RFC 1738 - Uniform Resource Locators (URL) (RFC1738)
RFC 1738 - Uniform Resource Locators (URL)
faqs.org
RFC 1738 - Uniform Resource Locators (URL)
Internet RFC Index
Usenet FAQ Index
Other FAQs
Documents
Tools
Search FAQs
Search RFCs
IFC Home
Cities
Countries
Hospitals
Web Hosting Ratings
RFC Index
Usenet FAQs
Web FAQs
Documents
Cities
Abstracts
Copyrights
Patents
Counties
Network Working Group T. Berners-Lee
Request for Comments: 1738 CERN
Category: Standards Track L. Masinter
Xerox Corporation
M. McCahill
University of Minnesota
Editors
December 1994
Uniform Resource Locators (URL)
Status of this Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Abstract
This document specifies a Uniform Resource Locator (URL), the syntax
and semantics of formalized information for location and access of
resources via the Internet.
1. Introduction
This document describes the syntax and semantics for a compact string
representation for a resource available via the Internet. These
strings are called "Uniform Resource Locators" (URLs).
The specification is derived from concepts introduced by the World-
Wide Web global information initiative, whose use of such objects
dates from 1990 and is described in "Universal Resource Identifiers
in WWW",
RFC 1630
. The specification of URLs is designed to meet the
requirements laid out in "Functional Requirements for Internet
Resource Locators" [12].
This document was written by the URI working group of the Internet 2. General URL Syntax Just as there are many different methods of access to resources, The generic syntax for URLs provides a framework for new schemes to URLs are used to `locate' resources, by providing an abstract 2.1. The main parts of URLs A full BNF description of the URL syntax is given in Section 5. In general, URLs are written as follows: A URL contains the name of the scheme being used ( Scheme names consist of a sequence of characters. The lower case 2.2. URL Character Encoding Issues URLs are sequences of characters, i.e., letters, digits, and special In most URL schemes, the sequences of characters in different parts the chararacter which has that octet as its code within the US-ASCII In addition, octets may be encoded by a character triplet consisting Octets must be encoded if they have no corresponding graphic No corresponding graphic US-ASCII: URLs are written only with the graphic printable characters of the Unsafe: Characters can be unsafe for a number of reasons. The space All unsafe characters must always be encoded within a URL. For Reserved: Many URL schemes reserve certain characters for a special meaning: Usually a URL has the same interpretation when an octet is Thus, only alphanumerics, the special characters "$-_.+!*'(),", and On the other hand, characters that are not required to be encoded 2.3 Hierarchical schemes and relative links In some cases, URLs are used to locate resources that contain Some URL schemes (such as the ftp, http, and file schemes) contain 3. Specific Schemes The mapping for some existing standard and experimental protocols is ftp File Transfer protocol Other schemes may be specified by future specifications. Section 4 of 3.1. Common Internet Scheme Syntax While the syntax for the rest of the URL may vary depending on the // Some or all of the parts " user password The user name (and password), if present, are followed by a Note that an empty user name or password is different than no user host port url-path The url-path syntax depends on the scheme being used, as does the 3.2. FTP The FTP URL scheme is used to designate files and directories on A FTP URL follow the syntax described in Section 3.1. If : 3.2.1. FTP Name and Password A user name and password may be supplied; they are used in the ftp The user name "anonymous" is supplied. The password is supplied as the Internet e-mail address If the URL supplies a user name but no password, and the remote 3.2.2. FTP url-path The url-path of a FTP URL has the following syntax: Where The url-path is interpreted as a series of FTP commands as follows: Each of the If the typecode is "d", perform a NLST (name list) command with Otherwise, perform a TYPE command with Within a name or CWD component, the characters "/" and ";" are necessary to encode each "/". For example, the URL FTP URLs may also be used for other operations; for example, it is 3.2.3. FTP Typecode is Optional The entire ;type= 3.2.4 Hierarchy For some file systems, the "/" used to denote the hierarchical 3.2.5. Optimization Clients accessing resources via FTP may employ additional heuristics 3.3. HTTP The HTTP URL scheme is used to designate Internet resources The HTTP protocol is specified elsewhere. This specification only An HTTP URL takes the form: where Within the 3.4. GOPHER The Gopher URL scheme is used to designate Internet resources The base Gopher protocol is described in 3.4.1. Gopher URL syntax A Gopher URL takes the form: gopher:// where If : Gopher clients specify which item to retrieve by sending the Gopher Within the Note that some Gopher 3.4.2 Specifying URLs for Gopher Search Engines If the URL refers to a search to be submitted to a Gopher search 3.4.3 URL syntax for Gopher+ items URLs for Gopher+ items have a second encoded tab (%09) and a Gopher+ The To retrieve the data associated with a Gopher+ URL, a client will 3.4.4 Default Gopher+ data representation When a Gopher server returns a directory listing to a client, the 3.4.5 Gopher+ items with electronic forms Gopher+ items which have a +ASK associated with them (i.e. Gopher+ 3.4.6 Gopher+ item attribute collections To refer to the Gopher+ attributes of an item, the Gopher URL's 3.4.7 Referring to specific Gopher+ attributes To refer to specific attributes, the URL's gopher+_string is To refer to several attributes, the gopher+_string consists of the 3.4.8 URL syntax for Gopher+ alternate views Gopher+ allows for optional alternate data representations (alternate + For example, a Gopher+ string of "+application/postscript%20Es_ES" 3.4.9 URL syntax for Gopher+ electronic forms The gopher+_string for a URL that refers to an item referenced by a +%091%0D%0A+-1%0D%0A To retrieve this item, the Gopher client sends: to the Gopher server. 3.5. MAILTO The mailto URL scheme is used to designate the Internet mailing A mailto URL takes the form: mailto:< where < Note that the percent sign ("%") is commonly used within Unlike many URLs, the mailto scheme does not represent a data object 3.6. NEWS The news URL scheme is used to refer to either news groups or A news URL takes one of two forms: news: A If The news URLs are unusual in that by themselves, they do not contain 3.7. NNTP The nntp URL scheme is an alternative method of referencing news A nntp URL take the form: nntp:// where The Note that while nntp: URLs specify a unique location for the article 3.8. TELNET The Telnet URL scheme is used to designate interactive services that A telnet URL takes the form: telnet:// as specified in Section 3.1. The final "/" character may be omitted. This URL does not designate a data object, but rather an interactive 3.9. WAIS The WAIS URL scheme is used to designate WAIS databases, searches, or A WAIS URL takes one of the following forms: wais:// where The third form designates a particular document within a WAIS The 3.10 FILES The file URL scheme is used to designate files accessible on a A file URL takes the form: file:// where For example, a VMS file DISK$USER:[MY.NOTES]NOTE123456.TXT might become As a special case, The file URL scheme is unusual in that it does not specify an 3.11 PROSPERO The Prospero URL scheme is used to designate resources that are A prospero URLs takes the form: prospero:// where allowed. The Prospero URLs are interpreted by contacting a Prospero directory Note that a slash "/" may appear in the In addition, after the 4. REGISTRATION OF NEW SCHEMES A new scheme may be introduced by defining a mapping onto a The Internet Assigned Numbers Authority (IANA) will maintain a URL schemes must have demonstrable utility and operability. One way the new scheme does not locate resources that are data objects, the New schemes should try to follow the same syntactic conventions of The following scheme have been proposed at various times, but this afs Andrew File System global file names. 5. BNF for specific URL schemes This is a BNF-like description of the Uniform Resource Locator ; The generic form of a URL is: genericurl = scheme ":" schemepart ; Specific predefined schemes are defined here; new schemes url = httpurl | ftpurl | newsurl | ; new schemes follow the general syntax ; the scheme is in lower case; interpreters should use case-ignore schemepart = *xchar | ip-schemepart ; URL schemeparts for ip based protocols: ip-schemepart = "//" login [ "/" urlpath ] login = [ user [ ":" password ] "@" ] hostport ; The predefined schemes: ; FTP (see also ftpurl = "ftp://" login [ "/" fpath [ ";type=" ftptype ]] ; FILE fileurl = "file://" [ host | "localhost" ] "/" fpath ; HTTP httpurl = "http://" hostport [ "/" hpath [ "?" search ]] ; GOPHER (see also gopherurl = "gopher://" hostport [ / [ gtype [ selector ; MAILTO (see also mailtourl = "mailto:" encoded822addr newsurl = "news:" grouppart ; NNTP (see also nntpurl = "nntp://" hostport "/" group [ "/" digits ] ; TELNET telneturl = "telnet://" login [ "/" ] ; WAIS (see also waisurl = waisdatabase | waisindex | waisdoc ; PROSPERO prosperourl = "prospero://" hostport "/" ppath *[ fieldspec ] ; Miscellaneous definitions lowalpha = "a" | "b" | "c" | "d" | "e" | "f" | "g" | "h" | alpha = lowalpha | hialpha reserved = ";" | "/" | "?" | ":" | "@" | "&" | "=" unreserved = alpha | digit | safe | extra 6. Security Considerations The URL scheme does not in itself pose a security threat. Users A URL-related security threat is that it is sometimes possible to Care should be taken when URLs contain embedded encoded delimiters The use of URLs containing passwords that should be secret is clearly 7. Acknowledgements This paper builds on the basic WWW design ( Most recently, careful readings and comments by Dan Connolly, Ned APPENDIX: Recommendations for URLs in Context URIs, including URLs, are intended to be transmitted through In some cases, it will be necessary to distinguish URLs from other In addition, there are many occasions when URLs are included in other In the case where a fragment/anchor identifier is associated with a In some cases, extra whitespace (spaces, linebreaks, tabs, etc.) may No whitespace should be introduced after a hyphen ("-") character. Examples: Yes, Jim, I found it under References [1] Anklesaria, F., McCahill, M., Lindner, P., Johnson, D., [2] Anklesaria, F., Lindner, P., McCahill, M., Torrey, D., [3] Berners-Lee, T., "Universal Resource Identifiers in WWW: A [4] Berners-Lee, T., "Hypertext Transfer Protocol (HTTP)", [5] Braden, R., Editor, "Requirements for Internet Hosts -- [6] Crocker, D. "Standard for the Format of ARPA Internet Text [7] Davis, F., Kahle, B., Morris, H., Salem, J., Shen, T., Wang, R., [8] Horton, M. and R. Adams, "Standard For Interchange of USENET [9] Huitema, C., "Naming: Strategies and Techniques", Computer [10] Kahle, B., "Document Identifiers, or International Standard [11] Kantor, B. and P. Lapsley, "Network News Transfer Protocol: [12] Kunze, J., "Functional Requirements for Internet Resource [13] Mockapetris, P., "Domain Names - Concepts and Facilities", [14] Neuman, B., and S. Augart, "The Prospero Protocol", [15] Postel, J. and J. Reynolds, "File Transfer Protocol (FTP)", [16] Sollins, K. and L. Masinter, "Functional Requirements for [17] St. Pierre, M, Fullton, J., Gamiel, K., Goldman, J., Kahle, B., [18] Yeong, W. "Towards Networked Information Retrieval", Technical [19] Yeong, W., "Representing Public Archives in the Directory", [20] "Coded Character Set -- 7-bit American Standard Code for Editors' Addresses Tim Berners-Lee Phone: +41 (22)767 3755 Phone: (415) 812-4365 Phone: (612) 625 1300
Engineering Task Force. Comments may be addressed to the editors, or
to the URI-WG <
uri@bunyip.com
>. Discussions of the group are archived
at
there are several schemes for describing the location of such
resources.
be established using protocols other than those defined in this
document.
identification of the resource location. Having located a resource,
a system may perform a variety of operations on the resource, as
might be characterized by such words as `access', `update',
`replace', `find attributes'. In general, only the `access' method
needs to be specified for any URL scheme.
by a colon and then a string (the
interpretation depends on the scheme.
letters "a"--"z", digits, and the characters plus ("+"), period
("."), and hyphen ("-") are allowed. For resiliency, programs
interpreting URLs should treat upper case letters as equivalent to
lower case in scheme names (e.g., allow "HTTP" as well as "http").
characters. A URLs may be represented in a variety of ways: e.g., ink
on paper, or a sequence of octets in a coded character set. The
interpretation of a URL depends only on the identity of the
characters used.
of a URL are used to represent sequences of octets used in Internet
protocols. For example, in the ftp scheme, the host name, directory
name and file names are such sequences of octets, represented by
parts of the URL. Within those parts, an octet may be represented by
[20] coded character set.
of the character "%" followed by the two hexadecimal digits (from
"0123456789ABCDEF") which forming the hexadecimal value of the octet.
(The characters "abcdef" may also be used in hexadecimal encodings.)
character within the US-ASCII coded character set, if the use of the
corresponding character is unsafe, or if the corresponding character
is reserved for some other interpretation within the particular URL
scheme.
US-ASCII coded character set. The octets 80-FF hexadecimal are not
used in US-ASCII, and the octets 00-1F and 7F hexadecimal represent
control characters; these must be encoded.
character is unsafe because significant spaces may disappear and
insignificant spaces may be introduced when URLs are transcribed or
typeset or subjected to the treatment of word-processing programs.
The characters "<" and ">" are unsafe because they are used as the
delimiters around URLs in free text; the quote mark (""") is used to
delimit URLs in some systems. The character "#" is unsafe and should
always be encoded because it is used in World Wide Web and in other
systems to delimit a URL from a fragment/anchor identifier that might
follow it. The character "%" is unsafe because it is used for
encodings of other characters. Other characters are unsafe because
gateways and other transport agents are known to sometimes modify
such characters. These characters are "{", "}", "|", "\", "^", "~",
"[", "]", and "`".
example, the character "#" must be encoded within URLs even in
systems that do not normally deal with fragment or anchor
identifiers, so that if the URL is copied into another system that
does use them, it will not be necessary to change the URL encoding.
their appearance in the scheme-specific part of the URL has a
designated semantics. If the character corresponding to an octet is
reserved in a scheme, the octet must be encoded. The characters ";",
"/", "?", ":", "@", "=" and "&" are the characters which may be
reserved for special meaning within a scheme. No other characters may
be reserved within a scheme.
represented by a character and when it encoded. However, this is not
true for reserved characters: encoding a character reserved for a
particular scheme may change the semantics of a URL.
reserved characters used for their reserved purposes may be used
unencoded within a URL.
(including alphanumerics) may be encoded within the scheme-specific
part of a URL, as long as they are not being used for a reserved
purpose.
pointers to other resources. In some cases, those pointers are
represented as relative links where the expression of the location of
the second resource is in terms of "in the same place as this one
except with the following relative path". Relative links are not
described in this document. However, the use of relative links
depends on the original URL containing a hierarchical structure
against which the relative link is based.
names that can be considered hierarchical; the components of the
hierarchy are separated by "/".
outlined in the BNF syntax definition. Notes on particular protocols
follow. The schemes covered are:
http Hypertext Transfer Protocol
gopher The Gopher protocol
mailto Electronic mail address
news USENET news
nntp USENET news using NNTP access
telnet Reference to interactive sessions
wais Wide Area Information Servers
file Host-specific file names
prospero Prospero Directory Service
this document describes how new schemes may be registered, and lists
some scheme names that are under development.
particular scheme selected, URL schemes that involve the direct use
of an IP-based protocol to a specified host on the Internet use a
common syntax for the scheme-specific data:
":
data start with a double slash "//" to indicate that it complies with
the common Internet scheme syntax. The different components obey the
following rules:
An optional user name. Some schemes (e.g., ftp) allow the
specification of a user name.
An optional password. If present, it follows the user
name separated from it by a colon.
commercial at-sign "@". Within the user and password field, any ":",
"@", or "/" must be encoded.
name or password; there is no way to specify a password without
specifying a user name. E.g.,
> has an empty
user name and no password,
> has no user name,
while
empty password.
The fully qualified domain name of a network host, or its IP
address as a set of four decimal digit groups separated by
".". Fully qualified domain names take the form as described
in Section 3.5 of
RFC 1034
[13] and Section 2.1 of
RFC 1123
[5]: a sequence of domain labels separated by ".", each domain
label starting and ending with an alphanumerical character and
possibly also containing "-" characters. The rightmost domain
label will never start with a digit, though, which
syntactically distinguishes all domain names from the IP
addresses.
The port number to connect to. Most schemes designate
protocols that have a default port number. Another port number
may optionally be supplied, in decimal, separated from the
host by a colon. If the port is omitted, the colon is as well.
The rest of the locator consists of data specific to the
scheme, and is known as the "url-path". It supplies the
details of how the specified resource can be accessed. Note
that the "/" between the host (or port) and the url-path is
NOT part of the url-path.
manner in which it is interpreted.
Internet hosts accessible using the FTP protocol (
RFC959
).
omitted, the port defaults to 21.
"USER" and "PASS" commands after first making the connection to the
FTP server. If no user name or password is supplied and one is
requested by the FTP server, the conventions for "anonymous" FTP are
to be used, as follows:
of the end user accessing the resource.
server requests a password, the program interpreting the FTP URL
should request one from the user.
and
";type=
empty. The whole url-path may be omitted, including the "/"
delimiting it from the prefix containing user, password, host, and
port.
argument to a CWD (change working directory) command.
directory listing.
and then access the file whose name is
the RETR command.)
reserved and must be encoded. The components are decoded prior to
their use in the FTP protocol. In particular, if the appropriate FTP
sequence to access a particular file requires supplying a string
containing a "/" as an argument to a CWD or RETR command, it is
interpreted by FTP-ing to "host.dom", logging in as "myname"
(prompting for a password if it is asked for), and then executing
"CWD /etc" and then "RETR motd". This has a different meaning from
"RETR motd"; the initial "CWD" might be executed relative to the
default directory for "myname". On the other hand,
argument, then "CWD etc", and then "RETR motd".
possible to update a file on a remote file server, or infer
information about it from the directory listings. The mechanism for
doing so is not spelled out here.
omitted, the client program interpreting the URL must guess the
appropriate mode to use. In general, the data content type of a file
can only be guessed from the name, e.g., from the suffix of the name;
the appropriate type code to be used for transfer of the file can
then be deduced from the data content of the file.
structure of the URL corresponds to the delimiter used to construct a
file name hierarchy, and thus, the filename will look similar to the
URL path. This does NOT mean that the URL is a Unix filename.
to optimize the interaction. For some FTP servers, for example, it
may be reasonable to keep the control connection open while accessing
multiple URLs from the same server. However, there is no common
hierarchical model to the FTP protocol, so if a directory change
command has been given, it is impossible in general to deduce what
sequence should be given to navigate to another directory for a
second retrieval, if the paths are different. The only reliable
algorithm is to disconnect and reestablish the control connection.
accessible using HTTP (HyperText Transfer Protocol).
describes the syntax of HTTP URLs.
is omitted, the port defaults to 80. No user name or password is
allowed.
string. The
preceding "?". If neither
may also be omitted.
reserved. The "/" character may be used within HTTP to designate a
hierarchical structure.
accessible using the Gopher protocol.
RFC 1436
and supports items
and collections of items (directories). The Gopher+ protocol is a set
of upward compatible extensions to the base Gopher protocol and is
described in [2]. Gopher+ supports associating arbitrary sets of
attributes and alternate data representations with Gopher items.
Gopher URLs accommodate both Gopher and Gopher+ items and item
attributes.
single-character field to denote the Gopher type of the resource to
which the URL refers. The entire
which case the delimiting "/" is also optional and the
defaults to "1".
Gopher selector strings are a sequence of octets which may contain
any octets except 09 hexadecimal (US-ASCII HT or tab) 0A hexadecimal
(US-ASCII character LF), and 0D (US-ASCII character CR).
selector string to a Gopher server.
consecutively. The Gopher selector string may be an empty string;
this is how Gopher clients refer to the top-level directory on a
Gopher server.
engine, the selector is followed by an encoded tab (%09) and the
search string. To submit a search to a Gopher search engine, the
Gopher client sends the
and the search string to the Gopher server.
string. Note that in this case, the %09
supplied, although the
retrieval of the Gopher+ item. Gopher+ items may have alternate
views, arbitrary sets of attributes, and may have electronic forms
associated with them.
connect to the server and send the Gopher selector, followed by a tab
and the search string (which may be empty), followed by a tab and the
Gopher+ commands.
Gopher+ items are tagged with either a "+" (denoting Gopher+ items)
or a "?" (denoting Gopher+ items which have a +ASK form associated
with them). A Gopher URL with a Gopher+ string consisting of only a
"+" refers to the default view (data representation) of the item
while a Gopher+ string containing only a "?" refer to an item with a
Gopher electronic form associated with it.
items tagged with a "?") require the client to fetch the item's +ASK
attribute to get the form definition, and then ask the user to fill
out the form and return the user's responses along with the selector
string to retrieve the item. Gopher+ clients know how to do this but
depend on the "?" tag in the Gopher+ item description to know when to
handle this case. The "?" is used in the Gopher+ string to be
consistent with Gopher+ protocol's use of this symbol.
Gopher+ string consists of "!" or "$". "!" refers to the all of a
Gopher+ item's attributes. "$" refers to all the item attributes for
all items in a Gopher directory.
"!
the attribute containing the abstract of an item, the gopher+_string
would be "!+ABSTRACT".
attribute names separated by coded spaces. For example,
"!+ABSTRACT%20+SMELL" refers to the +ABSTRACT and +SMELL attributes
of an item.
views) of items. To retrieve a Gopher+ alternate view, a Gopher+
client sends the appropriate view and language identifier (found in
the item's +VIEW attribute). To refer to a specific Gopher+ alternate
view, the URL's Gopher+ string would be in the form:
refers to the Spanish language postscript alternate view of a Gopher+
item.
Gopher+ electronic form (an ASK block) filled out with specific
values is a coded version of what the client sends to the server.
The gopher+_string is of the form:
+-1
.
address of an individual or service. No additional information other
than an Internet mailing address is present or implied.
rfc822
-addr-spec>
rfc822
-addr-spec> is (the encoding of an) addr-spec, as
specified in
RFC 822
[6]. Within mailto URLs, there are no reserved
characters.
RFC 822
addresses and must be encoded.
to be accessed directly; there is no sense in which it designates an
object. It has a different use than the message/external-body type in
MIME.
individual articles of USENET news, as specified in
RFC 1036
news:
"comp.infosystems.www.misc". A
Message-ID of section 2.1.5 of
RFC 1036
, without the enclosing "<"
and ">"; it takes the form
identifier may be distinguished from a news group name by the
presence of the commercial at "@" character. No additional characters
are reserved within the components of a news URL.
to "all available news groups".
sufficient information to locate a single resource, but, rather, are
location-independent.
articles, useful for specifying news articles from NNTP servers (RFC
977).
is omitted, the port defaults to 119.
resource, most NNTP servers currently on the Internet today are
configured only to allow access from local clients, and thus nntp
URLs do not designate globally accessible resources. Thus, the news:
form of URL is preferred as a way of identifying news articles.
may be accessed by the Telnet protocol.
If :
be omitted, as well as the whole
service. Remote interactive services vary widely in the means by
which they allow remote logins; in practice, the
merely advise the user of the suggested username and password.
individual documents available from a WAIS database. WAIS is
described in [7]. The WAIS protocol is described in
RFC 1625
[17];
Although the WAIS protocol is based on Z39.50-1988, the WAIS URL
scheme is not intended for use with arbitrary Z39.50 services.
wais://
wais://
is omitted, the port defaults to 210. The first form designates a
WAIS database that is available for searching. The second form
designates a particular search.
database being queried.
database to be retrieved. In this form
designation of the type of the object. Many WAIS implementations
require that a client know the "type" of an object prior to
retrieval, the type being returned along with the internal object
identifier in the search response. The
URL in order to allow the client interpreting the URL adequate
information to actually retrieve the document.
as necessary using the method described in Section 2.2. The WAIS
document-id should be treated opaquely; it may only be decomposed by
the server that issued it.
particular host computer. This scheme, unlike most other URL schemes,
does not designate a resource that is universally accessible over the
Internet.
which the
directory path of the form
string; this is interpreted as `the machine from which the URL is
being interpreted'.
Internet protocol or access method for such files; as such, its
utility in network protocols between hosts is limited.
accessed via the Prospero Directory Service. The Prospero protocol is
described elsewhere [14].
is omitted, the port defaults to 1525. No username or password is
protocol, suitably encoded. This name is opaque and interpreted by
the Prospero server. The semicolon ";" is reserved and may not
appear without quoting in the
server on the specified host and port to determine appropriate access
methods for a resource, which might themselves be represented as
different URLs. External Prospero links are represented as URLs of
the underlying access method and are not represented as Prospero
URLs.
no significance may be assumed by the application. Though slashes
may indicate hierarchical structure on the server, such structure is
not guaranteed. Note that many
which case the host or port will be followed by a double slash: the
slash from the URL syntax, followed by the initial slash from the
associated with a Prospero link may be specified as part of the URL.
When present, each field/value pair is separated from each other and
from the rest of the URL by a ";" (semicolon). The name of the field
and its value are separated by a "=" (equal sign). If present, these
fields serve to identify the target of the URL. For example, the
OBJECT-VERSION field can be specified to identify a specific version
of an object.
conforming URL syntax, using a new prefix. URLs for experimental
schemes may be used by mutual agreement between parties. Scheme names
starting with the characters "x-" are reserved for experimental
purposes.
registry of URL schemes. Any submission of a new URL scheme must
include a definition of an algorithm for accessing of resources
within that scheme and the syntax for representing such a scheme.
to provide such a demonstration is via a gateway which provides
objects in the new scheme for clients using an existing protocol. If
properties of names in the new space must be clearly defined.
existing schemes, where appropriate. It is likewise recommended
that, where a protocol allows for retrieval by URL, that the client
software have provision for being configured to use specific gateway
locators for indirect access through new naming schemes.
document does not define their syntax or use at this time. It is
suggested that IANA reserve their scheme names for future definition:
mid Message identifiers for electronic mail.
cid Content identifiers for MIME body parts.
nfs Network File System (NFS) file names.
tn3270 Interactive 3270 emulation sessions.
mailserver Access to data available from mail servers.
z39.50 Access to ANSI Z39.50 services.
syntax, using the conventions of
RFC822
, except that "|" is used to
designate alternatives, and brackets [] are used around optional or
repeated elements. Briefly, literals are quoted with "", optional
elements are enclosed in [brackets], and elements may be preceded
with
element; n defaults to 0.
; may be registered with IANA
nntpurl | telneturl | gopherurl |
waisurl | mailtourl | fileurl |
prosperourl | otherurl
otherurl = genericurl
scheme = 1*[ lowalpha | digit | "+" | "-" | "." ]
hostport = host [ ":" port ]
host = hostname | hostnumber
hostname = *[ domainlabel "." ] toplabel
domainlabel = alphadigit | alphadigit *[ alphadigit | "-" ] alphadigit
toplabel = alpha | alpha *[ alphadigit | "-" ] alphadigit
alphadigit = alpha | digit
hostnumber = digits "." digits "." digits "." digits
port = digits
user = *[ uchar | ";" | "?" | "&" | "=" ]
password = *[ uchar | ";" | "?" | "&" | "=" ]
urlpath = *xchar ; depends on protocol see section 3.1
RFC959
fpath = fsegment *[ "/" fsegment ]
fsegment = *[ uchar | "?" | ":" | "@" | "&" | "=" ]
ftptype = "A" | "I" | "D" | "a" | "i" | "d"
hpath = hsegment *[ "/" hsegment ]
hsegment = *[ uchar | ";" | ":" | "@" | "&" | "=" ]
search = *[ uchar | ";" | ":" | "@" | "&" | "=" ]
RFC1436
[ "%09" search [ "%09" gopher+_string ] ] ] ] ]
gtype = xchar
selector = *xchar
gopher+_string = *xchar
RFC822
encoded822addr = 1*xchar ; further defined in
RFC822
; NEWS (see also
RFC1036
grouppart = "*" | group | article
group = alpha *[ alpha | digit | "-" | "." | "+" | "_" ]
article = 1*[ uchar | ";" | "/" | "?" | ":" | "&" | "=" ] "@" host
RFC977
RFC1625
waisdatabase = "wais://" hostport "/" database
waisindex = "wais://" hostport "/" database "?" search
waisdoc = "wais://" hostport "/" database "/" wtype "/" wpath
database = *uchar
wtype = *uchar
wpath = *uchar
ppath = psegment *[ "/" psegment ]
psegment = *[ uchar | "?" | ":" | "@" | "&" | "=" ]
fieldspec = ";" fieldname "=" fieldvalue
fieldname = *[ uchar | "?" | ":" | "@" | "&" ]
fieldvalue = *[ uchar | "?" | ":" | "@" | "&" ]
"i" | "j" | "k" | "l" | "m" | "n" | "o" | "p" |
"q" | "r" | "s" | "t" | "u" | "v" | "w" | "x" |
"y" | "z"
hialpha = "A" | "B" | "C" | "D" | "E" | "F" | "G" | "H" | "I" |
"J" | "K" | "L" | "M" | "N" | "O" | "P" | "Q" | "R" |
"S" | "T" | "U" | "V" | "W" | "X" | "Y" | "Z"
digit = "0" | "1" | "2" | "3" | "4" | "5" | "6" | "7" |
"8" | "9"
safe = "$" | "-" | "_" | "." | "+"
extra = "!" | "*" | "'" | "(" | ")" | ","
national = "{" | "}" | "|" | "\" | "^" | "~" | "[" | "]" | "`"
punctuation = "<" | ">" | "#" | "%" | <">
hex = digit | "A" | "B" | "C" | "D" | "E" | "F" |
"a" | "b" | "c" | "d" | "e" | "f"
escape = "%" hex hex
uchar = unreserved | escape
xchar = unreserved | reserved | escape
digits = 1*digit
should beware that there is no general guarantee that a URL which at
one time points to a given object continues to do so, and does not
even at some later time point to a different object due to the
movement of objects on servers.
construct a URL such that an attempt to perform a harmless idempotent
operation such as the retrieval of the object will in fact cause a
possibly damaging remote operation to occur. The unsafe URL is
typically constructed by specifying a port number other than that
reserved for the network protocol in question. The client
unwittingly contacts a server which is in fact running a different
protocol. The content of the URL contains instructions which when
interpreted according to this other protocol cause an unexpected
operation. An example has been the use of gopher URLs to cause a rude
message to be sent via a SMTP server. Caution should be used when
using any URL which specifies a port number other than the default
for the protocol, especially when it is a number within the reserved
space.
for a given protocol (for example, CR and LF characters for telnet
protocols) that these are not unencoded before transmission. This
would violate the protocol but could be used to simulate an extra
operation or parameter, again causing an unexpected and possible
harmful remote operation to be performed.
unwise.
RFC 1630
) and much
discussion of these issues by many people on the network. The
discussion was particularly stimulated by articles by Clifford Lynch,
Brewster Kahle [10] and Wengyik Yeong [18]. Contributions from John
Curran, Clifford Neuman, Ed Vielmetti and later the IETF URL BOF and
URI working group were incorporated.
Freed, Roy Fielding, Guido van Rossum, Michael Dolan, Bert Bos, John
Kunze, Olle Jarnefors, Peter Svanberg and many others have helped
refine this RFC.
protocols which provide a context for their interpretation.
possible data structures in a syntactic structure. In this case, is
recommended that URLs be preceeded with a prefix consisting of the
characters "URL:". For example, this prefix may be used to
distinguish URLs from other kinds of URIs.
kinds of text; examples include electronic mail, USENET news
messages, or printed on paper. In such cases, it is convenient to
have a separate syntactic wrapper that delimits the URL and separates
it from the rest of the text, and in particular from punctuation
marks that might be mistaken for part of the URL. For this purpose,
is recommended that angle brackets ("<" and ">"), along with the
prefix "URL:", be used to delimit the boundaries of the URL. This
wrapper does not form part of the URL and should not be used in
contexts in which delimiters are already specified.
URL (following a "#"), the identifier would be placed within the
brackets as well.
need to be added to break long URLs across lines. The whitespace
should be ignored when extracting the URL.
Because some typesetters and printers may (erroneously) introduce a
hyphen at the end of line when breaking a line, the interpreter of a
URL containing a line break immediately after a hyphen should ignore
all unencoded whitespace around the line break, and should be aware
that the hyphen may or may not actually be part of the URL.
type=d> but you can probably pick it up from
ternic.net/rfc>. Note the warning in
Torrey, D., and B. Alberti, "The Internet Gopher Protocol
(a distributed document search and retrieval protocol)",
RFC 1436
, University of Minnesota, March 1993.
Johnson, D., and B. Alberti, "Gopher+: Upward compatible
enhancements to the Internet Gopher protocol",
University of Minnesota, July 1993.
/Gopher+/Gopher+.txt>
Unifying Syntax for the Expression of Names and Addresses of
Objects on the Network as used in the World-Wide Web", RFC
1630, CERN, June 1994.
CERN, November 1993.
Application and Support", STD 3,
RFC 1123
, IETF, October 1989.
Messages", STD 11,
RFC 822
, UDEL, April 1982.
Sui, J., and M. Grinbaum, "WAIS Interface Protocol Prototype
Functional Specification", (v1.5), Thinking Machines
Corporation, April 1990.
Messages",
RFC 1036
, AT&T Bell Laboratories, Center for Seismic
Studies, December 1987.
Networks and ISDN Systems 23 (1991) 107-110.
Book Numbers for the Electronic Age", 1991.
A Proposed Standard for the Stream-Based Transmission of News",
RFC 977
, UC San Diego & UC Berkeley, February 1986.
Locators", Work in Progress, December 1994.
/draft-ietf-uri-irl-fun-req-02.txt>
STD 13,
RFC 1034
, USC/Information Sciences Institute,
November 1987.
USC/Information Sciences Institute, June 1993.
/prospero-protocol.PS.Z>
STD 9,
RFC 959
, USC/Information Sciences Institute,
October 1985.
Uniform Resource Names",
RFC 1737
, MIT/LCS, Xerox Corporation,
December 1994.
Kunze, J., Morris, H., and F. Schiettecatte, "WAIS over
Z39.50-1988",
RFC 1625
, WAIS, Inc., CNIDR, Thinking Machines
Corp., UC Berkeley, FS Consulting, June 1994.
report 91-06-25-01, Performance Systems International, Inc.
>, June 1991.
Work in Progress, November 1991.
Information Interchange", ANSI X3.4-1986.
World-Wide Web project
CERN,
1211 Geneva 23,
Switzerland
Fax: +41 (22)767 7155
EMail:
timbl@info.cern.ch
Larry Masinter
Xerox PARC
3333 Coyote Hill Road
Palo Alto, CA 94034
Fax: (415) 812-4333
EMail:
masinter@parc.xerox.com
Mark McCahill
Computer and Information Services,
University of Minnesota
Room 152 Shepherd Labs
100 Union Street SE
Minneapolis, MN 55455
EMail:
mpm@boombox.micro.umn.edu
User Contributions:
Sam
Sep 21, 2025 @ 9:21 pm
Unfortunately, the email was hijacked. I've been looking for ways to access it without my previous SIM card which is swapped by the knowledgeable people.
Comment about this RFC, ask questions, or add new information about this topic:
Previous:
RFC 1737 - Functional Requirements for Uniform Resource Names
Next:
RFC 1739 - A Primer On Internet and TCP/IP Tools
RFC Index
Usenet FAQs
Web FAQs
Documents
Cities
Restaurant inspections
Some parts © 2026 Advameg, Inc. |