diff options
Diffstat (limited to 'doc/rfc/rfc5598.txt')
-rw-r--r-- | doc/rfc/rfc5598.txt | 3027 |
1 files changed, 3027 insertions, 0 deletions
diff --git a/doc/rfc/rfc5598.txt b/doc/rfc/rfc5598.txt new file mode 100644 index 0000000..1e077f7 --- /dev/null +++ b/doc/rfc/rfc5598.txt @@ -0,0 +1,3027 @@ + + + + + + +Network Working Group D. Crocker +Request for Comments: 5598 Brandenburg InternetWorking +Category: Informational July 2009 + + + Internet Mail Architecture + +Abstract + + Over its thirty-five-year history, Internet Mail has changed + significantly in scale and complexity, as it has become a global + infrastructure service. These changes have been evolutionary, rather + than revolutionary, reflecting a strong desire to preserve both its + installed base and its usefulness. To collaborate productively on + this large and complex system, all participants need to work from a + common view of it and use a common language to describe its + components and the interactions among them. But the many differences + in perspective currently make it difficult to know exactly what + another participant means. To serve as the necessary common frame of + reference, this document describes the enhanced Internet Mail + architecture, reflecting the current service. + +Status of This Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (c) 2009 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents in effect on the date of + publication of this document (http://trustee.ietf.org/license-info). + Please review these documents carefully, as they describe your rights + and restrictions with respect to this document. + + This document may contain material from IETF Documents or IETF + Contributions published or made publicly available before November + 10, 2008. The person(s) controlling the copyright in some of this + material may not have granted the IETF Trust the right to allow + modifications of such material outside the IETF Standards Process. + Without obtaining an adequate license from the person(s) controlling + the copyright in such materials, this document may not be modified + outside the IETF Standards Process, and derivative works of it may + + + + +Crocker Informational [Page 1] + +RFC 5598 Email Architecture July 2009 + + + not be created outside the IETF Standards Process, except to format + it for publication as an RFC or to translate it into languages other + than English. + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 + 1.1. History . . . . . . . . . . . . . . . . . . . . . . . . . 4 + 1.2. The Role of This Architecture . . . . . . . . . . . . . . 6 + 1.3. Document Conventions . . . . . . . . . . . . . . . . . . . 7 + 2. Responsible Actor Roles . . . . . . . . . . . . . . . . . . . 7 + 2.1. User Actors . . . . . . . . . . . . . . . . . . . . . . . 8 + 2.2. Message Handling Service (MHS) Actors . . . . . . . . . . 11 + 2.3. Administrative Actors . . . . . . . . . . . . . . . . . . 14 + 3. Identities . . . . . . . . . . . . . . . . . . . . . . . . . . 17 + 3.1. Mailbox . . . . . . . . . . . . . . . . . . . . . . . . . 17 + 3.2. Scope of Email Address Use . . . . . . . . . . . . . . . . 18 + 3.3. Domain Names . . . . . . . . . . . . . . . . . . . . . . . 19 + 3.4. Message Identifier . . . . . . . . . . . . . . . . . . . . 19 + 4. Services and Standards . . . . . . . . . . . . . . . . . . . . 21 + 4.1. Message Data . . . . . . . . . . . . . . . . . . . . . . . 24 + 4.1.4. Identity References in a Message . . . . . . . . . . . 25 + 4.2. User-Level Services . . . . . . . . . . . . . . . . . . . 29 + 4.3. MHS-Level Services . . . . . . . . . . . . . . . . . . . . 31 + 4.4. Transition Modes . . . . . . . . . . . . . . . . . . . . . 34 + 4.5. Implementation and Operation . . . . . . . . . . . . . . . 35 + 5. Mediators . . . . . . . . . . . . . . . . . . . . . . . . . . 35 + 5.1. Alias . . . . . . . . . . . . . . . . . . . . . . . . . . 37 + 5.2. ReSender . . . . . . . . . . . . . . . . . . . . . . . . . 38 + 5.3. Mailing Lists . . . . . . . . . . . . . . . . . . . . . . 39 + 5.4. Gateways . . . . . . . . . . . . . . . . . . . . . . . . . 41 + 5.5. Boundary Filter . . . . . . . . . . . . . . . . . . . . . 42 + 6. Considerations . . . . . . . . . . . . . . . . . . . . . . . . 42 + 6.1. Security Considerations . . . . . . . . . . . . . . . . . 42 + 6.2. Internationalization . . . . . . . . . . . . . . . . . . . 43 + 7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 45 + 7.1. Normative References . . . . . . . . . . . . . . . . . . . 45 + 7.2. Informative References . . . . . . . . . . . . . . . . . . 47 + Appendix A. Acknowledgments . . . . . . . . . . . . . . . . . . . 50 + Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 + + + + + + + + + + + +Crocker Informational [Page 2] + +RFC 5598 Email Architecture July 2009 + + +1. Introduction + + Over its thirty-five-year history, Internet Mail has changed + significantly in scale and complexity, as it has become a global + infrastructure service. These changes have been evolutionary, rather + than revolutionary, reflecting a strong desire to preserve both its + installed base and its usefulness. Today, Internet Mail is + distinguished by many independent operators, many different + components for providing service to Users, as well as many different + components that transfer messages. + + The underlying technical standards for Internet Mail comprise a rich + array of functional capabilities. These specifications form the + core: + + * Simple Mail Transfer Protocol (SMTP) ([RFC0821], [RFC2821], + [RFC5321]) moves a message through the Internet. + + * Internet Mail Format (IMF) ([RFC0733], [RFC0822], [RFC2822], + [RFC5322]) defines a message object. + + * Multipurpose Internet Mail Extensions (MIME) [RFC2045] defines + an enhancement to the message object that permits using + multimedia attachments. + + Public collaboration on technical, operations, and policy activities + of email, including those that respond to the challenges of email + abuse, has brought a much wider range of participants into the + technical community. To collaborate productively on this large and + complex system, all participants need to work from a common view of + it and use a common language to describe its components and the + interactions among them. But the many differences in perspective + currently make it difficult to know exactly what another participant + means. + + It is the need to resolve these differences that motivates this + document, which describes the realities of the current system. + Internet Mail is the subject of ongoing technical, operations, and + policy work, and the discussions often are hindered by different + models of email-service design and different meanings for the same + terms. + + To serve as the necessary common frame of reference, this document + describes the enhanced Internet Mail architecture, reflecting the + current service. The document focuses on: + + + + + + +Crocker Informational [Page 3] + +RFC 5598 Email Architecture July 2009 + + + * Capturing refinements to the email model + + * Clarifying functional roles for the architectural components + + * Clarifying identity-related issues, across the email service + + * Defining terminology for architectural components and their + interactions + +1.1. History + + The first standardized architecture for networked email specified a + simple split between the user world, in the form of Message User + Agents (MUAs), and the transfer world, in the form of the Message + Handling Service (MHS), which is composed of Message Transfer Agents + (MTAs) [RFC1506]. The MHS accepts a message from one User and + delivers it to one or more other Users, creating a virtual MUA-to-MUA + exchange environment. + + As shown in Figure 1, this architecture defines two logical layers of + interoperability. One is directly between Users. The other is among + the components along the transfer path. In addition, there is + interoperability between the layers, first when a message is posted + from the User to the MHS and later when it is delivered from the MHS + to the User. + + The operational service has evolved, although core aspects of the + service, such as mailbox addressing and message format style, remain + remarkably constant. The original distinction between the user level + and transfer level remains, but with elaborations in each. The term + "Internet Mail" is used to refer to the entire collection of user and + transfer components and services. + + For Internet Mail, the term "end-to-end" usually refers to a single + posting and the set of deliveries that result from a single transit + of the MHS. A common exception is group dialogue that is mediated + through a Mailing List; in this case, two postings occur before + intended Recipients receive an Author's message, as discussed in + Section 2.1.4. In fact, some uses of email consider the entire email + service, including Author and Recipient, as a subordinate component. + For these services, "end-to-end" refers to points outside the email + service. Examples are voicemail over email [RFC3801], EDI + (Electronic Data Interchange) over email [RFC1767], and facsimile + over email [RFC4142]. + + + + + + + +Crocker Informational [Page 4] + +RFC 5598 Email Architecture July 2009 + + + +--------+ + ++================>| User | + || +--------+ + || ^ + +--------+ || +--------+ . + | User +==++=========>| User | . + +---+----+ || +--------+ . + . || ^ . + . || +--------+ . . + . ++==>| User | . . + . +--------+ . . + . ^ . . + . . . . + V . . . + +---+-----------------+------+------+---+ + | . . . . | + | .................>. . . | + | . . . | + | ........................>. . | + | . . | + | ...............................>. | + | | + | Message Handling Service (MHS) | + +---------------------------------------+ + + Legend: === lines indicate primary (possibly indirect) + transfers or roles + ... lines indicate supporting transfers or roles + + Figure 1: Basic Internet Mail Service Model + + End-to-end Internet Mail exchange is accomplished by using a + standardized infrastructure with these components and + characteristics: + + * An email object + + * Global addressing + + * An asynchronous sequence of point-to-point transfer mechanisms + + * No requirement for prior arrangement between MTAs or between + Authors and Recipients + + * No requirement for prior arrangement between point-to-point + transfer services over the open Internet + + + + + +Crocker Informational [Page 5] + +RFC 5598 Email Architecture July 2009 + + + * No requirement for Author, Originator, or Recipients to be + online at the same time + + The end-to-end portion of the service is the email object, called a + "message". Broadly, the message itself distinguishes control + information, for handling, from the Author's content. + + A precept to the design of mail over the open Internet is permitting + User-to-User and MTA-to-MTA interoperability without prior, direct + arrangement between the independent administrative authorities + responsible for handling a message. All participants rely on having + the core services universally supported and accessible, either + directly or through Gateways that act as translators between Internet + Mail and email environments conforming to other standards. Given the + importance of spontaneity and serendipity in interpersonal + communications, not requiring such prearrangement between + participants is a core benefit of Internet Mail and remains a core + requirement for it. + + Within localized networks at the edge of the public Internet, prior + administrative arrangement often is required and can include access + control, routing constraints, and configuration of the information + query service. Although Recipient authentication has usually been + required for message access since the beginning of Internet Mail, in + recent years it also has been required for message submission. In + these cases, a server validates the client's identity, whether by + explicit security protocols or by implicit infrastructure queries to + identify "local" participants. + +1.2. The Role of This Architecture + + An Internet service is an integration of related capabilities among + two or more participating nodes. The capabilities are accomplished + across the Internet by one or more protocols. What connects a + protocol to a service is an architecture. An architecture specifies + how the protocols implement the service by defining the logical + components of a service and the relationships among them. From that + logical view, a service defines what is being done, an architecture + defines where the pieces are (in relation to each other), and a + protocol defines how particular capabilities are performed. + + As such, an architecture will more formally describe a service at a + relatively high level. A protocol that implements some portion of a + service will conform to the architecture to a greater or lesser + extent, depending on the pragmatic tradeoffs they make when trying to + implement the architecture in the context of real-world constraints. + Failure to precisely follow an architecture is not a failure of the + protocol, nor is failure to precisely cast a protocol a failure of + + + +Crocker Informational [Page 6] + +RFC 5598 Email Architecture July 2009 + + + the architecture. Where a protocol varies from the architecture, it + will of course be appropriate for it to explain the reason for the + variance. However, such variance is not a mark against a protocol: + Happily, the IETF prefers running code to architectural purity. + + In this particular case, this architecture attempts to define the + logical components of Internet email and does so post hoc, trying to + capture the architectural principles that the current email protocols + embody. To different extents, email protocols will conform to this + architecture more or less well. Insofar as this architecture differs + from those protocols, the reasons are generally well understood and + are required for interoperation. The differences are not a sign that + protocols need to be fixed. However, this architecture is a best + attempt at a logical model of Internet email, and insofar as new + protocol development varies from this architecture, it is necessary + for designers to understand those differences and explain them + carefully. + +1.3. Document Conventions + + References to structured fields of a message use a two-part dotted + notation. The first part cites the document that contains the + specification for the field, and the second part is the name of the + field. Hence <RFC5322.From> is the IMF From: header field in an + email content header, and <RFC5321.MailFrom> is the address in the + SMTP "Mail From" command. + + When occurring without the IMF (RFC 5322) qualifier, header field + names are shown with a colon suffix. For example, From:. + + References to labels for actors, functions or components have the + first letter capitalized. + +2. Responsible Actor Roles + + Internet Mail is a highly distributed service, with a variety of + Actors playing different roles. These Actors fall into three basic + types: + + * User + + * Message Handling Service (MHS) + + * ADministrative Management Domain (ADMD) + + + + + + + +Crocker Informational [Page 7] + +RFC 5598 Email Architecture July 2009 + + + Although related to a technical architecture, the focus on Actors + concerns participant responsibilities, rather than functionality of + modules. For that reason, the labels used are different from those + used in classic diagrams of email architecture. + +2.1. User Actors + + Users are the sources and sinks of messages. Users can be people, + organizations, or processes. They can have an exchange that + iterates, and they can expand or contract the set of Users that + participate in a set of exchanges. In Internet Mail, there are four + types of Users: + + * Authors + + * Recipients + + * Return Handlers + + * Mediators + + Figure 2 shows the primary and secondary flows of messages among + them. As a pragmatic heuristic: User Actors can generate, modify, or + look at the whole message. + + + + + + + + + + + + + + + + + + + + + + + + + + + +Crocker Informational [Page 8] + +RFC 5598 Email Architecture July 2009 + + + ++==========++ + || Author ||<..................................<.. + ++=++=++=++=++ . + || || || ++===========++ . + || || ++====>|| Recipient || . + || || ++=====+=====++ . + || || . . + || || ..........................>.+ + || || . + || || ................... . + || || . . . + || || V . . + || || +-----------+ ++=====+=====++ . + || ++========>| Mediator +===>|| Recipient || . + || +-----+-----+ ++=====+=====++ . + || . . . + || ..................+.......>.+ + || . + || ..............+.................. . + || . . . . + \/ V V ' . + +-----------+ +-----------+ ++=====+=====++ . + | Mediator +===>| Mediator +===>|| Recipient || . + +-----+-----+ +-----+-----+ ++=====+=====++ . + . . . . + .................+.................+.......>.. + + Legend: === lines indicate primary (possibly indirect) + transfers or roles + ... lines indicate supporting transfers or roles + + Figure 2: Relationships among User Actors + + From a User's perspective, all message-transfer activities are + performed by a monolithic Message Handling Service (MHS), even though + the actual service can be provided by many independent organizations. + Users are customers of this unified service. + + Whenever any MHS Actor sends information back to an Author or + Originator in the sequence of handling a message, that Actor is a + User. + +2.1.1. Author + + The Author is responsible for creating the message, its contents, and + its list of Recipient addresses. The MHS transfers the message from + the Author and delivers it to the Recipients. The MHS has an + Originator role (Section 2.2.1) that correlates with the Author role. + + + +Crocker Informational [Page 9] + +RFC 5598 Email Architecture July 2009 + + +2.1.2. Recipient + + The Recipient is a consumer of the delivered message. The MHS has a + Receiver role (Section 2.2.4) that correlates with the Recipient + role. This is labeled Recv in Figure 3. + + Any Recipient can close the user-communication loop by creating and + submitting a new message that replies to the Author. An example of + an automated form of reply is the Message Disposition Notification + (MDN), which informs the Author about the Recipient's handling of the + message. (See Section 4.1.) + +2.1.3. Return Handler + + Also called "Bounce Handler", the Return Handler is a special form of + Recipient tasked with servicing notifications generated by the MHS as + it transfers or delivers the message. (See Figure 3.) These notices + can be about failures or completions and are sent to an address that + is specified by the Originator. This Return Handling address (also + known as a Return Address) might have no visible characteristics in + common with the address of the Author or Originator. + +2.1.4. Mediator + + A Mediator receives, aggregates, reformulates, and redistributes + messages among Authors and Recipients who are the principals in + (potentially) protracted exchanges. This activity is easily confused + with the underlying MHS transfer exchanges. However, each serves + very different purposes and operates in very different ways. + + When mail is delivered to the Mediator specified in the + RFC5321.RcptTo command for the original message, the MHS handles it + the same way as for any other Recipient. In particular, the MHS sees + each posting and delivery activity between sources and sinks as + independent; it does not see subsequent re-posting as a continuation + of a process. Because the Mediator originates messages, it can + receive replies. Hence, when submitting a reformulated message, the + Mediator is an Author, albeit an Author actually serving as an agent + of one or more other Authors. So a Mediator really is a full-fledged + User. Mediators are considered extensively in Section 5. + + A Mediator attempts to preserve the original Author's information in + the message it reformulates but is permitted to make meaningful + changes to the message content or envelope. The MHS sees a new + message, but Users receive a message that they interpret as being + from, or at least initiated by, the Author of the original message. + The role of a Mediator is not limited to merely connecting other + participants; the Mediator is responsible for the new message. + + + +Crocker Informational [Page 10] + +RFC 5598 Email Architecture July 2009 + + + A Mediator's role is complex and contingent, for example, modifying + and adding content or regulating which Users are allowed to + participate and when. The common example of this role is a group + Mailing List. In a more complex use, a sequence of Mediators could + perform a sequence of formal steps, such as reviewing, modifying, and + approving a purchase request. + + A Gateway is a particularly interesting form of Mediator. It is a + hybrid of User and Relay that connects heterogeneous mail services. + Its purpose is to emulate a Relay. For a detailed discussion, see + Section 2.2.3. + +2.2. Message Handling Service (MHS) Actors + + The Message Handling Service (MHS) performs a single end-to-end + transfer on behalf of the Author to reach the Recipient addresses + specified in the original RFC5321.RcptTo commands. Exchanges that + are either mediated or iterative and protracted, such as those used + for collaboration over time, are handled by the User Actors, not by + the MHS Actors. As a pragmatic heuristic MHS Actors generate, + modify, or look at only transfer data, rather than the entire + message. + + Figure 3 shows the relationships among transfer participants in + Internet Mail. Although it shows the Originator (labeled Origin) as + distinct from the Author, and Receiver (labeled Recv) as distinct + from Recipient, each pair of roles usually has the same Actor. + Transfers typically entail one or more Relays. However, direct + delivery from the Originator to Receiver is possible. Intra- + organization mail services usually have only one Relay. + + + + + + + + + + + + + + + + + + + + + +Crocker Informational [Page 11] + +RFC 5598 Email Architecture July 2009 + + + ++==========++ ++===========++ + || Author || || Recipient || + ++====++====++ +--------+ ++===========++ + || | Return | /\ + || +-+------+ || + \/ . ^ || + +---------+ . . +---++---+ + | | . . | | + /--+---------+----------------------------+--------+----\ + | | | . . MHS | | | + | | Origin +<...... .................+ Recv | | + | | | ^ | | | + | +---++----+ . +--------+ | + | || . /\ | + | || ..............+.................. || | + | \/ . . . || | + | +-------+-+ +--+------+ +-+--++---+ | + | | Relay +=======>| Relay +=======>| Relay | | + | +---------+ +----++---+ +---------+ | + | || | + | || | + | \/ | + | +---------+ | + | | Gateway +-->... | + | +---------+ | + \-------------------------------------------------------/ + + Legend: === and || lines indicate primary (possibly + indirect) transfers or roles + ... lines indicate supporting transfers or roles + + Figure 3: Relationships among MHS Actors + +2.2.1. Originator + + The Originator ensures that a message is valid for posting and then + submits it to a Relay. A message is valid if it conforms to both + Internet Mail standards and local operational policies. The + Originator can simply review the message for conformance and reject + it if it finds errors, or it can create some or all of the necessary + information. In effect, the Originator is responsible for the + functions of the Mail Submission Agent. + + The Originator operates with dual allegiance. It serves the Author + and can be the same entity. But its role in assuring validity means + that it also represents the local operator of the MHS, that is, the + local ADministrative Management Domain (ADMD). + + + + +Crocker Informational [Page 12] + +RFC 5598 Email Architecture July 2009 + + + The Originator also performs any post-submission, Author-related + administrative tasks associated with message transfer and delivery. + Notably, these tasks pertain to sending error and delivery notices, + enforcing local policies, and dealing with messages from the Author + that prove to be problematic for the Internet. The Originator is + accountable for the message content, even when it is not responsible + for it. The Author creates the message, but the Originator handles + any transmission issues with it. + +2.2.2. Relay + + The Relay performs MHS-level transfer-service routing and store-and- + forward by transmitting or retransmitting the message to its + Recipients. The Relay adds trace information [RFC2505] but does not + modify the envelope information or the message content semantics. It + can modify message content representation, such as changing the form + of transfer encoding from binary to text, but only as required to + meet the capabilities of the next hop in the MHS. + + A Message Handling System (MHS) network consists of a set of Relays. + This network is above any underlying packet-switching network that + might be used and below any Gateways or other Mediators. + + In other words, email scenarios can involve three distinct + architectural layers, each providing its own type of data of store- + and-forward service: + + * User Mediators + + * MHS Relays + + * Packet Switches + + The bottom layer is the Internet's IP service. The most basic email + scenarios involve Relays and Switches. + + When a Relay stops attempting to transfer a message, it becomes an + Author because it sends an error message to the Return Address. The + potential for looping is avoided by omitting a Return Address from + this message. + +2.2.3. Gateway + + A Gateway is a hybrid of User and Relay that connects heterogeneous + mail services. Its purpose is to emulate a Relay and the closer it + comes to this, the better. A Gateway operates as a User when it + needs the ability to modify message content. + + + + +Crocker Informational [Page 13] + +RFC 5598 Email Architecture July 2009 + + + Differences between mail services can be as small as minor syntax + variations, but they usually encompass significant, semantic + distinctions. One difference could be email addresses that are + hierarchical and machine-specific rather than a flat, global + namespace. Another difference could be support for text-only content + or multimedia. Hence the Relay function in a Gateway presents a + significant design challenge if the resulting performance is to be + seen as nearly seamless. The challenge is to ensure User-to-User + functionality between the services, despite differences in their + syntax and semantics. + + The basic test of Gateway design is whether an Author on one side of + a Gateway can send a useful message to a Recipient on the other side, + without requiring changes to any components in the Author's or + Recipient's mail services other than adding the Gateway. To each of + these otherwise independent services, the Gateway appears to be a + native participant. But the ultimate test of Gateway design is + whether the Author and Recipient can sustain a dialogue. In + particular, can a Recipient's MUA automatically formulate a valid + Reply that will reach the Author? + +2.2.4. Receiver + + The Receiver performs final delivery or sends the message to an + alternate address. It can also perform filtering and other policy + enforcement immediately before or after delivery. + +2.3. Administrative Actors + + Administrative Actors can be associated with different organizations, + each with its own administrative authority. This operational + independence, coupled with the need for interaction between groups, + provides the motivation to distinguish among ADministrative + Management Domains (ADMDs). Each ADMD can have vastly different + operating policies and trust-based decision-making. One obvious + example is the distinction between mail that is exchanged within an + organization and mail that is exchanged between independent + organizations. The rules for handling both types of traffic tend to + be quite different. That difference requires defining the boundaries + of each, and this requires the ADMD construct. + + Operation of Internet Mail services is carried out by different + providers (or operators). Each can be an independent ADMD. This + independence of administrative decision-making defines boundaries + that distinguish different portions of the Internet Mail service. A + department that operates a local Relay, an IT department that + operates an enterprise Relay, and an ISP that operates a public + shared email service can be configured into many combinations of + + + +Crocker Informational [Page 14] + +RFC 5598 Email Architecture July 2009 + + + administrative and operational relationships. Each is a distinct + ADMD, potentially having a complex arrangement of functional + components. Figure 4 depicts relationships among ADMDs. The benefit + of the ADMD construct is that it facilitates discussion about + designs, policies, and operations that need to distinguish between + internal issues and external ones. + + The architectural impact of the need for boundaries between ADMDs is + discussed in [Tussle]. Most significant is that the entities + communicating across ADMD boundaries typically have the added burden + of enforcing organizational policies concerning external + communications. At a more mundane level, routing mail between ADMDs + can be an issue, such as needing to route mail between organizational + partners over specially trusted paths. + + These are three basic types of ADMDs: + + Edge: Independent transfer services in networks at the edge of + the open Internet Mail service. + + Consumer: Might be a type of Edge service, as is common for web- + based email access. + + Transit: Mail Service Providers (MSPs) that offer value-added + capabilities for Edge ADMDs, such as aggregation and + filtering. + + The mail-level transit service is different from packet-level + switching. End-to-end packet transfers usually go through + intermediate routers; email exchange across the open Internet can be + directly between the Boundary MTAs of Edge ADMDs. This distinction + between direct and indirect interaction highlights the differences + discussed in Section 2.2.2. + + + + + + + + + + + + + + + + + + +Crocker Informational [Page 15] + +RFC 5598 Email Architecture July 2009 + + + +--------+ +---------+ +-------+ +-----------+ + | ADMD1 |<===>| ADMD2 |<===>| ADMD3 |<===>| ADMD4 | + | ----- | | ----- | | ----- | | ----- | + | | | | | | | | + | Author | | | | | | Recipient | + | . | | | | | | ^ | + | V | | | | | | . | + | Edge..+....>|.Transit.+....>|-Edge..+....>|..Consumer | + | | | | | | | | + +--------+ +---------+ +-------+ +-----------+ + + Legend: === lines indicate primary (possibly indirect) + transfers or roles + ... lines indicate supporting transfers or roles + + Figure 4: Administrative Domain (ADMD) Example + + Edge networks can use proprietary email standards internally. + However, the distinction between Transit network and Edge network + transfer services is significant because it highlights the need for + concern over interaction and protection between independent + administrations. In particular, this distinction calls for + additional care in assessing the transitions of responsibility and + the accountability and authorization relationships among participants + in message transfer. + + The interactions of ADMD components are subject to the policies of + that domain, which cover concerns such as these: + + * Reliability + + * Access control + + * Accountability + + * Content evaluation and modification + + These policies can be implemented in different functional components, + according to the needs of the ADMD. For example, see [RFC5068]. + + Consumer, Edge, and Transit services can be offered by providers that + operate component services or sets of services. Further, it is + possible for one ADMD to host services for other ADMDs. + + + + + + + + +Crocker Informational [Page 16] + +RFC 5598 Email Architecture July 2009 + + + These are common examples of ADMDs: + + Enterprise Service Providers: + + These ADMDs operate the internal data and/or the mail services + within an organization. + + Internet Service Providers (ISP): + + These ADMDs operate the underlying data communication services, + which are used by one or more Relay and User. ISPs are not + responsible for performing email functions, but they can provide + an environment in which those functions can be performed. + + Mail Service Providers: + + These ADMDs operate email services, such as for consumers or + client companies. + + Practical operational concerns demand that providers be involved in + administration and enforcement issues. This involvement can extend + to operators of lower-level packet services. + +3. Identities + + The forms of identity used by Internet Mail are: mailbox, domain + name, message-ID, and ENVID (envelope identifier). Each is globally + unique. + +3.1. Mailbox + + "A mailbox receives mail. It is a conceptual entity that does not + necessarily pertain to file storage." [RFC5322] + + A mailbox is specified as an Internet Mail address <addr-spec>. It + has two distinct parts, separated by an at-sign (@). The right side + is a globally interpreted domain name associated with an ADMD. + Domain names are discussed in Section 3.3. Formal Internet Mail + addressing syntax can support source routes to indicate the path + through which a message ought to be sent. The use of source routes + is not common and has been deprecated in [RFC5321]. + + The portion to the left of the at-sign contains a string that is + globally opaque and is called the <local-part>. It is interpreted + only by the entity specified by the address's domain name. Except as + noted later in this section, all other entities treat the + <local-part> as an uninterpreted literal string and preserve all + + + + +Crocker Informational [Page 17] + +RFC 5598 Email Architecture July 2009 + + + of its original details. As such, its public distribution is + equivalent to sending a Web browser "cookie" that is only interpreted + upon being returned to its creator. + + Some local-part values have been standardized for contacting + personnel at an organization. These names cover common operations + and business functions [RFC2142]. + + It is common for sites to have local structuring conventions for the + left-hand side, <local-part>, of an <addr-spec>. This permits sub- + addressing, such as for distinguishing different discussion groups + used by the same participant. However, it is worth stressing that + these conventions are strictly private to the User's organization and + are not interpreted by any domain except the one listed in the right + side of the <addr-spec>. The exceptions are those specialized + services that conform to public, standardized conventions, as noted + below. + + Basic email addressing defines the <local-part> as being globally + opaque. However, there are some uses of email that add a + standardized, global schema to the value, such as between an Author + and a Gateway. The <local-part> details remain invisible to the + public email transfer infrastructure, but provide addressing and + handling instructions for further processing by the Gateway. + Standardized examples of these conventions are the telephone + numbering formats for the Voice Profile for Internet Mail (VPIM) + [RFC3801], such as: + + +16137637582@vpim.example.com, + + and iFax ([RFC3192], [RFC4143] such as: + + FAX=+12027653000/T33S=1387@ifax.example.com. + +3.2. Scope of Email Address Use + + Email addresses are being used far beyond their original role in + email transfer and delivery. In practical terms, an email address + string has become the common identifier for representing online + identity. Hence, it is essential to be clear about both the nature + and role of an identity string in a particular context and the entity + responsible for setting that string. For example, see Sections + 4.1.4, 4.3.3, and 5. + + + + + + + + +Crocker Informational [Page 18] + +RFC 5598 Email Architecture July 2009 + + +3.3. Domain Names + + A domain name is a global reference to an Internet resource, such as + a host, a service, or a network. A domain name usually maps to one + or more IP Addresses. Conceptually, the name can encompass an + organization, a collection of machines integrated into a homogeneous + service, or a single machine. A domain name can be administered to + refer to an individual User, but this is not common practice. The + name is structured as a hierarchical sequence of labels, separated by + dots (.), with the top of the hierarchy being on the right end of the + sequence. There can be many names in the sequence -- that is, the + depth of the hierarchy can be substantial. Domain names are defined + and operated through the Domain Name System (DNS) ([RFC1034], + [RFC1035], [RFC2181]). + + When not part of a mailbox address, a domain name is used in Internet + Mail to refer to the ADMD or to the host that took action upon the + message, such as providing the administrative scope for a message + identifier or performing transfer processing. + +3.4. Message Identifier + + There are two standardized tags for identifying messages: Message-ID: + and ENVID. A Message-ID: pertains to content, and an ENVID pertains + to transfer. + +3.4.1. Message-ID + + IMF provides for, at most, a single Message-ID:. The Message-ID: for + a single message, which is a user-level IMF tag, has a variety of + uses including threading, aiding identification of duplicates, and + DSN (Delivery Status Notification) tracking. The Originator assigns + the Message-ID:. The Recipient's ADMD is the intended consumer of + the Message-ID:, although any Actor along the transfer path can use + it. + + Message-ID: is globally unique. Its format is similar to that of a + mailbox, with two distinct parts separated by an at-sign (@). + Typically, the right side specifies the ADMD or host that assigns the + identifier, and the left side contains a string that is globally + opaque and serves to uniquely identify the message within the domain + referenced on the right side. The duration of uniqueness for the + message identifier is undefined. + + When a message is revised in any way, the decision whether to assign + a new Message-ID: requires a subjective assessment to determine + whether the editorial content has been changed enough to constitute a + new message. [RFC5322] states that "a message identifier pertains to + + + +Crocker Informational [Page 19] + +RFC 5598 Email Architecture July 2009 + + + exactly one version of a particular message; subsequent revisions to + the message each receive new message identifiers." Yet experience + suggests that some flexibility is needed. An impossible test is + whether the Recipient will consider the new message to be equivalent + to the old one. For most components of Internet Mail, there is no + way to predict a specific Recipient's preferences on this matter. + Both creating and failing to create a new Message-ID: have their + downsides. + + Here are some guidelines and examples: + + o If a message is changed only in form, such as character encoding, + it is still the same message. + + o If a message has minor additions to the content, such as a Mailing + List tag at the beginning of the RFC5322.Subject header field, or + some Mailing List administrative information added to the end of + the primary body part text, it is probably the same message. + + o If a message has viruses deleted from it, it is probably the same + message. + + o If a message has offensive words deleted from it, some Recipients + will consider it the same message, but some will not. + + o If a message is translated into a different language, some + Recipients will consider it the same message, but some will not. + + o If a message is included in a digest of messages, the digest + constitutes a new message. + + o If a message is forwarded by a Recipient, what is forwarded is a + new message. + + o If a message is "redirected", such as using IMF "Resent-*" header + fields, some Recipients will consider it the same message, but + some will not. + + The absence of both objective, precise criteria for regenerating a + Message-ID: and strong protection associated with the string means + that the presence of an ID can permit an assessment that is + marginally better than a heuristic, but the ID certainly has no value + on its own for strict formal reference or comparison. For that + reason, the Message-ID: is not intended to be used for any function + that has security implications. + + + + + + +Crocker Informational [Page 20] + +RFC 5598 Email Architecture July 2009 + + +3.4.2. ENVID + + The ENVID (envelope identifier) can be used for message-tracking + purposes ([RFC3885], [RFC3464]) concerning a single posting/delivery + transfer. The ENVID labels a single transit of the MHS by a specific + message. So, the ENVID is used for one message posting until that + message is delivered. A re-posting of the message, such as by a + Mediator, does not reuse that ENVID, but can use a new one, even + though the message might legitimately retain its original + Message-ID:. + + The format of an ENVID is free form. Although its creator might + choose to impose structure on the string, none is imposed by Internet + standards. By implication, the scope of the string is defined by the + domain name of the Return Address. + +4. Services and Standards + + The Internet Mail architecture comprises six basic types of + functionality, which are arranged to support a store-and-forward + service. As shown in Figure 5, each type can have multiple + instances, some of which represent specialized roles. This section + considers the activities and relationships among these components, + and the Internet Mail standards that apply to them. + + Message + + Message User Agent (MUA) + + Author MUA (aMUA) + + Recipient MUA (rMUA) + + Message Submission Agent (MSA) + + Author-focused MSA functions (aMSA) + + MHS-focused MSA functions (hMSA) + + Message Transfer Agent (MTA) + + Message Delivery Agent (MDA) + + Recipient-focused MDA functions (rMDA) + + MHS-focused MDA functions (hMDA) + + + + + +Crocker Informational [Page 21] + +RFC 5598 Email Architecture July 2009 + + + Message Store (MS) + + Author MS (aMS) + + Recipient MS (rMS) + + This figure shows function modules and the standardized protocols + used between them. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Crocker Informational [Page 22] + +RFC 5598 Email Architecture July 2009 + + + ++========++ + || || +-------+ + ...........++ aMUA ||<............................+ Disp | + . || || +-------+ + . ++=+==+===++ ^ + . local,imap}| |{smtp,submission . + . +-----+ | | +--------+ . + . | aMS |<---+ | ........................>| Return | . + . +-----+ | . +--------+ . + . | . ***************** ^ . + . +-----V-.----*------------+ * . . + . MSA | +-------+ * +------+ | * . . + . | | aMSA +-(S)->| hMSA | | * . . + . | +-------+ * +--+---+ | * . . + V +------------*------+-----+ * . . + //==========\\ * V {smtp * . . + || MESSAGE || * +------+ * //===+===\\ . + ||----------|| MHS * | MTA | * || dsn || . + || ENVELOPE || * +--+---+ * \\=======// . + || smtp || * V {smtp * ^ ^ . + || CONTENT || * +------+ * . . //==+==\\ + || imf || * | MTA +....*...... . || mdn || + || mime || * +--+---+ * . \\=====// + \\==========// * smtp}| {local * . ^ + . MDA * | {lmtp * . . + . +----------------+------V-----+ * . . + . | +----------+ * +------+ | * . . + . | | | * | | +..*.......... . + . | | rMDA |<-(D)--+ hMDA | | * . + . | | | * | | |<.*........ . + . | +-+------+-+ * +------+ | * . . + . +------+---------*------------+ * . . + . smtp,local}| ***************** . . + . V . . + . +-----+ //===+===\\ . + . | rMS | || sieve || . + . +--+--+ \\=======// . + . |{imap,pop,local ^ . + . V . . + . ++==========++ . . + . || || . . + .......>|| rMUA ++........................... . + || ++................................... + ++==========++ + + Legend: --- lines indicate primary (possibly indirect) + transfers or roles + === boxes indicate data objects + + + +Crocker Informational [Page 23] + +RFC 5598 Email Architecture July 2009 + + + ... lines indicate supporting transfers or roles + *** lines indicate aggregated service + + Figure 5: Protocols and Services + +4.1. Message Data + + The purpose of the Message Handling System (MHS) is to exchange an + IMF message object among participants [RFC5322]. All of its + underlying mechanisms serve to deliver that message from its Author + to its Recipients. A message can be explicitly labeled as to its + nature [RFC3458]. + + A message comprises a transit-handling envelope and the message + content. The envelope contains information used by the MHS. The + content is divided into a structured header and the body. The header + comprises transit-handling trace information and structured fields + that are part of the Author's message content. The body can be + unstructured lines of text or a tree of multimedia subordinate + objects, called "body-parts" or, popularly, "attachments". + [RFC2045], [RFC2046], [RFC2047], [RFC4288], [RFC4289], [RFC2049]. + + In addition, Internet Mail has a few conventions for special control + data, notably: + + Delivery Status Notification (DSN): + + A Delivery Status Notification (DSN) is a message that can be + generated by the MHS (MSA, MTA, or MDA) and sent to the + RFC5321.MailFrom address. MDA and MTA are shown as sources of + DSNs in Figure 5, and the destination is shown as Returns. DSNs + provide information about message transit, such as transfer errors + or successful delivery [RFC3461]. + + Message Disposition Notification (MDN): + + A Message Disposition Notification (MDN) is a message that + provides information about post-delivery processing, such as + indicating that the message has been displayed [RFC3798] or the + form of content that can be supported [RFC3297]. It can be + generated by an rMUA and is sent to the + Disposition-Notification-To addresses. The mailbox for this is + shown as Disp in Figure 5. + + + + + + + + +Crocker Informational [Page 24] + +RFC 5598 Email Architecture July 2009 + + + Message Filtering (SIEVE): + + Sieve is a scripting language used to specify conditions for + differential handling of mail, typically at the time of delivery + [RFC5228]. Scripts can be conveyed in a variety of ways, such as + a MIME part in a message. Figure 5 shows a Sieve script going + from the rMUA to the MDA. However, filtering can be done at many + different points along the transit path, and any one or more of + them might be subject to Sieve directives, especially within a + single ADMD. Figure 5 shows only one relationship, for (relative) + simplicity. + +4.1.1. Envelope + + Internet Mail has a fragmented framework for transit-related handling + information. Information that is used directly by the MHS is called + the "envelope". It directs handling activities by the transfer + service and is carried in transfer-service commands. That is, the + envelope exists in the transfer protocol SMTP [RFC5321]. + + Trace information, such as RFC5322.Received, is recorded in the + message header and is not subsequently altered [RFC5322]. + +4.1.2. Header Fields + + Header fields are attribute name/value pairs that cover an extensible + range of email-service parameters, structured user content, and user + transaction meta-information. The core set of header fields is + defined in [RFC5322]. It is common practice to extend this set for + different applications. Procedures for registering header fields are + defined in [RFC3864]. An extensive set of existing header field + registrations is provided in [RFC4021]. + + One danger of placing additional information in header fields is that + Gateways often alter or delete them. + +4.1.3. Body + + The body of a message might be lines of ASCII text or a + hierarchically structured composition of multimedia body part + attachments using MIME ([RFC2045], [RFC2046], [RFC2047], [RFC4288], + and [RFC2049]). + +4.1.4. Identity References in a Message + + Table 1 lists the core identifiers present in a message during + transit. + + + + +Crocker Informational [Page 25] + +RFC 5598 Email Architecture July 2009 + + + +----------------------+----------------+---------------------------+ + | Layer | Field | Set By | + +----------------------+----------------+---------------------------+ + | Message Body | MIME Header | Author | + | Message header | From: | Author | + | fields | | | + | | Sender: | Originator | + | | Reply-To: | Author | + | | To:, CC:, BCC: | Author | + | | Message-ID: | Originator | + | | Received: | Originator, Relay, | + | | | Receiver | + | | Return-Path: | MDA, from MailFrom | + | | Resent-*: | Mediator | + | | List-Id: | Mediator | + | | List-*: | Mediator | + | SMTP | HELO/EHLO | Latest Relay Client | + | | ENVID | Originator | + | | MailFrom | Originator | + | | RcptTo | Author | + | | ORCPT | Originator | + | IP | Source Address | Latest Relay Client | + +----------------------+----------------+---------------------------+ + + Legend: + Layer - The part of the email architecture that uses the + identifier. + + Field - The protocol construct that contains the identifier. + + Set By - The Actor role responsible for specifying the identifier + value (and this can be different from the Actor that performs the + fill-in function for the protocol construct). + + Table 1: Layered Identities + + These are the most common address-related fields: + + RFC5322.From: Set by - Author + + Names and addresses for Authors of the message content are listed + in the From: field. + + + + + + + + + +Crocker Informational [Page 26] + +RFC 5598 Email Architecture July 2009 + + + RFC5322.Reply-To: Set by - Author + + If a Recipient sends a reply message that would otherwise use the + RFC5322.From field addresses in the original message, the + addresses in the RFC5322.Reply-To field are used instead. In + other words, this field overrides the From: field for responses + from Recipients. + + RFC5322.Sender: Set by - Originator + + This field specifies the address responsible for submitting the + message to the transfer service. This field can be omitted if it + contains the same address as RFC5322.From. However, omitting this + field does not mean that no Sender is specified; it means that + that header field is virtual and that the address in the From: + field is to be used. + + Specification of the notifications Return Addresses, which are + contained in RFC5321.MailFrom, is made by the RFC5322.Sender. + Typically, the Return address is the same as the Sender address. + However, some usage scenarios require it to be different. + + RFC5322.To/.CC: Set by - Author + + These fields specify MUA Recipient addresses. However, some or + all of the addresses in these fields might not be present in the + RFC5321.RcptTo commands. + + The distinction between To and CC is subjective. Generally, a To + addressee is considered primary and is expected to take action on + the message. A CC addressee typically receives a copy as a + courtesy. + + RFC5322.BCC: Set by - Author + + A copy of the message might be sent to an addressee whose + participation is not to be disclosed to the RFC5322.To or + RFC5322.CC Recipients and, usually, not to the other BCC + Recipients. The BCC: header field indicates a message copy to + such a Recipient. Use of this field is discussed in [RFC5322]. + + RFC5321.HELO/.EHLO: Set by - Originator, MSA, MTA + + Any SMTP client -- including Originator, MSA, or MTA -- can + specify its hosting domain identity for the SMTP HELO or EHLO + command operation. + + + + + +Crocker Informational [Page 27] + +RFC 5598 Email Architecture July 2009 + + + RFC3461.ENVID: Set by - Originator + + The MSA can specify an opaque string, to be included in a DSN, as + a means of assisting the Return Address Recipient in identifying + the message that produced a DSN or message tracking. + + RFC5321.MailFrom: Set by - Originator + + This field is an end-to-end string that specifies an email address + for receiving return control information, such as returned + messages. The name of this field is misleading, because it is not + required to specify either the Author or the Actor responsible for + submitting the message. Rather, the Actor responsible for + submission specifies the RFC5321.MailFrom address. Ultimately, + the simple basis for deciding which address needs to be in the + RFC5321.MailFrom field is to determine which address is to be + informed about transfer-level problems (and possibly successes). + + RFC5321.RcptTo: Set by - Author, Final MTA, MDA + + This field specifies the MUA mailbox address of a Recipient. The + string might not be visible in the message content header. For + example, the IMF destination address header fields, such as + RFC5322.To, might specify a Mailing List mailbox, while the + RFC5321.RcptTo address specifies a member of that list. + + RFC5321.ORCPT: Set by - Originator. + + This is an optional parameter to the RCPT command, indicating the + original address to which the current RCPT TO address corresponds, + after a mapping was performed during transit. An ORCPT is the + only reliable way to correlate a DSN from a multi-Recipient + message transfer with the intended Recipient. + + RFC5321.Received: Set by - Originator, Relay, Mediator, Dest + + This field contains trace information, including originating host, + Relays, Mediators, and MSA host domain names and/or IP Addresses. + + RFC5321.Return-Path: Set by - Originator + + The MDA records the RFC5321.MailFrom address into the + RFC5321.Return-Path field. + + RFC2919.List-Id: Set by - Mediator, Author + + This field provides a globally unique Mailing List naming + framework that is independent of particular hosts [RFC2919]. + + + +Crocker Informational [Page 28] + +RFC 5598 Email Architecture July 2009 + + + The identifier is in the form of a domain name; however, the + string usually is constructed by combining the two parts of an + email address. The result is rarely a true domain name, listed in + the domain name service, although it can be. + + RFC2369.List-*: Set by - Mediator, Author + + [RFC2369] defines a collection of message header fields for use by + Mailing Lists. In effect, they supply list-specific parameters + for common Mailing-List user operations. The identifiers for + these operations are for the list itself and the user-as- + subscriber [RFC2369]. + + RFC0791.SourceAddr: Set by - The Client SMTP sending host + immediately preceding the current receiving SMTP server + + [RFC0791] defines the basic unit of data transfer for the + Internet: the IP datagram. It contains a Source Address field + that specifies the IP Address for the host (interface) from which + the datagram was sent. This information is set and provided by + the IP layer, which makes it independent of mail-level mechanisms. + As such, it is often taken to be authoritative, although it is + possible to provide false addresses. + +4.2. User-Level Services + + Interactions at the user level entail protocol exchanges, distinct + from those that occur at lower layers of the Internet Mail MHS + architecture that is, in turn, above the Internet Transport layer. + Because the motivation for email, and much of its use, is for + interaction among people, the nature and details of these protocol + exchanges often are determined by the needs of interpersonal and + group communication. To accommodate the idiosyncratic behavior + inherent in such communication, only subjective guidelines, rather + than strict rules, can be offered for some aspects of system + behavior. Mailing Lists provide particularly salient examples. + +4.2.1. Message User Agent (MUA) + + A Message User Agent (MUA) works on behalf of User Actors and User + applications. It is their representative within the email service. + + The Author MUA (aMUA) creates a message and performs initial + submission into the transfer infrastructure via a Mail Submission + Agent (MSA). It can also perform any creation- and posting-time + archiving in its Message Store (aMS). An MUA aMS can organize + messages in many different ways. A common model uses aggregations, + called "folders"; in IMAP they are called "mailboxes". This model + + + +Crocker Informational [Page 29] + +RFC 5598 Email Architecture July 2009 + + + allows a folder for messages under development (Drafts), a folder for + messages waiting to be sent (Queued or Unsent), and a folder for + messages that have been successfully posted for transfer (Sent). But + none of these folders is required. For example, IMAP allows drafts + to be stored in any folder, so no Drafts folder needs to be present. + + The Recipient MUA (rMUA) works on behalf of the Recipient to process + received mail. This processing includes generating user-level + disposition control messages, displaying and disposing of the + received message, and closing or expanding the user-communication + loop by initiating replies and forwarding new messages. + + NOTE: Although not shown in Figure 5, an MUA itself can have a + distributed implementation, such as a "thin" user-interface + module on a constrained device such as a smartphone, with + most of the MUA functionality running remotely on a more + capable server. An example of such an architecture might use + IMAP [RFC3501] for most of the interactions between an MUA + client and an MUA server. An approach for such scenarios is + defined by [RFC4550]. + + A Mediator is a special class of MUA. It performs message + re-posting, as discussed in Section 2.1. + + An MUA can be automated, on behalf of a User who is not present at + the time the MUA is active. One example is a bulk sending service + that has a timed-initiation feature. These services are not to be + confused with a Mailing List Mediator, since there is no incoming + message triggering the activity of the automated service. + + A popular and problematic MUA is an automatic responder, such as one + that sends out-of-office notices. This behavior might be confused + with that of a Mediator, but this MUA is generating a new message. + Automatic responders can annoy Users of Mailing Lists unless they + follow [RFC3834]. + + The identity fields are relevant to a typical MUA: + + RFC5322.From + + RFC5322.Reply-To + + RFC5322.Sender + + RFC5322.To, RFC5322.CC + + RFC5322.BCC + + + + +Crocker Informational [Page 30] + +RFC 5598 Email Architecture July 2009 + + +4.2.2. Message Store (MS) + + An MUA can employ a long-term Message Store (MS). Figure 5 depicts + an Author's MS (aMS) and a Recipient's MS (rMS). An MS can be + located on a remote server or on the same machine as the MUA. + + An MS acquires messages from an MDA either proactively by a local + mechanism or even by a standardized mechanism such as SMTP(!), or + reactively by using POP or IMAP. The MUA accesses the MS either by a + local mechanism or by using POP or IMAP. Using POP for individual + message accesses, rather than for bulk transfer, is relatively rare + and inefficient. + +4.3. MHS-Level Services + +4.3.1. Mail Submission Agent (MSA) + + A Mail Submission Agent (MSA) accepts the message submitted by the + aMUA and enforces the policies of the hosting ADMD and the + requirements of Internet standards. An MSA represents an unusual + functional dichotomy. It represents the interests of the Author + (aMUA) during message posting, to facilitate posting success; it also + represents the interests of the MHS. In the architecture, these + responsibilities are modeled, as shown in Figure 5, by dividing the + MSA into two sub-components, aMSA and hMSA, respectively. Transfer + of responsibility for a single message, from an Author's environment + to the MHS, is called "posting". In Figure 5, it is marked as the + (S) transition, within the MSA. + + The hMSA takes transit responsibility for a message that conforms to + the relevant Internet standards and to local site policies. It + rejects messages that are not in conformance. The MSA performs final + message preparation for submission and effects the transfer of + responsibility to the MHS, via the hMSA. The amount of preparation + depends upon the local implementations. Examples of aMSA tasks + include adding header fields, such as Date: and Message-ID:, and + modifying portions of the message from local notations to Internet + standards, such as expanding an address to its formal IMF + representation. + + Historically, standards-based MUA/MSA message postings have used SMTP + [RFC5321]. The standard currently preferred is SUBMISSION [RFC4409]. + Although SUBMISSION derives from SMTP, it uses a separate TCP port + and imposes distinct requirements, such as access authorization. + + + + + + + +Crocker Informational [Page 31] + +RFC 5598 Email Architecture July 2009 + + + These identities are relevant to the MSA: + + RFC5321.HELO/.EHLO + + RFC3461.ENVID + + RFC5321.MailFrom + + RFC5321.RcptTo + + RFC5321.Received + + RFC0791.SourceAddr + +4.3.2. Message Transfer Agent (MTA) + + A Message Transfer Agent (MTA) relays mail for one application-level + "hop". It is like a packet switch or IP router in that its job is to + make routing assessments and to move the message closer to the + Recipients. Of course, email objects are typically much larger than + the payload of a packet or datagram, and the end-to-end latencies are + typically much higher. Relaying is performed by a sequence of MTAs + until the message reaches a destination MDA. Hence, an MTA + implements both client and server MTA functionality; it does not + change addresses in the envelope or reformulate the editorial + content. A change in data form, such as to MIME Content-Transfer- + Encoding, is within the purview of an MTA, but removal or replacement + of body content is not. An MTA also adds trace information + [RFC2505]. + + NOTE: Within a destination ADMD, email-relaying modules can make a + variety of changes to the message, prior to delivery. In + such cases, these modules are acting as Gateways, rather than + MTAs. + + Internet Mail uses SMTP ([RFC5321], [RFC2821], [RFC0821]) primarily + to effect point-to-point transfers between peer MTAs. Other transfer + mechanisms include Batch SMTP [RFC2442] and On-Demand Mail Relay + (ODMR) SMTP [RFC2645]. As with most network-layer mechanisms, the + Internet Mail SMTP supports a basic level of reliability, by virtue + of providing for retransmission after a temporary transfer failure. + Unlike typical packet switches (and Instant Messaging services), + Internet Mail MTAs are expected to store messages in a manner that + allows recovery across service interruptions, such as host-system + shutdown. The degree of such robustness and persistence by an MTA + can vary. The base SMTP specification provides a framework for + protocol response codes. An extensible enhancement to this framework + is defined in [RFC5248]. + + + +Crocker Informational [Page 32] + +RFC 5598 Email Architecture July 2009 + + + Although quite basic, the dominant routing mechanism for Internet + Mail is the DNS MX record [RFC1035], which specifies an MTA through + which the queried domain can be reached. This mechanism presumes a + public, or at least a common, backbone that permits any attached MTA + to connect to any other. + + MTAs can perform any of these well-established roles: + + Boundary MTA: An MTA that is part of an ADMD and interacts with MTAs + in other ADMDs. This is also called a Border MTA. + There can be different Boundary MTAs, according to the + direction of mail-flow. + + Outbound MTA: An MTA that relays messages to other + ADMDs. + + Inbound MTA: An MTA that receives inbound SMTP + messages from MTA Relays in other + ADMDs, for example, an MTA running on + the host listed as the target of an MX + record. + + Final MTA: The MTA that transfers a message to the MDA. + + These identities are relevant to the MTA: + + RFC5321.HELO/.EHLO + + RFC3461.ENVID + + RFC5321.MailFrom + + RFC5321.RcptTo + + RFC5322.Received: Set by - Relay Server + + RFC0791.SourceAddr + +4.3.3. Mail Delivery Agent (MDA) + + A transfer of responsibility from the MHS to a Recipient's + environment (mailbox) is called "delivery". In the architecture, as + depicted in Figure 5, delivery takes place within a Mail Delivery + Agent (MDA) and is shown as the (D) transition from the MHS-oriented + MDA component (hMDA) to the Recipient-oriented MDA component (rMDA). + + + + + + +Crocker Informational [Page 33] + +RFC 5598 Email Architecture July 2009 + + + An MDA can provide distinctive, address-based functionality, made + possible by its detailed information about the properties of the + destination address. This information might also be present + elsewhere in the Recipient's ADMD, such as at an organizational + border (Boundary) Relay. However, it is required for the MDA, if + only because the MDA is required to know where to deliver the + message. + + Like an MSA, an MDA serves two roles, as depicted in Figure 5. + Formal transfer of responsibility, called "delivery", is effected + between the two components that embody these roles and is shown as + "(D)" in Figure 5. The MHS portion (hMDA) primarily functions as a + server SMTP engine. A common additional role is to redirect the + message to an alternative address, as specified by the Recipient + addressee's preferences. The job of the Recipient portion of the MDA + (rMDA) is to perform any delivery actions that the Recipient + specifies. + + Transfer into the MDA is accomplished by a normal MTA transfer + mechanism. Transfer from an MDA to an MS uses an access protocol, + such as POP or IMAP. + + NOTE: The term "delivery" can refer to the formal, MHS function + specified here or to the first time a message is displayed to + a Recipient. A simple, practical test for whether the MHS- + based definition applies is whether a DSN can be generated. + + These identities are relevant to the MDA: + + RFC5321.Return-Path: Set by - Author Originator or Mediator + Originator + + The MDA records the RFC5321.MailFrom address into the + RFC5321.Return-Path field. + + RFC5322.Received: Set by - MDA server + + An MDA can record a Received: header field to indicate trace + information, including source host and receiving host domain + names and/or IP Addresses. + +4.4. Transition Modes + + From the origination site to the point of delivery, Internet Mail + usually follows a "push" model. That is, the Actor that holds the + message initiates transfer to the next venue, typically with SMTP + [RFC5321] or the Local Mail Transfer Protocol (LMTP) [RFC2033]. With + a "pull" model, the Actor that holds the message waits for the Actor + + + +Crocker Informational [Page 34] + +RFC 5598 Email Architecture July 2009 + + + in the next venue to initiate a request for transfer. Standardized + mechanisms for pull-based MHS transfer are ETRN [RFC1985] and ODMR + [RFC2645]. + + After delivery, the Recipient's MUA (or MS) can gain access by having + the message pushed to it or by having the receiver of access pull the + message, such as by using POP [RFC1939] and IMAP [RFC3501]. + +4.5. Implementation and Operation + + A discussion of any interesting system architecture often bogs down + when architecture and implementation are confused. An architecture + defines the conceptual functions of a service, divided into discrete + conceptual modules. An implementation of that architecture can + combine or separate architectural components, as needed for a + particular operational environment. For example, a software system + that primarily performs message relaying is an MTA, yet it might also + include MDA functionality. That same MTA system might be able to + interface with non-Internet email services and thus perform both as + an MTA and as a Gateway. + + Similarly, implemented modules might be configured to form + elaborations of the architecture. An interesting example is a + distributed MS. One portion might be a remote server and another + might be local to the MUA. As discussed in [RFC1733], there are + three operational relationships among such MSs: + + Online: The MS is remote, and messages are accessible only when the + MUA is attached to the MS so that the MUA will re-fetch all or + part of a message from one session to the next. + + Offline: The MS is local to the User, and messages are completely + moved from any remote store, rather than (also) being retained + there. + + Disconnected: An rMS and a uMS are kept synchronized, for all or + part of their contents, while they are connected. When they are + disconnected, mail can arrive at the rMS and the User can make + changes to the uMS. The two stores are re-synchronized when they + are reconnected. + +5. Mediators + + Basic message transfer from Author to Recipients is accomplished by + using an asynchronous store-and-forward communication infrastructure + in a sequence of independent transmissions through some number of + MTAs. A very different task is a sequence of postings and deliveries + through Mediators. A Mediator forwards a message through a + + + +Crocker Informational [Page 35] + +RFC 5598 Email Architecture July 2009 + + + re-posting process. The Mediator shares some functionality with + basic MTA relaying, but has greater flexibility in both addressing + and content than is available to MTAs. + + This is the core set of message information that is commonly set by + all types of Mediators: + + RFC5321.HELO/.EHLO: Set by - Mediator Originator + + RFC3461.ENVID: Set by - Mediator Originator + + RFC5321.RcptTo: Set by - Mediator Author + + RFC5321.Received: Set by - Mediator Dest + + The Mediator can record received information to indicate the + delivery to the original address and submission to the alias + address. The trace of Received: header fields can include + everything from original posting, through relaying, to final + delivery. + + The aspect of a Mediator that distinguishes it from any other MUA + creating a message is that a Mediator preserves the integrity and + tone of the original message, including the essential aspects of its + origination information. The Mediator might also add commentary. + + Examples of MUA messages that a Mediator does not create include: + + New message that forwards an existing message: + + Although this action provides a basic template for a class of + Mediators, its typical occurrence is not, itself, an example of + a Mediator. The new message is viewed as being from the Actor + that is doing the forwarding, rather than from the original + Author. + A new message encapsulates the original message and is seen as + from the new Originator. This Mediator Originator might add + commentary and can modify the original message content. + Because the forwarded message is a component of the message + sent by the new Originator, the new message creates a new + dialogue. However, the final Recipient still sees the + contained message as from the original Author. + + Reply: + + When a Recipient responds to the Author of a message, the new + message is not typically viewed as a forwarding of the + original. Its focus is the new content, although it might + + + +Crocker Informational [Page 36] + +RFC 5598 Email Architecture July 2009 + + + contain all or part of the material from the original message. + The earlier material is merely contextual and secondary. This + includes automated replies, such as vacation out-of-office + notices, as discussed in Section 4.2.1. + + Annotation: + + The integrity of the original message is usually preserved, but + one or more comments about the message are added in a manner + that distinguishes commentary from original text. The primary + purpose of the new message is to provide commentary from a new + Author, similar to a Reply. + + The remainder of this section describes common examples of Mediators. + +5.1. Alias + + One function of an MDA is to determine the internal location of a + mailbox in order to perform delivery. An Alias is a simple + re-addressing facility that provides one or more new Internet Mail + addresses, rather than a single, internal one; the message continues + through the transfer service, for delivery to one or more alternate + addresses. Although typically implemented as part of an MDA, this + facility is a Recipient function. It resubmits the message, although + all handling information except the envelope Recipient + (rfc5321.RcptTo) address is retained. In particular, the Return + Address (rfc5321.MailFrom) is unchanged. + + What is distinctive about this forwarding mechanism is how closely it + resembles normal MTA store-and-forward relaying. Its only + significant difference is that it changes the RFC5321.RcptTo value. + Because this change is so small, aliasing can be viewed as a part of + the lower-level mail-relaying activity. However, this small change + has a large semantic impact: The designated Recipient has chosen a + new Recipient. + + NOTE: When the replacement list includes more than one address, the + alias is increasingly likely to have delivery problems. Any + problem reports go to the original Author, not the + administrator of the alias entry. This makes it more + difficult to resolve the problem, because the original Author + has no knowledge of the Alias mechanism. + + Including the core set of message information listed at the beginning + of this section, Alias typically changes: + + + + + + +Crocker Informational [Page 37] + +RFC 5598 Email Architecture July 2009 + + + RFC5322.To/.CC/.BCC: Set by - Author + + These fields retain their original addresses. + + RFC5321.MailFrom: Set by - Author + + The benefit of retaining the original MailFrom value is to + ensure that an Actor related to the originating ADMD knows + there has been a delivery problem. On the other hand, the + responsibility for handling problems, when transiting from the + original Recipient mailbox to the alias mailbox usually lies + with that original Recipient, because the Alias mechanism is + strictly under that Recipient's control. Retaining the + original MailFrom address prevents this. + +5.2. ReSender + + Also called the ReDirector, the ReSender's actions differ from + forwarding because the Mediator "splices" a message's addressing + information to connect the Author of the original message with the + Recipient of the new message. This connection permits them to have + direct exchange, using their normal MUA Reply functions, while also + recording full reference information about the Recipient who served + as a Mediator. Hence, the new Recipient sees the message as being + from the original Author, even if the Mediator adds commentary. + + Including the core set of message information listed at the beginning + of this section, these identities are relevant to a resent message: + + RFC5322.From: Set by - original Author + + Names and addresses for the original Author of the message + content are retained. The free-form (display-name) portion of + the address might be modified to provide an informal reference + to the ReSender. + + RFC5322.Reply-To: Set by - original Author + + If this field is present in the original message, it is + retained in the resent message. + + RFC5322.Sender: Set by - Author's Originator or Mediator + Originator + + RFC5322.To/.CC/.BCC: Set by - original Author + + These fields specify the original message Recipients. + + + + +Crocker Informational [Page 38] + +RFC 5598 Email Architecture July 2009 + + + RFC5322.Resent-From: Set by - Mediator Author + + This address is of the original Recipient who is redirecting + the message. Otherwise, the same rules apply to the Resent- + From: field as to an original RFC5322.From field. + + RFC5322.Resent-Sender: Set by - Mediator Originator + + The address of the Actor responsible for resubmitting the + message. As with RFC5322.Sender, this field can be omitted + when it contains the same address as RFC5322.Resent-From. + + RFC5322.Resent-To/-CC/-BCC: Set by - Mediator Author + + The addresses of the new Recipients who are now able to reply + to the original Author. + + RFC5321.MailFrom: Set by - Mediator Originator + + The Actor responsible for resubmission (RFC5322.Resent-Sender) + is also responsible for specifying the new MailFrom address. + +5.3. Mailing Lists + + A Mailing List receives messages as an explicit addressee and then + re-posts them to a list of subscribed members. The Mailing List + performs a task that can be viewed as an elaboration of the ReSender. + In addition to sending the new message to a potentially large number + of new Recipients, the Mailing List can modify content, for example, + by deleting attachments, converting the format, and adding list- + specific comments. Mailing Lists also archive messages posted by + Authors. Still the message retains characteristics of being from the + original Author. + + Including the core set of message information listed at the beginning + of this section, these identities are relevant to a Mailing List + processor when submitting a message: + + RFC2919.List-Id: Set by - Mediator Author + + RFC2369.List-*: Set by - Mediator Author + + RFC5322.From: Set by - original Author + + Names and email addresses for the original Author of the + message content are retained. + + + + + +Crocker Informational [Page 39] + +RFC 5598 Email Architecture July 2009 + + + RFC5322.Reply-To: Set by - Mediator or original Author + + Although problematic, it is common for a Mailing List to assign + its own addresses to the Reply-To: header field of messages + that it posts. This assignment is intended to ensure that + replies go to all list members, rather than to only the + original Author. As a User Actor, a Mailing List is the Author + of the new message and can legitimately set the Reply-To: + value. As a Mediator attempting to represent the message on + behalf of its original Author, creating or modifying a + Reply-To: field can be viewed as violating that Author's + intent. When the Reply-To is modified in this way, a reply + that is meant only for the original Author will instead go to + the entire list. When the Mailing List does not set the field, + a reply meant for the entire list can instead go only to the + original Author. At best, either choice is a matter of group + culture for the particular list. + + RFC5322.Sender: Set by - Author Originator or Mediator Originator + + This field usually specifies the address of the Actor + responsible for Mailing List operations. Mailing Lists that + operate in a manner similar to a simple MTA Relay preserve as + much of the original handling information as possible, + including the original RFC5322.Sender field. (Note that this + mode of operation causes the Mailing List to behave much like + an Alias, with a possible difference in number of new + addressees.) + + RFC5322.To/.CC: Set by - original Author + + These fields usually contain the original list of Recipient + addresses. + + RFC5321.MailFrom: Set by - Mediator Originator + + Because a Mailing List can modify the content of a message in + any way, it is responsible for that content; that is, it is an + Author. As such, the Return Address is specified by the + Mailing List. Although it is plausible for the Mailing List to + reuse the Return Address employed by the original Originator, + notifications sent to that address after a message has been + processed by a Mailing List could be problematic. + + + + + + + + +Crocker Informational [Page 40] + +RFC 5598 Email Architecture July 2009 + + +5.4. Gateways + + A Gateway performs the basic routing and transfer work of message + relaying, but it also is permitted to modify content, structure, + address, or attributes as needed to send the message into a messaging + environment that operates under different standards or potentially + incompatible policies. When a Gateway connects two differing + messaging services, its role is easy to identify and understand. + When it connects environments that follow similar technical + standards, but significantly different administrative policies, it is + easy to view a Gateway as merely an MTA. + + The critical distinction between an MTA and a Gateway is that a + Gateway can make substantive changes to a message to map between the + standards. In virtually all cases, this mapping results in some + degree of semantic loss. The challenge of Gateway design is to + minimize this loss. Standardized Gateways to Internet Mail are + facsimile [RFC4143], voicemail [RFC3801], and the Multimedia + Messaging Service (MMS) [RFC4356]. + + A Gateway can set any identity field available to an MUA. Including + the core set of message information listed at the beginning of this + section, these identities are typically relevant to Gateways: + + RFC5322.From: Set by - original Author + + Names and addresses for the original Author of the message + content are retained. As for all original addressing + information in the message, the Gateway can translate addresses + as required to continue to be useful in the target environment. + + RFC5322.Reply-To: Set by - original Author + + It is best for a Gateway to retain this information, if it is + present. The ability to perform a successful reply by a + Recipient is a typical test of Gateway functionality. + + RFC5322.Sender: Set by - Author Originator or Mediator Originator + + This field can retain the original value or can be set to a new + address. + + RFC5322.To/.CC/.BCC: Set by - original Recipient + + These fields usually retain their original addresses. + + + + + + +Crocker Informational [Page 41] + +RFC 5598 Email Architecture July 2009 + + + RFC5321.MailFrom: Set by - Author Originator or Mediator + Originator + + The Actor responsible for handling the message can specify a + new address to receive handling notices. + +5.5. Boundary Filter + + To enforce security boundaries, organizations can subject messages to + analysis for conformance with its safety policies. An example is + detection of content classed as spam or a virus. A filter might + alter the content to render it safe, such as by removing content + deemed unacceptable. Typically, these actions add content to the + message that records the actions. + +6. Considerations + +6.1. Security Considerations + + This document describes the existing Internet Mail architecture. It + introduces no new capabilities. The security considerations of this + deployed architecture are documented extensively in the technical + specifications referenced by this document. These specifications + cover classic security topics, such as authentication and privacy. + For example, email-transfer protocols can use standardized mechanisms + for operation over authenticated and/or encrypted links, and message + content has similar protection standards available. Examples of such + mechanisms include SMTP-TLS [RFC3207], SMTP-Auth [RFC4954], OpenPGP + [RFC4880], and S/MIME [RFC3851]. + + The core of the Internet Mail architecture does not impose any + security requirements or functions on the end-to-end or hop-by-hop + components. For example, it does not require participant + authentication and does not attempt to prevent data disclosure. + + Particular message attributes might expose specific security + considerations. For example, the blind carbon copy feature of the + architecture invites disclosure concerns, as discussed in Section 7.2 + of [RFC5321] and Section 5 of [RFC5322]. Transport of text or non- + text content in this architecture has security considerations that + are discussed in [RFC5322], [RFC2045], [RFC2046], and [RFC4288]; + also, security considerations are present for some of the media types + registered with IANA. + + Agents that automatically respond to email raise significant security + considerations, as discussed in [RFC3834]. Gateway behaviors affect + end-to-end security services, as discussed in [RFC2480]. Security + considerations for boundary filters are discussed in [RFC5228]. + + + +Crocker Informational [Page 42] + +RFC 5598 Email Architecture July 2009 + + + See Section 7.1 of [RFC5321] for a discussion of the topic of + origination validation. As mentioned in Section 4.1.4, it is common + practice for components of this architecture to use the + RFC0791.SourceAddr to make policy decisions [RFC2505], although the + address can be "spoofed". It is possible to use it without + authorization. SMTP and Submission authentication ([RFC4409], + [RFC4954]) provide more secure alternatives. + + The discussion of trust boundaries, ADMDs, Actors, roles, and + responsibilities in this document highlights the relevance and + potential complexity of security factors for operation of an Internet + Mail service. The core design of Internet Mail to encourage open and + casual exchange of messages has met with scaling challenges, as the + population of email participants has grown to include those with + problematic practices. For example, spam, as defined in [RFC2505], + is a by-product of this architecture. A number of Standards Track or + BCP documents on the subject have been issued (see [RFC2505], + [RFC5068], and [RFC5235]). + +6.2. Internationalization + + The core Internet email standards are based on the use of US-ASCII -- + that is, SMTP [RFC5321] and IMF [RFC5322], as well as their + predecessors. They describe the transport and composition of + messages as composed strictly of US-ASCII 7-bit encoded characters. + The standards have been incrementally enhanced to allow for + characters outside of this limited set, while retaining mechanisms + for backwards-compatibility. Specifically: + + o The MIME specifications ([RFC2045], [RFC2046], [RFC2047], + [RFC2049]) allow for the use of coded character sets and + character-encoding schemes ("charsets" in MIME terminology) other + than US-ASCII. MIME's [RFC2046] allows the textual content of a + message to have a label affixed that specifies the charset used in + that content. Equally, MIME's [RFC2047] allows the textual + content of certain header fields in a message to be similarly + labeled. However, since messages might be transported over SMTP + implementations only capable of transporting 7-bit encoded + characters, MIME's [RFC2045] also provides for "content transfer + encoding" so that characters of other charsets can be re-encoded + as an overlay to US-ASCII. + + o MIME's [RFC2045] allows for the textual content of a message to be + in an 8-bit character-encoding scheme. In order to transport + these without re-encoding them, the SMTP specification supports an + option [RFC1652] that permits the transport of such textual + + + + + +Crocker Informational [Page 43] + +RFC 5598 Email Architecture July 2009 + + + content. However, the [RFC1652] option does not address the use + of 8-bit content in message header fields, and therefore [RFC2047] + encoding is still required for those. + + o A series of experimental protocols on Email Address + Internationalization (EAI) have been released that extend SMTP and + IMF to allow for 8-bit encoded characters to appear in addresses + and other information throughout the header fields of messages. + [RFC5335] specifies the format of such message header fields + (which encode the characters in UTF-8), and [RFC5336] specifies an + SMTP option for the transport of these messages. + + o MIME's [RFC2045] and [RFC2046] allow for the transport of true + multimedia material; such material enables internationalization + because it is not restricted to any particular language or locale. + + o The formats for Delivery Status Notifications (DSNs -- [RFC3462], + [RFC3463], [RFC3464]) and Message Disposition Notifications (MDNs + -- [RFC3798]) include both a structured and unstructured + representation of the notification. In the event that the + unstructured representation is in the wrong language or is + otherwise unsuitable for use, this allows an MUA to construct its + own appropriately localized representation of notification for + display to the User. + + o POP and IMAP have no difficulties with handling MIME messages, + including ones containing 8bit, and therefore are not a source of + internationalization issues. + + Hence, the use of UTF-8 is fully established in existing Internet + Mail. However, support for long-standing encoding forms is retained + and is still used. + + + + + + + + + + + + + + + + + + + +Crocker Informational [Page 44] + +RFC 5598 Email Architecture July 2009 + + +7. References + +7.1. Normative References + + [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791, + September 1981. + + [RFC1034] Mockapetris, P., "Domain names - concepts and facilities", + STD 13, RFC 1034, November 1987. + + [RFC1035] Mockapetris, P., "Domain names - implementation and + specification", STD 13, RFC 1035, November 1987. + + [RFC1939] Myers, J. and M. Rose, "Post Office Protocol - Version 3", + STD 53, RFC 1939, May 1996. + + [RFC2045] Freed, N. and N. Borenstein, "Multipurpose Internet Mail + Extensions (MIME) Part One: Format of Internet Message + Bodies", RFC 2045, November 1996. + + [RFC2046] Freed, N. and N. Borenstein, "Multipurpose Internet Mail + Extensions (MIME) Part Two: Media Types", RFC 2046, + November 1996. + + [RFC2047] Moore, K., "MIME (Multipurpose Internet Mail Extensions) + Part Three: Message Header Extensions for Non-ASCII Text", + RFC 2047, November 1996. + + [RFC2049] Freed, N. and N. Borenstein, "Multipurpose Internet Mail + Extensions (MIME) Part Five: Conformance Criteria and + Examples", RFC 2049, November 1996. + + [RFC2181] Elz, R. and R. Bush, "Clarifications to the DNS + Specification", RFC 2181, July 1997. + + [RFC2369] Neufeld, G. and J. Baer, "The Use of URLs as Meta-Syntax + for Core Mail List Commands and their Transport through + Message Header Fields", RFC 2369, July 1998. + + [RFC2645] Gellens, R., "ON-DEMAND MAIL RELAY (ODMR) SMTP with + Dynamic IP Addresses", RFC 2645, August 1999. + + [RFC2919] Chandhok, R. and G. Wenger, "List-Id: A Structured Field + and Namespace for the Identification of Mailing Lists", + RFC 2919, March 2001. + + [RFC3192] Allocchio, C., "Minimal FAX address format in Internet + Mail", RFC 3192, October 2001. + + + +Crocker Informational [Page 45] + +RFC 5598 Email Architecture July 2009 + + + [RFC3297] Klyne, G., Iwazaki, R., and D. Crocker, "Content + Negotiation for Messaging Services based on Email", + RFC 3297, July 2002. + + [RFC3458] Burger, E., Candell, E., Eliot, C., and G. Klyne, "Message + Context for Internet Mail", RFC 3458, January 2003. + + [RFC3461] Moore, K., "Simple Mail Transfer Protocol (SMTP) Service + Extension for Delivery Status Notifications (DSNs)", + RFC 3461, January 2003. + + [RFC3462] Vaudreuil, G., "The Multipart/Report Content Type for the + Reporting of Mail System Administrative Messages", + RFC 3462, January 2003. + + [RFC3463] Vaudreuil, G., "Enhanced Mail System Status Codes", + RFC 3463, January 2003. + + [RFC3501] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION + 4rev1", RFC 3501, March 2003. + + [RFC3798] Hansen, T. and G. Vaudreuil, "Message Disposition + Notification", RFC 3798, May 2004. + + [RFC3834] Moore, K., "Recommendations for Automatic Responses to + Electronic Mail", RFC 3834, August 2004. + + [RFC3864] Klyne, G., Nottingham, M., and J. Mogul, "Registration + Procedures for Message Header Fields", BCP 90, RFC 3864, + September 2004. + + [RFC4021] Klyne, G. and J. Palme, "Registration of Mail and MIME + Header Fields", RFC 4021, March 2005. + + [RFC4288] Freed, N. and J. Klensin, "Media Type Specifications and + Registration Procedures", BCP 13, RFC 4288, December 2005. + + [RFC4289] Freed, N. and J. Klensin, "Multipurpose Internet Mail + Extensions (MIME) Part Four: Registration Procedures", + BCP 13, RFC 4289, December 2005. + + [RFC4409] Gellens, R. and J. Klensin, "Message Submission for Mail", + RFC 4409, April 2006. + + [RFC4550] Maes, S. and A. Melnikov, "Internet Email to Support + Diverse Service Environments (Lemonade) Profile", + RFC 4550, June 2006. + + + + +Crocker Informational [Page 46] + +RFC 5598 Email Architecture July 2009 + + + [RFC5228] Guenther, P. and T. Showalter, "Sieve: An Email Filtering + Language", RFC 5228, January 2008. + + [RFC5248] Hansen, T. and J. Klensin, "A Registry for SMTP Enhanced + Mail System Status Codes", BCP 138, RFC 5248, June 2008. + + [RFC5321] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321, + October 2008. + + [RFC5322] Resnick, P., Ed., "Internet Message Format", RFC 5322, + October 2008. + +7.2. Informative References + + [RFC0733] Crocker, D., Vittal, J., Pogran, K., and D. Henderson, + "Standard for the format of ARPA network text messages", + RFC 733, November 1977. + + [RFC0821] Postel, J., "Simple Mail Transfer Protocol", STD 10, + RFC 821, August 1982. + + [RFC0822] Crocker, D., "Standard for the format of ARPA Internet + text messages", STD 11, RFC 822, August 1982. + + [RFC1506] Houttuin, J., "A Tutorial on Gatewaying between X.400 and + Internet Mail", RFC 1506, August 1993. + + [RFC1652] Klensin, J., Freed, N., Rose, M., Stefferud, E., and D. + Crocker, "SMTP Service Extension for 8bit-MIMEtransport", + RFC 1652, July 1994. + + [RFC1733] Crispin, M., "Distributed Electronic Mail Models in + IMAP4", RFC 1733, December 1994. + + [RFC1767] Crocker, D., "MIME Encapsulation of EDI Objects", + RFC 1767, March 1995. + + [RFC1985] De Winter, J., "SMTP Service Extension for Remote Message + Queue Starting", RFC 1985, August 1996. + + [RFC2033] Myers, J., "Local Mail Transfer Protocol", RFC 2033, + October 1996. + + [RFC2142] Crocker, D., "MAILBOX NAMES FOR COMMON SERVICES, ROLES AND + FUNCTIONS", RFC 2142, May 1997. + + [RFC2442] Freed, N., Newman, D., and Hoy, M., "The Batch SMTP Media + Type", RFC 2442, November 1998. + + + +Crocker Informational [Page 47] + +RFC 5598 Email Architecture July 2009 + + + [RFC2480] Freed, N., "Gateways and MIME Security Multiparts", + RFC 2480, January 1999. + + [RFC2505] Lindberg, G., "Anti-Spam Recommendations for SMTP MTAs", + BCP 30, RFC 2505, February 1999. + + [RFC2821] Klensin, J., "Simple Mail Transfer Protocol", RFC 2821, + April 2001. + + [RFC2822] Resnick, P., "Internet Message Format", RFC 2822, + April 2001. + + [RFC3207] Hoffman, P., "SMTP Service Extension for Secure SMTP over + Transport Layer Security", RFC 3207, February 2002. + + [RFC3464] Moore, K. and G. Vaudreuil, "An Extensible Message Format + for Delivery Status Notifications", RFC 3464, + January 2003. + + [RFC3801] Vaudreuil, G. and G. Parsons, "Voice Profile for Internet + Mail - version 2 (VPIMv2)", RFC 3801, June 2004. + + [RFC3851] Ramsdell, B., "Secure/Multipurpose Internet Mail + Extensions (S/MIME) Version 3.1 Message Specification", + RFC 3851, July 2004. + + [RFC3885] Allman, E. and T. Hansen, "SMTP Service Extension for + Message Tracking", RFC 3885, September 2004. + + [RFC4142] Crocker, D. and G. Klyne, "Full-mode Fax Profile for + Internet Mail (FFPIM)", RFC 4142, November 2005. + + [RFC4143] Toyoda, K. and D. Crocker, "Facsimile Using Internet Mail + (IFAX) Service of ENUM", RFC 4143, November 2005. + + [RFC4356] Gellens, R., "Mapping Between the Multimedia Messaging + Service (MMS) and Internet Mail", RFC 4356, January 2006. + + [RFC4880] Callas, J., Donnerhacke, L., Finney, H., Shaw, D., and R. + Thayer, "OpenPGP Message Format", RFC 4880, November 2007. + + [RFC4954] Siemborski, R. and A. Melnikov, "SMTP Service Extension + for Authentication", RFC 4954, July 2007. + + [RFC5068] Hutzler, C., Crocker, D., Resnick, P., Allman, E., and T. + Finch, "Email Submission Operations: Access and + Accountability Requirements", BCP 134, RFC 5068, + November 2007. + + + +Crocker Informational [Page 48] + +RFC 5598 Email Architecture July 2009 + + + [RFC5235] Daboo, C., "Sieve Email Filtering: Spamtest and Virustest + Extensions", RFC 5235, January 2008. + + [RFC5335] Abel, Y., "Internationalized Email Headers", RFC 5335, + September 2008. + + [RFC5336] Yao, J. and W. Mao, "SMTP Extension for Internationalized + Email Addresses", RFC 5336, September 2008. + + [Tussle] Clark, D., Wroclawski, J., Sollins, K., and R. Braden, + "Tussle in Cyberspace: Defining Tomorrow's Internet", + ACM SIGCOMM, 2002. + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Crocker Informational [Page 49] + +RFC 5598 Email Architecture July 2009 + + +Appendix A. Acknowledgments + + This work began in 2004 and has evolved through numerous rounds of + community review; it derives from a section in an early version of + [RFC5068]. Over its 5 years of development, the document has gone + through 14 incremental versions, with vigorous community review that + produced many substantive changes. Review was performed in the IETF + and other email technical venues. Although not a formal activity of + the IETF, issues with the document's contents were resolved using the + classic style of IETF community open, group decision-making. The + document is already cited in other work, such as in IMAP and Sieve + specifications and in academic classwork. The step of standardizing + is useful to provide a solid and stable reference to the Internet's + now-complex email service. + + Details of the Originator Actor role was greatly clarified during + discussions in the IETF's Marid working group. + + Graham Klyne, Pete Resnick, and Steve Atkins provided thoughtful + insight on the framework and details of the original drafts, as did + Chris Newman for the final versions, while also serving as cognizant + Area Director for the document. Tony Hansen served as document + shepherd through the IETF process. + + Later reviews and suggestions were provided by Eric Allman, Nathaniel + Borenstein, Ed Bradford, Cyrus Daboo, Frank Ellermann, Tony Finch, + Ned Freed, Eric Hall, Willemien Hoogendoorn, Brad Knowles, John + Leslie, Bruce Valdis Kletnieks, Mark E. Mallett, David MacQuigg, + Alexey Melnikov, der Mouse, S. Moonesamy, Daryl Odnert, Rahmat M. + Samik-Ibrahim, Marshall Rose, Hector Santos, Jochen Topf, Greg + Vaudreuil, Patrick Cain, Paul Hoffman, Vijay Gurbani, and Hans + Lachman. + + Diligent early proof-reading was performed by Bruce Lilly. Diligent + professional technical editing was provided by Susan Hunziker. + + The final stages of development for this document were guided by a + design team comprising Alexey Melnikov, Pete Resnick, Carl S. + Gutekunst, Jeff Macdonald, Randall Gellens, Tony Hansen, and Tony + Finch. Pete Resnick developed the final version of the section on + internationalization. + + + + + + + + + + +Crocker Informational [Page 50] + +RFC 5598 Email Architecture July 2009 + + +Index + + 7 + 7-bit 44 + + A + accountability 12 + accountable 13-14 + Actor + Administrative 14 + Author 10 + Consumer 15 + Edge 15 + Gateway 13 + Originator 12 + Recipient 10 + Return Handler 10 + Transit 15 + actor 7, 19, 26, 28-29, 35-36, 38-40, 42-43, 49 + Actors + MHS 11 + addr-spec 17 + address + addr-spec 17 + local-part 18 + ADMD 12, 14-15, 19, 25, 31, 37 + Administrative Actors 14 + Administrative Management Domain 12 + aMSA 31 + Author 10-11 + author 35 + + B + body parts 24 + bounce handler 10 + boundary 15 + + C + charset 44 + Consumer Actor 15 + content 11, 13-14, 20, 24, 32 + + D + delivery 4, 10-11, 13-14, 18, 24-25, 35, 37-38 + Discussion of document 7 + domain name 17, 21, 28 + DSN 44 + + + + +Crocker Informational [Page 51] + +RFC 5598 Email Architecture July 2009 + + + E + EAI 44 + Edge Actor 15 + encoding 44 + end-to-end 4-6, 11, 15, 28 + + envelope 10, 13, 21, 24-25, 32, 37 + ETRN 35 + + G + Gateway 11, 13 + gateway 6, 12-13, 18, 25, 32 + + H + header 24 + hMSA 31 + + I + identifier 18-19, 21, 25, 29 + IMAP 24, 31, 34-35, 44 + IMF 19, 24, 44 + Internet Mail 4 + + L + left-hand side 18 + LMTP 24, 35 + local-part 18 + + M + Mail 4 + Mail From 37 + Mail Submission Agent 12 + mailbox 17, 19, 24, 28, 30, 33, 37-38 + MDA 24, 37 + MDN 10, 24, 44 + message 6, 24 + Message Disposition Notification 10 + Message Handling Service 4 + Message Handling System 11 + Message Transfer Agent 4 + Message User Agent 4 + MHS 4, 10-13, 21-22, 24-25 + Actors 11 + MIME 24, 44 + MS 24 + MSA 12, 24, 31 + MTA 4, 15 + boundary 15 + + + +Crocker Informational [Page 52] + +RFC 5598 Email Architecture July 2009 + + + MUA 4, 14, 24, 30-31 + + O + ODMR 35 + operations 3, 15, 18, 29, 40 + Originator 10-12 + + P + POP 24, 31, 34-35, 44 + posting 4, 10, 12, 21, 30-31, 35, 37 + pull 35 + push 35 + + R + RcptTo 11 + Receiver 11 + Recipient 10-11, 37 + recipient 35 + relay 11 + responsibility 31 + responsible 13-14 + Return Address 37 + Return Handler 10 + role 10, 18 + Author 10 + Originator 12 + Recipient 10 + + S + SIEVE 24-25 + SMTP 24, 35, 44 + + T + transfer 11, 13-14 + Transit Actor 15 + transition 31 + + U + UA 4 + User Agent 4 + + + + + + + + + + + +Crocker Informational [Page 53] + +RFC 5598 Email Architecture July 2009 + + +Author's Address + + Dave Crocker + Brandenburg InternetWorking + 675 Spruce Drive + Sunnyvale, CA 94086 + USA + + Phone: +1.408.246.8253 + EMail: dcrocker@bbiw.net + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Crocker Informational [Page 54] + |