Jump to content

localhost

Page semi-protected
From Wikipedia, the free encyclopedia
(Redirected from 127.0.0.5)

In computer networking, localhost is a hostname that refers to the current computer used to access it. The name localhost is reserved for loopback purposes.[1] It is used to access the network services that are running on the host via the loopback network interface. Using the loopback interface bypasses any local network interface hardware.

Loopback

The local loopback mechanism may be used to run a network service on a host without requiring a physical network interface, or without making the service accessible from the networks the computer may be connected to. For example, a locally installed website may be accessed from a Web browser by the URL http://localhost to display its home page.

IPv4 network standards reserve the entire address block 127.0.0.0/8 (more than 16 million addresses) for loopback purposes.[2] That means any packet sent to any of those addresses is looped back. The address 127.0.0.1 is the standard address for IPv4 loopback traffic; the rest are not supported by all operating systems. However, they can be used to set up multiple server applications on the host, all listening on the same port number. In the IPv6 addressing architecture[3] there is only a single address assigned for loopback: ::1. The standard precludes the assignment of that address to any physical interface, as well as its use as the source or destination address in any packet sent to remote hosts.

Name resolution

The name localhost normally resolves to the IPv4 loopback address 127.0.0.1, and to the IPv6 loopback address ::1.

This resolution is normally configured by the following lines in the operating system's hosts file:

127.0.0.1    localhost
::1          localhost

The name may also be resolved by Domain Name System (DNS) servers, but there are special considerations[1] governing the use of this name:

  • An IPv4 or IPv6 address query for the name localhost must always resolve to the respective loopback address.
  • Applications may resolve the name to a loopback address themselves, or pass it to the local name resolver mechanisms.
  • When a name resolver receives an address (A or AAAA) query for localhost, it should return the appropriate loopback addresses, and negative responses for any other requested record types. Queries for localhost should not be sent to caching name servers.
  • To avoid burdening the Domain Name System root servers with traffic, caching name servers should never request name server records for localhost, or forward resolution to authoritative name servers.
  • When authoritative name servers receive queries for 'localhost' in spite of the provisions mentioned above, they should resolve them appropriately.

In addition to the mapping of localhost to the loopback addresses (127.0.0.1 and ::1), localhost may also be mapped to other IPv4 (loopback) addresses and it is also possible to assign other, or additional, names to any loopback address. The mapping of localhost to addresses other than the designated loopback address range in the hosts file or in DNS is not guaranteed to have the desired effect, as applications may map the name internally.

In the Domain Name System, the name .localhost is reserved as a top-level domain name, originally set aside to avoid confusion with the hostname localhost.[4] Domain name registrars are precluded from delegating domain names in the top-level .localhost domain.[1]

Historical notes

In 1981, the block 127.0.0.0/8 got a 'reserved' status,[5] as not to assign it as a general purpose class A IP network. This block was officially assigned for loopback purposes in 1986.[6] Its purpose as a Special Use IPv4 Address block was confirmed in 1994,[7], 2002[8], 2010,[9], and last in 2013.[2]

From the outset, in 1995, the single IPv6 loopback address ::1 was defined.[10] Its purpose and definition was unchanged in 1998,[11], 2003,[12], and up to the current definition, in 2006.[3]

Packet processing

The processing of any packet sent to a loopback address, is implemented in the link layer of the TCP/IP stack. Such packets are never passed to any network interface controller (NIC) or hardware device driver and must not appear outside of a computing system, or be routed by any router. This permits software testing and local services, even in the absence of any hardware network interfaces.

Looped-back packets are distinguished from any other packets traversing the TCP/IP stack only by the special IP address they were addressed to. Thus, the services that ultimately receive them respond according to the specified destination. For example, an HTTP service could route packets addressed to 127.0.0.99:80 and 127.0.0.100:80 to different Web servers, or to a single server that returns different web pages. To simplify such testing, the hosts file may be configured to provide appropriate names for each address.

Packets received on a non-loopback interface with a loopback source or destination address must be dropped. Such packets are sometimes referred to as Martian packets.[13] As with any other bogus packets, they may be malicious and any problems they might cause can be avoided by applying bogon filtering.

Special cases

The releases of the MySQL database differentiate between the use of the hostname localhost and the use of the addresses 127.0.0.1 and ::1.[14] When using localhost as the destination in a client connector interface of an application, the MySQL application programming interface connects to the database using a Unix domain socket, while a TCP connection via the loopback interface requires the direct use of the explicit address.

One notable exception to the use of the 127.0.0.0/8 addresses is their use in Multiprotocol Label Switching (MPLS) traceroute error detection, in which their property of not being routable provides a convenient means to avoid delivery of faulty packets to end users.

See also

References

  1. ^ a b c S. Cheshire; M. Krochmal (February 2013). Special-Use Domain Names. Internet Engineering Task Force. doi:10.17487/RFC6761. ISSN 2070-1721. RFC 6761. Proposed Standard. Updates RFC 1918 and 2606.
  2. ^ a b M. Cotton; L. Vegoda; B. Haberman (April 2013). R. Bonica (ed.). Special-Purpose IP Address Registries. IETF. doi:10.17487/RFC6890. ISSN 2070-1721. BCP 153. RFC 6890. Best Current Practice 153. Obsoletes RFC 4773, 5156, 5735 and 5736. Updated by RFC 8190.
  3. ^ a b R. Hinden; S. Deering (February 2006). IP Version 6 Addressing Architecture. Network Working Group. doi:10.17487/RFC4291. RFC 4291. Draft Standard. Obsoletes RFC 3513. Updated by RFC 5952, 6052, 7136, 7346, 7371 and 8064.
  4. ^ D. Eastlake; A. Panitz (June 1999). Reserved Top Level DNS Names. Network Working Group. doi:10.17487/RFC2606. BCP 32. RFC 2606. Best Common Practice. Updated by RFC 6761.
  5. ^ J. Postel (September 1981). ASSIGNED NUMBERS. Network Working Group. doi:10.17487/RFC0790. RFC 790. Obsolete. Obsoleted by RFC 820. Obsoletes RFC 776, 770, 762, 758, 755, 750, 739, 604, 503, 433 and 349.Obsoletes IENs: 127, 117, 93.
  6. ^ J. Reynolds; J. Postel (November 1986). ASSIGNED NUMBERS. Network Working Group. doi:10.17487/RFC0990. RFC 990. Obsolete. Obsoleted by RFC 1010. Obsoletes RFC 960. Obsoletes IENs 127, 117, and 93.
  7. ^ J. Reynolds; J. Postel (October 1994). ASSIGNED NUMBERS. Network Working Group. doi:10.17487/RFC1700. STD 2. RFC 1700. Obsolete. Obsoleted by RFC 3232. Obsoletes RFC 1340, 1060, 1010, 990, 960, 943, 923, 900, 870, 820, 790, 776, 770, 762, 758, 755, 750, 739 604, 503, 433 and 349. Obsoletes IENs: 127, 117, 93.
  8. ^ IANA (September 2002). Special-Use IPv4 Addresses. Network Working Group. doi:10.17487/RFC3330. RFC 3330. Obsolete. Obsoleted by RFC 5735.
  9. ^ M. Cotton; L. Vegoda (January 2010). Special Use IPv4 Addresses. Internet Engineering Task Force. doi:10.17487/RFC5735. ISSN 2070-1721. BCP 153. RFC 5735. Obsolete. Obsoleted by RFC 6890.
  10. ^ R. Hinden; S. Deering (December 1995). IP Version 6 Addressing Architecture. Network Working Group. doi:10.17487/RFC1884. RFC 1884. Obsolete. Obsoleted by RFC 2373.
  11. ^ R. Hinden; S. Deering (July 1998). IP Version 6 Addressing Architecture. Network Working Group. doi:10.17487/RFC2373. RFC 2373. Obsolete. Obsoleted by RFC 3513. Obsoletes RFC 1884.
  12. ^ R. Hinden; S. Deering (April 2003). IP Version 6 Addressing Architecturen. Network Working Group. doi:10.17487/RFC3513. RFC 3513. Obsolete. Obsoletes RFC 2373. Obsoleted by RFC 4291.
  13. ^ Raymond, Eric S. "The Jargon File".
  14. ^ "MySQL :: MySQL 5.5 Reference Manual :: 4.1 Overview of MySQL Programs".