diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc757.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc757.txt')
-rw-r--r-- | doc/rfc/rfc757.txt | 1155 |
1 files changed, 1155 insertions, 0 deletions
diff --git a/doc/rfc/rfc757.txt b/doc/rfc/rfc757.txt new file mode 100644 index 0000000..9b1e635 --- /dev/null +++ b/doc/rfc/rfc757.txt @@ -0,0 +1,1155 @@ + + +RFC 757 + + + + A Suggested Solution to the Naming, Addressing, and Delivery + Problem for ARPAnet Message Systems + + + + + + + + + + + + + Debra P. Deutsch + + 10 September 1979 + + + + + + + + + + + + + + + + + + + + + + Bolt Beranek and Newman + + 50 Moulton Street + + Cambridge, Massachusetts 02138 + + (617) 491-1850 +Preface Page 1 + + + Preface + + Unlike many RFCs, this is not a specification of a +soon-to-be-implemented protocol. Instead this is a true request +for comments on the concepts and suggestions found within this +document, written with the hope that its content, and any +discussion which it spurs, will contribute towards the design of +the next generation of computer-based message creation and +delivery systems. + + A number of people have made contributions to the form and +content of this document. In particular, I would like to thank +Jerry Burchfiel for his general and technical advice and +encouragement, Bob Thomas for his wisdom about the TIP Login +database and design of a netmail database, Ted Myer for playing +devil's advocate, and Charlotte Mooers for her excellent +editorial assistance. + + Debbie Deutsch + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +RFC 757 September 1979 +Introduction Page 2 + + +1. Introduction + + The current ARPAnet message handling scheme has evolved from +rather informal, decentralized beginnings. Early developers took +advantage of pre-existing tools -- TECO, FTP -- in order to +implement their first systems. Later, protocols were developed +to codify the conventions already in use. While these +conventions have been able to support an amazing variety and +amount of service, they have a number of shortcomings. + + One difficulty is the naming/addressing problem, which deals +with the need both to identify the recipient and to indicate +correctly a delivery point for the message. The current paradigm +is deficient in that it lacks a sharp distinction between the +recipient's name and the recipient's address, which is the +delivery point on the net. + + The naming/addressing scheme does not allow users to address +their messages using human names, but instead forces them to +employ designations better designed for machine parsing than +human identification. + + Another source of limitations lies in the delivery system, +which is simply an extension of the File Transfer Protocol. The +delivery system is fairly limited in its operation, handling only +simple transactions involving the transfer of a single message to +a single user on the destination host. The ability to bundle +messages and the ability to fan-out messages at the foreign host +would improve the efficiency and usefulness of the system. + + An additional drawback to the delivery system is caused, to +some extent, by the addressing scheme. A change in address, or +incorrect address usually causes the delivery system to handle +the message incorrectly. While some hosts support some variety +of a mail forwarding database (MFDB), this solution is at best +inadequate and spotty for providing reliable service to the +network as a whole. Because the same username may belong to +different people at different hosts, ambiguities which may crop +up when messages are incorrectly addressed keep even the best +MFDBs from always being able to do their job. + + This proposal envisions a system in which the identity and +address of the recipient are treated as two separate items. A +network database supports a directory service which supplies +correct address information for all recipients. Additionally, +the scheme allows mail delivery to be restricted to authorized +users of the network, should that be a desirable feature. + + + + + + + +RFC 757 September 1979 +Names and Addresses Page 3 + + +2. Names and Addresses + + Today's ARPAnet naming and addressing scheme (as specified in +RFC 733[3]) does not discriminate between the identity of a user + 1 +and his address . Both are expressed the same way: +USERNAME@HOST. While this should always result in a unique +handle for that user, it has proved to be inadequate in practice. +Users who change the location of their mailboxes, because of +either a change in affiliation or a simple shift in host usage, +also get their names changed. If their old host employs an MFDB +the problem is not too bad. Mail is simply forwarded on to the +new address, slightly delayed. Other less fortunate users who +cannot rely upon an MFDB must notify all their correspondents of +the change in address/name. Any mail addressed to the old +address becomes undeliverable. (An excellent discussion of the +differences between naming, addressing, and routing is found in a +paper by John Shoch [1].) + + The desire to use "real" names in the address fields of +messages is also thwarted by the current system. An elaborate +system for using human-compatible vs. machine-interpretable + 2 +information has been evolved for use in message headers . The +most recent developments indicate that many users would feel +happiest if the real human name could appear; +machine-interpretable information should not intrude too heavily +into the writer's work- and thought-space. + + The solution proposed here calls for a total break between the +way a recipient is named or identified and the way in which his +location is specified. Since the ARPAnet is a regulated +environment, a unique (and not necessarily human-readable) ID +could be assigned to each authorized recipient of network mail. +This ID would stay with the user throughout his lifetime on the +network, through changes in address and affiliation. + + A network database (which could be derived from the same +database that has been proposed to support TIP login) would +associate each ID with one or more addresses indicating where the +mail for that ID may be delivered. If more than one address were + +_______________ + 1 + See, for example, RFC 733's discussion of the semantics of +address fields, in which it is specified that the To: field +"contains the identity of the primary recipients of the message". + 2 + See the "Syntax of General Addressee Items" section of RFC +733. + + + + +RFC 757 September 1979 +Names and Addresses Page 4 + + +associated with an ID, that would indicate an ordered preference +in delivery points. The delivery system would attempt delivery +to the first addressee, and, if that failed, try the second, and + 3 +so on . Most IDs would probably have only one address. Also +associated with each ID would be some information about the ID's +owner: name, postal address, affiliation, phone number, etc. + + Rather than being forced to type some awkward character string +in order to name his correspondent, the writer would have to +supply only enough information to allow some process to determine +the unique identity of the recipient. This information might be +the recipient's name or anything else found in the database. + + The access to this data would also free the writer from any +need to know the location of the recipient. Once the unique ID +were known, the correct location for delivery would be only a +look-up away. + + +2.1 A distributed database approach + + It is clear that if the network database had only one +instantiation there would be a tremendous contention problem. +All message traffic would be forced to query that one database. +This is extremely undesirable, both in terms of reliability and +speed. It is also clear that requiring each host to maintain a +complete local copy of the entire network database is an +undesirable and unnecessary burden on the hosts. + + A better approach would be to build some sophistication into +the local delivery system, and use local mini-databases which are +based upon the contents of a distributed network database. (It +may be redundant and/or partitioned, etc., but is probably not +resident on the local host.) When a local host queries the +network database about an ID (or, in a more costly operation, +asked to supply an ID given enough identification such as name, +etc.) the database may be asked to return all its information on +that ID. At this point the local host can enter all or some of +that information into a locally maintained database of its own. +It will always refer to that database first when looking for a +name or address, only calling the network database if it cannot +find a local entry. Depending upon the desired level of +sophistication of the local message handling programs, additional +information may be added to that database, including, for + +_______________ + 3 + Multiple addresses might also be used to indicate that +multiple deliveries are desired. + + + + +RFC 757 September 1979 +Names and Addresses Page 5 + + +example, nicknames. + + The database might be shared by a cluster of hosts (such as +exist at BBN or ISI), or it might be used by only one. Hosts +which originate small amounts of message traffic might rely upon +the network database entirely. + + The structure and maintenance of the local databases is left +solely to the local hosts. They may or may not store addresses. +It may be desirable either to garbage collect them, or to let +them grow. The local databases might be linked to smaller, more +specialized databases which are owned by individual users or +groups. These individual databases would be the equivalent of +address books in which users might note special things about +individuals: interests, last time seen, names of associates, +etc. The existence and scope of these databases are not mandated +by this scheme, but it does allow for them. + + The same individual databases may be used by message creation +programs in order to determine the recipient's ID from +user-supplied input. For example, a user may address a message +to someone named Nick. The message creation program may +associate "Nick" with an ID, and hand that ID off to the delivery +system, totally removing the matter of address or formal ID from +the user's world. + + +2.2 Delivery + + The delivery operation consists of three parts: + + 1. Determining the address to which the message must be + sent, + + 2. Sending the message, + + 3. Processing by foreign host. + + The first step usually means looking up, in either a local or +the network database, the correct address(es) for message +delivery, given the recipient's ID. Should the ID not be known +at the time the message is submitted for delivery, any operation +necessary to determine that ID (such as a call to either the +local or network database) is also performed as part of this +step. + + The second step is not too different from what happens today. +The local host establishes a connection to the foreign host. It +is then able to send one or messages to one or more people. The +options are: + + - Bulk mail. Several recipients all get the same message. + + +RFC 757 September 1979 +Names and Addresses Page 6 + + + - Bundled mail. Several messages get sent to the same + recipient. + + - A combination of the above + + - One recipient gets one message. + + The foreign host should be able to accept mail for each ID. + + The rejection of mail for a given ID by the foreign host would +usually indicate an inconsistency between the sender's local +database and the network database. In this case, the local host +updates its local database from the network database, and +attempts delivery at the "new" host. (This is mail forwarding.) +If a host taken from the network database is found to be +incorrect, there is a problem in the network database, and +appropriate authorities are notified. Thus, address changes +propagate out from the network database only as the out-of-date +information is referenced. This reduces the magnitude of the +local database update problem. + + Once the foreign host recognizes the ID(s), the message(s) may +be transmitted to the foreign host. Upon successful +transmission, the job of the local host is done. + + The third step requires the foreign host to process the +message(s). This is analogous to what may occur in a mail room. +A foreign host may have to sort the bundled or bulk mail it +receives. In addition, the foreign host might perform internal +or external fan-out functions or other special functions, at the +option of the ID owner. + + The implemention and design of possible functions which may be +performed in the mail rooms are neither mandated nor restricted +by this delivery scheme. Since they are too numerous to allow +even a small portion of them to be described here, only a few +examples will be mentioned. + + Fan-out functions might include placing messages in multiple +files, sending copies to one or more other users, or +rebroadcasting the messages onto the network. (In that last +case, the foreign host might evaluate an ID list, in much the +same way that the ITS mail repeater broadcasts messages addressed +to certain mailboxes.) Special functions might include automatic +hard-copy creation or reply generation, processing by various +daemons, or any other service found desirable by the host's user +population and administration. The implementation of fan-out +functions is up to the local host, as are any additional +functions which the user population might wish of its local "mail +room". Whatever services are available, the mail room will +distribute the mail to the correct location for each ID. + + + +RFC 757 September 1979 +Names and Addresses Page 7 + + +2.2.1 Additional delivery options + + It may be desirable to allow mail rooms to accept a username in +place of an ID. Use of a username is a less reliable method of +addressing than use of an ID. + + - A username may not be sufficiently unambiguous for + getting an ID and host from the network database. + + - Since a recipient's username may change from time to + time, there is a chance that the username supplied by + 4 + the sender will be incorrect , or that the host may not + recognize it. + + Because a recipient's ID does not change with time, + errors such as those caused by username changes cannot + occur if IDs are used. Similarities or ambiguities can + be discovered before delivery occurs, and the sender can + be prompted for additional identifying information about + his intended recipient. + + - In an even worse case, a correct username can still + result in an incorrect delivery when it is paired with + an incorrect host or acted upon by a mail forwarding + 5 + database . + + Because unique IDs are unambiguous, the possibility of + such a situation is eliminated by the use of unique IDs. + + + + +_______________ + 4 + A particularly insidious source of addressing errors stems +from the inconsistent use of (human) names and initials to +generate usernames. The sender can easily guess his +recipient's username incorrectly by using, or failing to use +a combination of initials and last name. (For example, a +user wishing to address Jim Miller at BBNA and using the +address "Miller@BBNA" will have his message successfully +delivered to Duncan Miller at the same site.) + 5 + The author has observed a mail forwarding database +redirect messages correctly addressed to one JWalker to +different JWalker at another host. + + + + + + +RFC 757 September 1979 +Names and Addresses Page 8 + + +2.2.2 Failures + + The case in which the network database is found to be incorrect +has already been discussed. It may make sense to mark the entry +as "possibly in error" and to notify both the network database + 6 +and the ID owner when such a situation occurs. In this case mail +delivery to the ID's owner will not occur, but this is not too +bad, considering that that is what happens today when a host does +not recognize a username. + + One additional failure mode, the loss of the network database +from the net, must be considered, even though a well-designed +distributed network database should be robust enough to almost +rule out this possibility. + + If such a failure should occur, the local databases should be +able to handle most of the traffic. What would be lost is the +ability to add new IDs to the network database, the ability to +change hosts for an ID, the ability to update local databases, +and the ability to query the network database. In essence, there +would be a regression to the state we are in today. + + A well-administered network database should be backed up +frequently. Should a catastrophic series of hardware failures +remove one or more of the network database's hosts from the net, +the database could be moved elsewhere. Such a change would +entail notification of all hosts on which mail originates. +Software which queries the database should be designed to be able +to easily handle such a move. + + + + + + + + + + + + + + +_______________ + 6 + Such notification would presumably be by hardcopy mail or +telephone. + + + + + + +RFC 757 September 1979 +Relationship to TIP Login database Page 9 + + +3. Relationship to TIP Login database + + A number of references to the TIP Login problem and a database +which has been proposed as part of its solution have been made in +this note. A series of working papers [5] written by Bob Thomas, +Paul Santos, and Jack Haverty describe an approach to TIP Login. +In brief, the method is to build and maintain a distributed TIP +Login database, containing information necessary to allow a new +entity called a "login-host" to decide whether or not to grant a +user access to a given TIP, and whether or not to allow the user +to make various modifications to the database itself. + + The TIP login database is derived from a "network user data +base", which contains information above and beyond that necessary +to support TIP login. This comprehensive database is designed to +support applications other than TIP Login, either directly or by +means of databases derived from it. + + Contained in the TIP Login database are each user's login +string, a list of TIPs the user is authorized to access, the +user's unique ID, his password, and any other "permissions" (in +addition to which TIPs may be accessed). These permissions may +indicate that the user may create, delete, or modify entries in +the database, to assume other user's roles, and to what extent he +may do so. The notion of permissions as developed by Steve +Warshall is discussed in an NSW memo [2]. + + It seems entirely reasonable to derive a netmail database from +the same comprehensive database that is designed to support TIP +Login. The concept of a unique ID is supported by that database. +Much of the required information for a netmail database is +already included, and the maintenance tools necessary to modify +it seem well-suited for the purpose. The concept of permissions +extends well to the needs of netmail. Permissions specific to +network mail might include, for example, the ability to modify +the delivery host list associated with a given user. + + The mechanisms necessary for the maintenance of the +comprehensive network database and its derived databases give us +a netmail database very inexpensively. This proposal takes +advantage of that situation. + + + + + + + + + + + + + +RFC 757 September 1979 +Relationship to RFC 753 Page 10 + + +4. Relationship to RFC 753 + + RFC 753 [4] describes an internetwork message delivery system. +Very briefly, the approach is to locate one or more "message +processing modules" (or MPMs) on each network. These MPMs pass +messages across network boundaries, and are also capable of +making deliveries to users on the local network. The document +also details a proposed message format, along the envelope and +letter paradigm. An external "envelope", read by the delivery +system, allows the (unread) message to be correctly routed and +delivered to the proper recipient. Groups of messages passed +between a pair of MPMs are sent together in a "mail bag". + + This proposal differs from RFC 753 in that it is primarily +intended to operate within a network or a concatenation of +networks using a common host-host protocol, e.g. TCP. Where RFC +753 addresses the problems of internetwork communication +(differing message formats, complex routing, and correct +identification of the proper recipient), this note concentrates +primarily on what can be done within a single protocol. The two +are not incompatible. While a general internetwork protocol must +provide general methods which can be compatible with different +host-host protocols in different networks, a proposal such as +this one can capitalize on the capabilities, resources, and +policies of a given catenet (catenated network) such as the +ARPAnet/PRnet/SATNET etc. + + +4.1 Compatibility + + The delivery system described in RFC 753 is compatible with the +system outlined here. Let's examine this for each of the three +basic delivery options performed by the MPM. (In the discussion +that follows, "local networks" means a concatenation of networks +using a common host-host protocol, e.g. TCP. "Foreign network" +means some network which uses a different host-host protocol, +e.g. X.25. (See Figure 4-1.) + + +4.1.1 Outgoing message + + +4.1.1.1 RFC 753 + + The sender's process hands a message to the local network MPM. +The message may be destined to an address on the local network or +on a foreign network. In the former case, the MPM performs the +local delivery function (see "Incoming message"). In the latter +case, the MPM passes the message along to another MPM which is +"closer" to the end user. + + + + +RFC 757 September 1979 +Relationship to RFC 753 Page 11 + + + + + +---------+ +----------+ + | | | | + | RCC-NET | | WIDEBAND | ....... + | | | NET | . . + +---------+ | | . MPM . + * * +----------+ ....... ++---------+ * * * * ....... | +| | +---------+ . . +---------+ +| BBN-NET |***| |__. MPM . ..... | | +| | | ARPANET | ....... . .xxxx| TELENET | ++---------+***| |***********. G . | | + +---------+*** ..... +---------+ + * * * * ** ....... + +--------+ +-------+ ***..... +-------------+ . . + | | | | . . | |--. MPM . + | SATNET | | PRNET | . G .oooo| DIAL-UP NET | ....... + | | | | ..... | | + +--------+ +-------+ +-------------+ + + + + + "Local Nets", TCP based | "Foreign Nets", other + (direct addressing using IP) | host-host protocols + + +*** = TCP xxx = X.25 ooo = other communications protocol + G = gateway + + + + Figure 4-1: The Internet Environment + + + + +4.1.1.2 This proposal + + The sender's process determines the proper host for delivery +given the recipient's unique ID. If the message is destined to +the local network, delivery takes place as described earlier in +this proposal. If the recipient is not local, the message may be +passed to an MPM for foreign delivery. (A discussion of internet +delivery which does not presuppose RFC 753 implementation is +found later in this note.) + + The environment in which the MPM operates does not assume any +knowledge on the part of the local networks about addressees on +foreign networks. Thus there are two possibilities which arise: + + + +RFC 757 September 1979 +Relationship to RFC 753 Page 12 + + + - The recipient has an ID known to the local networks. + + In this case, the local networks supply the RFC 753 + "address". This can take place in the local networks' + MPM or the user's sending or mail creation process. + + - The recipient is unknown to the local networks. + + Here the sender must supply "mailbox" information + himself, either explicitly or with help of his local + host's database. + + Thus, outgoing mail as described in this memo is compatible +with RFC 753, with the benefit of reducing the burden on the MPM +by handling mail deliveries that are local to local networks. + + +4.1.2 Messages in transit + + Traffic between two MPMs is not affected by this proposal. + + +4.1.3 Incoming mail + + The MPM on the networks local to the recipient will have access +to the netmail database, allowing it to translate "mailboxes" to +"addresses". It can determine the unique ID of the recipient (if +not known), and initiate delivery to that recipient. Here RFC +753 and this proposal complement each other very well. + + + + + + + + + + + + + + + + + + + + + + + + + +RFC 757 September 1979 +Implications of an internetwork message environment Page 13 + + +5. Implications of an internetwork message environment + + The scheme described above is based upon the assumption that a +unique identifier can be assigned to each registered recipient of +mail. Whether or not this uniqueness can be guaranteed in a +fairly unregulated internetwork environment is questionable. It +is technically feasible, certainly. The difficulties are more +political, because it is necessary to gain the cooperation of the +administrators and user populations of foreign networks. Let's +assume cooperation, however, and see what might happen in an +internet environment. + + +5.1 Birthplaces + + Each set of local networks would have its own database, for +ease in access. It does not seem practical to register each ID +in every database, however. That would be unnecessary, and would +create access and storage problems at the network databases. +Here the concept of a "birthplace", or ID origin, may be of use. + + While an ID does not imply where the user is now, it can say +something about who issued it. A simple system for determining +the address for any ID can be maintained by having the issuing +network keep a pointer for each ID it issues. One double +indirection would yield the desired address, even if the ID were +not issued on the local nets. A message originating on the local +nets with an ID which is unknown to its database can be handled +by determining the birthplace of the ID. An inquiry to the +birthplace database would return a list of one or more networks +on which the ID is registered. An inquiry to any of those would +get the requisite information. All that is necessary to support +this is for the birthplace record (small enough!) to be kept, +and for the act of registration at a given net to automatically +cause that net to notify the birthplace of the registration. +(Conversely, a de-registration would cause a similar notification +of the birthplace.) + + +5.1.1 ID resolution + + The handling of ID resolution when the ID is not known to the +local net does not seem to have a solution simpler than querying +foreign nets until some success is achieved. + + +5.1.2 Hosts in an internet environment + + The substitution of internet host names for simple host names +should not cause any difficulty. + + + + +RFC 757 September 1979 +Implications of an internetwork message environment Page 14 + + +5.1.3 Orphans + + Should a birthplace cease to exist (usually because its network +is dismantled), it would be necessary for a second birthplace to +"adopt" the first birthplace's records. Notification of this +change could be propagated throughout the internet environment in +much the same way as the addition of a new birthplace would be +treated. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +RFC 757 September 1979 +Conclusions Page 15 + + +6. Conclusions + + While ARPAnet message systems have been amazingly successful, +there is much room for improvement in the quality and quantity of +the services offered. Current protocols are limiting the +development of new message systems. This paper has discussed a +means of providing the underlying support necessary for building +a new generation of message systems which can be better +human-engineered in addition to providing more services and +greater reliability. + + Critics may argue that the proposal is too radical, too much of +a departure from current practice. After all, today's message +service is extremely straightforward in design, and therefore has +comparatively few failure modes. The protocols in use have +descended, with relatively few changes, from the first file +transfer and message format protocols implemented on the ARPAnet. +This makes them well understood; people are aware of both their +shortcomings and usage. Finally, there are people who will not +feel comfortable about requiring a network database, distrusting +the reliability and questioning the possible cost of such a +scheme. + + On the other hand, it is undeniably true that very little more +can be done to improve message services while staying within +today's practices. New message systems which will be able to +transmit facsimile, voice, and other media along with text +require us to rethink message formats and do away with delivery +protocols which are predicated upon the characteristics of ASCII +text. The inception of internetwork message delivery causes us +to re-evaluate how we handle messages locally. Finally, the +USERNAME@HOST naming scheme has proved to be inadequate, while +the divorce of recipients' identities from their locations seems +a promising possibility as a replacement. + + The ARPAnet will soon have a distributed database for +supporting TIP Login. Only small, incremental costs would be +associated with building and maintaining a netmail database at +the same time. It can be argued that TIP Login requires at least +the level of reliability required by a message delivery system. +If the TIP Login database is successful, a netmail database can +work, too. + + It is clear that we will be implementing a new set of message +format and delivery protocols in the near future, in order to +allow for multi-media messages, internetwork message traffic, and +the like. New message composition and delivery systems will be +built to meet those specifications and take advantage of the +avenues of development which they will open. If there will ever +be an advantageous time to re-evaluate and re-design how messages +are addressed and delivered, it is now, when we are about to +enter upon an entirely new cycle of message composition and + + +RFC 757 September 1979 +Conclusions Page 16 + + +delivery program implementation. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +RFC 757 September 1979 +References Page 17 + + + REFERENCES + +[1] John F. Shoch. + Inter-Network Naming, Addressing, and Routing. + In Proceedings, COMPCON. IEEE Computer Society, Fall, 1979. + +[2] Stephen Warshall. + On Names and Permissions. + Mass. Computer Associates. 1979. + +[3] David H. Crocker, John J. Vittal, Kenneth T. Pogran, + D. Austin Henderson, Jr. + STANDARD FOR THE FORMAT OF ARPA NETWORK TEXT MESSAGES. + RFC 733, The Rand Corporation, Bolt Beranek and Newman Inc, + Massachussets Institute of Technology, Bolt Beranek and + Newman Inc., November, 1977. + +[4] Jonathan B. Postel. + INTERNET MESSAGE PROTOCOL. + RFC 753, Information Sciences Institute, March, 1979. + +[5] Robert H. Thomas, Paul J. Santos, and John F. Haverty. + TIP Login Notes. + Bolt Beranek and Newman. 1979. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +RFC 757 September 1979 +Table of Contents Page i + + + Table of Contents + +1. Introduction 2 + +2. Names and Addresses 3 + +2.1 A distributed database approach 4 +2.2 Delivery 5 + 2.2.1 Additional delivery options 7 + 2.2.2 Failures 8 + +3. Relationship to TIP Login database 9 + +4. Relationship to RFC 753 10 + +4.1 Compatibility 10 + 4.1.1 Outgoing message 10 + 4.1.1.1 RFC 753 10 + 4.1.1.2 This proposal 11 + 4.1.2 Messages in transit 12 + 4.1.3 Incoming mail 12 + +5. Implications of an internetwork message environment 13 + +5.1 Birthplaces 13 + 5.1.1 ID resolution 13 + 5.1.2 Hosts in an internet environment 13 + 5.1.3 Orphans 14 + +6. Conclusions 15 + + + + + + + + + + + + + + + + + + + + + + + + +RFC 757 September 1979 +List of Figures Page ii + + + List of Figures + +Figure 4-1: The Internet Environment 10 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +RFC 757 September 1979 + |