home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-06-07 | 52.7 KB | 1,417 lines |
-
- INTERNET-DRAFT Jeroen Houttuin
- RARE WG-MSG Klaus Hansen
- Serge Aumont
- ver. 2.2. May 1993
-
-
- Address mapping functions and authorities
-
-
-
- Abstract
-
-
- This document defines the responsibilities and authorities for
- defining, collecting and distributing RFC 1327 address mapping
- rules. It clearly defines the items: mapping function, addressing
- authority, administrative equivalence as well as a mechanism for
- registering mapping authorities and administrative equivalence. This
- mechanism is based on an extension of RFC 1327 mapping rules (during
- the collection distribution process). No changes to already
- installed gateway software are required.
-
-
- Status of this Memo
-
-
- NB. The reader is assumed to have a solid understanding of X.400,
- RFC 822 and RFC 1327. This document is produced by the RARE WG-MSG
- Task Force on Mapping Authorities. Comments can be sent to the
- authors, tf-mapauth@cosine-mhs.switch.ch , or to wg-msg@rare.nl.
- Before sending comments, please read the 'About this document'
- section.
-
- This document is an Internet Draft. Internet Drafts are working
- documents of the Internet Engineering Task Force (IETF), its Areas,
- and its Working Groups. Note that other groups may also distribute
- working documents as Internet Drafts.
-
- Internet Drafts are draft documents valid for a maximum of six
- months. Internet Drafts may be updated, replaced, or obsoleted by
- other documents at any time. It is not appropriate to use Internet
- Drafts as reference material or to cite them other than as a
- "working draft" or "work in progress."
-
- Please check the I-D abstract listing contained in each Internet
- Draft directory to learn the current status of this or any other
- Internet Draft.
-
- Distribution of this memo is unlimited.
-
-
- About this document
-
-
- This chapter explains the goals and reasons for choices made in the
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 1]
-
- INTERNET DRAFT April 1993
-
-
- remainder of the document.
-
-
- - Goals
-
- There are a number of problems this document is targeted to solve.
- Some of these targets are by nature conflicting, so the presented
- solution will have to be a compromise. We are aware that the
- proposed solution will not fully satisfy all parties. However, we
- believe that we present in this document a reasonable, pragmatic and
- feasible approach. Our goals are:
-
- - Agreement on the mapping function (see chapter 2). RFC 1327
- defines the address mapping function by describing it in text,
- which leaves room for some ambiguities. We need global agreement
- on a precise function definition.
-
- - Agreement on mapping authorities. So far there has not been a
- global consensus on the definitions of 'mapping authority',
- 'administrative equivalence' etc. Since these terms must be well
- agreed upon before responsibilities and duties of parties
- involved in the mapping process can be described, we need clear
- definitions.
-
- - Although most experts agree that local mappings are an evil, it
- must also be recognised that they cannot be abandoned for the
- time being. Ignoring them is not realistic and will only create
- more difficulties. Locally mapped addresses can at any time leak
- out to the global level through so-called third-party-routed
- mails. Recognising this fact, we believe that we should at least
- try to gain more control over local mappings, whilst at the same
- time strongly discouraging their use. Our approach treats the
- registration of local mappings the same as this of normal
- mappings, thus enabling the automatic refusal of local mappings
- in case of conflicts.
-
- - We need clear algorithms and procedures to solve conflicts in
- mapping rules.
-
- - The algorithms and procedures must be easy to automate and not
- require adaptation of the installed gateway products.
-
- - If a transition in the collection and redistribution process of
- mapping rules is needed, it must be a smooth transition from the
- currently used procedures in the Internet and GO-MHS community.
-
-
- - Considerations
-
- One of the main issues to be addressed was that of local mappings.
- The considerations in favour of our approach as opposed to the
- current situation are listed below:
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 2]
-
- INTERNET DRAFT April 1993
-
-
-
- Now
-
- - There exist no global rules for which local mappings are
- allowed. Every gateway manager can add local mappings to the
- distributed tables, even if they conflict with other rules.
- Since it is not feasible to completely abandon local
- mappings some time soon, this leads to anarchistic use of
- local mappings.
-
- - Every gateway manager must check his own local mappings for
- conflicts before merging them with the international tables.
- This may sound like a welcome punishment for those who
- insist on the use of local mappings; in practice however, it
- is a well known source of errors.
-
- - No algorithm for deciding in case of conflicts.
-
- + Smaller international tables (R2X)
-
- Proposal
-
- - Larger international tables (only R2X, which will however
- not become larger than X2R)
-
- + One agreed set of rules. If local mappings are collected,
- verified and redistributed for use under certain well
- defined conditions, control is gained over local mappings.
- Invalid local mappings will be automatically overruled. If
- invalid local rules are still being used in a gateway, the
- gateway manager can easily be blamed of violating written
- Internet requirements.
-
- Another choice that has to be explained is the tagging of individual
- mapping rules. The disadvantages of this approach are:
-
- - Larger mapping tables during collection and redistribution.
-
- - Extra steps during collection and distribution. Note however
- that extra steps will be necessary in any solution for checking
- mapping authorities.
-
- It has been said that a better choice would be to tag mapping rules
- in bunches. The disadvantages of such an approach however would be:
-
- - It is unlikely that a set of rules will have exactly the same
- definer and exactly the same path of registries. The combination
- of all this information is needed however to be able to decide
- the administrative equivalence and validity of every single
- rule. And in case of a mapping rule rejection, the source of a
- single mapping rule must be traceable.
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 3]
-
- INTERNET DRAFT April 1993
-
-
- - This solution would assume a semantics in the order in which
- mapping rules are listed in a table, thus any implementation in
- a non-serial database (DNS, X.500) structure would become more
- complicated.
-
- Finally, proposals were made to not use the mapping rules themselves
- for storing the authority information, but to use DNS or X.500
- instead. Our main consideration in taking the inline registration
- method was the following. It cannot be expected that every mapping
- collection/redistribution point has access to X.500 or DNS. Many
- gateways exist on islands, e.g. address gateways, which will only
- allow end users to address persons in the other mail world in the
- address format of that other world, but do not perform the actual
- gatewaying themselves. The least common denominator of all involved
- parties is access to the mapping rules, regardless whether these are
- distributed to them per e-mail, ftp, X.500 or by any other method.
- Since every involved party needs to get the mapping rules anyway,
- this will even minimise overhead that would be created otherwise by
- extra X.500/DNS querying for every single mapping rule.
-
-
- Contents
-
- Abstract 1
- Status of this Memo 1
- About this document 1
- - Goals 2
- - Considerations 2
- Contents 4
- 1. Introduction 5
- 1.1 Address trees 5
- 1.2 Authorities, rights, and responsibilities 5
- 1.3 The registration process 6
- 1.4 Addressing authorities 6
- 1.4.1. Internet 7
- 1.4.2. X.400 7
- 1.5 Pruned subtrees 8
- 2. Mapping functions 8
- 2.1 Introduction 8
- 2.2 Function definition 9
- 2.3 Ideal situation 11
- 2.4 Reality 11
- 3. Mapping authorities 13
- 3.1 Administrative equivalence (AE) 13
- 3.2 Mapping registries (MRs) 14
- 3.3 A mechanism for claiming and tracing authorities 15
- 3.4 Using the extended mapping rules 17
- 4 Registering Authorities 18
- 4.1 Top level authority registration 18
- 4.2 Authentication of mapping registries 19
- 5. Guidelines 20
- A. Glossary 21
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 4]
-
- INTERNET DRAFT April 1993
-
-
- B. Initial top level mapping registries 22
- B.1. X.400 to RFC 822 22
- B.2. RFC 822 to X.400 22
- C. Bibliography 23
- D. Table pre-processor 24
- E. Authors' addresses 24
-
-
- 1. Introduction
-
-
- RFC 1327 defines a mapping between X.400(84/88) and RFC 822
- addresses. The requirement for co-ordinated mapping and gateway
- tables is included in the RFC to ensure smooth interworking. This
- document describes the co-ordination procedures to be used for RFC
- 1327 gateways connected to the Internet and the GO-MHS community. It
- is highly desirable that also other networks using RFC 1327 gateways
- use these guidelines.
-
- Note that for brevity this document does not always follow the
- normal conventions for representing X.400 domains (see [JHtut]). If
- needed, the slash separated notation is used while omitting keywords
- of the standard attributes, e.g. /S=plork/dom/pre/amade/nl/ instead
- of /S=plork/O=dom/PRMD=pre/ADMD=amade/C=nl/
-
-
- 1.1 Address trees
-
- Addresses may span up a structured or an unstructured address space.
- Only the former case is relevant in this document. Structured
- addresses may be hierarchical, and thus shown as a path in a tree,
- where the tree shows all possible addresses in a given domain. The
- authority for registering an address (or a part of an address) may
- be associated with the address tree, although it is conceptually a
- separate tree.
-
-
- 1.2 Authorities, rights, and responsibilities
-
- An authority gets its authorisation from a higher authority, i.e. an
- authority on a higher level, except when it is itself the highest
- (or root) authority.
-
- An authority may assume authority in certain circumstances, although
- it has not formally got it as described. This may be due to
-
- - it is unclear who has higher authority
- - no higher authority has yet been set up
- - the higher authority itself is assumed
-
- An assumed authority is temporary in nature, and registration rules
- and register may be changed at a later point in time.
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 5]
-
- INTERNET DRAFT April 1993
-
-
-
- An authority has normally some or all of following responsibilities:
-
- a. establishment of registrar and rules for registration
- b. delegation of authority
- c. establishment of rules for use
- d. acting as primary source for validated data on registered items
-
- An assumed authority will be limited in establishing the rules in a
- and c.
-
- An authority has the right to revoke registration according to the
- set rules.
-
-
- 1.3 The registration process
-
- An item from a certain domain (e.g. name, address, mapping rule) is
- registered by a registrar appointed by the authority in question,
- according to rules defined at that time. The rules may be simple and
- unwritten, or formal (even defined by a national standard). Often
- the following steps are taken:
-
- a.The application for registering a certain item is validated,
- to avoid conflicting claims to a certain item, or because
- legal or technical conditions may have to be met. The
- registering may cover single items or whole subtrees.
-
- b.If the conditions are met, the item is filed in the register
- together with information about the applicant. In some cases
- part of this information is passed to higher authorities. At
- the same time it is decided which rights and responsibilities
- is attached to the items.
-
- c.If the conditions for the use of an item are not being met,
- or the registrant does not need the item anymore, the item is
- remove from the register. It is up to the authority to decide
- if the item may be used again.
-
-
- 1.4 Addressing authorities
-
- The difference between names and addresses, and thus between naming
- authorities and addressing authorities is insignificant in the
- context of this document.
-
- An addressing authority will create an addressing concept with
- addressing guidelines that must be followed in (parts of) the
- subtree. Underlying addressing authorities can then add their own
- addressing concept etc.
-
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 6]
-
- INTERNET DRAFT April 1993
-
-
- 1.4.1. Internet
-
-
- The Internet contains several addressing domains, e.g. RFC 822
- addresses, IP addresses, Ethernet addresses, host names. Only RFC
- 822 addresses are relevant in this document. An RFC 822 address has
- the following structure:
-
- localpart@...sdom(2).sdom(1).tldom
-
- where "sdom" stands for "subdomain", "tldom" stands for "top level
- domain", and a hierarchy of addressing authorities is considered to
- be growing from left to right:
-
- localpart < sdom(n) < sdom(n-1) < ... < tldom
-
- Only the domainpart will be considered here (the localpart is - as
- one would have expected - mainly a local matter).
-
- The root authority for the RFC 822 address tree resides at SRI-NIC,
- and the top level branches have addresses that are either ISO 3166
- two-letter country codes or are taken from a small table of domains
- (e.g. net, edu, gov, com).
-
- Authority for top level addresses reside at a national organisation;
- however a significant number of countries have no authority (and
- whether authority then is at the root is an open question).
-
-
- 1.4.2. X.400
-
-
- The root authority lies in the standard (a sort of "virtual
- authority"). The first-level authority is more or less implicitly
- delegated to the various countries according to ISO 3166. Exactly
- who has the national authority is a national matter, and a "natural"
- authority depends on whether CCITT X.400 or the equivalent ISO 10021
- is to be followed. Some countries assumes that delegation of
- authority is to the national tele-administration, others define the
- authority in a national standard covering ADMD names, and in some
- cases also PRMD names.
-
- The X.400 hierarchy has the following levels:
-
- PN < OU* < .. < O < PRMD < ADMD < C
-
- PNPersonal Name
- OUOrganisational Unit(s)
- O Organisation
- PRMD Private Management Domain
- ADMD Administration Management Domain
- C Country
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 7]
-
- INTERNET DRAFT April 1993
-
-
-
- Other attributes, such as Domain Defined Attributes (DDAs), may be a
- part of an address, but are not unambiguously hierarchical in
- nature.
-
- According to a national decision, authority over PRMD names is
- either delegated to the ADMD level (each ADMD having a complete
- addressing subtree) or kept at the national level. In the latter
- case ADMD names and PRMD names may possibly all be taken from the
- same set, thus making it possible to use a registered name as an
- ADMD name, a PRMD name, or both.
-
-
- 1.5 Pruned subtrees
-
- An addressing authority does not automatically have control over all
- branches of a sub-tree. Consider the following example:
-
- ----------------------------+----------------------------
- X.400 | RFC 822
- ----------------------------+----------------------------
- CH: | .ch:
- addr. authority: Swiss PTT | addr. authority: SWITCH
- ----------------------------+----------------------------
- root | root
- /\ | /\
- / /CH/ | / .ch
- / /\ | / /\
- / \ | / \
- / /CH/ARCOM/ | .arcom.ch \
- /\ /\ | /\ /\
- / \ / \ | / \ / \
- /\ /\/\ /CH/ARCOM/SWITCH/ |
- /\ |
- / \ |
- ----------------------------+---------------------------
- /CH/ARCOM/SWITCH/: | .arcom.ch:
- addr. authority: SWITCH | addr. authority: Swiss PTT
- ----------------------------+---------------------------
-
- The example also shows that a mapping registration tree will in
- general not coincide with either of the complete addressing trees.
-
-
- 2. Mapping functions
-
-
-
- 2.1 Introduction
-
- RFC 1327 describes the address mapping function, but at the same
- time leaves room for some controversies. This chapter aims to
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 8]
-
- INTERNET DRAFT April 1993
-
-
- unambiguously define the address mapping function.
-
- Note that RFC 1327 defines 4 types of mapping rules:
-
- RFC 822 -> X.400
- X.400 -> RFC 822
- RFC 822 -> gateway X.400 domain
- X.400 -> gateway RFC 822 domain
-
- Since the last type of rule is not being used in an internationally
- co-ordinated way, use of such rules is considered a local matter and
- is discarded in this document. If one absolutely wants to use such
- rules, it is easy to extend the X.400 -> RFC 822 algorithm.
-
-
- 2.2 Function definition
-
- The mapping algorithm to be used by a gateway assumes the existence
- of three tables, X2R, R2X and GW, which associate RFC 822 and X.400
- domains. Left hand sides are unique in X2R and in the concatenation
- of R2X and GW. The algorithm is defined as follows in pseudo code
- (for a more comprehensive description, see [JHtut] and [1327]):
-
- RFC 822 -> X.400
-
- LHS encoded X.400 address?
- y: unpack; GOTO END [a]
- n:
- map2 entry?
- y: use SA's of map2 entry; follow hierarchy for other SAs
- localpart regular?
- y: map localpart -> PN
- GOTO END [b]
- n: GOTO DDA [c]
- n: gate entry?
- y: use SAs of gate entry [d]
- n: use SAs of local gateway [e]
- :DDA: encode complete address in a DD.RFC-822
- :END:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 9]
-
- INTERNET DRAFT April 1993
-
-
- X.400 -> RFC 822
-
- Address contains DD.RFC-822?
- y: unpack DDA; GOTO END [A]
- n:
- map1 entry?
- y: use domains of map1 entry
- other attributes regular?
- y: follow hierarchy for other subdomains;
- map PN-> localpart
- GOTO END [B]
- n: follow hierarchy for other subdomains as
- far as possible;
- GOTO LHS with rest of attributes [C]
- n: [D]
- :LHS: Left hand side encoding
- :END:
-
-
- Examples:
-
- Consider a gateway in country 'Z' which is known in the RFC 822
- world as 'gw.z' and in the X.400 world as '/GW/Z/', and suppose only
- the following mapping rules are used in this gateway:
-
- X2R:
- C$A#a#
- R2X:
- a#C$A#
- GW:
- c.a#ADMD$D.PRMD$E.C$A#
- b.c#ADMD$B.C$C#
-
- Then this gateway could perform the following mappings (the examples
- follow the order of the pseudo code):
-
- [a] /S=jan/ADMD=amade/C=xy/@gw.z /S=jan/ADMD=amade/C=xy/
- [a] /S=jan/ADMD=amade/C=xy/@gw.y /S=jan/ADMD=amade/C=xy/
- [b] jan@c.b.a /S=jan/C/B/A/
- [b] jan@b.c.a /S=jan/B/C/A/
- [c] j_h@b.c.a /DD.RFC-822=j(u)h(a)b.c.a/B/C/A/
- [d] jan@a.b.c /DD.RFC-822=jan(a)a.b.c/A/B/C/
- [e] jan@d.b /DD.RFC-822=jan(a)d.b/GW/Z/
-
- [A] /DD.RFC-822=jan(a)xx.yy/GW/Z/ jan@xx.yy
- [A] /DD.RFC-822=jan(a)xx.yy/GW/Y/ jan@xx.yy
- [B] /S=jan/C/B/A/ jan@c.b.a
- [C] /S=jan/GQ=jr/C/B/A/ /S=jan/GQ=jr/@c.b.a
- [C] /S=jan/D C/B/A/ "/S=jan/D C/"@b.a
- [D] /S=jan/B/C/ /S=jan/B/C/@gw.z
-
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 10]
-
- INTERNET DRAFT April 1993
-
-
- Note that the sole fact that the gateway could perform a mapping
- doesn't force it to do so. This depends on the preferred routing,
- e.g. a gateway may choose not to map back (and gateway) a DDA mapped
- address which contains the SAs of a remote gateway, but rather route
- this message over X.400 to the addressed gateway which will then
- have to perform the gatewaying. This is normal practice in most
- algorithms for source routing, for which left-hand side encoding and
- DDA mappings can also be used.
-
-
- 2.3 Ideal situation
-
- In the set of co-operative RFC 1327 gateways on the planet 'GW-manager-
- utopia', there exist no mapping rules. Every address is mapped with LHS
- encoding and DDA mapping. Although this configuration may ease the life
- of gateway managers, it also creates many problems, mainly for the
- users (see [JHtut] Chapter 3.3.2.).
-
- In the set of co-operative RFC 1327 gateways on the planet 'user-
- walhalla', mapping of RFC 822 addresses and X.400 O/R addresses is
- simple and divided in:
-
- - a set of RFC 822 and X.400 addresses (domains) with
- administrative equivalence and bijective mappings between them.
- - a set of O/R addresses which are RFC 822 visible by using left-
- hand side encoding.
- - a set of RFC 822 addresses which are X.400 visible by using DDA
- mapping.
-
- This should be quite simple and each solution should be exclusive.
- Therefore an address should have only one representation in each
- address space.
-
-
- 2.4 Reality
-
- On the planet earth, the experience shows several cases where the
- mapping between RFC 822 and X.400 domains is not bijective
- (asymmetric mappings) and that such asymmetry is perhaps still
- indispensable. It is useful to list the most common cases.
-
- - Fading out old address forms.
-
- If, for instance, a domain changed from one ADMD connection to
- another, it may choose to support the old mapping for a certain
- period. Since two X.400 domains are now associated with one and the
- same RFC 822 domain, asymmetry is introduced.
-
- - An address tree is not always a real tree
-
- For instance, a PRMD may subscribe to several ADMDs and then one
- mailbox can be identified by different O/R addresses. The following
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 11]
-
- INTERNET DRAFT April 1993
-
-
- mapping rules show an example:
-
- PRMD$blabla.ADMD$ .C$ch#blabla.ch# [1]
- PRMD$blabla.ADMD$switch.C$ch#blabla.ch# [2]
- PRMD$blabla.ADMD$eunet.C$ch#blabla.ch# [3]
-
- blabla.ch#PRMD$blabla.ADMD$ .C$ch# [4]
- blabla.ch#PRMD$blabla.ADMD$eunet.C$ch# [5]
- blabla.ch#PRMD$blabla.ADMD$switch.C$ch# [6]
-
- Since rules [4] [5] and [6] all have administrative equivalence (see
- chapter 3.1), it is perfectly legal for EUnet to use mapping rule [5],
- probably to ensure that subsequent mails will be routed over their
- ADMD. Since these mapped address forms can leak out to the rest of the
- world (third party problem), all reverse rules must be global. This
- also results in asymmetry.
-
- The gateway's choice of which of the rules [4] [5] and [6] to use can
- either be made according to local routing considerations or the
- "blabla.ch" addressing authority can claim its preferred O/R address.
- Not only routing, but also mapping depends on where you are (the most
- trivial examples being the default left hand side encoding and DDA
- mapping, but they can be mapped back without the use of mapping rules).
-
- - Subtrees without addressing authority
-
- The domains ".uucp" or ".bitnet" are used and usually well routed in
- Internet networks but no addressing authority has ever registered them.
- This implies that nobody can define an official mapping for those
- domains. Therefore there are many ways to map such addresses, none of
- which can be considered more valid or invalid than any of the others.
- Some examples are:
-
- R2X mappings :
-
- bitnet#PRMD$bitnet.ADMD$ada.C$at# [1]
- bitnet#O$bitnet.PRMD$switch.ADMD$arcom.C$CH# [2]
- bitnet#PRMD$bitnet.ADMD$dbp.C$de# [3]
-
- GW rules :
-
- bitnet#PRMD$bitnet.ADMD$0.C$FR# [4]
-
- All those rules show different ways to relay X.400 messages to the
- bitnet network. Rules [1], [2] and [3] have different semantics than
- the domain association rules R2X. They are used to force the address of
- a gateway into an O/R address. As such, they can be considered as the
- RFC 987 equivalent of gateway rules. The usage of such rules is limited
- to a specific area and every gateway has to choose which one to use.
- Since these mapped address forms can leak out to the rest of the world
- (third party problem), all reverse rules must be global. This also
- results in asymmetry.
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 12]
-
- INTERNET DRAFT April 1993
-
-
-
- These mappings are referenced as "local mapping" in the document [table-
- creation-tutorial].
-
-
- 3. Mapping authorities
-
-
- This chapter defines the parties involved in the process of
- defining, collecting and distributing mapping rules within a
- community. Note that a party may at any time choose to have certain
- responsibilities and authorities represented by automated processes.
- Another important generalisation is that the intuitively centralised
- approach need not be followed strictly. If mapping rules are
- maintained in a distributed way, distributed tools may become
- necessary to enforce the responsibilities and authorities described
- in this document. However, since conflicts must normally be solved
- on an inter-personal basis, the defined parties must be clearly
- defined: a central contact point for every involved party must be
- available.
-
-
- 3.1 Administrative equivalence (AE)
-
- A mapping rule establishes a one-way correspondence between
- addresses from two different domains. A mapping rule is used e.g. in
- a gateway between mailing systems for transformation of addresses. A
- mapping rule may map one address only (as in diku.dk --map-->
- C=dk;A=dk400;P=minerva;O=diku), but it is more common to define
- general rules for mapping a whole tree.
-
- A mapping rule is based on the existence of administrative
- equivalence. This means that to define a valid mapping rule, one
- must have authority over the relevant addresses in both addressing
- domains. AE is defined as follows:
-
- A mapping rule has AE if and only if both sides of the rule have the
- same addressing authority (or they agree on the rule), or all
- mapping rules implied by this rule span up two subtrees that have AE
- in every (at least one) corresponding pair of nodes.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 13]
-
- INTERNET DRAFT April 1993
-
-
- Examples
-
- Danish mapping rules (internal):
-
- RFC 822 addresses:
-
- id domain authority?
- -- ------ ----------
-
- A teldk.dk assumed
- B y-net.dk assumed
- C ooo.dk yes
- D .dddd assumed
-
- X.400 addresses:
-
- id domain authority?
- -- ------ ----------
-
- I C=dk;A=teldk assumed
- II C=dk;A=dk400;P=y-net yes
- III C=dk;A=dk400;P=minerva;O=ooo yes
- IV C=dk;A=dk400;P=inet;O=dddd yes
-
- Mapping RFC 822 <--> X.400
-
- I ---> A (ass to ass) AE
- B ---> II (ass to auth) Agreement exists
- C ---> III (auth to auth) AE
- IV --> D (auth to ass) Local rule, no AE
-
-
- 3.2 Mapping registries (MRs)
-
- The following parties and corresponding responsibilities are
- defined:
-
- Mapping rule originator
-
- define mappings
-
- Mapping registry (MR):
-
- Designate subordinate MRs per subdomain (822/X.400)
- Collect mappings from subordinate MRs
- Inform subordinate MRs about rejected mappings
- Register mappings with next higher MR
- Redistribute mappings received from next higher MR
-
- Ideally, there will b onmly one MR per community or branch
- (subdomain) of the address tree.
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 14]
-
- INTERNET DRAFT April 1993
-
-
- A top level MR (initially the MHS Co-ordination Service) is
- responsible for the collection and redistribution of the complete
- gateway and mapping tables.
-
-
- 3.3 A mechanism for claiming and tracing authorities
-
- In order to check for AE, and see who is responsible for certain
- mapping rules, a formal mechanism for registering the relevant
- authority information is needed. A commonly used strategy is to
- merge this authorisaty information with the information that is to
- be authorised (e.g. authority records in DNS). This approach has the
- advantage that authorisaty information is automatically available at
- the moment it is needed. Therefore, to each mapping rule some extra
- fields are added. The first extar field indicates the AE:
-
- com#....C$it#n#
- ch#PRMD$switch.ADMD$arcom.C$ch#y#
-
- Before registering a mapping rule at the next higher MR, a mapping
- rule originator or MR adds an extra field to the mapping rule,
- indicating its identity relative to this next higher MR. The top
- level mapping registry could thus receive the following mapping
- rule:
-
- ciba.ch#O$ciba.PRMD$eunet.ADMD$arcom.C$ch#y#eunet#switch
-
- More formally:
-
- Appendix F of RFC 1327 gives a syntax definitions of three kinds of
- mapping rules:
-
- rules defined in RFC 1327 named in this document
-
- mapping from O/R address to
- Internet domains X2R
- mapping from Internet domains
- to OR-addresses using standard
- attributes R2X
- mapping from Internet domains to
- RFC 822 using domain defined
- attributes OR-addresses GW
-
- The general form is :
-
- R2X and GW: domain-syntax"#"dmn-or-address"#"
-
- X2R: dmn-or-address"#"domain-syntax"#"
-
-
-
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 15]
-
- INTERNET DRAFT April 1993
-
-
- There a need to extend each rule with the following information :
-
- - Is there a administrative equivalence of both domains ?
- - which addressing authority submit this rule
- - who collect this rule
-
- The left side and right hand side of the rules are unchanged. Existing
- conformant RFC 1327 gateways do not need any change.
-
- Mapping authority fields are added:
-
- R2X and GW:
-
- domain-syntax"#"dmn-or-address"#"AE"#"originator\
- "#"registry"#"*(registry"#")
-
- X2R:
-
- dmn-or-address"#"domain-syntax"#"AE"#"originator\
- "#"registry"#"*(registry"#")
-
- AE = "Y" / "N"
-
- - Administrative equivalence is Y / N . If it's "Y" it means the
- two domains are under control of the same addressing authority
- or it exist a agreement between the two different addressing
- authorities that guarantee this equivalence.
-
- originator= < non empty string without "#" >
-
- - if the administrative equivalence is "Y", this is the name of
- the addressing authority over both domains, otherwise it is the
- name of the authority that submitted this rule.
-
- Registry = < non empty string without "#" >
-
- - Registry : each registry are the named of the mapping registry
- who accept this mapping and relay it to upper registry.
-
- Examples:
-
- glvt.fr#O$@.PRMD$GLVT.ADMD$atlas.C$FR#Y#glvt-cnrs#uniren1#PT#
-
- This rule shows administrative equivalence, it has been submitted by
- glvt-cnrs via the University of Rennes (French registry) and the
- COSINE MHS Project Team (PT), which is initially designated as the
- GO-MHS community registry.
-
- bitnet#PRMD$bitnet.ADMD$atlas.C$fr#N#uniren1#uniren1#PT#
-
- This gateway rule is issued by the University of Rennes and without
- administrative equivalence.
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 16]
-
- INTERNET DRAFT April 1993
-
-
-
-
- 3.4 Using the extended mapping rules
-
- Mapping collection from subordinate registries
- ----------------------------------------------
-
- Each registry will accept or refuse rules. Accepted rules are stamped
- at the end with the registry name according to the following process :
-
- For each rule received : Does this rule conflict with other rules?
- [important note : R2X and GW rules set are considered as a
- single set when checking for conflicts]
- No: accept (I.e. trust! This will be the default, to save us work)
- Yes:
- Does at least one rule claim AE ?
- No: accept
- Yes: For each of the conflicting mapping rules: check AE
- AE: accept
- No AE: Refuse
-
- Mapping rule conflicts are classified as follows:
-
- - Pure conflicts: two mapping rules have exactly the same left-
- hand side.
- - Exception conflicts: An exception rule without AE tries to
- overrule a more general rule with AE.
-
- Subordinate registries are informed about rejected rules. This
- subordinate registry must propagate the rejection notifications to
- the appropriate subordinate registry or originator. This is
- necessary because conflicts may not occur until a later stage in the
- collection process.
-
- All accepted mappings are stamped with the registry identification
- and registered with the next higher registry.
-
- When mappings arrive at the top-level registry, the redistribution
- process starts.
-
- This collection process does not guarantee unique left-hand sides,
- but ensures that in a remaining set of rules with the same left-hand
- side, either each rule has AE, or not one rule has AE. The first
- case can occur because the addressing tree is not a real tree (ADMD
- = ; ADMD=0; other aliases); the second case covers the traditional
- 'local mappings'.
-
- Redistribution of mappings
- --------------------------
-
- The collection of all mappings that were accepted by the top level
- registry is distributed in three tables, X2R, R2X and GW, using the
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 17]
-
- INTERNET DRAFT April 1993
-
-
- same channel of mapping registries (actually, this is a supertree of
- the rigistry tree, see chapter 4.1.c.). Before distributing the mapping
- rules, a registry may tailor the tables for a certain domain according
- to the algorithm described below. It is recommended though that this
- tailoring is done as close to the actual gateways as possible, i.e.
- ideally within the gateway.
-
- Use of mapping rules in a gateway
- ---------------------------------
-
- Here is a description of what can be a pre-processor for the 3 sets
- of mapping rules. The goal is to select the best set of rules and
- remove the extension before using the rules in the gateway. The GW
- software could be adapted to use the extended rules directly, or a
- script can generate the traditional 1327 tables from the distributed
- new-format tables, just before installing them in the gateway. The
- mapping of a domain remains as described in chapter 2, except there
- may be non-unique left-hand sides (again, R2X and GW are considered
- one set of rules here). In this case, a gateway must use the rule
- which is closest to the gateway (the metric being the distance in
- the tree of registries).
-
- This algorithm ensures that in every gateway, for each domain,
- exactly one mapping rule is left. It also allows different domains
- to automatically use different versions of equivalent rules,
- depending on their location in the authority tree.
-
-
- 4 Registering Authorities
-
-
-
- 4.1 Top level authority registration
-
- The following steps should be taken when a new mapping domain is
- introduced on the top level.
-
- a.The domain (country) finds a top-level mapping collecting
- organisation, which can act as the representative for the
- domain, and introduces the organisation to the other top-level
- mapping registries. The following information is given for the
- organisation:
-
- - Mapping domains (e.g. RFC 822 to X.400)
-
- - Mapping table designator for the organisation
-
- - Name, address, telephone and fax numbers for the
- organisation
-
-
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 18]
-
- INTERNET DRAFT April 1993
-
-
- - Name and e-mail address for the responsible person(s). The e-
- mail address is used to verify that the source of a given
- mapping is an authorised person.
-
- - Domain, for which this organisation has responsibility for
- collection of mappings.
-
- b.The collection organisation inside the domain is set up. It may
- be done in the following way.
-
- - In case a mapping authority for a certain address tree pair
- has been established, the relevant authority decides whether
- to rely on a general (default) rule or to define own mapping
- rules. In the former case, a collecting path from the
- authority up to the top-level registry is established, and
- an organisation designator (an abbreviated identifier for
- it) is defined for each part of the path. In the latter case
- the decision is propagated to the relevant registry.
-
- - The top-level registry may be the authority for certain
- mappings, or act simply as a registry. It defines a general
- (default) mapping for the whole domain, unless otherwise
- decided by the domain.
-
- - If authority cannot be established for certain mappings, it
- is marked in the mapping rule. A path is constructed as if
- authority had been established, from the relevant
- organisation to the top-level registry.
-
- - Note that the collection path need not coincide with the
- path in the address tree, as addressing authorities and
- mapping rule originators will often have no interest in the
- collection and distribution process.
-
- c.Distribution of top-level mappings will in principle follow the
- reverse path of the collection process, but as potentially the
- set of sites using mappings may be significantly larger that the
- set of organisations defining mappings, the distribution could
- be entirely independent of the collection process. It is
- entirely up to the domain to organise distribution of mappings.
-
-
- 4.2 Authentication of mapping registries
-
- The mapping registries on the top level (e.g. country level) need to
- be identified by a designator, occurring in the mapping tables. To
- be able to know which organisation has a given designator, and which
- person (mail address) is authorised to publish mapping tables, some
- information has to be collected. This is similar to the COSINE
- documentation for the national networks. The final implementation of
- this documentation could be either table-based, DNS based, X.500
- based, or a combination of any of those. Although X.500 would seem a
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 19]
-
- INTERNET DRAFT April 1993
-
-
- natural choice, the same problems could occur as with the tagging
- and storing of the mapping rules themselves: not every gateway will
- have access to DNS or X.500 (e.g. address gateways). However, since
- the registry documentation is only to be used by the registries
- themselves, we would consider it a feasible requirement for each
- registry to have access to X.500. For the time being, a simple table
- based approach will be feasible, as conflicts will have to be solved
- by humans anyway.
-
- The information needed is:
-
- - Registry designator
- - Name, address, telephone and fax numbers for the organisation
- - Name and e-mail address for the responsible person(s). The e-
- mail address is used to verify that the source of a given
- mapping is an authorised person.
- - Domain, for which this organisation has responsibility for
- collection of mappings.
-
- Example:
-
- Registry: isi-dk
- Description: ISI-DK. A co-operation between Danish parties. Contact
- organisation is UNI-C, Bygning 305 DTH, DK-2800 Lyngby, Denmark.
- Telephone: +45 45 938355, Fax: +45 45 930220
- Responsible: Erik Lawaetz
- 822: Erik.Lawaetz@uni-c.dk
- X.400: C=dk;A=dk400;P=minerva;O=uni-c;S=Lawaetz;G=Erik
- X.400-domains: C=dk;A=dk400;P=minerva
- 822-domains: all sub-domains in ".dk" except "teldk.dk" and
- "dk400.dk"
-
- The exact syntax for this information will in a next version of this
- document be aligned with [UE93].
-
-
- 5. Guidelines
-
-
- It is recommended that whoever defines a mapping rule informs the
- mapped subtrees that an implicit mapping for their domains exists.
-
- Every mapping registry is recommended to have X.500 access.
-
- The use of local mappings is strongly discouraged. Instead, the
- definition of GW entries for such domains is encouraged. Please note
- that also GW entries without AE will be rejected if one GW rule with
- AE exists.
-
- The originator and registry strings to be used as tags in the
- mapping rules should be as short as possible.
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 20]
-
- INTERNET DRAFT April 1993
-
-
- Justified by registry overhead, it is recommended to minimise the
- distance (in the registry tree) between the top level registry and
- the originators cq. gateways. This means that the introduction of
- any not strictly necessary MR is discouraged.
-
-
- A. Glossary
-
-
- - Assumed authority: Temporary authority assumed in the absence of
- a higher authority, or because a higher authority has only
- assumed authority.
-
- - Authority: A combination of rights and responsibilities in a
- given context. Examples are the right to delegate authority, the
- right to define a mapping or override downwards mappings, and
- the responsibility to validate mappings.
-
- - Confirmed authority: Authority established either by natural
- rights, or by delegation from a higher authority.
-
- - Delegation: Attributes may be propagated downwards (to branching
- points in the tree further away from the root) by delegation.
- Attributes are e.g. the right to add new subtrees, or the right
- to use the names or addresses formed by the subtrees.
-
- - Downwards: Away from the root.
-
- - Explicit mapping rule: rule that is stated in a mapping table
-
- - Implicit mapping rule: mapping for subtrees implied by an
- explicit mapping rule.
-
- - Pruned subtree: A tree with one or more complete branches
- removed.
-
- - Registration: The process of registering e.g. names, addresses
- or mapping rules, according to rules defined by an authority,
- for a given domain (set of names, set of addresses, mapping
- context). Registration covers e.g. filing the item in question
- and related information about who registered, and (depending on
- the rules) validation of the application. Inquiries as to the
- contents of the register may or may not be allowed, depending on
- the rules.
-
- - Scope: Authorities, registration, trees, and mappings are only
- valid in a certain context, called its scope.
-
- - Subtree: A complete tree that is a part of another tree, i.e.
- where the root is a branching point of in a tree.
-
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 21]
-
- INTERNET DRAFT April 1993
-
-
- - Tree: The classical computer science tree, with the root
- upwards. In this context, each arc (branch) bears a part of an
- address or name. A path from root to a leaf thus defines a
- complete name or address.
-
- - Upwards: Towards the root.
-
-
- B. Initial top level mapping registries
-
-
-
- B.1. X.400 to RFC 822
-
- Domain/
- Country Org. Organisation & responsible design.
- ======= ==== =================================
- AT aconet ACOnet Christian Panigl
- BE iihe ULB/Helios-B group, Eftimios Tsigros
- BR dfn DFN, Peter Kaufmann
- CA cdn CDNnet, Dave Brent
- CH switch SWITCH, Felix Kugler
- CN dfn DFN, Volkmar Kobelt
- DE dfn DFN, Volkmar Kobelt
- DK isi-dk ISI-DK, Erik Lawaetz, Klaus Hansen
- ES iris redIRIS/FUNDESCO, Ignacio Martinez
- FI funet FUNET, Marko Kaittola, Teemu Kurki
- FR uniren1 CRI/Universite de Rennes1, Serge Aumont
- GB janet JANET
- GR ariadne ARIADNE Network, Yannis Corovesis
- IE ucd University College Dublin, Niall O'Reilly
- IN ernet ERNET, ???
- IS isanet ISAnet, Marius Olaffsen
- IT infn CNAF INFN, Claudio Allocchio
- LT litnet LITNET, Petras Sulcas
- LU restena RESTENA, Alain Frieden
- NL surfnet SURFNET, Aad Boer
- NO uninett SINTEF, Harald Eikrem, Harald Alvestrand
- PT inesc INESC, Henrique Silva
- SE sunet Chalmers, Per Andersson
- SI si-ac Jozef Stefan Institute, Avgust Jauk
- US xnren UW-Madison, Allan Cargille
- YU yunac ???, Avgust Jauk, Marko Bonac
- ZA uninet UNINET, Rob Brain
-
-
- B.2. RFC 822 to X.400
-
- Identical to table for X.400 to RFC 822, except for he following
- entries
-
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 22]
-
- INTERNET DRAFT April 1993
-
-
- Domain/
- Country Org. Organisation and responsible design.
- ======= ==== =================================
- CH switch SWITCH, Felix Kugler
- CH-EUNET ch-eu CH EUNET, Simon Poole
- US xnren UW-Madison, Allan Cargille
- US-ES esnet ESnet, Tony Genovese
-
- Table: RFC 822 domains for which national authorities assume local
- responsibility:
-
- COM
- EDU
- GOV
- MIL
- NET
- ORG
- NATO
- ARPA
- BITNET
- UUCP
-
-
- C. Bibliography
-
-
- 821 Jonathan B. Postel, "Simple Mail Transfer Protocol",
- RFC 821, University of Southern California, August
- 1982
-
- 822 Crocker, D., "Standard of the Format of ARPA Internet
- Text Messages", RFC 822, UDEL, August 1982.
-
- 1327 Hardcastle-Kille, S., "Mapping between X.400(1988) /
- ISO 10021 and RFC 822", RFC 1327 & RARE Technical
- Report 2, UCL, May 1992.
-
- JHtut Houttuin, J., "A tutorial on RFC 822 <-> X.400
- gatewaying", Internet-Draft draft-houttuin-rfc1327-
- tutor-02.txt, draft-houttuin-rfc1327-tutor-02.ps,
- RARE Secretariat, February 1993.
-
- UE93 Eppenberger, U., "Routing coordination for X.400 MHS
- services within a multi protocol / multi network
- environment", Internet-Draft draft-ietf-x400ops-
- service-coordination-03.txt, SWITCH, December 1992.
-
- X.4xx(84) CCITT Recommendations X.400 - X.430. Data
- Communication Networks: Message Handling Systems.
- CCITT Red Book, Vol. VIII - Fasc. VIII.7, Malaga-
- Torremolinos 1984
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 23]
-
- INTERNET DRAFT April 1993
-
-
- X.4xx(88) CCITT Recommendations X.400 - X.420. Data
- Communication Networks: Message Handling Systems.
- CCITT Blue Book, Vol. VIII - Fasc. VIII.7, Melbourne
- 1988
-
-
- D. Table pre-processor
-
-
- Example perl script for table pre-processing to be written.
-
-
- E. Authors' addresses
-
-
- Jeroen Houttuin
- RARE Secretariat
- Singel 466-468
- NL-1017 AW Amsterdam
- Phone +31 20 639 1131
- Fax +31 20 639 3289
- Mail houttuin@rare.nl
-
- Klaus Hansen
- Department of Computer Science (DIKU)
- University of Copenhagen
- Universitetsparken 1
- DK-2100 Copenhagen
- Phone +45 35 32 18 18
- Fax +45 52 32 14 01
- Mail khan@diku.dk
-
- Serge Aumont
- CRI/Universite de Rennes1
- Av. du General Leclercs
- F-35042 Rennes Cedex
- Phone +33 99 84 71 00
- Mail Serge.Aumont@univ-rennes1.fr
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Houttuin, Hansen, Aumont Expires November 1993 [Page 24]
-