分享
 
 
 

RFC1798 - Connection-less Lightweight X.500 Directory Access Protocol

王朝other·作者佚名  2008-05-31
窄屏简体版  字體: |||超大  

Network Working Group A. Young

Request for Comments: 1798 ISODE Consortium

Category: Standards Track June 1995

Connection-less Lightweight X.500 Directory Access Protocol

Status of this Memo

This document specifies an Internet standards track protocol for the

Internet community, and requests discussion and suggestions for

improvements. Please refer to the current edition of the "Internet

Official Protocol Standards" (STD 1) for the standardization state

and status of this protocol. Distribution of this memo is unlimited.

X.500

The protocol described in this document is designed to provide access

to the Directory while not incurring the resource requirements of the

Directory Access Protocol (DAP) [3]. In particular, it is aimed at

avoiding the elapsed time that is associated with connection-oriented

communication and it facilitates use of the Directory in a manner

analagous to the DNS [5,6]. It is specifically targeted at simple

lookup applications that require to read a small number of attribute

values from a single entry. It is intended to be a complement to DAP

and LDAP [4]. The protocol specification draws heavily on that of

LDAP.

1. Background

The Directory can be used as a repository for many kinds of

information. The full power of DAP is unnecessary for applications

that require simple read access to a few attribute values.

Applications addressing is a good example of this type of use where

an application entity needs to determine the Presentation Address

(PA) of a peer entity given that peer's Application Entity Title

(AET). If the AET is a Directory Name (DN) then the required result

can be oBTained from the PA attribute of the Directory entry

identified by the AET. This is very similar to DNS.

Use of DAP to achieve this functionality involves a significant

number of network exchanges:

___________________________________________________________

_#_______Client_(DUA)________DAP________Server_(DSA)_____

1 N-Connect.request ->

2 <- N-Connect.response

3 T-Connect.request ->

4 <- T-Connect.response

S-Connect.request,

P-Connect.request,

A-Associate.request,

5 DAP-Bind.request ->

S-Connect.response,

P-Connect.response,

A-Associate.response,

6 <- DAP-Bind.response

7 DAP-Read.request ->

8 <- DAP-Read.response

S-Release.request,

P-Release.request,

A-Release.request,

9 DAP-Unbind.request ->

S-Release.response,

P-Release.response,

A-Release.response,

10 <- DAP-Unbind.response

T-Disconnect.request,

11 N-Disconnect.request ->

T-Disconnect.response,

12 <- N-Disconnect.response

_________________________________________________________

This is 10 packets before the application can continue, given that it

can probably do so after issuing the T-Disconnect.request. (Some

minor variations arise depending upon the class of Network and

Transport service that is being used; for example use of TP4 over

CLNS redUCes the packet count by two.) LDAP is no better in the case

where the LDAP server uses full DAP to communicate with the

Directory:

____________________________________________________________________

__#____Client_____LDAP_____LDAP_server______DAP_________DSA_______

1 TCP SYN ->

2 <- TCP SYN ACK

3 BindReq ->

4 N-Connect.req ->

5 <- N-Connect.res

6 T-Connect.req ->

7 <- T-Connect.res

8 DAP-Bind.req ->

9 <- DAP-Bind.res

10 <- BindRes

11 SearchReq ->

12 DAP-Search.req ->

13 <- DAP-Search.res

14 <- SearchRes

15 TCP FIN ->

16 DAP-Unbind.req ->

17 <- DAP-Unbind.res

18 N-Disconnect.req ->

19 <- N-Disconnect.res

__________________________________________________________________

Here there are 14 packets before the application can continue. Even

if the LDAP server is on the same host as the DSA (so packet delay is

negligible), or if the DSA supports LDAP directly, then there are

still 6 packets.

____________________________________

# Client LDAP LDAP server

__________________________________

1 TCP SYN ->

2 <- TCP SYN ACK

3 BindReq ->

4 <- BindRes

5 SearchReq ->

_6_______________<-____SearchRes__

This protocol provides for simple access to the Directory where the

delays inherent in the above exchanges are unacceptable and where the

additional functionality provided by connection-mode operation is not

required.

2. Protocol Model

CLDAP is based directly on LDAP [4] and inherits many of the key

ASPects of the LDAP protocol:

- - Many protocol data elements are encoding as ordinary strings

(e.g., Distinguished Names).

- - A lightweight BER encoding is used to encode all protocol

elements.

It is different to LDAP in that:

- - Protocol elements are carried directly over UDP or other

connection-less transport, bypassing much of the

session/presentation overhead and that of connections (LDAP uses

a connection-mode transport service).

- - A restricted set of operations is available.

The definitions of most protocol elements are inherited from LDAP.

The general model adopted by this protocol is one of clients

performing protocol operations against servers. In this model, this

is accomplished by a client transmitting a protocol request

describing the operation to be performed to a server, which is then

responsible for performing the necessary operations on the Directory.

Upon completion of the necessary operations, the server returns a

response containing any results or errors to the requesting client.

Note that, although servers are required to return responses whenever

such responses are defined in the protocol, there is no requirement

for synchronous behaviour on the part of either client or server

implementations: requests and responses for multiple operations may

be exchanged by client and servers in any order, as long as servers

eventually send a response for every request that requires one.

Also, because the protocol is implemented over a connection-less

transport service clients must be prepared for either requests or

responses to be lost. Clients should use a retry mechanism with

timeouts in order to achieve the desired level of reliability. For

example, a client might send off a request and wait for two seconds.

If no reply is forthcoming, the request is sent again and the client

waits four seconds. If there is still no reply, the client sends it

again and waits eight seconds, and so on, until some maximun time.

Such algorithms are widely used in other datagram-based protocol

implementations, such as the DNS. It is not appropriate to mandate a

specific algorithm as this will depend upon the requirments and

operational environment of individual CLDAP client implementations.

It is not required that a client abandon any requests to which no

response has been received and for which a reply is no longer

required (because the request has been timed out), but they may do

so.

Consistent with the model of servers performing protocol operations

on behalf of clients, it is also to be noted that protocol servers

are eXPected to handle referrals without resorting to the return of

such referrals to the client. This protocol makes no provisions for

the return of referrals to clients, as the model is one of servers

ensuring the performance of all necessary operations in the

Directory, with only final results or errors being returned by

servers to clients.

Note that this protocol can be mapped to a strict subset of the

Directory abstract service, so it can be cleanly provided by the DAP.

3. Mapping Onto Transport Services

This protocol is designed to run over connection-less transports,

with all 8 bits in an octet being significant in the data stream.

Specifications for two underlying services are defined here, though

others are also possible.

3.1. User Datagram Protocol (UDP)

The CLDAPMessage PDUs are mapped directly onto UDP datagrams. Only

one request may be sent in a single datagram. Only one response may

be sent in a single datagram. Server implementations running over

the UDP should provide a protocol listener on port 389.

3.2. Connection-less Transport Service (CLTS)

Each LDAPMessage PDU is mapped directly onto T-Unit-Data.

4. Elements of Protocol

CLDAP messages are defined by the following ASN.1:

CLDAPMessage ::= SEQUENCE {

messageID MessageID,

user LDAPDN, -- on request only --

protocolOp CHOICE {

searchRequest SearchRequest,

searchResponse SEQUENCE OF

SearchResponse,

abandonRequest AbandonRequest

}

}

where MessageID, LDAPDN, SearchRequest, SearchResponse and

AbandonRequest are defined in the LDAP protocol.

The 'user' element is supplied only on requests (it should be zero

length and is ignored in responses). It may be used for logging

purposes but it is not required that a CLDAP server implementation

apply any particular semantics to this field.

Editorial note:

There has been some discussion about the desirability of

authentication with CLDAP requests and the addition of the fields

necessary to support this. This might take the form of a clear

text passWord (which would go against the current IAB drive to

remove such things from protocols) or some arbitrary credentials.

Such a field is not included. It is felt that, in general,

authentication would incur sufficient overhead to negate the

advantages of the connectionless basis of CLDAP. If an

application requires authenticated access to the Directory then

CLDAP is not an appropriate protocol.

Within a searchResponse all but the last SearchResponse has choice

'entry' and the last SearchResponse has choice 'resultCode'. Within

a searchResponse, as an encoding optimisation, the value of the

objectName LDAP DN may use a trailing '*' character to refer to the

baseObject of the corresponding searchRequest. For example, if the

baseObject is specified as "o=UofM, c=US", then the following

objectName LDAPDNs in a response would have the indicated meanings

objectName returned actual LDAPDN denoted

____________________________________________________

"*" "o=UofM, c=US"

"cn=Babs Jensen, *" "cn=Babs Jensen, o=UofM, c=US"

4.1. Errors

The following error code is added to the LDAPResult.resultCode

enumeration of [4]:

resultsTooLarge (70),

This error is returned when the LDAPMessage PDU containing the

results of an operation are too large to be sent in a single

datagram.

4.2. Example

A simple lookup can be performed in 4 packets. This is reduced to 2

if either the DSA implements the CLDAP protocol, the CLDAP server has

a cache of the desired results, or the CLDAP server and DSA are co-

located such that there is insignificant delay between them.

_______________________________________________________________

_#___Client_____CLDAP____CLDAP_server____DAP________DSA______

1 SearchReq ->

2 DAP-Search.req ->

3 <- DAP-Search.res

4 <- SearchRes

_____________________________________________________________

5. Implementation Considerations

The following subsections provide guidance on the implementation of

clients and servers using the CLDAP protocol.

5.1. Server Implementations

Given that the goal of this protocol is to minimise the elapsed time

between making a Directory request and receiving the response, a

server which uses DAP to access the directory should use techniques

that assist in this.

- - A server should remain bound to the Directory during reasonably

long idle periods or should remain bound permanently.

- - Cacheing of results is highly desirable but this must be

tempered by the need to provide up-to-date results given the

lack of a cache invalidation protocol in DAP (either implicit

via timers or explicit) and the lack of a dontUseCopy service

control in the protocol.

Of course these issues are irrelevant if the CLDAP protocol is

directly supported by a DSA.

5.2. Client Implementations

For simple lookup applications, use of a retry algorithm with

multiple servers similar to that commonly used in DNS stub resolver

implementations is recommended. The location of a CLDAP server or

servers may be better specified using IP addresses (simple or

broadcast) rather than names that must first be looked up in another

directory such as DNS.

6. Security Considerations

This protocol provides no facilities for authentication. It is

expected that servers will bind to the Directory either anonymously

or using simple authentication without a password.

7. Bibliography

[1] The Directory: Overview of Concepts, Models and Service. CCITT

Recommendation X.500, 1988.

[2] The Directory: Models. CCITT Recommendation X.501 ISO/IEC JTC

1/SC21; International Standard 9594-2, 1988.

[3] The Directory: Abstract Service Definition. CCITT Recommendation

X.511, ISO/IEC JTC 1/SC21; International Standard 9594-3, 1988.

[4] Yeong, W., Howes, T., and S. Kille, "X.500 Lightweight Directory

Access Protocol", RFC1487, Performance Systems International,

University of Michigan, ISODE Consortium, July 1993.

[5] Mockapetris, P., "Domain Names - Implementation and

Specification", STD 13, RFC1035, USC/Information Sciences

Institute, November 1987.

[6] Mockapetris, P., "Domain Names - Concepts and Facilities", STD

13, RFC1034, USC/Information Sciences Institute, November 1987.

8. Acknowledgements

Many thanks to Tim Howes and Steve Kille for their detailed comments

and to other members of the working group.

This work was initiated by the Union Bank of Switzerland.

9. Author's Address

Alan Young

ISODE Consortium

The Dome, The Square

RICHMOND

GB - TW9 1DT

Phone: +44 81 332 9091

EMail: A.Young@isode.com

X.400: i=A; s=Young; o=ISODE Consortium; p=ISODE; a=MAILNET; c=FI

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有