SMTP                                                          D. Crocker
Internet-Draft                               Brandenburg InternetWorking
Intended status: Standards Track                       February 24,                        October 31, 2008
Expires: August 27, 2008 May 4, 2009

                       Internet Mail Architecture
                      draft-crocker-email-arch-10
                      draft-crocker-email-arch-11

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on August 27, 2008. May 4, 2009.

Abstract

   Over its thirty-five year history history, Internet Mail has undergone
   significant changes changed
   significantly in scale and complexity, as it has become a global
   infrastructure service.  The first standardized architecture
   for networked email specified little more  These changes have been evolutionary, rather
   than revolutionary, reflecting a simple split between
   the user world and the transmission world.  Core aspects of the
   service, such as the styles of mailbox address and basic message
   format, have remained remarkably constant.  However today's Internet
   Mail is distinguished by many independent operators, many different
   components for providing service strong desire to users preserve both its
   installed base and many others for
   performing message transfer.  Public discussion of the service often
   lacks common terminology its usefulness.  To collaborate productively on
   this large and complex system, all participants must work from a
   common frame view of reference for these
   components it and their activities.  Having use a common reference model language to describe its
   components and
   terminology facilitates discussion about problems with the service,
   changes interactions among them.  But the many differences
   in policy, or enhancement perspective currently make it difficult to know exactly what
   another participant means.  To serve as the service's functionality.
   This necessary common frame of
   reference, this document offers an describes the enhanced Internet Mail architecture that
   targets description of
   architecture, reflecting the existing service, in order to facilitate
   clearer and more efficient technical, operations and policy
   discussions about email. current service.

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1.  Background  History  . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.2.  Service Overview . . . . . . . . . . . . . . . . . . . . .  5
     1.3.  Document Conventions . . . . . . . . . . . . . . . . . . .  6
     1.4.  Changes to Previous Version  . . . . . . . . . . . . . . .  6
   2.  Responsible Actor Roles  . . . . . . . . . . . . . . . . . . .  8  7
     2.1.  User Actors  . . . . . . . . . . . . . . . . . . . . . . .  9  7
     2.2.  Mail Handling Service (MHS) Actors . . . . . . . . . . . . 12 10
     2.3.  Administrative Actors  . . . . . . . . . . . . . . . . . . 15 13
   3.  Identities . . . . . . . . . . . . . . . . . . . . . . . . . . 18 16
     3.1.  Mailbox  . . . . . . . . . . . . . . . . . . . . . . . . . 18 16
     3.2.  Scope of Email Address Use . . . . . . . . . . . . . . . . 17
     3.3.  Domain Names . . . . . . . . . . . . . . . . . . . . . . . 19
     3.3. 17
     3.4.  Message Identifier . . . . . . . . . . . . . . . . . . . . 19 18
   4.  Services and Standards . . . . . . . . . . . . . . . . . . . . 21 19
     4.1.  Message Data . . . . . . . . . . . . . . . . . . . . . . . 25 22
     4.2.  User-Level Services  . . . . . . . . . . . . . . . . . . . 30 27
     4.3.  MHS-Level Services . . . . . . . . . . . . . . . . . . . . 32 29
     4.4.  Transition Modes . . . . . . . . . . . . . . . . . . . . . 33
     4.5.  Implementation and Operation . . . . . . . . . . . . . . . 33
   5.  Mediators  . . . . . . . . . . . . . . . . . . . . . . . . . . 35 34
     5.1.  Aliasing  Alias  . . . . . . . . . . . . . . . . . . . . . . . . . 36 . 35
     5.2.  Re-Sending  ReSender . . . . . . . . . . . . . . . . . . . . . . . . 37 . 36
     5.3.  Mailing Lists  . . . . . . . . . . . . . . . . . . . . . . 39 37
     5.4.  Gateways . . . . . . . . . . . . . . . . . . . . . . . . . 40 39
     5.5.  Boundary Filter  . . . . . . . . . . . . . . . . . . . . . 41 40
   6.  Considerations . . . . . . . . . . . . . . . . . . . . . . . . 42 40
     6.1.  Security Considerations  . . . . . . . . . . . . . . . . . 42 40
     6.2.  IANA Considerations  . . . . . . . . . . . . . . . . . . . 42 41
     6.3.  Internationalization . . . . . . . . . . . . . . . . . . . 41
   7.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 42
     7.1.  Normative  . . . . . . . . . . . . . . . . . . . . . . . . 42
     7.2.  Informative  . . . . . . . . . . . . . . . . . . . . . . . 44
   Appendix A.  Acknowledgements  . . . . . . . . . . . . . . . . . . 45
   Index  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 46
   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 47 48
   Intellectual Property and Copyright Statements . . . . . . . . . . 48 49

1.  Introduction

   Over its thirty-five year history history, Internet Mail has undergone
   significant changes changed
   significantly in scale and complexity, as it has become a global
   infrastructure service.  The  These changes have been evolutionary, rather
   than revolutionary, reflecting a strong desire to preserve both its
   installed base of users and utility. its usefulness.  Today, Internet Mail is
   distinguished by many independent operators, many different
   components for providing service to users and users, as well as many other different
   components
   for performing message transfer. that transfer messages.

   Public collaboration on email technical, operations operations, and policy
   activities, activities
   of email, including those responding that respond to the challenges of email
   abuse, has brought in a much wider range of participants than email's into the
   technical community originally had.  In order to do work community.  To collaborate productively on a large, this large and
   complex system, they need to share the same all participants must work from a common view of how it is put
   together, as well as what terms to
   and use a common language to refer to the pieces describe its components and
   their activities.  Otherwise, the
   interactions among them.  But the many differences in perspective
   currently make it is difficult to know exactly what another participant
   means.

   It is the need to resolve these differences in each person's
   perspective that motivates this
   document, to describe which describes the realities of the current system.
   Internet mail Mail is the subject of ongoing technical, operations operations, and
   policy work, and the discussions often are hindered by different
   models of email service design and different meanings for the same
   terms.  This architecture document seeks to
   facilitate clearer and more efficient technical, operations and
   policy exchanges about email.

   This

   To serve as the necessary common frame of reference, this document offers an
   describes the enhanced Internet Mail architecture to
   reflect architecture, reflecting the
   current service.  In particular it:  The document focuses on:

      *  Documents  Capturing refinements to the email model

      *  Clarifies  Clarifying functional roles for the architectural components

      *  Clarifies  Clarifying identity-related issues, across the email service

      *  Defines  Defining terminology for architectural components and their
         interactions

1.1.  Background  History

   The first standardized architecture for networked email specified a
   simple split between the user world, in the form of Mail User Agents
   (MUA), and the transmission transfer world, in the form of the Mail Handling
   Service (MHS) (MHS), which is composed of Mail Transfer Agents (MTA).  The
   MHS is
   responsible for accepting accepts a message from one User and delivering delivers it to one or more others,
   other users, creating a virtual MUA-to-MUA exchange environment.

   As shown in Figure 1 1, this defines two logical "layers" layers of
   interoperability.  One is directly between Users.  The other is
   between among
   the neighboring components, components along the transfer path.  In addition, there is
   interoperability between the layers, first when a message is posted
   from the User to the MHS and later when it is delivered from the MHS
   to the User.

   The operational service has evolved sub-divisions for each of these
   layers into more specialized modules.  Core evolved, although core aspects of the
   service, such as mailbox addressing and message format style, have remained
   remaining remarkably constant.  So the  The original distinction between user-level
   concerns the
   user level and transfer-level concerns is retained, transfer level remains, but with an
   elaboration to each level of the architecture. elaborations in each.
   The term "Internet Mail" is used to refer to the entire collection of
   user and transfer components and services.

   For Internet Mail Mail, the term "end-to-end" usually refers to a single
   posting and the set of deliveries directly resulting that result from its a single
   transiting transit
   of the MHS.  A common exception is with group dialogue that is mediated via mediated,
   through a mailing list, so that Mailing List; in this case, two postings occur before
   intended recipients Recipients receive an Author's message, as discussed in
   Section 2.1.4. 2.1.3.  In fact fact, some uses of email consider the entire email service --
   service, including Author and Recipient -- Recipient, as a subordinate component.
   For these services services, "end-to-end" refers to points outside
   of the email
   service.  Examples are voicemail over email [RFC3801], "[RFC3801], EDI over
   email [RFC1767] and facsimile over email [RFC4142].

                                                +--------+
               +---------------->|
                             ++================>|  User  |
               |
                             ||                 +--------+
               |
                             ||                      ^
                 +--------+  |  ||          +--------+  .
                 |  User  +--+--------->|  +==++=========>|  User  |  .
   +--------+  |
                 +---+----+  ||          +--------+  .
                     .       |       ||               ^      .
                     .       |       ||   +--------+  .      .
                     .       +-->|       ++==>|  User  |  .      .
                     .            +--------+  .      .
                     .                 ^      .      .
                     .                 .      .      .
                     V                 .      .      .
   +---+----------------+------+------+---+
                 +---+-----------------+------+------+---+
                 |   .                 .      .      .   |
                 |   +...............>+   .................>.      .      .   |
                 |   .                        .      .   |
                 |   +......................>+   ........................>.      .   |
                 |   .                               .   |
                 |   +.............................>+   ...............................>.   |
                 |                                       |
                 |      Mail Handling Service (MHS)      |
   +--------------------------------------+
                 +---------------------------------------+

              Figure 1: Basic Internet Mail     Service Model

1.2.  Service Overview

   End-to-end Internet Mail exchange is accomplished by using a
   standardized infrastructure comprising: with these components and
   characteristics:

      *  An email object

      *  Global addressing

      *  An asynchronous sequence of point-to-point transfer mechanisms

      *  No prior arrangement between Author MTAs or between Authors and Recipient
         Recipients

      *  No prior arrangement between point-to-point transfer services, services
         over the open Internet

      *  No requirement for Author and Recipient Author, Originator, or Recipients to be
         online at the same time. time

   The end-to-end portion of the service is the email object, called a
   message.  Broadly
   "message."  Broadly, the message, itself, message itself distinguishes between control
   information
   information, for handling, versus from the author's message Author's content.

   A precept to the design of mail over the open Internet is permitting
   user-to-user and MTA-to-MTA interoperability to take place with no without prior, direct
   arrangement between the independent administrative authorities
   responsible for handling a message.  That is, all  All participants rely on having
   the core services being universally supported and accessible, either
   directly or through gateways Gateways that translate act as translators between Internet
   Mail and email environments that conform conforming to other standards.  Given the
   importance of spontaneity and serendipity in
   the world of human interpersonal
   communications, this lack of not requiring such prearrangement between
   participants is a core benefit of Internet Mail and remains a core
   requirement for it.

   Within localized networks at the edge of the public Internet, prior
   administrative arrangement often is required and can include access
   control, routing constraints constraints, and configuration of the information
   query service
   configuration.  In service.  Although recipient authentication has usually been
   required for message access since the beginning of Internet Mail, in
   recent years one change to local environments is
   an increased requirement it also has been required for authentication or, at least,
   accountability. message submission.  In
   these cases cases, a server performs explicit validation
   of validates the client's identity.

1.3. identity, whether by
   explicit security protocols or by implicit infrastructure queries to
   identify "local" participants.

1.2.  Document Conventions

   In this document, references

   References to structured fields of a message use a two-part dotted
   notation.  The first part cites the document that contains the
   specification for the field and the second is the name of the field.
   Hence <RFC2822.From> is the From: header field in an email content
   header and <RFC2821.MailFrom> is the address in the SMTP "Mail From"
   command.

   The

   When occurring without the RFC2822 qualifier, header field names are
   shown with a colon suffix.  For example, From:.

   References to labels for actors, functions or components have the
   first letter capitalized.

   Also, the key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
   NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
   this document are to be interpreted as described in RFC 2119
   [RFC2119] [RFC2119].

      RFC EDITOR:   Remove the following paragraph before publication.

      Discussion venue:   Please direct discussion about this document
         to the IETF-SMTP mailing list <http://www.imc.org/ietf-smtp>.

1.4.  Changes to Previous Version
   INSTRUCTIONS TO THE RFC EDITOR:   Remove this sub-section prior to
      publication.

   Many small editing changes, for wordsmithing improvements to make
   details more consistent.  This section documents the nature and basis
   for changes with significant impact.

   Originator->Author:   The term "Originator" is used by RFC 2822 more
      broadly than just the From: field, which specifically defines who
      the author of the content is.  I believe this distinguishes two
      constructs, one for the content author and one for the first
      agency that handles the message, in terms of the transfer service.
      So the change from "Originator" to "Author" seems pretty
      straightforward.  The challenge is in using the term Originator,
      as defined in RFC 2822 and applying it to the system's
      architecture.

   Source->Originator:   This change is more of a challenge.  We need
      the "Originator" term and construct, but the architecture is
      already complex enough.  Hence, adding a new construct seems like
      a very poor resolution.  The document has used "Source" as an MHS
      term for the MSA set of functions.  While one could argue against
      re-labeling it as Originator, I believe this is a reasonable
      choice and likely to be comfortable for community use, since
      "Source" does not have an established history.

   Bounce->Return:   'bounce address' is not accurate, because the
      address is used for more than that, but it *is* as established
      term within portions of the broader email community.  I also
      believe the extensive discussion on this point, last year,
      justifies the change.

      The problem with saying "Bounce" is that is not merely
      linguistically impure, it is plain wrong and has already caused
      serious problems.  Witness SPF.  Frankly, we need to fix RFC2821,
      but that's a separate battle to fight and not one for this forum.

      Although not a verbatim use of "Reverse Path", the related term
      that seems to work publicly is "Return Address".  It is already
      established in the bricks-and-mortar postal world and seems to
      have some acceptance within parts of the email community.  (I've
      done a draft white paper on authentication for the Messaging Anti-
      Abuse Working Group and the membership had some debate about this
      vocabulary choice and converged on agreeing to it.)

   Is the envelope part of the message?  I don't remember whether we
      resolved this.  For a variety of reasons, I believe the message
      includes its envelope, and am encouraged to find RFC2822upd says:

         In the context of electronic mail, messages are viewed as
         having an envelope and contents.  The envelope contains
         whatever information is needed to accomplish transmission and
         delivery.  (See [I-D.klensin-rfc2821bis] (Klensin, J., "Simple
         Mail Transfer Protocol," November 2007.) for a discussion of
         the envelope.)  The contents comprise the object to be
         delivered to the recipient.  This specification applies only to
         the format and some of the semantics of message contents.

      rfc2821bis says:

         SMTP transports a mail object.  A mail object contains an
         envelope and content.

      I think these justify having the term 'message' as including the
      object.

   Examples of 'new' messages:   Section Section 3.3.1contains a list of
      examples, discussing scenarios that might or might not be viewed
      as creating a "new" message, rather than retaining an existing
      one.  The list has been expanded.

2.  Responsible Actor Roles

   Internet Mail is a highly distributed service, with a variety of
   actors serving playing different roles.  These divide actors fall into 3 three basic
   types:

      *  User

      *  Mail Handling Service (MHS)

      *  ADministrative Management Domain (ADMD)

   Although related to a technical architecture, the focus on Actors actors
   concerns participant responsibilities, rather than on functionality of
   modules.  Hence  For that reason, the labels used are different than for from those
   used in classic email architecture diagrams.

2.1.  User Actors

   Users are the sources and sinks of messages.  They  Users can be humans,
   organizations people,
   organizations, or processes.  They can have an exchange that iterates
   iterates, and they can expand or contract the set of users participating that
   participate in a set of exchanges.  In Internet Mail Mail, there are three four
   types of user-
   level Actors: Users:

      *  Authors

      *  Recipients

      *  Return Handlers

      *  Mediators

   Figure 2 shows the primary and secondary flows of messages among
   them.

            ++==========++
            ||  Author  ||<..................................<..
            ++=++=++=++=++                                     .
               || || ||     ++===========++                    .
               || || ++====>|| Recipient ||                    .
               || ||        ++=====+=====++                    .
               || ||               .                           .
               || ||               ..........................>.+
               || ||                                           .
               || ||               ...................         .
               || ||               .                 .         .
               || ||               V                 .         .
               || ||         +-----------+    ++=====+=====++  .
               || ++========>| Mediator  +===>|| Recipient ||  .
               ||            +-----+-----+    ++=====+=====++  .
               ||                  .                 .         .
               ||                  ..................+.......>.+
               ||                                              .
               ||    ..............+..................         .
               ||    .             .                 .         .
               \/    V             V                 '         .
            +-----------+    +-----------+    ++=====+=====++  .
            | Mediator  +===>| Mediator  +===>|| Recipient ||  .
            +-----+-----+    +-----+-----+    ++=====+=====++  .
                  .                .                 .         .
                  .................+.................+.......>..

                 Figure 2: Relationships Among User Actors

   From the User-level perspective user perspective, all mail transfer activities are performed
   by a monolithic Mail Handling Service (MHS), even though the actual
   service can be provided by many independent organizations.  Users are
   customers of this unified service.

   The following figure depicts

   Whenever any MHS actor sends information to back to an Author or
   Originator in the flow sequence of messages among Actors:

   +------------+
   |            |<---------------------------+
   |   Author   |<----------------+          |
   |            |<----+           |          |
   +-+---+----+-+     |           |          |
     |   |    |       |           |          |
     |   |    V       |           |          |
     |   |  +---------+-+         |          |
     |   |  | Recipient |         |          |
     |   |  +-----------+         |          |
     |   |                        |          |
     |   |       +--------+       |          |
     |   |       |        |       |          |
     |   V       V        |       |          |
     | +-----------+    +-+-------+-+        |
     | | Mediator  +--->| Recipient |        |
     | +-----------+    +-----------+        |
     |                                       |
     |       +-----------------------------+ |
     |       |                +----------+ | |
     |       |                |          | | |
     V       V                V          | | |
   +-----------+    +-----------+    +---+-+-+---+
   | Mediator  +--->| Mediator  +--->| Recipient |
   +-----------+    +-----------+    +-----------+

                 Figure 2: Relationships Among User Actors handling a message, that actor is a
   User.

2.1.1.  Author

   This

   The Author is the user-level participant responsible for creating the message, its contents contents, and
   its list of recipient addresses.  The MHS
   operates to send and deliver mail among Authors transfers the message from
   the Author and Recipients.  As
   described below, delivers it to the Recipients.  The MHS has a "Source" an
   Originator role (Section 2.2.1) that correlates with the
   user-level Author role.

2.1.2.  Recipient

   The Recipient is a consumer of delivered message content.  As
   described below, the delivered message.  The MHS has a "Dest[ination]"
   Receiver role that correlates (Section 2.2.4)correlates with the user-level Recipient role.

   A
   This is labeled Recv in Figure 3.

   Any Recipient can close the user-level user communication loop by creating and
   submitting a new message that replies to an the Author.  An example of
   an automated form of reply is the Message Disposition Notification
   (MDN), which informs the Author about the Recipient's handling of the
   message.  (See Section 4.1.)

2.1.3.  Return Handler

   The Return Handler -- Handler, also called "Bounce Handler" -- Handler," receives and
   services notifications generated by that the MHS, MHS generates, as a result of efforts
   to transfer it transfers or deliver
   delivers the message.  Notices  These notices can be about failures or
   completions and are sent to an address that is specified by the
   Source.
   Originator<<initial def>> .  This Return handling address (also known
   as a Return address) might have no visible characteristics in common
   with the address of the Author or Source.

2.1.4. Originator.

2.1.3.  Mediator

   A Mediator receives, aggregates, reformulates reformulates, and redistributes
   messages as part of a potentially-protracted, higher-level exchange among Users.  It is easy to confuse this user-level Authors and Recipients who are the principals in
   protracted exchanges.  This activity is easily confused with the
   underlying MHS transfer exchanges.  However they serve  However, each serves very
   different purposes and operate operates in very different ways.  Mediators are
   considered extensively in Section 5.

   When mail is delivered to a receiving mediator the Mediator specified in the
   RFC2821.RcptTo command, the MHS handles it the same way as for any
   other Recipient.  That is, the  The MHS only sees each posting and delivery activity
   between sources and sinks and as independent; it does not see (later) subsequent
   re-posting as a continuation of a process.  Hence  Because the Mediator
   originates messages, it can receive replies.  Hence, when submitting
   messages, the Mediator is an Author.  So a Mediator really is a full-
   fledged User.  Mediators are considered extensively in Section 5.

   The distinctive aspects of a Mediator are, therefore, above are outside the MHS.  A
   Mediator preserves the Author information of the message it
   reformulates, but may
   reformulates and is permitted to make meaningful changes to the content.  Hence
   the
   message content or envelope.  The MHS sees a new message, but Users users
   receive a message that is
   interpreted they interpret as primarily being from -- or, from, or at least, least
   initiated by -- by, the author Author of the original message.  The role of a
   Mediator permits
   distinct, active creativity, rather than being is not limited to the more
   constrained job of merely connecting together other participants.
   Hence it is really participants; the
   Mediator that is responsible for the new message.

   A Mediator's task can be role is complex and contingent, such as for example, modifying
   and adding content or regulating which users are allowed to
   participate and when.  The popular common example of this role is a group
   mailing list.  A
   Mailing List.  In a more complex use, a sequence of Mediators may even could
   perform a series sequence of formal steps, such as reviewing, modifying modifying, and
   approving a purchase request.

   Because a Mediator originates messages, it can also receive replies.
   So a Mediator really is a full-fledged User.

   Gateway:

   A Gateway is a particularly interesting form of Mediator.  It is a
   hybrid of User and Relay that interconnects connects heterogeneous mail services.
   Its goal purpose is to emulate a Relay, and Relay.  For a detailed
      discussion is in discussion, see
   Section 2.2.3. .

2.2.  Mail Handling Service (MHS) Actors

   The Mail Handling Service (MHS) has the task of performing performs a single, single end-to-end transfer
   on behalf of the Author and reaching to reach the Recipient address(es) addresses specified in
   the original RFC2821.RcptTo commands.  Mediated  Exchanges that are either
   mediated or protracted, iterative exchanges, and protracted, such as those used for
   collaboration over time, time are part of handled by the User-level service,
   and are User actors, not part of this transfer-level Handling Service.

   The following figure depicts by the
   MHS actors.

      Figure 3 shows the relationships among transfer participants in
   Internet Mail.  It  Although it shows the Source Originator (labeled Origin) as
   distinct from the Author, Author and Dest[ination] Receiver (labeled Recv) as distinct from
        Recipient, although it
   is common for  each pair to be of roles usually has  the same actor.
      Transfers typically entail one or more Relays.  However direct
       delivery from the Source Originator to Destination Receiver is possible.  For intra-organization  Intra-
          organization mail services, it
   is common to services usually have only one Relay.

   +------------+                           +-----------+
   |

           ++==========++                        ++===========++
           ||  Author   |         +--------+        |  ||                        || Recipient ||
           ++====++====++   +--------+           ++===========++
                 ||         |
   +-----+------+   +....>| Return |        +-----------+
         |          .     +--------+              ^
         |                  /\
                 ||         +-+------+                  ||
                 \/           .    ^                   |
   //===================================================\\                    ||    |
             +---------+      .    .                +---++---+
             |  Mail Handling    |     ||
   ||         |      .    .                |  Service (MHS)        |
         //==+=========+============================+========+===\\
         ||
         V          .  |         |
     +---------+      .         ^              +----+---+
     |         |    .      MHS       |        |        |   ||
         ||  | Origin  +....+         +-<------------+  Dest  |
     |         |              |              |        |
     +----+----+  +<......    .................+  Recv  |              +--------+   ||
             |         |           ^                |  +-------------->-+-<-------------+   |
          V  |                |               |        |
             +---++----+           .                +--------+
                 ||                .                    /\
                 ||  ..............+..................  ||
                 \/  .             .                 .  ||
             +-------+-+         +----+----+        +-+---+---+        +--+------+        +-+--++---+
             |  Relay  +-->...-->|  +=======>|  Relay  +------->|  +=======>|  Relay  |
             +---------+         +----+----+        +----++---+        +---------+
                              |
                              V
                                     ||
                                     ||
                                     \/
                                +---------+
                                | Gateway +-->...
                                +---------+

                 Figure 3: Relationships Among MHS Actors

2.2.1.  Originator

   The Originator role is responsible for ensuring ensures that a message is valid for posting and then submitting
   submits it to a Relay.  Validity
   includes conformance with  A message is valid if it conforms to both
   Internet Mail standards, as well as with standards and local operational policies.  The
   Originator can simply review the message for conformance and reject
   it if there are it finds errors, or it can create some or all of the necessary
   information.  In effect, the Originator is responsible for the
   functions of the Mail Submission Agent.

   The Originator operates with dual "allegiance". allegiance.  It serves the Author
   and often it is can be the same entity.  However  But its role in assuring validity means
   that it MUST also represent the local operator of the MHS, that is,
   the local ADministrative Management Domain (ADMD).

   The Originator also has the responsibility for performs any post-submission, Author-related
   administrative tasks associated with message
   transmission transfer and delivery.  Notably this pertains
   Notably, these tasks pertain to sending error and delivery notices.  Hence Source notices,
   enforcing local policies, and dealing with messages from the Author
   that prove to be problematic for the Internet.  The Originator is best held
   accountable for the message content, even when they did it is not create responsible
   for it.  The Author creates the message, but the Originator handles
   any or most of transmission issues with it.

2.2.2.  Relay

   A mail

   The Relay performs email MHS-level transfer-service routing and store-and-
   forward
   forward, by (re-)transmitting transmitting or retransmitting the message on towards to its Recipient(s).
   A
   Recipients.  The Relay can add adds trace information.  However it information [RFC2505] but does not
   modify
   existing the envelope information or the message content semantics.  It
   can modify message content syntax, representation, such as a change changing the form
   of transfer encoding from binary to
   text transfer-encoding form, text, but only as required to
   meet the capabilities of the next hop in the MHS.

   A set of Relays composes a Mail Handling Service (MHS) network. network consists of a set of Relays.
   This network is above any underlying packet-switching network that they
   might be
   using used and below any gateways Gateways or other user-level Mediators.

   In other words, interesting email scenarios can involve three distinct
   architectural layers layers, each providing its own type of store-and-forward data of store-
   and-forward service:

      *  User Mediators

      *  MHS Relays

      *  Packet Switches

   with the bottom-most usually being

   The bottom layer is the Internet's IP service.  The most basic email
   scenarios involve Relays and Switches.

   Aborting a message transfer results in having makes the Relay become an Author and sending because it must
   send an error message to the Return address.  The potential for
   looping is avoided by having this message, itself,
   contain no omitting a Return address. address from this message.

2.2.3.  Gateway

   A Gateway is a hybrid form of User and Relay that interconnects connects heterogeneous
   mail services.  Its purpose is simply to emulate a Relay and the closer it
   comes to this, the better.  However it  A Gateway operates at the as a User level, because when it MUST be able
   needs the ability to modify message content.

   Differences between mail services can be as small as minor syntax
   variations, but they usually encompass significant, semantic
   distinctions.  One difference could have the concept of an be email address being a
   hierarchical, addresses that are
   hierarchical and machine-specific address, versus having it be rather than a flat, global name space.
   namespace.  Another difference could be between support for text-only
   content, versus content
   or multi-media.  Hence the Relay function in a Gateway
   offers presents a
   significant design challenges, to make challenge, if the result resulting performance is to be
   seen as
   seamless as possible. nearly seamless.  The most significant challenge is in ensuring
   the to ensure user-to-user
   functionality that matches between the services, despite differences in their
   syntax and semantics of
   independent email standards suites. semantics.

   The basic test of a Gateway's adequacy is, of course, Gateway design is whether an Author on one side of
   a Gateway can send a useful message to a Recipient on the other side,
   without requiring changes to any of the components in the Author's or
   Recipient's mail services, services other than adding the Gateway.  To each of
   these otherwise independent services, the Gateway will appear appears to be a "native"
   native participant.  However  But the ultimate test of a Gateway's adequacy Gateway design is
   whether the Author and Recipient can sustain a dialogue.  In particular
   particular, can a Recipient's MUA automatically formulate a valid
   Reply that will reach the initial Author?

2.2.4.  Receiver

   The Receiver performs final delivery or sends the message to an
   alternate address.  It can also perform filtering and other policy
   enforcement immediately before or after delivery.

2.3.  Administrative Actors

   Actors often are

   Administrative actors can be associated with different organizations,
   each with its own administrative authority.  This operational
   independence, coupled with the need for interaction between groups,
   provides the motivation for distinguishing to distinguish among ADministrative
   Management Domains
   (ADMD). (ADMDs ).  Each ADMD can have vastly different
   operating policies and trust-based decision-making.  An  One obvious
   example is the distinction between mail that is exchanged within a single organization, versus an
   organization and mail that is exchanged between independent
   organizations.  The rules for handling these two both types of traffic tend to
   be quite different.  That difference requires defining the boundaries
   of each, and this requires the ADMD construct.

   Operation of Internet Mail services is apportioned to carried out by different
   providers (or operators).  Each can be an independent ADMD.  This
   independence of administrative decision-making defines boundaries
   that distinguish different portions of the Internet Mail service.
   Examples include an end-user operating their desktop client, a  A
   department operating that operates a local Relay, an IT department operating that
   operates an enterprise Relay Relay, and an ISP operating that operates a public
   shared email service.
   These service can be configured into many combinations of
   administrative and operational relationships, with each ADMD relationships.  Each is a distinct
   ADMD, potentially having a complex arrangement of functional
   components.  Figure 4 depicts relationships among ADMDs.  The benefit
   of having the ADMD construct is to facilitate discussion about designs designs,
   policies and operations that need to distinguish between "internal" internal
   issues and "external" external ones.

   The architectural impact of needing to have the need for boundaries between ADMD's ADMDs is
   discussed in [Tussle].  Most significant is that the entities
   communicating across ADMD boundaries will typically have an the added burden to enforce
   of enforcing organizational policies concerning "external"  external
   communications.  At a more mundane level, routing mail between ADMDs
   can be an issue, such as needing to route mail for partners over
   specially-trusted
   specially trusted paths.

   Basic

   These are the basic types of ADMDs include -- ADMDs:

      Edge:    Independent transfer services, services in networks at the edge of
         the open Internet Mail service.

      User:   End-user services.

      Consumer:    This might be subsumed under the a type of Edge service, such as is common
         for web-based email access.

      Transit:   These are    Mail Service Providers (MSP) offering value-
         added that offer value-added
         capabilities for Edge ADMDs, such as aggregation and filtering.

   Note that Transit services are quite

   The mail-level transit service is different from packet-level
   switching operation.  Whereas end-to-end
   switching.  End-to-end packet transfers usually go through
   intermediate routers, routers; email exchange across the open Internet
   is often can be
   directly between the Boundary MTAs of Edge ADMDs, at the
   email level. ADMDs.  This further distinction
   between direct and indirect interaction  highlights the differences
   discussed in Section 2.2.2
         +--------+     +---------+     +-------+                           +-------+    +-------+     +-----------+
         |  ADMD1 |                           | |<===>|  ADMD2  |<===>| ADMD3 |<===>|   ADMD4   |
         | ADMD4  ----- |     |  -----  |     | ----- |     |   -----   |
         |        |   +---------------------->|     |         |     |       | User     |           |                       |-Edge--+--->|-User
         | Author |     |         |     |       |     |           |    +---------+   +--->|
         |   .    |     |         |     |       |     |           |
         |   V    |     |         |  ADMD2     |       |    +-------+    +-------+     | Edge--+---+           |  -----
         |  Edge..+....>|.Transit.+....>|-Edge..+....>|.Recipient |
         |        |     |         |     |       |
   +-------+   +----|-Transit-+---+     |           |
         +--------+     +---------+     +-------+     +-----------+

              Figure 4: ADMD Administrative Domain (ADMD) Example

   Edge networks can use proprietary email standards internally.
   However the distinction between Transit network and Edge network
   transfer services is primarily significant because it highlights the need for
   concern over interaction and protection between independent
   administrations.  In particular particular, this distinction calls for
   additional care in assessing the transitions of responsibility, as well as responsibility and
   the accountability and authorization relationships among participants
   in
   email message transfer.

   The interactions between functional components within an of ADMD components are subject to the policies of
   that domain.  Policies can domain, which cover concerns such
   things as:

   o as these:

      *  Reliability

   o

      *  Access control

   o

      *  Accountability

   o

      *  Content evaluation and modification

   They

   These policies can be implemented in different functional components,
   according to the needs of the ADMD.  For example example, see [RFC5068].

   User, Edge

   Consumer, Edge, and Transit services can be offered by providers that
   operate component services or sets of services.  Further  Further, it is
   possible for one ADMD to host services for other ADMDs.

   Common ADMD examples

   These are -- common examples of ADMDs:

      Enterprise Service Providers:

         Operating an organization's

         These ADMDs operate the internal data and/or the mail services. services
         within an organization.

      Internet Service Providers:

         Operating Providers (ISP):

         These ADMDs operate the underlying data communication services that, in turn, services,
         which are used by one or more Relays Relay and Users.  It is User.  ISPs are not
         necessarily their job to perform
         responsible for performing email functions, but they can,
         instead, can
         provide an environment in which those functions can be
         performed.

      Mail Service Providers:

         Operating

         These ADMDs operate email services, such as for end-users, consumers or mailing
         lists.

   Operational pragmatics often dictate
         client companies.

   Practical operational concerns demand that providers be involved in
   detailed
   administration and enforcement issues, to help ensure the
   health of the overall Internet Mail Service. issues.  This involvement can include extend
   to operators of lower-level packet services.

3.  Identities

   Internet Mail uses three forms of identity: mailbox, domain name name, and
   message-id.
   message-ID.  Each is required to must be globally unique.

3.1.  Mailbox

      "A mailbox sends and receives mail.  It is a conceptual entity
      which does not necessarily pertain to file storage."  [RFC2822]

   A mailbox is specified as an Internet Mail address <addr-spec>.  It
   has two distinct parts, divided separated by an at-sign ("@"). (@).  The right-hand right side
   is a globally interpreted domain name that is associated with an ADMD.
   Domain Names names are discussed in Section 3.2. 3.3.  Formal Internet Mail
   addressing syntax can support source routes, to indicate the path
   through which a message should ought to be sent.  Although legal, the  The use of source routes
   is not part of the modern Internet Mail service common and
   it is not discussed further. has been deprecated in [RFC2821].

   The portion to the left of the at-sign contains a string that is
   globally opaque and is called the <local-part>.  It is to be
   interpreted only by the entity specified by the address's right-hand
   side domain
   name.  All  Except as noted later in this section all other entities MUST
   treat the local-part <local-part> as a an uninterpreted literal string and MUST
   preserve all of its original details.  As such its public
   distribution is equivalent to sending a Web browser "cookie" that is
   only interpreted upon being returned to its Author.

3.1.1.  Global Standards creator.

   Some local-part values have been standardized, for Local-Part contacting
   personnel at an organization.  These names cover common operations
   and business functions.  [RFC2142]

   It is common for sites to have local structuring conventions for the
   left-hand side <local-part> of an <addr-spec>.  This permits sub-
   addressing, such as for distinguishing different discussion groups
   used by the same participant.  However it is worth stressing that
   these conventions are strictly private to the user's organization and
   SHOULD
   MUST NOT be interpreted by any domain except the one listed in the
   right-hand
   right side of the addr-spec. <addr-spec>.  The exceptions are those specialized
   services conforming that conform to public, standardized conventions, as noted
   below.

   There are a

   A few types of addresses that have an elaboration elaborate on basic email addressing, with a
   standardized, global schema for the local-
   part.  These <local-part>, Include are
   conventions between authoring systems and Recipient
   Gateways, and they Gateways.  They are
   invisible to the public email transfer infrastructure.  When an
   Author is explicitly sending via through a Gateway out of the Internet, there are
   coding conventions for the local-part,
   so that <local-part> allow the Author can to formulate
   instructions for the Gateway.  Standardized examples of this such
   conventions are the telephone numbering formats for VPIM [RFC3801],
   such as "+16137637582@vpim.example.com", as:

                       +16137637582@vpim.example.com

   and iFax [RFC3192], such as "FAX=+12027653000/T33S=1387@ifax.example.com".

3.1.2. as:

                FAX=+12027653000/T33S=1387@ifax.example.com

3.2.  Scope of Email Address Use

   Email addresses are being used far beyond their original role in
   email transfer and delivery role. delivery.  In practical terms, an email address
   string has become the common identifier for representing online
   identity.  What is essential, then,  Hence, it is essential to be clear about both the nature
   and role of an identity string in a particular context and to be
   clear about the entity
   responsible for setting that string.  For example, see: see Section 4.1.4,
   Section 4.3.3, 4.3.3 and Section 5.

3.2.

3.3.  Domain Names

   A domain name is a global reference to an Internet resource, such as
   a host, a service service, or a network.  A domain name usually maps to one
   or more IP Addresses.  Conceptually  Conceptually, the name might can encompass an entire
   organization, a collection of machines integrated into a homogeneous
   service, or only a single machine.  A domain name can be administered to
   refer to individual users, but this is not common practice.  The name
   is structured as a hierarchical sequence of sub-names, names, separated by dots ("."),
   (.), with the top of the hierarchy being on the right-end right end of the
   sequence.  Domain names are defined and operated through the Domain
   Name System (DNS) [RFC1034], [RFC1035], [RFC2181].

   When not part of a mailbox address, a domain name is used in Internet
   Mail to refer to the ADMD or to the host that took action upon the
   message, such as providing the administrative scope for a message
   identifier,
   identifier or performing transfer processing.

3.3.

3.4.  Message Identifier

   There are two standardized tags for identifying messages: Message-ID Message-ID:
   and ENVID.

3.3.1.  A Message-ID: pertains to content, and an ENVID pertains
   to transfer.

3.4.1.  Message-ID

   Internet Mail standards provide for, at most, a single Message-ID:.
   The Message-ID Message-ID: for a single message, which is a user-level tag, primarily used for threading has
   a variety of uses including threading, aiding identification of
   duplicates, and
   for eliminating duplicates DSN tracking.  [RFC2822].  Any actor within the
   Originating ADMD can assign  The Originator assigns the Message-ID.
   Message-ID:.  The recipient's Recipient's ADMD is the intended consumer of the Message-ID,
   Message-ID:, although any actor along the transfer path might can use it.  Internet Mail standards provide for a
   single Message-ID; however more than one

   Message-ID: MUST be globally unique.  Its format is sometimes assigned.

   Like a mailbox address, similar to that
   of a Message-ID has mailbox, with two distinct parts, divided separated by an at-sign ("@").  The right-hand (@).
   Typically, the right side is globally interpreted and specifies the ADMD or host assigning that assigns the identifier.  The left-hand
   identifier, and the left side contains a string that is globally
   opaque and serves to uniquely identify the message within the domain
   referenced on the right-hand right side.  The duration of uniqueness for the
   message identifier is undefined.

   When a message is revised in any way, the question of decision whether to assign
   a new Message-ID Message-ID: requires a subjective assessment, deciding assessment to determine
   whether the editorial content has been changed enough to constitute a
   new message.  [RFC2822] says states that "a message identifier pertains to
   exactly one instantiation of a particular message; subsequent
   revisions to the message each receive new message identifiers."
   However real-world  Yet
   experience dictates suggests that some flexibility. flexibility is needed.  An impossible
   test is whether the recipient will consider the new message to be
   equivalent to the old. old one.  For most components of Internet Mail,
   there is no way to predict a specific recipient's preferences on this
   matter.  Both creating and failing to create a new Message-ID Message-ID: have
   their downsides.

   The best that can be offered, here,

   Here are some guidelines and examples:

      *  If a message is changed only in terms of form, such as
         character-encoding, character-
         encoding, it clearly is still the same message.

      *  If a message has minor additions to the content, such as a
         mailing list tag at the beginning of the RFC2822.Subject header
         field, or some mailing list administrative information added to
         the end of the primary body-part's body-part text, then it probably is
         still probably the same
         message.

      *  If a message has viruses deleted from it, it probably is still probably the
         same message.

      *  If a message has offensive words deleted from it, then some
         recipients will consider it the same message, but some will
         not.

      *  If a message is translated into a different language, then some
         recipients will consider it the same message, but some will
         not.

      *  If a message is included in a digest of messages, it the digest
         constitutes a new message.

      *  If a message is forwarded by a recipient, what is forwarded is
         considered to be
         a new message.

      *  If a message is "redirected", such as using RFC2822
         "Redirect-*" headers, "Resent-*"
         header fields, some recipients will consider it the same
         message, but some will not.

   The absence of both objective, precise criteria for Message-ID re-
   generation, along with the absence of re-generating a
   Message-ID: and strong protection associated with the string, string means
   that the presence of an ID can permit an assessment that is
   marginally better than a heuristic, but the ID certainly has no value
   on its own for strict formal reference or comparison.  Hence Message-ID  For that
   reason, the Message-ID: SHOULD NOT be used for any function that has
   security implications.

3.3.2.

3.4.2.  ENVID

   The ENVID (envelope identifier) is a tag that is primarily for use
   within Delivery Status Notifications (DSN), so that the Return
   Address (RFC2821.MailFrom) recipient can correlate the DSN with be used for message-tracking
   purposes [RFC3885] concerning a
   particular message [RFC3461]. single posting/delivery transfer.
   The ENVID labels a single transit of the MHS by a specific message.
   So, the ENVID is therefore used from for one message posting, until the directly-resulting that message deliveries.  It is
   delivered.  A re-posting of the message, such as by a Mediator, does
   not survive re-postings.

   The ENVID may also be used for re-use that ENVID, but can use a new one, even though the message tracking purposes [RFC3885].
   might legitimately retain its original Message-ID:.

   The format of an ENVID is free-form. free form.  Although its creator might
   choose to impose structure on the string, none is imposed by Internet
   standards.  By implication, the scope of the string is defined by the
   domain name of the Return Address.

4.  Services and Standards

   The Internet Mail's Mail architecture distinguishes among comprises six basic types of
   functionality, which are arranged to support a store-and-forward service
   architecture.
   service.  As shown in Figure 5 these types 5, each type can have multiple
   instances, some of which represent specialized sub-roles. roles.  This section
   considers the activities and relationships among these components,
   and the Internet Mail standards that apply to them.

      1.

         Message

      2.

         Mail User Agent (MUA)

             Originating

            Author MUA (oMUA)

             Receiving (aMUA)

            Recipient MUA (rMUA)

      3.

         Message Submission Agent (MSA)

             Author-focussed

            Author-focused MSA functions (oMSA)

             MHS-focussed (aMSA)

            MHS-focused MSA functions (hMSA)

      4.

         Message Transfer Agent (MTA)

      5.

         Message Delivery Agent (MDA)

            Recipient-focused MDA functions (rMDA)

             MHS-focussed

            MHS-focused MDA functions (hMDA)

      6.

         Message Store (MS)

          1.

            Author MS (oMS)

                 oMS on a remote server (soMS)

                 oMS co-located with the oMUA (uoMS)

          2. (aMS)

            Recipient MS (rms)

                 rMS on a remote server (srMS)

                 rMS co-located with the rMUA (urMS) (rMS)

     This section describes each functional component for Internet Mail,
   and the standards-based protocols associated with their operation.

   Software implementations of these architectural components often
   compress them, such as having the same software do MSA, MTA and MDA
   functions.  However the requirements for each of these components of
   the service are becoming more extensive.  So their separation is
   increasingly common.

      NOTE:   A discussion about any interesting system architecture is
         often complicated by confusion between architecture versus
         implementation.  An architecture defines the conceptual
         functions of a service, divided into discrete conceptual
         modules.  An implementation of that architecture can combine or
         separate architectural components, as needed for a particular
         operational environment.

         A software system that primarily performs message relaying --
         and therefore is an MTA -- might also include MDA
         functionality.  That same MTA system might be able to interface
         with non-Internet email services and therefore qualify as a
         Gateway.

         It is important not to confuse the engineering decisions made
         to implement a product, with the architectural abstractions
         used to define conceptual functions.

   The following figure shows function modules and the standardized protocols
                            used between them.  Additional protocols and configurations
   are possible.  Boxes defined by asterisks (*) represent functions
   that often are distributed among two or more systems.

                     +------+

                     ++========++
                     ||        ||                             +-------+
         ............+ oMUA |..............................|
          ...........++  aMUA  ||<............................+ Disp  |
          .           +--+-+-+          ||        ||                             +-------+
          .          ++=+==+===++                                 ^
          .  local,imap}|  |{smtp,submission                     ^                      .
          .  +-----+    |  |                        +---------+  |                          +--------+  .
          . *******      |  | .......................| Returns aMS |<---+  | ........................>| Return |  . * oMS *<-----+ |
          .                      +---------+  +-----+       | . *******                        +--------+  .
          .                | .    *****************       ^       |       .         +------V-.---*------------+
          .          +-----V-.----*------------+  *       |       |       .       .
          .      MSA | +-------+  *   +------+ |  *       |       |       .       .
          .          | | oMSA  +--O-->| aMSA  +-(S)->| hMSA | |  *       |       |       .       .
          .          | +-------+  *   +--+---+ |  *       |       |       .       .
          V          +------------*------+-----+  *       |       |       .       .
    //==========\\                *      V {smtp  *       |       |       .       .
    || MESSAGE  ||                *   +------+    *  //===+===\\  |  .
    ||----------||            MHS *   | MTA  |    *  ||  dsn  ||  |  .
    || Envelope ||                *   +--+---+    *  \\=======//  |  .
    ||  SMTP    ||                *      V {smtp  *     ^   ^     |     .
    || Content  ||                *   +------+    *     |   |     .   . //==+==\\
    ||  RFC2822 ||                *   | MTA  +----*-----+   |  +....*......   . || mdn ||
    ||  MIME    ||                *   +--+---+    *         |         . \\=====//
    \\==========//                * smtp}| {local *         |     |         .     ^
          .           MDA         *      | {lmtp  *         |     |         .         +------------+------V-----+     .
          .      +----------------+------V-----+  *         |     |         .     .
          .      | +------+ +----------+   *   +------+ |  *         |     |         .     .
          .      | |          |   *   |      | +--*---------+     | +..*..........     .
          .      | |   rMDA |<--O---+   |<-(D)--+ hMDA | |  *               |               .
          .      | |          |   *   |      | |<-*-------+       | |<.*........       .
          .      | +-+----+ +-+------+-+   *   +------+ |  *       |       |       .         +---+--+-----*------------+       .
          .      +------+---------*------------+  *       |       |       .             |       .
          .             |         *****************       |       |       .     pop} +--+  +---+                         |       |       .    imap} |         | {local                  |       |
          .  ******************V********                 |       |             V{smtp,imap,pop,local             .  *       |       +------+  * rMS       .
          .          +-----+                         //===+===\\  |  .  *       |
          .          | srMS rMS |  *                         || sieve ||  |  .  *       V       +--+-+-+  *
          .          +--+--+                         \\=======//  |  .  *  +------+   pop} | |    *
          .             |{imap,pop,local                  ^       |       .  *  | urMS |<-------+ |    *                 |       |
          .  *  +--+---+  imap}   |    *                 |       |             V                                 .  ***************************                 |       |       .  local}|  +------+       |{pop,imap          |       |
          .        +->|      |<------+                   |       |
         ...........>|       ++==========++                          .       .
          .       ||          ||                          .       .
          .......>||   rMUA +---------------------------+       |
                     |      +-----------------------------------+
                     +------+   ++...........................       .
                  ||          ++...................................
                  ++==========++

                   Figure 5: Protocols and     Services

4.1.  Message Data

   The purpose of the Mail Handling Service (MHS) is to exchange a
   message object among participants [RFC2822], [RFC0822].  Hence all  All of its
   underlying mechanisms are merely in the service of getting serve to deliver that message from its Author
   to its Recipients.  A message can be explicitly labeled as to its
   nature [RFC3458].

   A message comprises a transit handling transit-handling envelope and the message
   content.  The envelope contains information used by the MHS.  The
   content is divided into a structured header and the body.  The header
   comprises transit handling trace information and end-user structured fields. fields
   that are part of the Author's message content.  The body may can be
   unstructured simple lines of text, text or it may be a
   MIME tree of multi-media subordinate
   objects, called body-parts, "body-parts" or attachments [RFC2045], [RFC2046],
   [RFC2047], [RFC4288], [RFC4289], [RFC2049].

   In addition, Internet Mail has a few conventions for special control
   data --
   data, notably:

      Delivery Status Notification (DSN):

         A Delivery Status Notification (DSN) is a message that can be
         generated by the MHS (MSA, MTA MTA, or MDA) and sent to the
         RFC2821.MailFrom address.  The mailbox for this is  An MDA and MTA are shown as
         Returns sources
         of DSNs in Figure 5. 5, and the destination is shown as Returns.
         DSNs provide information about message transit, such as transmission
         transfer errors or successful delivery
         [RFC3461]. delivery.  [RFC3461]

      Message Disposition Notification (MDN):

         A Message Disposition Notification (MDN) is a message that
         provides information about user-level, Recipient-side message post-delivery processing, such as
         indicating that the message has been displayed [RFC3798] or the
         form of content that can be supported [RFC3297].  It can be
         generated by an rMUA and is sent to the Disposition-Notification-To address(es). Disposition-
         Notification-To addresses.  The mailbox for this is shown as
         Disp in Figure 5.

      Message Filtering (SIEVE):

         SIEVE

         Sieve is a scripting language that permits specifying used to specify conditions for
         differential handling of mail, typically at the time of
         delivery [RFC3028].  It [RFC5228].  Scripts can be conveyed in a variety of
         ways, as a MIME part.  Figure 5 shows a Sieve specification script  going
         from the rMUA to the MDA.  However  However, filtering can be done at
         many different points along the transit path path, and any one or
         more of them might be subject to Sieve directives, especially
         within a single ADMD.  Hence the Figure 5 shows only one relationship,
         for (relative) simplicity.

4.1.1.  Envelope

   Internet Mail has a fragmented framework for transit-related
   "handling" handling
   information.  Information that is directly used directly by the MHS is called
   the "envelope". "envelope."  It directs handling activities by the transfer
   service as and is carried in transfer service commands.  That is, the
   envelope exists in the transfer protocol SMTP [RFC2821]. SMTP.  [RFC2821]

   Trace information records handling activity and information, such as  RFC2822.Received, is recorded in the
   message Header. header and is not subsequently altered.  [RFC2822]

4.1.2.  Header Fields

   Header fields are attribute name/value pairs covering that cover an extensible
   range of email service, service parameters, structured user content content, and user
   transaction meta-
   information. meta-information.  The core set of header fields is
   defined in [RFC2822], [RFC0822].  It is common practice to extend
   this set, set for different applications.  Procedures for registering
   header fields are defined in [RFC4021]. [RFC3864].  An extensive set of existing
   header field registrations is provided in [RFC3864]. [RFC4021].

   One danger with of placing additional information in header fields is that
   Gateways often alter or delete them.

4.1.3.  Body

   The body of a message might simply be lines of ASCII text or it might
   be a
   hierarchically structured into a  composition of multi-media body-
   part body-part
   attachments, using MIME MIME.  [RFC2045], [RFC2046], [RFC2047], [RFC4288], [RFC2049].  MIME structures each body-part into a
   recursive set of MIME header field meta-data and MIME Content
   sections.
   [RFC2049]

4.1.4.  Identity References in a Message

   For a message in transit,

   Table 1 lists the core uses of identifiers combine into:

     +-----------------------+----------------+---------------------+ present in a message during
   transit.

   +----------------------+----------------+---------------------------+
   | Layer                | Field          | Set By                    |
     +-----------------------+----------------+---------------------+
   +----------------------+----------------+---------------------------+
   | Message Body         | MIME Header    | Author                    |
   | Message header fields       | From From:          | Author                    |
   | fields               | Sender                | Source                           |
   |                      | Reply-To Sender:        | Originator                |
   |                      | Reply-To:      | Author                    |
   |                      | To, CC, BCC To:, CC:, BCC: | Author                    |
   |                      | Message-ID Message-ID:    | Source Originator                |
   |                      | Received Received:      | Source, Originator, Relay, Dest        |
   |                      | Return-Path                | Receiver                  |
   |                      | Return-Path:   | MDA, from MailFrom        |
   |                      | Resent-* Resent-*:      | Mediator                  |
   |                      | List-Id List-Id:       | Mediator Author                  |
   |                      | List-* List-*:        | Mediator Author                  |
   | SMTP                 | HELO/EHLO      | Latest Relay Client       |
   |                      | ENVID          | Source Originator                |
   |                      | MailFrom       | Source Originator                |
   |                      | RcptTo         | Author                    |
   |                      | ORCPT          | Author                    |
   | IP                   | Source Address | Latest Relay Client       |
     +-----------------------+----------------+---------------------+
   +----------------------+----------------+---------------------------+

                        Table 1: Layered Identities

   The

   These are the most common address-related fields are: fields:

      RFC2822.From:   Set by - Author

         Names and addresses for author(s) authors of the message content are
         listed in the From: field.

      RFC2822.Reply-To:   Set by - Author

         If a message Recipient sends a reply message that would otherwise use
         the RFC2822.From field address(es) that are contained addresses in the original message, then they are instead to use the address(es)
         addresses in the RFC2822.Reply-To field. field are used instead.  In
         other words words, this field is a direct
      override of overrides the From: field, field for responses
         from Recipients.

      RFC2822.Sender:   Set by - Source Originator
         This field specifies the address responsible for submitting the
         message
      into to the transfer service.  For efficiency this  This field can be omitted if
         it contains the same address as RFC2822.From.  However  However,
         omitting this field does not mean there is that no Sender specified.  Rather is specified;
         it means that that header field is virtual and that the address
         in the From: field MUST be used.

         Specification of the notifications Return addresses -- addresses, which are
         contained in RFC2821.MailFrom -- RFC2821.MailFrom, is made by the RFC2822.Sender.
         Typically the Return address is the same as the Sender address.  However
         However, some usage scenarios require it to be different.

      RFC2822.To/.CC:   Set by - Author

         These fields specify MUA Recipient addresses.  However  However, some or
         all of the addresses in these fields might not be present in
         the RFC2821.RcptTo commands.

         The distinction between To and CC is subjective.  Generally  Generally, a
         To addressee is considered primary and is expected to take
         action on the message.  A CC addressee typically receives a
         copy only for
      their information. as a courtesy.

      RFC2822.BCC:   Set by - Author

         A copy of the message might be copied sent to an addressee whose
         participation is not to be disclosed to the RFC2822.To or
         RFC2822.CC Recipients and, usually, not to the other BCC
         Recipients.  The BCC BCC: header field indicates a message copy to
         such a Recipient.

      Typically, the field lists no addresses or only lists the single
      address  Use of the Recipient receiving this copy.  An MUA will
      typically make separate postings for TO and CC Recipients, versus
      BCC Recipients.  The former will see no indication that any BCCs
      were sent, whereas the latter have a BCC field present.  It might
      be empty, contain a comment, or contain one or more BCC addresses,
      depending upon the preferences of the Author. is discussed in [RFC2822].

      RFC2821.HELO/.EHLO:   Set by - Source

      The MSA Originator, MSA, MTA

         Any SMTP client -- including Originator, MSA, or MTA -- can
         specify its hosting domain identity for the SMTP HELO or EHLO
         command operation.

      RFC3461.ENVID:   Set by - Source Originator

         The MSA can specify an opaque string, to be included in a DSN,
         as a means of assisting the Return address recipient in
         identifying the message that produced a DSN, DSN or message
         tracking.

      RFC2821.MailFrom:   Set by - Source Originator
         This field is an end-to-end string that specifies an email
         address for receiving return control information, such as "bounces".
         returned messages.  The name of this field is misleading,
         because it is not required to specify either the author Author or the Actor
         actor responsible for submitting the message.  Rather, the Actor
         actor responsible for submission specifies the RFC2821.MailFrom
         address.  Ultimately  Ultimately, the simple basis for deciding what which
         address needs to be in the RFC2821.MailFrom field is to
         determine what which address needs to must be informed about transmission-
      level transfer-level
         problems (and, possibly, (and possibly successes.)

      RFC2821.RcptTo:   Set by - Author Author, Final MTA, MDA.

         This field specifies the MUA mailbox address of a recipient. Recipient.
         The string might not be visible in the message content header.
         For example, the message destination address header fields,
         such as RFC2822.To, might specify a mailing list mailbox, while
         the RFC2821.RcptTo address specifies a member of that list.

      RFC2821.ORCPT:   Set by - Author.

         This is an optional parameter to the RCPT command, indicating
         the original address to which the current RCPT TO address
         corresponds, after a mapping was performed during transit.  An
         ORCPT is the only reliable way to correlate a DSN from a multi-
         recipient message transfer with the intended recipient.

      RFC2821.Received:   Set by - Source, Originator, Relay, Mediator, Dest

         This indicates field contains trace information, including originating
         host,
      relays, Relays, Mediators, and MSA host domain names and/or IP
         Addresses.

      RFC2821.Return-Path:   Set by - Source Originator

         The MDA records the RFC2821.MailFrom address into the
         RFC2822.Return-Path field.

      RFC2919.List-Id:   Set by - Mediator Author

         This field provides a globally unique mailing list naming
         framework that is independent of particular hosts.  [RFC2919]

         The identifier is in the form of a domain name; however however, the
         string usually is constructed by combining the two parts of an
         email
      address and the address.  The result rarely is rarely a true domain name, listed
         in the domain name service -- service,  although it can be.

      RFC2369.List-*:   Set by - Mediator Author

         [RFC2369] defines a collection of message header fields for use
         by mailing lists.  In effect effect, they supply list-specific
         parameters for common mailing list user operations.  The
         identifiers for these operations are for the list, itself, list itself and
         the user-as-subscriber
      [RFC2369]. user-as-subscriber.  [RFC2369]

      RFC0791.SourceAddr:   Set by - The Client SMTP sending host
         immediately preceding the current receiving SMTP server.

         [RFC0791] defines the basic unit of data transfer for the
      Internet,
         Internet:  the IP Datagram.  It contains a "Source Address" Source Address field
         that specifies the IP Address for the host (interface) from
         which the datagram was sent.  This information is set and
         provided by the IP layer, and is therefore which makes it independent of mail-level mail-
         level mechanisms.  As such, it is often taken to be
         authoritative, although it is possible to provide false
         addresses.

4.2.  User-Level Services

   Interactions at the user level entail protocol exchanges, distinct
   from those that occur at lower layers of the Internet Mail
   architecture, which is MHS
   architecture that is, in turn, above the Internet Transport layer.
   Because the motivation for email, and much of its use, is for
   interaction among humans, people, the nature and details of these protocol
   exchanges often are determined by the needs of human interpersonal and
   group communication.
   In terms of efforts to specify behaviors, one effect of this is to
   require  To accommodate the idiosyncratic behavior
   inherent in such communication, only subjective guidelines, rather
   than strict rules, can be offered for some aspects of system
   behavior.  Mailing Lists provide particularly salient examples of this. examples.

4.2.1.  Mail User Agent (MUA)

   A Mail User Agent (MUA) works on behalf of end-users User actors and end-user User
   applications.  It is their "representative" representative within the email service.

   The Origination-side Author MUA (oMUA) (aMUA) creates a message and performs initial "submission"
   submission into the transfer infrastructure, infrastructure via a Mail Submission
   Agent (MSA).  It can also perform any creation- and posting-time
   archival in its Message Store (oMS). (aMS).  An MUA's oMS will
   typically include MUA aMS can organize
   messages in many different ways.  A common model uses aggregations,
   called "folders".  This model allows a folder for messages under
   development (Drafts), a folder for messages waiting to be sent
   (Queued or Unsent) Unsent), and a folder for messages that have been
   successfully posted for
   transmission transfer (Sent).  But none of these folders
   is required.  For example, IMAP allows drafts to be stored in any
   folder; so no Drafts folder is present.

   The Recipient-side Recipient MUA (rMUA) works on behalf of the end-user Recipient to process
   received mail.  This processing includes generating user-
   level return user-level
   disposition control messages, displaying and disposing of the
   received message, and closing or expanding the user communication
   loop,
   loop by initiating replies and forwarding new messages.

      NOTE:   Although not shown in Figure 5, an MUA can, itself, itself can have a
         distributed implementation, such as a "thin" user interface
         module on a limited end-user device, constrained device such as a smartphone, with the bulk most
         of the MUA functionality operated running remotely on a more capable
         server.  An example of such an architecture might use IMAP
         [RFC3501] for most of the interactions between an MUA client
         and an MUA server.  A standardized  An approach for such scenarios is defined
         by [RFC4550].

   A Mediator is special class of MUA.  It performs message re-posting,
   as discussed in Section 2.1.

   Identity

   An MUA can be automated, on behalf of a user who is not present at
   the time the MUA is active.  One example is a bulk sending service
   that has a timed-initiation feature.  These services are not to be
   confused with a mailing list Mediator, since there is no incoming
   message triggering the activity of the automated service.

   A popular and problematic MUA is an automatic responder, such as one
   that sends out-of-office notices.  This behavior might be confused
   with that of a Mediator, but this MUA is generating a new message.
   Automatic responders can annoy users of mailing lists unless they
   follow [RFC3834]. ****** The recommendations in RFC 3834 are an
   important consequence of the addressing architecture of Internet Mail
   so they do help illustrate the architecture. *****

   These identity fields are relevant to a typical end-user MUA include: MUA:

         RFC2822.From

         RFC2822.Reply-To

         RFC2822.Sender
         RFC2822.To, RFC2822.CC

         RFC2822.BCC

4.2.2.  Message Store (MS)

   An MUA can employ a long-term Message Store (MS).  Figure 5 depicts
   an Origination-side Author's MS (oMS) (aMS) and a Recipient-side Recipient's MS (rMS).  There is
   a rich set of choices for configuring a store, because any  An MS may
   comprise a distributed set of component stores.  In Figure 5, the rMS
   demonstrates this by showing an rMS that is can be
   located on a remote server (srMS) and an rMS that is or on the same machine as the MUA
   (urMS).  The relationship between two message stores, themselves, can
   vary.

   As discussed in [RFC1733] the operational relationship among MSs can
   be --

      Online:   Only a remote MUA.

   An MS is used, with acquires messages being accessible
         only when the MUA is attached to the MS, and the MUA repeatedly
         fetches all or part of a message, from one session to the next.

      Offline: an MDA either by a local mechanism or by
   using POP or IMAP.  The MUA accesses the MS is either by a local to the user, and messages are
         completely moved from any remote store,
   mechanism or by using POP or IMAP.  Using POP for message access,
   rather than (also)
         being retained there.

      Disconnected:   An rMS and a uMS are kept synchronized, for all or
         part of their contents, while there bulk transfer, is a connection between
         them.  While they are disconnected, mail can continue to arrive
         at the rMS rare, awkward, and the user may continue to make changes to the
         uMS.  Upon reconnection, the two stores are re-synchronized. largely non-
   standard.

4.3.  MHS-Level Services

4.3.1.  Mail Submission Agent (MSA)

   A Mail Submission Agent (MSA) accepts the message submission from submitted by the
   oMUA
   aMUA and enforces the policies of the hosting ADMD and the
   requirements of Internet standards.  An MSA represents an unusual
   functional dichotomy.  A portion of its task is to represent MUA
   (uMSA)  It represents the interests of the Author
   (aMUA) during message posting, to facilitate posting
   success, and another portion is to represent MHS (hMSA) interests.
   This is best success; it also
   represents the interests of the MHS.  In the architecture, these
   responsibilities are modeled, as shown in Figure 5, with by dividing the
   MSA into two sub-components,
   one for the oMUA (oMSA) aMSA and one hMSA, respectively.  Transfer
   of responsibility for a single message, from an Author's environment
   to the MHS (hMSA)

   The hMSA's function MHS, is to take called "posting".  In Figure 5 it is marked as the (S)
   transition, within the MSA.

   The hMSA takes transit responsibility for a message that conforms to
   the relevant Internet standards and to local site policies.  It
   rejects messages that are not in conformance.  The
   oMSA's is to perform MSA performs final
   message preparation for submission and to
   effect effects the transfer of
   responsibility to the MHS, via the hMSA.  The amount of preparation will depend
   depends upon the local implementations.  Examples of oMSA tasks could be to add
   include adding header fields, such as Date: and Message-ID, to modify Message-ID:, and
   modifying portions of the message from local notations to Internet
   standards, such as expanding an address to its formal RFC2822
   representation.

   Historically, standards-based MUA/MSA interactions message postings have used SMTP
   [RFC2821].  A recent alternative
   SMTP.  [RFC2821] The standard currently preferred is SUBMISSION [RFC4409]. SUBMISSION.
   [RFC4409] Although SUBMISSION derives from SMTP, it uses a separate
   TCP port and imposes distinct requirements, such as access
   authorization.

   Identities

   These identities are relevant to the MSA include: MSA:

         RFC2821.HELO/.EHLO

         RFC3461.ENVID

         RFC2821.MailFrom

         RFC2821.RcptTo

         RFC2821.Received

         RFC0791.SourceAddr

4.3.2.  Mail Transfer Agent (MTA)

   A Mail Transfer Agent (MTA) relays mail for one application-level
   "hop".
   "hop."  It is like a packet-switch or IP router in that its job is to
   make routing assessments and to move the message closer to the
   Recipient(s).
   Recipients.  Of course, email objects are typically much larger than
   the payload of a packet or datagram, and the end-to-end latencies are
   typically much higher.  Relaying is performed by a sequence of MTAs,
   until the message reaches a destination MDA.  Hence  Hence, an MTA
   implements both client and server MTA functionality.  It functionality; it does not make changes to
   change addresses in the envelope or reformulate the editorial
   content.
   Hence a  A change in data form, such as to the MIME Content-Transfer-
   Encoding, is within the purview of an MTA, whereas but removal or replacement
   of body content is not.  Also it can add  An MTA also adds trace information.  Of course
   [RFC2505]

      NOTE:    Within a destination ADMD, email objects are typically much larger than
   the payload of relaying modules can
         make a packet or datagram, and variety of changes to the end-to-end latencies message, prior to delivery.
         In such cases, these modules are
   typically much higher. acting as Gateways, rather
         than MTAs.

   Internet Mail primarily uses SMTP [RFC2821], [RFC0821] primarily to effect
   point-to-point transfers between peer MTAs.  Other transfer
   mechanisms include Batch SMTP [RFC2442] and ODMR [RFC2645].  As with
   most network layer mechanisms, the Internet Mail's Mail SMTP supports a
   basic level of reliability, by virtue of providing for retransmission
   after a temporary transfer failure.  Contrary to  Unlike typical packet switches
   (and Instant Messaging services) services), Internet Mail MTAs typically are expected to
   store messages in a manner that allows recovery across service
   interruptions, such as host system shutdown.  However the  The degree of such
   robustness and persistence by an MTA can be highly variable. vary.  The base SMTP
   specification provides a framework for protocol response codes.  An
   extensible enhancement to this framework is defined in [RFC5248]

   The primary "routing" routing mechanism for Internet Mail is the DNS MX record
   [RFC1035], which specifies a host an MTA through which the queried domain
   can be reached.  This mechanism presumes a public -- public, or at least a
   common --
   common, backbone that permits any attached host MTA to connect to any
   other.

   Identities relevant

   MTAs can perform any of these well-established roles:

      Boundary MTA:   An MTA that is part of an ADMD and interacts with
         MTAs in other ADMDs.  This is also called a Border MTA.  There
         can be different Boundary MTAs, according to the direction of
         mail-flow.

         Outbound MTA:   An MTA include: that relays messages to other ADMDs.

         Inbound MTA:   An MTA that receives inbound SMTP messages from
            MTA  Relays in other ADMDs, for example, an MTA running on
            the host listed as the target of an MX record.

      Final MTA:   The MTA that transfers a message to the MDA.

   These identities are relevant to the MTA:

      RFC2821.HELO/.EHLO

      RFC3461.ENVID

      RFC2821.MailFrom

      RFC2821.RcptTo

      RFC2822.Received

      RFC2822.Received:   Set by - Relay Server

      RFC0791.SourceAddr

4.3.3.  Mail Delivery Agent (MDA)

   A transfer of responsibility from the MHS to a Recipient's
   environment (mailbox) is called "delivery."  In the architecture, as
   depicted in Figure 5, delivery takes place within a Mail Delivery
   Agent (MDA) delivers email and is shown as the (D) transition from the MHS-oriented
   MDA component (hMDA) to the Recipient's
   mailbox.  It Recipient-oriented MDA component (rMDA).

   An MDA can provide distinctive, address-based functionality, made
   possible by its detailed knowledge of information about the properties of the
   destination address.  This knowledge information might also be present
   elsewhere in the Recipient's ADMD, such as at an organizational
   border (Boundary) Relay.  However  However, it is required for the MDA, if
   only because the MDA must is required to know where to deliver the
   message.

   As with

   Like an MSA, an MDA serves two roles, as depicted in Figure 5.
   Formal transfer of responsibility, called "delivery" "delivery", is effected
   between the two components that embody these roles. roles as shows as "(D)"
   in Figure 5.  The MHS portion (hMDA) primarily functions as a server
   SMTP engine.  A common additional role is to re-direct the message to
   an alternative address, as specified by the recipient addressee's
   preferences.  The job of the recipient portion of the MDA (rMDA) is
   to perform any
   delivery-actions are desired by the recipient.

   Using Internet protocols, delivery can be effected actions that the Recipient specifies.

   Transfer into the MDA is accomplished by a variety of
   standard protocols.  When coupled with normal MTA transfer
   mechanism.  Transfer from an internal local mechanism,
   SMTP [RFC2821] and LMTP [RFC2033] permit "push" delivery MDA to an MS uses an access protocol,
   such as POP or IMAP.

      NOTE:    The term "delivery" can refer to the
   Recipient system, at the initiative of formal, MHS function
         specified here or to the upstream email service.
   POP [RFC1939] and IMAP [RFC3501] are used first time a message is displayed to a
         Recipient.  A simple, practical test for "pull" delivery at the
   initiative of whether the Recipient system.  POP and IMAP MHS-based
         definition applies is whether a DSN can also be used
   for repeated access to messages on a remote MS.

   Identities generated.

   These identities are relevant to the MDA include: MDA:

      RFC2821.Return-Path:   Set by - Author Source Originator or Mediator Source
         Originator

         The MDA records the RFC2821.MailFrom address into the
         RFC2822.Return-Path field.

      RFC2822.Received:   Set by - MDA server

         An MDA can record a Received Received: header field to indicate trace
         information, including source host and receiving host domain
         names and/or IP Addresses.

4.4.  Transition Modes

   From the origination site to the point of delivery, Internet Mail
   usually follows a "push" model.  That is, the actor that holds the
   message initiates transfer to the next venue, typically with SMTP
   [RFC2821] or LMTP [RFC2033].  With a "pull" model, the actor that
   holds the message waits for the actor in the next venue to initiate a
   request for transfer.  Standardized mechanisms for pull-based MHS
   transfer are ETRN [RFC1985] and ODMR [RFC2645].

   After delivery, the Recipient's MUA (or MS) can gain access by having
   the message pushed to it or by having the receiver of access pull the
   message, such as by using POP [RFC1939] and IMAP [RFC3501].

4.5.  Implementation and Operation

   A discussion of any interesting system architecture often bogs down
   when architecture and implementation are confused.  An architecture
   defines the conceptual functions of a service, divided into discrete
   conceptual modules.  An implementation of that architecture can
   combine or separate architectural components, as needed for a
   particular operational environment.  For example, a software system
   that primarily performs message relaying  is an MTA, yet it might
   also include MDA functionality.  That same MTA system might be able
   to interface with non-Internet email services and thus perform both
   as an MTA and as a Gateway.

   Similarly, implemented modules might be configured to form
   elaborations of the architecture.  An interesting example is a
   distributed MS.  One portion might be a remote server and another
   might be local to the MUA.  As discussed in [RFC1733], there are
   three operational relationships among such MSs:

      Online:   The MS is remote, and messages are accessible only when
         the MUA is attached to the MS so that the MUA will re-fetch all
         or part of a message, from one session to the next.

      Offline:   The MS is local to the user, and messages are
         completely moved from any remote store, rather than (also)
         being retained there.

      Disconnected:   An rMS and a uMS are kept synchronized, for all or
         part of their contents, while they are connected.  When they
         are disconnected, mail can arrive at the rMS and the user can
         make changes to the uMS.  The two stores are re-synchronized
         when they are reconnected.

5.  Mediators

   Basic email message transfer from an Author to the specified Recipients is accomplished by
   using an asynchronous, asynchronous store-and-forward communication infrastructure, infrastructure
   in a sequence of independent transmissions through some number of
   MTAs.  A very different task is a User-level sequence of postings and deliveries, deliveries
   through Mediators.  A Mediator forwards a message, through a re-posting re-
   posting process.  The Mediator does share shares some functionality with basic
   MTA relaying, but
   it enjoys a degree of freedom with has greater flexibility in both addressing and
   content that than is not available to MTAs.

      RFC2821.HELO/.EHLO:   Set

   This is the core set of message information that is commonly set by - Mediator Source

      RFC3461.ENVID
   all types of Mediators:

      RFC2821.HELO/.EHLO:   Set by - Author Source or Mediator Source

      RFC2821.MailFrom: Originator

      RFC3461.ENVID:   Set by - Author Source or Mediator Source Originator

      RFC2821.RcptTo:   Set by - Mediator Author

      RFC2821.Received:   Set by - Mediator Dest

         The salient Mediator can record received information, to indicate the
         delivery to the original address and submission to the alias
         address.  The trace of Received: header fields can include
         everything from original posting, through relaying, to final
         delivery.

   The aspect of a Mediator, Mediator that distinguishes it from any other MUA
   creating an entirely new message, a message is that a Mediator preserves the integrity and
   tone of the original message, including the essential aspects of its
   origination information.  The Mediator might also add commentary.

   Examples of MUA message creation NOT performed by Mediators include
   -- messages that a Mediator does not create include:

      New message that forwards an existing message:

         This

         Although this action rather curiously provides a basic template for a class of Mediators.  However for
         Mediators, its typical occurrence it is
         not itself not, itself, an example of
         a Mediator.  The new message is viewed as being from the Actor actor
         that is doing the forwarding, rather than being from the original
         Author.

         A new message encapsulates the original message and is seen as
         strictly "from"
         from the Mediator.  The new Originator.  This Mediator Originator might add
         commentary and certainly has the opportunity to can modify the original message content.  The

         Because the forwarded message is therefore
         independent a component of the original message exchange and
         sent by the new Originator, the new message creates a new
         message
         dialogue.  However the final Recipient still sees the contained
         message as from the original Author.

      Reply:

         When a Recipient formulates a response back responds to the original
         message's author, Author of a message, the new
         message is not typically viewed as
         being a "forwarding" forwarding of the
         original.  Its focus is the new content, although it might
         contain all or part of the material
         in from the original message.  Therefore the
         The earlier material is merely contextual and secondary.  This
         includes automated replies, such as vacation out-of-office
         notices, as discussed in Section 4.2.1.

      Annotation:

         The integrity of the original message is usually preserved, but
         one or more comments about the message are added in a manner
         that distinguishes commentary from original text.  The tone primary
         purpose of the new message is that it is primarily to provide commentary from a new
         Author, similar to a Reply.

   The remainder of this section describes common examples of
   Mediators.

5.1.  Aliasing

   Aliasing  Alias

   One function of an MDA is to determine the internal location of a
   mailbox in order to perform delivery.  An Alias is a simple re-addressing re-
   addressing facility that is available in most
   MDA implementations.  It is performed just before placing provides one or more new Internet Mail
   addresses, rather than a message
   into the specified Recipient's mailbox.  Instead single, internal one; the message is
   submitted back to continues
   through the transfer service, for delivery to one or more alternate
   addresses.  Although typically implemented as part of an MDA, this
   facility is strictly a Recipient user function.  It resubmits the message, replacing although
   all handling information except the envelope address, on behalf of
   the mailbox recipient
   (rfc2821.RcptTo) address that was listed in is retained.  In particular, the envelope. Return
   address (rfc2821.MailFrom) is unchanged.

   What is most distinctive about this forwarding mechanism is how closely it compares to
   resembles normal MTA store-and-forward Relaying. relaying.  Its only interesting
   significant difference is that it changes the RFC2821.RcptTo value.  Having the change be
   Because this small makes it easy to view change is so small, aliasing can be viewed as a part of
   the lower-level mail relaying activity.
   However the  However, this small change
   has a large semantic impact: The designated recipient has chosen a
   new recipient.  Hence that original recipient
   SHOULD become responsible for any handling issues.  This change would
   be reflected by replacing

      NOTE:    When the message's RFC2821.MailFrom address to
   be replacement list includes more than one within the scope of the ADMD doing address,
         the aliasing.

   An MDA that alias is re-posting a message increasingly likely to an have delivery problems.
         Any problem reports go to the original Author, not the
         administrator of the alias entry. This makes it more difficult
         to resolve the problem, because the original Author has no
         knowledge of the Alias mechanism.

   Alias typically changes only envelope information:

      RFC2822.To/.CC/.BCC:   Set by - Author

         These fields retain their original addresses.

      RFC2821.RcptTo:   Set by - Mediator Author

         This field contains an alias address.

      RFC2821.MailFrom:   Set by - Author Source or Mediator Source

         The Actor responsible for submission to an alias address will
         often retain the original address to receive handling Returns.

         The benefit of retaining the original MailFrom value is to
         ensure that an actor related to the origination-side Actor originating ADMD knows that
         there has been a delivery problem.  On the other hand, the
         responsibility for handling problems, when transiting from the problem
         original recipient mailbox to the alias mailbox usually lies
         with the that original Recipient, since because the Alias mechanism is
         strictly under the that Recipient's control.

      RFC2821.Received  Set by - Mediator Dest

         The Actor can record Received information, to indicate the
         delivery to  Retaining the
         original MailFrom address and submission to the alias
         address.  The trace of Received header fields can therefore
         include everything from original posting through final delivery
         to a final delivery. prevents this.

5.2.  Re-Sending  ReSender

   Also called Re-Directing, Re-Sending differs the ReDirector, the ReSender's actions differ from Forwarding by
   virtue of having
   forwarding because the Mediator "splice" "splices" a message's addressing
   information,
   information to connect the Author of the original message and with the
   Recipient of the new message.  This connection permits them to have
   direct exchange, using their normal MUA Reply functions.  Hence functions, while also
   recording full reference information about the Recipient who served
   as a Mediator.  Hence, the new Recipient sees the message as being From:
   from the original Author, even if the Mediator adds commentary.

   Identities specified in

   These identities are relevant to a resent message include message:

      RFC2822.From:   Set by - original Author
         Names and email addresses for the original author(s) Author  of the message
         content are retained.  The free-form (display-name) portion of
         the address might be modified to provide informal reference to
         the Actor responsible for the redirection. ReSender.

      RFC2822.Reply-To:   Set by - original Author

         If this field is present in the original message, it is
         retained in the Resent resent message.

      RFC2822.Sender:   Set by - Author Source Author's Originator or Mediator Source.
         Originator.

      RFC2822.To/.CC/.BCC:   Set by - original Author

         These fields specify the original message Recipients.

      RFC2822.Resent-From:   Set by - Mediator Author

         The

         This address is of the original Recipient who is redirecting
         the message.  Otherwise  Otherwise, the same rules apply for to the Resent-From: Resent-
         From: field as for to an original RFC2822.From field.

      RFC2822.Resent-Sender:   Set by - Mediator Source Originator

         The address of the Actor actor responsible for re-submitting resubmitting the
         message.  As with RFC2822.Sender, this field is often can be omitted
         when it would merely contain contains the same address as RFC2822.Resent-From.

      RFC2822.Resent-To/-CC/-BCC:   Set by: Mediator Author

         The addresses of the new Recipients who will are now be able to reply
         to the original author.

      RFC2821.MailFrom:   Set by - Mediator Source Originator

         The Actor actor responsible for re-submission resubmission (RFC2822.Resent-Sender)
         is also responsible for specifying the new MailFrom address.

      RFC2821.RcptTo:   Set by - Mediator Author

         This will contain the address of a new Recipient.

      RFC2822.Received:   Set by - Mediator Dest

         When resending a message the submission agent can record a
         Received header field, to indicate the transition from original
         posting to resubmission.

5.3.  Mailing Lists

   A Mailing lists have List receives messages as an explicit email addresses addressee and they re-post messages then
   re-posts them to a list of subscribed members.  The Mailing List Actor
   performs a task that can be viewed as an elaboration of the Re-Director role. ReSender.
   In addition to sending the new message to a potentially large number
   of new Recipients, the Mediator Mailing List can modify content, such as for example,
   by deleting attachments, converting the format, and adding list-specific list-
   specific comments.  In addition, archiving list  Mailing Lists also archive messages is common. posted by
   Authors.  Still the message retains characteristics of being "from" from the
   original Author.

   Identities

   These identities are relevant to a mailing list processor, when
   submitting a
   message, include: message:

      RFC2919.List-Id:   Set by - Mediator Author

      RFC2369.List-*:   Set by - Mediator Author

      RFC2822.From:   Set by - original Author

         Names and email addresses for the original author(s) Author of the
         message content are specified -- or, rather, retained.

      RFC2822.Reply-To:   Set by - Mediator or original Author or Mediator

         Although problematic, it is common for a Mailing List to assign
         its own addresses to the Reply-To: header field of messages
         that it posts.  This assignment is intended to ensure that
         replies go to all list members, rather than to only the
         original Author.  As a User actor, a Mailing List is the Author
         of the new message and can legitimately set the Reply-To:
         value.  As a Mediator attempting to represent the message on
         behalf of its original Author, creating or modifying a
         Reply-To: field can be viewed as violating that Author's
         intent.  Modifying the field to include the list address can
         send to the entire list replies that are meant only for the
         original Author.  When the Mailing List does not set the field,
         a reply meant for the entire list can instead go only to the
         original Author.  At best, either choice is a matter of group
         culture for the particular list.

      RFC2822.Sender:   Set by - Author Source Originator or Mediator Source
         Originator

         This will field usually specify specifies the address of the Actor actor
         responsible for mailing list Mailing List operations.  However some mailing lists  Mailing Lists that
         operate in a manner very similar to a simple MTA Relay, so that
         they Relay preserve as
         much of the original handling information as possible,
         including the original RFC2822.Sender field.

      RFC2822.To/.CC  (Note that this
         mode of operation causes the Mailing List to behave much like
         an Alias, with a possible difference in number of new
         addressees.)

      RFC2822.To/.CC:   Set by - original Author

         These fields usually contain the original list of Recipient
         addresses.

      RFC2821.MailFrom

      RFC2821.MailFrom:   Set by - Author Source or Mediator Source

         This Originator

         Because a Mailing List can contain modify the original address to be notified content of
         transmission issues, or the mailing list Actor can set it to
         contain a new Notification address.  Typically the value message in
         any way, it is set
         to a new address, so responsible for that mailing list members and posters are
         not burdened with transmission-related Returns.

      RFC2821.RcptTo  Set by - Mediator Author

         This contains content; that is, it is an
         Author.  As such, the address of a mailing list member.

      RFC2821.Received  Set Return Address is specified by - Mediator Dest

         A the
         Mailing List Actor can record a Received header field, to
         indicate List.  Although it is plausible for the transition from original posting to mailing list
         forwarding.  The Actor can choose Mailing List to have
         re-use the message retain Return Address employed by the original set of Received header fields or can choose Originator,
         notifications sent to
         remove them.  In the latter case it can ensure that the
         original Received header fields are otherwise available, to
         ensure later accountability and diagnostic access to them. address after a message has been
         processed by a Mailing List could be problematic.

5.4.  Gateways

   A Gateway performs the basic routing and transfer work of message
   relaying, but it also may make any is permitted to modify content, structure,
   address, or
   attribute modifications attributes as needed to send the message into a messaging
   environment that operates according to under different standards or potentially
   incompatible policies.  When a Gateway connects two differing
   messaging services, its role is easy to identify and understand.
   When it connects environments that have follow similar technical
   similarity,
   standards, but can have significant significantly different administrative differences, policies, it is
   easy to think that view a Gateway is as merely an MTA.

   The critical distinction between an MTA and a Gateway is that the
   latter a
   Gateway can make substantive changes to a message, in order message to map between the standards of two, different messaging services.
   standards.  In virtually all cases, this mapping process results in some
   degree of semantic loss.  The challenge of Gateway design is to
   minimize this loss.  Standardized gateways to Internet Mail are
   facsimile [RFC4143], voicemail [RFC3801], and MMS [RFC4356]

   A Gateway can set any identity field available to a regular an MUA.
   Identities  These
   identities are typically relevant to Gateways include: Gateways:

      RFC2822.From:   Set by - original Author

         Names and email addresses for the original author(s) Author of the message
         content are retained.  As for all original addressing
         information in the message, the Gateway can translate addresses
         in whatever way will allow them
         as required to continue to be useful in the target environment.

      RFC2822.Reply-To:   Set by - original Author

         The Gateway SHOULD retain this information, if it is originally present.
         The ability to perform a successful reply by a
         Gatewayed Recipient is a
         typical test of Gateway functionality.

      RFC2822.Sender:   Set by - Author Source Originator or Mediator Source
         Originator

         This field can retain the original value or can be set to a new
         address.

      RFC2822.To/.CC/.BCC

      RFC2822.To/.CC/.BCC:   Set by - original Recipient

         These fields usually retain their original addresses.

      RFC2821.MailFrom

      RFC2821.MailFrom:   Set by - Author Source Originator or Mediator Source
         Originator

         The Actor actor responsible for gatewaying handling the message can choose to specify a
         new address to receive handling notices.

      RFC2822.Received  Set by - Mediator Dest

         The Gateway can record a Received header field, to indicate the
         transition from the original posting environment to the new
         messaging environment.

5.5.  Boundary Filter

   Organizations often

   To enforce security boundaries by subjecting boundaries, organizations can subject messages to
   analysis, for conformance with the organization's its safety policies.  An example is
   detection of content classed as spam or a virus.  A Filter filter might
   alter the content, to render it safe, such as by removing content
   deemed unacceptable.  Typically  Typically, these actions
   will result in the addition of add content to the
   message that records the actions.

6.  Considerations

6.1.  Security Considerations

   This document does not specify any describes the existing Internet Mail architecture.  It
   introduces no new capabilities.  The security considerations of this
   deployed architecture are documented extensively in the technical
   specifications referenced by this document.  These specifications
   cover classic security topics, such as authentication and privacy.
   For example, email transfer protocols can use standardized mechanisms
   for operation over authenticated and/or encrypted links, and message
   content has similar protection standards available.  Examples of such
   mechanisms include SMTP-TLS [RFC3207], SMTP-Auth [RFC2554], OpenPGP
   [RFC4880], and S/MIME [RFC3851].

   The core of the Internet Mail functionality.
   Consequently architecture does not impose any
   security requirements or functions on the end-to-end or hop-by-hop
   components.  For example, it is does not intended require participant
   authentication and does not attempt to introduce any prevent data disclosure.

   Particular message attributes might expose specific security
   considerations.

   However its discussion  For example, the blind carbon copy feature of the roles
   architecture invites disclosure concerns, as discussed in section 7.2
   of [RFC2821] and responsibilities for
   different mail service modules, section 5 of [RFC2822].  Transport of text or non-
   text content in this architecture has security considerations that
   are discussed in [RFC2822], [RFC2045], [RFC2046], and [RFC4288] as
   well as the information they create,
   highlights security considerations present in the considerable degree IANA media types
   registry for the respective types.

   Agents that automatically respond to which email raise significant security issues
   considerations, as discussed in [RFC3834].  Gateway behaviors affect
   end-to-end security services, as discussed in [RFC2480].  Security
   considerations for boundary filters are
   present when implementing any component discussed in [RFC5228].

   See section 7.1 of [RFC2821] for a discussion of the topic of
   origination validation.  As mentioned in Section 4.1.4, it is common
   practice for components of this architecture to use the
   [RFC0791].SourceAddr to make policy decisions [RFC2505], although the
   address can be "spoofed".  It is possible to use it without
   authorization.  SMTP and Submission authentication [RFC2554],
   [RFC4409] provide more secure alternatives.

   The discussion of trust boundaries, ADMDs, actors, roles, and
   responsibilities in this document highlights the relevance and
   potential complexity of security factors for operation of an Internet Mail
   mail service.
   In addition, email transfer protocols can operate over authenticated
   and/or encrypted links,  The core design of Internet Mail to encourage open and message content or authorship can be
   authenticated
   casual exchange of messages has met with scaling challenges, as the
   population of email participants has grown to include those with
   problematic practices.  For example, spam, as defined in [RFC2505],
   is a by-product of this architecture.  A number of standards track or encrypted.
   BCP documents on the subject have been issued.  [RFC2505], [RFC5068],
   [RFC3685]

6.2.  IANA Considerations

   This document has no actions for IANA.

6.3.  Internationalization

   Because its origins date back to the use of ASCII, Internet Mail has
   had an ongoing challenge to support the wide range of necessary
   international data representations.  For a discussion of this topic,
   see [MAIL-I18N].

7.  References

7.1.  Normative

   [RFC0791]  Postel, J., "Internet Protocol", RFC 791, 1981 September.

   [RFC1034]  Mockapetris, P., "Domain names - concepts and facilities",
              STD 13, RFC 1034, November 1987.

   [RFC1035]  Mockapetris, P., "Domain names - implementation and
              specification", STD 13, RFC 1035, November 1987.

   [RFC1939]  Myers, J. and M. Rose, "Post Office Protocol - Version 3",
              STD 53, RFC 1939, May 1996.

   [RFC2045]  Freed, N. and N. Borenstein, "Multipurpose Internet Mail
              Extensions (MIME) Part One: Format of Internet Message
              Bodies", RFC 2045, November 1996.

   [RFC2046]  Freed, N. and N. Borenstein, "Multipurpose Internet Mail
              Extensions (MIME) Part Two: Media Types", RFC 2046,
              November 1996.

   [RFC2047]  Moore, K., "MIME (Multipurpose Internet Mail Extensions)
              Part Three: Message Header Extensions for Non-ASCII Text",
              RFC 2047, November 1996.

   [RFC2049]  Freed, N. and N. Borenstein, "Multipurpose Internet Mail
              Extensions (MIME) Part Five: Conformance Criteria and
              Examples", RFC 2049, November 1996.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC2181]  Elz, R. and R. Bush, "Clarifications to the DNS
              Specification", RFC 2181, July 1997.

   [RFC2369]  Neufeld, G. and J. Baer, "The Use of URLs as Meta-Syntax
              for Core Mail List Commands and their Transport through
              Message Header Fields", RFC 2369, July 1998.

   [RFC2645]  "On-Demand Mail Relay (ODMR) SMTP with Dynamic IP
              Addresses", RFC 2645, August 1999.

   [RFC2821]  Klensin, J., "Simple Mail Transfer Protocol", RFC 2821,
              April 2001.

   [RFC2822]  Resnick, P., "Internet Message Format", RFC 2822,
              April 2001.

   [RFC2919]  Chandhok, R. and G. Wenger, "List-Id: A Structured Field
              and Namespace for the Identification of Mailing Lists",
              RFC 2919, March 2001.

   [RFC3028]  Showalter, T., "Sieve: A Mail Filtering Language",
              RFC 3028, January 2001.

   [RFC3192]  Allocchio, C., "Minimal FAX address format in Internet
              Mail", RFC 2304, October 2001.

   [RFC3297]  Klyne, G., Iwazaki, R., and D. Crocker, "Content
              Negotiation for Messaging Services based on Email",
              RFC 3297, July 2002.

   [RFC3458]  Burger, E., Candell, E., Eliot, C., and G. Klyne, "Message
              Context for Internet Mail", RFC 3458, January 2003.

   [RFC3461]  Moore, K., "Simple Mail Transfer Protocol (SMTP) Service
              Extension for Delivery Status Notifications (DSNs)",
              RFC 3461, January 2003.

   [RFC3501]  Crispin, M., "Internet Message Access Protocol - Version
              4rev1", RFC 3501, March 2003.

   [RFC3798]  Hansen, T. and G. Vaudreuil, "Message Disposition
              Notification", RFC 3798, May 2004.

   [RFC3834]  Moore, K., "Recommendations for Automatic Responses to
              Electronic Mail", RFC 3834, August 2004.

   [RFC3864]  Klyne, G., Nottingham, M., and J. Mogul, "Registration
              Procedures for Message Header Fields", RFC 3864,
              September 2004.

   [RFC4021]  Klyne, G. and J. Palme, "Registration of Mail and MIME
              Header Fields", RFC 4021, March 2005.

   [RFC4288]  Freed, N., Klensin, J., and J. Postel, "Media Type
              Specifications and Registration Procedures", BCP 13,
              RFC 4288, December 2005.

   [RFC4289]  Freed, N., Klensin, J., and J. Postel, "Multipurpose
              Internet Mail Extensions (MIME) Part Four: Registration
              Procedures", BCP 13, RFC 4289, December 2005.

   [RFC4409]  Gellens, R. and J. Klensin, "Message Submission for Mail",
              RFC 4409, April 2006.

   [RFC4550]  Maes, S., , S., and Isode Ltd., "Internet Email to Support
              Diverse Service Environments (Lemonade) Profile",
              June 2006.

   [RFC5228]  Showalter, T., "Sieve: A Mail Filtering Language",
              RFC 5228.

   [RFC5248]  Hansen, T. and J. Klensin, "A Registry for SMTP Enhanced
              Mail System Status Codes", RFC 5248, June 2008.

7.2.  Informative

   [MAIL-I18N]
              Internet Mail Consortium, "Using International Characters
              in Internet Mail", IMC IMCR-010, August 1998.

   [RFC0821]  Postel, J., "Simple Mail Transfer Protocol", STD 10,
              RFC 821, August 1982.

   [RFC0822]  Crocker, D., "Standard for the format of ARPA Internet
              text messages", STD 11, RFC 822, August 1982.

   [RFC1733]  Crispin, M., "Distributed Electronic Models in IMAP4",
              December 1994.

   [RFC1767]  Crocker, D., "MIME Encapsulation of EDI Objects",
              RFC 1767, March 1995.

   [RFC1985]  De       Winter, J., "SMTP Service Extension for Remote
              Message Queue Starting", August 1996.

   [RFC2033]  Myers, J., "Local Mail Transfer Protocol", RFC 2033,
              October 1996.

   [RFC2142]  Crocker, D., "Mailbox Names for Common services, Roles and
              Functions", RFC 2142, May 1997.

   [RFC2442]  "The Batch SMTP Media Type", RFC 2442, November 1998.

   [RFC2480]  Freed, N., "Gateways and MIME Security Multiparts",
              RFC 2480, January 1999.

   [RFC2505]  Lindberg, G., "Anti-Spam Recommendations for SMTP MTAs",
              RFC 2505, February 1999.

   [RFC2554]  Myers, J., "SMTP Service Extension for Authentication",
              RFC 2554, March 1999.

   [RFC3207]  Hoffman, P., "SMTP Service Extension for Secure SMTP over
              Transport Layer Security", RFC 3207, February 2002.

   [RFC3685]  Daboo, C., "SIEVE Email Filtering: Spamtest and VirusTest
              Extensions", RFC 3685, February 2004.

   [RFC3801]  Vaudreuil, G. and G. Parsons, "", "Voice Profile for Internet
              Mail - version 2 (VPIMv2)", RFC 3801, June 2004.

   [RFC3851]  Ramsdell, B., Ed., "Secure/Multipurpose Internet Mail
              Extensions (S/MIME) Version 3.1 Message Specification",
              RFC 3851, July 2004.

   [RFC3885]  Allman, E. and T. Hansen, "SMTP Service Extension for
              Message Tracking", RFC 3885, September 2004.

   [RFC4142]  Crocker, D. and G. Klyne, "Full-mode Fax Profile for
              Internet Mail: FFPIM", December 2005.

   [RFC4143]  Toyoda, K. and D. Crocker, "Facsimile Using Internet Mail
              (IFAX) Service of ENUM", RFC 4143, November 2005.

   [RFC4356]  Gellens, R., "Mapping Between the Multimedia Messaging
              Service (MMS) and Internet Mail", RFC 4356, January 2006.

   [RFC4880]  Callas, J., Donnerhacke, L., Finney, H., Shaw, D., and R.
              Thayer, "OpenPGP Message Format", RFC 4880, November 2007.

   [RFC5068]  Hutzler, C., Crocker, D., Resnick, P., Sanderson, R., and
              E. Allman, "Email Submission Operations: Access and
              Accountability Requirements", RFC 5068, BCP 134, Nov 2007.

   [Tussle]   Clark, D., Wroclawski, J., Sollins, K., and R. Braden,
              "Tussle in Cyberspace: Defining Tomorrow's Internet",
              ACM SIGCOMM, 2002.

Appendix A.  Acknowledgements

   This work derives from a section in draft-hutzler-spamops an early version of [RFC5068].
   Discussion of the Source Originator actor role was greatly clarified during
   discussions in the IETF's Marid working group.

   Graham Klyne, Pete Resnick and Steve Atkins provided thoughtful
   insight on the framework and details of the original drafts. drafts, as did
   Chris Newman for the final versions, while also serving as cognizant
   Area Director for the document.  Tony Hansen served as document
   shepherd, through the IETF process.

   Later reviews and suggestions were provided by Eric Allman, Nathaniel
   Borenstein, Ed Bradford, Cyrus Daboo, Frank Ellermann, Tony Finch,
   Ned Freed, Eric Hall, Tony Hansen, Willemien Hoogendoorn, Brad Knowles, John
   Leslie, Bruce Valdis Kletnieks, Mark E. Mallett, David MacQuigg,
   Alexey Melnikov, der Mouse, S. Moonesamy, Chris Newman, Daryl Odnert, Rahmat M.
   Samik-Ibrahim, Marshall Rose, Hector Santos, Jochen Topf, Greg
   Vaudreuil.

   Diligent early proof-reading was performed by Bruce Lilly.  Diligent
   technical editing was provided by Susan Hunziker

Index
           10

   A
      accountability  11
      accountable  12-13
      Actor
         Administrative  15  13
         Author  10  8
         Consumer  14
         Edge  16
         Gateway  14
         Mediator  11
         Gateway  12
         Originator  13  11
         Recipient  10
         Relay  14  9
         Return Handler  11  9
         Transit  16
         User  16  14
      Actors
         MHS  12  10
      ADMD  11, 13-14, 18, 23, 29, 36
      Administrative Actors  15  13
      Administrative Management Domain  11
      aMSA  29
      Author  8, 10
      author  33

   B
      body-parts  22
      bounce handler  9
      boundary  14

   C
      Consumer Actor  14
      content  10, 12-13, 18, 22, 30

   D
      delivery  4, 9-10, 12-13, 17, 22-23, 33, 35-36
      Discussion of document  6  7

   E
      Edge Actor  16  14
      end-to-end  4
      envelope  9, 12, 19, 22-23, 30, 35-36
      ETRN  33

   G
      Gateway  12, 14  10, 12

   H
      header  22
      hMSA  29

   I
      Internet Mail  4

   L
      LMTP  33
      local-part  16

   M
      Mail  4
      Mail exchange  5      User Agent  4
      Mail Handling Service  3 From  35
      Mail Handling System  12 Service  4, 10
      Mail Transfer Submission Agent  3  11
      Mail User Transfer Agent  3  4
      mailbox  35
      MDA  35
      MDN  10
      Mediator  11  9
      message  6, 22
      Message Disposition Notification  10  9
      MHS  3, 12  4, 9-12, 19-20, 22-23
         Actors  12  10
      MSA  11, 29
      MTA  3  4, 14
         boundary  14
      MUA  3  4, 13, 28-29

   O
      ODMR  33
      Originator  13  10-11

   P
      posting  4, 9, 11, 19, 28-29, 33, 36
      pull  33
      push  33

   R
      RcptTo  10
      Receiver  10
      Recipient  9-10, 35
      recipient  33
      relay  10
      Relay  14
      responsibility  29
      responsible  12-13
      Return address  35
      Return Handler  9
      role  9, 17
         Author  8
         Originator  11
         Recipient  9

   S
      SIEVE  22
      SMTP  33

   T
      transfer  10, 12-13
      Transit Actor  16  14
      transition  29

   U
      UA  3
      User Actor  16  4
      User Agent  3  4

Author's Address

   Dave Crocker
   Brandenburg InternetWorking
   675 Spruce Drive
   Sunnyvale, CA  94086
   USA

   Phone: +1.408.246.8253
   Email: dcrocker@bbiw.net

Full Copyright Statement

   Copyright (C) The IETF Trust (2008).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.