⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc757.txt

📁 中、英文RFC文档大全打包下载完全版 .
💻 TXT
📖 第 1 页 / 共 3 页
字号:
same way that the ITS mail repeater broadcasts messages addressedto certain mailboxes.)  Special functions might include automatichard-copy  creation  or  reply  generation, processing by variousdaemons, or any other service found desirable by the host's  userpopulation  and  administration.    The implementation of fan-outfunctions is  up  to  the  local  host,  as  are  any  additionalfunctions which the user population might wish of its local "mailroom".    Whatever  services  are  available,  the mail room willdistribute the mail to the correct location for each ID.RFC 757                                            September 1979Names and Addresses                                        Page 72.2.1 Additional delivery options  It may be desirable to allow mail rooms to accept a username inplace  of  an ID.  Use of a username is a less reliable method ofaddressing than use of an ID.   - A username  may  not  be  sufficiently  unambiguous  for     getting an ID and host from the network database.   - Since  a  recipient's  username  may change from time to     time, there is a chance that the  username  supplied  by                                  4     the  sender will be incorrect , or that the host may not     recognize it.     Because a recipient's ID  does  not  change  with  time,     errors  such  as those caused by username changes cannot     occur if IDs are used.  Similarities or ambiguities  can     be discovered before delivery occurs, and the sender can     be prompted for additional identifying information about     his intended recipient.   - In  an  even  worse  case,  a correct username can still     result in an incorrect delivery when it is  paired  with     an  incorrect  host  or  acted upon by a mail forwarding             5     database .     Because unique IDs are unambiguous, the  possibility  of     such a situation is eliminated by the use of unique IDs._______________  4   A particularly insidious source of addressing errors stemsfrom  the  inconsistent  use of (human) names and initials togenerate  usernames.  The  sender  can   easily   guess   hisrecipient's  username incorrectly by using, or failing to usea combination of initials and last name.    (For  example,  auser  wishing  to  address  Jim  Miller at BBNA and using theaddress "Miller@BBNA"  will  have  his  message  successfullydelivered to Duncan Miller at the same site.)  5   The   author  has  observed  a  mail  forwarding  databaseredirect messages  correctly  addressed  to  one  JWalker  todifferent JWalker at another host.RFC 757                                            September 1979Names and Addresses                                        Page 82.2.2 Failures  The case in which the network database is found to be incorrecthas  already been discussed.  It may make sense to mark the entryas "possibly in error" and to notify both  the  network  database                6and the ID owner  when such a situation occurs. In this case maildelivery  to  the  ID's owner will not occur, but this is not toobad, considering that that is what happens today when a host doesnot recognize a username.  One additional failure mode, the loss of the  network  databasefrom  the  net,  must  be considered, even though a well-designeddistributed network database should be robust  enough  to  almostrule out this possibility.  If  such  a failure should occur, the local databases should beable to handle most of the traffic.  What would be  lost  is  theability  to  add  new IDs to the network database, the ability tochange hosts for an ID, the ability to  update  local  databases,and the ability to query the network database.  In essence, therewould be a regression to the state we are in today.  A  well-administered  network  database  should  be  backed  upfrequently.  Should a catastrophic series  of  hardware  failuresremove  one or more of the network database's hosts from the net,the database could be moved  elsewhere.    Such  a  change  wouldentail  notification  of  all  hosts  on  which  mail originates.Software which queries the database should be designed to be ableto easily handle such a move._______________  6   Such notification would presumably  be  by  hardcopy  mail  ortelephone.RFC 757                                            September 1979Relationship to TIP Login database                         Page 93. Relationship to TIP Login database  A  number of references to the TIP Login problem and a databasewhich has been proposed as part of its solution have been made inthis note.  A series of working papers [5] written by Bob Thomas,Paul Santos, and Jack Haverty describe an approach to TIP  Login.In  brief,  the method is to build and maintain a distributed TIPLogin database, containing information necessary to allow  a  newentity  called a "login-host" to decide whether or not to grant auser access to a given TIP, and whether or not to allow the  userto make various modifications to the database itself.  The  TIP  login  database  is derived from a "network user database", which contains information above and beyond that necessaryto support TIP login.  This comprehensive database is designed tosupport applications other than TIP Login, either directly or  bymeans of databases derived from it.  Contained  in  the  TIP  Login  database  are each user's loginstring, a list of TIPs the user  is  authorized  to  access,  theuser's  unique  ID, his password, and any other "permissions" (inaddition to which TIPs may be accessed).  These  permissions  mayindicate  that  the user may create, delete, or modify entries inthe database, to assume other user's roles, and to what extent hemay do so.  The notion  of  permissions  as  developed  by  SteveWarshall is discussed in an NSW memo [2].  It  seems entirely reasonable to derive a netmail database fromthe same comprehensive database that is designed to  support  TIPLogin.  The concept of a unique ID is supported by that database.Much  of  the  required  information  for  a  netmail database isalready included, and the maintenance tools necessary  to  modifyit  seem well-suited for the purpose.  The concept of permissionsextends well to the needs of netmail.   Permissions  specific  tonetwork  mail  might  include, for example, the ability to modifythe delivery host list associated with a given user.  The  mechanisms  necessary   for   the   maintenance   of   thecomprehensive  network database and its derived databases give usa netmail database  very  inexpensively.    This  proposal  takesadvantage of that situation.RFC 757                                            September 1979Relationship to RFC 753                                   Page 104. Relationship to RFC 753  RFC  753 [4] describes an internetwork message delivery system.Very briefly, the approach is to  locate  one  or  more  "messageprocessing  modules"  (or MPMs) on each network.  These MPMs passmessages across network  boundaries,  and  are  also  capable  ofmaking  deliveries  to  users on the local network.  The documentalso details a proposed message format, along  the  envelope  andletter  paradigm.    An external "envelope", read by the deliverysystem, allows the (unread) message to be  correctly  routed  anddelivered  to  the  proper  recipient.  Groups of messages passedbetween a pair of MPMs are sent together in a "mail bag".  This proposal differs from RFC 753  in  that  it  is  primarilyintended  to  operate  within  a  network  or  a concatenation ofnetworks using a common host-host protocol, e.g. TCP.  Where  RFC753   addresses   the   problems  of  internetwork  communication(differing  message  formats,  complex   routing,   and   correctidentification  of  the proper recipient), this note concentratesprimarily on what can be done within a single protocol.  The  twoare not incompatible.  While a general internetwork protocol mustprovide  general  methods  which can be compatible with differenthost-host protocols in different networks,  a  proposal  such  asthis  one  can  capitalize  on  the  capabilities, resources, andpolicies of a given  catenet  (catenated  network)  such  as  theARPAnet/PRnet/SATNET etc.4.1 Compatibility  The delivery system described in RFC 753 is compatible with thesystem  outlined  here.  Let's examine this for each of the threebasic delivery options performed by the MPM.  (In the  discussionthat  follows, "local networks" means a concatenation of networksusing a common host-host protocol, e.g. TCP.   "Foreign  network"means  some  network  which  uses a different host-host protocol,e.g. X.25. (See Figure 4-1.)4.1.1 Outgoing message4.1.1.1 RFC 753  The sender's process hands a message to the local network  MPM.The message may be destined to an address on the local network oron  a  foreign network.  In the former case, the MPM performs thelocal delivery function (see "Incoming message").  In the  lattercase,  the  MPM  passes the message along to another MPM which is"closer" to the end user.RFC 757                                            September 1979Relationship to RFC 753                                   Page 11      +---------+  +----------+      |         |  |          |      | RCC-NET |  | WIDEBAND |                .......      |         |  |   NET    |                .     .      +---------+  |          |                . MPM .              * *  +----------+                .......+---------+   * *   *  *   .......                ||         |   +---------+  .     .           +---------+| BBN-NET |***|         |__. MPM .  .....    |         ||         |   | ARPANET |  .......  .   .xxxx| TELENET |+---------+***|         |***********. G .    |         |              +---------+***        .....    +---------+              * *    *  *   **                            .......       +--------+  +-------+ ***.....    +-------------+  .     .       |        |  |       |    .   .    |             |--. MPM .       | SATNET |  | PRNET |    . G .oooo| DIAL-UP NET |  .......       |        |  |       |    .....    |             |       +--------+  +-------+             +-------------+   "Local Nets", TCP based        |    "Foreign Nets", other (direct addressing using IP)     |     host-host protocols*** = TCP   xxx = X.25   ooo = other communications protocol                        G = gateway              Figure 4-1: The Internet Environment4.1.1.2 This proposal  The  sender's  process  determines the proper host for deliverygiven the recipient's unique ID.  If the message is  destined  tothe  local  network, delivery takes place as described earlier inthis proposal.  If the recipient is not local, the message may bepassed to an MPM for foreign delivery.  (A discussion of internetdelivery which does not  presuppose  RFC  753  implementation  isfound later in this note.)  The  environment  in which the MPM operates does not assume anyknowledge on the part of the local networks about  addressees  onforeign networks.  Thus there are two possibilities which arise:RFC 757                                            September 1979Relationship to RFC 753                                   Page 12   - The recipient has an ID known to the local networks.     In  this  case,  the  local  networks supply the RFC 753     "address".  This can take place in the  local  networks'     MPM or the user's sending or mail creation process.   - The recipient is unknown to the local networks.     Here   the  sender  must  supply  "mailbox"  information     himself, either explicitly or with  help  of  his  local     host's database.  Thus,  outgoing  mail  as  described in this memo is compatiblewith RFC 753, with the benefit of reducing the burden on the  MPMby handling mail deliveries that are local to local networks.4.1.2 Messages in transit  Traffic between two MPMs is not affected by this proposal.4.1.3 Incoming mail  The MPM on the networks local to the recipient will have accessto  the netmail database, allowing it to translate "mailboxes" to"addresses".  It can determine the unique ID of the recipient (ifnot known), and initiate delivery to that recipient.    Here  RFC753 and this proposal complement each other very well.RFC 757                                            September 1979Implications of an internetwork message environment       Page 135. Implications of an internetwork message environment  The  scheme described above is based upon the assumption that aunique identifier can be assigned to each registered recipient ofmail.  Whether or not this uniqueness  can  be  guaranteed  in  afairly  unregulated internetwork environment is questionable.  Itis technically feasible, certainly.  The  difficulties  are  morepolitical, because it is necessary to gain the cooperation of theadministrators  and  user populations of foreign networks.  Let'sassume cooperation, however, and see  what  might  happen  in  aninternet environment.5.1 Birthplaces  Each  set  of  local  networks would have its own database, forease in access.  It does not seem practical to register  each  IDin every database, however.  That would be unnecessary, and wouldcreate  access  and  storage  problems  at the network databases.Here the concept of a "birthplace", or ID origin, may be of use.  While an ID does not imply where the user is now,  it  can  say

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -