Network Working Group B. Manning
Request for Comments: 1348 Rice University
Updates: RFCs 1034, 1035 July 1992
DNS NSAP RRs
Status of this Memo
This memo defines an Experimental Protocol for the Internet
community. Discussion and suggestions for improvement are requested.
Please refer to the current edition of the "IAB Official Protocol
Standards" for the standardization state and status of this protocol.
Distribution of this memo is unlimited.
Table of Contents
Introduction ..................................................... 1
Background ....................................................... 1
NSAP RR .......................................................... 2
NSAP-PTR RR ...................................................... 2
REFERENCES and BIBLIOGRAPHY ...................................... 3
Security Considerations .......................................... 4
Author's Address ................................................. 4
Introduction
This RFC defines the format of two new Resource Records (RRs) for the
Domain Name System (DNS), and reserves corresponding DNS type
mnemonic and numerical codes. This format may be used with the any
proposal that has variable length addresses, but is targeted for CLNP
use.
This memo assumes that the reader is familiar with the DNS [3,4].
Background
This section describes an experimental representation of NSAP
addresses in the DNS. There are several reasons to take this approch.
First, it provides simple documentation of the correct addresses to
use in static configurations of CLNP compliant hosts and routers.
NSAP support requires that a new DNS resource record entry type
("NSAP") be defined, to store longer Internet (i.e., NSAP) addresses.
This resource record allows mapping from DNS names to NSAP addresses,
and will contain entries for systems which are able to run Internet
applications, over TCP or UDP, over CLNP.
The backward translation (from NSAP address to DNS name) is
facilitated by definition of an associated resource record. This
resource record is known as "NSAP-PTR", and is used in a manner
analogous to the existing "in-addr.arpa".
These RRs are intended for use in a proposal [6] by one of the
members of the NOOP WG to address the next-generation internet.
The NSAP RR
The NSAP RR is defined with mnemonic NSAP and type code 22 (decimal).
An NSAP (Network Service Access Protocol) number is a unique string
to OSI transport service.
The numbering plan follows RFC 1237 and associated OSI definitions
for NSAP format.
NSAP has the following format:
<owner> <ttl> <class> NSAP <length> <NSAP-address>
All fields are required.
<length> identifies the number of octets in the <NSAP-address> as
defined by the various national and international authorities.
<NSAP-address> enumerates the actual octet values assigned by the
assigning authority. Its format in master files is a <character-
string> syntactically identical to that used in TXT and HINFO.
The format of NSAP is class insensitive. NSAP RR causes no
additional section processing.
For example:
foo.bar.com. IN NSAP 21 47000580ffff000000321099991111222233334444
host.school.de IN NSAP 17 39276f3100111100002222333344449876
The RR data is the ASCII representation of the digits. It is encoded
as two <character-strings>, i.e., count followed by characters.
The NSAP-PTR RR
The NSAP-PTR RR is defined with mnemonic NSAP-PTR and a type code 23
(decimal).
Its function is analogous to the PTR record used for IP addresses
[4,7].
NSAP-PTR has the following format:
<NSAP-suffix> <ttl> <class> NSAP-PTR <owner>
All fields are required.
<NSAP-suffix> enumerates the actual octet values assigned by the
assigning authority for the LOCAL network. Its format in master
files is a <character-string> syntactically identical to that used in
TXT and HINFO.
The format of NSAP-PTR is class insensitive. NSAP-PTR RR causes no
additional section processing.
For example:
In net ff08000574.nsap-in-addr.arpa:
444433332222111199990123000000ff NSAP-PTR foo.bar.com.
Or in net 11110031f67293.nsap-in-addr.arpa:
67894444333322220000 NSAP-PTR host.school.de.
The RR data is the ASCII representation of the digits. It is encoded
as a <character-string>.
REFERENCES and BIBLIOGRAPHY
[1] Stahl, M., "Domain Administrators Guide", RFC 1032, Network
Information Center, SRI International, November 1987.
[2] Lottor, M., "Domain Administrators Operations Guide", RFC 1033,
Network Information Center, SRI International, November, 1987.
[3] Mockapetris, P., "Domain Names - Concepts and Facilities", RFC
1034, USC/Information Sciences Institute, November 1987.
[4] Mockapetris, P., "Domain Names - Implementation and
Specification", RFC 1035, USC/Information Sciences Institute,
November 1987.
[5] Colella, R., Gardner, E., and R. Callon, "Guidelines for OSI
NSAP Allocation in the Internet", RFC 1237, NIST, Mitre, DEC,
July 1991.
[6] Callon, R., "TCP and UDP with Bigger Addresses (TUBA),
A Simple Proposal for Internet Addressing and Routing",
Digital Equipment Corporation, RFC 1347, June 1992.
[7] Mockapetris, P., "DNS Encoding of Network Names and Other Types",
RFC 1101, USC/Information Sciences Institute, April 1989.
[8] ISO/IEC. Information Processing Systems -- Data Communications
-- Network Service Definition Addendum 2: Network Layer Address-
ing. International Standard 8348/Addendum 2, ISO/IEC JTC 1,
Switzerland, 1988.
[9] Bryant, P., "NSAPs", PB660, IPTAG/92/23, SCIENCE AND ENGINEERING
RESEARCH COUNCIL, RUTHERFORD APPLETON LABORATORY May 1992.
Security Considerations
Security issues are not addressed in this memo.
Author's Address
Bill Manning
Rice University - ONCS
PO Box 1892
6100 South Main
Houston, Texas 77251-1892
Phone: +1.713.285.5415
EMail: bmanning@rice.edu