5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track

Total Page:16

File Type:pdf, Size:1020Kb

5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track Network Working Group J. Klensin Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track Simple Mail Transfer Protocol Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. Klensin Standards Track [Page 1] RFC 5321 SMTP October 2008 Table of Contents 1. Introduction . 5 1.1. Transport of Electronic Mail . 5 1.2. History and Context for This Document . 5 1.3. Document Conventions . 6 2. The SMTP Model . 7 2.1. Basic Structure . 7 2.2. The Extension Model . 9 2.2.1. Background . 9 2.2.2. Definition and Registration of Extensions . 10 2.2.3. Special Issues with Extensions . 11 2.3. SMTP Terminology . 11 2.3.1. Mail Objects . 11 2.3.2. Senders and Receivers . 12 2.3.3. Mail Agents and Message Stores . 12 2.3.4. Host . 13 2.3.5. Domain Names . 13 2.3.6. Buffer and State Table . 14 2.3.7. Commands and Replies . 14 2.3.8. Lines . 14 2.3.9. Message Content and Mail Data . 15 2.3.10. Originator, Delivery, Relay, and Gateway Systems . 15 2.3.11. Mailbox and Address . 15 2.4. General Syntax Principles and Transaction Model . 16 3. The SMTP Procedures: An Overview . 17 3.1. Session Initiation . 18 3.2. Client Initiation . 18 3.3. Mail Transactions . 19 3.4. Forwarding for Address Correction or Updating . 21 3.5. Commands for Debugging Addresses . 22 3.5.1. Overview . 22 3.5.2. VRFY Normal Response . 24 3.5.3. Meaning of VRFY or EXPN Success Response . 25 3.5.4. Semantics and Applications of EXPN . 26 3.6. Relaying and Mail Routing . 26 3.6.1. Source Routes and Relaying . 26 3.6.2. Mail eXchange Records and Relaying . 26 3.6.3. Message Submission Servers as Relays . 27 3.7. Mail Gatewaying . 28 3.7.1. Header Fields in Gatewaying . 28 3.7.2. Received Lines in Gatewaying . 29 3.7.3. Addresses in Gatewaying . 29 3.7.4. Other Header Fields in Gatewaying . 29 3.7.5. Envelopes in Gatewaying . 30 3.8. Terminating Sessions and Connections . 30 3.9. Mailing Lists and Aliases . 31 3.9.1. Alias . 31 Klensin Standards Track [Page 2] RFC 5321 SMTP October 2008 3.9.2. List . 31 4. The SMTP Specifications . 32 4.1. SMTP Commands . 32 4.1.1. Command Semantics and Syntax . 32 4.1.2. Command Argument Syntax . 41 4.1.3. Address Literals . 43 4.1.4. Order of Commands . 44 4.1.5. Private-Use Commands . 46 4.2. SMTP Replies . 46 4.2.1. Reply Code Severities and Theory . 48 4.2.2. Reply Codes by Function Groups . 50 4.2.3. Reply Codes in Numeric Order . 52 4.2.4. Reply Code 502 . 53 4.2.5. Reply Codes after DATA and the Subsequent <CRLF>.<CRLF> . 53 4.3. Sequencing of Commands and Replies . 54 4.3.1. Sequencing Overview . 54 4.3.2. Command-Reply Sequences . 55 4.4. Trace Information . 57 4.5. Additional Implementation Issues . 61 4.5.1. Minimum Implementation . 61 4.5.2. Transparency . 62 4.5.3. Sizes and Timeouts . 62 4.5.3.1. Size Limits and Minimums . 62 4.5.3.1.1. Local-part . 63 4.5.3.1.2. Domain . 63 4.5.3.1.3. Path . 63 4.5.3.1.4. Command Line . 63 4.5.3.1.5. Reply Line . 63 4.5.3.1.6. Text Line . 63 4.5.3.1.7. Message Content . 63 4.5.3.1.8. Recipients Buffer . 64 4.5.3.1.9. Treatment When Limits Exceeded . 64 4.5.3.1.10. Too Many Recipients Code . 64 4.5.3.2. Timeouts . 65 4.5.3.2.1. Initial 220 Message: 5 Minutes . 65 4.5.3.2.2. MAIL Command: 5 Minutes . 65 4.5.3.2.3. RCPT Command: 5 Minutes . 65 4.5.3.2.4. DATA Initiation: 2 Minutes . 66 4.5.3.2.5. Data Block: 3 Minutes . 66 4.5.3.2.6. DATA Termination: 10 Minutes. 66 4.5.3.2.7. Server Timeout: 5 Minutes. 66 4.5.4. Retry Strategies . 66 4.5.5. Messages with a Null Reverse-Path . 68 5. Address Resolution and Mail Handling . 69 5.1. Locating the Target Host . 69 5.2. IPv6 and MX Records . 71 6. Problem Detection and Handling . 71 Klensin Standards Track [Page 3] RFC 5321 SMTP October 2008 6.1. Reliable Delivery and Replies by Email . 71 6.2. Unwanted, Unsolicited, and "Attack" Messages . 72 6.3. Loop Detection . 73 6.4. Compensating for Irregularities . 73 7. Security Considerations . 75 7.1. Mail Security and Spoofing . 75 7.2. "Blind" Copies . 76 7.3. VRFY, EXPN, and Security . 76 7.4. Mail Rerouting Based on the 251 and 551 Response Codes . 77 7.5. Information Disclosure in Announcements . 77 7.6. Information Disclosure in Trace Fields . 78 7.7. Information Disclosure in Message Forwarding . 78 7.8. Resistance to Attacks . 78 7.9. Scope of Operation of SMTP Servers . 78 8. IANA Considerations . 79 9. Acknowledgments . 80 10. References . 81 10.1. Normative References . 81 10.2. Informative References . 82 Appendix A. TCP Transport Service . 85 Appendix B. Generating SMTP Commands from RFC 822 Header Fields . 85 Appendix C. Source Routes . 86 Appendix D. Scenarios . 87 D.1. A Typical SMTP Transaction Scenario . 88 D.2. Aborted SMTP Transaction Scenario . 89 D.3. Relayed Mail Scenario . 90 D.4. Verifying and Sending Scenario . 92 Appendix E. Other Gateway Issues . 92 Appendix F. Deprecated Features of RFC 821 . 93 F.1. TURN . 93 F.2. Source Routing . 93 F.3. HELO . 93 F.4. #-literals . 94 F.5. Dates and Years . 94 F.6. Sending versus Mailing . 94 Klensin Standards Track [Page 4] RFC 5321 SMTP October 2008 1. Introduction 1.1. Transport of Electronic Mail The objective of the Simple Mail Transfer Protocol (SMTP) is to transfer mail reliably and efficiently. SMTP is independent of the particular transmission subsystem and requires only a reliable ordered data stream channel. While this document specifically discusses transport over TCP, other transports are possible. Appendices to RFC 821 [1] describe some of them. An important feature of SMTP is its capability to transport mail across multiple networks, usually referred to as "SMTP mail relaying" (see Section 3.6). A network consists of the mutually-TCP-accessible hosts on the public Internet, the mutually-TCP-accessible hosts on a firewall-isolated TCP/IP Intranet, or hosts in some other LAN or WAN environment utilizing a non-TCP transport-level protocol. Using SMTP, a process can transfer mail to another process on the same network or to some other network via a relay or gateway process accessible to both networks. In this way, a mail message may pass through a number of intermediate relay or gateway hosts on its path from sender to ultimate recipient. The Mail eXchanger mechanisms of the domain name system (RFC 1035 [2], RFC 974 [12], and Section 5 of this document) are used to identify the appropriate next-hop destination for a message being transported. 1.2. History and Context for This Document This document is a specification of the basic protocol for the Internet electronic mail transport. It consolidates, updates and clarifies, but does not add new or change existing functionality of the following: o the original SMTP (Simple Mail Transfer Protocol) specification of RFC 821 [1], o domain name system requirements and implications for mail transport from RFC 1035 [2] and RFC 974 [12], o the clarifications and applicability statements in RFC 1123 [3], and o material drawn from the SMTP Extension mechanisms in RFC 1869 [13]. Klensin Standards Track [Page 5] RFC 5321 SMTP October 2008 o Editorial and clarification changes to RFC 2821 [14] to bring that specification to Draft Standard. It obsoletes RFC 821, RFC 974, RFC 1869, and RFC 2821 and updates RFC 1123 (replacing the mail transport materials of RFC 1123). However, RFC 821 specifies some features that were not in significant use in the Internet by the mid-1990s and (in appendices) some additional transport models. Those sections are omitted here in the interest of clarity and brevity; readers needing them should refer to RFC 821. It also includes some additional material from RFC 1123 that required amplification. This material has been identified in multiple ways, mostly by tracking flaming on various lists and newsgroups and problems of unusual readings or interpretations that have appeared as the SMTP extensions have been deployed. Where this specification moves beyond consolidation and actually differs from earlier documents, it supersedes them technically as well as textually. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol, as recommended for Post Office Protocol (POP) (RFC 937 [15], RFC 1939 [16]) and IMAP (RFC 3501 [17]).
Recommended publications
  • Network Working Group N. Freed Request for Comments: 2049 Innosoft Obsoletes: 1521, 1522, 1590 N
    Network Working Group N. Freed Request for Comments: 2049 Innosoft Obsoletes: 1521, 1522, 1590 N. Borenstein Category: Standards Track First Virtual November 1996 Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract STD 11, RFC 822, defines a message representation protocol specifying considerable detail about US-ASCII message headers, and leaves the message content, or message body, as flat US-ASCII text. This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages to allow for (1) textual message bodies in character sets other than US-ASCII, (2) an extensible set of different formats for non-textual message bodies, (3) multi-part message bodies, and (4) textual header information in character sets other than US-ASCII. These documents are based on earlier work documented in RFC 934, STD 11, and RFC 1049, but extends and revises them. Because RFC 822 said so little about message bodies, these documents are largely orthogonal to (rather than a revision of) RFC 822. The initial document in this set, RFC 2045, specifies the various headers used to describe the structure of MIME messages. The second document defines the general structure of the MIME media typing system and defines an initial set of media types.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • (IETF) J. Klensin Request for Comments: 6152 STD: 71 N
    Internet Engineering Task Force (IETF) J. Klensin Request for Comments: 6152 STD: 71 N. Freed Obsoletes: 1652 Oracle Category: Standards Track M. Rose ISSN: 2070-1721 Dover Beach Consulting, Inc. D. Crocker, Ed. Brandenburg InternetWorking March 2011 SMTP Service Extension for 8-bit MIME Transport Abstract This memo defines an extension to the SMTP service whereby an SMTP content body consisting of text containing octets outside of the US-ASCII octet range (hex 00-7F) may be relayed using SMTP. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6152. Copyright Notice Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
    [Show full text]
  • A Security Analysis of Email Communications
    A security analysis of email communications Ignacio Sanchez Apostolos Malatras Iwen Coisel Reviewed by: Jean Pierre Nordvik 2 0 1 5 EUR 28509 EN European Commission Joint Research Centre Institute for the Protection and Security of the Citizen Contact information Ignacio Sanchez Address: Joint Research Centre, Via Enrico Fermi 2749, I - 21027 Ispra (VA), Italia E-mail: [email protected] JRC Science Hub https://ec.europa.eu/jrc Legal Notice This publication is a Technical Report by the Joint Research Centre, the European Commission’s in-house science service. It aims to provide evidence-based scientific support to the European policy-making process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. All images © European Union 2015, except: Frontpage : © bluebay2014, fotolia.com JRC 99372 EUR 28509 EN ISSN 1831-9424 ISBN 978-92-79-66503-5 doi:10.2760/319735 Luxembourg: Publications Office of the European Union, 2015 © European Union, 2015 Reproduction is authorised provided the source is acknowledged. Printed in Italy Abstract The objective of this report is to analyse the security and privacy risks of email communications and identify technical countermeasures capable of mitigating them effectively. In order to do so, the report analyses from a technical point of view the core set of communication protocols and standards that support email communications in order to identify and understand the existing security and privacy vulnerabilities. On the basis of this analysis, the report identifies and analyses technical countermeasures, in the form of newer standards, protocols and tools, aimed at ensuring a better protection of the security and privacy of email communications.
    [Show full text]
  • Requests for Comments (RFC)
    ,QWHUQHW6RFLHW\ ,62& ,QWHUQHW$UFKLWHFWXUH%RDUG Requests for Comments (RFC) 6HOHFWHG5HTXHVWVIRU&RPPHQWVUHOHYDQWWRLQVWUXFWLRQDOGHVLJQ5HTXHVWV IRU&RPPHQWVRU5)&VLQFOXGH,QWHUQHWVWDQGDUGVGHYHORSHGE\WKH ,QWHUQHW$UFKLWHFWXUH%RDUGIRUWKH,QWHUQHW6RFLHW\0DQ\RIWKH5)&V SURYLGHLPSRUWDQWWHFKQLFDOLQIRUPDWLRQDQGDUHQRWFODVVLILHGDV ³VWDQGDUGV´ 5HSURGXFHGLQDFFRUGDQFHZLWKWKHSROLFLHVRIWKH,QWHUQHW6RFLHW\)RUWKH ODWHVWLQIRUPDWLRQDERXWWKH6RFLHW\VHHZZZLVRFRUJ)RUPRUH LQIRUPDWLRQDERXWVWDQGDUGVVHHZZZLDERUJ RFC1314 Web Address: Image Exchange Format http://sunsite.cnlab-switch.ch/ By: Katz & Cohen Network Working Group A. Katz Request for Comments: 1314 D. Cohen ISI April 1992 A File Format for the Exchange of Images in the Internet Status of This Memo This document specifies an IAB standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document defines a standard file format for the exchange of fax-like black and white images within the Internet. It is a product of the Network Fax Working Group of the Internet Engineering Task Force (IETF). The standard is: ** The file format should be TIFF-B with multi-page files supported. Images should be encoded as one TIFF strip per page. ** Images should be compressed using MMR when possible. Images may also be MH or MR compressed or uncompressed. If MH or MR compression is used, scan lines should be "byte-aligned". ** For maximum interoperability, image resolutions should either be 600, 400, or 300 dpi; or else be one of the standard Group 3 fax resolutions (98 or 196 dpi vertically and 204 dpi horizontally). Note that this specification is self contained and an implementation should be possible without recourse to the TIFF references, and that only the specific TIFF documents cited are relevant to this specification.
    [Show full text]
  • Network Working Group J. Reynolds Request for Comments: 1700 J
    Network Working Group J. Reynolds Request for Comments: 1700 J. Postel STD: 2 ISI Obsoletes RFCs: 1340, 1060, 1010, 990, 960, October 1994 943, 923, 900, 870, 820, 790, 776, 770, 762, 758,755, 750, 739, 604, 503, 433, 349 Obsoletes IENs: 127, 117, 93 Category: Standards Track ASSIGNED NUMBERS Status of this Memo This memo is a status report on the parameters (i.e., numbers and keywords) used in protocols in the Internet community. Distribution of this memo is unlimited. OVERVIEW This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite. To make the current information readily available the assignments are kept up-to- date in a set of online text files. This RFC has been assembled by catinating these files together with a minimum of formatting "glue". The authors appologize for the somewhat rougher formatting and style than is typical of most RFCs. We expect that various readers will notice specific items that should be corrected. Please send any specific corrections via email to . Reynolds & Postel [Page 1] RFC 1700 Assigned Numbers October 1994 INTRODUCTION The files in this directory document the currently assigned values for several series of numbers used in network protocol implementations. ftp://ftp.isi.edu/in-notes/iana/assignments The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. The IANA is chartered by the Internet Society (ISOC) and the Federal Network Council (FNC) to act as the clearinghouse to assign and coordinate the use of numerous Internet protocol parameters.
    [Show full text]
  • Network Working Group J. Klensin, WG Chair Request for Comments: 1652 MCI Obsoletes: 1426 N. Freed, Editor Category: Standards Track Innosoft M
    Network Working Group J. Klensin, WG Chair Request for Comments: 1652 MCI Obsoletes: 1426 N. Freed, Editor Category: Standards Track Innosoft M. Rose Dover Beach Consulting, Inc. E. Stefferud Network Management Associates, Inc. D. Crocker Silicon Graphics, Inc. July 1994 SMTP Service Extension for 8bit-MIMEtransport Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo defines an extension to the SMTP service whereby an SMTP content body consisting of text containing octets outside of the US- ASCII octet range (hex 00-7F) may be relayed using SMTP. 1. Introduction Although SMTP is widely and robustly deployed, various extensions have been requested by parts of the Internet community. In particular, a significant portion of the Internet community wishes to exchange messages in which the content body consists of a MIME message [3] containing arbitrary octet-aligned material. This memo uses the mechanism described in [5] to define an extension to the SMTP service whereby such contents may be exchanged. Note that this extension does NOT eliminate the possibility of an SMTP server limiting line length; servers are free to implement this extension but nevertheless set a line length limit no lower than 1000 octets. Given that this restriction still applies, this extension does NOT provide a means for transferring unencoded binary via SMTP. Klensin, Freed, Rose, Stefferud & Crocker [Page 1] RFC 1652 SMTP 8bit-MIMEtransport July 1994 2.
    [Show full text]
  • The Technical Development of Internet Email
    The Technical Development of Internet Email Craig Partridge BBN Technologies Development and evolution of the technologies and standards for Internet email took more than 20 years, and arguably is still under way. The protocols to move email between systems and the rules for formatting messages have evolved, and been largely replaced at least once. This article traces that evolution, with a focus on why things look as they do today. The explosive development of networked Each subsystem internally has a rich set of electronic mail (email) has been one of the protocols and services to perform its job. For major technical and sociological develop- instance, the UA typically includes network ments of the past 40 years. A number of protocols to manage mailboxes kept on remote authors have already looked at the develop- storage at a user’s Internet service provider or ment of email from various perspectives.1 The place of work. The MHS includes protocols to goal of this article is to explore a perspective reliably move email messages from one MTA to that, surprisingly, has not been thoroughly another, and to determine how to route a examined: namely, how the details of the message through the MTAs to its recipients. technology that implements email in the TheUAandMHSmustalsohavesome Internet have evolved. standards in common. In particular, they need This is a detailed history of email’s plumb- to agree on the format of email messages and ing. One might imagine, therefore, that it is the format of the metadata (the so-called only of interest to a plumber.
    [Show full text]
  • Weak Links in Authentication Chains: a Large-Scale Analysis of Email Sender Spoofing Attacks
    Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks Kaiwen Shen 1;∗, Chuhan Wang 1; ,∗ Minglei Guo 1, Xiaofeng Zheng 1;2;†, Chaoyi Lu 1, Baojun Liu 1;,† Yuxuan Zhao 4, Shuang Hao 3, Haixin Duan 1;2, Qingfeng Pan 5 and Min Yang 6 1Tsinghua University 2Qi An Xin Technology Research Institute 3University of Texas at Dallas 4North China Institute of Computing Technology 5Coremail Technology Co. Ltd 6Fudan University Abstract email depends on the weakest link in the authentication chain. As a fundamental communicative service, email is playing an Even a harmless issue may cause unprecedented damages important role in both individual and corporate communica- when it is integrated into a more extensive system. Generally, tions, which also makes it one of the most frequently attack the email authentication chain involves multiple protocols, vectors. An email’s authenticity is based on an authentication roles and services, any failure among which can break the chain involving multiple protocols, roles and services, the whole chain-based defense. inconsistency among which creates security threats. Thus, it First, despite the existence of various security extension depends on the weakest link of the chain, as any failed part protocols (e.g., SPF [24], DKIM [2] and DMARC [31]) to can break the whole chain-based defense. identify spoofing emails, spoofing attacks might still succeed This paper systematically analyzes the transmission of an due to the inconsistency of entities protected by different email and identifies a series of new attacks capable of bypass- protocols. ing SPF, DKIM, DMARC and user-interface protections.
    [Show full text]
  • 3834 University of Tennessee Category: Standards Track August 2004
    Network Working Group K. Moore Request for Comments: 3834 University of Tennessee Category: Standards Track August 2004 Recommendations for Automatic Responses to Electronic Mail Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2004). Abstract This memo makes recommendations for software that automatically responds to incoming electronic mail messages, including "out of the office" or "vacation" response generators, mail filtering software, email-based information services, and other automatic responders. The purpose of these recommendations is to discourage undesirable behavior which is caused or aggravated by such software, to encourage uniform behavior (where appropriate) among automatic mail responders, and to clear up some sources of confusion among implementors of automatic email responders. 1. Introduction Many programs which automatically respond to email are currently in use. Although these programs vary widely in their function, several problems with this class of programs have been observed, including: significant numbers of useless or unwanted response and responses sent to inappropriate addresses, and occasional incidences of mail loops or "sorcerer's apprentice" mode.
    [Show full text]
  • Internet Engineering Task Force (IETF) R. Gellens Request for Comments: 6409 QUALCOMM Incorporated STD: 72 J
    Internet Engineering Task Force (IETF) R. Gellens Request for Comments: 6409 QUALCOMM Incorporated STD: 72 J. Klensin Obsoletes: 4409 November 2011 Category: Standards Track ISSN: 2070-1721 Message Submission for Mail Abstract This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server. Message relay is unaffected, and continues to use SMTP over port 25. When conforming to this document, message submission uses the protocol specified here, normally over port 587. This separation of function offers a number of benefits, including the ability to apply specific security or policy requirements. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6409. Gellens & Klensin Standards Track [Page 1] RFC 6409 Message Submission for Mail November 2011 Copyright Notice Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document.
    [Show full text]
  • Simple Mail Transfer Protocol from Wikipedia, the Free Encyclopedia "SMTP" Redirects Here
    Simple Mail Transfer Protocol From Wikipedia, the free encyclopedia "SMTP" redirects here. For the email delivery company, see SMTP (company). Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission. First defined by RFC 821in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321 - which is the protocol in widespread use today. SMTP by default uses TCP port 25. The protocol for mail submission is the same, but uses port 587. SMTP connections secured bySSL, known as SMTPS, default to port 465. While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically use SMTP only for sending messages to a mail server for relaying. For receiving messages, client applications usually use either POP3 or IMAP. While proprietary systems (such as Microsoft Exchange and Lotus Notes/Domino) and webmail systems (such as Hotmail, Gmail andYahoo! Mail) use their own non-standard protocols to access mail box accounts on their own mail servers, all use SMTP when sending or receiving email from outside their own systems. Contents [hide] Various forms of one-to-one electronic messaging were used in the 1960s. People communicated with one another using systems developed for specific mainframe computers. As more computers were interconnected, especially in the US Government's ARPANET, standards were developed to allow users of different systems to e-mail one another. SMTP grew out of these standards developed
    [Show full text]