932:, p. 353: "Like SMTP, POP3 is unencrypted. Unlike SMTP, however, it needs authentication: Users have to identify themselves and prove they're who they claim to be. Unfortunately, the authentication usually consists of presenting a username and a password known only to the user and the POP3 server. Because the POP3 dialogue is unencrypted, an eavesdropper can obtain a user's username and password and reuse them to access the user's mailbox. So, plain POP3 exposes the contents of the mail messages the user retrieves, and it exposes their username and password, which can then be reused by someone else.
38:
134:(POP) allows the user to download messages one at a time and only deletes them from the server after they have been successfully saved on local storage. It is possible to leave messages on the server to permit another client to access them. However, there is no provision for flagging a specific message as
1192:
Headers defined only in RFC 1036 for use in Usenet News sometimes appear in mail messages, either because the messages have been gatewayed from Usenet News to e-mail, or because the messages were written in combined clients supporting both e-mail and Usenet News in the same client. These headers are
126:
Emails are stored in the user's mailbox on the remote server until the user's email client requests them to be downloaded to the user's computer, or can otherwise access the user's mailbox on the possibly remote server. The email client can be set up to connect to multiple mailboxes at the same time
469:
provide webmail services as part of their
Internet service package. The main limitations of webmail are that user interactions are subject to the website's operating system and the general inability to download email messages and compose or work on the messages offline, although there are software
917:
This document does not provide recommendations on specific security implementations. It simply provides a warning that transmitting user credentials in clear text over insecure networks SHOULD be avoided in all scenarios as this could allow attackers to listen for this traffic and steal account
297:
protocol. The email client which uses the SMTP protocol creates an authentication extension, which the mail server uses to authenticate the sender. This method eases modularity and nomadic computing. The older method was for the mail server to recognize the client's IP address, e.g. because the
1017:
In addition to providing remote shell access and command execution, OpenSSH can forward arbitrary TCP ports to the other end of your connection. This can be very handy for protecting email, web, or any other traffic you need to keep private (at least, all the way to the other end of the
489:
POP3 has an option to leave messages on the server. By contrast, both IMAP and webmail keep messages on the server as their method of operating, albeit users can make local copies as they like. Keeping messages on the server has advantages and disadvantages.
337:
enables privacy to be safeguarded by encrypting the mail sessions, the body of the message, or both. Without it, anyone with network access and the right tools can monitor email and obtain login passwords. Examples of concern include the government
1062:
with your mail server's name or IP address. Note that you will have to be root on the laptop for this example since you'll be binding to a privileged port (110, the POP port). You should also disable any locally running POP daemon (look in
945:
authentication with a challenge-response authentication mechanism. This solves the problem of the disclosure of reusable passwords, but does nothing to prevent eavesdroppers from reading users' mail messages as they're being
934:
Wrapping the POP3 dialogue with transport-layer security such as SSL solves both of these problems. Because SSL-wrapped POP3 sessions are encrypted from beginning to end, no messages, usernames, or passwords are exposed in
153:(IMAP) allows users to keep messages on the server, flagging them as appropriate. IMAP provides folders and sub-folders, which can be shared among different users with possibly different access rights. Typically, the
424:
mechanism that allows users to sign one another's public keys. OpenPGP is also more flexible in the format of the messages, in that it still supports plain message encryption and signing as they used to work before
1069:
Now to encrypt all of your POP traffic, configure your mail client to connect to localhost port 110. It will happily talk to mailhost as if it were connected directly, except that the entire conversation will be
284:
When a user wishes to create and send an email, the email client will handle the task. The email client is usually set up automatically to connect to the user's mail server, which is typically either an
376:
Encrypted mail sessions deliver messages in their original format, i.e. plain text or encrypted body, on a user's local mailbox and on the destination server's. The latter server is operated by an
373:. At any further hop, messages may be transmitted with or without encryption, depending solely on the general configuration of the transmitting server and the capabilities of the receiving one.
261:
in case responses should be addressed to a different mailbox. To better assist the user with destination fields, many clients maintain one or more address books and/or are able to connect to an
99:
Like most client programs, an email client is only active when a user runs it. The common arrangement is for an email user (the client) to make an arrangement with a remote
1144:
Some of this information has previously been sent in non-standardized header fields such as X-Newsreader, X-Mailer, X-Posting-Agent, X-Http-User-Agent, and others
564:
to identify the software used to send the message. This header field is defined for
Netnews, but not-for e-mail, and, as such, is non-standard in e-mail headers.
119:. Of course, users of the system can log-in and run a mail client on the same computer that hosts their mailboxes; in which case, the server is not actually
446:
In addition to email clients running on a desktop computer, there are those hosted remotely, either as part of a remote UNIX installation accessible by
515:
There may be privacy concerns since messages that stay on the server at all times have more chances to be casually accessed by IT personnel, unless
190:. Direct access can be more efficient but is less portable as it depends on the mailbox format; it is used by some email clients, including some
127:
and to request the download of emails either automatically, such as at pre-set intervals, or the request can be manually initiated by the user.
618:, provides "an extensible format and MIME type that may be used by mail operators to report feedback about received email to other parties."
470:
packages that can integrate parts of the webmail functionality into the OS (e.g. creating messages directly from third party applications via
458:. Both of these approaches have several advantages: they share an ability to send and receive email away from the user's normal base using a
432:
In both cases, only the message body is encrypted. Header fields, including originator, recipients, and often subject, remain in plain text.
805:
766:
While webmail obeys the earlier HTTP disposition of having separate ports for encrypt and plain text sessions, mail protocols use the
1023:
accomplishes local forwarding by binding to a local port, performing encryption, sending the encrypted data to the remote end of the
387:
Encrypting an email retrieval session with, e.g., SSL, can protect both parts (authentication, and message transfer) of the session.
1914:
1397:
298:
client is on the same machine and uses internal address 127.0.0.1, or because the client's IP address is controlled by the same
172:
for real-time updates, providing faster notification than polling, where long-lasting connections are feasible. See also the
1010:
630:
in the following table. For MSA, IMAP and POP3, the table reports also the labels that a client can use to query the
369:
is not trusted. When sending mail, users can only control encryption at the first hop from a client to its configured
107:(MDA), adds email messages to a client's storage as they arrive. The remote mail storage is referred to as the user's
1314:
1325:
2004:
1904:
685:
627:
150:
1300:
499:
Messages can be accessed from various computers or mobile devices at different locations, using different clients.
1257:
1212:
1122:
17:
2009:
333:
With no encryption, much like for postcards, email activity is plainly visible by any occasional eavesdropper.
180:
1999:
1919:
1082:
853:
707:
512:
With limited bandwidth, access to long messages can be lengthy, unless the email client caches a local copy.
2014:
1648:
1633:
2073:
2029:
1390:
825:
598:
Access
Providers MUST NOT block users from accessing the external Internet using the SUBMISSION port 587
1547:
1492:
183:(JMAP) is implemented using JSON APIs over HTTP and has been developed as an alternative to IMAP/SMTP.
462:
or telnet client, thus eliminating the need to install a dedicated email client on the user's device.
918:
data. In these cases, it is strongly suggested that an appropriate security technology MUST be used.
813:
466:
299:
1253:
Cleartext
Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access
91:
or software whose primary or most visible role is to work as an email client may also use the term.
1582:
830:
787:
366:
322:
203:
186:
In addition, the mailbox storage can be accessed directly by programs running on the server or via
958:
Updated
Transport Layer Security (TLS) Server Identity Check Procedure for Email-Related Protocols
1537:
1507:
858:
111:. The default setting on many Unix systems is for the mail server to store formatted messages in
1193:
not standardized for use in
Internet e-mail and should be handled with caution by e-mail agents.
1027:
connection, then decrypting it and sending it to the remote host and port you specify. Start an
770:
technique, thereby allowing encryption to start on an already established TCP connection. While
2094:
2068:
1959:
1869:
1791:
1786:
1383:
1112:
847:
841:
1002:
991:
353:
All relevant email protocols have an option to encrypt the whole session, to prevent a user's
1894:
1889:
1720:
1603:
1527:
1467:
1427:
725:
579:
516:
411:
377:
286:
2019:
1924:
1432:
1271:
1226:
1177:
1136:
972:
902:
802:
663:
554:. Attachments are files that are not part of the email proper but are sent with the email.
477:
Like IMAP and MAPI, webmail provides for email messages to remain on the mail server. See
325:
encrypted SMTP sessions, that many clients and servers support for backward compatibility.
290:
131:
103:(MTA) server for the receipt and storage of the client's emails. The MTA, using a suitable
1157:
878:
8:
1964:
1944:
1899:
1776:
1736:
1710:
1705:
1608:
1542:
1532:
1090:
206:
to display and edit text. Some applications permit the use of a program-external editor.
146:, thus POP is not convenient for users who access the same mail from different machines.
104:
100:
41:
1628:
1356:
561:
2055:
1979:
1974:
1771:
1360:
1348:
1310:
1006:
998:
809:
187:
88:
83:
which provides message management, composition, and reception functions may act as a
1522:
1340:
1261:
1216:
1167:
1126:
962:
892:
779:
771:
607:
585:
567:
551:
334:
265:
directory server. For originator fields, clients may support different identities.
210:
69:
634:
and discover both the host name and the port number of the corresponding service.
30:
This article is about mail readers for
Internet e-mail. For BBS mail readers, see
1939:
1638:
1452:
1447:
596:, provides a survey of the concepts of MTA, MSA, MDA, and MUA. It mentions that "
395:
229:
for non-textual content and attachments. Headers include the destination fields,
1274:
1251:
1229:
1206:
1180:
1161:
1139:
1116:
975:
956:
905:
882:
783:
775:
611:
589:
571:
214:
1909:
1864:
1766:
1462:
455:
362:
116:
108:
31:
1812:
2088:
1827:
1352:
451:
347:
37:
778:
used to discourage the use of the previously established ports 995 and 993,
1843:
1746:
1567:
420:
391:
343:
1756:
1695:
1623:
1552:
1364:
1344:
877:
C. Hutzler; D. Crocker; P. Resnick; E. Allman; T. Finch (November 2007).
548:
459:
1934:
1761:
1751:
1442:
1437:
876:
631:
339:
1577:
218:
2024:
1969:
1884:
1879:
1781:
1715:
1685:
1680:
1618:
1613:
1562:
1557:
1457:
1266:
1221:
1172:
1131:
967:
897:
798:
321:
for the authentication, if any. There is a non-standard port 465 for
166:
84:
222:
1949:
1929:
1874:
1822:
1817:
1700:
1653:
1572:
1512:
1497:
1487:
884:
Email
Submission Operations: Access and Accountability Requirements
767:
594:
Email
Submission Operations: Access and Accountability Requirements
398:
to create an encrypted tunnel over which to retrieve their emails.
465:
Some websites are dedicated to providing email services, and many
1954:
1859:
1741:
1690:
1643:
1502:
1477:
1472:
441:
415:
365:. They are strongly suggested for nomadic users and whenever the
80:
1375:
1208:
Use of SRV Records for
Locating Email Submission/Access Services
305:
Client settings require the name or IP address of the preferred
1807:
1587:
1306:
836:
447:
407:
276:
for each user's identity, and possibly a list of LDAP servers.
879:"Message Submission Authentication/Authorization Technologies"
543:
Another important standard supported by most email clients is
2050:
1517:
533:
73:
45:
993:
Linux Server Hacks: 100 Industrial-Strength Tips & Tools
130:
A user's mailbox can be accessed in two dedicated ways. The
2034:
1482:
888:
747:
602:
MUAs SHOULD use the SUBMISSION port for message submission.
544:
537:
529:
471:
426:
406:
There are two main models for managing cryptographic keys.
294:
262:
226:
112:
27:
Computer program used to access and manage a user's email
380:
provider, possibly a different entity than the Internet
1249:
209:
The email clients will perform formatting according to
502:
Some kind of backup is usually provided by the server.
302:
that provides both Internet access and mail services.
94:
990:
279:
401:
165:folders are created by default. IMAP features an
2086:
626:Email servers and clients by convention use the
346:and fellow wireless network users such as at an
793:
616:An Extensible Format for Email Feedback Reports
528:Popular protocols for retrieving mail include
394:access to their mail server, they can use SSH
1391:
1326:"The Technical Development of Internet Email"
923:
1204:
806:Messaging Application Programming Interface
1398:
1384:
1250:Keith Moore; Chris Newman (January 2018).
988:
1323:
1265:
1220:
1171:
1130:
966:
896:
536:. Sending mail is usually done using the
1155:
36:
1333:IEEE Annals of the History of Computing
808:(MAPI) in client applications, such as
14:
2087:
197:
1379:
1324:Partridge, Craig (April–June 2008).
1298:
929:
478:
414:(CA) that signs users' public keys.
257:in case there are more authors, and
173:
1125:. November 2009. sec. 3.2.13.
410:employs a model based on a trusted
313:(25 for MTA, 587 for MSA), and the
268:Client settings require the user's
72:used to access and manage a user's
24:
484:
253:which is the message's author(s),
95:Retrieving messages from a mailbox
25:
2106:
1405:
418:employs a somewhat more flexible
123:, other than in a generic sense.
44:email client user interface on a
1905:Microsoft Internet Mail and News
506:
151:Internet Message Access Protocol
1291:
1163:Common Internet Message Headers
621:
390:Alternatively, if the user has
280:Submitting messages to a server
1243:
1198:
1149:
1105:
1075:
982:
949:
870:
402:Encryption of the message body
202:Email clients usually contain
181:JSON Meta Application Protocol
13:
1:
1649:Mozilla Mail & Newsgroups
864:
854:Simple Mail Transfer Protocol
786:promotes the use of implicit
493:
328:
249:), and the originator fields
1067:) or it will get in the way.
794:Proprietary client protocols
523:
384:provider currently at hand.
191:
7:
1158:"Use of gatewaying headers"
937:The optional POP3 command,
826:Comparison of email clients
819:
576:Message Submission for Mail
10:
2111:
1205:Cyrus Daboo (March 2011).
1156:J. Palme (February 1997).
578:, details the role of the
467:Internet service providers
439:
435:
29:
2064:
2043:
1992:
1852:
1836:
1800:
1729:
1673:
1666:
1596:
1420:
1413:
1035:switch (short for Local):
816:electronic mail servers.
557:Most email clients use a
300:Internet service provider
1742:Bloomba/WordPerfect Mail
1523:Mailx (Heirloom Project)
1058:with your username, and
989:Flickenger, Rob (2003).
941:, replaces the standard
831:Message submission agent
547:, which is used to send
367:Internet access provider
293:, two variations of the
1083:"Is IMAP Right for Me?"
859:Text-based email client
1118:Netnews Article Format
1054:Naturally, substitute
848:Message transfer agent
842:Message delivery agent
49:
801:mail systems use the
580:Mail submission agent
517:end-to-end encryption
412:certificate authority
378:email hosting service
40:
1993:Related technologies
1925:Netscape Messenger 9
1345:10.1109/mahc.2008.32
454:), or hosted on the
371:outgoing mail server
307:outgoing mail server
132:Post Office Protocol
115:, within the user's
1900:Microsoft Entourage
1777:Outlook for Windows
1609:Beonex Communicator
1533:Mozilla Thunderbird
1299:Sill, Dave (2003).
1091:Stanford University
198:Message composition
149:Alternatively, the
105:mail delivery agent
101:Mail Transfer Agent
60:or, more formally,
42:Mozilla Thunderbird
1302:The qmail Handbook
814:Microsoft Exchange
742:_submissions._tcp
62:message user agent
50:
2082:
2081:
2056:Unicode and email
1988:
1987:
1980:Windows Messaging
1975:Windows Live Mail
1772:Microsoft Outlook
1674:Freeware/Freemium
1662:
1661:
810:Microsoft Outlook
764:
763:
735:_submission._tcp
656:Encrypt sessions
648:encrypt sessions
552:email attachments
429:standardization.
247:Blind carbon copy
89:computer hardware
87:, and a piece of
16:(Redirected from
2102:
1782:Novell GroupWise
1671:
1670:
1418:
1417:
1400:
1393:
1386:
1377:
1376:
1371:
1369:
1363:. Archived from
1330:
1320:
1286:
1285:
1283:
1281:
1269:
1267:10.17487/RFC8314
1247:
1241:
1240:
1238:
1236:
1224:
1222:10.17487/RFC6186
1202:
1196:
1195:
1189:
1187:
1175:
1173:10.17487/RFC2076
1153:
1147:
1146:
1134:
1132:10.17487/RFC5536
1109:
1103:
1102:
1100:
1098:
1079:
1073:
1072:
1052:
1040:ssh -f -N -L110:
1031:tunnel with the
996:
986:
980:
979:
970:
968:10.17487/RFC7817
953:
947:
944:
940:
927:
921:
920:
914:
912:
900:
898:10.17487/RFC5068
874:
790:when available.
637:
636:
628:TCP port numbers
335:Email encryption
85:web email client
70:computer program
48:operating system
21:
2110:
2109:
2105:
2104:
2103:
2101:
2100:
2099:
2085:
2084:
2083:
2078:
2060:
2039:
1984:
1940:Outlook Express
1848:
1832:
1796:
1725:
1658:
1592:
1448:Cleancode eMail
1409:
1404:
1374:
1367:
1328:
1317:
1294:
1289:
1279:
1277:
1248:
1244:
1234:
1232:
1203:
1199:
1185:
1183:
1166:. sec. 2.
1154:
1150:
1111:
1110:
1106:
1096:
1094:
1081:
1080:
1076:
1068:
1065:/etc/inetd.conf
1053:
1038:root@laptop:~#
1037:
1036:
1019:
1013:
987:
983:
955:
954:
950:
942:
938:
936:
933:
928:
924:
910:
908:
901:. BCP 134.
891:. sec. 5.
875:
871:
867:
822:
796:
741:
734:
701:
694:
679:
672:
657:
652:
647:
624:
526:
509:
496:
487:
485:Remote messages
444:
438:
404:
396:port forwarding
331:
282:
204:user interfaces
200:
176:section below.
174:remote messages
97:
81:web application
66:mail user agent
35:
28:
23:
22:
18:Mail user agent
15:
12:
11:
5:
2108:
2098:
2097:
2080:
2079:
2077:
2076:
2071:
2065:
2062:
2061:
2059:
2058:
2053:
2047:
2045:
2044:Related topics
2041:
2040:
2038:
2037:
2032:
2027:
2022:
2017:
2012:
2007:
2002:
1996:
1994:
1990:
1989:
1986:
1985:
1983:
1982:
1977:
1972:
1967:
1962:
1957:
1952:
1947:
1942:
1937:
1932:
1927:
1922:
1917:
1912:
1910:Microsoft Mail
1907:
1902:
1897:
1892:
1887:
1882:
1877:
1872:
1867:
1865:Claris Emailer
1862:
1856:
1854:
1850:
1849:
1847:
1846:
1840:
1838:
1834:
1833:
1831:
1830:
1825:
1820:
1815:
1810:
1804:
1802:
1798:
1797:
1795:
1794:
1789:
1784:
1779:
1774:
1769:
1767:Mail (Windows)
1764:
1759:
1754:
1749:
1744:
1739:
1733:
1731:
1727:
1726:
1724:
1723:
1718:
1713:
1708:
1703:
1698:
1693:
1688:
1683:
1677:
1675:
1668:
1664:
1663:
1660:
1659:
1657:
1656:
1651:
1646:
1641:
1636:
1631:
1626:
1621:
1616:
1611:
1606:
1600:
1598:
1594:
1593:
1591:
1590:
1585:
1580:
1575:
1570:
1565:
1560:
1555:
1550:
1545:
1540:
1535:
1530:
1525:
1520:
1515:
1510:
1505:
1500:
1495:
1490:
1485:
1480:
1475:
1470:
1465:
1460:
1455:
1450:
1445:
1440:
1435:
1430:
1424:
1422:
1415:
1411:
1410:
1403:
1402:
1395:
1388:
1380:
1373:
1372:
1370:on 2011-05-12.
1321:
1315:
1295:
1293:
1290:
1288:
1287:
1242:
1197:
1148:
1104:
1093:. 4 March 2010
1074:
1012:978-0596004613
1011:
999:O'Reilly Media
981:
948:
922:
868:
866:
863:
862:
861:
856:
851:
845:
839:
834:
828:
821:
818:
795:
792:
762:
761:
758:
755:
753:
750:
744:
743:
738:
736:
731:
730:outgoing mail
728:
722:
721:
718:
716:
713:
712:outgoing mail
710:
704:
703:
698:
696:
691:
690:incoming mail
688:
682:
681:
676:
674:
669:
668:incoming mail
666:
660:
659:
654:
653:sessions only
649:
646:Plain text or
644:
641:
623:
620:
525:
522:
521:
520:
513:
508:
505:
504:
503:
500:
495:
492:
486:
483:
440:Main article:
437:
434:
403:
400:
330:
327:
281:
278:
199:
196:
194:applications.
117:home directory
96:
93:
32:Offline reader
26:
9:
6:
4:
3:
2:
2107:
2096:
2095:Email clients
2093:
2092:
2090:
2075:
2072:
2070:
2067:
2066:
2063:
2057:
2054:
2052:
2049:
2048:
2046:
2042:
2036:
2033:
2031:
2028:
2026:
2023:
2021:
2018:
2016:
2013:
2011:
2008:
2006:
2003:
2001:
1998:
1997:
1995:
1991:
1981:
1978:
1976:
1973:
1971:
1968:
1966:
1963:
1961:
1958:
1956:
1953:
1951:
1948:
1946:
1943:
1941:
1938:
1936:
1933:
1931:
1928:
1926:
1923:
1921:
1920:Netscape Mail
1918:
1916:
1913:
1911:
1908:
1906:
1903:
1901:
1898:
1896:
1893:
1891:
1888:
1886:
1883:
1881:
1878:
1876:
1873:
1871:
1868:
1866:
1863:
1861:
1858:
1857:
1855:
1851:
1845:
1842:
1841:
1839:
1835:
1829:
1828:Samsung Email
1826:
1824:
1821:
1819:
1816:
1814:
1811:
1809:
1806:
1805:
1803:
1799:
1793:
1790:
1788:
1785:
1783:
1780:
1778:
1775:
1773:
1770:
1768:
1765:
1763:
1760:
1758:
1755:
1753:
1750:
1748:
1745:
1743:
1740:
1738:
1735:
1734:
1732:
1728:
1722:
1719:
1717:
1714:
1712:
1709:
1707:
1704:
1702:
1699:
1697:
1694:
1692:
1689:
1687:
1684:
1682:
1679:
1678:
1676:
1672:
1669:
1665:
1655:
1652:
1650:
1647:
1645:
1642:
1640:
1637:
1635:
1632:
1630:
1627:
1625:
1622:
1620:
1617:
1615:
1612:
1610:
1607:
1605:
1602:
1601:
1599:
1595:
1589:
1586:
1584:
1581:
1579:
1576:
1574:
1571:
1569:
1566:
1564:
1561:
1559:
1556:
1554:
1551:
1549:
1546:
1544:
1541:
1539:
1536:
1534:
1531:
1529:
1526:
1524:
1521:
1519:
1516:
1514:
1511:
1509:
1506:
1504:
1501:
1499:
1496:
1494:
1491:
1489:
1486:
1484:
1481:
1479:
1476:
1474:
1471:
1469:
1466:
1464:
1461:
1459:
1456:
1454:
1451:
1449:
1446:
1444:
1441:
1439:
1436:
1434:
1431:
1429:
1426:
1425:
1423:
1419:
1416:
1414:Free software
1412:
1408:
1407:Email clients
1401:
1396:
1394:
1389:
1387:
1382:
1381:
1378:
1366:
1362:
1358:
1354:
1350:
1346:
1342:
1338:
1334:
1327:
1322:
1318:
1316:9781430211341
1312:
1308:
1304:
1303:
1297:
1296:
1276:
1273:
1268:
1263:
1259:
1255:
1254:
1246:
1231:
1228:
1223:
1218:
1214:
1210:
1209:
1201:
1194:
1182:
1179:
1174:
1169:
1165:
1164:
1159:
1152:
1145:
1141:
1138:
1133:
1128:
1124:
1120:
1119:
1114:
1108:
1092:
1088:
1084:
1078:
1071:
1066:
1061:
1057:
1051:
1050:
1047:
1043:
1034:
1030:
1026:
1022:
1014:
1008:
1004:
1000:
995:
994:
985:
977:
974:
969:
964:
960:
959:
952:
931:
926:
919:
907:
904:
899:
894:
890:
886:
885:
880:
873:
869:
860:
857:
855:
852:
849:
846:
843:
840:
838:
835:
832:
829:
827:
824:
823:
817:
815:
811:
807:
804:
800:
791:
789:
785:
781:
777:
773:
769:
759:
756:
754:
751:
749:
746:
745:
739:
737:
732:
729:
727:
724:
723:
719:
717:
714:
711:
709:
706:
705:
699:
697:
692:
689:
687:
684:
683:
677:
675:
670:
667:
665:
662:
661:
655:
650:
645:
642:
639:
638:
635:
633:
629:
619:
617:
613:
609:
605:
603:
599:
595:
591:
587:
583:
581:
577:
573:
569:
565:
563:
560:
555:
553:
550:
546:
541:
539:
535:
531:
518:
514:
511:
510:
507:Disadvantages
501:
498:
497:
491:
482:
480:
475:
473:
468:
463:
461:
457:
453:
452:shell account
449:
443:
433:
430:
428:
423:
422:
417:
413:
409:
399:
397:
393:
388:
385:
383:
379:
374:
372:
368:
364:
360:
356:
351:
349:
348:Internet cafe
345:
341:
336:
326:
324:
320:
316:
312:
308:
303:
301:
296:
292:
288:
277:
275:
274:email address
271:
266:
264:
260:
256:
252:
248:
244:
240:
236:
232:
228:
224:
220:
216:
212:
207:
205:
195:
193:
189:
184:
182:
177:
175:
171:
169:
164:
160:
156:
152:
147:
145:
141:
137:
133:
128:
124:
122:
118:
114:
110:
106:
102:
92:
90:
86:
82:
77:
75:
71:
67:
63:
59:
55:
47:
43:
39:
33:
19:
1853:Discontinued
1844:Pegasus Mail
1837:Donationware
1721:Vivaldi Mail
1597:Discontinued
1568:SquirrelMail
1406:
1365:the original
1336:
1332:
1301:
1292:Bibliography
1278:. Retrieved
1252:
1245:
1233:. Retrieved
1207:
1200:
1191:
1184:. Retrieved
1162:
1151:
1143:
1117:
1113:"User-Agent"
1107:
1095:. Retrieved
1086:
1077:
1064:
1059:
1055:
1048:
1045:
1041:
1039:
1032:
1028:
1024:
1020:
1016:
992:
984:
957:
951:
925:
916:
909:. Retrieved
883:
872:
812:, to access
797:
765:
702:_imaps._tcp
680:_pop3s._tcp
625:
622:Port numbers
615:
606:
601:
600:" and that "
597:
593:
584:
575:
566:
562:header field
558:
556:
542:
527:
488:
479:next section
476:
464:
445:
431:
421:web of trust
419:
405:
389:
386:
381:
375:
370:
358:
354:
352:
344:surveillance
332:
318:
314:
310:
306:
304:
283:
273:
269:
267:
258:
254:
250:
246:
242:
238:
234:
230:
208:
201:
188:shared disks
185:
178:
167:
162:
158:
154:
148:
143:
139:
135:
129:
125:
120:
98:
78:
65:
61:
58:email reader
57:
54:email client
53:
51:
1813:Forté Agent
1667:Proprietary
1624:Columbia MM
1553:OfflineIMAP
1339:(2): 3–29.
1280:12 February
1087:IT Services
946:retrieved."
803:proprietary
695:_imap._tcp
673:_pop3._tcp
651:Plain text
632:SRV records
549:binary file
460:web browser
361:from being
311:port number
239:Carbon copy
237:(short for
2074:Comparison
1935:Opera Mail
1762:Apple Mail
1752:HCL Domino
1443:Claws Mail
1438:Citadel/UX
1070:encrypted.
1001:. p.
935:cleartext.
865:References
559:User-Agent
540:protocol.
494:Advantages
340:censorship
329:Encryption
2025:Push-IMAP
1970:WebSpyder
1885:Embrowser
1880:Cyberjack
1801:Shareware
1716:TouchMail
1686:EmailTray
1681:eM Client
1634:FossaMail
1619:Classilla
1614:BlitzMail
1563:SeaMonkey
1558:Roundcube
1458:fetchmail
1453:Evolution
1361:206442868
1353:1934-1547
943:USER/PASS
930:Sill 2003
911:24 August
799:Microsoft
640:Protocol
524:Protocols
315:user name
270:real name
170:extension
144:forwarded
64:(MUA) or
2089:Category
2069:Category
1965:Turnpike
1950:Pocomail
1930:NeXTMail
1875:Cyberdog
1823:The Bat!
1818:GyazMail
1757:InScribe
1701:Mailbird
1696:i.Scribe
1654:Nylas N1
1573:Sylpheed
1548:nmh / MH
1538:Mulberry
1513:Mailpile
1508:Mahogany
1498:K-9 Mail
1488:Gnuzilla
1235:17 April
1097:14 April
1060:mailhost
1049:mailhost
1044::110 -l
1042:mailhost
1018:tunnel).
820:See also
768:STARTTLS
752:webmail
519:is used.
450:(i.e. a
359:password
319:password
259:Reply-To
140:answered
1960:Sparrow
1955:POPmail
1895:Mailbox
1870:Courier
1860:cc:Mail
1792:Postbox
1787:Airmail
1691:Foxmail
1644:Mailody
1604:Arachne
1578:Trojitá
1478:GNUMail
1473:getmail
1421:Current
1186:May 11,
442:Webmail
436:Webmail
416:OpenPGP
363:sniffed
241:), and
219:headers
192:webmail
109:mailbox
1915:MINUET
1890:Eudora
1808:Becky!
1747:Newton
1730:Retail
1588:Zimbra
1528:Modest
1428:Alpine
1359:
1351:
1313:
1307:Apress
1009:
837:Mailto
782:
774:
610:
588:
570:
448:telnet
408:S/MIME
382:access
309:, the
289:or an
255:Sender
225:, and
213:
161:, and
159:Drafts
121:remote
2051:Email
1711:Spike
1706:Spark
1518:Mailx
1503:KMail
1468:Geary
1433:Balsa
1368:(PDF)
1357:S2CID
1329:(PDF)
850:(MTA)
844:(MDA)
833:(MSA)
686:IMAP4
658:only
534:IMAP4
163:Trash
142:, or
74:email
68:is a
46:Linux
2035:UUCP
2030:SMAP
2015:LMTP
2010:JMAP
2005:IMAP
2000:SMTP
1945:Pine
1737:Hiri
1639:Hula
1543:Mutt
1483:Gnus
1349:ISSN
1311:ISBN
1282:2018
1275:8314
1258:IETF
1237:2013
1230:6186
1213:IETF
1188:2015
1181:2076
1140:5536
1123:IETF
1099:2013
1056:user
1046:user
1007:ISBN
976:7817
939:APOP
913:2011
906:5068
889:IETF
784:8314
776:2595
760:443
748:HTTP
740:465
733:587
720:587
708:SMTP
700:993
693:143
678:995
671:110
664:POP3
643:Use
612:5965
590:5068
572:6409
545:MIME
538:SMTP
532:and
530:POP3
472:MAPI
427:MIME
357:and
355:name
342:and
317:and
295:SMTP
272:and
263:LDAP
251:From
227:MIME
223:body
221:and
217:for
215:5322
179:The
168:idle
155:Sent
136:seen
113:mbox
2020:POP
1629:Elm
1583:YAM
1493:IMP
1463:fdm
1341:doi
1272:RFC
1262:doi
1227:RFC
1217:doi
1178:RFC
1168:doi
1137:RFC
1127:doi
1029:ssh
1025:ssh
1021:ssh
1003:146
973:RFC
963:doi
903:RFC
893:doi
788:TLS
780:RFC
772:RFC
757:80
726:MSA
715:25
608:RFC
586:RFC
568:RFC
474:).
456:Web
392:SSH
323:SSL
291:MTA
287:MSA
243:Bcc
211:RFC
52:An
2091::
1355:.
1347:.
1337:30
1335:.
1331:.
1309:.
1305:.
1270:.
1260:.
1256:.
1225:.
1215:.
1211:.
1190:.
1176:.
1160:.
1142:.
1135:.
1121:.
1115:.
1089:.
1085:.
1033:-L
1015:.
1005:.
997:.
971:.
961:.
915:.
887:.
881:.
614:,
604:"
592:,
582:.
574:,
481:.
350:.
235:Cc
233:,
231:To
157:,
138:,
79:A
76:.
56:,
1399:e
1392:t
1385:v
1343::
1319:.
1284:.
1264::
1239:.
1219::
1170::
1129::
1101:.
978:.
965::
895::
245:(
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.