王朝网络
分享
 
 
 

RFC1279 - X.500 and Domains

王朝other·作者佚名  2008-05-31
宽屏版  字体: |||超大  

Network Working Group S.E. Hardcastle-Kille

Requests for Comments 1279 University College London

November 1991

X.500 and Domains

Status of this Memo

This memo defines an EXPerimental Protocol for the Internet

community. Discussion and suggestions for improvement are

requested. Please refer to the current edition of the ``IAB

Official Protocol Standards'' for the standardization state and

status of this protocol. Distribution of this memo is unlimited.

Abstract

This RFCconsiders X.500 in relation to Internet and UK Domains.

A basic model of X.500 providing a higher level and more

descriptive naming strUCture is emphasised. In addition, a

mapping of domains onto X.500 is proposed, which gives a range of

new management and user facilities over and above those currently

available. This specification proposes an experimental new

mechanism to Access and manage domain information on the Internet

and in the UK Academic Community. There is no current intention

to provide an operational replacement for DNS.

RFC1279 X.500 and Domains November 1991

1 The Domain Name System

The Domain (Nameserver) System (DNS) provides a hierarchical resource

labelling system [Moc87a] [Moc87b] [Lar83]. Example domains are:

MIT.EDU

VENERA.ISI.EDU

CS.UCL.AC.UK

Entries usually have a single name, although pointers to entries (not

suBTrees) may be provided by CNAME records. Information (resource

records) is associated with each entry. Name components are typically

chosen to be shortish (e.g., ``CS'').

RFC822 mailbox names are closely related [Cro82]. For example:

<S.Kille@CS.UCL.AC.UK>

The local-part of the RFC822 mailbox can be considered as one level

lower in the domain hierarchy.

2 X.500

The OSI Directory, usually known as X.500, provides a very general

naming framework [CCI88]. A basic usage of X.500 is to provide

Organisationally Structured Names. A Schema for this is defined

within the standard. Name components will typically have longish

values. This is an example directory name represented in Tabular

form:

Country GB

Organisation University College London

Organisational Unit Computer Science

Common Name Stephen E. Hardcastle-Kille

This can also be written in the ``User Friendly Name'' notation

defined in [HK91]. This syntax is used for names in the rest of this

document:

Stephen E. Hardcastle-Kille, Computer Science,

Hardcastle-Kille Page 1

RFC1279 X.500 and Domains November 1991

University College London, GB

This type of structure is termed ``organisational X.500''. This is a

subset of the general capabilities.

3 The basic model

X.500 has as much relation to the DNS as DNS has to ARP. Paul

Mockapetris

This is, essentially, the position adopted here. The basic model is

that organisational X.500 is providing a layer of naming at the level

above domain names. These structured names can be considered to form

a naming layer above domain names. There are the following key

differences:

o Organisational X.500 tends to use longer and more descriptive

values

o The organisational X.500 DIT is slightly shallower than the DNS

tree

o X.500 has a richer information framework than DNS

These differences suggest that the following should NOT be done:

o Represent X.500 information in the DNS

o Have an algorithmic mapping between the two hierarchies

This note proposes to represent DNS information in the DIT, and to

provide for a loose coupling between the two trees. This note does

not propose an equivalencing of X.500 and Domains.

The proposed model is illustrated in Figure 1. Both an organisational

and domain structure is represented in the DIT, by use of appropriate

object classes and attribute types. A weak linkage is provided

between the two parts of the tree by use of special attributes. Here,

the linkage is 1:1, but it may be more complex for some parts of the

organisational DIT or domain namespace. The linkage is achieved by

use of special attributes, as described in Section 11.

Hardcastle-Kille Page 2

RFC1279 X.500 and Domains November 1991

j jZ Z

j j ZZ

jj Z Z

jjj ZZ

Domain Component=UK Country Name=GB

Domain Component=AC Organisation Name=Univeristy College London

* BB

ss BBB

Domain Component=UCL Org Unit Name=Computer Science

*

ss

Domain Component=CS Common Name=Steve Kille

*

ss

Domain Component=S.Kille

Figure 1: Example X.500 tree

Hardcastle-Kille Page 3

RFC1279 X.500 and Domains November 1991

4 Representing Domains in X.500

Domains are at the level below X.500 names of the form illustrated in

the previous section. However, it is also possible to use X.500 in

other ways. In particular, there are benefits from representing

Domains in X.500. Note that this is very different to equivalencing,

as no attempt is made to represent X.500 information within the domain

scheme. There are the following potential advantages:

o Domain Services (DNS and NRS) could be replaced with an OSI

service (some may not view this as an advantage). This is

particularly attractive for OSI services, where use of a non-OSI

directory may be inappropriate.

o For Internet sites, access to domain information (beyond MX

records) could be provided for systems registered remotely. For

UK Academic Community sites, access to domain information for

domains not registered in the NRS could be given. For sites

neither on the Internet nor in the UK Academic Community there

will usually be even more of an advantage, as they usually have

very limited information on domains.

o Assuming that information is downloaded from an X.500 database

into a DNS or NRS system, the remote management facilities of

X.500 could be used. This is possible because of the extra

security features of X.500.

Note: For initial work, the converse situation of information

being mastered in Domain Databases and uploaded into the X.500

DIT is more likely.

o User access to the domain data, and in particular searching, could

be provided. This would allow users to browse the domain

namespace, and to determine information associated with the

domains.

o The X.500 framework would allow for additional management

information to be stored, and to relate the domain names into a

more complex structure of information. For example, this might

allow for the managers of a system to be identified, and

information on how to contact the manager.

Hardcastle-Kille Page 4

RFC1279 X.500 and Domains November 1991

o A facility to map RFC822 mailbox into a Directory Name (and thus

access other user information on the basis of this key) could be

provided. This may be useful for the user to determine

information about a message originator.

o This technique may be useful to facilitate introduction of

security, as it will enable certificates to be associated with

domains and mailboxes. This may be very useful for the privacy

enchanced mail work [Lin89].

5 Representing Domain Names

A new attribute syntax is defined:

CaseIgnoreIA5StringSyntax ATTRIBUTE-SYNTAX

IA5String

MATCHES FOR EQUALITY SUBSTRINGS ORDERING

A new attribute and two new object classes are defined:

DomainComponent ATTRIBUTE

WITH ATTRIBUTE-SYNTAX caseIgnoreIA5StringSyntax

SINGLE VALUE

Domain OBJECT-CLASS

SUBCLASS OF top

MUST CONTAIN -DomainComponent"

MAY CONTAIN -AssociatedName,

organizationName,

organizationalAttributeSet,

manager"

RFC822Mailbox OBJECT-CLASS

SUBCLASS OF Domain

MAY CONTAIN -commonName,

surname,

description,

telephoneNumber,

postalAttributeSet,

telecommunicationAttributeSet "

Hardcastle-Kille Page 5

RFC1279 X.500 and Domains November 1991

Note that the attribute AssociatedName is defined in Section 11. The

manager attribute is defined in the COSINE and Internet naming

architecture [BHK91]. It allows a manager to be associated with the

domain, which is useful where the manager of the domain is different

to the manager of the object defined by the AssociatedName. This will

allow any domain to be represented in an X.500 hierarchy. The local

part of an RFC822 mailbox is treated as a special sort of domain

component, and so these can be represented in the tree as a natural

extension of the hierarchy.

For example, consider the mailbox S.Kille@cs.ucl.ac.uk. This will

lead to the following structure in the DIT:

___________________________________________

_Object_Class__RDN_Type________RDN_Value_

Domain DomainComponent UK

Domain DomainComponent AC

Domain DomainComponent UCL

Domain DomainComponent CS

_RFC822Mailbox_DomainComponent_S.Kille__

This can be represented in User Friendly Name format as:

DomainComponent=S.Kille, DomainComponent=CS, DomainComponent=UCL,

DomainComponent=AC, DomainComponent=UK

Note that the RFC822Mailbox Object Class is a subclass of Domain.

Some attributes are allowed to be associated with these objects.

There may be other additional management attributes which it is useful

to define (e.g., Machine Type, Owner, Location etc.). This allows

some information which truly belongs to the domain to be represented

there. It also allows for further information to be associated with

the domain/mailbox when there is not a relevant part of the

organisationally structure DIT to be pointed at. When there is an

associated part of the DIT, information from that part of the DIT

should not be duplicated in the domain entry.

6 Wildcards

Wildcards are supported by having "*" as a special domain component

name. If there is a need to emulate wildcard matching using the

directory, the following algorithm must be employed. For example, the

Hardcastle-Kille Page 6

RFC1279 X.500 and Domains November 1991

wildcard entry for *.*.PODUNK.COM would be represented in the DIT as:

DomainComponent=*, DomainComponent=*,

DomainComponent=MIT, DomainComponent=COM

If A.B.PODUNK.COM is looked up in the directory, the query will fail

and indicate that two components are matched. A substitution should

be made, and *.*.PODUNK.COM looked up explicitly to identify the

associated information.

7 DNS Information

DNS information can be associated with an entry in the DIT. It is

important that this is done in a manner which is exactly equivalent to

the information stored in the DNS. This will allow the DIT to have

information loaded from the DNS or vice versa. All (authoritative)

records associated with a domain will be stored in the DIT. There is

no attempt made by the OSI Directory to emulate DNS caching or TTL

handling. It is assumed that the master entries are maintained by use

of DNS Zone Transfer (or equivalent), and that they can be treated as

authoritative. There is a need to define an attribute syntax which

represents a DNS record. This then allows DNS records to be stored in

the DIT. There are three possible encodings of this record:

ASN.1 Encoded This is the most natural approach in terms of X.500.

However, it would require all users of this service to handle the

new syntax, which would be awkward. There is a problem with

handling the resource format in a general manner.

DNS Binary Encoded Use the formally defined record syntax. This

would be convenient for access to the data by DNS related

software, but would be an awkward encoding for independent X.500

DUAs.

Text encoded Use of a text encoding derived from the DNS

specifications. This is straightforward to map onto DNS protocol,

and easy to support in a naive X.500 DUA. This approach is chosen.

The syntax is defined in IA5 characters. The BNF of the record uses

the definitions of section 5.1 of RFC1035. It is

Hardcastle-Kille Page 7

RFC1279 X.500 and Domains November 1991

<rr> [ ";" <comment> ]

Three examples of this (for domain C.ISI.EDU) might be:

500 A 10.1.0.52 ; Basic address record

IN 600 MX 10 VENERA.ISI.EDU. ; MX record

600 IN MX 10 VENERA.ISI.EDU. ; MX record - other order

Note that:

o The class and TTL may be in either order (following RFC1035)

o The class defaults to IN

o Domains must always be fully specified (i.e., master file

abbreviate rules are not used).

o The TTL for a record must always be present (this saves looking at

the parent entry to find the SOA record).

o Records (e.g., SOA) may be multiline. Lines should be separated

with the two IA5 characters <CR><LF>.

CNAME records are mapped symmetrically onto Directory Aliases.

This is now defined in terms of attribute and object class

definitions. A single record type is defined, as opposed to one

attribute type per record type. This allows the definition to not

require extension when new DNS Record types are define. However,

there is some loss of efficiency if only a single record type is

needed, as filtering must be done by the DUA.

Similarly, no distinction is made on the basis of DNS class. This

means that if there are two class hierarchies, that they must be

represented in a single DIT, and that information for different

classes must be separated by DUA filtering.

DNSDomain OBJECT-CLASS

SUBCLASS OF Domain

MAY CONTAIN -

DNSRecord "

Hardcastle-Kille Page 8

RFC1279 X.500 and Domains November 1991

DNSRecord ATTRIBUTE

ATTRIBUTE-SYNTAX IA5String

MATCHES FOR EQUALITY

Lookup of a domain is achieved by translating it algorithmically to a

Distinguished Name (DN), and reading back attributes desired. This

information can be managed and searched in a straightforward fashion.

The information may also be downloaded into a DNS database. This

should be done by use of zone transfer. A tool to perform zone

transfer (in both directions) between a DNS Server and a DSA would

seem to be both straightforward and useful. This would be a key tool

in a transition to X.500 based management of the DNS. It would also

allow a large part of the DNS namespace to be rapidly made available

in an X.500 pilot.

Inverse information can be derived by the usual IN-ADDR domain, which

will be represented in the same manner in the DIT.

8 NRS Information

Information associated with the UK NRS (Name Registration Scheme) can

be handled in a similar manner [Lar83]. This is being developed in a

separate document by Alan Turland.

9 Application Entity Titles

In many cases, Application entities will be closely related to

domains. In some cases, it may be appropriate to give Application

Entities names which are related to the DNS part of the DIT. In this

case, the Domain Name will be used to identify the application, and

the entry for the domain will also be of object class Application

Process. The children of this entry will identify Application

Entities, with names such as ``FTAM Service''.

10 Networks

It is clearly useful to represent networks within the DIT. A short

note on how to do this is given here. It is likely that this

specification will later be evolved in a separate document. This

Hardcastle-Kille Page 9

RFC1279 X.500 and Domains November 1991

defines an Object Class for a general network, and shows how it can be

subclassed to define technology specific networks.

Network OBJECT-CLASS

SUBCLASS OF TOP

MAY CONTAIN -

Manager,

Locality,

Description "

IPNetwork OBJECT-CLASS

SUBCLASS OF Network

MUST CONTAIN -AssociatedDomain"

The Network Object Class allows networks to be defined, and for useful

attributes to be associated with the entry. A network will often

appear in more than one organisational structure, and this linkage

should be achieved by use of aliases. This grouping can facilitate

management of networks.

The subclass IPNetwork mandates linkage into the DNS part of the DIT.

This will be represented in the DIT using the structures of RFC1101

[Moc89]. Both of the domains which identify the network should be

represented in the Object Class. For example, a network might have

the (user friendly) name:

UCL-Ethernet, University College London, GB

This would have associated domains 0.0.40.128.IN-ADDR.ARPA and

UCL-ETHERNET.UCL.AC.UK. These would both have the analogous DIT

representations. For example:

DomainComponent=0, DomainComponent=0, DomainComponent=40,

DomainComponent=128, DomainComponent=IN-ADDR, DomainComponent=ARPA

11 Linkage

There is a need to associate the organisational X.500 DIT and the DNS

tree. The objects represented are different (Domain 6= Organisation;

Person 6= RFC822 Mailbox). Therefore aliasing is not an appropriate

linkage. However, in many cases, there is a linkage which is rather

Hardcastle-Kille Page 10

RFC1279 X.500 and Domains November 1991

stronger than that implied by the seeAlso attribute. Therefore, we

define new attributes, which represent this stronger cross-linkage.

The same mechanism can be used to link a domains with an Application

Entity or an Application Process.

Links from the organisational X.500 DIT to the DNS tree are provided

by a new attribute, which could be present in Organisation or

Organisational Unit entries.

ObjectWithAssociatedDomain OBJECT-CLASS

SUBCLASS OF top

MUST CONTAIN -AssociatedDomain"

AssociatedDomain ATTRIBUTE

WITH ATTRIBUTE-SYNTAX ia5StringSyntax

For example, the organisational entry:

University College London, GB

would have an attribute:

AssociatedDomain = UCL.AC.UK

Similarly, an RFC822 mailbox attribute is used to link entries of

Person Object Class to their associated DNS entry. This attribute is

defined in the Cosine and Internet Naming Architecture [BHK91].

Conversely, there are pointers from the DNS represented tree into the

organisational X.500 DIT:

AssociatedName ATTRIBUTE

WITH ATTRIBUTE-SYNTAX distinguishedNameSyntax

This attribute is associated with the Domain object class.

This entry is used to provide linkage from the DNS X.500 Hierarchy

into the organisational X.500 hierarchy. Where such entries do not

exist, attributes in the DNS entry (such as phone number) may be used.

It is recommended that information is not duplicated. The preferred

setup is for the DNS attributes to be rather skeletal, with pointers

into the organisational X.500 DIT.

Hardcastle-Kille Page 11

RFC1279 X.500 and Domains November 1991

For example, the domain UCL.AC.UK would be represented in the DIT as:

DomainComponent=UCL, DomainComponent=AC,

DomainComponent=UK

This entry would have in it an AssociatedName attribute with value:

University College London, GB

This example shows a simple case with 1:1 linkage. There are cases

where a domain might be associated with multiple organisations, or an

organisation with multiple domains.

12 Conclusions and proposals for evaluation

Experiments should be undertaken to determine the practicality and

utility of this scheme, in a pilot environment. A possible approach

to this experimentation is described in Appendix A.

Object Identifiers have been assigned for this purpose in the Cosine

and Internet Naming Architecture [BHK91].

References

[BHK91] P. Barker and S.E. Hardcastle-Kille. The COSINE and Internet

X.500 schema. Request for Comments RFC1274, Department of

Computer Science, University College London, November 1991.

[CCI88] The Directory --- overview of concepts, models and services,

December 1988. CCITT X.500 Series Recommendations.

[Cro82] D.H. Crocker. Standard of the format of ARPA internet text

messages. Request for Comments 822, University of Delaware,

August 1982.

[HK91] S.E. Hardcastle-Kille. Using the OSI directory to achieve

user friendly naming. Request for Comments in preparation,

Department of Computer Science, University College London,

November 1991.

Hardcastle-Kille Page 12

RFC1279 X.500 and Domains November 1991

[Lar83] J. Larmouth. JNT name registration technical guide, April

1983.

[Lin89] J. Linn. Privacy Enhancement for Internet Electronic Mail:

Part 1 --- Message Encipherment and Authentication

Procedures. Request for Comments 1113, Bolt, Beranek, and

Newman, August 1989.

[Moc87a] P. Mockapetris. Domain names - concepts and facilities.

Request for Comments RFC1034, USC/Information Sciences

Institute, November 1987.

[Moc87b] P. Mockapetris. Domain names - implementation and

specification. Request for Comments RFC1035,

USC/Information Sciences Institute, November 1987.

[Moc89] P. Mockapetris. DNS encoding of network names and other

types. Request for Comments RFC1101, USC/Information

Sciences Institute, April 1989.

13 Security Considerations

This memo does not directly address security issues. However, due to

the facilities of X.500, this proposal could lead to a more secure way

to access and manage domain information.

14 Author's Address

Steve Hardcastle-Kille

Department of Computer Science

University College London

Gower Street

WC1E 6BT

England

Phone: +44-71-380-7294

EMail: S.Kille@CS.UCL.AC.UK

Hardcastle-Kille Page 13

RFC1279 X.500 and Domains November 1991

A Possible Deployment Approach

This appendix notes a possible approach to deploying an experiment to

evaluate this mechanism. The following components of a possible

experiment are noted.

1. User tool. This will take a domain or mailbox as input. This

will be looked up in the DIT. This tool should be capable of:

o Attempting to correct user input

o Helping browsing

o Looking up information associated with the domain (or mailbox)

and associated name, in particular the manager (of both domain

and associated name) and information on the manager (e.g.,

phone number and mailbox).

o Supply DNS records

o Handle IN-ADDR.ARPA inverse lookups if supplied with an IP

Address

o Look up networks

2. A procedural library to allow user interfaces to make easy use of

these facilities.

3. Zone transfer tool. This will use the zone transfer protocol to

transfer information between a DSA and Domain Nameserver. When

writing to the DSA, attributes in an entry which are not DNS

records should remain untouched.

4. Linkage patching tool. When the organisational DIT is

established, associated domain pointers are usually inserted. A

tool can be written to search the DIT and insert the reverse

pointers.

5. DNS Manager Tool. This will allow user addition of additional

information into the DNS part of the DIT. A standard DUA can

probably be used for this.

Hardcastle-Kille Page 14

RFC1279 X.500 and Domains November 1991

6. Mailbox download tool. This will allow download of local

mailboxes, with pointers to the user entries.

7. Emulation DNS Server, using the Directory as a database. The

server should maintain a permanent connection to its local DSA. As

there is no OSI bind, the response of this server can be at least

as fast as a normal DNS server. There can be two variants of this

server.

(a) Using a local DSA as a local database but using DNS

distributed operations.

(b) Do all lookups in the directory (using Directory Distributed

Operations).

An initial experiment is straightforward. The Zone Transfer Tool (3)

can be used to download a large part of the DNS space into a single

DSA (there will be some restrictions, as parts of the DNS hierarchy do

not permit zone transfer). This can be used repeatedly to maintain

the information. The linkage patching tool (4) can be used to put in

pointers to parts of the DIT. The user tool can then be used (by all

sites participation the the directory pilot) to look up domain

information. This will allow the utility of the approach to be

evaluated. The manager tool (5) will allow extra information to be

added to parts of the DNS tree.

The next stage will be to distribute the DNS part of the DIT over

multiple DSAs using Directory distribution techniques.

The emulation DNS Server (7) will be useful to ensure that equivalent

functionality is being offered by the Directory. It can also be used

to examine performance differences.

A final step is to master some parts of the DNS hierarchy in the DIT.

Because of the zone transfer technique, this will be entirely

transparent to the DNS user. Management benefits can then be

examined.

Hardcastle-Kille

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
>>返回首页<<
推荐阅读
 
 
频道精选
静静地坐在废墟上,四周的荒凉一望无际,忽然觉得,凄凉也很美
© 2005- 王朝网络 版权所有