请输入您要查询的百科知识:

 

词条 List of DNS record types
释义

  1. Resource records

  2. Other types and pseudo resource records

  3. Obsolete record types

  4. Further reading

  5. References

This list of DNS record types is an overview of resource records (RRs) permissible in zone files of the Domain Name System (DNS). It also contains pseudo-RRs.

Resource records

Type Type id. (decimal)Defining RFC Description Function
A
1RFC 1035[1] Address record Returns a 32-bit IPv4 address, most commonly used to map hostnames to an IP address of the host, but it is also used for DNSBLs, storing subnet masks in RFC 1101, etc.
AAAA
28RFC 3596[2] IPv6 address record Returns a 128-bit IPv6 address, most commonly used to map hostnames to an IP address of the host.
AFSDB
18RFC 1183AFS database recordLocation of database servers of an AFS cell. This record is commonly used by AFS clients to contact AFS cells outside their local domain. A subtype of this record is used by the obsolete DCE/DFS file system.
APL
42RFC 3123Address Prefix ListSpecify lists of address ranges, e.g. in CIDR format, for various address families. Experimental.
CAA
257RFC 6844Certification Authority AuthorizationDNS Certification Authority Authorization, constraining acceptable CAs for a host/domain
CDNSKEY
60RFC 7344Child copy of DNSKEY record, for transfer to parent
CDS
59RFC 7344Child DSChild copy of DS record, for transfer to parent
CERT
37RFC 4398Certificate recordStores PKIX, SPKI, PGP, etc.
CNAME5RFC 1035[1] Canonical name record Alias of one name to another: the DNS lookup will continue by retrying the lookup with the new name.
DHCID
49RFC 4701DHCP identifierUsed in conjunction with the FQDN option to DHCP
DLV
32769RFC 4431DNSSEC Lookaside Validation recordFor publishing DNSSEC trust anchors outside of the DNS delegation chain. Uses the same format as the DS record. RFC 5074 describes a way of using these records.
DNAME
39RFC 6672Alias for a name and all its subnames, unlike CNAME, which is an alias for only the exact name. Like a CNAME record, the DNS lookup will continue by retrying the lookup with the new name.
DNSKEY
48RFC 4034DNS Key recordThe key record used in DNSSEC. Uses the same format as the KEY record.
DS
43RFC 4034Delegation signerThe record used to identify the DNSSEC signing key of a delegated zone
HIP
55RFC 8005Host Identity ProtocolMethod of separating the end-point identifier and locator roles of IP addresses.
IPSECKEY
45RFC 4025IPsec KeyKey record that can be used with IPsec
KEY
25RFC 2535[3] and RFC 2930[4]Key recordUsed only for SIG(0) (RFC 2931) and TKEY (RFC 2930).[5] RFC 3445 eliminated their use for application keys and limited their use to DNSSEC.[6] RFC 3755 designates DNSKEY as the replacement within DNSSEC.[7] RFC 4025 designates IPSECKEY as the replacement for use with IPsec.[8]
KX
36RFC 2230 Key Exchanger record Used with some cryptographic systems (not including DNSSEC) to identify a key management agent for the associated domain-name. Note that this has nothing to do with DNS Security. It is Informational status, rather than being on the IETF standards-track. It has always had limited deployment, but is still in use.
LOC29RFC 1876 Location record Specifies a geographical location associated with a domain name
MX15RFC 1035[1] and RFC 7505 Mail exchange record Maps a domain name to a list of message transfer agents for that domain
NAPTR35RFC 3403 Naming Authority Pointer Allows regular-expression-based rewriting of domain names which can then be used as URIs, further domain names to lookups, etc.
NS
2RFC 1035[1] Name server record Delegates a DNS zone to use the given authoritative name servers
NSEC
47RFC 4034Next Secure recordPart of DNSSEC—used to prove a name does not exist. Uses the same format as the (obsolete) NXT record.
NSEC3
50RFC 5155Next Secure record version 3An extension to DNSSEC that allows proof of nonexistence for a name without permitting zonewalking
NSEC3PARAM
51RFC 5155NSEC3 parametersParameter record for use with NSEC3
OPENPGPKEY61RFC 7929OpenPGP public key recordA DNS-based Authentication of Named Entities (DANE) method for publishing and locating OpenPGP public keys in DNS for a specific email address using an OPENPGPKEY DNS resource record.
PTR
12RFC 1035[1] Pointer record Pointer to a canonical name. Unlike a CNAME, DNS processing stops and just the name is returned. The most common use is for implementing reverse DNS lookups, but other uses include such things as DNS-SD.
RRSIG
46RFC 4034DNSSEC signatureSignature for a DNSSEC-secured record set. Uses the same format as the SIG record.
RP
17RFC 1183Responsible PersonInformation about the responsible person(s) for the domain. Usually an email address with the @ replaced by a .
SIG
24RFC 2535SignatureSignature record used in SIG(0) (RFC 2931) and TKEY (RFC 2930).[7] RFC 3755 designated RRSIG as the replacement for SIG for use within DNSSEC.[7]
SMIMEA 53 RFC 8162[9] S/MIME cert association[10] Associates an S/MIME certificate with a domain name for sender authentication.
SOA 6 RFC 1035[1] and RFC 2308[11] Start of [a zone of] authority record Specifies authoritative information about a DNS zone, including the primary name server, the email of the domain administrator, the domain serial number, and several timers relating to refreshing the zone.
SRV33RFC 2782Service locatorGeneralized service location record, used for newer protocols instead of creating protocol-specific records such as MX.
SSHFP
44RFC 4255SSH Public Key FingerprintResource record for publishing SSH public host key fingerprints in the DNS System, in order to aid in verifying the authenticity of the host. RFC 6594 defines ECC SSH keys and SHA-256 hashes. See the IANA SSHFP RR parameters registry for details.
TA
32768{{n/a}}DNSSEC Trust AuthoritiesPart of a deployment proposal for DNSSEC without a signed DNS root. See the IANA database and Weiler Spec for details. Uses the same format as the DS record.
TKEY
249RFC 2930Transaction Key recordA method of providing keying material to be used with TSIG that is encrypted under the public key in an accompanying KEY RR.[12]
TLSA
52RFC 6698TLSA certificate associationA record for DANE. RFC 6698 defines "The TLSA DNS resource record is used to associate a TLS server certificate or public key with the domain name where the record is found, thus forming a 'TLSA certificate association'".
TSIG
250RFC 2845Transaction SignatureCan be used to authenticate dynamic updates as coming from an approved client, or to authenticate responses as coming from an approved recursive name server[13] similar to DNSSEC.
TXT
16RFC 1035[1]Text recordOriginally for arbitrary human-readable text in a DNS record. Since the early 1990s, however, this record more often carries machine-readable data, such as specified by RFC 1464, opportunistic encryption, Sender Policy Framework, DKIM, DMARC, DNS-SD, etc.
URI
256RFC 7553Uniform Resource IdentifierCan be used for publishing mappings from hostnames to URIs.

Other types and pseudo resource records

Other types of records simply provide some types of information (for example, an HINFO record gives a description of the type of computer/OS a host uses), or others return data used in experimental features. The "type" field is also used in the protocol for various operations.

TypeType id.Defining RFCDescriptionFunction
*255RFC 1035[1]All cached recordsReturns all records of all types known to the name server. If the name server does not have any information on the name, the request will be forwarded on. The records returned may not be complete. For example, if there is both an A and an MX for a name, but the name server has only the A record cached, only the A record will be returned. Sometimes referred to as "ANY", for example in Windows nslookup and Wireshark.
AXFR252RFC 1035[1] Authoritative Zone TransferTransfer entire zone file from the master name server to secondary name servers.
IXFR
251RFC 1996 Incremental Zone Transfer Requests a zone transfer of the given zone but only differences from a previous serial number. This request may be ignored and a full (AXFR) sent in response if the authoritative server is unable to fulfill the request due to configuration or lack of required deltas.
OPT
41RFC 6891OptionThis is a "pseudo DNS record type" needed to support EDNS

Obsolete record types

Progress has rendered some of the originally defined record-types obsolete.

Of the records listed at IANA, some have limited use, for various reasons. Some are marked obsolete in the list, some are for very obscure services, some are for older versions of services, and some have special notes saying they are "not right".

Type Type id.
(decimal)
Defining RFC Obsoleted byDescription
MD 3RFC 883RFC 973Mail destination (MD) and mail forwarder (MF) records; MAILA is not an actual record type, but a query type which returns MF and/or MD records. RFC 973 replaced these records with the MX record.
MF 4
MAILA 254
MB 7RFC 883Not formally obsoleted. Unlikely to be ever adopted (RFC 2505).MB, MG, MR, and MINFO are records to publish subscriber mailing lists. MAILB is a query code which returns one of those records. The intent was for MB and MG to replace the SMTP VRFY and EXPN commands. MR was to replace the "551 User Not Local" SMTP error. Later, RFC 2505 recommended that both VRFY and EXPN be disabled, making MB and MG unnecessary. They were classified as experimental by RFC 1035.
MG 8
MR 9
MINFO 14
MAILB 253
WKS 11 RFC 883, RFC 1035 Declared as "not to be relied upon" by RFC 1123 (more in RFC 1127). Record to describe well-known services supported by a host. Not used in practice. The current recommendation and practice is to determine whether a service is supported on an IP address by trying to connect to it. SMTP is even prohibited from using WKS records in MX processing.[14]
NB 32RFC 1002Mistakes (from RFC 1002); the numbers are now assigned to NIMLOC and SRV.
NBSTAT 33
NULL 10 RFC 883 RFC 1035 Obsoleted by RFC 1035. RFC 883 defined "completion queries" (opcode 2 and maybe 3) which used this record. RFC 1035 later reassigned opcode 2 to be "status" and reserved opcode 3.
A6 38 RFC 2874 RFC 6563 Defined as part of early IPv6 but downgraded to experimental by RFC 3363; later downgraded to historic by RFC 6563.
NXT 30RFC 2065RFC 3755Part of the first version of DNSSEC (RFC 2065). NXT was obsoleted by DNSSEC updates (RFC 3755). At the same time, the domain of applicability for KEY and SIG was also limited to not include DNSSEC use.
KEY 25
SIG 24
HINFO 13 RFC 883 Not obsoleted. Currently used by Cloudflare in response to queries of the type ANY.[15] Record intended to provide information about host CPU type and operating system. It was intended to allow protocols to optimize processing when communicating with similar peers.
RP 17 RP may be used for certain human-readable information regarding a different contact point for a specific host, subnet, or other domain level label separate than that used in the SOA record.
X25 19 Not in current use by any notable application
ISDN 20Not in current use by any notable application
RT 21
NSAP 22
NSAP-PTR 23Not in current use by any notable application
PX 26
EID 31
NIMLOC 32Not in current use by any notable application
ATMA 34
APL 42
SINK 40 Defined by the Kitchen Sink internet draft, but never made it to RFC status
GPOS 27 A more limited early version of the LOC record
UINFO 100IANA reserved, no RFC documented them [https://web.archive.org/web/20080611185015/http://www.ops.ietf.org/lists/namedroppers/namedroppers.2004/msg00949.html] and support was removed from BIND in the early 90s.
UID 101
GID 102
UNSPEC 103
SPF 99 RFC 4408 RFC 7208 Specified as part of the Sender Policy Framework protocol as an alternative to storing SPF data in TXT records, using the same format. Support for it was discontinued in RFC 7208 due to widespread lack of support.[16][17]
NINFO 56 Used to provide status information about a zone. Requested for the IETF draft "The Zone Status (ZS) DNS Resource Record" in 2008. Expired without adoption.[18]
RKEY 57 Used for encryption of NAPTR records. Requested for the IETF draft "The RKEY DNS Resource Record" in 2008. Expired without adoption.[19]

Further reading

  • {{cite web|url=https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml|title=Domain Name System (DNS) Parameters|accessdate=2018-08-14}}
  • {{cite web|url=https://support.google.com/a/answer/48090|title=DNS basics - G Suite Administrator Help|last=|first=|date=|website=|archive-url=|archive-date=|dead-url=|accessdate=2018-11-08}}

References

1. ^ {{cite web | title = RFC 1035: Domain Names - Implementation and Specification | publisher = Network Working Group of the IETF (Internet Engineering Task Force) | author = Paul Mockapetris | authorlink = Paul Mockapetris | page = 12 | date = November 1987 | url = http://tools.ietf.org/html/rfc1035#page-12 }}
2. ^ {{cite web | url = http://tools.ietf.org/html/rfc3596#section-2 | title = RFC 3596: DNS Extensions to Support IP Version 6 | publisher = The Internet Society | date = October 2003 }}
3. ^RFC 2535, §3
4. ^RFC 3445, §1. "The KEY RR was defined in RFC 2930..."
5. ^RFC 2931, §2.4. "SIG(0) on the other hand, uses public key authentication, where the public keys are stored in DNS as KEY RRs and a private key is stored at the signer."
6. ^RFC 3445, §1. "DNSSEC will be the only allowable sub-type for the KEY RR..."
7. ^RFC 3755, §3. "DNSKEY will be the replacement for KEY, with the mnemonic indicating that these keys are not for application use, per RFC3445. RRSIG (Resource Record SIGnature) will replace SIG, and NSEC (Next SECure) will replace NXT. These new types completely replace the old types, except that SIG(0) RFC2931 and TKEY RFC2930 will continue to use SIG and KEY."
8. ^RFC 4025, Abstract. "This record replaces the functionality of the sub-type #4 of the KEY Resource Record, which has been obsoleted by RFC 3445."
9. ^{{cite web | url = https://tools.ietf.org/html/rfc8162#section-2 | title = RFC 8162 - Using Secure DNS to Associate Certificates with Domain Names for S/MIME | publisher = Internet Engineering Task Force | date = May 2017 | accessdate = 17 October 2018}}
10. ^{{cite web | url = https://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml | title = Domain Name System (DNS) Parameters | publisher = Internet Assigned Numbers Authority | date = September 2018 | accessdate = 17 October 2018}}
11. ^The minimum field of SOA record is redefined to be the TTL of NXDOMAIN reply in RFC 2308.
12. ^RFC 2930, §6. "... the keying material is sent within the key data field of a TKEY RR encrypted under the public key in an accompanying KEY RR RFC 2535."
13. ^RFC 2845, abstract
14. ^RFC 1123 sections 2.2, 5.2.12, 6.1.3.6
15. ^{{cite web |title=What happened next: the deprecation of ANY |url=https://blog.cloudflare.com/what-happened-next-the-deprecation-of-any/ |publisher=Cloudflare |accessdate=9 March 2019 |date=13 April 2016}}
16. ^{{cite IETF|title=Resolution of the Sender Policy Framework (SPF) and Sender ID Experiments|rfc=6686|appendix=A|sectionname=Background on the RRTYPE Issue|first1=M.|last1=Kucherawy|date=July 2012|publisher=IETF|accessdate=August 31, 2013}}
17. ^{{cite IETF|title=Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1|rfc=7208|section=3.1|sectionname=The SPF DNS Record Type|first1=S.|last1=Kitterman|date=April 2014|publisher=IETF|accessdate=26 April 2014}}
18. ^{{cite web |last1=Reid |first1=Jim |title=draft-reid-dnsext-zs-01 - The Zone Status (ZS) DNS Resource Record |url=https://datatracker.ietf.org/doc/draft-reid-dnsext-zs/ |publisher=IETF |accessdate=9 March 2019 |date=4 July 2008}}
19. ^{{cite web |last1=Reid |first1=Jim |last2=Schlyter |first2=Jakob |last3=Timms |first3=Ben |title=draft-reid-dnsext-rkey-00 - The RKEY DNS Resource Record |url=https://datatracker.ietf.org/doc/draft-reid-dnsext-rkey/ |publisher=IETF |accessdate=9 March 2019 |date=4 July 2008}}

3 : Domain name system|Internet protocols|DNS record types

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/30 22:30:13