
|
||
address space. For example, 10.IN-ADDR.ARPA can be a zone containing
|
||
data for the ARPANET, while 26.IN-ADDR.ARPA can be a separate zone for
|
||
MILNET. Address nodes are used to hold pointers to primary host names
|
||
in the normal domain space.
|
||
|
||
Network numbers correspond to some non-terminal nodes at various depths
|
||
in the IN-ADDR.ARPA domain, since Internet network numbers are either 1,
|
||
2, or 3 octets. Network nodes are used to hold pointers to the primary
|
||
host names of gateways attached to that network. Since a gateway is, by
|
||
definition, on more than one network, it will typically have two or more
|
||
network nodes which point at it. Gateways will also have host level
|
||
pointers at their fully qualified addresses.
|
||
|
||
Both the gateway pointers at network nodes and the normal host pointers
|
||
at full address nodes use the PTR RR to point back to the primary domain
|
||
names of the corresponding hosts.
|
||
|
||
For example, the IN-ADDR.ARPA domain will contain information about the
|
||
ISI gateway between net 10 and 26, an MIT gateway from net 10 to MIT's
|
||
|
||
|
||
|
||
Mockapetris [Page 22]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
net 18, and hosts A.ISI.EDU and MULTICS.MIT.EDU. Assuming that ISI
|
||
gateway has addresses 10.2.0.22 and 26.0.0.103, and a name MILNET-
|
||
GW.ISI.EDU, and the MIT gateway has addresses 10.0.0.77 and 18.10.0.4
|
||
and a name GW.LCS.MIT.EDU, the domain database would contain:
|
||
|
||
10.IN-ADDR.ARPA. PTR MILNET-GW.ISI.EDU.
|
||
10.IN-ADDR.ARPA. PTR GW.LCS.MIT.EDU.
|
||
18.IN-ADDR.ARPA. PTR GW.LCS.MIT.EDU.
|
||
26.IN-ADDR.ARPA. PTR MILNET-GW.ISI.EDU.
|
||
22.0.2.10.IN-ADDR.ARPA. PTR MILNET-GW.ISI.EDU.
|
||
103.0.0.26.IN-ADDR.ARPA. PTR MILNET-GW.ISI.EDU.
|
||
77.0.0.10.IN-ADDR.ARPA. PTR GW.LCS.MIT.EDU.
|
||
4.0.10.18.IN-ADDR.ARPA. PTR GW.LCS.MIT.EDU.
|
||
103.0.3.26.IN-ADDR.ARPA. PTR A.ISI.EDU.
|
||
6.0.0.10.IN-ADDR.ARPA. PTR MULTICS.MIT.EDU.
|
||
|
||
Thus a program which wanted to locate gateways on net 10 would originate
|
||
a query of the form QTYPE=PTR, QCLASS=IN, QNAME=10.IN-ADDR.ARPA. It
|
||
would receive two RRs in response:
|
||
|
||
10.IN-ADDR.ARPA. PTR MILNET-GW.ISI.EDU.
|
||
10.IN-ADDR.ARPA. PTR GW.LCS.MIT.EDU.
|
||
|
||
The program could then originate QTYPE=A, QCLASS=IN queries for MILNET-
|
||
GW.ISI.EDU. and GW.LCS.MIT.EDU. to discover the Internet addresses of
|
||
these gateways.
|
||
|
||
A resolver which wanted to find the host name corresponding to Internet
|
||
host address 10.0.0.6 would pursue a query of the form QTYPE=PTR,
|
||
QCLASS=IN, QNAME=6.0.0.10.IN-ADDR.ARPA, and would receive:
|
||
|
||
6.0.0.10.IN-ADDR.ARPA. PTR MULTICS.MIT.EDU.
|
||
|
||
Several cautions apply to the use of these services:
|
||
- Since the IN-ADDR.ARPA special domain and the normal domain
|
||
for a particular host or gateway will be in different zones,
|
||
the possibility exists that that the data may be inconsistent.
|
||
|
||
- Gateways will often have two names in separate domains, only
|
||
one of which can be primary.
|
||
|
||
- Systems that use the domain database to initialize their
|
||
routing tables must start with enough gateway information to
|
||
guarantee that they can access the appropriate name server.
|
||
|
||
- The gateway data only reflects the existence of a gateway in a
|
||
manner equivalent to the current HOSTS.TXT file. It doesn't
|
||
replace the dynamic availability information from GGP or EGP.
|
||
|
||
|
||
|
||
Mockapetris [Page 23]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
3.6. Defining new types, classes, and special namespaces
|
||
|
||
The previously defined types and classes are the ones in use as of the
|
||
date of this memo. New definitions should be expected. This section
|
||
makes some recommendations to designers considering additions to the
|
||
existing facilities. The mailing list NAMEDROPPERS@SRI-NIC.ARPA is the
|
||
forum where general discussion of design issues takes place.
|
||
|
||
In general, a new type is appropriate when new information is to be
|
||
added to the database about an existing object, or we need new data
|
||
formats for some totally new object. Designers should attempt to define
|
||
types and their RDATA formats that are generally applicable to all
|
||
classes, and which avoid duplication of information. New classes are
|
||
appropriate when the DNS is to be used for a new protocol, etc which
|
||
requires new class-specific data formats, or when a copy of the existing
|
||
name space is desired, but a separate management domain is necessary.
|
||
|
||
New types and classes need mnemonics for master files; the format of the
|
||
master files requires that the mnemonics for type and class be disjoint.
|
||
|
||
TYPE and CLASS values must be a proper subset of QTYPEs and QCLASSes
|
||
respectively.
|
||
|
||
The present system uses multiple RRs to represent multiple values of a
|
||
type rather than storing multiple values in the RDATA section of a
|
||
single RR. This is less efficient for most applications, but does keep
|
||
RRs shorter. The multiple RRs assumption is incorporated in some
|
||
experimental work on dynamic update methods.
|
||
|
||
The present system attempts to minimize the duplication of data in the
|
||
database in order to insure consistency. Thus, in order to find the
|
||
address of the host for a mail exchange, you map the mail domain name to
|
||
a host name, then the host name to addresses, rather than a direct
|
||
mapping to host address. This approach is preferred because it avoids
|
||
the opportunity for inconsistency.
|
||
|
||
In defining a new type of data, multiple RR types should not be used to
|
||
create an ordering between entries or express different formats for
|
||
equivalent bindings, instead this information should be carried in the
|
||
body of the RR and a single type used. This policy avoids problems with
|
||
caching multiple types and defining QTYPEs to match multiple types.
|
||
|
||
For example, the original form of mail exchange binding used two RR
|
||
types one to represent a "closer" exchange (MD) and one to represent a
|
||
"less close" exchange (MF). The difficulty is that the presence of one
|
||
RR type in a cache doesn't convey any information about the other
|
||
because the query which acquired the cached information might have used
|
||
a QTYPE of MF, MD, or MAILA (which matched both). The redesigned
|
||
|
||
|
||
|
||
Mockapetris [Page 24]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
service used a single type (MX) with a "preference" value in the RDATA
|
||
section which can order different RRs. However, if any MX RRs are found
|
||
in the cache, then all should be there.
|
||
|
||
4. MESSAGES
|
||
|
||
4.1. Format
|
||
|
||
All communications inside of the domain protocol are carried in a single
|
||
format called a message. The top level format of message is divided
|
||
into 5 sections (some of which are empty in certain cases) shown below:
|
||
|
||
+---------------------+
|
||
| Header |
|
||
+---------------------+
|
||
| Question | the question for the name server
|
||
+---------------------+
|
||
| Answer | RRs answering the question
|
||
+---------------------+
|
||
| Authority | RRs pointing toward an authority
|
||
+---------------------+
|
||
| Additional | RRs holding additional information
|
||
+---------------------+
|
||
|
||
The header section is always present. The header includes fields that
|
||
specify which of the remaining sections are present, and also specify
|
||
whether the message is a query or a response, a standard query or some
|
||
other opcode, etc.
|
||
|
||
The names of the sections after the header are derived from their use in
|
||
standard queries. The question section contains fields that describe a
|
||
question to a name server. These fields are a query type (QTYPE), a
|
||
query class (QCLASS), and a query domain name (QNAME). The last three
|
||
sections have the same format: a possibly empty list of concatenated
|
||
resource records (RRs). The answer section contains RRs that answer the
|
||
question; the authority section contains RRs that point toward an
|
||
authoritative name server; the additional records section contains RRs
|
||
which relate to the query, but are not strictly answers for the
|
||
question.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 25]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
4.1.1. Header section format
|
||
|
||
The header contains the following fields:
|
||
|
||
1 1 1 1 1 1
|
||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| ID |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|QR| Opcode |AA|TC|RD|RA| Z | RCODE |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| QDCOUNT |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| ANCOUNT |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| NSCOUNT |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| ARCOUNT |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
ID A 16 bit identifier assigned by the program that
|
||
generates any kind of query. This identifier is copied
|
||
the corresponding reply and can be used by the requester
|
||
to match up replies to outstanding queries.
|
||
|
||
QR A one bit field that specifies whether this message is a
|
||
query (0), or a response (1).
|
||
|
||
OPCODE A four bit field that specifies kind of query in this
|
||
message. This value is set by the originator of a query
|
||
and copied into the response. The values are:
|
||
|
||
0 a standard query (QUERY)
|
||
|
||
1 an inverse query (IQUERY)
|
||
|
||
2 a server status request (STATUS)
|
||
|
||
3-15 reserved for future use
|
||
|
||
AA Authoritative Answer - this bit is valid in responses,
|
||
and specifies that the responding name server is an
|
||
authority for the domain name in question section.
|
||
|
||
Note that the contents of the answer section may have
|
||
multiple owner names because of aliases. The AA bit
|
||
|
||
|
||
|
||
Mockapetris [Page 26]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
corresponds to the name which matches the query name, or
|
||
the first owner name in the answer section.
|
||
|
||
TC TrunCation - specifies that this message was truncated
|
||
due to length greater than that permitted on the
|
||
transmission channel.
|
||
|
||
RD Recursion Desired - this bit may be set in a query and
|
||
is copied into the response. If RD is set, it directs
|
||
the name server to pursue the query recursively.
|
||
Recursive query support is optional.
|
||
|
||
RA Recursion Available - this be is set or cleared in a
|
||
response, and denotes whether recursive query support is
|
||
available in the name server.
|
||
|
||
Z Reserved for future use. Must be zero in all queries
|
||
and responses.
|
||
|
||
RCODE Response code - this 4 bit field is set as part of
|
||
responses. The values have the following
|
||
interpretation:
|
||
|
||
0 No error condition
|
||
|
||
1 Format error - The name server was
|
||
unable to interpret the query.
|
||
|
||
2 Server failure - The name server was
|
||
unable to process this query due to a
|
||
problem with the name server.
|
||
|
||
3 Name Error - Meaningful only for
|
||
responses from an authoritative name
|
||
server, this code signifies that the
|
||
domain name referenced in the query does
|
||
not exist.
|
||
|
||
4 Not Implemented - The name server does
|
||
not support the requested kind of query.
|
||
|
||
5 Refused - The name server refuses to
|
||
perform the specified operation for
|
||
policy reasons. For example, a name
|
||
server may not wish to provide the
|
||
information to the particular requester,
|
||
or a name server may not wish to perform
|
||
a particular operation (e.g., zone
|
||
|
||
|
||
|
||
Mockapetris [Page 27]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
transfer) for particular data.
|
||
|
||
6-15 Reserved for future use.
|
||
|
||
QDCOUNT an unsigned 16 bit integer specifying the number of
|
||
entries in the question section.
|
||
|
||
ANCOUNT an unsigned 16 bit integer specifying the number of
|
||
resource records in the answer section.
|
||
|
||
NSCOUNT an unsigned 16 bit integer specifying the number of name
|
||
server resource records in the authority records
|
||
section.
|
||
|
||
ARCOUNT an unsigned 16 bit integer specifying the number of
|
||
resource records in the additional records section.
|
||
|
||
4.1.2. Question section format
|
||
|
||
The question section is used to carry the "question" in most queries,
|
||
i.e., the parameters that define what is being asked. The section
|
||
contains QDCOUNT (usually 1) entries, each of the following format:
|
||
|
||
1 1 1 1 1 1
|
||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| |
|
||
/ QNAME /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| QTYPE |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| QCLASS |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
QNAME a domain name represented as a sequence of labels, where
|
||
each label consists of a length octet followed by that
|
||
number of octets. The domain name terminates with the
|
||
zero length octet for the null label of the root. Note
|
||
that this field may be an odd number of octets; no
|
||
padding is used.
|
||
|
||
QTYPE a two octet code which specifies the type of the query.
|
||
The values for this field include all codes valid for a
|
||
TYPE field, together with some more general codes which
|
||
can match more than one type of RR.
|
||
|
||
|
||
|
||
Mockapetris [Page 28]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
QCLASS a two octet code that specifies the class of the query.
|
||
For example, the QCLASS field is IN for the Internet.
|
||
|
||
4.1.3. Resource record format
|
||
|
||
The answer, authority, and additional sections all share the same
|
||
format: a variable number of resource records, where the number of
|
||
records is specified in the corresponding count field in the header.
|
||
Each resource record has the following format:
|
||
1 1 1 1 1 1
|
||
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| |
|
||
/ /
|
||
/ NAME /
|
||
| |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| TYPE |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| CLASS |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| TTL |
|
||
| |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| RDLENGTH |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--|
|
||
/ RDATA /
|
||
/ /
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
where:
|
||
|
||
NAME a domain name to which this resource record pertains.
|
||
|
||
TYPE two octets containing one of the RR type codes. This
|
||
field specifies the meaning of the data in the RDATA
|
||
field.
|
||
|
||
CLASS two octets which specify the class of the data in the
|
||
RDATA field.
|
||
|
||
TTL a 32 bit unsigned integer that specifies the time
|
||
interval (in seconds) that the resource record may be
|
||
cached before it should be discarded. Zero values are
|
||
interpreted to mean that the RR can only be used for the
|
||
transaction in progress, and should not be cached.
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 29]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
RDLENGTH an unsigned 16 bit integer that specifies the length in
|
||
octets of the RDATA field.
|
||
|
||
RDATA a variable length string of octets that describes the
|
||
resource. The format of this information varies
|
||
according to the TYPE and CLASS of the resource record.
|
||
For example, the if the TYPE is A and the CLASS is IN,
|
||
the RDATA field is a 4 octet ARPA Internet address.
|
||
|
||
4.1.4. Message compression
|
||
|
||
In order to reduce the size of messages, the domain system utilizes a
|
||
compression scheme which eliminates the repetition of domain names in a
|
||
message. In this scheme, an entire domain name or a list of labels at
|
||
the end of a domain name is replaced with a pointer to a prior occurance
|
||
of the same name.
|
||
|
||
The pointer takes the form of a two octet sequence:
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
| 1 1| OFFSET |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
The first two bits are ones. This allows a pointer to be distinguished
|
||
from a label, since the label must begin with two zero bits because
|
||
labels are restricted to 63 octets or less. (The 10 and 01 combinations
|
||
are reserved for future use.) The OFFSET field specifies an offset from
|
||
the start of the message (i.e., the first octet of the ID field in the
|
||
domain header). A zero offset specifies the first byte of the ID field,
|
||
etc.
|
||
|
||
The compression scheme allows a domain name in a message to be
|
||
represented as either:
|
||
|
||
- a sequence of labels ending in a zero octet
|
||
|
||
- a pointer
|
||
|
||
- a sequence of labels ending with a pointer
|
||
|
||
Pointers can only be used for occurances of a domain name where the
|
||
format is not class specific. If this were not the case, a name server
|
||
or resolver would be required to know the format of all RRs it handled.
|
||
As yet, there are no such cases, but they may occur in future RDATA
|
||
formats.
|
||
|
||
If a domain name is contained in a part of the message subject to a
|
||
length field (such as the RDATA section of an RR), and compression is
|
||
|
||
|
||
|
||
Mockapetris [Page 30]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
used, the length of the compressed name is used in the length
|
||
calculation, rather than the length of the expanded name.
|
||
|
||
Programs are free to avoid using pointers in messages they generate,
|
||
although this will reduce datagram capacity, and may cause truncation.
|
||
However all programs are required to understand arriving messages that
|
||
contain pointers.
|
||
|
||
For example, a datagram might need to use the domain names F.ISI.ARPA,
|
||
FOO.F.ISI.ARPA, ARPA, and the root. Ignoring the other fields of the
|
||
message, these domain names might be represented as:
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
20 | 1 | F |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
22 | 3 | I |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
24 | S | I |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
26 | 4 | A |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
28 | R | P |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
30 | A | 0 |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
40 | 3 | F |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
42 | O | O |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
44 | 1 1| 20 |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
64 | 1 1| 26 |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
92 | 0 | |
|
||
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
|
||
|
||
The domain name for F.ISI.ARPA is shown at offset 20. The domain name
|
||
FOO.F.ISI.ARPA is shown at offset 40; this definition uses a pointer to
|
||
concatenate a label for FOO to the previously defined F.ISI.ARPA. The
|
||
domain name ARPA is defined at offset 64 using a pointer to the ARPA
|
||
component of the name F.ISI.ARPA at 20; note that this pointer relies on
|
||
ARPA being the last label in the string at 20. The root domain name is
|
||
|
||
|
||
|
||
Mockapetris [Page 31]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
defined by a single octet of zeros at 92; the root domain name has no
|
||
labels.
|
||
|
||
4.2. Transport
|
||
|
||
The DNS assumes that messages will be transmitted as datagrams or in a
|
||
byte stream carried by a virtual circuit. While virtual circuits can be
|
||
used for any DNS activity, datagrams are preferred for queries due to
|
||
their lower overhead and better performance. Zone refresh activities
|
||
must use virtual circuits because of the need for reliable transfer.
|
||
|
||
The Internet supports name server access using TCP [RFC-793] on server
|
||
port 53 (decimal) as well as datagram access using UDP [RFC-768] on UDP
|
||
port 53 (decimal).
|
||
|
||
4.2.1. UDP usage
|
||
|
||
Messages sent using UDP user server port 53 (decimal).
|
||
|
||
Messages carried by UDP are restricted to 512 bytes (not counting the IP
|
||
or UDP headers). Longer messages are truncated and the TC bit is set in
|
||
the header.
|
||
|
||
UDP is not acceptable for zone transfers, but is the recommended method
|
||
for standard queries in the Internet. Queries sent using UDP may be
|
||
lost, and hence a retransmission strategy is required. Queries or their
|
||
responses may be reordered by the network, or by processing in name
|
||
servers, so resolvers should not depend on them being returned in order.
|
||
|
||
The optimal UDP retransmission policy will vary with performance of the
|
||
Internet and the needs of the client, but the following are recommended:
|
||
|
||
- The client should try other servers and server addresses
|
||
before repeating a query to a specific address of a server.
|
||
|
||
- The retransmission interval should be based on prior
|
||
statistics if possible. Too aggressive retransmission can
|
||
easily slow responses for the community at large. Depending
|
||
on how well connected the client is to its expected servers,
|
||
the minimum retransmission interval should be 2-5 seconds.
|
||
|
||
More suggestions on server selection and retransmission policy can be
|
||
found in the resolver section of this memo.
|
||
|
||
4.2.2. TCP usage
|
||
|
||
Messages sent over TCP connections use server port 53 (decimal). The
|
||
message is prefixed with a two byte length field which gives the message
|
||
|
||
|
||
|
||
Mockapetris [Page 32]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
length, excluding the two byte length field. This length field allows
|
||
the low-level processing to assemble a complete message before beginning
|
||
to parse it.
|
||
|
||
Several connection management policies are recommended:
|
||
|
||
- The server should not block other activities waiting for TCP
|
||
data.
|
||
|
||
- The server should support multiple connections.
|
||
|
||
- The server should assume that the client will initiate
|
||
connection closing, and should delay closing its end of the
|
||
connection until all outstanding client requests have been
|
||
satisfied.
|
||
|
||
- If the server needs to close a dormant connection to reclaim
|
||
resources, it should wait until the connection has been idle
|
||
for a period on the order of two minutes. In particular, the
|
||
server should allow the SOA and AXFR request sequence (which
|
||
begins a refresh operation) to be made on a single connection.
|
||
Since the server would be unable to answer queries anyway, a
|
||
unilateral close or reset may be used instead of a graceful
|
||
close.
|
||
|
||
5. MASTER FILES
|
||
|
||
Master files are text files that contain RRs in text form. Since the
|
||
contents of a zone can be expressed in the form of a list of RRs a
|
||
master file is most often used to define a zone, though it can be used
|
||
to list a cache's contents. Hence, this section first discusses the
|
||
format of RRs in a master file, and then the special considerations when
|
||
a master file is used to create a zone in some name server.
|
||
|
||
5.1. Format
|
||
|
||
The format of these files is a sequence of entries. Entries are
|
||
predominantly line-oriented, though parentheses can be used to continue
|
||
a list of items across a line boundary, and text literals can contain
|
||
CRLF within the text. Any combination of tabs and spaces act as a
|
||
delimiter between the separate items that make up an entry. The end of
|
||
any line in the master file can end with a comment. The comment starts
|
||
with a ";" (semicolon).
|
||
|
||
The following entries are defined:
|
||
|
||
<blank>[<comment>]
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 33]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
$ORIGIN <domain-name> [<comment>]
|
||
|
||
$INCLUDE <file-name> [<domain-name>] [<comment>]
|
||
|
||
<domain-name><rr> [<comment>]
|
||
|
||
<blank><rr> [<comment>]
|
||
|
||
Blank lines, with or without comments, are allowed anywhere in the file.
|
||
|
||
Two control entries are defined: $ORIGIN and $INCLUDE. $ORIGIN is
|
||
followed by a domain name, and resets the current origin for relative
|
||
domain names to the stated name. $INCLUDE inserts the named file into
|
||
the current file, and may optionally specify a domain name that sets the
|
||
relative domain name origin for the included file. $INCLUDE may also
|
||
have a comment. Note that a $INCLUDE entry never changes the relative
|
||
origin of the parent file, regardless of changes to the relative origin
|
||
made within the included file.
|
||
|
||
The last two forms represent RRs. If an entry for an RR begins with a
|
||
blank, then the RR is assumed to be owned by the last stated owner. If
|
||
an RR entry begins with a <domain-name>, then the owner name is reset.
|
||
|
||
<rr> contents take one of the following forms:
|
||
|
||
[<TTL>] [<class>] <type> <RDATA>
|
||
|
||
[<class>] [<TTL>] <type> <RDATA>
|
||
|
||
The RR begins with optional TTL and class fields, followed by a type and
|
||
RDATA field appropriate to the type and class. Class and type use the
|
||
standard mnemonics, TTL is a decimal integer. Omitted class and TTL
|
||
values are default to the last explicitly stated values. Since type and
|
||
class mnemonics are disjoint, the parse is unique. (Note that this
|
||
order is different from the order used in examples and the order used in
|
||
the actual RRs; the given order allows easier parsing and defaulting.)
|
||
|
||
<domain-name>s make up a large share of the data in the master file.
|
||
The labels in the domain name are expressed as character strings and
|
||
separated by dots. Quoting conventions allow arbitrary characters to be
|
||
stored in domain names. Domain names that end in a dot are called
|
||
absolute, and are taken as complete. Domain names which do not end in a
|
||
dot are called relative; the actual domain name is the concatenation of
|
||
the relative part with an origin specified in a $ORIGIN, $INCLUDE, or as
|
||
an argument to the master file loading routine. A relative name is an
|
||
error when no origin is available.
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 34]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
<character-string> is expressed in one or two ways: as a contiguous set
|
||
of characters without interior spaces, or as a string beginning with a "
|
||
and ending with a ". Inside a " delimited string any character can
|
||
occur, except for a " itself, which must be quoted using \ (back slash).
|
||
|
||
Because these files are text files several special encodings are
|
||
necessary to allow arbitrary data to be loaded. In particular:
|
||
|
||
of the root.
|
||
|
||
@ A free standing @ is used to denote the current origin.
|
||
|
||
\X where X is any character other than a digit (0-9), is
|
||
used to quote that character so that its special meaning
|
||
does not apply. For example, "\." can be used to place
|
||
a dot character in a label.
|
||
|
||
\DDD where each D is a digit is the octet corresponding to
|
||
the decimal number described by DDD. The resulting
|
||
octet is assumed to be text and is not checked for
|
||
special meaning.
|
||
|
||
( ) Parentheses are used to group data that crosses a line
|
||
boundary. In effect, line terminations are not
|
||
recognized within parentheses.
|
||
|
||
; Semicolon is used to start a comment; the remainder of
|
||
the line is ignored.
|
||
|
||
5.2. Use of master files to define zones
|
||
|
||
When a master file is used to load a zone, the operation should be
|
||
suppressed if any errors are encountered in the master file. The
|
||
rationale for this is that a single error can have widespread
|
||
consequences. For example, suppose that the RRs defining a delegation
|
||
have syntax errors; then the server will return authoritative name
|
||
errors for all names in the subzone (except in the case where the
|
||
subzone is also present on the server).
|
||
|
||
Several other validity checks that should be performed in addition to
|
||
insuring that the file is syntactically correct:
|
||
|
||
1. All RRs in the file should have the same class.
|
||
|
||
2. Exactly one SOA RR should be present at the top of the zone.
|
||
|
||
3. If delegations are present and glue information is required,
|
||
it should be present.
|
||
|
||
|
||
|
||
Mockapetris [Page 35]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
4. Information present outside of the authoritative nodes in the
|
||
zone should be glue information, rather than the result of an
|
||
origin or similar error.
|
||
|
||
5.3. Master file example
|
||
|
||
The following is an example file which might be used to define the
|
||
ISI.EDU zone.and is loaded with an origin of ISI.EDU:
|
||
|
||
@ IN SOA VENERA Action\.domains (
|
||
20 ; SERIAL
|
||
7200 ; REFRESH
|
||
600 ; RETRY
|
||
3600000; EXPIRE
|
||
60) ; MINIMUM
|
||
|
||
NS A.ISI.EDU.
|
||
NS VENERA
|
||
NS VAXA
|
||
MX 10 VENERA
|
||
MX 20 VAXA
|
||
|
||
A A 26.3.0.103
|
||
|
||
VENERA A 10.1.0.52
|
||
A 128.9.0.32
|
||
|
||
VAXA A 10.2.0.27
|
||
A 128.9.0.33
|
||
|
||
|
||
$INCLUDE <SUBSYS>ISI-MAILBOXES.TXT
|
||
|
||
Where the file <SUBSYS>ISI-MAILBOXES.TXT is:
|
||
|
||
MOE MB A.ISI.EDU.
|
||
LARRY MB A.ISI.EDU.
|
||
CURLEY MB A.ISI.EDU.
|
||
STOOGES MG MOE
|
||
MG LARRY
|
||
MG CURLEY
|
||
|
||
Note the use of the \ character in the SOA RR to specify the responsible
|
||
person mailbox "Action.domains@E.ISI.EDU".
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 36]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
6. NAME SERVER IMPLEMENTATION
|
||
|
||
6.1. Architecture
|
||
|
||
The optimal structure for the name server will depend on the host
|
||
operating system and whether the name server is integrated with resolver
|
||
operations, either by supporting recursive service, or by sharing its
|
||
database with a resolver. This section discusses implementation
|
||
considerations for a name server which shares a database with a
|
||
resolver, but most of these concerns are present in any name server.
|
||
|
||
6.1.1. Control
|
||
|
||
A name server must employ multiple concurrent activities, whether they
|
||
are implemented as separate tasks in the host's OS or multiplexing
|
||
inside a single name server program. It is simply not acceptable for a
|
||
name server to block the service of UDP requests while it waits for TCP
|
||
data for refreshing or query activities. Similarly, a name server
|
||
should not attempt to provide recursive service without processing such
|
||
requests in parallel, though it may choose to serialize requests from a
|
||
single client, or to regard identical requests from the same client as
|
||
duplicates. A name server should not substantially delay requests while
|
||
it reloads a zone from master files or while it incorporates a newly
|
||
refreshed zone into its database.
|
||
|
||
6.1.2. Database
|
||
|
||
While name server implementations are free to use any internal data
|
||
structures they choose, the suggested structure consists of three major
|
||
parts:
|
||
|
||
- A "catalog" data structure which lists the zones available to
|
||
this server, and a "pointer" to the zone data structure. The
|
||
main purpose of this structure is to find the nearest ancestor
|
||
zone, if any, for arriving standard queries.
|
||
|
||
- Separate data structures for each of the zones held by the
|
||
name server.
|
||
|
||
- A data structure for cached data. (or perhaps separate caches
|
||
for different classes)
|
||
|
||
All of these data structures can be implemented an identical tree
|
||
structure format, with different data chained off the nodes in different
|
||
parts: in the catalog the data is pointers to zones, while in the zone
|
||
and cache data structures, the data will be RRs. In designing the tree
|
||
framework the designer should recognize that query processing will need
|
||
to traverse the tree using case-insensitive label comparisons; and that
|
||
|
||
|
||
|
||
Mockapetris [Page 37]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
in real data, a few nodes have a very high branching factor (100-1000 or
|
||
more), but the vast majority have a very low branching factor (0-1).
|
||
|
||
One way to solve the case problem is to store the labels for each node
|
||
in two pieces: a standardized-case representation of the label where all
|
||
ASCII characters are in a single case, together with a bit mask that
|
||
denotes which characters are actually of a different case. The
|
||
branching factor diversity can be handled using a simple linked list for
|
||
a node until the branching factor exceeds some threshold, and
|
||
transitioning to a hash structure after the threshold is exceeded. In
|
||
any case, hash structures used to store tree sections must insure that
|
||
hash functions and procedures preserve the casing conventions of the
|
||
DNS.
|
||
|
||
The use of separate structures for the different parts of the database
|
||
is motivated by several factors:
|
||
|
||
- The catalog structure can be an almost static structure that
|
||
need change only when the system administrator changes the
|
||
zones supported by the server. This structure can also be
|
||
used to store parameters used to control refreshing
|
||
activities.
|
||
|
||
- The individual data structures for zones allow a zone to be
|
||
replaced simply by changing a pointer in the catalog. Zone
|
||
refresh operations can build a new structure and, when
|
||
complete, splice it into the database via a simple pointer
|
||
replacement. It is very important that when a zone is
|
||
refreshed, queries should not use old and new data
|
||
simultaneously.
|
||
|
||
- With the proper search procedures, authoritative data in zones
|
||
will always "hide", and hence take precedence over, cached
|
||
data.
|
||
|
||
- Errors in zone definitions that cause overlapping zones, etc.,
|
||
may cause erroneous responses to queries, but problem
|
||
determination is simplified, and the contents of one "bad"
|
||
zone can't corrupt another.
|
||
|
||
- Since the cache is most frequently updated, it is most
|
||
vulnerable to corruption during system restarts. It can also
|
||
become full of expired RR data. In either case, it can easily
|
||
be discarded without disturbing zone data.
|
||
|
||
A major aspect of database design is selecting a structure which allows
|
||
the name server to deal with crashes of the name server's host. State
|
||
information which a name server should save across system crashes
|
||
|
||
|
||
|
||
Mockapetris [Page 38]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
includes the catalog structure (including the state of refreshing for
|
||
each zone) and the zone data itself.
|
||
|
||
6.1.3. Time
|
||
|
||
Both the TTL data for RRs and the timing data for refreshing activities
|
||
depends on 32 bit timers in units of seconds. Inside the database,
|
||
refresh timers and TTLs for cached data conceptually "count down", while
|
||
data in the zone stays with constant TTLs.
|
||
|
||
A recommended implementation strategy is to store time in two ways: as
|
||
a relative increment and as an absolute time. One way to do this is to
|
||
use positive 32 bit numbers for one type and negative numbers for the
|
||
other. The RRs in zones use relative times; the refresh timers and
|
||
cache data use absolute times. Absolute numbers are taken with respect
|
||
to some known origin and converted to relative values when placed in the
|
||
response to a query. When an absolute TTL is negative after conversion
|
||
to relative, then the data is expired and should be ignored.
|
||
|
||
6.2. Standard query processing
|
||
|
||
The major algorithm for standard query processing is presented in
|
||
[RFC-1034].
|
||
|
||
When processing queries with QCLASS=*, or some other QCLASS which
|
||
matches multiple classes, the response should never be authoritative
|
||
unless the server can guarantee that the response covers all classes.
|
||
|
||
When composing a response, RRs which are to be inserted in the
|
||
additional section, but duplicate RRs in the answer or authority
|
||
sections, may be omitted from the additional section.
|
||
|
||
When a response is so long that truncation is required, the truncation
|
||
should start at the end of the response and work forward in the
|
||
datagram. Thus if there is any data for the authority section, the
|
||
answer section is guaranteed to be unique.
|
||
|
||
The MINIMUM value in the SOA should be used to set a floor on the TTL of
|
||
data distributed from a zone. This floor function should be done when
|
||
the data is copied into a response. This will allow future dynamic
|
||
update protocols to change the SOA MINIMUM field without ambiguous
|
||
semantics.
|
||
|
||
6.3. Zone refresh and reload processing
|
||
|
||
In spite of a server's best efforts, it may be unable to load zone data
|
||
from a master file due to syntax errors, etc., or be unable to refresh a
|
||
zone within the its expiration parameter. In this case, the name server
|
||
|
||
|
||
|
||
Mockapetris [Page 39]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
should answer queries as if it were not supposed to possess the zone.
|
||
|
||
If a master is sending a zone out via AXFR, and a new version is created
|
||
during the transfer, the master should continue to send the old version
|
||
if possible. In any case, it should never send part of one version and
|
||
part of another. If completion is not possible, the master should reset
|
||
the connection on which the zone transfer is taking place.
|
||
|
||
6.4. Inverse queries (Optional)
|
||
|
||
Inverse queries are an optional part of the DNS. Name servers are not
|
||
required to support any form of inverse queries. If a name server
|
||
receives an inverse query that it does not support, it returns an error
|
||
response with the "Not Implemented" error set in the header. While
|
||
inverse query support is optional, all name servers must be at least
|
||
able to return the error response.
|
||
|
||
6.4.1. The contents of inverse queries and responses Inverse
|
||
queries reverse the mappings performed by standard query operations;
|
||
while a standard query maps a domain name to a resource, an inverse
|
||
query maps a resource to a domain name. For example, a standard query
|
||
might bind a domain name to a host address; the corresponding inverse
|
||
query binds the host address to a domain name.
|
||
|
||
Inverse queries take the form of a single RR in the answer section of
|
||
the message, with an empty question section. The owner name of the
|
||
query RR and its TTL are not significant. The response carries
|
||
questions in the question section which identify all names possessing
|
||
the query RR WHICH THE NAME SERVER KNOWS. Since no name server knows
|
||
about all of the domain name space, the response can never be assumed to
|
||
be complete. Thus inverse queries are primarily useful for database
|
||
management and debugging activities. Inverse queries are NOT an
|
||
acceptable method of mapping host addresses to host names; use the IN-
|
||
ADDR.ARPA domain instead.
|
||
|
||
Where possible, name servers should provide case-insensitive comparisons
|
||
for inverse queries. Thus an inverse query asking for an MX RR of
|
||
"Venera.isi.edu" should get the same response as a query for
|
||
"VENERA.ISI.EDU"; an inverse query for HINFO RR "IBM-PC UNIX" should
|
||
produce the same result as an inverse query for "IBM-pc unix". However,
|
||
this cannot be guaranteed because name servers may possess RRs that
|
||
contain character strings but the name server does not know that the
|
||
data is character.
|
||
|
||
When a name server processes an inverse query, it either returns:
|
||
|
||
1. zero, one, or multiple domain names for the specified
|
||
resource as QNAMEs in the question section
|
||
|
||
|
||
|
||
Mockapetris [Page 40]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
2. an error code indicating that the name server doesn't support
|
||
inverse mapping of the specified resource type.
|
||
|
||
When the response to an inverse query contains one or more QNAMEs, the
|
||
owner name and TTL of the RR in the answer section which defines the
|
||
inverse query is modified to exactly match an RR found at the first
|
||
QNAME.
|
||
|
||
RRs returned in the inverse queries cannot be cached using the same
|
||
mechanism as is used for the replies to standard queries. One reason
|
||
for this is that a name might have multiple RRs of the same type, and
|
||
only one would appear. For example, an inverse query for a single
|
||
address of a multiply homed host might create the impression that only
|
||
one address existed.
|
||
|
||
6.4.2. Inverse query and response example The overall structure
|
||
of an inverse query for retrieving the domain name that corresponds to
|
||
Internet address 10.1.0.52 is shown below:
|
||
|
||
+-----------------------------------------+
|
||
Header | OPCODE=IQUERY, ID=997 |
|
||
+-----------------------------------------+
|
||
Question | <empty> |
|
||
+-----------------------------------------+
|
||
Answer | <anyname> A IN 10.1.0.52 |
|
||
+-----------------------------------------+
|
||
Authority | <empty> |
|
||
+-----------------------------------------+
|
||
Additional | <empty> |
|
||
+-----------------------------------------+
|
||
|
||
This query asks for a question whose answer is the Internet style
|
||
address 10.1.0.52. Since the owner name is not known, any domain name
|
||
can be used as a placeholder (and is ignored). A single octet of zero,
|
||
signifying the root, is usually used because it minimizes the length of
|
||
the message. The TTL of the RR is not significant. The response to
|
||
this query might be:
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 41]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
+-----------------------------------------+
|
||
Header | OPCODE=RESPONSE, ID=997 |
|
||
+-----------------------------------------+
|
||
Question |QTYPE=A, QCLASS=IN, QNAME=VENERA.ISI.EDU |
|
||
+-----------------------------------------+
|
||
Answer | VENERA.ISI.EDU A IN 10.1.0.52 |
|
||
+-----------------------------------------+
|
||
Authority | <empty> |
|
||
+-----------------------------------------+
|
||
Additional | <empty> |
|
||
+-----------------------------------------+
|
||
|
||
Note that the QTYPE in a response to an inverse query is the same as the
|
||
TYPE field in the answer section of the inverse query. Responses to
|
||
inverse queries may contain multiple questions when the inverse is not
|
||
unique. If the question section in the response is not empty, then the
|
||
RR in the answer section is modified to correspond to be an exact copy
|
||
of an RR at the first QNAME.
|
||
|
||
6.4.3. Inverse query processing
|
||
|
||
Name servers that support inverse queries can support these operations
|
||
through exhaustive searches of their databases, but this becomes
|
||
impractical as the size of the database increases. An alternative
|
||
approach is to invert the database according to the search key.
|
||
|
||
For name servers that support multiple zones and a large amount of data,
|
||
the recommended approach is separate inversions for each zone. When a
|
||
particular zone is changed during a refresh, only its inversions need to
|
||
be redone.
|
||
|
||
Support for transfer of this type of inversion may be included in future
|
||
versions of the domain system, but is not supported in this version.
|
||
|
||
6.5. Completion queries and responses
|
||
|
||
The optional completion services described in RFC-882 and RFC-883 have
|
||
been deleted. Redesigned services may become available in the future.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 42]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
7. RESOLVER IMPLEMENTATION
|
||
|
||
The top levels of the recommended resolver algorithm are discussed in
|
||
[RFC-1034]. This section discusses implementation details assuming the
|
||
database structure suggested in the name server implementation section
|
||
of this memo.
|
||
|
||
7.1. Transforming a user request into a query
|
||
|
||
The first step a resolver takes is to transform the client's request,
|
||
stated in a format suitable to the local OS, into a search specification
|
||
for RRs at a specific name which match a specific QTYPE and QCLASS.
|
||
Where possible, the QTYPE and QCLASS should correspond to a single type
|
||
and a single class, because this makes the use of cached data much
|
||
simpler. The reason for this is that the presence of data of one type
|
||
in a cache doesn't confirm the existence or non-existence of data of
|
||
other types, hence the only way to be sure is to consult an
|
||
authoritative source. If QCLASS=* is used, then authoritative answers
|
||
won't be available.
|
||
|
||
Since a resolver must be able to multiplex multiple requests if it is to
|
||
perform its function efficiently, each pending request is usually
|
||
represented in some block of state information. This state block will
|
||
typically contain:
|
||
|
||
- A timestamp indicating the time the request began.
|
||
The timestamp is used to decide whether RRs in the database
|
||
can be used or are out of date. This timestamp uses the
|
||
absolute time format previously discussed for RR storage in
|
||
zones and caches. Note that when an RRs TTL indicates a
|
||
relative time, the RR must be timely, since it is part of a
|
||
zone. When the RR has an absolute time, it is part of a
|
||
cache, and the TTL of the RR is compared against the timestamp
|
||
for the start of the request.
|
||
|
||
Note that using the timestamp is superior to using a current
|
||
time, since it allows RRs with TTLs of zero to be entered in
|
||
the cache in the usual manner, but still used by the current
|
||
request, even after intervals of many seconds due to system
|
||
load, query retransmission timeouts, etc.
|
||
|
||
- Some sort of parameters to limit the amount of work which will
|
||
be performed for this request.
|
||
|
||
The amount of work which a resolver will do in response to a
|
||
client request must be limited to guard against errors in the
|
||
database, such as circular CNAME references, and operational
|
||
problems, such as network partition which prevents the
|
||
|
||
|
||
|
||
Mockapetris [Page 43]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
resolver from accessing the name servers it needs. While
|
||
local limits on the number of times a resolver will retransmit
|
||
a particular query to a particular name server address are
|
||
essential, the resolver should have a global per-request
|
||
counter to limit work on a single request. The counter should
|
||
be set to some initial value and decremented whenever the
|
||
resolver performs any action (retransmission timeout,
|
||
retransmission, etc.) If the counter passes zero, the request
|
||
is terminated with a temporary error.
|
||
|
||
Note that if the resolver structure allows one request to
|
||
start others in parallel, such as when the need to access a
|
||
name server for one request causes a parallel resolve for the
|
||
name server's addresses, the spawned request should be started
|
||
with a lower counter. This prevents circular references in
|
||
the database from starting a chain reaction of resolver
|
||
activity.
|
||
|
||
- The SLIST data structure discussed in [RFC-1034].
|
||
|
||
This structure keeps track of the state of a request if it
|
||
must wait for answers from foreign name servers.
|
||
|
||
7.2. Sending the queries
|
||
|
||
As described in [RFC-1034], the basic task of the resolver is to
|
||
formulate a query which will answer the client's request and direct that
|
||
query to name servers which can provide the information. The resolver
|
||
will usually only have very strong hints about which servers to ask, in
|
||
the form of NS RRs, and may have to revise the query, in response to
|
||
CNAMEs, or revise the set of name servers the resolver is asking, in
|
||
response to delegation responses which point the resolver to name
|
||
servers closer to the desired information. In addition to the
|
||
information requested by the client, the resolver may have to call upon
|
||
its own services to determine the address of name servers it wishes to
|
||
contact.
|
||
|
||
In any case, the model used in this memo assumes that the resolver is
|
||
multiplexing attention between multiple requests, some from the client,
|
||
and some internally generated. Each request is represented by some
|
||
state information, and the desired behavior is that the resolver
|
||
transmit queries to name servers in a way that maximizes the probability
|
||
that the request is answered, minimizes the time that the request takes,
|
||
and avoids excessive transmissions. The key algorithm uses the state
|
||
information of the request to select the next name server address to
|
||
query, and also computes a timeout which will cause the next action
|
||
should a response not arrive. The next action will usually be a
|
||
transmission to some other server, but may be a temporary error to the
|
||
|
||
|
||
|
||
Mockapetris [Page 44]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
client.
|
||
|
||
The resolver always starts with a list of server names to query (SLIST).
|
||
This list will be all NS RRs which correspond to the nearest ancestor
|
||
zone that the resolver knows about. To avoid startup problems, the
|
||
resolver should have a set of default servers which it will ask should
|
||
it have no current NS RRs which are appropriate. The resolver then adds
|
||
to SLIST all of the known addresses for the name servers, and may start
|
||
parallel requests to acquire the addresses of the servers when the
|
||
resolver has the name, but no addresses, for the name servers.
|
||
|
||
To complete initialization of SLIST, the resolver attaches whatever
|
||
history information it has to the each address in SLIST. This will
|
||
usually consist of some sort of weighted averages for the response time
|
||
of the address, and the batting average of the address (i.e., how often
|
||
the address responded at all to the request). Note that this
|
||
information should be kept on a per address basis, rather than on a per
|
||
name server basis, because the response time and batting average of a
|
||
particular server may vary considerably from address to address. Note
|
||
also that this information is actually specific to a resolver address /
|
||
server address pair, so a resolver with multiple addresses may wish to
|
||
keep separate histories for each of its addresses. Part of this step
|
||
must deal with addresses which have no such history; in this case an
|
||
expected round trip time of 5-10 seconds should be the worst case, with
|
||
lower estimates for the same local network, etc.
|
||
|
||
Note that whenever a delegation is followed, the resolver algorithm
|
||
reinitializes SLIST.
|
||
|
||
The information establishes a partial ranking of the available name
|
||
server addresses. Each time an address is chosen and the state should
|
||
be altered to prevent its selection again until all other addresses have
|
||
been tried. The timeout for each transmission should be 50-100% greater
|
||
than the average predicted value to allow for variance in response.
|
||
|
||
Some fine points:
|
||
|
||
- The resolver may encounter a situation where no addresses are
|
||
available for any of the name servers named in SLIST, and
|
||
where the servers in the list are precisely those which would
|
||
normally be used to look up their own addresses. This
|
||
situation typically occurs when the glue address RRs have a
|
||
smaller TTL than the NS RRs marking delegation, or when the
|
||
resolver caches the result of a NS search. The resolver
|
||
should detect this condition and restart the search at the
|
||
next ancestor zone, or alternatively at the root.
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 45]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
- If a resolver gets a server error or other bizarre response
|
||
from a name server, it should remove it from SLIST, and may
|
||
wish to schedule an immediate transmission to the next
|
||
candidate server address.
|
||
|
||
7.3. Processing responses
|
||
|
||
The first step in processing arriving response datagrams is to parse the
|
||
response. This procedure should include:
|
||
|
||
- Check the header for reasonableness. Discard datagrams which
|
||
are queries when responses are expected.
|
||
|
||
- Parse the sections of the message, and insure that all RRs are
|
||
correctly formatted.
|
||
|
||
- As an optional step, check the TTLs of arriving data looking
|
||
for RRs with excessively long TTLs. If a RR has an
|
||
excessively long TTL, say greater than 1 week, either discard
|
||
the whole response, or limit all TTLs in the response to 1
|
||
week.
|
||
|
||
The next step is to match the response to a current resolver request.
|
||
The recommended strategy is to do a preliminary matching using the ID
|
||
field in the domain header, and then to verify that the question section
|
||
corresponds to the information currently desired. This requires that
|
||
the transmission algorithm devote several bits of the domain ID field to
|
||
a request identifier of some sort. This step has several fine points:
|
||
|
||
- Some name servers send their responses from different
|
||
addresses than the one used to receive the query. That is, a
|
||
resolver cannot rely that a response will come from the same
|
||
address which it sent the corresponding query to. This name
|
||
server bug is typically encountered in UNIX systems.
|
||
|
||
- If the resolver retransmits a particular request to a name
|
||
server it should be able to use a response from any of the
|
||
transmissions. However, if it is using the response to sample
|
||
the round trip time to access the name server, it must be able
|
||
to determine which transmission matches the response (and keep
|
||
transmission times for each outgoing message), or only
|
||
calculate round trip times based on initial transmissions.
|
||
|
||
- A name server will occasionally not have a current copy of a
|
||
zone which it should have according to some NS RRs. The
|
||
resolver should simply remove the name server from the current
|
||
SLIST, and continue.
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 46]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
7.4. Using the cache
|
||
|
||
In general, we expect a resolver to cache all data which it receives in
|
||
responses since it may be useful in answering future client requests.
|
||
However, there are several types of data which should not be cached:
|
||
|
||
- When several RRs of the same type are available for a
|
||
particular owner name, the resolver should either cache them
|
||
all or none at all. When a response is truncated, and a
|
||
resolver doesn't know whether it has a complete set, it should
|
||
not cache a possibly partial set of RRs.
|
||
|
||
- Cached data should never be used in preference to
|
||
authoritative data, so if caching would cause this to happen
|
||
the data should not be cached.
|
||
|
||
- The results of an inverse query should not be cached.
|
||
|
||
- The results of standard queries where the QNAME contains "*"
|
||
labels if the data might be used to construct wildcards. The
|
||
reason is that the cache does not necessarily contain existing
|
||
RRs or zone boundary information which is necessary to
|
||
restrict the application of the wildcard RRs.
|
||
|
||
- RR data in responses of dubious reliability. When a resolver
|
||
receives unsolicited responses or RR data other than that
|
||
requested, it should discard it without caching it. The basic
|
||
implication is that all sanity checks on a packet should be
|
||
performed before any of it is cached.
|
||
|
||
In a similar vein, when a resolver has a set of RRs for some name in a
|
||
response, and wants to cache the RRs, it should check its cache for
|
||
already existing RRs. Depending on the circumstances, either the data
|
||
in the response or the cache is preferred, but the two should never be
|
||
combined. If the data in the response is from authoritative data in the
|
||
answer section, it is always preferred.
|
||
|
||
8. MAIL SUPPORT
|
||
|
||
The domain system defines a standard for mapping mailboxes into domain
|
||
names, and two methods for using the mailbox information to derive mail
|
||
routing information. The first method is called mail exchange binding
|
||
and the other method is mailbox binding. The mailbox encoding standard
|
||
and mail exchange binding are part of the DNS official protocol, and are
|
||
the recommended method for mail routing in the Internet. Mailbox
|
||
binding is an experimental feature which is still under development and
|
||
subject to change.
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 47]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
The mailbox encoding standard assumes a mailbox name of the form
|
||
"<local-part>@<mail-domain>". While the syntax allowed in each of these
|
||
sections varies substantially between the various mail internets, the
|
||
preferred syntax for the ARPA Internet is given in [RFC-822].
|
||
|
||
The DNS encodes the <local-part> as a single label, and encodes the
|
||
<mail-domain> as a domain name. The single label from the <local-part>
|
||
is prefaced to the domain name from <mail-domain> to form the domain
|
||
name corresponding to the mailbox. Thus the mailbox HOSTMASTER@SRI-
|
||
NIC.ARPA is mapped into the domain name HOSTMASTER.SRI-NIC.ARPA. If the
|
||
<local-part> contains dots or other special characters, its
|
||
representation in a master file will require the use of backslash
|
||
quoting to ensure that the domain name is properly encoded. For
|
||
example, the mailbox Action.domains@ISI.EDU would be represented as
|
||
Action\.domains.ISI.EDU.
|
||
|
||
8.1. Mail exchange binding
|
||
|
||
Mail exchange binding uses the <mail-domain> part of a mailbox
|
||
specification to determine where mail should be sent. The <local-part>
|
||
is not even consulted. [RFC-974] specifies this method in detail, and
|
||
should be consulted before attempting to use mail exchange support.
|
||
|
||
One of the advantages of this method is that it decouples mail
|
||
destination naming from the hosts used to support mail service, at the
|
||
cost of another layer of indirection in the lookup function. However,
|
||
the addition layer should eliminate the need for complicated "%", "!",
|
||
etc encodings in <local-part>.
|
||
|
||
The essence of the method is that the <mail-domain> is used as a domain
|
||
name to locate type MX RRs which list hosts willing to accept mail for
|
||
<mail-domain>, together with preference values which rank the hosts
|
||
according to an order specified by the administrators for <mail-domain>.
|
||
|
||
In this memo, the <mail-domain> ISI.EDU is used in examples, together
|
||
with the hosts VENERA.ISI.EDU and VAXA.ISI.EDU as mail exchanges for
|
||
ISI.EDU. If a mailer had a message for Mockapetris@ISI.EDU, it would
|
||
route it by looking up MX RRs for ISI.EDU. The MX RRs at ISI.EDU name
|
||
VENERA.ISI.EDU and VAXA.ISI.EDU, and type A queries can find the host
|
||
addresses.
|
||
|
||
8.2. Mailbox binding (Experimental)
|
||
|
||
In mailbox binding, the mailer uses the entire mail destination
|
||
specification to construct a domain name. The encoded domain name for
|
||
the mailbox is used as the QNAME field in a QTYPE=MAILB query.
|
||
|
||
Several outcomes are possible for this query:
|
||
|
||
|
||
|
||
Mockapetris [Page 48]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
1. The query can return a name error indicating that the mailbox
|
||
does not exist as a domain name.
|
||
|
||
In the long term, this would indicate that the specified
|
||
mailbox doesn't exist. However, until the use of mailbox
|
||
binding is universal, this error condition should be
|
||
interpreted to mean that the organization identified by the
|
||
global part does not support mailbox binding. The
|
||
appropriate procedure is to revert to exchange binding at
|
||
this point.
|
||
|
||
2. The query can return a Mail Rename (MR) RR.
|
||
|
||
The MR RR carries new mailbox specification in its RDATA
|
||
field. The mailer should replace the old mailbox with the
|
||
new one and retry the operation.
|
||
|
||
3. The query can return a MB RR.
|
||
|
||
The MB RR carries a domain name for a host in its RDATA
|
||
field. The mailer should deliver the message to that host
|
||
via whatever protocol is applicable, e.g., b,SMTP.
|
||
|
||
4. The query can return one or more Mail Group (MG) RRs.
|
||
|
||
This condition means that the mailbox was actually a mailing
|
||
list or mail group, rather than a single mailbox. Each MG RR
|
||
has a RDATA field that identifies a mailbox that is a member
|
||
of the group. The mailer should deliver a copy of the
|
||
message to each member.
|
||
|
||
5. The query can return a MB RR as well as one or more MG RRs.
|
||
|
||
This condition means the the mailbox was actually a mailing
|
||
list. The mailer can either deliver the message to the host
|
||
specified by the MB RR, which will in turn do the delivery to
|
||
all members, or the mailer can use the MG RRs to do the
|
||
expansion itself.
|
||
|
||
In any of these cases, the response may include a Mail Information
|
||
(MINFO) RR. This RR is usually associated with a mail group, but is
|
||
legal with a MB. The MINFO RR identifies two mailboxes. One of these
|
||
identifies a responsible person for the original mailbox name. This
|
||
mailbox should be used for requests to be added to a mail group, etc.
|
||
The second mailbox name in the MINFO RR identifies a mailbox that should
|
||
receive error messages for mail failures. This is particularly
|
||
appropriate for mailing lists when errors in member names should be
|
||
reported to a person other than the one who sends a message to the list.
|
||
|
||
|
||
|
||
Mockapetris [Page 49]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
New fields may be added to this RR in the future.
|
||
|
||
|
||
9. REFERENCES and BIBLIOGRAPHY
|
||
|
||
[Dyer 87] S. Dyer, F. Hsu, "Hesiod", Project Athena
|
||
Technical Plan - Name Service, April 1987, version 1.9.
|
||
|
||
Describes the fundamentals of the Hesiod name service.
|
||
|
||
[IEN-116] J. Postel, "Internet Name Server", IEN-116,
|
||
USC/Information Sciences Institute, August 1979.
|
||
|
||
A name service obsoleted by the Domain Name System, but
|
||
still in use.
|
||
|
||
[Quarterman 86] J. Quarterman, and J. Hoskins, "Notable Computer Networks",
|
||
Communications of the ACM, October 1986, volume 29, number
|
||
10.
|
||
|
||
[RFC-742] K. Harrenstien, "NAME/FINGER", RFC-742, Network
|
||
Information Center, SRI International, December 1977.
|
||
|
||
[RFC-768] J. Postel, "User Datagram Protocol", RFC-768,
|
||
USC/Information Sciences Institute, August 1980.
|
||
|
||
[RFC-793] J. Postel, "Transmission Control Protocol", RFC-793,
|
||
USC/Information Sciences Institute, September 1981.
|
||
|
||
[RFC-799] D. Mills, "Internet Name Domains", RFC-799, COMSAT,
|
||
September 1981.
|
||
|
||
Suggests introduction of a hierarchy in place of a flat
|
||
name space for the Internet.
|
||
|
||
[RFC-805] J. Postel, "Computer Mail Meeting Notes", RFC-805,
|
||
USC/Information Sciences Institute, February 1982.
|
||
|
||
[RFC-810] E. Feinler, K. Harrenstien, Z. Su, and V. White, "DOD
|
||
Internet Host Table Specification", RFC-810, Network
|
||
Information Center, SRI International, March 1982.
|
||
|
||
Obsolete. See RFC-952.
|
||
|
||
[RFC-811] K. Harrenstien, V. White, and E. Feinler, "Hostnames
|
||
Server", RFC-811, Network Information Center, SRI
|
||
International, March 1982.
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 50]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
Obsolete. See RFC-953.
|
||
|
||
[RFC-812] K. Harrenstien, and V. White, "NICNAME/WHOIS", RFC-812,
|
||
Network Information Center, SRI International, March
|
||
1982.
|
||
|
||
[RFC-819] Z. Su, and J. Postel, "The Domain Naming Convention for
|
||
Internet User Applications", RFC-819, Network
|
||
Information Center, SRI International, August 1982.
|
||
|
||
Early thoughts on the design of the domain system.
|
||
Current implementation is completely different.
|
||
|
||
[RFC-821] J. Postel, "Simple Mail Transfer Protocol", RFC-821,
|
||
USC/Information Sciences Institute, August 1980.
|
||
|
||
[RFC-830] Z. Su, "A Distributed System for Internet Name Service",
|
||
RFC-830, Network Information Center, SRI International,
|
||
October 1982.
|
||
|
||
Early thoughts on the design of the domain system.
|
||
Current implementation is completely different.
|
||
|
||
[RFC-882] P. Mockapetris, "Domain names - Concepts and
|
||
Facilities," RFC-882, USC/Information Sciences
|
||
Institute, November 1983.
|
||
|
||
Superceeded by this memo.
|
||
|
||
[RFC-883] P. Mockapetris, "Domain names - Implementation and
|
||
Specification," RFC-883, USC/Information Sciences
|
||
Institute, November 1983.
|
||
|
||
Superceeded by this memo.
|
||
|
||
[RFC-920] J. Postel and J. Reynolds, "Domain Requirements",
|
||
RFC-920, USC/Information Sciences Institute,
|
||
October 1984.
|
||
|
||
Explains the naming scheme for top level domains.
|
||
|
||
[RFC-952] K. Harrenstien, M. Stahl, E. Feinler, "DoD Internet Host
|
||
Table Specification", RFC-952, SRI, October 1985.
|
||
|
||
Specifies the format of HOSTS.TXT, the host/address
|
||
table replaced by the DNS.
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 51]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
[RFC-953] K. Harrenstien, M. Stahl, E. Feinler, "HOSTNAME Server",
|
||
RFC-953, SRI, October 1985.
|
||
|
||
This RFC contains the official specification of the
|
||
hostname server protocol, which is obsoleted by the DNS.
|
||
This TCP based protocol accesses information stored in
|
||
the RFC-952 format, and is used to obtain copies of the
|
||
host table.
|
||
|
||
[RFC-973] P. Mockapetris, "Domain System Changes and
|
||
Observations", RFC-973, USC/Information Sciences
|
||
Institute, January 1986.
|
||
|
||
Describes changes to RFC-882 and RFC-883 and reasons for
|
||
them.
|
||
|
||
[RFC-974] C. Partridge, "Mail routing and the domain system",
|
||
RFC-974, CSNET CIC BBN Labs, January 1986.
|
||
|
||
Describes the transition from HOSTS.TXT based mail
|
||
addressing to the more powerful MX system used with the
|
||
domain system.
|
||
|
||
[RFC-1001] NetBIOS Working Group, "Protocol standard for a NetBIOS
|
||
service on a TCP/UDP transport: Concepts and Methods",
|
||
RFC-1001, March 1987.
|
||
|
||
This RFC and RFC-1002 are a preliminary design for
|
||
NETBIOS on top of TCP/IP which proposes to base NetBIOS
|
||
name service on top of the DNS.
|
||
|
||
[RFC-1002] NetBIOS Working Group, "Protocol standard for a NetBIOS
|
||
service on a TCP/UDP transport: Detailed
|
||
Specifications", RFC-1002, March 1987.
|
||
|
||
[RFC-1010] J. Reynolds, and J. Postel, "Assigned Numbers", RFC-1010,
|
||
USC/Information Sciences Institute, May 1987.
|
||
|
||
Contains socket numbers and mnemonics for host names,
|
||
operating systems, etc.
|
||
|
||
[RFC-1031] W. Lazear, "MILNET Name Domain Transition", RFC-1031,
|
||
November 1987.
|
||
|
||
Describes a plan for converting the MILNET to the DNS.
|
||
|
||
[RFC-1032] M. Stahl, "Establishing a Domain - Guidelines for
|
||
Administrators", RFC-1032, November 1987.
|
||
|
||
|
||
|
||
Mockapetris [Page 52]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
Describes the registration policies used by the NIC to
|
||
administer the top level domains and delegate subzones.
|
||
|
||
[RFC-1033] M. Lottor, "Domain Administrators Operations Guide",
|
||
RFC-1033, November 1987.
|
||
|
||
A cookbook for domain administrators.
|
||
|
||
[Solomon 82] M. Solomon, L. Landweber, and D. Neuhengen, "The CSNET
|
||
Name Server", Computer Networks, vol 6, nr 3, July 1982.
|
||
|
||
Describes a name service for CSNET which is independent
|
||
from the DNS and DNS use in the CSNET.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 53]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
Index
|
||
|
||
* 13
|
||
|
||
; 33, 35
|
||
|
||
<character-string> 35
|
||
<domain-name> 34
|
||
|
||
@ 35
|
||
|
||
\ 35
|
||
|
||
A 12
|
||
|
||
Byte order 8
|
||
|
||
CH 13
|
||
Character case 9
|
||
CLASS 11
|
||
CNAME 12
|
||
Completion 42
|
||
CS 13
|
||
|
||
Hesiod 13
|
||
HINFO 12
|
||
HS 13
|
||
|
||
IN 13
|
||
IN-ADDR.ARPA domain 22
|
||
Inverse queries 40
|
||
|
||
Mailbox names 47
|
||
MB 12
|
||
MD 12
|
||
MF 12
|
||
MG 12
|
||
MINFO 12
|
||
MINIMUM 20
|
||
MR 12
|
||
MX 12
|
||
|
||
NS 12
|
||
NULL 12
|
||
|
||
Port numbers 32
|
||
Primary server 5
|
||
PTR 12, 18
|
||
|
||
|
||
|
||
Mockapetris [Page 54]
|
||
|
||
RFC 1035 Domain Implementation and Specification November 1987
|
||
|
||
|
||
QCLASS 13
|
||
QTYPE 12
|
||
|
||
RDATA 12
|
||
RDLENGTH 11
|
||
|
||
Secondary server 5
|
||
SOA 12
|
||
Stub resolvers 7
|
||
|
||
TCP 32
|
||
TXT 12
|
||
TYPE 11
|
||
|
||
UDP 32
|
||
|
||
WKS 12
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Mockapetris [Page 55]
|
||
|