Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

List of DNS record types

From Wikipedia, the free encyclopedia
(Redirected fromAAAA record)
Overview of resource records permissible in zone files of the Domain Name System
A graphical overview of all active DNS record types

Thislist of DNS record types is an overview ofresource records (RRs) permissible inzone files of theDomain Name System (DNS). It also contains pseudo-RRs.

Resource records

[edit]
TypeType id (decimal)Defining RFCDescriptionFunction
A
1RFC 1035[1]Address recordReturns a 32-bitIPv4 address, most commonly used to maphostnames to an IP address of the host, but it is also used forDNSBLs,[2] storingsubnet masks,[3] etc.
AAAA
28RFC 3596[4]IPv6 address recordReturns a 128-bitIPv6 address, most commonly used to maphostnames to an IP address of the host.
AFSDB
18RFC 1183[5]AFS database recordLocation of database servers of anAFS cell. This record is commonly used by AFS clients to contact AFS cells outside their local domain. A subtype of this record is used by the obsoleteDCE/DFS file system.
APL
42RFC 3123[6]Address Prefix ListSpecify lists of address ranges, e.g. inCIDR format, for various address families. Experimental.
CAA
257RFC 8659[7]Certification Authority AuthorizationDNS Certification Authority Authorization, constraining acceptable CAs for a host/domain
CDNSKEY
60RFC 7344[8]Child copy of DNSKEY record, for transfer to parent
CDS
59RFC 7344[8]Child DSChild copy of DS record, for transfer to parent
CERT
37RFC 4398[9]Certificate recordStoresdigital certificates in various forms (PKIX,SPKI,PGP, etc).
CNAME
5RFC 1035[1]Canonical name recordAlias of one name to another: the DNS lookup will continue by retrying the lookup with the new name.
CSYNC
62RFC 7477Child-to-Parent SynchronizationSpecify a synchronization mechanism between a child and a parent DNS zone. Typical example is declaring the same NS records in the parent and the child zone
DHCID
49RFC 4701DHCP identifierUsed in conjunction with the FQDN option toDHCP
DLV
32769RFC 4431DNSSEC Lookaside Validation recordFor publishingDNSSEC trust anchors outside of the DNS delegation chain. Uses the same format as the DS record. RFC 5074 describes a way of using these records.
DNAME
39RFC 6672Delegation name recordAlias for a name and all its subnames, unlike CNAME, which is an alias for only the exact name. Like a CNAME record, the DNS lookup will continue by retrying the lookup with the new name.
DNSKEY
48RFC 4034[10]DNS Key recordThe key record used inDNSSEC. Uses the same format as the KEY record.
DS
43RFC 4034[10]Delegation signerThe record used to identify the DNSSEC signing key of a delegated zone
EUI48108RFC 7043MAC address (EUI-48)A 48-bit IEEE Extended Unique Identifier.
EUI64109RFC 7043MAC address (EUI-64)A 64-bit IEEE Extended Unique Identifier.
HINFO
13RFC 8482[11]RFC 1035[1]Placeholder record, or host informationRepurposed to be used while responding to ANY queries. Originally defined as "Host information", intended to inform about host's operating system and hardware. RFC 8482 did not obsolete this conventional meaning for explicit HINFO queries, but rather considers it rarely used.
HIP
55RFC 8005Host Identity ProtocolMethod of separating the end-point identifier and locator roles of IP addresses.
HTTPS
65RFC 9460[12]HTTPS BindingA specialised type of SVCB record. Provides connection information required to establish a secure connection via HTTPS, which would ordinarily be obtained and negotiated during connection to the host. Obtaining the information from the DNS server instead of negotiating it with the host allows for more secure connections (e.g. by usingEncrypted Client Hello) and lower latency when the connection to the host is first established.
IPSECKEY
45RFC 4025IPsec KeyKey record that can be used withIPsec
KEY
25RFC 2535[13] RFC 2930[14]Key recordUsed only for SIG(0) (RFC 2931) and TKEY (RFC 2930).[15] RFC 3445 eliminated their use for application keys and limited their use to DNSSEC.[16] RFC 3755 designates DNSKEY as the replacement within DNSSEC.[17] RFC 4025 designates IPSECKEY as the replacement for use with IPsec.[18]
KX
36RFC 2230Key Exchanger recordUsed with some cryptographic systems (not including DNSSEC) to identify a key management agent for the associated domain-name. Note that this has nothing to do with DNS Security. It is Informational status, rather than being on the IETF standards-track. It has always had limited deployment, but is still in use.
LOC29RFC 1876Location recordSpecifies a geographical location associated with a domain name
MX15RFC 1035[1] RFC 7505Mail exchange recordList of mail exchange servers that accept email for a domain
NAPTR35RFC 3403Naming Authority PointerAllows regular-expression-based rewriting of domain names which can then be used asURIs, further domain names to lookups, etc.
NS
2RFC 1035[1]Name server recordDelegates aDNS zone to use the givenauthoritative name servers
NSEC
47RFC 4034[10]Next Secure recordPart of DNSSEC—used to prove a name does not exist. Uses the same format as the (obsolete) NXT record.
NSEC3
50RFC 5155Next Secure record version 3An extension to DNSSEC that allows proof of nonexistence for a name without permitting zonewalking
NSEC3PARAM
51RFC 5155NSEC3 parametersParameter record for use with NSEC3
OPENPGPKEY61RFC 7929OpenPGP public key recordADNS-based Authentication of Named Entities (DANE) method for publishing and locating OpenPGP public keys in DNS for a specific email address using an OPENPGPKEY DNS resource record.
PTR
12RFC 1035[1]PTR Resource Record [de]Pointer to acanonical name. Unlike a CNAME, DNS processing stops and just the name is returned. The most common use is for implementingreverse DNS lookups, but other uses include such things asDNS-SD.
RP
17RFC 1183[5]Responsible PersonInformation about the responsible person(s) for the domain. Usually an email address with the @ replaced by a .
RRSIG
46RFC 4034[10]DNSSEC signatureSignature for a DNSSEC-secured record set. Uses the same format as the SIG record.
SIG
24RFC 2535SignatureSignature record used in SIG(0) (RFC 2931) and TKEY (RFC 2930).[17] RFC 3755 designated RRSIG as the replacement for SIG for use within DNSSEC.[17]
SMIMEA53RFC 8162[19]S/MIME cert association[20]Associates an S/MIME certificate with a domain name for sender authentication.
SOA6RFC 1035[1] RFC 2308[21]Start of [a zone of] authority recordSpecifiesauthoritative information about aDNS zone, including the primary name server, the email of the domain administrator, the domain serial number, and several timers relating to refreshing the zone.
SRV33RFC 2782Service locatorGeneralized service location record, used for newer protocols instead of creating protocol-specific records such as MX.
SSHFP
44RFC 4255SSH Public Key FingerprintResource record for publishingSSH public host key fingerprints in the DNS, in order to aid in verifying the authenticity of the host. RFC 6594 definesECC SSH keys and SHA-256 hashes. See theIANA SSHFP RR parameters registry for details.
SVCB
64RFC 9460[12]Service BindingThis resource record provides metadata and other information that can help clients connect to the host. The HTTPS record is a specialised SVCB record to help when establishing HTTPS connections. The more general SVCB record can provide other information such as supported protocols, alternative endpoints, and some types of aliasing not supported by CNAME records.
TA
32768N/aDNSSEC Trust AuthoritiesPart of a deployment proposal for DNSSEC without a signed DNS root. See theIANA database andWeiler Spec for details. Uses the same format as the DS record.
TKEY
249RFC 2930Transaction Key recordA method of providing keying material to be used withTSIG that is encrypted under the public key in an accompanying KEY RR.[22]
TLSA
52RFC 6698TLSA certificate associationA record forDANE. RFC 6698 defines "The TLSA DNS resource record is used to associate a TLS server certificate or public key with the domain name where the record is found, thus forming a 'TLSA certificate association'".
TSIG
250RFC 2845Transaction SignatureCan be used to authenticatedynamic updates as coming from an approved client, or to authenticate responses as coming from an approved recursive name server[23] similar to DNSSEC.
TXT
16RFC 1035[1]Text recordOriginally for arbitrary human-readabletext in a DNS record. Since the early 1990s, however, this record more often carriesmachine-readable data, such as specified by RFC 1464,opportunistic encryption,Sender Policy Framework,DKIM,DMARC,DNS-SD, etc.
URI
256RFC 7553Uniform Resource IdentifierCan be used for publishing mappings from hostnames to URIs.
ZONEMD
63RFC 8976Message Digests for DNS ZonesProvides acryptographic message digest over DNS zone data at rest.

Other types and pseudo-RRs

[edit]

Other types of records simply provide some types of information (for example, an HINFO record gives a description of the type of computer/OS a host uses), or others return data used in experimental features. The "type" field is also used in the protocol for various operations.

TypeType id.Defining RFCDescriptionFunction
*255RFC 1035[1]All cached recordsReturns all records of all types known to the name server. If the name server does not have any information on the name, the request will be forwarded on. The records returned may not be complete. For example, if there is both an A and an MX for a name, but the name server has only the A record cached, only the A record will be returned. Usually referred to asANY (e.g., indig, Windowsnslookup, andWireshark). In 2019,RFC 8482[11] standards-track publication led many DNS providers, includingCloudflare,[24] to provide only minimal responses to "ANY" queries, instead of enumerating records.
AXFR252RFC 1035[1]Authoritative Zone TransferTransfer entire zone file from the primary name server to secondary name servers.
IXFR
251RFC 1996Incremental Zone TransferRequests a zone transfer of the given zone but only differences from a previous serial number. This request may be ignored and a full (AXFR) sent in response if the authoritative server is unable to fulfill the request due to configuration or lack of required deltas.
OPT
41RFC 6891OptionThis is apseudo-record type needed to supportEDNS.
ALIAS /

ANAME /apex CNAME /CNAME flattening /top-level redirection

-draft-ietf-dnsop-aname-04Alias similar to DNAMEAn ANAME, ALIAS. apex CNAME, CNAME flattening, or sometimes also top-level redirection record is a pseudo record type is a commonly used but not RFC-standardized record type. Its implementation varies. It serves as an alternative to CNAMEs especially for the bare domain name and where such records should co-exist with others. It causes the DNS software vendor to synthetically generate A and AAAA records similar to the ones of the ANAME-records destination. If the destination changes these synthetic A and AAAA records change automatically as well. The actual mechanisms used are often considered proprietary.

Obsolete record types

[edit]

Progress has rendered some of the originally defined record-types obsolete.Of the records listed at IANA, some have limited use, for various reasons. Some are marked obsolete in the list, some are for very obscure services, some are for older versions of services, and some have special notes saying they are "not right".

TypeType id.
(decimal)
Defining RFCObsoleted byDescription
MD3RFC 883[25]RFC 973[26]Mail destination (MD) and mail forwarder (MF) records; MAILA is not an actual record type, but a query type which returns MF and/or MD records. RFC 973 replaced these records with the MX record.
MF4
MAILA254
MB7RFC 883[25]Not formally obsoleted. Unlikely to be ever adopted (RFC 2505).MB, MG, MR, and MINFO are records to publish subscriber mailing lists. MAILB is a query code which returns one of those records. The intent was for MB and MG to replace theSMTP VRFY and EXPN commands. MR was to replace the "551 User Not Local" SMTP error. Later, RFC 2505 recommended that both VRFY and EXPN be disabled, making MB and MG unnecessary. They were classified as experimental by RFC 1035.
MG8
MR9
MINFO14
MAILB253
WKS11RFC 883[25]RFC 1035[1]Declared as "not to be relied upon" byRFC 1123[27] (more inRFC 1127[28]).Record to describe well-known services supported by a host. Not used in practice. The current recommendation and practice is to determine whether a service is supported on an IP address by trying to connect to it. SMTP is even prohibited from using WKS records in MX processing.[27]: §2.2, 5.2.12, 6.1.3.6 
NB32RFC 1002[29]Mistakes (from RFC 1002); the numbers are now assigned to NIMLOC and SRV.
NBSTAT33
NULL10RFC 883[25]RFC 1035[1]Obsoleted by RFC 1035. RFC 883 defined "completion queries" (opcode 2 and maybe 3) which used this record. RFC 1035 later reassigned opcode 2 to be "status" and reserved opcode 3.
A638RFC 2874[30]RFC 6563[31]Defined as part of early IPv6 but downgraded to experimental by RFC 3363; later downgraded to historic by RFC 6563.
NXT30RFC 2065RFC 3755Part of the first version of DNSSEC (RFC 2065). NXT was obsoleted by DNSSEC updates (RFC 3755). At the same time, the domain of applicability for KEY and SIG was also limited to not include DNSSEC use.
KEY25
SIG24
HINFO13RFC 883[25]Unobsoleted byRFC 8482[11]. Currently used byCloudflare in response to queries of the type ANY.[32]Record intended to provide information about host CPU type and operating system. It was intended to allow protocols to optimize processing when communicating with similar peers.
RP17RFC 1183[5]RP may be used for certain human-readable information regarding a different contact point for a specific host, subnet, or other domain level label separate than that used in the SOA record.
X2519Not in current use by any notable application
ISDN20Not in current use by any notable application
RT21Not in current use by any notable application
NSAP22RFC 1706Not in current use by any notable application
NSAP-PTR23Not in current use by any notable application
PX26RFC 2163Not in current use by any notable application
EID31N/aDefined by theNimrod DNSInternet Draft, but never made it to RFC status. Not in current use by any notable application
NIMLOC32N/a
ATMA34N/aDefined by The ATM Forum Committee.[33]
APL42RFC 3123Specify lists of address ranges, e.g. inCIDR format, for various address families. Experimental.
SINK40N/aDefined by theKitchen SinkInternet Draft, but never made it to RFC status
GPOS27RFC 1712A more limited early version of the LOC record
UINFO100N/aIANA reserved, no RFC documented them[1] and support was removed fromBIND in the early 90s.
UID101N/a
GID102N/a
UNSPEC103N/a
SPF99RFC 4408RFC 7208Specified as part of theSender Policy Framework protocol as an alternative to storing SPF data in TXT records, using the same format. It was discontinued in RFC 7208 due to widespread lack of support.[34][35]
NINFO56N/aUsed to provide status information about a zone. Requested for the IETF draft "The Zone Status (ZS) DNS Resource Record" in 2008. Expired without adoption.[36]
RKEY57N/aUsed for encryption of NAPTR records. Requested for the IETF draft "The RKEY DNS Resource Record" in 2008. Expired without adoption.[37]
TALINK58N/aDefined by theDNSSEC Trust Anchor History ServiceInternet Draft, but never made it to RFC status
NID104RFC 6742Not in use by any notable application and marked as "experimental"
L32105
L64106
LP107
DOA259N/aDefined by theDOA over DNSInternet Draft, but never made it to RFC status

References

[edit]
  1. ^abcdefghijklP. Mockapetris (November 1987).DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION. Network Working Group.doi:10.17487/RFC1035. STD 13. RFC1035.Internet Standard 13. ObsoletesRFC 882,883 and973. Updated byRFC 1101,1183,1348,1876,1982,1995,1996,2065,2136,2137,2181,2308,2535,2673,2845,3425,3658,4033,4034,4035,4343,5936,5966,6604,7766,8482,8490 and8767.
  2. ^C. Lewis; M. Sergeant (January 2012).Overview of Best Email DNS-Based List (DNSBL) Operational Practices.Internet Research Task Force (IRTF).doi:10.17487/RFC6471.ISSN 2070-1721.RFC6471.Informational.
  3. ^P. Mockapetris (April 1989).DNS Encoding of Network Names and Other Types. Network Working Group.doi:10.17487/RFC1101.RFC1101.Status Unknown. UpdatesRFC 1034 and1035.
  4. ^S. Thomson;C. Huitema; V. Ksinant; M. Souissi (October 2003).DNS Extensions to Support IP Version 6. Network Working Group.doi:10.17487/RFC3596. STD 88. RFC3596.Internet Standard 88. ObsoletesRFC 3152 and1886.
  5. ^abcC. Everhart; L. Mamakos; R. Ullmann (October 1990).P. Mockapetris (ed.).New DNS RR Definitions. Network Working Group.doi:10.17487/RFC1183.RFC1183.Experimental. Updated byRFC 5395,5864,6195 and6895.UpdatesRFC 1034 and1035.
  6. ^P. Koch (June 2001).A DNS RR Type for Lists of Address Prefixes (APL RR). Network Working Group.doi:10.17487/RFC3123.RFC3123.Experimental.
  7. ^P. Hallam-Baker; R. Stradlin; J. Hoffman-Andrews (November 2019).DNS Certification Authority Authorization (CAA) Resource Record.Internet Engineering Task Force.doi:10.17487/RFC8659.ISSN 2070-1721. BCP 223. RFC8659.Proposed Standard. ObsoletesRFC 6844.
  8. ^abW. Kumari; Ó. Guðmundsson; G. Barwood (September 2014).Automating DNSSEC Delegation Trust Maintenance.Internet Engineering Task Force.doi:10.17487/RFC7344.ISSN 2070-1721.RFC7344.Proposed Standard. Updated byRFC 8078 and9615.
  9. ^S. Josefsson (March 2006).Storing Certificates in the Domain Name System (DNS). Network Working Group.doi:10.17487/RFC4398.RFC4398.Proposed Standard. ObsoletesRFC 2538. Updated byRFC 6944.
  10. ^abcdR. Arends; R. Austein; M. Larson; D. Massey; S. Rose (March 2005).Resource Records for the DNS Security Extensions. Network Working Group.doi:10.17487/RFC4034.RFC4034.Proposed Standard. Updated byRFC 6014 and6840. ObsoletesRFC 3755,3008,3445,3090,2535,3757,3845,3655 and3658. UpdatesRFC 3597,2181,2136,3225,3007,1035,3226,2308 and1034.
  11. ^abcJ. Abley; Ó. Guðmundsson; M. Majkowski; E. Hunt (January 2019).Providing Minimal-Sized Responses to DNS Queries That Have QTYPE=ANY.Internet Engineering Task Force TLS workgroup.doi:10.17487/RFC8482.RFC8482.Proposed Standard. UpdatesRFC 1034 and1035.
  12. ^abBenjamin M. Schwartz; Mike Bishop; Erik Nygren (November 2023).Service Binding and Parameter Specification via the DNS (SVCB and HTTPS Resource Records).Internet Engineering Task Force.doi:10.17487/RFC9460.ISSN 2070-1721.RFC9460.Proposed Standard.
  13. ^RFC 2535, §3
  14. ^RFC 3445, §1. "The KEY RR was defined in RFC 2930..."
  15. ^RFC 2931, §2.4. "SIG(0) on the other hand, uses public key authentication, where the public keys are stored in DNS as KEY RRs and a private key is stored at the signer."
  16. ^RFC 3445, §1. "DNSSEC will be the only allowable sub-type for the KEY RR..."
  17. ^abcRFC 3755, §3. "DNSKEY will be the replacement for KEY, with the mnemonic indicating that these keys are not for application use, per RFC3445. RRSIG (Resource Record SIGnature) will replace SIG, and NSEC (Next SECure) will replace NXT. These new types completely replace the old types, except that SIG(0) RFC2931 and TKEY RFC2930 will continue to use SIG and KEY."
  18. ^RFC 4025, Abstract. "This record replaces the functionality of the sub-type #4 of the KEY Resource Record, which has been obsoleted by RFC 3445."
  19. ^Hoffman, P.; Schlyter, J. (May 2017)."RFC 8162 – Using Secure DNS to Associate Certificates with Domain Names for S/MIME".Internet Engineering Task Force.doi:10.17487/RFC8162. Retrieved17 October 2018.
  20. ^"Domain Name System (DNS) Parameters".Internet Assigned Numbers Authority. September 2018. Retrieved17 October 2018.
  21. ^The minimum field of SOA record is redefined to be the TTL of NXDOMAIN reply in RFC 2308.
  22. ^RFC 2930, §6. "... the keying material is sent within the key data field of a TKEY RR encrypted under the public key in an accompanying KEY RR RFC 2535."
  23. ^RFC 2845, abstract
  24. ^"What happened next: the deprecation of ANY".Cloudflare. 16 March 2019. Retrieved19 September 2021.
  25. ^abcdeP. Mockapetris (November 1983).Domain Names - Implementation and Specification. Network Working Group.doi:10.17487/RFC0883.RFC883.Obsolete. Obsoleted byRFC 1034 and1035. Updated byRFC 973.
  26. ^P. Mockapetris (February 1986).Domain System Changes and Observations. Network Working Group.doi:10.17487/RFC0973.RFC973.Obsolete. Obsoleted byRFC 1034 and1035. UpdatesRFC 882 and883.
  27. ^abR. Braden, ed. (October 1989).Requirements for Internet Hosts -- Application and Support. Network Working Group.doi:10.17487/RFC1123. STD 3. RFC1123.Internet Standard 3. Updated byRFC 1349,2181,5321,5966 and7766.
  28. ^R. Braden (October 1989).A Perspective on the Host Requirements RFCs. Network Working Group.doi:10.17487/RFC1127.RFC1127.Informational.
  29. ^PROTOCOL STANDARD FOR A NetBIOS SERVICE ON A TCP/UDP TRANSPORT: DETAILED SPECIFICATIONS. Network Working Group. March 1987.doi:10.17487/RFC1002. STD 19. RFC1002.Internet Standard 19.
  30. ^M. Crawford;C. Huitema (July 2000).DNS Extensions to Support IPv6 Address Aggregation and Renumbering. Network Working Group.doi:10.17487/RFC2874.RFC2874.Historic. Updated byRFC 3152,3226,3363 and3364. UpdatesRFC 1886.
  31. ^S. Jiang; D. Conrad;B. Carpenter (March 2012).Moving A6 to Historic Status.Internet Engineering Task Force.doi:10.17487/RFC6563.ISSN 2070-1721.RFC6563.Informational.
  32. ^"What happened next: the deprecation of ANY".Cloudflare. 13 April 2016. Retrieved9 March 2019.
  33. ^"ATM Name System, V2.0"(PDF). ATM Forum Technical Committee. July 2000. Archived fromthe original(PDF) on 2019-03-14. Retrieved14 March 2019.
  34. ^Kucherawy, M. (July 2012)."Background on the RRTYPE Issue".Resolution of the Sender Policy Framework (SPF) and Sender ID Experiments.IETF. sec. A.doi:10.17487/RFC6686.RFC6686. RetrievedAugust 31, 2013.
  35. ^Kitterman, S. (April 2014)."The SPF DNS Record Type".Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1.IETF. sec. 3.1.doi:10.17487/RFC7208.RFC7208. Retrieved26 April 2014.
  36. ^Reid, Jim (4 July 2008)."draft-reid-dnsext-zs-01 – The Zone Status (ZS) DNS Resource Record".Ietf Datatracker.IETF. Retrieved9 March 2019.
  37. ^Reid, Jim; Schlyter, Jakob; Timms, Ben (4 July 2008)."draft-reid-dnsext-rkey-00 – The RKEY DNS Resource Record".Ietf Datatracker.IETF. Retrieved9 March 2019.

Further reading

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=List_of_DNS_record_types&oldid=1332523867#AAAA"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp