Post Office Protocol
原创lowpower 博主文章分类:Leave a Comment ©著作权
©著作权归作者所有:来自51CTO博客作者lowpower的原创作品,如需转载,请与作者联系,否则将追究法律责任
POP3 has made earlier versions of the protocol, informally called
POP1 and POP2, obsolete. In contemporary usage, the less precise term POP almost always means POP3 in the context of e-mail protocols.
The design of POP3 and its procedures supports end-users with
intermittent connections (such as dial-up connections), allowing these
users to retrieve e-mail when connected and then to view and manipulate
the retrieved messages without needing to stay connected. Although most
clients have an option to leave mail on server, e-mail clients
using POP3 generally connect, retrieve all messages, store them on the
user’s PC as new messages, delete them from the server, and then
disconnect. In contrast, the newer, more capable Internet Message
Access Protocol (IMAP) supports both connected (online) and disconnected (offline)
modes of operation. E-mail clients using IMAP generally leave messages
on the server until the user explicitly deletes them. This and other
aspects of IMAP operation allow multiple clients to access the same
mailbox. Most e-mail clients support either POP3 or IMAP to retrieve
messages; however, fewer Internet Service Providers (ISPs) support
IMAP. The fundamental difference between POP3 and IMAP4 is that POP3
offers access to a mail drop; the mail exists on the server until it is
collected by the client. Even if the client leaves some or all messages
on the server, the client’s message store is considered authoritative.
In contrast, IMAP4 offers access to the mail store; the client may
store local copies of the messages, but these are considered to be a
temporary cache; the server’s store is authoritative.
Clients with a leave mail on server option generally use the POP3 UIDL (Unique IDentification Listing)
command. Most POP3 commands identify specific messages by their ordinal
number on the mail server. This creates a problem for a client
intending to leave messages on the server, since these message numbers
may change from one connection to the server to another. For example if
a mailbox contains five messages at last connect, and a different
client then deletes message #3, the next connecting user will find the
last two messages’ numbers decremented by one. UIDL provides a
mechanism to avoid these numbering issues. The server assigns a string
of characters as a permanent and unique ID for the message. When a
POP3-compatible e-mail client connects to the server, it can use the
UIDL command to get the current mapping from these message IDs to the
ordinal message numbers. The client can then use this mapping to
determine which messages it has yet to download, which saves time when
downloading. IMAP has a similar mechanism, a 32-bit unique identifier
(UID) that must be assigned to messages in ascending (although not
necessarily consecutive) order as they are received. Because IMAP UIDs
are assigned in this manner, to retrieve new messages an IMAP client
need only request the UIDs greater than the highest UID among all
previously-retrieved messages, whereas a POP client must fetch the
entire UIDL map. For large mailboxes, this difference can be
significant.
Whether using POP3 or IMAP to retrieve messages, e-mail clients
typically use the SMTP_Submit profile of the Simple Mail Transfer
Protocol (SMTP) to send messages. E-mail clients are commonly
categorized as either POP or IMAP clients, but in both
cases the clients also use SMTP. There are extensions to POP3 that
allow some clients to transmit outbound mail via POP3 - these are known
as "XTND XMIT" extensions. The Qualcomm qpopper and CommuniGate Pro
servers and Eudora clients are examples of systems that optionally
utilize the XTND XMIT methods of authenticated client-to-server e-mail
transmission.
MIME serves as the standard for p_w_uploads and non-ASCII text in
e-mail. Although neither POP3 nor SMTP require MIME-formatted e-mail,
essentially all Internet e-mail comes MIME-formatted, so POP clients
must also understand and use MIME. IMAP, by design, assumes
MIME-formatted e-mail.
Like many other older Internet protocols, POP3 originally supported
only an unencrypted login mechanism. Although plain text transmission
of passwords in POP3 still commonly occurs, POP3 currently supports
several authentication methods to provide varying levels of protection
against illegitimate access to a user’s e-mail. One such method, APOP,
uses the MD5 hash function in an attempt to avoid replay attacks and
disclosure of the shared secret. Clients implementing APOP include
Mozilla Thunderbird, Opera, Eudora, KMail and Novell Evolution. POP3
clients can also support SASL authentication methods via the AUTH
extension. MIT Project Athena also produced a Kerberized version.
POP3 works over a TCP/IP connection using TCP on network port 110.
E-mail clients can encrypt POP3 traffic using TLS or SSL. A TLS or SSL
connection is negotiated using the STLS command. Some clients
and servers, like Google Gmail, instead use the deprecated
alternate-port method, which uses TCP port 995.
上一篇:理解分拣目录
下一篇:不同域环境如何实现邮件加密?
提问和评论都可以,用心的回复会被更多人看到
评论
发布评论
相关文章
-
poj 1160(Post Office)
http://poj.org/problem?id=1160
dp #include i++ 最短距离 -
【DP】 POJ 1160 Post Office
很经典的题。。。具体可以
POJ DP #include #define i++ -
poj1160post_office经典dp
[题目大意]: 用数轴描述一条高速公路,有V个村庄,每一个村庄坐落在数轴的某、
#include 最短距离 i++ -
poj 1160 Post Office (间隔DP)
Post OfficeTime Limit:1000MSMemory Limit:10000KTotal Submissio
#include i++ ide 数组 最短距离