7 Network Working Group Internet Engineering Task Force
8 Request for Comments: 1123 R. Braden, Editor
12 Requirements for Internet Hosts -- Application and Support
16 This RFC is an official specification for the Internet community. It
17 incorporates by reference, amends, corrects, and supplements the
18 primary protocol standards documents relating to hosts. Distribution
19 of this document is unlimited.
23 This RFC is one of a pair that defines and discusses the requirements
24 for Internet host software. This RFC covers the application and
25 support protocols; its companion RFC-1122 covers the communication
26 protocol layers: link layer, IP layer, and transport layer.
35 1. INTRODUCTION ............................................... 5
36 1.1 The Internet Architecture .............................. 6
37 1.2 General Considerations ................................. 6
38 1.2.1 Continuing Internet Evolution ..................... 6
39 1.2.2 Robustness Principle .............................. 7
40 1.2.3 Error Logging ..................................... 8
41 1.2.4 Configuration ..................................... 8
42 1.3 Reading this Document .................................. 10
43 1.3.1 Organization ...................................... 10
44 1.3.2 Requirements ...................................... 10
45 1.3.3 Terminology ....................................... 11
46 1.4 Acknowledgments ........................................ 12
48 2. GENERAL ISSUES ............................................. 13
49 2.1 Host Names and Numbers ................................. 13
50 2.2 Using Domain Name Service .............................. 13
51 2.3 Applications on Multihomed hosts ....................... 14
52 2.4 Type-of-Service ........................................ 14
53 2.5 GENERAL APPLICATION REQUIREMENTS SUMMARY ............... 15
58 Internet Engineering Task Force [Page 1]
63 RFC1123 INTRODUCTION October 1989
66 3. REMOTE LOGIN -- TELNET PROTOCOL ............................ 16
67 3.1 INTRODUCTION ........................................... 16
68 3.2 PROTOCOL WALK-THROUGH .................................. 16
69 3.2.1 Option Negotiation ................................ 16
70 3.2.2 Telnet Go-Ahead Function .......................... 16
71 3.2.3 Control Functions ................................. 17
72 3.2.4 Telnet "Synch" Signal ............................. 18
73 3.2.5 NVT Printer and Keyboard .......................... 19
74 3.2.6 Telnet Command Structure .......................... 20
75 3.2.7 Telnet Binary Option .............................. 20
76 3.2.8 Telnet Terminal-Type Option ....................... 20
77 3.3 SPECIFIC ISSUES ........................................ 21
78 3.3.1 Telnet End-of-Line Convention ..................... 21
79 3.3.2 Data Entry Terminals .............................. 23
80 3.3.3 Option Requirements ............................... 24
81 3.3.4 Option Initiation ................................. 24
82 3.3.5 Telnet Linemode Option ............................ 25
83 3.4 TELNET/USER INTERFACE .................................. 25
84 3.4.1 Character Set Transparency ........................ 25
85 3.4.2 Telnet Commands ................................... 26
86 3.4.3 TCP Connection Errors ............................. 26
87 3.4.4 Non-Default Telnet Contact Port ................... 26
88 3.4.5 Flushing Output ................................... 26
89 3.5. TELNET REQUIREMENTS SUMMARY ........................... 27
91 4. FILE TRANSFER .............................................. 29
92 4.1 FILE TRANSFER PROTOCOL -- FTP .......................... 29
93 4.1.1 INTRODUCTION ...................................... 29
94 4.1.2. PROTOCOL WALK-THROUGH ............................ 29
95 4.1.2.1 LOCAL Type ................................... 29
96 4.1.2.2 Telnet Format Control ........................ 30
97 4.1.2.3 Page Structure ............................... 30
98 4.1.2.4 Data Structure Transformations ............... 30
99 4.1.2.5 Data Connection Management ................... 31
100 4.1.2.6 PASV Command ................................. 31
101 4.1.2.7 LIST and NLST Commands ....................... 31
102 4.1.2.8 SITE Command ................................. 32
103 4.1.2.9 STOU Command ................................. 32
104 4.1.2.10 Telnet End-of-line Code ..................... 32
105 4.1.2.11 FTP Replies ................................. 33
106 4.1.2.12 Connections ................................. 34
107 4.1.2.13 Minimum Implementation; RFC-959 Section ..... 34
108 4.1.3 SPECIFIC ISSUES ................................... 35
109 4.1.3.1 Non-standard Command Verbs ................... 35
110 4.1.3.2 Idle Timeout ................................. 36
111 4.1.3.3 Concurrency of Data and Control .............. 36
112 4.1.3.4 FTP Restart Mechanism ........................ 36
113 4.1.4 FTP/USER INTERFACE ................................ 39
117 Internet Engineering Task Force [Page 2]
122 RFC1123 INTRODUCTION October 1989
125 4.1.4.1 Pathname Specification ....................... 39
126 4.1.4.2 "QUOTE" Command .............................. 40
127 4.1.4.3 Displaying Replies to User ................... 40
128 4.1.4.4 Maintaining Synchronization .................. 40
129 4.1.5 FTP REQUIREMENTS SUMMARY ......................... 41
130 4.2 TRIVIAL FILE TRANSFER PROTOCOL -- TFTP ................. 44
131 4.2.1 INTRODUCTION ...................................... 44
132 4.2.2 PROTOCOL WALK-THROUGH ............................. 44
133 4.2.2.1 Transfer Modes ............................... 44
134 4.2.2.2 UDP Header ................................... 44
135 4.2.3 SPECIFIC ISSUES ................................... 44
136 4.2.3.1 Sorcerer's Apprentice Syndrome ............... 44
137 4.2.3.2 Timeout Algorithms ........................... 46
138 4.2.3.3 Extensions ................................... 46
139 4.2.3.4 Access Control ............................... 46
140 4.2.3.5 Broadcast Request ............................ 46
141 4.2.4 TFTP REQUIREMENTS SUMMARY ......................... 47
143 5. ELECTRONIC MAIL -- SMTP and RFC-822 ........................ 48
144 5.1 INTRODUCTION ........................................... 48
145 5.2 PROTOCOL WALK-THROUGH .................................. 48
146 5.2.1 The SMTP Model .................................... 48
147 5.2.2 Canonicalization .................................. 49
148 5.2.3 VRFY and EXPN Commands ............................ 50
149 5.2.4 SEND, SOML, and SAML Commands ..................... 50
150 5.2.5 HELO Command ...................................... 50
151 5.2.6 Mail Relay ........................................ 51
152 5.2.7 RCPT Command ...................................... 52
153 5.2.8 DATA Command ...................................... 53
154 5.2.9 Command Syntax .................................... 54
155 5.2.10 SMTP Replies ..................................... 54
156 5.2.11 Transparency ..................................... 55
157 5.2.12 WKS Use in MX Processing ......................... 55
158 5.2.13 RFC-822 Message Specification .................... 55
159 5.2.14 RFC-822 Date and Time Specification .............. 55
160 5.2.15 RFC-822 Syntax Change ............................ 56
161 5.2.16 RFC-822 Local-part .............................. 56
162 5.2.17 Domain Literals .................................. 57
163 5.2.18 Common Address Formatting Errors ................. 58
164 5.2.19 Explicit Source Routes ........................... 58
165 5.3 SPECIFIC ISSUES ........................................ 59
166 5.3.1 SMTP Queueing Strategies .......................... 59
167 5.3.1.1 Sending Strategy .............................. 59
168 5.3.1.2 Receiving strategy ........................... 61
169 5.3.2 Timeouts in SMTP .................................. 61
170 5.3.3 Reliable Mail Receipt ............................. 63
171 5.3.4 Reliable Mail Transmission ........................ 63
172 5.3.5 Domain Name Support ............................... 65
176 Internet Engineering Task Force [Page 3]
181 RFC1123 INTRODUCTION October 1989
184 5.3.6 Mailing Lists and Aliases ......................... 65
185 5.3.7 Mail Gatewaying ................................... 66
186 5.3.8 Maximum Message Size .............................. 68
187 5.4 SMTP REQUIREMENTS SUMMARY .............................. 69
189 6. SUPPORT SERVICES ............................................ 72
190 6.1 DOMAIN NAME TRANSLATION ................................. 72
191 6.1.1 INTRODUCTION ....................................... 72
192 6.1.2 PROTOCOL WALK-THROUGH ............................. 72
193 6.1.2.1 Resource Records with Zero TTL ............... 73
194 6.1.2.2 QCLASS Values ................................ 73
195 6.1.2.3 Unused Fields ................................ 73
196 6.1.2.4 Compression .................................. 73
197 6.1.2.5 Misusing Configuration Info .................. 73
198 6.1.3 SPECIFIC ISSUES ................................... 74
199 6.1.3.1 Resolver Implementation ...................... 74
200 6.1.3.2 Transport Protocols .......................... 75
201 6.1.3.3 Efficient Resource Usage ..................... 77
202 6.1.3.4 Multihomed Hosts ............................. 78
203 6.1.3.5 Extensibility ................................ 79
204 6.1.3.6 Status of RR Types ........................... 79
205 6.1.3.7 Robustness ................................... 80
206 6.1.3.8 Local Host Table ............................. 80
207 6.1.4 DNS USER INTERFACE ................................ 81
208 6.1.4.1 DNS Administration ........................... 81
209 6.1.4.2 DNS User Interface ........................... 81
210 6.1.4.3 Interface Abbreviation Facilities ............. 82
211 6.1.5 DOMAIN NAME SYSTEM REQUIREMENTS SUMMARY ........... 84
212 6.2 HOST INITIALIZATION .................................... 87
213 6.2.1 INTRODUCTION ...................................... 87
214 6.2.2 REQUIREMENTS ...................................... 87
215 6.2.2.1 Dynamic Configuration ........................ 87
216 6.2.2.2 Loading Phase ................................ 89
217 6.3 REMOTE MANAGEMENT ...................................... 90
218 6.3.1 INTRODUCTION ...................................... 90
219 6.3.2 PROTOCOL WALK-THROUGH ............................. 90
220 6.3.3 MANAGEMENT REQUIREMENTS SUMMARY ................... 92
222 7. REFERENCES ................................................. 93
235 Internet Engineering Task Force [Page 4]
240 RFC1123 INTRODUCTION October 1989
245 This document is one of a pair that defines and discusses the
246 requirements for host system implementations of the Internet protocol
247 suite. This RFC covers the applications layer and support protocols.
248 Its companion RFC, "Requirements for Internet Hosts -- Communications
249 Layers" [INTRO:1] covers the lower layer protocols: transport layer,
250 IP layer, and link layer.
252 These documents are intended to provide guidance for vendors,
253 implementors, and users of Internet communication software. They
254 represent the consensus of a large body of technical experience and
255 wisdom, contributed by members of the Internet research and vendor
258 This RFC enumerates standard protocols that a host connected to the
259 Internet must use, and it incorporates by reference the RFCs and
260 other documents describing the current specifications for these
261 protocols. It corrects errors in the referenced documents and adds
262 additional discussion and guidance for an implementor.
264 For each protocol, this document also contains an explicit set of
265 requirements, recommendations, and options. The reader must
266 understand that the list of requirements in this document is
267 incomplete by itself; the complete set of requirements for an
268 Internet host is primarily defined in the standard protocol
269 specification documents, with the corrections, amendments, and
270 supplements contained in this RFC.
272 A good-faith implementation of the protocols that was produced after
273 careful reading of the RFC's and with some interaction with the
274 Internet technical community, and that followed good communications
275 software engineering practices, should differ from the requirements
276 of this document in only minor ways. Thus, in many cases, the
277 "requirements" in this RFC are already stated or implied in the
278 standard protocol documents, so that their inclusion here is, in a
279 sense, redundant. However, they were included because some past
280 implementation has made the wrong choice, causing problems of
281 interoperability, performance, and/or robustness.
283 This document includes discussion and explanation of many of the
284 requirements and recommendations. A simple list of requirements
285 would be dangerous, because:
287 o Some required features are more important than others, and some
288 features are optional.
290 o There may be valid reasons why particular vendor products that
294 Internet Engineering Task Force [Page 5]
299 RFC1123 INTRODUCTION October 1989
302 are designed for restricted contexts might choose to use
303 different specifications.
305 However, the specifications of this document must be followed to meet
306 the general goal of arbitrary host interoperation across the
307 diversity and complexity of the Internet system. Although most
308 current implementations fail to meet these requirements in various
309 ways, some minor and some major, this specification is the ideal
310 towards which we need to move.
312 These requirements are based on the current level of Internet
313 architecture. This document will be updated as required to provide
314 additional clarifications or to include additional information in
315 those areas in which specifications are still evolving.
317 This introductory section begins with general advice to host software
318 vendors, and then gives some guidance on reading the rest of the
319 document. Section 2 contains general requirements that may be
320 applicable to all application and support protocols. Sections 3, 4,
321 and 5 contain the requirements on protocols for the three major
322 applications: Telnet, file transfer, and electronic mail,
323 respectively. Section 6 covers the support applications: the domain
324 name system, system initialization, and management. Finally, all
325 references will be found in Section 7.
327 1.1 The Internet Architecture
329 For a brief introduction to the Internet architecture from a host
330 viewpoint, see Section 1.1 of [INTRO:1]. That section also
331 contains recommended references for general background on the
332 Internet architecture.
334 1.2 General Considerations
336 There are two important lessons that vendors of Internet host
337 software have learned and which a new vendor should consider
340 1.2.1 Continuing Internet Evolution
342 The enormous growth of the Internet has revealed problems of
343 management and scaling in a large datagram-based packet
344 communication system. These problems are being addressed, and
345 as a result there will be continuing evolution of the
346 specifications described in this document. These changes will
347 be carefully planned and controlled, since there is extensive
348 participation in this planning by the vendors and by the
349 organizations responsible for operations of the networks.
353 Internet Engineering Task Force [Page 6]
358 RFC1123 INTRODUCTION October 1989
361 Development, evolution, and revision are characteristic of
362 computer network protocols today, and this situation will
363 persist for some years. A vendor who develops computer
364 communication software for the Internet protocol suite (or any
365 other protocol suite!) and then fails to maintain and update
366 that software for changing specifications is going to leave a
367 trail of unhappy customers. The Internet is a large
368 communication network, and the users are in constant contact
369 through it. Experience has shown that knowledge of
370 deficiencies in vendor software propagates quickly through the
371 Internet technical community.
373 1.2.2 Robustness Principle
375 At every layer of the protocols, there is a general rule whose
376 application can lead to enormous benefits in robustness and
379 "Be liberal in what you accept, and
380 conservative in what you send"
382 Software should be written to deal with every conceivable
383 error, no matter how unlikely; sooner or later a packet will
384 come in with that particular combination of errors and
385 attributes, and unless the software is prepared, chaos can
386 ensue. In general, it is best to assume that the network is
387 filled with malevolent entities that will send in packets
388 designed to have the worst possible effect. This assumption
389 will lead to suitable protective design, although the most
390 serious problems in the Internet have been caused by
391 unenvisaged mechanisms triggered by low-probability events;
392 mere human malice would never have taken so devious a course!
394 Adaptability to change must be designed into all levels of
395 Internet host software. As a simple example, consider a
396 protocol specification that contains an enumeration of values
397 for a particular header field -- e.g., a type field, a port
398 number, or an error code; this enumeration must be assumed to
399 be incomplete. Thus, if a protocol specification defines four
400 possible error codes, the software must not break when a fifth
401 code shows up. An undefined code might be logged (see below),
402 but it must not cause a failure.
404 The second part of the principle is almost as important:
405 software on other hosts may contain deficiencies that make it
406 unwise to exploit legal but obscure protocol features. It is
407 unwise to stray far from the obvious and simple, lest untoward
408 effects result elsewhere. A corollary of this is "watch out
412 Internet Engineering Task Force [Page 7]
417 RFC1123 INTRODUCTION October 1989
420 for misbehaving hosts"; host software should be prepared, not
421 just to survive other misbehaving hosts, but also to cooperate
422 to limit the amount of disruption such hosts can cause to the
423 shared communication facility.
427 The Internet includes a great variety of host and gateway
428 systems, each implementing many protocols and protocol layers,
429 and some of these contain bugs and mis-features in their
430 Internet protocol software. As a result of complexity,
431 diversity, and distribution of function, the diagnosis of user
432 problems is often very difficult.
434 Problem diagnosis will be aided if host implementations include
435 a carefully designed facility for logging erroneous or
436 "strange" protocol events. It is important to include as much
437 diagnostic information as possible when an error is logged. In
438 particular, it is often useful to record the header(s) of a
439 packet that caused an error. However, care must be taken to
440 ensure that error logging does not consume prohibitive amounts
441 of resources or otherwise interfere with the operation of the
444 There is a tendency for abnormal but harmless protocol events
445 to overflow error logging files; this can be avoided by using a
446 "circular" log, or by enabling logging only while diagnosing a
447 known failure. It may be useful to filter and count duplicate
448 successive messages. One strategy that seems to work well is:
449 (1) always count abnormalities and make such counts accessible
450 through the management protocol (see Section 6.3); and (2)
451 allow the logging of a great variety of events to be
452 selectively enabled. For example, it might useful to be able
453 to "log everything" or to "log everything for host X".
455 Note that different managements may have differing policies
456 about the amount of error logging that they want normally
457 enabled in a host. Some will say, "if it doesn't hurt me, I
458 don't want to know about it", while others will want to take a
459 more watchful and aggressive attitude about detecting and
460 removing protocol abnormalities.
464 It would be ideal if a host implementation of the Internet
465 protocol suite could be entirely self-configuring. This would
466 allow the whole suite to be implemented in ROM or cast into
467 silicon, it would simplify diskless workstations, and it would
471 Internet Engineering Task Force [Page 8]
476 RFC1123 INTRODUCTION October 1989
479 be an immense boon to harried LAN administrators as well as
480 system vendors. We have not reached this ideal; in fact, we
483 At many points in this document, you will find a requirement
484 that a parameter be a configurable option. There are several
485 different reasons behind such requirements. In a few cases,
486 there is current uncertainty or disagreement about the best
487 value, and it may be necessary to update the recommended value
488 in the future. In other cases, the value really depends on
489 external factors -- e.g., the size of the host and the
490 distribution of its communication load, or the speeds and
491 topology of nearby networks -- and self-tuning algorithms are
492 unavailable and may be insufficient. In some cases,
493 configurability is needed because of administrative
496 Finally, some configuration options are required to communicate
497 with obsolete or incorrect implementations of the protocols,
498 distributed without sources, that unfortunately persist in many
499 parts of the Internet. To make correct systems coexist with
500 these faulty systems, administrators often have to "mis-
501 configure" the correct systems. This problem will correct
502 itself gradually as the faulty systems are retired, but it
503 cannot be ignored by vendors.
505 When we say that a parameter must be configurable, we do not
506 intend to require that its value be explicitly read from a
507 configuration file at every boot time. We recommend that
508 implementors set up a default for each parameter, so a
509 configuration file is only necessary to override those defaults
510 that are inappropriate in a particular installation. Thus, the
511 configurability requirement is an assurance that it will be
512 POSSIBLE to override the default when necessary, even in a
513 binary-only or ROM-based product.
515 This document requires a particular value for such defaults in
516 some cases. The choice of default is a sensitive issue when
517 the configuration item controls the accommodation to existing
518 faulty systems. If the Internet is to converge successfully to
519 complete interoperability, the default values built into
520 implementations must implement the official protocol, not
521 "mis-configurations" to accommodate faulty implementations.
522 Although marketing considerations have led some vendors to
523 choose mis-configuration defaults, we urge vendors to choose
524 defaults that will conform to the standard.
526 Finally, we note that a vendor needs to provide adequate
530 Internet Engineering Task Force [Page 9]
535 RFC1123 INTRODUCTION October 1989
538 documentation on all configuration parameters, their limits and
542 1.3 Reading this Document
546 In general, each major section is organized into the following
551 (2) Protocol Walk-Through -- considers the protocol
552 specification documents section-by-section, correcting
553 errors, stating requirements that may be ambiguous or
554 ill-defined, and providing further clarification or
557 (3) Specific Issues -- discusses protocol design and
558 implementation issues that were not included in the walk-
561 (4) Interfaces -- discusses the service interface to the next
564 (5) Summary -- contains a summary of the requirements of the
567 Under many of the individual topics in this document, there is
568 parenthetical material labeled "DISCUSSION" or
569 "IMPLEMENTATION". This material is intended to give
570 clarification and explanation of the preceding requirements
571 text. It also includes some suggestions on possible future
572 directions or developments. The implementation material
573 contains suggested approaches that an implementor may want to
576 The summary sections are intended to be guides and indexes to
577 the text, but are necessarily cryptic and incomplete. The
578 summaries should never be used or referenced separately from
583 In this document, the words that are used to define the
584 significance of each particular requirement are capitalized.
589 Internet Engineering Task Force [Page 10]
594 RFC1123 INTRODUCTION October 1989
599 This word or the adjective "REQUIRED" means that the item
600 is an absolute requirement of the specification.
604 This word or the adjective "RECOMMENDED" means that there
605 may exist valid reasons in particular circumstances to
606 ignore this item, but the full implications should be
607 understood and the case carefully weighed before choosing
612 This word or the adjective "OPTIONAL" means that this item
613 is truly optional. One vendor may choose to include the
614 item because a particular marketplace requires it or
615 because it enhances the product, for example; another
616 vendor may omit the same item.
619 An implementation is not compliant if it fails to satisfy one
620 or more of the MUST requirements for the protocols it
621 implements. An implementation that satisfies all the MUST and
622 all the SHOULD requirements for its protocols is said to be
623 "unconditionally compliant"; one that satisfies all the MUST
624 requirements but not all the SHOULD requirements for its
625 protocols is said to be "conditionally compliant".
629 This document uses the following technical terms:
632 A segment is the unit of end-to-end transmission in the
633 TCP protocol. A segment consists of a TCP header followed
634 by application data. A segment is transmitted by
635 encapsulation in an IP datagram.
638 This term is used by some application layer protocols
639 (particularly SMTP) for an application data unit.
642 A [UDP] datagram is the unit of end-to-end transmission in
648 Internet Engineering Task Force [Page 11]
653 RFC1123 INTRODUCTION October 1989
657 A host is said to be multihomed if it has multiple IP
658 addresses to connected networks.
664 This document incorporates contributions and comments from a large
665 group of Internet protocol experts, including representatives of
666 university and research labs, vendors, and government agencies.
667 It was assembled primarily by the Host Requirements Working Group
668 of the Internet Engineering Task Force (IETF).
670 The Editor would especially like to acknowledge the tireless
671 dedication of the following people, who attended many long
672 meetings and generated 3 million bytes of electronic mail over the
673 past 18 months in pursuit of this document: Philip Almquist, Dave
674 Borman (Cray Research), Noel Chiappa, Dave Crocker (DEC), Steve
675 Deering (Stanford), Mike Karels (Berkeley), Phil Karn (Bellcore),
676 John Lekashman (NASA), Charles Lynn (BBN), Keith McCloghrie (TWG),
677 Paul Mockapetris (ISI), Thomas Narten (Purdue), Craig Partridge
678 (BBN), Drew Perkins (CMU), and James Van Bokkelen (FTP Software).
680 In addition, the following people made major contributions to the
681 effort: Bill Barns (Mitre), Steve Bellovin (AT&T), Mike Brescia
682 (BBN), Ed Cain (DCA), Annette DeSchon (ISI), Martin Gross (DCA),
683 Phill Gross (NRI), Charles Hedrick (Rutgers), Van Jacobson (LBL),
684 John Klensin (MIT), Mark Lottor (SRI), Milo Medin (NASA), Bill
685 Melohn (Sun Microsystems), Greg Minshall (Kinetics), Jeff Mogul
686 (DEC), John Mullen (CMC), Jon Postel (ISI), John Romkey (Epilogue
687 Technology), and Mike StJohns (DCA). The following also made
688 significant contributions to particular areas: Eric Allman
689 (Berkeley), Rob Austein (MIT), Art Berggreen (ACC), Keith Bostic
690 (Berkeley), Vint Cerf (NRI), Wayne Hathaway (NASA), Matt Korn
691 (IBM), Erik Naggum (Naggum Software, Norway), Robert Ullmann
692 (Prime Computer), David Waitzman (BBN), Frank Wancho (USA), Arun
693 Welch (Ohio State), Bill Westfield (Cisco), and Rayan Zachariassen
696 We are grateful to all, including any contributors who may have
697 been inadvertently omitted from this list.
707 Internet Engineering Task Force [Page 12]
712 RFC1123 APPLICATIONS LAYER -- GENERAL October 1989
717 This section contains general requirements that may be applicable to
718 all application-layer protocols.
720 2.1 Host Names and Numbers
722 The syntax of a legal Internet host name was specified in RFC-952
723 [DNS:4]. One aspect of host name syntax is hereby changed: the
724 restriction on the first character is relaxed to allow either a
725 letter or a digit. Host software MUST support this more liberal
728 Host software MUST handle host names of up to 63 characters and
729 SHOULD handle host names of up to 255 characters.
731 Whenever a user inputs the identity of an Internet host, it SHOULD
732 be possible to enter either (1) a host domain name or (2) an IP
733 address in dotted-decimal ("#.#.#.#") form. The host SHOULD check
734 the string syntactically for a dotted-decimal number before
735 looking it up in the Domain Name System.
738 This last requirement is not intended to specify the complete
739 syntactic form for entering a dotted-decimal host number;
740 that is considered to be a user-interface issue. For
741 example, a dotted-decimal number must be enclosed within
742 "[ ]" brackets for SMTP mail (see Section 5.2.17). This
743 notation could be made universal within a host system,
744 simplifying the syntactic checking for a dotted-decimal
747 If a dotted-decimal number can be entered without such
748 identifying delimiters, then a full syntactic check must be
749 made, because a segment of a host domain name is now allowed
750 to begin with a digit and could legally be entirely numeric
751 (see Section 6.1.2.4). However, a valid host name can never
752 have the dotted-decimal form #.#.#.#, since at least the
753 highest-level component label will be alphabetic.
755 2.2 Using Domain Name Service
757 Host domain names MUST be translated to IP addresses as described
760 Applications using domain name services MUST be able to cope with
761 soft error conditions. Applications MUST wait a reasonable
762 interval between successive retries due to a soft error, and MUST
766 Internet Engineering Task Force [Page 13]
771 RFC1123 APPLICATIONS LAYER -- GENERAL October 1989
774 allow for the possibility that network problems may deny service
775 for hours or even days.
777 An application SHOULD NOT rely on the ability to locate a WKS
778 record containing an accurate listing of all services at a
779 particular host address, since the WKS RR type is not often used
780 by Internet sites. To confirm that a service is present, simply
783 2.3 Applications on Multihomed hosts
785 When the remote host is multihomed, the name-to-address
786 translation will return a list of alternative IP addresses. As
787 specified in Section 6.1.3.4, this list should be in order of
788 decreasing preference. Application protocol implementations
789 SHOULD be prepared to try multiple addresses from the list until
790 success is obtained. More specific requirements for SMTP are
791 given in Section 5.3.4.
793 When the local host is multihomed, a UDP-based request/response
794 application SHOULD send the response with an IP source address
795 that is the same as the specific destination address of the UDP
796 request datagram. The "specific destination address" is defined
797 in the "IP Addressing" section of the companion RFC [INTRO:1].
799 Similarly, a server application that opens multiple TCP
800 connections to the same client SHOULD use the same local IP
805 Applications MUST select appropriate TOS values when they invoke
806 transport layer services, and these values MUST be configurable.
807 Note that a TOS value contains 5 bits, of which only the most-
808 significant 3 bits are currently defined; the other two bits MUST
812 As gateway algorithms are developed to implement Type-of-
813 Service, the recommended values for various application
814 protocols may change. In addition, it is likely that
815 particular combinations of users and Internet paths will want
816 non-standard TOS values. For these reasons, the TOS values
817 must be configurable.
819 See the latest version of the "Assigned Numbers" RFC
820 [INTRO:5] for the recommended TOS values for the major
821 application protocols.
825 Internet Engineering Task Force [Page 14]
830 RFC1123 APPLICATIONS LAYER -- GENERAL October 1989
833 2.5 GENERAL APPLICATION REQUIREMENTS SUMMARY
844 FEATURE |SECTION | | | |T|T|e
845 -----------------------------------------------|----------|-|-|-|-|-|--
847 User interfaces: | | | | | | |
848 Allow host name to begin with digit |2.1 |x| | | | |
849 Host names of up to 635 characters |2.1 |x| | | | |
850 Host names of up to 255 characters |2.1 | |x| | | |
851 Support dotted-decimal host numbers |2.1 | |x| | | |
852 Check syntactically for dotted-dec first |2.1 | |x| | | |
854 Map domain names per Section 6.1 |2.2 |x| | | | |
855 Cope with soft DNS errors |2.2 |x| | | | |
856 Reasonable interval between retries |2.2 |x| | | | |
857 Allow for long outages |2.2 |x| | | | |
858 Expect WKS records to be available |2.2 | | | |x| |
860 Try multiple addr's for remote multihomed host |2.3 | |x| | | |
861 UDP reply src addr is specific dest of request |2.3 | |x| | | |
862 Use same IP addr for related TCP connections |2.3 | |x| | | |
863 Specify appropriate TOS values |2.4 |x| | | | |
864 TOS values configurable |2.4 |x| | | | |
865 Unused TOS bits zero |2.4 |x| | | | |
884 Internet Engineering Task Force [Page 15]
889 RFC1123 REMOTE LOGIN -- TELNET October 1989
892 3. REMOTE LOGIN -- TELNET PROTOCOL
896 Telnet is the standard Internet application protocol for remote
897 login. It provides the encoding rules to link a user's
898 keyboard/display on a client ("user") system with a command
899 interpreter on a remote server system. A subset of the Telnet
900 protocol is also incorporated within other application protocols,
903 Telnet uses a single TCP connection, and its normal data stream
904 ("Network Virtual Terminal" or "NVT" mode) is 7-bit ASCII with
905 escape sequences to embed control functions. Telnet also allows
906 the negotiation of many optional modes and functions.
908 The primary Telnet specification is to be found in RFC-854
909 [TELNET:1], while the options are defined in many other RFCs; see
910 Section 7 for references.
912 3.2 PROTOCOL WALK-THROUGH
914 3.2.1 Option Negotiation: RFC-854, pp. 2-3
916 Every Telnet implementation MUST include option negotiation and
917 subnegotiation machinery [TELNET:2].
919 A host MUST carefully follow the rules of RFC-854 to avoid
920 option-negotiation loops. A host MUST refuse (i.e, reply
921 WONT/DONT to a DO/WILL) an unsupported option. Option
922 negotiation SHOULD continue to function (even if all requests
923 are refused) throughout the lifetime of a Telnet connection.
925 If all option negotiations fail, a Telnet implementation MUST
926 default to, and support, an NVT.
929 Even though more sophisticated "terminals" and supporting
930 option negotiations are becoming the norm, all
931 implementations must be prepared to support an NVT for any
932 user-server communication.
934 3.2.2 Telnet Go-Ahead Function: RFC-854, p. 5, and RFC-858
936 On a host that never sends the Telnet command Go Ahead (GA),
937 the Telnet Server MUST attempt to negotiate the Suppress Go
938 Ahead option (i.e., send "WILL Suppress Go Ahead"). A User or
939 Server Telnet MUST always accept negotiation of the Suppress Go
943 Internet Engineering Task Force [Page 16]
948 RFC1123 REMOTE LOGIN -- TELNET October 1989
953 When it is driving a full-duplex terminal for which GA has no
954 meaning, a User Telnet implementation MAY ignore GA commands.
957 Half-duplex ("locked-keyboard") line-at-a-time terminals
958 for which the Go-Ahead mechanism was designed have largely
959 disappeared from the scene. It turned out to be difficult
960 to implement sending the Go-Ahead signal in many operating
961 systems, even some systems that support native half-duplex
962 terminals. The difficulty is typically that the Telnet
963 server code does not have access to information about
964 whether the user process is blocked awaiting input from
965 the Telnet connection, i.e., it cannot reliably determine
966 when to send a GA command. Therefore, most Telnet Server
967 hosts do not send GA commands.
969 The effect of the rules in this section is to allow either
970 end of a Telnet connection to veto the use of GA commands.
972 There is a class of half-duplex terminals that is still
973 commercially important: "data entry terminals," which
974 interact in a full-screen manner. However, supporting
975 data entry terminals using the Telnet protocol does not
976 require the Go Ahead signal; see Section 3.3.2.
978 3.2.3 Control Functions: RFC-854, pp. 7-8
980 The list of Telnet commands has been extended to include EOR
981 (End-of-Record), with code 239 [TELNET:9].
983 Both User and Server Telnets MAY support the control functions
984 EOR, EC, EL, and Break, and MUST support AO, AYT, DM, IP, NOP,
987 A host MUST be able to receive and ignore any Telnet control
988 functions that it does not support.
991 Note that a Server Telnet is required to support the
992 Telnet IP (Interrupt Process) function, even if the server
993 host has an equivalent in-stream function (e.g., Control-C
994 in many systems). The Telnet IP function may be stronger
995 than an in-stream interrupt command, because of the out-
996 of-band effect of TCP urgent data.
998 The EOR control function may be used to delimit the
1002 Internet Engineering Task Force [Page 17]
1007 RFC1123 REMOTE LOGIN -- TELNET October 1989
1010 stream. An important application is data entry terminal
1011 support (see Section 3.3.2). There was concern that since
1012 EOR had not been defined in RFC-854, a host that was not
1013 prepared to correctly ignore unknown Telnet commands might
1014 crash if it received an EOR. To protect such hosts, the
1015 End-of-Record option [TELNET:9] was introduced; however, a
1016 properly implemented Telnet program will not require this
1019 3.2.4 Telnet "Synch" Signal: RFC-854, pp. 8-10
1021 When it receives "urgent" TCP data, a User or Server Telnet
1022 MUST discard all data except Telnet commands until the DM (and
1023 end of urgent) is reached.
1025 When it sends Telnet IP (Interrupt Process), a User Telnet
1026 SHOULD follow it by the Telnet "Synch" sequence, i.e., send as
1027 TCP urgent data the sequence "IAC IP IAC DM". The TCP urgent
1028 pointer points to the DM octet.
1030 When it receives a Telnet IP command, a Server Telnet MAY send
1031 a Telnet "Synch" sequence back to the user, to flush the output
1032 stream. The choice ought to be consistent with the way the
1033 server operating system behaves when a local user interrupts a
1036 When it receives a Telnet AO command, a Server Telnet MUST send
1037 a Telnet "Synch" sequence back to the user, to flush the output
1040 A User Telnet SHOULD have the capability of flushing output
1041 when it sends a Telnet IP; see also Section 3.4.5.
1044 There are three possible ways for a User Telnet to flush
1045 the stream of server output data:
1047 (1) Send AO after IP.
1049 This will cause the server host to send a "flush-
1050 buffered-output" signal to its operating system.
1051 However, the AO may not take effect locally, i.e.,
1052 stop terminal output at the User Telnet end, until
1053 the Server Telnet has received and processed the AO
1054 and has sent back a "Synch".
1056 (2) Send DO TIMING-MARK [TELNET:7] after IP, and discard
1057 all output locally until a WILL/WONT TIMING-MARK is
1061 Internet Engineering Task Force [Page 18]
1066 RFC1123 REMOTE LOGIN -- TELNET October 1989
1069 received from the Server Telnet.
1071 Since the DO TIMING-MARK will be processed after the
1072 IP at the server, the reply to it should be in the
1073 right place in the output data stream. However, the
1074 TIMING-MARK will not send a "flush buffered output"
1075 signal to the server operating system. Whether or
1076 not this is needed is dependent upon the server
1081 The best method is not entirely clear, since it must
1082 accommodate a number of existing server hosts that do not
1083 follow the Telnet standards in various ways. The safest
1084 approach is probably to provide a user-controllable option
1085 to select (1), (2), or (3).
1087 3.2.5 NVT Printer and Keyboard: RFC-854, p. 11
1089 In NVT mode, a Telnet SHOULD NOT send characters with the
1090 high-order bit 1, and MUST NOT send it as a parity bit.
1091 Implementations that pass the high-order bit to applications
1092 SHOULD negotiate binary mode (see Section 3.2.6).
1096 Implementors should be aware that a strict reading of
1097 RFC-854 allows a client or server expecting NVT ASCII to
1098 ignore characters with the high-order bit set. In
1099 general, binary mode is expected to be used for
1100 transmission of an extended (beyond 7-bit) character set
1103 However, there exist applications that really need an 8-
1104 bit NVT mode, which is currently not defined, and these
1105 existing applications do set the high-order bit during
1106 part or all of the life of a Telnet connection. Note that
1107 binary mode is not the same as 8-bit NVT mode, since
1108 binary mode turns off end-of-line processing. For this
1109 reason, the requirements on the high-order bit are stated
1110 as SHOULD, not MUST.
1112 RFC-854 defines a minimal set of properties of a "network
1113 virtual terminal" or NVT; this is not meant to preclude
1114 additional features in a real terminal. A Telnet
1115 connection is fully transparent to all 7-bit ASCII
1116 characters, including arbitrary ASCII control characters.
1120 Internet Engineering Task Force [Page 19]
1125 RFC1123 REMOTE LOGIN -- TELNET October 1989
1128 For example, a terminal might support full-screen commands
1129 coded as ASCII escape sequences; a Telnet implementation
1130 would pass these sequences as uninterpreted data. Thus,
1131 an NVT should not be conceived as a terminal type of a
1132 highly-restricted device.
1134 3.2.6 Telnet Command Structure: RFC-854, p. 13
1136 Since options may appear at any point in the data stream, a
1137 Telnet escape character (known as IAC, with the value 255) to
1138 be sent as data MUST be doubled.
1140 3.2.7 Telnet Binary Option: RFC-856
1142 When the Binary option has been successfully negotiated,
1143 arbitrary 8-bit characters are allowed. However, the data
1144 stream MUST still be scanned for IAC characters, any embedded
1145 Telnet commands MUST be obeyed, and data bytes equal to IAC
1146 MUST be doubled. Other character processing (e.g., replacing
1147 CR by CR NUL or by CR LF) MUST NOT be done. In particular,
1148 there is no end-of-line convention (see Section 3.3.1) in
1152 The Binary option is normally negotiated in both
1153 directions, to change the Telnet connection from NVT mode
1156 The sequence IAC EOR can be used to delimit blocks of data
1157 within a binary-mode Telnet stream.
1159 3.2.8 Telnet Terminal-Type Option: RFC-1091
1161 The Terminal-Type option MUST use the terminal type names
1162 officially defined in the Assigned Numbers RFC [INTRO:5], when
1163 they are available for the particular terminal. However, the
1164 receiver of a Terminal-Type option MUST accept any name.
1167 RFC-1091 [TELNET:10] updates an earlier version of the
1168 Terminal-Type option defined in RFC-930. The earlier
1169 version allowed a server host capable of supporting
1170 multiple terminal types to learn the type of a particular
1171 client's terminal, assuming that each physical terminal
1172 had an intrinsic type. However, today a "terminal" is
1173 often really a terminal emulator program running in a PC,
1174 perhaps capable of emulating a range of terminal types.
1175 Therefore, RFC-1091 extends the specification to allow a
1179 Internet Engineering Task Force [Page 20]
1184 RFC1123 REMOTE LOGIN -- TELNET October 1989
1187 more general terminal-type negotiation between User and
1192 3.3.1 Telnet End-of-Line Convention
1194 The Telnet protocol defines the sequence CR LF to mean "end-
1195 of-line". For terminal input, this corresponds to a command-
1196 completion or "end-of-line" key being pressed on a user
1197 terminal; on an ASCII terminal, this is the CR key, but it may
1198 also be labelled "Return" or "Enter".
1200 When a Server Telnet receives the Telnet end-of-line sequence
1201 CR LF as input from a remote terminal, the effect MUST be the
1202 same as if the user had pressed the "end-of-line" key on a
1203 local terminal. On server hosts that use ASCII, in particular,
1204 receipt of the Telnet sequence CR LF must cause the same effect
1205 as a local user pressing the CR key on a local terminal. Thus,
1206 CR LF and CR NUL MUST have the same effect on an ASCII server
1207 host when received as input over a Telnet connection.
1209 A User Telnet MUST be able to send any of the forms: CR LF, CR
1210 NUL, and LF. A User Telnet on an ASCII host SHOULD have a
1211 user-controllable mode to send either CR LF or CR NUL when the
1212 user presses the "end-of-line" key, and CR LF SHOULD be the
1215 The Telnet end-of-line sequence CR LF MUST be used to send
1216 Telnet data that is not terminal-to-computer (e.g., for Server
1217 Telnet sending output, or the Telnet protocol incorporated
1218 another application protocol).
1221 To allow interoperability between arbitrary Telnet clients
1222 and servers, the Telnet protocol defined a standard
1223 representation for a line terminator. Since the ASCII
1224 character set includes no explicit end-of-line character,
1225 systems have chosen various representations, e.g., CR, LF,
1226 and the sequence CR LF. The Telnet protocol chose the CR
1227 LF sequence as the standard for network transmission.
1229 Unfortunately, the Telnet protocol specification in RFC-
1230 854 [TELNET:1] has turned out to be somewhat ambiguous on
1231 what character(s) should be sent from client to server for
1232 the "end-of-line" key. The result has been a massive and
1233 continuing interoperability headache, made worse by
1234 various faulty implementations of both User and Server
1238 Internet Engineering Task Force [Page 21]
1243 RFC1123 REMOTE LOGIN -- TELNET October 1989
1248 Although the Telnet protocol is based on a perfectly
1249 symmetric model, in a remote login session the role of the
1250 user at a terminal differs from the role of the server
1251 host. For example, RFC-854 defines the meaning of CR, LF,
1252 and CR LF as output from the server, but does not specify
1253 what the User Telnet should send when the user presses the
1254 "end-of-line" key on the terminal; this turns out to be
1257 When a user presses the "end-of-line" key, some User
1258 Telnet implementations send CR LF, while others send CR
1259 NUL (based on a different interpretation of the same
1260 sentence in RFC-854). These will be equivalent for a
1261 correctly-implemented ASCII server host, as discussed
1262 above. For other servers, a mode in the User Telnet is
1265 The existence of User Telnets that send only CR NUL when
1266 CR is pressed creates a dilemma for non-ASCII hosts: they
1267 can either treat CR NUL as equivalent to CR LF in input,
1268 thus precluding the possibility of entering a "bare" CR,
1269 or else lose complete interworking.
1271 Suppose a user on host A uses Telnet to log into a server
1272 host B, and then execute B's User Telnet program to log
1273 into server host C. It is desirable for the Server/User
1274 Telnet combination on B to be as transparent as possible,
1275 i.e., to appear as if A were connected directly to C. In
1276 particular, correct implementation will make B transparent
1277 to Telnet end-of-line sequences, except that CR LF may be
1278 translated to CR NUL or vice versa.
1281 To understand Telnet end-of-line issues, one must have at
1282 least a general model of the relationship of Telnet to the
1283 local operating system. The Server Telnet process is
1284 typically coupled into the terminal driver software of the
1285 operating system as a pseudo-terminal. A Telnet end-of-
1286 line sequence received by the Server Telnet must have the
1287 same effect as pressing the end-of-line key on a real
1288 locally-connected terminal.
1290 Operating systems that support interactive character-at-
1291 a-time applications (e.g., editors) typically have two
1292 internal modes for their terminal I/O: a formatted mode,
1293 in which local conventions for end-of-line and other
1297 Internet Engineering Task Force [Page 22]
1302 RFC1123 REMOTE LOGIN -- TELNET October 1989
1305 formatting rules have been applied to the data stream, and
1306 a "raw" mode, in which the application has direct access
1307 to every character as it was entered. A Server Telnet
1308 must be implemented in such a way that these modes have
1309 the same effect for remote as for local terminals. For
1310 example, suppose a CR LF or CR NUL is received by the
1311 Server Telnet on an ASCII host. In raw mode, a CR
1312 character is passed to the application; in formatted mode,
1313 the local system's end-of-line convention is used.
1315 3.3.2 Data Entry Terminals
1318 In addition to the line-oriented and character-oriented
1319 ASCII terminals for which Telnet was designed, there are
1320 several families of video display terminals that are
1321 sometimes known as "data entry terminals" or DETs. The
1322 IBM 3270 family is a well-known example.
1324 Two Internet protocols have been designed to support
1325 generic DETs: SUPDUP [TELNET:16, TELNET:17], and the DET
1326 option [TELNET:18, TELNET:19]. The DET option drives a
1327 data entry terminal over a Telnet connection using (sub-)
1328 negotiation. SUPDUP is a completely separate terminal
1329 protocol, which can be entered from Telnet by negotiation.
1330 Although both SUPDUP and the DET option have been used
1331 successfully in particular environments, neither has
1332 gained general acceptance or wide implementation.
1334 A different approach to DET interaction has been developed
1335 for supporting the IBM 3270 family through Telnet,
1336 although the same approach would be applicable to any DET.
1337 The idea is to enter a "native DET" mode, in which the
1338 native DET input/output stream is sent as binary data.
1339 The Telnet EOR command is used to delimit logical records
1340 (e.g., "screens") within this binary stream.
1343 The rules for entering and leaving native DET mode are as
1346 o The Server uses the Terminal-Type option [TELNET:10]
1347 to learn that the client is a DET.
1349 o It is conventional, but not required, that both ends
1350 negotiate the EOR option [TELNET:9].
1352 o Both ends negotiate the Binary option [TELNET:3] to
1356 Internet Engineering Task Force [Page 23]
1361 RFC1123 REMOTE LOGIN -- TELNET October 1989
1364 enter native DET mode.
1366 o When either end negotiates out of binary mode, the
1367 other end does too, and the mode then reverts to
1371 3.3.3 Option Requirements
1373 Every Telnet implementation MUST support the Binary option
1374 [TELNET:3] and the Suppress Go Ahead option [TELNET:5], and
1375 SHOULD support the Echo [TELNET:4], Status [TELNET:6], End-of-
1376 Record [TELNET:9], and Extended Options List [TELNET:8]
1379 A User or Server Telnet SHOULD support the Window Size Option
1380 [TELNET:12] if the local operating system provides the
1381 corresponding capability.
1384 Note that the End-of-Record option only signifies that a
1385 Telnet can receive a Telnet EOR without crashing;
1386 therefore, every Telnet ought to be willing to accept
1387 negotiation of the End-of-Record option. See also the
1388 discussion in Section 3.2.3.
1390 3.3.4 Option Initiation
1392 When the Telnet protocol is used in a client/server situation,
1393 the server SHOULD initiate negotiation of the terminal
1394 interaction mode it expects.
1397 The Telnet protocol was defined to be perfectly
1398 symmetrical, but its application is generally asymmetric.
1399 Remote login has been known to fail because NEITHER side
1400 initiated negotiation of the required non-default terminal
1401 modes. It is generally the server that determines the
1402 preferred mode, so the server needs to initiate the
1403 negotiation; since the negotiation is symmetric, the user
1404 can also initiate it.
1406 A client (User Telnet) SHOULD provide a means for users to
1407 enable and disable the initiation of option negotiation.
1410 A user sometimes needs to connect to an application
1411 service (e.g., FTP or SMTP) that uses Telnet for its
1415 Internet Engineering Task Force [Page 24]
1420 RFC1123 REMOTE LOGIN -- TELNET October 1989
1423 control stream but does not support Telnet options. User
1424 Telnet may be used for this purpose if initiation of
1425 option negotiation is disabled.
1427 3.3.5 Telnet Linemode Option
1430 An important new Telnet option, LINEMODE [TELNET:12], has
1431 been proposed. The LINEMODE option provides a standard
1432 way for a User Telnet and a Server Telnet to agree that
1433 the client rather than the server will perform terminal
1434 character processing. When the client has prepared a
1435 complete line of text, it will send it to the server in
1436 (usually) one TCP packet. This option will greatly
1437 decrease the packet cost of Telnet sessions and will also
1438 give much better user response over congested or long-
1441 The LINEMODE option allows dynamic switching between local
1442 and remote character processing. For example, the Telnet
1443 connection will automatically negotiate into single-
1444 character mode while a full screen editor is running, and
1445 then return to linemode when the editor is finished.
1447 We expect that when this RFC is released, hosts should
1448 implement the client side of this option, and may
1449 implement the server side of this option. To properly
1450 implement the server side, the server needs to be able to
1451 tell the local system not to do any input character
1452 processing, but to remember its current terminal state and
1453 notify the Server Telnet process whenever the state
1454 changes. This will allow password echoing and full screen
1455 editors to be handled properly, for example.
1457 3.4 TELNET/USER INTERFACE
1459 3.4.1 Character Set Transparency
1461 User Telnet implementations SHOULD be able to send or receive
1462 any 7-bit ASCII character. Where possible, any special
1463 character interpretations by the user host's operating system
1464 SHOULD be bypassed so that these characters can conveniently be
1465 sent and received on the connection.
1467 Some character value MUST be reserved as "escape to command
1468 mode"; conventionally, doubling this character allows it to be
1469 entered as data. The specific character used SHOULD be user
1474 Internet Engineering Task Force [Page 25]
1479 RFC1123 REMOTE LOGIN -- TELNET October 1989
1482 On binary-mode connections, a User Telnet program MAY provide
1483 an escape mechanism for entering arbitrary 8-bit values, if the
1484 host operating system doesn't allow them to be entered directly
1488 The transparency issues are less pressing on servers, but
1489 implementors should take care in dealing with issues like:
1490 masking off parity bits (sent by an older, non-conforming
1491 client) before they reach programs that expect only NVT
1492 ASCII, and properly handling programs that request 8-bit
1495 3.4.2 Telnet Commands
1497 A User Telnet program MUST provide a user the capability of
1498 entering any of the Telnet control functions IP, AO, or AYT,
1499 and SHOULD provide the capability of entering EC, EL, and
1502 3.4.3 TCP Connection Errors
1504 A User Telnet program SHOULD report to the user any TCP errors
1505 that are reported by the transport layer (see "TCP/Application
1506 Layer Interface" section in [INTRO:1]).
1508 3.4.4 Non-Default Telnet Contact Port
1510 A User Telnet program SHOULD allow the user to optionally
1511 specify a non-standard contact port number at the Server Telnet
1514 3.4.5 Flushing Output
1516 A User Telnet program SHOULD provide the user the ability to
1517 specify whether or not output should be flushed when an IP is
1518 sent; see Section 3.2.4.
1520 For any output flushing scheme that causes the User Telnet to
1521 flush output locally until a Telnet signal is received from the
1522 Server, there SHOULD be a way for the user to manually restore
1523 normal output, in case the Server fails to send the expected
1533 Internet Engineering Task Force [Page 26]
1538 RFC1123 REMOTE LOGIN -- TELNET October 1989
1541 3.5. TELNET REQUIREMENTS SUMMARY
1553 FEATURE |SECTION | | | |T|T|e
1554 -------------------------------------------------|--------|-|-|-|-|-|--
1556 Option Negotiation |3.2.1 |x| | | | |
1557 Avoid negotiation loops |3.2.1 |x| | | | |
1558 Refuse unsupported options |3.2.1 |x| | | | |
1559 Negotiation OK anytime on connection |3.2.1 | |x| | | |
1560 Default to NVT |3.2.1 |x| | | | |
1561 Send official name in Term-Type option |3.2.8 |x| | | | |
1562 Accept any name in Term-Type option |3.2.8 |x| | | | |
1563 Implement Binary, Suppress-GA options |3.3.3 |x| | | | |
1564 Echo, Status, EOL, Ext-Opt-List options |3.3.3 | |x| | | |
1565 Implement Window-Size option if appropriate |3.3.3 | |x| | | |
1566 Server initiate mode negotiations |3.3.4 | |x| | | |
1567 User can enable/disable init negotiations |3.3.4 | |x| | | |
1569 Go-Aheads | | | | | | |
1570 Non-GA server negotiate SUPPRESS-GA option |3.2.2 |x| | | | |
1571 User or Server accept SUPPRESS-GA option |3.2.2 |x| | | | |
1572 User Telnet ignore GA's |3.2.2 | | |x| | |
1574 Control Functions | | | | | | |
1575 Support SE NOP DM IP AO AYT SB |3.2.3 |x| | | | |
1576 Support EOR EC EL Break |3.2.3 | | |x| | |
1577 Ignore unsupported control functions |3.2.3 |x| | | | |
1578 User, Server discard urgent data up to DM |3.2.4 |x| | | | |
1579 User Telnet send "Synch" after IP, AO, AYT |3.2.4 | |x| | | |
1580 Server Telnet reply Synch to IP |3.2.4 | | |x| | |
1581 Server Telnet reply Synch to AO |3.2.4 |x| | | | |
1582 User Telnet can flush output when send IP |3.2.4 | |x| | | |
1584 Encoding | | | | | | |
1585 Send high-order bit in NVT mode |3.2.5 | | | |x| |
1586 Send high-order bit as parity bit |3.2.5 | | | | |x|
1587 Negot. BINARY if pass high-ord. bit to applic |3.2.5 | |x| | | |
1588 Always double IAC data byte |3.2.6 |x| | | | |
1592 Internet Engineering Task Force [Page 27]
1597 RFC1123 REMOTE LOGIN -- TELNET October 1989
1600 Double IAC data byte in binary mode |3.2.7 |x| | | | |
1601 Obey Telnet cmds in binary mode |3.2.7 |x| | | | |
1602 End-of-line, CR NUL in binary mode |3.2.7 | | | | |x|
1604 End-of-Line | | | | | | |
1605 EOL at Server same as local end-of-line |3.3.1 |x| | | | |
1606 ASCII Server accept CR LF or CR NUL for EOL |3.3.1 |x| | | | |
1607 User Telnet able to send CR LF, CR NUL, or LF |3.3.1 |x| | | | |
1608 ASCII user able to select CR LF/CR NUL |3.3.1 | |x| | | |
1609 User Telnet default mode is CR LF |3.3.1 | |x| | | |
1610 Non-interactive uses CR LF for EOL |3.3.1 |x| | | | |
1612 User Telnet interface | | | | | | |
1613 Input & output all 7-bit characters |3.4.1 | |x| | | |
1614 Bypass local op sys interpretation |3.4.1 | |x| | | |
1615 Escape character |3.4.1 |x| | | | |
1616 User-settable escape character |3.4.1 | |x| | | |
1617 Escape to enter 8-bit values |3.4.1 | | |x| | |
1618 Can input IP, AO, AYT |3.4.2 |x| | | | |
1619 Can input EC, EL, Break |3.4.2 | |x| | | |
1620 Report TCP connection errors to user |3.4.3 | |x| | | |
1621 Optional non-default contact port |3.4.4 | |x| | | |
1622 Can spec: output flushed when IP sent |3.4.5 | |x| | | |
1623 Can manually restore output mode |3.4.5 | |x| | | |
1651 Internet Engineering Task Force [Page 28]
1656 RFC1123 FILE TRANSFER -- FTP October 1989
1661 4.1 FILE TRANSFER PROTOCOL -- FTP
1665 The File Transfer Protocol FTP is the primary Internet standard
1666 for file transfer. The current specification is contained in
1669 FTP uses separate simultaneous TCP connections for control and
1670 for data transfer. The FTP protocol includes many features,
1671 some of which are not commonly implemented. However, for every
1672 feature in FTP, there exists at least one implementation. The
1673 minimum implementation defined in RFC-959 was too small, so a
1674 somewhat larger minimum implementation is defined here.
1676 Internet users have been unnecessarily burdened for years by
1677 deficient FTP implementations. Protocol implementors have
1678 suffered from the erroneous opinion that implementing FTP ought
1679 to be a small and trivial task. This is wrong, because FTP has
1680 a user interface, because it has to deal (correctly) with the
1681 whole variety of communication and operating system errors that
1682 may occur, and because it has to handle the great diversity of
1683 real file systems in the world.
1685 4.1.2. PROTOCOL WALK-THROUGH
1687 4.1.2.1 LOCAL Type: RFC-959 Section 3.1.1.4
1689 An FTP program MUST support TYPE I ("IMAGE" or binary type)
1690 as well as TYPE L 8 ("LOCAL" type with logical byte size 8).
1691 A machine whose memory is organized into m-bit words, where
1692 m is not a multiple of 8, MAY also support TYPE L m.
1695 The command "TYPE L 8" is often required to transfer
1696 binary data between a machine whose memory is organized
1697 into (e.g.) 36-bit words and a machine with an 8-bit
1698 byte organization. For an 8-bit byte machine, TYPE L 8
1699 is equivalent to IMAGE.
1701 "TYPE L m" is sometimes specified to the FTP programs
1702 on two m-bit word machines to ensure the correct
1703 transfer of a native-mode binary file from one machine
1704 to the other. However, this command should have the
1705 same effect on these machines as "TYPE I".
1710 Internet Engineering Task Force [Page 29]
1715 RFC1123 FILE TRANSFER -- FTP October 1989
1718 4.1.2.2 Telnet Format Control: RFC-959 Section 3.1.1.5.2
1720 A host that makes no distinction between TYPE N and TYPE T
1721 SHOULD implement TYPE T to be identical to TYPE N.
1724 This provision should ease interoperation with hosts
1725 that do make this distinction.
1727 Many hosts represent text files internally as strings
1728 of ASCII characters, using the embedded ASCII format
1729 effector characters (LF, BS, FF, ...) to control the
1730 format when a file is printed. For such hosts, there
1731 is no distinction between "print" files and other
1732 files. However, systems that use record structured
1733 files typically need a special format for printable
1734 files (e.g., ASA carriage control). For the latter
1735 hosts, FTP allows a choice of TYPE N or TYPE T.
1737 4.1.2.3 Page Structure: RFC-959 Section 3.1.2.3 and Appendix I
1739 Implementation of page structure is NOT RECOMMENDED in
1740 general. However, if a host system does need to implement
1741 FTP for "random access" or "holey" files, it MUST use the
1742 defined page structure format rather than define a new
1745 4.1.2.4 Data Structure Transformations: RFC-959 Section 3.1.2
1747 An FTP transformation between record-structure and file-
1748 structure SHOULD be invertible, to the extent possible while
1749 making the result useful on the target host.
1752 RFC-959 required strict invertibility between record-
1753 structure and file-structure, but in practice,
1754 efficiency and convenience often preclude it.
1755 Therefore, the requirement is being relaxed. There are
1756 two different objectives for transferring a file:
1757 processing it on the target host, or just storage. For
1758 storage, strict invertibility is important. For
1759 processing, the file created on the target host needs
1760 to be in the format expected by application programs on
1763 As an example of the conflict, imagine a record-
1764 oriented operating system that requires some data files
1765 to have exactly 80 bytes in each record. While STORing
1769 Internet Engineering Task Force [Page 30]
1774 RFC1123 FILE TRANSFER -- FTP October 1989
1777 a file on such a host, an FTP Server must be able to
1778 pad each line or record to 80 bytes; a later retrieval
1779 of such a file cannot be strictly invertible.
1781 4.1.2.5 Data Connection Management: RFC-959 Section 3.3
1783 A User-FTP that uses STREAM mode SHOULD send a PORT command
1784 to assign a non-default data port before each transfer
1788 This is required because of the long delay after a TCP
1789 connection is closed until its socket pair can be
1790 reused, to allow multiple transfers during a single FTP
1791 session. Sending a port command can avoided if a
1792 transfer mode other than stream is used, by leaving the
1793 data transfer connection open between transfers.
1795 4.1.2.6 PASV Command: RFC-959 Section 4.1.2
1797 A server-FTP MUST implement the PASV command.
1799 If multiple third-party transfers are to be executed during
1800 the same session, a new PASV command MUST be issued before
1801 each transfer command, to obtain a unique port pair.
1804 The format of the 227 reply to a PASV command is not
1805 well standardized. In particular, an FTP client cannot
1806 assume that the parentheses shown on page 40 of RFC-959
1807 will be present (and in fact, Figure 3 on page 43 omits
1808 them). Therefore, a User-FTP program that interprets
1809 the PASV reply must scan the reply for the first digit
1810 of the host and port numbers.
1812 Note that the host number h1,h2,h3,h4 is the IP address
1813 of the server host that is sending the reply, and that
1814 p1,p2 is a non-default data transfer port that PASV has
1817 4.1.2.7 LIST and NLST Commands: RFC-959 Section 4.1.3
1819 The data returned by an NLST command MUST contain only a
1820 simple list of legal pathnames, such that the server can use
1821 them directly as the arguments of subsequent data transfer
1822 commands for the individual files.
1824 The data returned by a LIST or NLST command SHOULD use an
1828 Internet Engineering Task Force [Page 31]
1833 RFC1123 FILE TRANSFER -- FTP October 1989
1836 implied TYPE AN, unless the current type is EBCDIC, in which
1837 case an implied TYPE EN SHOULD be used.
1840 Many FTP clients support macro-commands that will get
1841 or put files matching a wildcard specification, using
1842 NLST to obtain a list of pathnames. The expansion of
1843 "multiple-put" is local to the client, but "multiple-
1844 get" requires cooperation by the server.
1846 The implied type for LIST and NLST is designed to
1847 provide compatibility with existing User-FTPs, and in
1848 particular with multiple-get commands.
1850 4.1.2.8 SITE Command: RFC-959 Section 4.1.3
1852 A Server-FTP SHOULD use the SITE command for non-standard
1853 features, rather than invent new private commands or
1854 unstandardized extensions to existing commands.
1856 4.1.2.9 STOU Command: RFC-959 Section 4.1.3
1858 The STOU command stores into a uniquely named file. When it
1859 receives an STOU command, a Server-FTP MUST return the
1860 actual file name in the "125 Transfer Starting" or the "150
1861 Opening Data Connection" message that precedes the transfer
1862 (the 250 reply code mentioned in RFC-959 is incorrect). The
1863 exact format of these messages is hereby defined to be as
1869 where pppp represents the unique pathname of the file that
1872 4.1.2.10 Telnet End-of-line Code: RFC-959, Page 34
1874 Implementors MUST NOT assume any correspondence between READ
1875 boundaries on the control connection and the Telnet EOL
1879 Thus, a server-FTP (or User-FTP) must continue reading
1880 characters from the control connection until a complete
1881 Telnet EOL sequence is encountered, before processing
1882 the command (or response, respectively). Conversely, a
1883 single READ from the control connection may include
1887 Internet Engineering Task Force [Page 32]
1892 RFC1123 FILE TRANSFER -- FTP October 1989
1895 more than one FTP command.
1897 4.1.2.11 FTP Replies: RFC-959 Section 4.2, Page 35
1899 A Server-FTP MUST send only correctly formatted replies on
1900 the control connection. Note that RFC-959 (unlike earlier
1901 versions of the FTP spec) contains no provision for a
1902 "spontaneous" reply message.
1904 A Server-FTP SHOULD use the reply codes defined in RFC-959
1905 whenever they apply. However, a server-FTP MAY use a
1906 different reply code when needed, as long as the general
1907 rules of Section 4.2 are followed. When the implementor has
1908 a choice between a 4xx and 5xx reply code, a Server-FTP
1909 SHOULD send a 4xx (temporary failure) code when there is any
1910 reasonable possibility that a failed FTP will succeed a few
1913 A User-FTP SHOULD generally use only the highest-order digit
1914 of a 3-digit reply code for making a procedural decision, to
1915 prevent difficulties when a Server-FTP uses non-standard
1918 A User-FTP MUST be able to handle multi-line replies. If
1919 the implementation imposes a limit on the number of lines
1920 and if this limit is exceeded, the User-FTP MUST recover,
1921 e.g., by ignoring the excess lines until the end of the
1922 multi-line reply is reached.
1924 A User-FTP SHOULD NOT interpret a 421 reply code ("Service
1925 not available, closing control connection") specially, but
1926 SHOULD detect closing of the control connection by the
1930 Server implementations that fail to strictly follow the
1931 reply rules often cause FTP user programs to hang.
1932 Note that RFC-959 resolved ambiguities in the reply
1933 rules found in earlier FTP specifications and must be
1936 It is important to choose FTP reply codes that properly
1937 distinguish between temporary and permanent failures,
1938 to allow the successful use of file transfer client
1939 daemons. These programs depend on the reply codes to
1940 decide whether or not to retry a failed transfer; using
1941 a permanent failure code (5xx) for a temporary error
1942 will cause these programs to give up unnecessarily.
1946 Internet Engineering Task Force [Page 33]
1951 RFC1123 FILE TRANSFER -- FTP October 1989
1954 When the meaning of a reply matches exactly the text
1955 shown in RFC-959, uniformity will be enhanced by using
1956 the RFC-959 text verbatim. However, a Server-FTP
1957 implementor is encouraged to choose reply text that
1958 conveys specific system-dependent information, when
1961 4.1.2.12 Connections: RFC-959 Section 5.2
1963 The words "and the port used" in the second paragraph of
1964 this section of RFC-959 are erroneous (historical), and they
1967 On a multihomed server host, the default data transfer port
1968 (L-1) MUST be associated with the same local IP address as
1969 the corresponding control connection to port L.
1971 A user-FTP MUST NOT send any Telnet controls other than
1972 SYNCH and IP on an FTP control connection. In particular, it
1973 MUST NOT attempt to negotiate Telnet options on the control
1974 connection. However, a server-FTP MUST be capable of
1975 accepting and refusing Telnet negotiations (i.e., sending
1979 Although the RFC says: "Server- and User- processes
1980 should follow the conventions for the Telnet
1981 protocol...[on the control connection]", it is not the
1982 intent that Telnet option negotiation is to be
1985 4.1.2.13 Minimum Implementation; RFC-959 Section 5.1
1987 The following commands and options MUST be supported by
1988 every server-FTP and user-FTP, except in cases where the
1989 underlying file system or operating system does not allow or
1990 support a particular command.
1992 Type: ASCII Non-print, IMAGE, LOCAL 8
1994 Structure: File, Record*
2001 CWD, CDUP, RMD, MKD, PWD,
2005 Internet Engineering Task Force [Page 34]
2010 RFC1123 FILE TRANSFER -- FTP October 1989
2017 *Record structure is REQUIRED only for hosts whose file
2018 systems support record structure.
2021 Vendors are encouraged to implement a larger subset of
2022 the protocol. For example, there are important
2023 robustness features in the protocol (e.g., Restart,
2024 ABOR, block mode) that would be an aid to some Internet
2025 users but are not widely implemented.
2027 A host that does not have record structures in its file
2028 system may still accept files with STRU R, recording
2029 the byte stream literally.
2031 4.1.3 SPECIFIC ISSUES
2033 4.1.3.1 Non-standard Command Verbs
2035 FTP allows "experimental" commands, whose names begin with
2036 "X". If these commands are subsequently adopted as
2037 standards, there may still be existing implementations using
2038 the "X" form. At present, this is true for the directory
2041 RFC-959 "Experimental"
2049 All FTP implementations SHOULD recognize both forms of these
2050 commands, by simply equating them with extra entries in the
2051 command lookup table.
2054 A User-FTP can access a server that supports only the
2055 "X" forms by implementing a mode switch, or
2056 automatically using the following procedure: if the
2057 RFC-959 form of one of the above commands is rejected
2058 with a 500 or 502 response code, then try the
2059 experimental form; any other response would be passed
2064 Internet Engineering Task Force [Page 35]
2069 RFC1123 FILE TRANSFER -- FTP October 1989
2072 4.1.3.2 Idle Timeout
2074 A Server-FTP process SHOULD have an idle timeout, which will
2075 terminate the process and close the control connection if
2076 the server is inactive (i.e., no command or data transfer in
2077 progress) for a long period of time. The idle timeout time
2078 SHOULD be configurable, and the default should be at least 5
2081 A client FTP process ("User-PI" in RFC-959) will need
2082 timeouts on responses only if it is invoked from a program.
2085 Without a timeout, a Server-FTP process may be left
2086 pending indefinitely if the corresponding client
2087 crashes without closing the control connection.
2089 4.1.3.3 Concurrency of Data and Control
2092 The intent of the designers of FTP was that a user
2093 should be able to send a STAT command at any time while
2094 data transfer was in progress and that the server-FTP
2095 would reply immediately with status -- e.g., the number
2096 of bytes transferred so far. Similarly, an ABOR
2097 command should be possible at any time during a data
2100 Unfortunately, some small-machine operating systems
2101 make such concurrent programming difficult, and some
2102 other implementers seek minimal solutions, so some FTP
2103 implementations do not allow concurrent use of the data
2104 and control connections. Even such a minimal server
2105 must be prepared to accept and defer a STAT or ABOR
2106 command that arrives during data transfer.
2108 4.1.3.4 FTP Restart Mechanism
2110 The description of the 110 reply on pp. 40-41 of RFC-959 is
2111 incorrect; the correct description is as follows. A restart
2112 reply message, sent over the control connection from the
2113 receiving FTP to the User-FTP, has the format:
2115 110 MARK ssss = rrrr
2119 * ssss is a text string that appeared in a Restart Marker
2123 Internet Engineering Task Force [Page 36]
2128 RFC1123 FILE TRANSFER -- FTP October 1989
2131 in the data stream and encodes a position in the
2132 sender's file system;
2134 * rrrr encodes the corresponding position in the
2135 receiver's file system.
2137 The encoding, which is specific to a particular file system
2138 and network implementation, is always generated and
2139 interpreted by the same system, either sender or receiver.
2141 When an FTP that implements restart receives a Restart
2142 Marker in the data stream, it SHOULD force the data to that
2143 point to be written to stable storage before encoding the
2144 corresponding position rrrr. An FTP sending Restart Markers
2145 MUST NOT assume that 110 replies will be returned
2146 synchronously with the data, i.e., it must not await a 110
2147 reply before sending more data.
2149 Two new reply codes are hereby defined for errors
2150 encountered in restarting a transfer:
2152 554 Requested action not taken: invalid REST parameter.
2154 A 554 reply may result from a FTP service command that
2155 follows a REST command. The reply indicates that the
2156 existing file at the Server-FTP cannot be repositioned
2157 as specified in the REST.
2159 555 Requested action not taken: type or stru mismatch.
2161 A 555 reply may result from an APPE command or from any
2162 FTP service command following a REST command. The
2163 reply indicates that there is some mismatch between the
2164 current transfer parameters (type and stru) and the
2165 attributes of the existing file.
2168 Note that the FTP Restart mechanism requires that Block
2169 or Compressed mode be used for data transfer, to allow
2170 the Restart Markers to be included within the data
2171 stream. The frequency of Restart Markers can be low.
2173 Restart Markers mark a place in the data stream, but
2174 the receiver may be performing some transformation on
2175 the data as it is stored into stable storage. In
2176 general, the receiver's encoding must include any state
2177 information necessary to restart this transformation at
2178 any point of the FTP data stream. For example, in TYPE
2182 Internet Engineering Task Force [Page 37]
2187 RFC1123 FILE TRANSFER -- FTP October 1989
2190 A transfers, some receiver hosts transform CR LF
2191 sequences into a single LF character on disk. If a
2192 Restart Marker happens to fall between CR and LF, the
2193 receiver must encode in rrrr that the transfer must be
2194 restarted in a "CR has been seen and discarded" state.
2196 Note that the Restart Marker is required to be encoded
2197 as a string of printable ASCII characters, regardless
2198 of the type of the data.
2200 RFC-959 says that restart information is to be returned
2201 "to the user". This should not be taken literally. In
2202 general, the User-FTP should save the restart
2203 information (ssss,rrrr) in stable storage, e.g., append
2204 it to a restart control file. An empty restart control
2205 file should be created when the transfer first starts
2206 and deleted automatically when the transfer completes
2207 successfully. It is suggested that this file have a
2208 name derived in an easily-identifiable manner from the
2209 name of the file being transferred and the remote host
2210 name; this is analogous to the means used by many text
2211 editors for naming "backup" files.
2213 There are three cases for FTP restart.
2215 (1) User-to-Server Transfer
2217 The User-FTP puts Restart Markers <ssss> at
2218 convenient places in the data stream. When the
2219 Server-FTP receives a Marker, it writes all prior
2220 data to disk, encodes its file system position and
2221 transformation state as rrrr, and returns a "110
2222 MARK ssss = rrrr" reply over the control
2223 connection. The User-FTP appends the pair
2224 (ssss,rrrr) to its restart control file.
2226 To restart the transfer, the User-FTP fetches the
2227 last (ssss,rrrr) pair from the restart control
2228 file, repositions its local file system and
2229 transformation state using ssss, and sends the
2230 command "REST rrrr" to the Server-FTP.
2232 (2) Server-to-User Transfer
2234 The Server-FTP puts Restart Markers <ssss> at
2235 convenient places in the data stream. When the
2236 User-FTP receives a Marker, it writes all prior
2237 data to disk, encodes its file system position and
2241 Internet Engineering Task Force [Page 38]
2246 RFC1123 FILE TRANSFER -- FTP October 1989
2249 transformation state as rrrr, and appends the pair
2250 (rrrr,ssss) to its restart control file.
2252 To restart the transfer, the User-FTP fetches the
2253 last (rrrr,ssss) pair from the restart control
2254 file, repositions its local file system and
2255 transformation state using rrrr, and sends the
2256 command "REST ssss" to the Server-FTP.
2258 (3) Server-to-Server ("Third-Party") Transfer
2260 The sending Server-FTP puts Restart Markers <ssss>
2261 at convenient places in the data stream. When it
2262 receives a Marker, the receiving Server-FTP writes
2263 all prior data to disk, encodes its file system
2264 position and transformation state as rrrr, and
2265 sends a "110 MARK ssss = rrrr" reply over the
2266 control connection to the User. The User-FTP
2267 appends the pair (ssss,rrrr) to its restart
2270 To restart the transfer, the User-FTP fetches the
2271 last (ssss,rrrr) pair from the restart control
2272 file, sends "REST ssss" to the sending Server-FTP,
2273 and sends "REST rrrr" to the receiving Server-FTP.
2276 4.1.4 FTP/USER INTERFACE
2278 This section discusses the user interface for a User-FTP
2281 4.1.4.1 Pathname Specification
2283 Since FTP is intended for use in a heterogeneous
2284 environment, User-FTP implementations MUST support remote
2285 pathnames as arbitrary character strings, so that their form
2286 and content are not limited by the conventions of the local
2290 In particular, remote pathnames can be of arbitrary
2291 length, and all the printing ASCII characters as well
2292 as space (0x20) must be allowed. RFC-959 allows a
2293 pathname to contain any 7-bit ASCII character except CR
2300 Internet Engineering Task Force [Page 39]
2305 RFC1123 FILE TRANSFER -- FTP October 1989
2308 4.1.4.2 "QUOTE" Command
2310 A User-FTP program MUST implement a "QUOTE" command that
2311 will pass an arbitrary character string to the server and
2312 display all resulting response messages to the user.
2314 To make the "QUOTE" command useful, a User-FTP SHOULD send
2315 transfer control commands to the server as the user enters
2316 them, rather than saving all the commands and sending them
2317 to the server only when a data transfer is started.
2320 The "QUOTE" command is essential to allow the user to
2321 access servers that require system-specific commands
2322 (e.g., SITE or ALLO), or to invoke new or optional
2323 features that are not implemented by the User-FTP. For
2324 example, "QUOTE" may be used to specify "TYPE A T" to
2325 send a print file to hosts that require the
2326 distinction, even if the User-FTP does not recognize
2329 4.1.4.3 Displaying Replies to User
2331 A User-FTP SHOULD display to the user the full text of all
2332 error reply messages it receives. It SHOULD have a
2333 "verbose" mode in which all commands it sends and the full
2334 text and reply codes it receives are displayed, for
2335 diagnosis of problems.
2337 4.1.4.4 Maintaining Synchronization
2339 The state machine in a User-FTP SHOULD be forgiving of
2340 missing and unexpected reply messages, in order to maintain
2341 command synchronization with the server.
2359 Internet Engineering Task Force [Page 40]
2364 RFC1123 FILE TRANSFER -- FTP October 1989
2367 4.1.5 FTP REQUIREMENTS SUMMARY
2378 FEATURE |SECTION | | | |T|T|e
2379 -------------------------------------------|---------------|-|-|-|-|-|--
2380 Implement TYPE T if same as TYPE N |4.1.2.2 | |x| | | |
2381 File/Record transform invertible if poss. |4.1.2.4 | |x| | | |
2382 User-FTP send PORT cmd for stream mode |4.1.2.5 | |x| | | |
2383 Server-FTP implement PASV |4.1.2.6 |x| | | | |
2384 PASV is per-transfer |4.1.2.6 |x| | | | |
2385 NLST reply usable in RETR cmds |4.1.2.7 |x| | | | |
2386 Implied type for LIST and NLST |4.1.2.7 | |x| | | |
2387 SITE cmd for non-standard features |4.1.2.8 | |x| | | |
2388 STOU cmd return pathname as specified |4.1.2.9 |x| | | | |
2389 Use TCP READ boundaries on control conn. |4.1.2.10 | | | | |x|
2391 Server-FTP send only correct reply format |4.1.2.11 |x| | | | |
2392 Server-FTP use defined reply code if poss. |4.1.2.11 | |x| | | |
2393 New reply code following Section 4.2 |4.1.2.11 | | |x| | |
2394 User-FTP use only high digit of reply |4.1.2.11 | |x| | | |
2395 User-FTP handle multi-line reply lines |4.1.2.11 |x| | | | |
2396 User-FTP handle 421 reply specially |4.1.2.11 | | | |x| |
2398 Default data port same IP addr as ctl conn |4.1.2.12 |x| | | | |
2399 User-FTP send Telnet cmds exc. SYNCH, IP |4.1.2.12 | | | | |x|
2400 User-FTP negotiate Telnet options |4.1.2.12 | | | | |x|
2401 Server-FTP handle Telnet options |4.1.2.12 |x| | | | |
2402 Handle "Experimental" directory cmds |4.1.3.1 | |x| | | |
2403 Idle timeout in server-FTP |4.1.3.2 | |x| | | |
2404 Configurable idle timeout |4.1.3.2 | |x| | | |
2405 Receiver checkpoint data at Restart Marker |4.1.3.4 | |x| | | |
2406 Sender assume 110 replies are synchronous |4.1.3.4 | | | | |x|
2408 Support TYPE: | | | | | | |
2409 ASCII - Non-Print (AN) |4.1.2.13 |x| | | | |
2410 ASCII - Telnet (AT) -- if same as AN |4.1.2.2 | |x| | | |
2411 ASCII - Carriage Control (AC) |959 3.1.1.5.2 | | |x| | |
2412 EBCDIC - (any form) |959 3.1.1.2 | | |x| | |
2413 IMAGE |4.1.2.1 |x| | | | |
2414 LOCAL 8 |4.1.2.1 |x| | | | |
2418 Internet Engineering Task Force [Page 41]
2423 RFC1123 FILE TRANSFER -- FTP October 1989
2426 LOCAL m |4.1.2.1 | | |x| | |2
2428 Support MODE: | | | | | | |
2429 Stream |4.1.2.13 |x| | | | |
2430 Block |959 3.4.2 | | |x| | |
2432 Support STRUCTURE: | | | | | | |
2433 File |4.1.2.13 |x| | | | |
2434 Record |4.1.2.13 |x| | | | |3
2435 Page |4.1.2.3 | | | |x| |
2437 Support commands: | | | | | | |
2438 USER |4.1.2.13 |x| | | | |
2439 PASS |4.1.2.13 |x| | | | |
2440 ACCT |4.1.2.13 |x| | | | |
2441 CWD |4.1.2.13 |x| | | | |
2442 CDUP |4.1.2.13 |x| | | | |
2443 SMNT |959 5.3.1 | | |x| | |
2444 REIN |959 5.3.1 | | |x| | |
2445 QUIT |4.1.2.13 |x| | | | |
2447 PORT |4.1.2.13 |x| | | | |
2448 PASV |4.1.2.6 |x| | | | |
2449 TYPE |4.1.2.13 |x| | | | |1
2450 STRU |4.1.2.13 |x| | | | |1
2451 MODE |4.1.2.13 |x| | | | |1
2453 RETR |4.1.2.13 |x| | | | |
2454 STOR |4.1.2.13 |x| | | | |
2455 STOU |959 5.3.1 | | |x| | |
2456 APPE |4.1.2.13 |x| | | | |
2457 ALLO |959 5.3.1 | | |x| | |
2458 REST |959 5.3.1 | | |x| | |
2459 RNFR |4.1.2.13 |x| | | | |
2460 RNTO |4.1.2.13 |x| | | | |
2461 ABOR |959 5.3.1 | | |x| | |
2462 DELE |4.1.2.13 |x| | | | |
2463 RMD |4.1.2.13 |x| | | | |
2464 MKD |4.1.2.13 |x| | | | |
2465 PWD |4.1.2.13 |x| | | | |
2466 LIST |4.1.2.13 |x| | | | |
2467 NLST |4.1.2.13 |x| | | | |
2468 SITE |4.1.2.8 | | |x| | |
2469 STAT |4.1.2.13 |x| | | | |
2470 SYST |4.1.2.13 |x| | | | |
2471 HELP |4.1.2.13 |x| | | | |
2472 NOOP |4.1.2.13 |x| | | | |
2477 Internet Engineering Task Force [Page 42]
2482 RFC1123 FILE TRANSFER -- FTP October 1989
2485 User Interface: | | | | | | |
2486 Arbitrary pathnames |4.1.4.1 |x| | | | |
2487 Implement "QUOTE" command |4.1.4.2 |x| | | | |
2488 Transfer control commands immediately |4.1.4.2 | |x| | | |
2489 Display error messages to user |4.1.4.3 | |x| | | |
2490 Verbose mode |4.1.4.3 | |x| | | |
2491 Maintain synchronization with server |4.1.4.4 | |x| | | |
2495 (1) For the values shown earlier.
2497 (2) Here m is number of bits in a memory word.
2499 (3) Required for host with record-structured file system, optional
2536 Internet Engineering Task Force [Page 43]
2541 RFC1123 FILE TRANSFER -- TFTP October 1989
2544 4.2 TRIVIAL FILE TRANSFER PROTOCOL -- TFTP
2548 The Trivial File Transfer Protocol TFTP is defined in RFC-783
2551 TFTP provides its own reliable delivery with UDP as its
2552 transport protocol, using a simple stop-and-wait acknowledgment
2553 system. Since TFTP has an effective window of only one 512
2554 octet segment, it can provide good performance only over paths
2555 that have a small delay*bandwidth product. The TFTP file
2556 interface is very simple, providing no access control or
2559 TFTP's most important application is bootstrapping a host over
2560 a local network, since it is simple and small enough to be
2561 easily implemented in EPROM [BOOT:1, BOOT:2]. Vendors are
2562 urged to support TFTP for booting.
2564 4.2.2 PROTOCOL WALK-THROUGH
2566 The TFTP specification [TFTP:1] is written in an open style,
2567 and does not fully specify many parts of the protocol.
2569 4.2.2.1 Transfer Modes: RFC-783, Page 3
2571 The transfer mode "mail" SHOULD NOT be supported.
2573 4.2.2.2 UDP Header: RFC-783, Page 17
2575 The Length field of a UDP header is incorrectly defined; it
2576 includes the UDP header length (8).
2578 4.2.3 SPECIFIC ISSUES
2580 4.2.3.1 Sorcerer's Apprentice Syndrome
2582 There is a serious bug, known as the "Sorcerer's Apprentice
2583 Syndrome," in the protocol specification. While it does not
2584 cause incorrect operation of the transfer (the file will
2585 always be transferred correctly if the transfer completes),
2586 this bug may cause excessive retransmission, which may cause
2587 the transfer to time out.
2589 Implementations MUST contain the fix for this problem: the
2590 sender (i.e., the side originating the DATA packets) must
2591 never resend the current DATA packet on receipt of a
2595 Internet Engineering Task Force [Page 44]
2600 RFC1123 FILE TRANSFER -- TFTP October 1989
2606 The bug is caused by the protocol rule that either
2607 side, on receiving an old duplicate datagram, may
2608 resend the current datagram. If a packet is delayed in
2609 the network but later successfully delivered after
2610 either side has timed out and retransmitted a packet, a
2611 duplicate copy of the response may be generated. If
2612 the other side responds to this duplicate with a
2613 duplicate of its own, then every datagram will be sent
2614 in duplicate for the remainder of the transfer (unless
2615 a datagram is lost, breaking the repetition). Worse
2616 yet, since the delay is often caused by congestion,
2617 this duplicate transmission will usually causes more
2618 congestion, leading to more delayed packets, etc.
2620 The following example may help to clarify this problem.
2628 (ACK X is delayed in network,
2630 (3) Retransmit DATA X
2632 (4) Receive DATA X again
2634 (5) Receive (delayed) ACK X
2636 (6) Receive DATA X+1
2638 (7) Receive ACK X again
2640 (8) Receive DATA X+1 again
2644 (10) Receive DATA X+2
2646 (11) Receive ACK X+1 again
2648 (12) Receive DATA X+2 again
2654 Internet Engineering Task Force [Page 45]
2659 RFC1123 FILE TRANSFER -- TFTP October 1989
2662 Notice that once the delayed ACK arrives, the protocol
2663 settles down to duplicate all further packets
2664 (sequences 5-8 and 9-12). The problem is caused not by
2665 either side timing out, but by both sides
2666 retransmitting the current packet when they receive a
2669 The fix is to break the retransmission loop, as
2670 indicated above. This is analogous to the behavior of
2671 TCP. It is then possible to remove the retransmission
2672 timer on the receiver, since the resent ACK will never
2673 cause any action; this is a useful simplification where
2674 TFTP is used in a bootstrap program. It is OK to allow
2675 the timer to remain, and it may be helpful if the
2676 retransmitted ACK replaces one that was genuinely lost
2677 in the network. The sender still requires a retransmit
2680 4.2.3.2 Timeout Algorithms
2682 A TFTP implementation MUST use an adaptive timeout.
2685 TCP retransmission algorithms provide a useful base to
2686 work from. At least an exponential backoff of
2687 retransmission timeout is necessary.
2691 A variety of non-standard extensions have been made to TFTP,
2692 including additional transfer modes and a secure operation
2693 mode (with passwords). None of these have been
2696 4.2.3.4 Access Control
2698 A server TFTP implementation SHOULD include some
2699 configurable access control over what pathnames are allowed
2702 4.2.3.5 Broadcast Request
2704 A TFTP request directed to a broadcast address SHOULD be
2708 Due to the weak access control capability of TFTP,
2709 directed broadcasts of TFTP requests to random networks
2713 Internet Engineering Task Force [Page 46]
2718 RFC1123 FILE TRANSFER -- TFTP October 1989
2721 could create a significant security hole.
2723 4.2.4 TFTP REQUIREMENTS SUMMARY
2734 FEATURE |SECTION | | | |T|T|e
2735 -------------------------------------------------|--------|-|-|-|-|-|--
2736 Fix Sorcerer's Apprentice Syndrome |4.2.3.1 |x| | | | |
2737 Transfer modes: | | | | | | |
2738 netascii |RFC-783 |x| | | | |
2739 octet |RFC-783 |x| | | | |
2740 mail |4.2.2.1 | | | |x| |
2741 extensions |4.2.3.3 | | |x| | |
2742 Use adaptive timeout |4.2.3.2 |x| | | | |
2743 Configurable access control |4.2.3.4 | |x| | | |
2744 Silently ignore broadcast request |4.2.3.5 | |x| | | |
2745 -------------------------------------------------|--------|-|-|-|-|-|--
2746 -------------------------------------------------|--------|-|-|-|-|-|--
2772 Internet Engineering Task Force [Page 47]
2777 RFC1123 MAIL -- SMTP & RFC-822 October 1989
2780 5. ELECTRONIC MAIL -- SMTP and RFC-822
2784 In the TCP/IP protocol suite, electronic mail in a format
2785 specified in RFC-822 [SMTP:2] is transmitted using the Simple Mail
2786 Transfer Protocol (SMTP) defined in RFC-821 [SMTP:1].
2788 While SMTP has remained unchanged over the years, the Internet
2789 community has made several changes in the way SMTP is used. In
2790 particular, the conversion to the Domain Name System (DNS) has
2791 caused changes in address formats and in mail routing. In this
2792 section, we assume familiarity with the concepts and terminology
2793 of the DNS, whose requirements are given in Section 6.1.
2795 RFC-822 specifies the Internet standard format for electronic mail
2796 messages. RFC-822 supercedes an older standard, RFC-733, that may
2797 still be in use in a few places, although it is obsolete. The two
2798 formats are sometimes referred to simply by number ("822" and
2801 RFC-822 is used in some non-Internet mail environments with
2802 different mail transfer protocols than SMTP, and SMTP has also
2803 been adapted for use in some non-Internet environments. Note that
2804 this document presents the rules for the use of SMTP and RFC-822
2805 for the Internet environment only; other mail environments that
2806 use these protocols may be expected to have their own rules.
2808 5.2 PROTOCOL WALK-THROUGH
2810 This section covers both RFC-821 and RFC-822.
2812 The SMTP specification in RFC-821 is clear and contains numerous
2813 examples, so implementors should not find it difficult to
2814 understand. This section simply updates or annotates portions of
2815 RFC-821 to conform with current usage.
2817 RFC-822 is a long and dense document, defining a rich syntax.
2818 Unfortunately, incomplete or defective implementations of RFC-822
2819 are common. In fact, nearly all of the many formats of RFC-822
2820 are actually used, so an implementation generally needs to
2821 recognize and correctly interpret all of the RFC-822 syntax.
2823 5.2.1 The SMTP Model: RFC-821 Section 2
2826 Mail is sent by a series of request/response transactions
2827 between a client, the "sender-SMTP," and a server, the
2831 Internet Engineering Task Force [Page 48]
2836 RFC1123 MAIL -- SMTP & RFC-822 October 1989
2839 "receiver-SMTP". These transactions pass (1) the message
2840 proper, which is composed of header and body, and (2) SMTP
2841 source and destination addresses, referred to as the
2844 The SMTP programs are analogous to Message Transfer Agents
2845 (MTAs) of X.400. There will be another level of protocol
2846 software, closer to the end user, that is responsible for
2847 composing and analyzing RFC-822 message headers; this
2848 component is known as the "User Agent" in X.400, and we
2849 use that term in this document. There is a clear logical
2850 distinction between the User Agent and the SMTP
2851 implementation, since they operate on different levels of
2852 protocol. Note, however, that this distinction is may not
2853 be exactly reflected the structure of typical
2854 implementations of Internet mail. Often there is a
2855 program known as the "mailer" that implements SMTP and
2856 also some of the User Agent functions; the rest of the
2857 User Agent functions are included in a user interface used
2858 for entering and reading mail.
2860 The SMTP envelope is constructed at the originating site,
2861 typically by the User Agent when the message is first
2862 queued for the Sender-SMTP program. The envelope
2863 addresses may be derived from information in the message
2864 header, supplied by the user interface (e.g., to implement
2865 a bcc: request), or derived from local configuration
2866 information (e.g., expansion of a mailing list). The SMTP
2867 envelope cannot in general be re-derived from the header
2868 at a later stage in message delivery, so the envelope is
2869 transmitted separately from the message itself using the
2870 MAIL and RCPT commands of SMTP.
2872 The text of RFC-821 suggests that mail is to be delivered
2873 to an individual user at a host. With the advent of the
2874 domain system and of mail routing using mail-exchange (MX)
2875 resource records, implementors should now think of
2876 delivering mail to a user at a domain, which may or may
2877 not be a particular host. This DOES NOT change the fact
2878 that SMTP is a host-to-host mail exchange protocol.
2880 5.2.2 Canonicalization: RFC-821 Section 3.1
2882 The domain names that a Sender-SMTP sends in MAIL and RCPT
2883 commands MUST have been "canonicalized," i.e., they must be
2884 fully-qualified principal names or domain literals, not
2885 nicknames or domain abbreviations. A canonicalized name either
2886 identifies a host directly or is an MX name; it cannot be a
2890 Internet Engineering Task Force [Page 49]
2895 RFC1123 MAIL -- SMTP & RFC-822 October 1989
2900 5.2.3 VRFY and EXPN Commands: RFC-821 Section 3.3
2902 A receiver-SMTP MUST implement VRFY and SHOULD implement EXPN
2903 (this requirement overrides RFC-821). However, there MAY be
2904 configuration information to disable VRFY and EXPN in a
2905 particular installation; this might even allow EXPN to be
2906 disabled for selected lists.
2908 A new reply code is defined for the VRFY command:
2910 252 Cannot VRFY user (e.g., info is not local), but will
2911 take message for this user and attempt delivery.
2914 SMTP users and administrators make regular use of these
2915 commands for diagnosing mail delivery problems. With the
2916 increasing use of multi-level mailing list expansion
2917 (sometimes more than two levels), EXPN has been
2918 increasingly important for diagnosing inadvertent mail
2919 loops. On the other hand, some feel that EXPN represents
2920 a significant privacy, and perhaps even a security,
2923 5.2.4 SEND, SOML, and SAML Commands: RFC-821 Section 3.4
2925 An SMTP MAY implement the commands to send a message to a
2926 user's terminal: SEND, SOML, and SAML.
2929 It has been suggested that the use of mail relaying
2930 through an MX record is inconsistent with the intent of
2931 SEND to deliver a message immediately and directly to a
2932 user's terminal. However, an SMTP receiver that is unable
2933 to write directly to the user terminal can return a "251
2934 User Not Local" reply to the RCPT following a SEND, to
2935 inform the originator of possibly deferred delivery.
2937 5.2.5 HELO Command: RFC-821 Section 3.5
2939 The sender-SMTP MUST ensure that the <domain> parameter in a
2940 HELO command is a valid principal host domain name for the
2941 client host. As a result, the receiver-SMTP will not have to
2942 perform MX resolution on this name in order to validate the
2945 The HELO receiver MAY verify that the HELO parameter really
2949 Internet Engineering Task Force [Page 50]
2954 RFC1123 MAIL -- SMTP & RFC-822 October 1989
2957 corresponds to the IP address of the sender. However, the
2958 receiver MUST NOT refuse to accept a message, even if the
2959 sender's HELO command fails verification.
2962 Verifying the HELO parameter requires a domain name lookup
2963 and may therefore take considerable time. An alternative
2964 tool for tracking bogus mail sources is suggested below
2965 (see "DATA Command").
2967 Note also that the HELO argument is still required to have
2968 valid <domain> syntax, since it will appear in a Received:
2969 line; otherwise, a 501 error is to be sent.
2972 When HELO parameter validation fails, a suggested
2973 procedure is to insert a note about the unknown
2974 authenticity of the sender into the message header (e.g.,
2975 in the "Received:" line).
2977 5.2.6 Mail Relay: RFC-821 Section 3.6
2979 We distinguish three types of mail (store-and-) forwarding:
2981 (1) A simple forwarder or "mail exchanger" forwards a message
2982 using private knowledge about the recipient; see section
2985 (2) An SMTP mail "relay" forwards a message within an SMTP
2986 mail environment as the result of an explicit source route
2987 (as defined in section 3.6 of RFC-821). The SMTP relay
2988 function uses the "@...:" form of source route from RFC-
2989 822 (see Section 5.2.19 below).
2991 (3) A mail "gateway" passes a message between different
2992 environments. The rules for mail gateways are discussed
2993 below in Section 5.3.7.
2995 An Internet host that is forwarding a message but is not a
2996 gateway to a different mail environment (i.e., it falls under
2997 (1) or (2)) SHOULD NOT alter any existing header fields,
2998 although the host will add an appropriate Received: line as
2999 required in Section 5.2.8.
3001 A Sender-SMTP SHOULD NOT send a RCPT TO: command containing an
3002 explicit source route using the "@...:" address form. Thus,
3003 the relay function defined in section 3.6 of RFC-821 should
3008 Internet Engineering Task Force [Page 51]
3013 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3017 The intent is to discourage all source routing and to
3018 abolish explicit source routing for mail delivery within
3019 the Internet environment. Source-routing is unnecessary;
3020 the simple target address "user@domain" should always
3021 suffice. This is the result of an explicit architectural
3022 decision to use universal naming rather than source
3023 routing for mail. Thus, SMTP provides end-to-end
3024 connectivity, and the DNS provides globally-unique,
3025 location-independent names. MX records handle the major
3026 case where source routing might otherwise be needed.
3028 A receiver-SMTP MUST accept the explicit source route syntax in
3029 the envelope, but it MAY implement the relay function as
3030 defined in section 3.6 of RFC-821. If it does not implement
3031 the relay function, it SHOULD attempt to deliver the message
3032 directly to the host to the right of the right-most "@" sign.
3035 For example, suppose a host that does not implement the
3036 relay function receives a message with the SMTP command:
3037 "RCPT TO:<@ALPHA,@BETA:joe@GAMMA>", where ALPHA, BETA, and
3038 GAMMA represent domain names. Rather than immediately
3039 refusing the message with a 550 error reply as suggested
3040 on page 20 of RFC-821, the host should try to forward the
3041 message to GAMMA directly, using: "RCPT TO:<joe@GAMMA>".
3042 Since this host does not support relaying, it is not
3043 required to update the reverse path.
3045 Some have suggested that source routing may be needed
3046 occasionally for manually routing mail around failures;
3047 however, the reality and importance of this need is
3048 controversial. The use of explicit SMTP mail relaying for
3049 this purpose is discouraged, and in fact it may not be
3050 successful, as many host systems do not support it. Some
3051 have used the "%-hack" (see Section 5.2.16) for this
3054 5.2.7 RCPT Command: RFC-821 Section 4.1.1
3056 A host that supports a receiver-SMTP MUST support the reserved
3057 mailbox "Postmaster".
3059 The receiver-SMTP MAY verify RCPT parameters as they arrive;
3060 however, RCPT responses MUST NOT be delayed beyond a reasonable
3061 time (see Section 5.3.2).
3063 Therefore, a "250 OK" response to a RCPT does not necessarily
3067 Internet Engineering Task Force [Page 52]
3072 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3075 imply that the delivery address(es) are valid. Errors found
3076 after message acceptance will be reported by mailing a
3077 notification message to an appropriate address (see Section
3081 The set of conditions under which a RCPT parameter can be
3082 validated immediately is an engineering design choice.
3083 Reporting destination mailbox errors to the Sender-SMTP
3084 before mail is transferred is generally desirable to save
3085 time and network bandwidth, but this advantage is lost if
3086 RCPT verification is lengthy.
3088 For example, the receiver can verify immediately any
3089 simple local reference, such as a single locally-
3090 registered mailbox. On the other hand, the "reasonable
3091 time" limitation generally implies deferring verification
3092 of a mailing list until after the message has been
3093 transferred and accepted, since verifying a large mailing
3094 list can take a very long time. An implementation might
3095 or might not choose to defer validation of addresses that
3096 are non-local and therefore require a DNS lookup. If a
3097 DNS lookup is performed but a soft domain system error
3098 (e.g., timeout) occurs, validity must be assumed.
3100 5.2.8 DATA Command: RFC-821 Section 4.1.1
3102 Every receiver-SMTP (not just one that "accepts a message for
3103 relaying or for final delivery" [SMTP:1]) MUST insert a
3104 "Received:" line at the beginning of a message. In this line,
3105 called a "time stamp line" in RFC-821:
3107 * The FROM field SHOULD contain both (1) the name of the
3108 source host as presented in the HELO command and (2) a
3109 domain literal containing the IP address of the source,
3110 determined from the TCP connection.
3112 * The ID field MAY contain an "@" as suggested in RFC-822,
3113 but this is not required.
3115 * The FOR field MAY contain a list of <path> entries when
3116 multiple RCPT commands have been given.
3119 An Internet mail program MUST NOT change a Received: line that
3120 was previously added to the message header.
3126 Internet Engineering Task Force [Page 53]
3131 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3135 Including both the source host and the IP source address
3136 in the Received: line may provide enough information for
3137 tracking illicit mail sources and eliminate a need to
3138 explicitly verify the HELO parameter.
3140 Received: lines are primarily intended for humans tracing
3141 mail routes, primarily of diagnosis of faults. See also
3142 the discussion under 5.3.7.
3144 When the receiver-SMTP makes "final delivery" of a message,
3145 then it MUST pass the MAIL FROM: address from the SMTP envelope
3146 with the message, for use if an error notification message must
3147 be sent later (see Section 5.3.3). There is an analogous
3148 requirement when gatewaying from the Internet into a different
3149 mail environment; see Section 5.3.7.
3152 Note that the final reply to the DATA command depends only
3153 upon the successful transfer and storage of the message.
3154 Any problem with the destination address(es) must either
3155 (1) have been reported in an SMTP error reply to the RCPT
3156 command(s), or (2) be reported in a later error message
3157 mailed to the originator.
3160 The MAIL FROM: information may be passed as a parameter or
3161 in a Return-Path: line inserted at the beginning of the
3164 5.2.9 Command Syntax: RFC-821 Section 4.1.2
3166 The syntax shown in RFC-821 for the MAIL FROM: command omits
3167 the case of an empty path: "MAIL FROM: <>" (see RFC-821 Page
3168 15). An empty reverse path MUST be supported.
3170 5.2.10 SMTP Replies: RFC-821 Section 4.2
3172 A receiver-SMTP SHOULD send only the reply codes listed in
3173 section 4.2.2 of RFC-821 or in this document. A receiver-SMTP
3174 SHOULD use the text shown in examples in RFC-821 whenever
3177 A sender-SMTP MUST determine its actions only by the reply
3178 code, not by the text (except for 251 and 551 replies); any
3179 text, including no text at all, must be acceptable. The space
3180 (blank) following the reply code is considered part of the
3181 text. Whenever possible, a sender-SMTP SHOULD test only the
3185 Internet Engineering Task Force [Page 54]
3190 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3193 first digit of the reply code, as specified in Appendix E of
3197 Interoperability problems have arisen with SMTP systems
3198 using reply codes that are not listed explicitly in RFC-
3199 821 Section 4.3 but are legal according to the theory of
3200 reply codes explained in Appendix E.
3202 5.2.11 Transparency: RFC-821 Section 4.5.2
3204 Implementors MUST be sure that their mail systems always add
3205 and delete periods to ensure message transparency.
3207 5.2.12 WKS Use in MX Processing: RFC-974, p. 5
3209 RFC-974 [SMTP:3] recommended that the domain system be queried
3210 for WKS ("Well-Known Service") records, to verify that each
3211 proposed mail target does support SMTP. Later experience has
3212 shown that WKS is not widely supported, so the WKS step in MX
3213 processing SHOULD NOT be used.
3215 The following are notes on RFC-822, organized by section of that
3218 5.2.13 RFC-822 Message Specification: RFC-822 Section 4
3220 The syntax shown for the Return-path line omits the possibility
3221 of a null return path, which is used to prevent looping of
3222 error notifications (see Section 5.3.3). The complete syntax
3225 return = "Return-path" ":" route-addr
3226 / "Return-path" ":" "<" ">"
3228 The set of optional header fields is hereby expanded to include
3229 the Content-Type field defined in RFC-1049 [SMTP:7]. This
3230 field "allows mail reading systems to automatically identify
3231 the type of a structured message body and to process it for
3232 display accordingly". [SMTP:7] A User Agent MAY support this
3235 5.2.14 RFC-822 Date and Time Specification: RFC-822 Section 5
3237 The syntax for the date is hereby changed to:
3239 date = 1*2DIGIT month 2*4DIGIT
3244 Internet Engineering Task Force [Page 55]
3249 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3252 All mail software SHOULD use 4-digit years in dates, to ease
3253 the transition to the next century.
3255 There is a strong trend towards the use of numeric timezone
3256 indicators, and implementations SHOULD use numeric timezones
3257 instead of timezone names. However, all implementations MUST
3258 accept either notation. If timezone names are used, they MUST
3259 be exactly as defined in RFC-822.
3261 The military time zones are specified incorrectly in RFC-822:
3262 they count the wrong way from UT (the signs are reversed). As
3263 a result, military time zones in RFC-822 headers carry no
3266 Finally, note that there is a typo in the definition of "zone"
3267 in the syntax summary of appendix D; the correct definition
3268 occurs in Section 3 of RFC-822.
3270 5.2.15 RFC-822 Syntax Change: RFC-822 Section 6.1
3272 The syntactic definition of "mailbox" in RFC-822 is hereby
3275 mailbox = addr-spec ; simple address
3276 / [phrase] route-addr ; name & addr-spec
3278 That is, the phrase preceding a route address is now OPTIONAL.
3279 This change makes the following header field legal, for
3282 From: <craig@nnsc.nsf.net>
3284 5.2.16 RFC-822 Local-part: RFC-822 Section 6.2
3286 The basic mailbox address specification has the form: "local-
3287 part@domain". Here "local-part", sometimes called the "left-
3288 hand side" of the address, is domain-dependent.
3290 A host that is forwarding the message but is not the
3291 destination host implied by the right-hand side "domain" MUST
3292 NOT interpret or modify the "local-part" of the address.
3294 When mail is to be gatewayed from the Internet mail environment
3295 into a foreign mail environment (see Section 5.3.7), routing
3296 information for that foreign environment MAY be embedded within
3297 the "local-part" of the address. The gateway will then
3298 interpret this local part appropriately for the foreign mail
3303 Internet Engineering Task Force [Page 56]
3308 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3312 Although source routes are discouraged within the Internet
3313 (see Section 5.2.6), there are non-Internet mail
3314 environments whose delivery mechanisms do depend upon
3315 source routes. Source routes for extra-Internet
3316 environments can generally be buried in the "local-part"
3317 of the address (see Section 5.2.16) while mail traverses
3318 the Internet. When the mail reaches the appropriate
3319 Internet mail gateway, the gateway will interpret the
3320 local-part and build the necessary address or route for
3321 the target mail environment.
3323 For example, an Internet host might send mail to:
3324 "a!b!c!user@gateway-domain". The complex local part
3325 "a!b!c!user" would be uninterpreted within the Internet
3326 domain, but could be parsed and understood by the
3327 specified mail gateway.
3329 An embedded source route is sometimes encoded in the
3330 "local-part" using "%" as a right-binding routing
3331 operator. For example, in:
3333 user%domain%relay3%relay2@relay1
3335 the "%" convention implies that the mail is to be routed
3336 from "relay1" through "relay2", "relay3", and finally to
3337 "user" at "domain". This is commonly known as the "%-
3338 hack". It is suggested that "%" have lower precedence
3339 than any other routing operator (e.g., "!") hidden in the
3340 local-part; for example, "a!b%c" would be interpreted as
3343 Only the target host (in this case, "relay1") is permitted
3344 to analyze the local-part "user%domain%relay3%relay2".
3346 5.2.17 Domain Literals: RFC-822 Section 6.2.3
3348 A mailer MUST be able to accept and parse an Internet domain
3349 literal whose content ("dtext"; see RFC-822) is a dotted-
3350 decimal host address. This satisfies the requirement of
3351 Section 2.1 for the case of mail.
3353 An SMTP MUST accept and recognize a domain literal for any of
3354 its own IP addresses.
3362 Internet Engineering Task Force [Page 57]
3367 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3370 5.2.18 Common Address Formatting Errors: RFC-822 Section 6.1
3372 Errors in formatting or parsing 822 addresses are unfortunately
3373 common. This section mentions only the most common errors. A
3374 User Agent MUST accept all valid RFC-822 address formats, and
3375 MUST NOT generate illegal address syntax.
3377 o A common error is to leave out the semicolon after a group
3380 o Some systems fail to fully-qualify domain names in
3381 messages they generate. The right-hand side of an "@"
3382 sign in a header address field MUST be a fully-qualified
3385 For example, some systems fail to fully-qualify the From:
3386 address; this prevents a "reply" command in the user
3387 interface from automatically constructing a return
3391 Although RFC-822 allows the local use of abbreviated
3392 domain names within a domain, the application of
3393 RFC-822 in Internet mail does not allow this. The
3394 intent is that an Internet host must not send an SMTP
3395 message header containing an abbreviated domain name
3396 in an address field. This allows the address fields
3397 of the header to be passed without alteration across
3398 the Internet, as required in Section 5.2.6.
3400 o Some systems mis-parse multiple-hop explicit source routes
3403 @relay1,@relay2,@relay3:user@domain.
3406 o Some systems over-qualify domain names by adding a
3407 trailing dot to some or all domain names in addresses or
3408 message-ids. This violates RFC-822 syntax.
3411 5.2.19 Explicit Source Routes: RFC-822 Section 6.2.7
3413 Internet host software SHOULD NOT create an RFC-822 header
3414 containing an address with an explicit source route, but MUST
3415 accept such headers for compatibility with earlier systems.
3421 Internet Engineering Task Force [Page 58]
3426 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3429 In an understatement, RFC-822 says "The use of explicit
3430 source routing is discouraged". Many hosts implemented
3431 RFC-822 source routes incorrectly, so the syntax cannot be
3432 used unambiguously in practice. Many users feel the
3433 syntax is ugly. Explicit source routes are not needed in
3434 the mail envelope for delivery; see Section 5.2.6. For
3435 all these reasons, explicit source routes using the RFC-
3436 822 notations are not to be used in Internet mail headers.
3438 As stated in Section 5.2.16, it is necessary to allow an
3439 explicit source route to be buried in the local-part of an
3440 address, e.g., using the "%-hack", in order to allow mail
3441 to be gatewayed into another environment in which explicit
3442 source routing is necessary. The vigilant will observe
3443 that there is no way for a User Agent to detect and
3444 prevent the use of such implicit source routing when the
3445 destination is within the Internet. We can only
3446 discourage source routing of any kind within the Internet,
3447 as unnecessary and undesirable.
3451 5.3.1 SMTP Queueing Strategies
3453 The common structure of a host SMTP implementation includes
3454 user mailboxes, one or more areas for queueing messages in
3455 transit, and one or more daemon processes for sending and
3456 receiving mail. The exact structure will vary depending on the
3457 needs of the users on the host and the number and size of
3458 mailing lists supported by the host. We describe several
3459 optimizations that have proved helpful, particularly for
3460 mailers supporting high traffic levels.
3462 Any queueing strategy MUST include:
3464 o Timeouts on all activities. See Section 5.3.2.
3466 o Never sending error messages in response to error
3470 5.3.1.1 Sending Strategy
3472 The general model of a sender-SMTP is one or more processes
3473 that periodically attempt to transmit outgoing mail. In a
3474 typical system, the program that composes a message has some
3475 method for requesting immediate attention for a new piece of
3476 outgoing mail, while mail that cannot be transmitted
3480 Internet Engineering Task Force [Page 59]
3485 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3488 immediately MUST be queued and periodically retried by the
3489 sender. A mail queue entry will include not only the
3490 message itself but also the envelope information.
3492 The sender MUST delay retrying a particular destination
3493 after one attempt has failed. In general, the retry
3494 interval SHOULD be at least 30 minutes; however, more
3495 sophisticated and variable strategies will be beneficial
3496 when the sender-SMTP can determine the reason for non-
3499 Retries continue until the message is transmitted or the
3500 sender gives up; the give-up time generally needs to be at
3501 least 4-5 days. The parameters to the retry algorithm MUST
3504 A sender SHOULD keep a list of hosts it cannot reach and
3505 corresponding timeouts, rather than just retrying queued
3509 Experience suggests that failures are typically
3510 transient (the target system has crashed), favoring a
3511 policy of two connection attempts in the first hour the
3512 message is in the queue, and then backing off to once
3513 every two or three hours.
3515 The sender-SMTP can shorten the queueing delay by
3516 cooperation with the receiver-SMTP. In particular, if
3517 mail is received from a particular address, it is good
3518 evidence that any mail queued for that host can now be
3521 The strategy may be further modified as a result of
3522 multiple addresses per host (see Section 5.3.4), to
3523 optimize delivery time vs. resource usage.
3525 A sender-SMTP may have a large queue of messages for
3526 each unavailable destination host, and if it retried
3527 all these messages in every retry cycle, there would be
3528 excessive Internet overhead and the daemon would be
3529 blocked for a long period. Note that an SMTP can
3530 generally determine that a delivery attempt has failed
3531 only after a timeout of a minute or more; a one minute
3532 timeout per connection will result in a very large
3533 delay if it is repeated for dozens or even hundreds of
3539 Internet Engineering Task Force [Page 60]
3544 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3547 When the same message is to be delivered to several users on
3548 the same host, only one copy of the message SHOULD be
3549 transmitted. That is, the sender-SMTP should use the
3550 command sequence: RCPT, RCPT,... RCPT, DATA instead of the
3551 sequence: RCPT, DATA, RCPT, DATA,... RCPT, DATA.
3552 Implementation of this efficiency feature is strongly urged.
3554 Similarly, the sender-SMTP MAY support multiple concurrent
3555 outgoing mail transactions to achieve timely delivery.
3556 However, some limit SHOULD be imposed to protect the host
3557 from devoting all its resources to mail.
3559 The use of the different addresses of a multihomed host is
3562 5.3.1.2 Receiving strategy
3564 The receiver-SMTP SHOULD attempt to keep a pending listen on
3565 the SMTP port at all times. This will require the support
3566 of multiple incoming TCP connections for SMTP. Some limit
3570 When the receiver-SMTP receives mail from a particular
3571 host address, it could notify the sender-SMTP to retry
3572 any mail pending for that host address.
3574 5.3.2 Timeouts in SMTP
3576 There are two approaches to timeouts in the sender-SMTP: (a)
3577 limit the time for each SMTP command separately, or (b) limit
3578 the time for the entire SMTP dialogue for a single mail
3579 message. A sender-SMTP SHOULD use option (a), per-command
3580 timeouts. Timeouts SHOULD be easily reconfigurable, preferably
3581 without recompiling the SMTP code.
3584 Timeouts are an essential feature of an SMTP
3585 implementation. If the timeouts are too long (or worse,
3586 there are no timeouts), Internet communication failures or
3587 software bugs in receiver-SMTP programs can tie up SMTP
3588 processes indefinitely. If the timeouts are too short,
3589 resources will be wasted with attempts that time out part
3590 way through message delivery.
3592 If option (b) is used, the timeout has to be very large,
3593 e.g., an hour, to allow time to expand very large mailing
3594 lists. The timeout may also need to increase linearly
3598 Internet Engineering Task Force [Page 61]
3603 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3606 with the size of the message, to account for the time to
3607 transmit a very large message. A large fixed timeout
3608 leads to two problems: a failure can still tie up the
3609 sender for a very long time, and very large messages may
3610 still spuriously time out (which is a wasteful failure!).
3612 Using the recommended option (a), a timer is set for each
3613 SMTP command and for each buffer of the data transfer.
3614 The latter means that the overall timeout is inherently
3615 proportional to the size of the message.
3617 Based on extensive experience with busy mail-relay hosts, the
3618 minimum per-command timeout values SHOULD be as follows:
3620 o Initial 220 Message: 5 minutes
3622 A Sender-SMTP process needs to distinguish between a
3623 failed TCP connection and a delay in receiving the initial
3624 220 greeting message. Many receiver-SMTPs will accept a
3625 TCP connection but delay delivery of the 220 message until
3626 their system load will permit more mail to be processed.
3628 o MAIL Command: 5 minutes
3631 o RCPT Command: 5 minutes
3633 A longer timeout would be required if processing of
3634 mailing lists and aliases were not deferred until after
3635 the message was accepted.
3637 o DATA Initiation: 2 minutes
3639 This is while awaiting the "354 Start Input" reply to a
3642 o Data Block: 3 minutes
3644 This is while awaiting the completion of each TCP SEND
3645 call transmitting a chunk of data.
3647 o DATA Termination: 10 minutes.
3649 This is while awaiting the "250 OK" reply. When the
3650 receiver gets the final period terminating the message
3651 data, it typically performs processing to deliver the
3652 message to a user mailbox. A spurious timeout at this
3653 point would be very wasteful, since the message has been
3657 Internet Engineering Task Force [Page 62]
3662 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3667 A receiver-SMTP SHOULD have a timeout of at least 5 minutes
3668 while it is awaiting the next command from the sender.
3670 5.3.3 Reliable Mail Receipt
3672 When the receiver-SMTP accepts a piece of mail (by sending a
3673 "250 OK" message in response to DATA), it is accepting
3674 responsibility for delivering or relaying the message. It must
3675 take this responsibility seriously, i.e., it MUST NOT lose the
3676 message for frivolous reasons, e.g., because the host later
3677 crashes or because of a predictable resource shortage.
3679 If there is a delivery failure after acceptance of a message,
3680 the receiver-SMTP MUST formulate and mail a notification
3681 message. This notification MUST be sent using a null ("<>")
3682 reverse path in the envelope; see Section 3.6 of RFC-821. The
3683 recipient of this notification SHOULD be the address from the
3684 envelope return path (or the Return-Path: line). However, if
3685 this address is null ("<>"), the receiver-SMTP MUST NOT send a
3686 notification. If the address is an explicit source route, it
3687 SHOULD be stripped down to its final hop.
3690 For example, suppose that an error notification must be
3691 sent for a message that arrived with:
3692 "MAIL FROM:<@a,@b:user@d>". The notification message
3693 should be sent to: "RCPT TO:<user@d>".
3695 Some delivery failures after the message is accepted by
3696 SMTP will be unavoidable. For example, it may be
3697 impossible for the receiver-SMTP to validate all the
3698 delivery addresses in RCPT command(s) due to a "soft"
3699 domain system error or because the target is a mailing
3700 list (see earlier discussion of RCPT).
3702 To avoid receiving duplicate messages as the result of
3703 timeouts, a receiver-SMTP MUST seek to minimize the time
3704 required to respond to the final "." that ends a message
3705 transfer. See RFC-1047 [SMTP:4] for a discussion of this
3708 5.3.4 Reliable Mail Transmission
3710 To transmit a message, a sender-SMTP determines the IP address
3711 of the target host from the destination address in the
3712 envelope. Specifically, it maps the string to the right of the
3716 Internet Engineering Task Force [Page 63]
3721 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3724 "@" sign into an IP address. This mapping or the transfer
3725 itself may fail with a soft error, in which case the sender-
3726 SMTP will requeue the outgoing mail for a later retry, as
3727 required in Section 5.3.1.1.
3729 When it succeeds, the mapping can result in a list of
3730 alternative delivery addresses rather than a single address,
3731 because of (a) multiple MX records, (b) multihoming, or both.
3732 To provide reliable mail transmission, the sender-SMTP MUST be
3733 able to try (and retry) each of the addresses in this list in
3734 order, until a delivery attempt succeeds. However, there MAY
3735 also be a configurable limit on the number of alternate
3736 addresses that can be tried. In any case, a host SHOULD try at
3737 least two addresses.
3739 The following information is to be used to rank the host
3742 (1) Multiple MX Records -- these contain a preference
3743 indication that should be used in sorting. If there are
3744 multiple destinations with the same preference and there
3745 is no clear reason to favor one (e.g., by address
3746 preference), then the sender-SMTP SHOULD pick one at
3747 random to spread the load across multiple mail exchanges
3748 for a specific organization; note that this is a
3749 refinement of the procedure in [DNS:3].
3751 (2) Multihomed host -- The destination host (perhaps taken
3752 from the preferred MX record) may be multihomed, in which
3753 case the domain name resolver will return a list of
3754 alternative IP addresses. It is the responsibility of the
3755 domain name resolver interface (see Section 6.1.3.4 below)
3756 to have ordered this list by decreasing preference, and
3757 SMTP MUST try them in the order presented.
3760 Although the capability to try multiple alternative
3761 addresses is required, there may be circumstances where
3762 specific installations want to limit or disable the use of
3763 alternative addresses. The question of whether a sender
3764 should attempt retries using the different addresses of a
3765 multihomed host has been controversial. The main argument
3766 for using the multiple addresses is that it maximizes the
3767 probability of timely delivery, and indeed sometimes the
3768 probability of any delivery; the counter argument is that
3769 it may result in unnecessary resource use.
3771 Note that resource use is also strongly determined by the
3775 Internet Engineering Task Force [Page 64]
3780 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3783 sending strategy discussed in Section 5.3.1.
3785 5.3.5 Domain Name Support
3787 SMTP implementations MUST use the mechanism defined in Section
3788 6.1 for mapping between domain names and IP addresses. This
3789 means that every Internet SMTP MUST include support for the
3792 In particular, a sender-SMTP MUST support the MX record scheme
3793 [SMTP:3]. See also Section 7.4 of [DNS:2] for information on
3794 domain name support for SMTP.
3796 5.3.6 Mailing Lists and Aliases
3798 An SMTP-capable host SHOULD support both the alias and the list
3799 form of address expansion for multiple delivery. When a
3800 message is delivered or forwarded to each address of an
3801 expanded list form, the return address in the envelope
3802 ("MAIL FROM:") MUST be changed to be the address of a person
3803 who administers the list, but the message header MUST be left
3804 unchanged; in particular, the "From" field of the message is
3808 An important mail facility is a mechanism for multi-
3809 destination delivery of a single message, by transforming
3810 or "expanding" a pseudo-mailbox address into a list of
3811 destination mailbox addresses. When a message is sent to
3812 such a pseudo-mailbox (sometimes called an "exploder"),
3813 copies are forwarded or redistributed to each mailbox in
3814 the expanded list. We classify such a pseudo-mailbox as
3815 an "alias" or a "list", depending upon the expansion
3820 To expand an alias, the recipient mailer simply
3821 replaces the pseudo-mailbox address in the envelope
3822 with each of the expanded addresses in turn; the rest
3823 of the envelope and the message body are left
3824 unchanged. The message is then delivered or
3825 forwarded to each expanded address.
3829 A mailing list may be said to operate by
3830 "redistribution" rather than by "forwarding". To
3834 Internet Engineering Task Force [Page 65]
3839 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3842 expand a list, the recipient mailer replaces the
3843 pseudo-mailbox address in the envelope with each of
3844 the expanded addresses in turn. The return address in
3845 the envelope is changed so that all error messages
3846 generated by the final deliveries will be returned to
3847 a list administrator, not to the message originator,
3848 who generally has no control over the contents of the
3849 list and will typically find error messages annoying.
3852 5.3.7 Mail Gatewaying
3854 Gatewaying mail between different mail environments, i.e.,
3855 different mail formats and protocols, is complex and does not
3856 easily yield to standardization. See for example [SMTP:5a],
3857 [SMTP:5b]. However, some general requirements may be given for
3858 a gateway between the Internet and another mail environment.
3860 (A) Header fields MAY be rewritten when necessary as messages
3861 are gatewayed across mail environment boundaries.
3864 This may involve interpreting the local-part of the
3865 destination address, as suggested in Section 5.2.16.
3867 The other mail systems gatewayed to the Internet
3868 generally use a subset of RFC-822 headers, but some
3869 of them do not have an equivalent to the SMTP
3870 envelope. Therefore, when a message leaves the
3871 Internet environment, it may be necessary to fold the
3872 SMTP envelope information into the message header. A
3873 possible solution would be to create new header
3874 fields to carry the envelope information (e.g., "X-
3875 SMTP-MAIL:" and "X-SMTP-RCPT:"); however, this would
3876 require changes in mail programs in the foreign
3879 (B) When forwarding a message into or out of the Internet
3880 environment, a gateway MUST prepend a Received: line, but
3881 it MUST NOT alter in any way a Received: line that is
3882 already in the header.
3885 This requirement is a subset of the general
3886 "Received:" line requirement of Section 5.2.8; it is
3887 restated here for emphasis.
3889 Received: fields of messages originating from other
3893 Internet Engineering Task Force [Page 66]
3898 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3901 environments may not conform exactly to RFC822.
3902 However, the most important use of Received: lines is
3903 for debugging mail faults, and this debugging can be
3904 severely hampered by well-meaning gateways that try
3905 to "fix" a Received: line.
3907 The gateway is strongly encouraged to indicate the
3908 environment and protocol in the "via" clauses of
3909 Received field(s) that it supplies.
3911 (C) From the Internet side, the gateway SHOULD accept all
3912 valid address formats in SMTP commands and in RFC-822
3913 headers, and all valid RFC-822 messages. Although a
3914 gateway must accept an RFC-822 explicit source route
3915 ("@...:" format) in either the RFC-822 header or in the
3916 envelope, it MAY or may not act on the source route; see
3917 Sections 5.2.6 and 5.2.19.
3920 It is often tempting to restrict the range of
3921 addresses accepted at the mail gateway to simplify
3922 the translation into addresses for the remote
3923 environment. This practice is based on the
3924 assumption that mail users have control over the
3925 addresses their mailers send to the mail gateway. In
3926 practice, however, users have little control over the
3927 addresses that are finally sent; their mailers are
3928 free to change addresses into any legal RFC-822
3931 (D) The gateway MUST ensure that all header fields of a
3932 message that it forwards into the Internet meet the
3933 requirements for Internet mail. In particular, all
3934 addresses in "From:", "To:", "Cc:", etc., fields must be
3935 transformed (if necessary) to satisfy RFC-822 syntax, and
3936 they must be effective and useful for sending replies.
3939 (E) The translation algorithm used to convert mail from the
3940 Internet protocols to another environment's protocol
3941 SHOULD try to ensure that error messages from the foreign
3942 mail environment are delivered to the return path from the
3943 SMTP envelope, not to the sender listed in the "From:"
3944 field of the RFC-822 message.
3947 Internet mail lists usually place the address of the
3948 mail list maintainer in the envelope but leave the
3952 Internet Engineering Task Force [Page 67]
3957 RFC1123 MAIL -- SMTP & RFC-822 October 1989
3960 original message header intact (with the "From:"
3961 field containing the original sender). This yields
3962 the behavior the average recipient expects: a reply
3963 to the header gets sent to the original sender, not
3964 to a mail list maintainer; however, errors get sent
3965 to the maintainer (who can fix the problem) and not
3966 the sender (who probably cannot).
3968 (F) Similarly, when forwarding a message from another
3969 environment into the Internet, the gateway SHOULD set the
3970 envelope return path in accordance with an error message
3971 return address, if any, supplied by the foreign
3975 5.3.8 Maximum Message Size
3977 Mailer software MUST be able to send and receive messages of at
3978 least 64K bytes in length (including header), and a much larger
3979 maximum size is highly desirable.
3982 Although SMTP does not define the maximum size of a
3983 message, many systems impose implementation limits.
3985 The current de facto minimum limit in the Internet is 64K
3986 bytes. However, electronic mail is used for a variety of
3987 purposes that create much larger messages. For example,
3988 mail is often used instead of FTP for transmitting ASCII
3989 files, and in particular to transmit entire documents. As
3990 a result, messages can be 1 megabyte or even larger. We
3991 note that the present document together with its lower-
3992 layer companion contains 0.5 megabytes.
4011 Internet Engineering Task Force [Page 68]
4016 RFC1123 MAIL -- SMTP & RFC-822 October 1989
4019 5.4 SMTP REQUIREMENTS SUMMARY
4030 FEATURE |SECTION | | | |T|T|e
4031 -----------------------------------------------|----------|-|-|-|-|-|--
4033 RECEIVER-SMTP: | | | | | | |
4034 Implement VRFY |5.2.3 |x| | | | |
4035 Implement EXPN |5.2.3 | |x| | | |
4036 EXPN, VRFY configurable |5.2.3 | | |x| | |
4037 Implement SEND, SOML, SAML |5.2.4 | | |x| | |
4038 Verify HELO parameter |5.2.5 | | |x| | |
4039 Refuse message with bad HELO |5.2.5 | | | | |x|
4040 Accept explicit src-route syntax in env. |5.2.6 |x| | | | |
4041 Support "postmaster" |5.2.7 |x| | | | |
4042 Process RCPT when received (except lists) |5.2.7 | | |x| | |
4043 Long delay of RCPT responses |5.2.7 | | | | |x|
4045 Add Received: line |5.2.8 |x| | | | |
4046 Received: line include domain literal |5.2.8 | |x| | | |
4047 Change previous Received: line |5.2.8 | | | | |x|
4048 Pass Return-Path info (final deliv/gwy) |5.2.8 |x| | | | |
4049 Support empty reverse path |5.2.9 |x| | | | |
4050 Send only official reply codes |5.2.10 | |x| | | |
4051 Send text from RFC-821 when appropriate |5.2.10 | |x| | | |
4052 Delete "." for transparency |5.2.11 |x| | | | |
4053 Accept and recognize self domain literal(s) |5.2.17 |x| | | | |
4055 Error message about error message |5.3.1 | | | | |x|
4056 Keep pending listen on SMTP port |5.3.1.2 | |x| | | |
4057 Provide limit on recv concurrency |5.3.1.2 | | |x| | |
4058 Wait at least 5 mins for next sender cmd |5.3.2 | |x| | | |
4059 Avoidable delivery failure after "250 OK" |5.3.3 | | | | |x|
4060 Send error notification msg after accept |5.3.3 |x| | | | |
4061 Send using null return path |5.3.3 |x| | | | |
4062 Send to envelope return path |5.3.3 | |x| | | |
4063 Send to null address |5.3.3 | | | | |x|
4064 Strip off explicit src route |5.3.3 | |x| | | |
4065 Minimize acceptance delay (RFC-1047) |5.3.3 |x| | | | |
4066 -----------------------------------------------|----------|-|-|-|-|-|--
4070 Internet Engineering Task Force [Page 69]
4075 RFC1123 MAIL -- SMTP & RFC-822 October 1989
4079 SENDER-SMTP: | | | | | | |
4080 Canonicalized domain names in MAIL, RCPT |5.2.2 |x| | | | |
4081 Implement SEND, SOML, SAML |5.2.4 | | |x| | |
4082 Send valid principal host name in HELO |5.2.5 |x| | | | |
4083 Send explicit source route in RCPT TO: |5.2.6 | | | |x| |
4084 Use only reply code to determine action |5.2.10 |x| | | | |
4085 Use only high digit of reply code when poss. |5.2.10 | |x| | | |
4086 Add "." for transparency |5.2.11 |x| | | | |
4088 Retry messages after soft failure |5.3.1.1 |x| | | | |
4089 Delay before retry |5.3.1.1 |x| | | | |
4090 Configurable retry parameters |5.3.1.1 |x| | | | |
4091 Retry once per each queued dest host |5.3.1.1 | |x| | | |
4092 Multiple RCPT's for same DATA |5.3.1.1 | |x| | | |
4093 Support multiple concurrent transactions |5.3.1.1 | | |x| | |
4094 Provide limit on concurrency |5.3.1.1 | |x| | | |
4096 Timeouts on all activities |5.3.1 |x| | | | |
4097 Per-command timeouts |5.3.2 | |x| | | |
4098 Timeouts easily reconfigurable |5.3.2 | |x| | | |
4099 Recommended times |5.3.2 | |x| | | |
4100 Try alternate addr's in order |5.3.4 |x| | | | |
4101 Configurable limit on alternate tries |5.3.4 | | |x| | |
4102 Try at least two alternates |5.3.4 | |x| | | |
4103 Load-split across equal MX alternates |5.3.4 | |x| | | |
4104 Use the Domain Name System |5.3.5 |x| | | | |
4105 Support MX records |5.3.5 |x| | | | |
4106 Use WKS records in MX processing |5.2.12 | | | |x| |
4107 -----------------------------------------------|----------|-|-|-|-|-|--
4109 MAIL FORWARDING: | | | | | | |
4110 Alter existing header field(s) |5.2.6 | | | |x| |
4111 Implement relay function: 821/section 3.6 |5.2.6 | | |x| | |
4112 If not, deliver to RHS domain |5.2.6 | |x| | | |
4113 Interpret 'local-part' of addr |5.2.16 | | | | |x|
4115 MAILING LISTS AND ALIASES | | | | | | |
4116 Support both |5.3.6 | |x| | | |
4117 Report mail list error to local admin. |5.3.6 |x| | | | |
4119 MAIL GATEWAYS: | | | | | | |
4120 Embed foreign mail route in local-part |5.2.16 | | |x| | |
4121 Rewrite header fields when necessary |5.3.7 | | |x| | |
4122 Prepend Received: line |5.3.7 |x| | | | |
4123 Change existing Received: line |5.3.7 | | | | |x|
4124 Accept full RFC-822 on Internet side |5.3.7 | |x| | | |
4125 Act on RFC-822 explicit source route |5.3.7 | | |x| | |
4129 Internet Engineering Task Force [Page 70]
4134 RFC1123 MAIL -- SMTP & RFC-822 October 1989
4137 Send only valid RFC-822 on Internet side |5.3.7 |x| | | | |
4138 Deliver error msgs to envelope addr |5.3.7 | |x| | | |
4139 Set env return path from err return addr |5.3.7 | |x| | | |
4141 USER AGENT -- RFC-822 | | | | | | |
4142 Allow user to enter <route> address |5.2.6 | | | |x| |
4143 Support RFC-1049 Content Type field |5.2.13 | | |x| | |
4144 Use 4-digit years |5.2.14 | |x| | | |
4145 Generate numeric timezones |5.2.14 | |x| | | |
4146 Accept all timezones |5.2.14 |x| | | | |
4147 Use non-num timezones from RFC-822 |5.2.14 |x| | | | |
4148 Omit phrase before route-addr |5.2.15 | | |x| | |
4149 Accept and parse dot.dec. domain literals |5.2.17 |x| | | | |
4150 Accept all RFC-822 address formats |5.2.18 |x| | | | |
4151 Generate invalid RFC-822 address format |5.2.18 | | | | |x|
4152 Fully-qualified domain names in header |5.2.18 |x| | | | |
4153 Create explicit src route in header |5.2.19 | | | |x| |
4154 Accept explicit src route in header |5.2.19 |x| | | | |
4156 Send/recv at least 64KB messages |5.3.8 |x| | | | |
4188 Internet Engineering Task Force [Page 71]
4193 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4198 6.1 DOMAIN NAME TRANSLATION
4202 Every host MUST implement a resolver for the Domain Name System
4203 (DNS), and it MUST implement a mechanism using this DNS
4204 resolver to convert host names to IP addresses and vice-versa
4207 In addition to the DNS, a host MAY also implement a host name
4208 translation mechanism that searches a local Internet host
4209 table. See Section 6.1.3.8 for more information on this
4213 Internet host name translation was originally performed by
4214 searching local copies of a table of all hosts. This
4215 table became too large to update and distribute in a
4216 timely manner and too large to fit into many hosts, so the
4219 The DNS creates a distributed database used primarily for
4220 the translation between host names and host addresses.
4221 Implementation of DNS software is required. The DNS
4222 consists of two logically distinct parts: name servers and
4223 resolvers (although implementations often combine these
4224 two logical parts in the interest of efficiency) [DNS:2].
4226 Domain name servers store authoritative data about certain
4227 sections of the database and answer queries about the
4228 data. Domain resolvers query domain name servers for data
4229 on behalf of user processes. Every host therefore needs a
4230 DNS resolver; some host machines will also need to run
4231 domain name servers. Since no name server has complete
4232 information, in general it is necessary to obtain
4233 information from more than one name server to resolve a
4236 6.1.2 PROTOCOL WALK-THROUGH
4238 An implementor must study references [DNS:1] and [DNS:2]
4239 carefully. They provide a thorough description of the theory,
4240 protocol, and implementation of the domain name system, and
4241 reflect several years of experience.
4247 Internet Engineering Task Force [Page 72]
4252 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4255 6.1.2.1 Resource Records with Zero TTL: RFC-1035 Section 3.2.1
4257 All DNS name servers and resolvers MUST properly handle RRs
4258 with a zero TTL: return the RR to the client but do not
4262 Zero TTL values are interpreted to mean that the RR can
4263 only be used for the transaction in progress, and
4264 should not be cached; they are useful for extremely
4267 6.1.2.2 QCLASS Values: RFC-1035 Section 3.2.5
4269 A query with "QCLASS=*" SHOULD NOT be used unless the
4270 requestor is seeking data from more than one class. In
4271 particular, if the requestor is only interested in Internet
4272 data types, QCLASS=IN MUST be used.
4274 6.1.2.3 Unused Fields: RFC-1035 Section 4.1.1
4276 Unused fields in a query or response message MUST be zero.
4278 6.1.2.4 Compression: RFC-1035 Section 4.1.4
4280 Name servers MUST use compression in responses.
4283 Compression is essential to avoid overflowing UDP
4284 datagrams; see Section 6.1.3.2.
4286 6.1.2.5 Misusing Configuration Info: RFC-1035 Section 6.1.2
4288 Recursive name servers and full-service resolvers generally
4289 have some configuration information containing hints about
4290 the location of root or local name servers. An
4291 implementation MUST NOT include any of these hints in a
4295 Many implementors have found it convenient to store
4296 these hints as if they were cached data, but some
4297 neglected to ensure that this "cached data" was not
4298 included in responses. This has caused serious
4299 problems in the Internet when the hints were obsolete
4306 Internet Engineering Task Force [Page 73]
4311 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4314 6.1.3 SPECIFIC ISSUES
4316 6.1.3.1 Resolver Implementation
4318 A name resolver SHOULD be able to multiplex concurrent
4319 requests if the host supports concurrent processes.
4321 In implementing a DNS resolver, one of two different models
4322 MAY optionally be chosen: a full-service resolver, or a stub
4326 (A) Full-Service Resolver
4328 A full-service resolver is a complete implementation of
4329 the resolver service, and is capable of dealing with
4330 communication failures, failure of individual name
4331 servers, location of the proper name server for a given
4332 name, etc. It must satisfy the following requirements:
4334 o The resolver MUST implement a local caching
4335 function to avoid repeated remote access for
4336 identical requests, and MUST time out information
4339 o The resolver SHOULD be configurable with start-up
4340 information pointing to multiple root name servers
4341 and multiple name servers for the local domain.
4342 This insures that the resolver will be able to
4343 access the whole name space in normal cases, and
4344 will be able to access local domain information
4345 should the local network become disconnected from
4346 the rest of the Internet.
4351 A "stub resolver" relies on the services of a recursive
4352 name server on the connected network or a "nearby"
4353 network. This scheme allows the host to pass on the
4354 burden of the resolver function to a name server on
4355 another host. This model is often essential for less
4356 capable hosts, such as PCs, and is also recommended
4357 when the host is one of several workstations on a local
4358 network, because it allows all of the workstations to
4359 share the cache of the recursive name server and hence
4360 reduce the number of domain requests exported by the
4365 Internet Engineering Task Force [Page 74]
4370 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4373 At a minimum, the stub resolver MUST be capable of
4374 directing its requests to redundant recursive name
4375 servers. Note that recursive name servers are allowed
4376 to restrict the sources of requests that they will
4377 honor, so the host administrator must verify that the
4378 service will be provided. Stub resolvers MAY implement
4379 caching if they choose, but if so, MUST timeout cached
4383 6.1.3.2 Transport Protocols
4385 DNS resolvers and recursive servers MUST support UDP, and
4386 SHOULD support TCP, for sending (non-zone-transfer) queries.
4387 Specifically, a DNS resolver or server that is sending a
4388 non-zone-transfer query MUST send a UDP query first. If the
4389 Answer section of the response is truncated and if the
4390 requester supports TCP, it SHOULD try the query again using
4393 DNS servers MUST be able to service UDP queries and SHOULD
4394 be able to service TCP queries. A name server MAY limit the
4395 resources it devotes to TCP queries, but it SHOULD NOT
4396 refuse to service a TCP query just because it would have
4399 Truncated responses MUST NOT be saved (cached) and later
4400 used in such a way that the fact that they are truncated is
4404 UDP is preferred over TCP for queries because UDP
4405 queries have much lower overhead, both in packet count
4406 and in connection state. The use of UDP is essential
4407 for heavily-loaded servers, especially the root
4408 servers. UDP also offers additional robustness, since
4409 a resolver can attempt several UDP queries to different
4410 servers for the cost of a single TCP query.
4412 It is possible for a DNS response to be truncated,
4413 although this is a very rare occurrence in the present
4414 Internet DNS. Practically speaking, truncation cannot
4415 be predicted, since it is data-dependent. The
4416 dependencies include the number of RRs in the answer,
4417 the size of each RR, and the savings in space realized
4418 by the name compression algorithm. As a rule of thumb,
4419 truncation in NS and MX lists should not occur for
4420 answers containing 15 or fewer RRs.
4424 Internet Engineering Task Force [Page 75]
4429 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4432 Whether it is possible to use a truncated answer
4433 depends on the application. A mailer must not use a
4434 truncated MX response, since this could lead to mail
4437 Responsible practices can make UDP suffice in the vast
4438 majority of cases. Name servers must use compression
4439 in responses. Resolvers must differentiate truncation
4440 of the Additional section of a response (which only
4441 loses extra information) from truncation of the Answer
4442 section (which for MX records renders the response
4443 unusable by mailers). Database administrators should
4444 list only a reasonable number of primary names in lists
4445 of name servers, MX alternatives, etc.
4447 However, it is also clear that some new DNS record
4448 types defined in the future will contain information
4449 exceeding the 512 byte limit that applies to UDP, and
4450 hence will require TCP. Thus, resolvers and name
4451 servers should implement TCP services as a backup to
4452 UDP today, with the knowledge that they will require
4453 the TCP service in the future.
4455 By private agreement, name servers and resolvers MAY arrange
4456 to use TCP for all traffic between themselves. TCP MUST be
4457 used for zone transfers.
4459 A DNS server MUST have sufficient internal concurrency that
4460 it can continue to process UDP queries while awaiting a
4461 response or performing a zone transfer on an open TCP
4464 A server MAY support a UDP query that is delivered using an
4465 IP broadcast or multicast address. However, the Recursion
4466 Desired bit MUST NOT be set in a query that is multicast,
4467 and MUST be ignored by name servers receiving queries via a
4468 broadcast or multicast address. A host that sends broadcast
4469 or multicast DNS queries SHOULD send them only as occasional
4470 probes, caching the IP address(es) it obtains from the
4471 response(s) so it can normally send unicast queries.
4474 Broadcast or (especially) IP multicast can provide a
4475 way to locate nearby name servers without knowing their
4476 IP addresses in advance. However, general broadcasting
4477 of recursive queries can result in excessive and
4478 unnecessary load on both network and servers.
4483 Internet Engineering Task Force [Page 76]
4488 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4491 6.1.3.3 Efficient Resource Usage
4493 The following requirements on servers and resolvers are very
4494 important to the health of the Internet as a whole,
4495 particularly when DNS services are invoked repeatedly by
4496 higher level automatic servers, such as mailers.
4498 (1) The resolver MUST implement retransmission controls to
4499 insure that it does not waste communication bandwidth,
4500 and MUST impose finite bounds on the resources consumed
4501 to respond to a single request. See [DNS:2] pages 43-
4502 44 for specific recommendations.
4504 (2) After a query has been retransmitted several times
4505 without a response, an implementation MUST give up and
4506 return a soft error to the application.
4508 (3) All DNS name servers and resolvers SHOULD cache
4509 temporary failures, with a timeout period of the order
4513 This will prevent applications that immediately
4514 retry soft failures (in violation of Section 2.2
4515 of this document) from generating excessive DNS
4518 (4) All DNS name servers and resolvers SHOULD cache
4519 negative responses that indicate the specified name, or
4520 data of the specified type, does not exist, as
4521 described in [DNS:2].
4523 (5) When a DNS server or resolver retries a UDP query, the
4524 retry interval SHOULD be constrained by an exponential
4525 backoff algorithm, and SHOULD also have upper and lower
4529 A measured RTT and variance (if available) should
4530 be used to calculate an initial retransmission
4531 interval. If this information is not available, a
4532 default of no less than 5 seconds should be used.
4533 Implementations may limit the retransmission
4534 interval, but this limit must exceed twice the
4535 Internet maximum segment lifetime plus service
4536 delay at the name server.
4538 (6) When a resolver or server receives a Source Quench for
4542 Internet Engineering Task Force [Page 77]
4547 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4550 a query it has issued, it SHOULD take steps to reduce
4551 the rate of querying that server in the near future. A
4552 server MAY ignore a Source Quench that it receives as
4553 the result of sending a response datagram.
4556 One recommended action to reduce the rate is to
4557 send the next query attempt to an alternate
4558 server, if there is one available. Another is to
4559 backoff the retry interval for the same server.
4562 6.1.3.4 Multihomed Hosts
4564 When the host name-to-address function encounters a host
4565 with multiple addresses, it SHOULD rank or sort the
4566 addresses using knowledge of the immediately connected
4567 network number(s) and any other applicable performance or
4568 history information.
4571 The different addresses of a multihomed host generally
4572 imply different Internet paths, and some paths may be
4573 preferable to others in performance, reliability, or
4574 administrative restrictions. There is no general way
4575 for the domain system to determine the best path. A
4576 recommended approach is to base this decision on local
4577 configuration information set by the system
4581 The following scheme has been used successfully:
4583 (a) Incorporate into the host configuration data a
4584 Network-Preference List, that is simply a list of
4585 networks in preferred order. This list may be
4586 empty if there is no preference.
4588 (b) When a host name is mapped into a list of IP
4589 addresses, these addresses should be sorted by
4590 network number, into the same order as the
4591 corresponding networks in the Network-Preference
4592 List. IP addresses whose networks do not appear
4593 in the Network-Preference List should be placed at
4594 the end of the list.
4601 Internet Engineering Task Force [Page 78]
4606 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4609 6.1.3.5 Extensibility
4611 DNS software MUST support all well-known, class-independent
4612 formats [DNS:2], and SHOULD be written to minimize the
4613 trauma associated with the introduction of new well-known
4614 types and local experimentation with non-standard types.
4617 The data types and classes used by the DNS are
4618 extensible, and thus new types will be added and old
4619 types deleted or redefined. Introduction of new data
4620 types ought to be dependent only upon the rules for
4621 compression of domain names inside DNS messages, and
4622 the translation between printable (i.e., master file)
4623 and internal formats for Resource Records (RRs).
4625 Compression relies on knowledge of the format of data
4626 inside a particular RR. Hence compression must only be
4627 used for the contents of well-known, class-independent
4628 RRs, and must never be used for class-specific RRs or
4629 RR types that are not well-known. The owner name of an
4630 RR is always eligible for compression.
4632 A name server may acquire, via zone transfer, RRs that
4633 the server doesn't know how to convert to printable
4634 format. A resolver can receive similar information as
4635 the result of queries. For proper operation, this data
4636 must be preserved, and hence the implication is that
4637 DNS software cannot use textual formats for internal
4640 The DNS defines domain name syntax very generally -- a
4641 string of labels each containing up to 63 8-bit octets,
4642 separated by dots, and with a maximum total of 255
4643 octets. Particular applications of the DNS are
4644 permitted to further constrain the syntax of the domain
4645 names they use, although the DNS deployment has led to
4646 some applications allowing more general names. In
4647 particular, Section 2.1 of this document liberalizes
4648 slightly the syntax of a legal Internet host name that
4649 was defined in RFC-952 [DNS:4].
4651 6.1.3.6 Status of RR Types
4653 Name servers MUST be able to load all RR types except MD and
4654 MF from configuration files. The MD and MF types are
4655 obsolete and MUST NOT be implemented; in particular, name
4656 servers MUST NOT load these types from configuration files.
4660 Internet Engineering Task Force [Page 79]
4665 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4669 The RR types MB, MG, MR, NULL, MINFO and RP are
4670 considered experimental, and applications that use the
4671 DNS cannot expect these RR types to be supported by
4672 most domains. Furthermore these types are subject to
4675 The TXT and WKS RR types have not been widely used by
4676 Internet sites; as a result, an application cannot rely
4677 on the the existence of a TXT or WKS RR in most
4682 DNS software may need to operate in environments where the
4683 root servers or other servers are unavailable due to network
4684 connectivity or other problems. In this situation, DNS name
4685 servers and resolvers MUST continue to provide service for
4686 the reachable part of the name space, while giving temporary
4687 failures for the rest.
4690 Although the DNS is meant to be used primarily in the
4691 connected Internet, it should be possible to use the
4692 system in networks which are unconnected to the
4693 Internet. Hence implementations must not depend on
4694 access to root servers before providing service for
4697 6.1.3.8 Local Host Table
4700 A host may use a local host table as a backup or
4701 supplement to the DNS. This raises the question of
4702 which takes precedence, the DNS or the host table; the
4703 most flexible approach would make this a configuration
4706 Typically, the contents of such a supplementary host
4707 table will be determined locally by the site. However,
4708 a publically-available table of Internet hosts is
4709 maintained by the DDN Network Information Center (DDN
4710 NIC), with a format documented in [DNS:4]. This table
4711 can be retrieved from the DDN NIC using a protocol
4712 described in [DNS:5]. It must be noted that this table
4713 contains only a small fraction of all Internet hosts.
4714 Hosts using this protocol to retrieve the DDN NIC host
4715 table should use the VERSION command to check if the
4719 Internet Engineering Task Force [Page 80]
4724 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4727 table has changed before requesting the entire table
4728 with the ALL command. The VERSION identifier should be
4729 treated as an arbitrary string and tested only for
4730 equality; no numerical sequence may be assumed.
4732 The DDN NIC host table includes administrative
4733 information that is not needed for host operation and
4734 is therefore not currently included in the DNS
4735 database; examples include network and gateway entries.
4736 However, much of this additional information will be
4737 added to the DNS in the future. Conversely, the DNS
4738 provides essential services (in particular, MX records)
4739 that are not available from the DDN NIC host table.
4741 6.1.4 DNS USER INTERFACE
4743 6.1.4.1 DNS Administration
4745 This document is concerned with design and implementation
4746 issues in host software, not with administrative or
4747 operational issues. However, administrative issues are of
4748 particular importance in the DNS, since errors in particular
4749 segments of this large distributed database can cause poor
4750 or erroneous performance for many sites. These issues are
4751 discussed in [DNS:6] and [DNS:7].
4753 6.1.4.2 DNS User Interface
4755 Hosts MUST provide an interface to the DNS for all
4756 application programs running on the host. This interface
4757 will typically direct requests to a system process to
4758 perform the resolver function [DNS:1, 6.1:2].
4760 At a minimum, the basic interface MUST support a request for
4761 all information of a specific type and class associated with
4762 a specific name, and it MUST return either all of the
4763 requested information, a hard error code, or a soft error
4764 indication. When there is no error, the basic interface
4765 returns the complete response information without
4766 modification, deletion, or ordering, so that the basic
4767 interface will not need to be changed to accommodate new
4771 The soft error indication is an essential part of the
4772 interface, since it may not always be possible to
4773 access particular information from the DNS; see Section
4778 Internet Engineering Task Force [Page 81]
4783 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4786 A host MAY provide other DNS interfaces tailored to
4787 particular functions, transforming the raw domain data into
4788 formats more suited to these functions. In particular, a
4789 host MUST provide a DNS interface to facilitate translation
4790 between host addresses and host names.
4792 6.1.4.3 Interface Abbreviation Facilities
4794 User interfaces MAY provide a method for users to enter
4795 abbreviations for commonly-used names. Although the
4796 definition of such methods is outside of the scope of the
4797 DNS specification, certain rules are necessary to insure
4798 that these methods allow access to the entire DNS name space
4799 and to prevent excessive use of Internet resources.
4801 If an abbreviation method is provided, then:
4803 (a) There MUST be some convention for denoting that a name
4804 is already complete, so that the abbreviation method(s)
4805 are suppressed. A trailing dot is the usual method.
4807 (b) Abbreviation expansion MUST be done exactly once, and
4808 MUST be done in the context in which the name was
4813 For example, if an abbreviation is used in a mail
4814 program for a destination, the abbreviation should be
4815 expanded into a full domain name and stored in the
4816 queued message with an indication that it is already
4817 complete. Otherwise, the abbreviation might be
4818 expanded with a mail system search list, not the
4819 user's, or a name could grow due to repeated
4820 canonicalizations attempts interacting with wildcards.
4822 The two most common abbreviation methods are:
4824 (1) Interface-level aliases
4826 Interface-level aliases are conceptually implemented as
4827 a list of alias/domain name pairs. The list can be
4828 per-user or per-host, and separate lists can be
4829 associated with different functions, e.g. one list for
4830 host name-to-address translation, and a different list
4831 for mail domains. When the user enters a name, the
4832 interface attempts to match the name to the alias
4833 component of a list entry, and if a matching entry can
4837 Internet Engineering Task Force [Page 82]
4842 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4845 be found, the name is replaced by the domain name found
4848 Note that interface-level aliases and CNAMEs are
4849 completely separate mechanisms; interface-level aliases
4850 are a local matter while CNAMEs are an Internet-wide
4851 aliasing mechanism which is a required part of any DNS
4856 A search list is conceptually implemented as an ordered
4857 list of domain names. When the user enters a name, the
4858 domain names in the search list are used as suffixes to
4859 the user-supplied name, one by one, until a domain name
4860 with the desired associated data is found, or the
4861 search list is exhausted. Search lists often contain
4862 the name of the local host's parent domain or other
4863 ancestor domains. Search lists are often per-user or
4866 It SHOULD be possible for an administrator to disable a
4867 DNS search-list facility. Administrative denial may be
4868 warranted in some cases, to prevent abuse of the DNS.
4870 There is danger that a search-list mechanism will
4871 generate excessive queries to the root servers while
4872 testing whether user input is a complete domain name,
4873 lacking a final period to mark it as complete. A
4874 search-list mechanism MUST have one of, and SHOULD have
4875 both of, the following two provisions to prevent this:
4877 (a) The local resolver/name server can implement
4878 caching of negative responses (see Section
4881 (b) The search list expander can require two or more
4882 interior dots in a generated domain name before it
4883 tries using the name in a query to non-local
4884 domain servers, such as the root.
4887 The intent of this requirement is to avoid
4888 excessive delay for the user as the search list is
4889 tested, and more importantly to prevent excessive
4890 traffic to the root and other high-level servers.
4891 For example, if the user supplied a name "X" and
4892 the search list contained the root as a component,
4896 Internet Engineering Task Force [Page 83]
4901 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4904 a query would have to consult a root server before
4905 the next search list alternative could be tried.
4906 The resulting load seen by the root servers and
4907 gateways near the root would be multiplied by the
4908 number of hosts in the Internet.
4910 The negative caching alternative limits the effect
4911 to the first time a name is used. The interior
4912 dot rule is simpler to implement but can prevent
4913 easy use of some top-level names.
4916 6.1.5 DOMAIN NAME SYSTEM REQUIREMENTS SUMMARY
4927 FEATURE |SECTION | | | |T|T|e
4928 -----------------------------------------------|-----------|-|-|-|-|-|--
4929 GENERAL ISSUES | | | | | | |
4931 Implement DNS name-to-address conversion |6.1.1 |x| | | | |
4932 Implement DNS address-to-name conversion |6.1.1 |x| | | | |
4933 Support conversions using host table |6.1.1 | | |x| | |
4934 Properly handle RR with zero TTL |6.1.2.1 |x| | | | |
4935 Use QCLASS=* unnecessarily |6.1.2.2 | |x| | | |
4936 Use QCLASS=IN for Internet class |6.1.2.2 |x| | | | |
4937 Unused fields zero |6.1.2.3 |x| | | | |
4938 Use compression in responses |6.1.2.4 |x| | | | |
4940 Include config info in responses |6.1.2.5 | | | | |x|
4941 Support all well-known, class-indep. types |6.1.3.5 |x| | | | |
4942 Easily expand type list |6.1.3.5 | |x| | | |
4943 Load all RR types (except MD and MF) |6.1.3.6 |x| | | | |
4944 Load MD or MF type |6.1.3.6 | | | | |x|
4945 Operate when root servers, etc. unavailable |6.1.3.7 |x| | | | |
4946 -----------------------------------------------|-----------|-|-|-|-|-|--
4947 RESOLVER ISSUES: | | | | | | |
4949 Resolver support multiple concurrent requests |6.1.3.1 | |x| | | |
4950 Full-service resolver: |6.1.3.1 | | |x| | |
4951 Local caching |6.1.3.1 |x| | | | |
4955 Internet Engineering Task Force [Page 84]
4960 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
4963 Information in local cache times out |6.1.3.1 |x| | | | |
4964 Configurable with starting info |6.1.3.1 | |x| | | |
4965 Stub resolver: |6.1.3.1 | | |x| | |
4966 Use redundant recursive name servers |6.1.3.1 |x| | | | |
4967 Local caching |6.1.3.1 | | |x| | |
4968 Information in local cache times out |6.1.3.1 |x| | | | |
4969 Support for remote multi-homed hosts: | | | | | | |
4970 Sort multiple addresses by preference list |6.1.3.4 | |x| | | |
4972 -----------------------------------------------|-----------|-|-|-|-|-|--
4973 TRANSPORT PROTOCOLS: | | | | | | |
4975 Support UDP queries |6.1.3.2 |x| | | | |
4976 Support TCP queries |6.1.3.2 | |x| | | |
4977 Send query using UDP first |6.1.3.2 |x| | | | |1
4978 Try TCP if UDP answers are truncated |6.1.3.2 | |x| | | |
4979 Name server limit TCP query resources |6.1.3.2 | | |x| | |
4980 Punish unnecessary TCP query |6.1.3.2 | | | |x| |
4981 Use truncated data as if it were not |6.1.3.2 | | | | |x|
4982 Private agreement to use only TCP |6.1.3.2 | | |x| | |
4983 Use TCP for zone transfers |6.1.3.2 |x| | | | |
4984 TCP usage not block UDP queries |6.1.3.2 |x| | | | |
4985 Support broadcast or multicast queries |6.1.3.2 | | |x| | |
4986 RD bit set in query |6.1.3.2 | | | | |x|
4987 RD bit ignored by server is b'cast/m'cast |6.1.3.2 |x| | | | |
4988 Send only as occasional probe for addr's |6.1.3.2 | |x| | | |
4989 -----------------------------------------------|-----------|-|-|-|-|-|--
4990 RESOURCE USAGE: | | | | | | |
4992 Transmission controls, per [DNS:2] |6.1.3.3 |x| | | | |
4993 Finite bounds per request |6.1.3.3 |x| | | | |
4994 Failure after retries => soft error |6.1.3.3 |x| | | | |
4995 Cache temporary failures |6.1.3.3 | |x| | | |
4996 Cache negative responses |6.1.3.3 | |x| | | |
4997 Retries use exponential backoff |6.1.3.3 | |x| | | |
4998 Upper, lower bounds |6.1.3.3 | |x| | | |
4999 Client handle Source Quench |6.1.3.3 | |x| | | |
5000 Server ignore Source Quench |6.1.3.3 | | |x| | |
5001 -----------------------------------------------|-----------|-|-|-|-|-|--
5002 USER INTERFACE: | | | | | | |
5004 All programs have access to DNS interface |6.1.4.2 |x| | | | |
5005 Able to request all info for given name |6.1.4.2 |x| | | | |
5006 Returns complete info or error |6.1.4.2 |x| | | | |
5007 Special interfaces |6.1.4.2 | | |x| | |
5008 Name<->Address translation |6.1.4.2 |x| | | | |
5010 Abbreviation Facilities: |6.1.4.3 | | |x| | |
5014 Internet Engineering Task Force [Page 85]
5019 RFC1123 SUPPORT SERVICES -- DOMAINS October 1989
5022 Convention for complete names |6.1.4.3 |x| | | | |
5023 Conversion exactly once |6.1.4.3 |x| | | | |
5024 Conversion in proper context |6.1.4.3 |x| | | | |
5025 Search list: |6.1.4.3 | | |x| | |
5026 Administrator can disable |6.1.4.3 | |x| | | |
5027 Prevention of excessive root queries |6.1.4.3 |x| | | | |
5028 Both methods |6.1.4.3 | |x| | | |
5029 -----------------------------------------------|-----------|-|-|-|-|-|--
5030 -----------------------------------------------|-----------|-|-|-|-|-|--
5032 1. Unless there is private agreement between particular resolver and
5073 Internet Engineering Task Force [Page 86]
5078 RFC1123 SUPPORT SERVICES -- INITIALIZATION October 1989
5081 6.2 HOST INITIALIZATION
5085 This section discusses the initialization of host software
5086 across a connected network, or more generally across an
5087 Internet path. This is necessary for a diskless host, and may
5088 optionally be used for a host with disk drives. For a diskless
5089 host, the initialization process is called "network booting"
5090 and is controlled by a bootstrap program located in a boot ROM.
5092 To initialize a diskless host across the network, there are two
5095 (1) Configure the IP layer.
5097 Diskless machines often have no permanent storage in which
5098 to store network configuration information, so that
5099 sufficient configuration information must be obtained
5100 dynamically to support the loading phase that follows.
5101 This information must include at least the IP addresses of
5102 the host and of the boot server. To support booting
5103 across a gateway, the address mask and a list of default
5104 gateways are also required.
5106 (2) Load the host system code.
5108 During the loading phase, an appropriate file transfer
5109 protocol is used to copy the system code across the
5110 network from the boot server.
5112 A host with a disk may perform the first step, dynamic
5113 configuration. This is important for microcomputers, whose
5114 floppy disks allow network configuration information to be
5115 mistakenly duplicated on more than one host. Also,
5116 installation of new hosts is much simpler if they automatically
5117 obtain their configuration information from a central server,
5118 saving administrator time and decreasing the probability of
5123 6.2.2.1 Dynamic Configuration
5125 A number of protocol provisions have been made for dynamic
5128 o ICMP Information Request/Reply messages
5132 Internet Engineering Task Force [Page 87]
5137 RFC1123 SUPPORT SERVICES -- INITIALIZATION October 1989
5140 This obsolete message pair was designed to allow a host
5141 to find the number of the network it is on.
5142 Unfortunately, it was useful only if the host already
5143 knew the host number part of its IP address,
5144 information that hosts requiring dynamic configuration
5147 o Reverse Address Resolution Protocol (RARP) [BOOT:4]
5149 RARP is a link-layer protocol for a broadcast medium
5150 that allows a host to find its IP address given its
5151 link layer address. Unfortunately, RARP does not work
5152 across IP gateways and therefore requires a RARP server
5153 on every network. In addition, RARP does not provide
5154 any other configuration information.
5156 o ICMP Address Mask Request/Reply messages
5158 These ICMP messages allow a host to learn the address
5159 mask for a particular network interface.
5161 o BOOTP Protocol [BOOT:2]
5163 This protocol allows a host to determine the IP
5164 addresses of the local host and the boot server, the
5165 name of an appropriate boot file, and optionally the
5166 address mask and list of default gateways. To locate a
5167 BOOTP server, the host broadcasts a BOOTP request using
5168 UDP. Ad hoc gateway extensions have been used to
5169 transmit the BOOTP broadcast through gateways, and in
5170 the future the IP Multicasting facility will provide a
5171 standard mechanism for this purpose.
5174 The suggested approach to dynamic configuration is to use
5175 the BOOTP protocol with the extensions defined in "BOOTP
5176 Vendor Information Extensions" RFC-1084 [BOOT:3]. RFC-1084
5177 defines some important general (not vendor-specific)
5178 extensions. In particular, these extensions allow the
5179 address mask to be supplied in BOOTP; we RECOMMEND that the
5180 address mask be supplied in this manner.
5183 Historically, subnetting was defined long after IP, and
5184 so a separate mechanism (ICMP Address Mask messages)
5185 was designed to supply the address mask to a host.
5186 However, the IP address mask and the corresponding IP
5187 address conceptually form a pair, and for operational
5191 Internet Engineering Task Force [Page 88]
5196 RFC1123 SUPPORT SERVICES -- INITIALIZATION October 1989
5199 simplicity they ought to be defined at the same time
5200 and by the same mechanism, whether a configuration file
5201 or a dynamic mechanism like BOOTP.
5203 Note that BOOTP is not sufficiently general to specify
5204 the configurations of all interfaces of a multihomed
5205 host. A multihomed host must either use BOOTP
5206 separately for each interface, or configure one
5207 interface using BOOTP to perform the loading, and
5208 perform the complete initialization from a file later.
5210 Application layer configuration information is expected
5211 to be obtained from files after loading of the system
5214 6.2.2.2 Loading Phase
5216 A suggested approach for the loading phase is to use TFTP
5217 [BOOT:1] between the IP addresses established by BOOTP.
5219 TFTP to a broadcast address SHOULD NOT be used, for reasons
5220 explained in Section 4.2.3.4.
5250 Internet Engineering Task Force [Page 89]
5255 RFC1123 SUPPORT SERVICES -- MANAGEMENT October 1989
5258 6.3 REMOTE MANAGEMENT
5262 The Internet community has recently put considerable effort
5263 into the development of network management protocols. The
5264 result has been a two-pronged approach [MGT:1, MGT:6]: the
5265 Simple Network Management Protocol (SNMP) [MGT:4] and the
5266 Common Management Information Protocol over TCP (CMOT) [MGT:5].
5268 In order to be managed using SNMP or CMOT, a host will need to
5269 implement an appropriate management agent. An Internet host
5270 SHOULD include an agent for either SNMP or CMOT.
5272 Both SNMP and CMOT operate on a Management Information Base
5273 (MIB) that defines a collection of management values. By
5274 reading and setting these values, a remote application may
5275 query and change the state of the managed system.
5277 A standard MIB [MGT:3] has been defined for use by both
5278 management protocols, using data types defined by the Structure
5279 of Management Information (SMI) defined in [MGT:2]. Additional
5280 MIB variables can be introduced under the "enterprises" and
5281 "experimental" subtrees of the MIB naming space [MGT:2].
5283 Every protocol module in the host SHOULD implement the relevant
5284 MIB variables. A host SHOULD implement the MIB variables as
5285 defined in the most recent standard MIB, and MAY implement
5286 other MIB variables when appropriate and useful.
5288 6.3.2 PROTOCOL WALK-THROUGH
5290 The MIB is intended to cover both hosts and gateways, although
5291 there may be detailed differences in MIB application to the two
5292 cases. This section contains the appropriate interpretation of
5293 the MIB for hosts. It is likely that later versions of the MIB
5294 will include more entries for host management.
5296 A managed host must implement the following groups of MIB
5297 object definitions: System, Interfaces, Address Translation,
5298 IP, ICMP, TCP, and UDP.
5300 The following specific interpretations apply to hosts:
5304 Note that the error "time-to-live exceeded" can occur in a
5305 host only when it is forwarding a source-routed datagram.
5309 Internet Engineering Task Force [Page 90]
5314 RFC1123 SUPPORT SERVICES -- MANAGEMENT October 1989
5319 This object counts datagrams discarded because no route
5320 can be found. This may happen in a host if all the
5321 default gateways in the host's configuration are down.
5323 o ipFragOKs, ipFragFails, ipFragCreates
5325 A host that does not implement intentional fragmentation
5326 (see "Fragmentation" section of [INTRO:1]) MUST return the
5327 value zero for these three objects.
5331 For a host, this object MUST always be zero, since hosts
5332 do not send Redirects.
5334 o icmpOutAddrMaskReps
5336 For a host, this object MUST always be zero, unless the
5337 host is an authoritative source of address mask
5342 For a host, the "IP Address Table" object is effectively a
5343 table of logical interfaces.
5347 For a host, the "IP Routing Table" object is effectively a
5348 combination of the host's Routing Cache and the static
5349 route table described in "Routing Outbound Datagrams"
5350 section of [INTRO:1].
5352 Within each ipRouteEntry, ipRouteMetric1...4 normally will
5353 have no meaning for a host and SHOULD always be -1, while
5354 ipRouteType will normally have the value "remote".
5356 If destinations on the connected network do not appear in
5357 the Route Cache (see "Routing Outbound Datagrams section
5358 of [INTRO:1]), there will be no entries with ipRouteType
5363 The current MIB does not include Type-of-Service in an
5364 ipRouteEntry, but a future revision is expected to make
5368 Internet Engineering Task Force [Page 91]
5373 RFC1123 SUPPORT SERVICES -- MANAGEMENT October 1989
5378 We also expect the MIB to be expanded to allow the remote
5379 management of applications (e.g., the ability to partially
5380 reconfigure mail systems). Network service applications
5381 such as mail systems should therefore be written with the
5382 "hooks" for remote management.
5384 6.3.3 MANAGEMENT REQUIREMENTS SUMMARY
5395 FEATURE |SECTION | | | |T|T|e
5396 -----------------------------------------------|-----------|-|-|-|-|-|--
5397 Support SNMP or CMOT agent |6.3.1 | |x| | | |
5398 Implement specified objects in standard MIB |6.3.1 | |x| | | |
5427 Internet Engineering Task Force [Page 92]
5432 RFC1123 SUPPORT SERVICES -- MANAGEMENT October 1989
5437 This section lists the primary references with which every
5438 implementer must be thoroughly familiar. It also lists some
5439 secondary references that are suggested additional reading.
5441 INTRODUCTORY REFERENCES:
5444 [INTRO:1] "Requirements for Internet Hosts -- Communication Layers,"
5445 IETF Host Requirements Working Group, R. Braden, Ed., RFC-1122,
5448 [INTRO:2] "DDN Protocol Handbook," NIC-50004, NIC-50005, NIC-50006,
5449 (three volumes), SRI International, December 1985.
5451 [INTRO:3] "Official Internet Protocols," J. Reynolds and J. Postel,
5454 This document is republished periodically with new RFC numbers;
5455 the latest version must be used.
5457 [INTRO:4] "Protocol Document Order Information," O. Jacobsen and J.
5458 Postel, RFC-980, March 1986.
5460 [INTRO:5] "Assigned Numbers," J. Reynolds and J. Postel, RFC-1010,
5463 This document is republished periodically with new RFC numbers;
5464 the latest version must be used.
5470 [TELNET:1] "Telnet Protocol Specification," J. Postel and J.
5471 Reynolds, RFC-854, May 1983.
5473 [TELNET:2] "Telnet Option Specification," J. Postel and J. Reynolds,
5476 [TELNET:3] "Telnet Binary Transmission," J. Postel and J. Reynolds,
5479 [TELNET:4] "Telnet Echo Option," J. Postel and J. Reynolds, RFC-857,
5482 [TELNET:5] "Telnet Suppress Go Ahead Option," J. Postel and J.
5486 Internet Engineering Task Force [Page 93]
5491 RFC1123 SUPPORT SERVICES -- MANAGEMENT October 1989
5494 Reynolds, RFC-858, May 1983.
5496 [TELNET:6] "Telnet Status Option," J. Postel and J. Reynolds, RFC-
5499 [TELNET:7] "Telnet Timing Mark Option," J. Postel and J. Reynolds,
5502 [TELNET:8] "Telnet Extended Options List," J. Postel and J.
5503 Reynolds, RFC-861, May 1983.
5505 [TELNET:9] "Telnet End-Of-Record Option," J. Postel, RFC-855,
5508 [TELNET:10] "Telnet Terminal-Type Option," J. VanBokkelen, RFC-1091,
5511 This document supercedes RFC-930.
5513 [TELNET:11] "Telnet Window Size Option," D. Waitzman, RFC-1073,
5516 [TELNET:12] "Telnet Linemode Option," D. Borman, RFC-1116, August
5519 [TELNET:13] "Telnet Terminal Speed Option," C. Hedrick, RFC-1079,
5522 [TELNET:14] "Telnet Remote Flow Control Option," C. Hedrick, RFC-
5523 1080, November 1988.
5526 SECONDARY TELNET REFERENCES:
5529 [TELNET:15] "Telnet Protocol," MIL-STD-1782, U.S. Department of
5532 This document is intended to describe the same protocol as RFC-
5533 854. In case of conflict, RFC-854 takes precedence, and the
5534 present document takes precedence over both.
5536 [TELNET:16] "SUPDUP Protocol," M. Crispin, RFC-734, October 1977.
5538 [TELNET:17] "Telnet SUPDUP Option," M. Crispin, RFC-736, October
5541 [TELNET:18] "Data Entry Terminal Option," J. Day, RFC-732, June 1977.
5545 Internet Engineering Task Force [Page 94]
5550 RFC1123 SUPPORT SERVICES -- MANAGEMENT October 1989
5553 [TELNET:19] "TELNET Data Entry Terminal option -- DODIIS
5554 Implementation," A. Yasuda and T. Thompson, RFC-1043, February
5561 [FTP:1] "File Transfer Protocol," J. Postel and J. Reynolds, RFC-
5564 [FTP:2] "Document File Format Standards," J. Postel, RFC-678,
5567 [FTP:3] "File Transfer Protocol," MIL-STD-1780, U.S. Department of
5570 This document is based on an earlier version of the FTP
5571 specification (RFC-765) and is obsolete.
5577 [TFTP:1] "The TFTP Protocol Revision 2," K. Sollins, RFC-783, June
5584 [SMTP:1] "Simple Mail Transfer Protocol," J. Postel, RFC-821, August
5587 [SMTP:2] "Standard For The Format of ARPA Internet Text Messages,"
5588 D. Crocker, RFC-822, August 1982.
5590 This document obsoleted an earlier specification, RFC-733.
5592 [SMTP:3] "Mail Routing and the Domain System," C. Partridge, RFC-
5595 This RFC describes the use of MX records, a mandatory extension
5596 to the mail delivery process.
5598 [SMTP:4] "Duplicate Messages and SMTP," C. Partridge, RFC-1047,
5604 Internet Engineering Task Force [Page 95]
5609 RFC1123 SUPPORT SERVICES -- MANAGEMENT October 1989
5612 [SMTP:5a] "Mapping between X.400 and RFC 822," S. Kille, RFC-987,
5615 [SMTP:5b] "Addendum to RFC-987," S. Kille, RFC-???, September 1987.
5617 The two preceding RFC's define a proposed standard for
5618 gatewaying mail between the Internet and the X.400 environments.
5620 [SMTP:6] "Simple Mail Transfer Protocol," MIL-STD-1781, U.S.
5621 Department of Defense, May 1984.
5623 This specification is intended to describe the same protocol as
5624 does RFC-821. However, MIL-STD-1781 is incomplete; in
5625 particular, it does not include MX records [SMTP:3].
5627 [SMTP:7] "A Content-Type Field for Internet Messages," M. Sirbu,
5628 RFC-1049, March 1988.
5631 DOMAIN NAME SYSTEM REFERENCES:
5634 [DNS:1] "Domain Names - Concepts and Facilities," P. Mockapetris,
5635 RFC-1034, November 1987.
5637 This document and the following one obsolete RFC-882, RFC-883,
5640 [DNS:2] "Domain Names - Implementation and Specification," RFC-1035,
5641 P. Mockapetris, November 1987.
5644 [DNS:3] "Mail Routing and the Domain System," C. Partridge, RFC-974,
5648 [DNS:4] "DoD Internet Host Table Specification," K. Harrenstein,
5649 RFC-952, M. Stahl, E. Feinler, October 1985.
5651 SECONDARY DNS REFERENCES:
5654 [DNS:5] "Hostname Server," K. Harrenstein, M. Stahl, E. Feinler,
5655 RFC-953, October 1985.
5657 [DNS:6] "Domain Administrators Guide," M. Stahl, RFC-1032, November
5663 Internet Engineering Task Force [Page 96]
5668 RFC1123 SUPPORT SERVICES -- MANAGEMENT October 1989
5671 [DNS:7] "Domain Administrators Operations Guide," M. Lottor, RFC-
5672 1033, November 1987.
5674 [DNS:8] "The Domain Name System Handbook," Vol. 4 of Internet
5675 Protocol Handbook, NIC 50007, SRI Network Information Center,
5679 SYSTEM INITIALIZATION REFERENCES:
5682 [BOOT:1] "Bootstrap Loading Using TFTP," R. Finlayson, RFC-906, June
5685 [BOOT:2] "Bootstrap Protocol (BOOTP)," W. Croft and J. Gilmore, RFC-
5686 951, September 1985.
5688 [BOOT:3] "BOOTP Vendor Information Extensions," J. Reynolds, RFC-
5689 1084, December 1988.
5691 Note: this RFC revised and obsoleted RFC-1048.
5693 [BOOT:4] "A Reverse Address Resolution Protocol," R. Finlayson, T.
5694 Mann, J. Mogul, and M. Theimer, RFC-903, June 1984.
5697 MANAGEMENT REFERENCES:
5700 [MGT:1] "IAB Recommendations for the Development of Internet Network
5701 Management Standards," V. Cerf, RFC-1052, April 1988.
5703 [MGT:2] "Structure and Identification of Management Information for
5704 TCP/IP-based internets," M. Rose and K. McCloghrie, RFC-1065,
5707 [MGT:3] "Management Information Base for Network Management of
5708 TCP/IP-based internets," M. Rose and K. McCloghrie, RFC-1066,
5711 [MGT:4] "A Simple Network Management Protocol," J. Case, M. Fedor,
5712 M. Schoffstall, and C. Davin, RFC-1098, April 1989.
5714 [MGT:5] "The Common Management Information Services and Protocol
5715 over TCP/IP," U. Warrier and L. Besaw, RFC-1095, April 1989.
5717 [MGT:6] "Report of the Second Ad Hoc Network Management Review
5718 Group," V. Cerf, RFC-1109, August 1989.
5722 Internet Engineering Task Force [Page 97]
5727 RFC1123 SUPPORT SERVICES -- MANAGEMENT October 1989
5730 Security Considerations
5732 There are many security issues in the application and support
5733 programs of host software, but a full discussion is beyond the scope
5734 of this RFC. Security-related issues are mentioned in sections
5735 concerning TFTP (Sections 4.2.1, 4.2.3.4, 4.2.3.5), the SMTP VRFY and
5736 EXPN commands (Section 5.2.3), the SMTP HELO command (5.2.5), and the
5737 SMTP DATA command (Section 5.2.8).
5742 USC/Information Sciences Institute
5744 Marina del Rey, CA 90292-6695
5746 Phone: (213) 822 1511
5748 EMail: Braden@ISI.EDU
5781 Internet Engineering Task Force [Page 98]