13:05 ET Dow -154.48 at 10309.92, Nasdaq -37.61 at 2138.44, S&P -19.130 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 13:05 ET Dow -154.48 at 10309.92, Nasdaq -37.61 at 2138.44, S&P -19.1313:05 ET Dow -154.48 at 10309.92, Nasdaq -37.61 at 2138.44, S&P -19.13

.

.

Saturday, May 21, 2011

List of Domain Name Server Record Types from Wikipedia - This is Where You Do Things Like Point Mail Servers, Etc


st of DNS record types

From Wikipedia, the free encyclopedia
This List of DNS record types provides an overview of types of resource records (database records) stored in the zone files of the Domain Name System (DNS).
The DNS implements a distributed, hierarchical, and redundant database for information associated with Internet domain names and addresses. In these domain servers, different record types are used for different purposes.

Contents

 [hide]

[edit]Resource records

Type↓Value (decimal)↓Defining RFC↓Description↓Function↓
A
1RFC 1035[1]address recordReturns a 32-bit IPv4 address, most commonly used to map hostnames to an IP address of the host, but also used forDNSBLs, storing subnet masks in RFC 1101, etc.
AAAA
28RFC 3596[2]IPv6 address recordReturns a 128-bit IPv6 address, most commonly used to map hostnames to an IP address of the host.
AFSDB
18RFC 1183AFS database recordLocation of database servers of an AFS cell. This record is commonly used by AFS clients to contact AFS cells outside their local domain. A subtype of this record is used by the obsolete DCE/DFS file system.
APL
42RFC 3123Address Prefix ListSpecify lists of address ranges, e.g. in CIDR format, for various address families. Experimental.
CERT
37RFC 4398Certificate recordStores PKIXSPKIPGP, etc.
CNAME5RFC 1035[1]Canonicalname recordAlias of one name to another: the DNS lookup will continue by retrying the lookup with the new name.
DHCID
49RFC 4701DHCP identifierUsed in conjunction with the FQDN option to DHCP
DLV
32769RFC 4431DNSSEC Lookaside Validation recordFor publishing DNSSEC trust anchors outside of the DNS delegation chain. Uses the same format as the DS record. RFC 5074 describes a way of using these records.
DNAME39RFC 2672delegation nameDNAME creates an alias for a name and all its subnames, unlike CNAME, which aliases only the exact name in its label. Like the CNAME record, the DNS lookup will continue by retrying the lookup with the new name.
DNSKEY
48RFC 4034DNS Key recordThe key record used in DNSSEC. Uses the same format as the KEY record.
DS
43RFC 4034Delegation signerThe record used to identify the DNSSEC signing key of a delegated zone
HIP55RFC 5205Host Identity ProtocolMethod of separating the end-point identifier and locator roles of IP addresses.
IPSECKEY
45RFC 4025IPSEC KeyKey record that can be used with IPSEC
KEY
25RFC 2535[3]and RFC 2930[4]key recordUsed only for SIG(0) (RFC 2931) and TKEY (RFC 2930).[5] RFC 3445 eliminated their use for application keys and limited their use to DNSSEC.[6] RFC 3755 designates DNSKEY as the replacement within DNSSEC.[7]
KX
36RFC 2230Key eXchanger recordUsed with some cryptographic systems (not including DNSSEC) to identify a key management agent for the associated domain-name. Note that this has nothing to do with DNS Security. It is Informational status, rather than being on the IETF standards-track. It has always had limited deployment, but is still in use.
LOC29RFC 1876Location recordSpecifies a geographical location associated with a domain name
MX15RFC 1035[1]mail exchange recordMaps a domain name to a list of message transfer agents for that domain
NAPTR35RFC 3403Naming Authority PointerAllows regular expression based rewriting of domain names which can then be used as URIs, further domain names to lookups, etc.
NS
2RFC 1035[1]name server recordDelegates a DNS zone to use the given authoritative name servers
NSEC
47RFC 4034Next-Secure recordPart of DNSSEC—used to prove a name does not exist. Uses the same format as the (obsolete) NXT record.
NSEC3
50RFC 5155NSEC record version 3An extension to DNSSEC that allows proof of nonexistence for a name without permitting zonewalking
NSEC3PARAM
51RFC 5155NSEC3 parametersParameter record for use with NSEC3
PTR
12RFC 1035[1]pointer recordPointer to a canonical name. Unlike a CNAME, DNS processing does NOT proceed, just the name is returned. The most common use is for implementing reverse DNS lookups, but other uses include such things as DNS-SD.
RRSIG
46RFC 4034DNSSEC signatureSignature for a DNSSEC-secured record set. Uses the same format as the SIG record.
RP
17RFC 1183Responsible personInformation about the responsible person(s) for the domain. Usually an email address with the @ replaced by a .
SIG
24RFC 2535SignatureSignature record used in SIG(0) (RFC 2931) and TKEY (RFC 2930).[7] RFC 3755 designated RRSIG as the replacement for SIG for use within DNSSEC.[7]
SOA
6RFC 1035[1]start of authority recordSpecifies authoritative information about a DNS zone, including the primary name server, the email of the domain administrator, the domain serial number, and several timers relating to refreshing the zone.
SPF99RFC 4408Sender Policy FrameworkSpecified as part of the SPF protocol in preference to the earlier provisional practice of storing SPF data in TXT records. Uses the same format as the earlier TXT record.
SRV33RFC 2782Service locatorGeneralized service location record, used for newer protocols instead of creating protocol-specific records such as MX.
SSHFP
44RFC 4255SSH Public Key FingerprintResource record for publishing SSH public host key fingerprints in the DNS System, in order to aid in verifying the authenticity of the host.
TA
32768N/ADNSSEC Trust AuthoritiesPart of a deployment proposal for DNSSEC without a signed DNS root. See the IANA database and Weiler Spec for details. Uses the same format as the DS record.
TKEY
249RFC 2930secret key recordA method of providing keying material to be used with TSIG that is encrypted under the public key in an accompanying KEY RR.[8]
TSIG
250RFC 2845Transaction SignatureCan be used to authenticate dynamic updates as coming from an approved client, or to authenticate responses as coming from an approved recursive name server[9] similar to DNSSEC.
TXT
16RFC 1035[1]Text recordOriginally for arbitrary human-readable text in a DNS record. Since the early 1990s, however, this record more often carries machine-readable data, such as specified by RFC 1464opportunistic encryptionSender Policy Framework (although this provisional use of TXT records is deprecated in favor of SPF records), DomainKeysDNS-SD, etc.

[edit]Other types and pseudo resource records

Other types of records simply provide some types of information (for example, an HINFO record gives a description of the type of computer/OS a host uses), or others return data used in experimental features. The "type" field is also used in the protocol for various operations.
Code↓Number↓Defining RFC↓DescriptionFunction
*255RFC 1035[1]All cached recordsReturns all records of all types known to the name server. If the name server does not have any information on the name, the request will be forwarded on. The records returned may not be complete. For example, if there is both an A and an MX for a name, but the name server has only the A record cached, only the A record will be returned. Sometimes referred to as "ANY", for example in Windows nslookup and Wireshark.
AXFR252RFC 1035[1]Authoritative Zone TransferTransfer entire zone file from the master name server to secondary name servers.
IXFR
251RFC 1995Incremental Zone TransferRequests a zone transfer of the given zone but only differences from a previous serial number. This request may be ignored and a full (AXFR) sent in response if the authoritative server is unable to fulfill the request due to configuration or lack of required deltas.
OPT
41RFC 2671OptionThis is a "pseudo DNS record type" needed to support EDNS

[edit]Obsolete record types

Progress has rendered obsolete some of the originally-defined record-types. Of the records listed at IANA, some have limited use, for various reasons. Some are marked obsolete in the list, some are for very obscure services, some are for older versions of services, and some have special notes saying they are "not right".
  • Obsoleted by RFC 973: MD(3), MF (4), MAILA (254)
  • Records to publish mailing list subscriber lists in the DNS: MB(7), MG(8), MR(9), MINFO(14), MAILB (253). The intent, as specified by RFC 883, was for MB to replace the SMTPVRFY command, MG to replace the SMTP EXPN command, and MR to replace the "551 User Not Local" SMTP error. Later, RFC 2505 recommended that both the VRFY and EXPN commands be disabled, making the use of MB and MG unlikely to ever be adopted.
  • Declared "not to be relied upon" by RFC 1123 (with further information in RFC 1127): WKS(11)[10]
  • Mistakes: NB(32), NBSTAT(33) (from RFC 1002); the numbers are now assigned to NIMLOC and SRV.
  • Obsoleted by RFC 1035: NULL(10) (RFC 883 defined "completion queries" (opcode 2 and maybe 3) which used this record, RFC 1035 later reassigned opcode 2 to be "status" and reserved opcode 3.)
  • Defined as part of early IPv6 but downgraded to experimental by RFC 3363: A6(38)
  • Obsoleted by DNSSEC updates (RFC 3755): NXT(30). At the same time, the domain of applicability for KEY and SIG was also limited to not include DNSSEC use.
  • Part of the first version of DNSSEC (RFC 2065).
  • Not in current use by any notable application: HINFO(13), RP(17), X25(19), ISDN(20), RT(21), NSAP(22), NSAP-PTR(23), PX(26), EID(31), NIMLOC(32), ATMA(34), APL(42)
  • Defined by the Kitchen Sink internet draft, but never made it to RFC status: SINK(40)
  • A more limited early version of the LOC record: GPOS(27)
  • IANA reserved, no RFC documented them [1] and support was removed from BIND in the early 90s: UINFO(100), UID(101), GID(102), UNSPEC(103)
RP(17) may be used for certain human-readable information regarding a different contact point for a specific host, subnet, or other domain level label separate than that used in the SOA record.