1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
|
Network Working Group V. Cerf (ARPA)
Request for Comments: 771 J. Postel (ISI)
September 1980
MAIL TRANSITION PLAN
PREFACE
This is a draft memo and comments are requested.
INTRODUCTION
The principal aim of the mail service transition plan is to provide
orderly support for computer mail service during the period of
transition from the old ARPANET protocols to the new Internet
protocols.
This plan covers only the transition from the current text computer
mail in the ARPANET environment to text computer mail in an Internet
environment. This plan does not address a second transition from
text only mail to multimedia mail [10,11].
The goal is to provide equivalent or better service in the new
Internet environment as was available in the ARPANET environment.
During the interim period, when both protocol environments are in
use, the goal is to minimize the impact on users and existing
software, yet to permit the maximum mail exchange connectivity.
It is assumed that the user is familiar with both the ARPANET and
Internet protocol environments [1-8]. The Internet protocols are
designed to be used in a diverse collection of networks including the
ARPANET, Packet Radio nets, Satellite nets, and local nets (e.g.,
Ethernets, Ring nets); while the ARPANET protocol are, of course,
limited to the ARPANET.
The Internet protocol environment specifies TCP as the host-to-host
transport protocol. The ARPANET protocol environment specifies NCP
as the host-to-host transport protocol. Both TCP and NCP provide
connection type process-to-process communication. The problem in the
transition is to bridge these two different interprocess
communication systems.
The objective of this plan is to specify the means by which the
ARPANET computer mail services may be extended into the Internet
system without disruptive changes for the users during the
transition.
1
^L
September 1980 RFC 771
Mail Transition Plan
MODEL OF MAIL SERVICE
The model of the computer mail system taken here separates the mail
composition and reading functions from the mail transport functions.
In the following, the discussion will be hoplessly TOPS20-oriented.
We appologize to users of other systems, but we feel it is better to
discuss examples we know than to attempt to be abstract.
In the ARPANET mail service, composition and reading is done with
user programs such as HERMES, MSG, MM, etc., while mail transmission
is done by system programs such as MAILER (sending) and FTPSRV
(receiving).
One element of the ARPANET mail service is the assumption that every
source of mail can have a direct interprocess communication
connection (via the NCPs) to every destination for mail. (There are
some cases where special handling and forwarding of mail violates
this assumption.)
Mailbox names are of the form "MAILBOX@HOST", and it is assumed that
MAILBOX is a destination mailbox on that host.
The messages are actually transmitted according to the provisions of
the File Transfer Protocol. Mail may be transimitted via either the
control connection (MAIL command), or via a data connection (MLFL
command). In either case, the argument specifies only the mailbox
since the destination host is assumed to be the host receiving the
transmission.
For example: messages sent from Postel at USC-ISIF to Cerf at
USC-ISIA would arrive at ISIA with the argument "Cerf" but no
indication of the host.
COMPOUND AND ALTERNATE NAMES
Mailboxes are of the form "mailbox@host" where mailbox is usually a
name like "Postel" and host is a host identifier like "USC-ISIF". In
some cases it will be useful to allow the host to be a compound name
such as:
USC-ISIA
ARPANET-ISIA
SATNET-NDRE
PPSN-RSRE
HOST1.SRINET
LSCNET/MAILROOM
2
^L
RFC 771 September 1980
Mail Transition Plan
or even the name of an organization:
BBN
ARPA
MIT
SRI
The only restriction is that "@" not appear in either the "mailbox"
or the "host" strings in the destination address.
To actually send the message the mailer program must convert the host
string into the physical address to which to transmit the message.
This name-to-address conversion is typically done by looking the name
up in a table and finding the physical address in another field of
that table entry. This means that all the compound and organization
names (and any other alternate names or synonyms) must also be in the
host table.
HIDDEN HOSTS
Sometimes the mailbox part of the destination address is a compound
name and is used to mark a set of mailboxes which are not really on
the host at all, but rather on another host which is connected to
this host in a non-standard way.
It is important to users of computer mail that replies to messages
may be easily composed with automatic assistance from the mail
processing programs. To preserve this capability it is important
that a host understand the mailbox part of every address in every
message it sends if the host part of the address is itself.
That is, for every message, in every header field, in every address
"m@h", host h must understand all values of m. Thus when a host
prepares a message it should check all the addresses that appear in
the header and for any address whose host part is this host the
mailbox part should be verified.
3
^L
September 1980 RFC 771
Mail Transition Plan
THE TRANSITION PLAN
The basic ground rules for the transition are:
1. ARPANET mailbox names must continue to work correctly.
2. No changes should be required to mail editor software which
parses message headers to compose replies and the like.
Specifically, non-ARPANET mailbox designators must be
accommodated without change to the parsing and checking mechanisms
of mail processing programs.
3. Automatic forwarding of messages between NCP and TCP
environments without user (or operator) intervention.
For the communication of messages between NCP and TCP hosts a mail
relay service will be provided on a few hosts that implement both TCP
and NCP. These will be "well known" in the same sense that sockets
or ports for contacting Telnet or FTP servers are well known.
To make use of these relay servers changes will be made to the mailer
programs. The mailer program will be responsible for determining if
the destination address of the message is directly reachable via the
interprocess communication system it has available (TCP or NCP or
both), or if the mail must be relayed. If the mail must be relayed,
the mailer must choose a relay server and transmit the message to it.
The basis for the decision the mailer must make is an expanded host
name table. There will be a table which translates host names to
physical addresses. The physical addresses in this table will be the
32-bit Internet addresses. (This makes sense for even NCP-only hosts,
since after 1 January 1981 even they must use 96-bit leader format
which requires 24-bit ARPANET physical addresses). Each entry in
this table will also have some flag bits.
The flag bits will include information to indicate if the host in
this entry is (1) a NCP host with "old tables", (2) a NCP host with
"new tables", (3) a TCP host, or (4) some other kind of host. All
TCP hosts are assumed to have "new tables". "Old tables" are those
without these flag bits, while "new tables" do have these flags.
A separate table may be useful to list the addresses of the hosts
with relay servers.
4
^L
RFC 771 September 1980
Mail Transition Plan
When a message is sent to a relay server, the control information (in
the argument of the mail transfer command) must be augmented to
include the destination host identifier.
The relay server may accept messages to be relayed without knowing
that destination mailbox is actually reachable. This means that it
may later discover that the destination mailbox does not exist (or
some other condition prevents mail delivery). To be able to report
the error to the originating user, the mailbox (mailbox@host) of the
originating user must be included in the argument of the mail
transfer command. If the argument does not contain the address of
the originating user no error response is attempted. The error
report, which is itself a message, does not carry an originator
address in the command argument to avoid the possibility of a endless
chain of error reports (however, an originator address does appear
the header).
Since the originating host will act as if the mail was successfully
delivered when it is accepted by the relay server, it deletes any
back up copies of the message it was keeping in case of errors. For
this reason, the relay server must include the complete message in
any error report it sends to the originator. The relay server should
parse the addresses in the argument before accepting a message. If
it does not understand how deliver locally, or both relay and reply
(if the originating address is present) to the message, it should not
accept it.
There are enough differences in the transmission procedure that the
relay server will use a distinct mail transfer protocol, separate
from the file transfer protocol.
MAIL TRANSFER PROTOCOL
The mail trasfer protocol to be used by the relay server and all TCP
hosts is documented in reference [9].
CONNECTIVITY
There are nine cases of mail exchange, the three by three matrix of
(1) old-table NCP hosts, (2) new-table NCP hosts, (3) TCP hosts.
There are also two transfer mechanisms: file transfer and mail
transfer. The diagonal is easy, each type of host can exchange mail
with other hosts of its type. The other cases are more subtle.
5
^L
September 1980 RFC 771
Mail Transition Plan
An old-table NCP host is assumed to have a table with 32-bit physical
addresses, but no flag bits. It has NCP and file transfer. It does
not have the separate mail transfer protocol.
An new-table NCP host is assumed to have a table with 32-bit physical
addresses, and the flag bits. It has NCP and file transfer. It also
has the new separate mail transfer.
An TCP host is assumed to have a table with 32-bit physical
addresses, and the flag bits. It has the new separate mail transfer.
It probably has a file transfer, but does not use it for mail.
1. Old-table NCP to Old-table NCP
This transfer is direct and uses the old mechanisms -- NCP and
file transfer.
2. New-table NCP to Old-table NCP
This transfer is direct and uses the old mechanisms -- NCP and
file transfer.
3. TCP to Old-table NCP
This transfer must use a relay server. The first transfer (from
the TCP host to the relay server) is via TCP and the mail transfer
protocol. The second transfer (from the relay server to the
old-table NCP) is via NCP and file transfer protocol.
4. Old-table NCP to New-table NCP
This transfer is direct and uses the old mechanisms -- NCP and
file transfer.
5. New-table NCP to New-table NCP
This transfer is done with the NCP and the mail transfer protocol,
that is, using the old interprocess communication system and the
new mail transmission scheme.
6. TCP to New-table NCP
This transfer must use a relay server. The first transfer (from
the TCP host to the relay server) is via TCP and the mail transfer
protocol. The second transfer (from the relay server to the
new-table NCP) is via NCP and mail transfer protocol.
6
^L
RFC 771 September 1980
Mail Transition Plan
7. Old-table NCP to TCP
This transfer must use a special relay server. The first transfer
(from the old-table NCP to the relay server) is via NCP and the
file transfer protocol. The second transfer (from the relay
server to the TCP host) is via TCP and mail transfer protocol.
This relay server must be special because the messages coming from
the old-table NCP host will not have the destination host
information in the command argument. This relay server must have
a list of registered TCP user mailboxes and their associated TCP
host identifiers. Since such a registry could be potentially
large and frequently changing (and will grow as more TCP hosts
come into existence) it will be necessary to limit the mailboxes
on the registry.
8. New-table NCP to TCP
This transfer must use a relay server. The first transfer (from
the new-table NCP to the relay server) is via NCP and the mail
transfer protocol. The second transfer (from the relay server to
the TCP host) is via TCP and mail transfer protocol.
9. TCP to TCP
This transfer is direct and uses the new mechanisms -- TCP and the
mail transfer protocol.
In general, whenever possible the new procedures are to be used.
MULTIPLE RECIPIENTS
A substantial portion of the mail sent is addressed to multiple
recipients. It would substantially cut the transmission and
processing costs if such multiple recipient mail were transfered
using the multiple recipient technique available for use in both the
old file transfer protocol [12] and new mail transfer protocol [9].
The relay servers will attempt to use a multiple recipient commands
whenever applicable on transmitting messages, and will accept such
commands when revceiving messages.
7
^L
September 1980 RFC 771
Mail Transition Plan
COMPOSITION AND READING PROGRAMS
The impact on the mail composition and reading programs is minimal.
If these programs use a table to recognize, complete, or verify host
identifiers, then they must be modified to use the new table.
To assist the user in replying to messages it will be important that
all addresses in the header fields (TO:, CC:, etc.) be complete with
both the mailbox and host parts. In some cases this has not
previously been necessary since the addresses without host parts
could be assumed to be local to the originating host, and the sending
host was recorded by the receiving host. When the messages were sent
directly the originating host was the sending host, but when messages
are relayed the originating host will not be the host sending the
mail to the destination host.
8
^L
RFC 771 September 1980
Mail Transition Plan
REFERENCES
[1] Cerf, V., "The Catenet Model for Internetworking," IEN 48,
DARPA/IPTO, July 1978.
[2] Postel, J., "Internet Protocol," RFC 760, USC/Information
Sciences Institute, NTIS ADA079730, January 1980.
[3] Postel, J., "Transmission Control Protocol," RFC 761,
USC/Information Sciences Institute, NTIS ADA082609,
January 1980.
[4] Postel, J., "Telnet Protocol Specification," RFC 764,
USC/Information Sciences Institute, June 1980.
[4] Postel, J., "File Transfer Protocol," RFC 765,
USC/Information Sciences Institute, June 1980.
[5] Postel, J., "Assigned Numbers," USC/Information Sciences
Institute, RFC 762, January 1980.
[6] Postel, J., "Internet Protocol Handbook," USC/Information
Sciences Institute, RFC 766, July 1980.
[7] Feinler, E. and, J. Postel, "ARPANET Protocol Handbook,"
NIC 7104, Network Information Center, SRI International,
January 1978.
[8] Crocker, D., J. Vittal, K. Pogran, and, D. Henderson,
"Standards for the Format of ARPA Network Text Messages,"
RFC 733 7104, Network Information Center, SRI International,
November 1977.
[9] Sluizer, S. and, J. Postel, "Mail Transfer Protocol,"
USC/Information Sciences Institute, RFC rrr, September 1980.
[10] Postel, J., "Internet Message Protocol," USC/Information
Sciences Institute, RFC 759, August 1980.
[11] Postel, J., "A Structured Format for Transmission of
Multi-Media Documents," USC/Information Sciences Institute,
RFC 767, August 1980.
[12] Harrenstien, K., "FTP Extension: XRSQ/XRCP,"
SRI International, RFC 743, December 1977.
9
^L
|