📄 rfc757.txt
字号:
same way that the ITS mail repeater broadcasts messages addressedto certain mailboxes.) Special functions might include automatichard-copy creation or reply generation, processing by variousdaemons, or any other service found desirable by the host's userpopulation and administration. The implementation of fan-outfunctions is up to the local host, as are any additionalfunctions which the user population might wish of its local "mailroom". Whatever services are available, the mail room willdistribute the mail to the correct location for each ID.RFC 757 September 1979Names and Addresses Page 72.2.1 Additional delivery options It may be desirable to allow mail rooms to accept a username inplace of an ID. Use of a username is a less reliable method ofaddressing than use of an ID. - A username may not be sufficiently unambiguous for getting an ID and host from the network database. - Since a recipient's username may change from time to time, there is a chance that the username supplied by 4 the sender will be incorrect , or that the host may not recognize it. Because a recipient's ID does not change with time, errors such as those caused by username changes cannot occur if IDs are used. Similarities or ambiguities can be discovered before delivery occurs, and the sender can be prompted for additional identifying information about his intended recipient. - In an even worse case, a correct username can still result in an incorrect delivery when it is paired with an incorrect host or acted upon by a mail forwarding 5 database . Because unique IDs are unambiguous, the possibility of such a situation is eliminated by the use of unique IDs._______________ 4 A particularly insidious source of addressing errors stemsfrom the inconsistent use of (human) names and initials togenerate usernames. The sender can easily guess hisrecipient's username incorrectly by using, or failing to usea combination of initials and last name. (For example, auser wishing to address Jim Miller at BBNA and using theaddress "Miller@BBNA" will have his message successfullydelivered to Duncan Miller at the same site.) 5 The author has observed a mail forwarding databaseredirect messages correctly addressed to one JWalker todifferent JWalker at another host.RFC 757 September 1979Names and Addresses Page 82.2.2 Failures The case in which the network database is found to be incorrecthas already been discussed. It may make sense to mark the entryas "possibly in error" and to notify both the network database 6and the ID owner when such a situation occurs. In this case maildelivery to the ID's owner will not occur, but this is not toobad, considering that that is what happens today when a host doesnot recognize a username. One additional failure mode, the loss of the network databasefrom the net, must be considered, even though a well-designeddistributed network database should be robust enough to almostrule out this possibility. If such a failure should occur, the local databases should beable to handle most of the traffic. What would be lost is theability to add new IDs to the network database, the ability tochange hosts for an ID, the ability to update local databases,and the ability to query the network database. In essence, therewould be a regression to the state we are in today. A well-administered network database should be backed upfrequently. Should a catastrophic series of hardware failuresremove one or more of the network database's hosts from the net,the database could be moved elsewhere. Such a change wouldentail notification of all hosts on which mail originates.Software which queries the database should be designed to be ableto easily handle such a move._______________ 6 Such notification would presumably be by hardcopy mail ortelephone.RFC 757 September 1979Relationship to TIP Login database Page 93. Relationship to TIP Login database A number of references to the TIP Login problem and a databasewhich has been proposed as part of its solution have been made inthis note. A series of working papers [5] written by Bob Thomas,Paul Santos, and Jack Haverty describe an approach to TIP Login.In brief, the method is to build and maintain a distributed TIPLogin database, containing information necessary to allow a newentity called a "login-host" to decide whether or not to grant auser access to a given TIP, and whether or not to allow the userto make various modifications to the database itself. The TIP login database is derived from a "network user database", which contains information above and beyond that necessaryto support TIP login. This comprehensive database is designed tosupport applications other than TIP Login, either directly or bymeans of databases derived from it. Contained in the TIP Login database are each user's loginstring, a list of TIPs the user is authorized to access, theuser's unique ID, his password, and any other "permissions" (inaddition to which TIPs may be accessed). These permissions mayindicate that the user may create, delete, or modify entries inthe database, to assume other user's roles, and to what extent hemay do so. The notion of permissions as developed by SteveWarshall is discussed in an NSW memo [2]. It seems entirely reasonable to derive a netmail database fromthe same comprehensive database that is designed to support TIPLogin. The concept of a unique ID is supported by that database.Much of the required information for a netmail database isalready included, and the maintenance tools necessary to modifyit seem well-suited for the purpose. The concept of permissionsextends well to the needs of netmail. Permissions specific tonetwork mail might include, for example, the ability to modifythe delivery host list associated with a given user. The mechanisms necessary for the maintenance of thecomprehensive network database and its derived databases give usa netmail database very inexpensively. This proposal takesadvantage of that situation.RFC 757 September 1979Relationship to RFC 753 Page 104. Relationship to RFC 753 RFC 753 [4] describes an internetwork message delivery system.Very briefly, the approach is to locate one or more "messageprocessing modules" (or MPMs) on each network. These MPMs passmessages across network boundaries, and are also capable ofmaking deliveries to users on the local network. The documentalso details a proposed message format, along the envelope andletter paradigm. An external "envelope", read by the deliverysystem, allows the (unread) message to be correctly routed anddelivered to the proper recipient. Groups of messages passedbetween a pair of MPMs are sent together in a "mail bag". This proposal differs from RFC 753 in that it is primarilyintended to operate within a network or a concatenation ofnetworks using a common host-host protocol, e.g. TCP. Where RFC753 addresses the problems of internetwork communication(differing message formats, complex routing, and correctidentification of the proper recipient), this note concentratesprimarily on what can be done within a single protocol. The twoare not incompatible. While a general internetwork protocol mustprovide general methods which can be compatible with differenthost-host protocols in different networks, a proposal such asthis one can capitalize on the capabilities, resources, andpolicies of a given catenet (catenated network) such as theARPAnet/PRnet/SATNET etc.4.1 Compatibility The delivery system described in RFC 753 is compatible with thesystem outlined here. Let's examine this for each of the threebasic delivery options performed by the MPM. (In the discussionthat follows, "local networks" means a concatenation of networksusing a common host-host protocol, e.g. TCP. "Foreign network"means some network which uses a different host-host protocol,e.g. X.25. (See Figure 4-1.)4.1.1 Outgoing message4.1.1.1 RFC 753 The sender's process hands a message to the local network MPM.The message may be destined to an address on the local network oron a foreign network. In the former case, the MPM performs thelocal delivery function (see "Incoming message"). In the lattercase, the MPM passes the message along to another MPM which is"closer" to the end user.RFC 757 September 1979Relationship to RFC 753 Page 11 +---------+ +----------+ | | | | | RCC-NET | | WIDEBAND | ....... | | | NET | . . +---------+ | | . MPM . * * +----------+ .......+---------+ * * * * ....... || | +---------+ . . +---------+| BBN-NET |***| |__. MPM . ..... | || | | ARPANET | ....... . .xxxx| TELENET |+---------+***| |***********. G . | | +---------+*** ..... +---------+ * * * * ** ....... +--------+ +-------+ ***..... +-------------+ . . | | | | . . | |--. MPM . | SATNET | | PRNET | . G .oooo| DIAL-UP NET | ....... | | | | ..... | | +--------+ +-------+ +-------------+ "Local Nets", TCP based | "Foreign Nets", other (direct addressing using IP) | host-host protocols*** = TCP xxx = X.25 ooo = other communications protocol G = gateway Figure 4-1: The Internet Environment4.1.1.2 This proposal The sender's process determines the proper host for deliverygiven the recipient's unique ID. If the message is destined tothe local network, delivery takes place as described earlier inthis proposal. If the recipient is not local, the message may bepassed to an MPM for foreign delivery. (A discussion of internetdelivery which does not presuppose RFC 753 implementation isfound later in this note.) The environment in which the MPM operates does not assume anyknowledge on the part of the local networks about addressees onforeign networks. Thus there are two possibilities which arise:RFC 757 September 1979Relationship to RFC 753 Page 12 - The recipient has an ID known to the local networks. In this case, the local networks supply the RFC 753 "address". This can take place in the local networks' MPM or the user's sending or mail creation process. - The recipient is unknown to the local networks. Here the sender must supply "mailbox" information himself, either explicitly or with help of his local host's database. Thus, outgoing mail as described in this memo is compatiblewith RFC 753, with the benefit of reducing the burden on the MPMby handling mail deliveries that are local to local networks.4.1.2 Messages in transit Traffic between two MPMs is not affected by this proposal.4.1.3 Incoming mail The MPM on the networks local to the recipient will have accessto the netmail database, allowing it to translate "mailboxes" to"addresses". It can determine the unique ID of the recipient (ifnot known), and initiate delivery to that recipient. Here RFC753 and this proposal complement each other very well.RFC 757 September 1979Implications of an internetwork message environment Page 135. Implications of an internetwork message environment The scheme described above is based upon the assumption that aunique identifier can be assigned to each registered recipient ofmail. Whether or not this uniqueness can be guaranteed in afairly unregulated internetwork environment is questionable. Itis technically feasible, certainly. The difficulties are morepolitical, because it is necessary to gain the cooperation of theadministrators and user populations of foreign networks. Let'sassume cooperation, however, and see what might happen in aninternet environment.5.1 Birthplaces Each set of local networks would have its own database, forease in access. It does not seem practical to register each IDin every database, however. That would be unnecessary, and wouldcreate access and storage problems at the network databases.Here the concept of a "birthplace", or ID origin, may be of use. While an ID does not imply where the user is now, it can say
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -