home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-07-15 | 84.6 KB | 1,776 lines |
- The drawings contained in this Recommendation have been done in Autocad.
- Recommendation X.4001)
- MESSAGE HANDLING SYSTEM AND SERVICE OVERVIEW
- The establishment in various countries of telematic services and computer
- based store and forward messaging services in association with public networks
- creates a need to produce standards to facilitate international message exchange
- between subscribers to such services.
- The CCITT,
- considering
- (a) the need for message handling systems;
- (b) the need to transfer and store messages of different types;
- (c) that Recommendation X.200 defines the reference model of open systems
- interconnection for CCITT applications;
- (d) that Recommendations X.208, X.217, X.218 and X.219 provide the
- foundation for CCITT applications;
- (e) that the X.500-Series Recommendations define directory systems;
- (f) that message handling systems are defined in a series of
- Recommendations: X.400, X.402, X.403, X.407, X.408, X.411, X.413 and X.419;
- (g) that interpersonal message is defined in Recommendation X.420 and
- T.330;
- (h) that several F-Series Recommendations describe public message handling
- services: F.400, F.401, F.410 and F.420;
- (i) that several F-Series Recommendations describe intercommunication
- between public message handling services and other services: F.421, F.415 and
- F.422,
- unanimously declares
- the view that the overall system and service overview of message handling
- is defined in this Recommendation.
- CONTENTS
- PART 1 - Introduction
- 0 Introduction
- 1 Scope
- 2 References
- 3 Definitions
- 4 Abbreviations
- 5 Conventions
- PART 2 - General description of MHS
- 6 Purpose
- 7 Functional model of MHS
- 7.1 Description of the MHS model
- 7.2 Structure of messages
- 7.3 Application of the MHS model
- 7.4 Message store
- 8 Message transfer service
- 8.1 Submission and delivery
- 8.2 Transfer
- 8.3 Notifications
- 8.4 User agent
- 8.5 Message store
- 8.6 Access unit
- 8.7 Use of the MTS in the provision of public services
- 9 IPM service
- 9.1 IPM service functional model
- 9.2 Structure of IP-messages
- 9.3 IP-notifications
- 10 Intercommunication with physical delivery services
- 10.1 Introduction
- 10.2 Organizational configurations
- 11 Specialized access
- 11.1 Introduction
- 11.2 Teletex access
- 11.3 Telex access
- PART 3 - Capabilities of MHS
- 12 Naming and addressing
-
- 1) Recommendation F.400 is identical to X.400.
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
- 12.1 Introduction
- 12.2 Directory names
- 12.3 O/R names
- 12.4 O/R addresses
- 13 MHS use of directory
- 13.1 Introduction
- 13.2 Functional model
- 13.3 Physical configurations
- 14 Distribution lists in MHS
- 14.1 Introduction
- 14.2 Properties of a DL
- 14.3 Submission
- 14.4 DL use of a directory
- 14.5 DL expansion
- 14.6 Nesting
- 14.7 Recursion control
- 14.8 Delivery
- 14.9 Routing loop control
- 14.10 Notifications
- 14.11 DL handling policy
- 15 Security capabilities of MHS
- 15.1 Introduction
- 15.2 MHS security threats
- 15.3 Security model
- 15.4 MHS security features
- 15.5 Security management
- 16 Conversion in MHS
- 17 Use of the MHS in provision of public services
- PART 4 - Elements of service
- 18 Purpose
- 19 Classification
- 19.1 Purpose of classification
- 19.2 Basic message transfer service
- 19.3 MT service optional user facilities
- 19.4 Base MH/PD service intercommunication
- 19.5 Optional user facilities for MH/PD service intercommunication
- 19.6 Base message store
- 19.7 MS optional user facilities
- 19.8 Basic interpersonal messaging service
- 19.9 IPM service optional user facilities
- Annex A - Glossary of terms
- Annex B - Definitions of elements of service
- Annex C - Elements of service modifications with respect to the 1984 version
- Annex D - Differences between CCITT Recommendation F.400 and ISO Standard
- 10021-1
- PART 1 - INTRODUCTION
- 0 Introduction
- This Recommendation is one of a set of Recommendations for message
- handling. The entire set provides a comprehensive specification for message
- handling comprising any number of cooperating open-systems.
- Message handling systems and services enable users to exchange messages on
- a store-and-forward basis. A message submitted by one user, the originator, is
- conveyed by the message transfer system (MTS), the principal component of a
- larger message handling system (MHS), and is subsequently delivered to one or
- more additional users, the message's recipients.
- An MHS comprises a variety of interconnected functional entities. Message
- transfer agents (MTAs) cooperate to perform the store-and-forward message
- transfer function. Message stores (MSs) provide storage for messages and enable
- their submission, retrieval and management. User agents (UAs) help users access
- MHS. Access units (AUs) provide links to other communication systems and services
- of various kinds (e.g. other telematic services, postal services).
- This Recommendation specifies the overall system and service description
- of message handling capabilities.
- 1 Scope
- This Recommendation defines the overall system and service of an MHS and
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
- serves as a general overview of MHS.
- Other aspects of message handling systems and services are defined in
- other Recommendations. The layout of Recommendations defining the message
- handling system and services is shown in Table 1/X.400. The public services built
- on MHS, as well as access to and from the MHS for public services are defined in
- the F.400-Series of Recommendations.
- The technical aspects of MHS are defined in the X.400-Series of
- Recommendations. The overall system architecture of MHS is defined in
- Recommendation X.402.
- TABLE 1/X.400
- Structure of MHS Recommendations
- Name of Joint MHS Joint support CCITT only
- Recommendation/Standard
- CCITT ISO CCITT ISO System Service
- MHS:System and service X.400 10021-1 F.400
- overview
- MHS:Overall architecture X.402 10021-2
- MHS:Conformance testing X.403
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
-
- MHS:Abstract service X.407 10021-3
- definition conventions
- MHS:Encoded information type X.408
- conversion rules
- MHS:MTS: Abstract service X.411 10021-4
- definition and
- procedures
- MHS:MS:Abstract service X.413 10021-5
- definition
- MHS:Protocol specifications X.419 10021-6
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
-
- MHS:Interpersonal messaging X.420 10021-7
- system
- Telematic access to IPMS T.330
- MHS:Naming and addressing F.401
- for public MH services
- MHS:The public message F.410
- transfer service
- MHS:Intercommunication with
- public physical delivery
- services
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
- F.415
- MHS:The public IPM service F.420
- MHS:Intercommunication F.421
- between IPM service and
- telex
- MHS:Intercommunication F.422
- between IPM service and
- teletex
- OSI:Basic reference model X.200 7498
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
- OSI:Specification of X.208 8824
- abstract syntax notation
- one (ASN.1)
- OSI:Specification of basic X.209 8825
- encoding rules for abstract
- syntax notation one
- (ASN.1)
- OSI:Association control: X.217 8649
- service definition
- OSI:Reliable transfer: model X.218 9066-1
- and service definition
- OSI:Remote operations: X.219 9072-1
- model, notation and
- service definition
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
-
- OSI:Association control: X.227 8650
- protocol specification
- OSI:Reliable transfer: X.228 9066-2
- protocol specification
- OSI:Remote operations: X.229 9072-2
- protocol specification
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
- 2 References
- This Recommendation cites the documents listed below:
- Recommendation F.60 Operational provisions for the international telex
- service
- Recommendation F.69 Plan for the telex destination codes
- Recommendation F.72 International telex store-and-forward - General
- principles and operational aspects
- Recommendation F.160 General operational provisions for the
- international public fascimile services
- Recommendation F.200 Teletex service
- Recommendation F.300 Videotex service
- Recommendation F.400 Message handling - System and service overview (see
- also ISO 10021-1)
- Recommendation F.401 Message handling services - Naming and addressing
- for public message handling services
- Recommendation F.410 Message handling services - The public message
- transfer service
- Recommendation F.415 Message handling services - Intercommunication with
- public physical delivery services
- Recommendation F.420 Message handling services - The public
- interpersonal messaging service
- Recommendation F.421 Message handling services - Intercommunication
- between the IPM service and the telex service
- Recommendation F.422 Message handling services - Intercommunication
- between the IPM service and the teletex service
- Recommendation T.61 Character repertoire and coded character sets for
- the international teletex service
- Recommendation T.330 Telematic access to IPMS
- Recommendation U.80 International teletex store-and-forward - Access
- from telex
- Recommendation U.204 Interworking between the telex service and the public
- interpersonal messaging service
- Recommendation X.200 Reference model of open systems interconnection for CCITT
- applications (see also ISO 7498)
- Recommendation X.208 Specification of abstract syntax notation one (ASN.1)
- (see also ISO 8824)
- Recommendation X.209 Specification of basic encoding rules for abstract syntax
- notation one (ASN.1) (see also ISO 8825)
- Recommendation X.217 Association control: Service definitions (see also ISO
- 8649)
- Recommendation X.218 Reliable transfer model: Service definition (see also
- ISO/IEC 9066-1)
- Recommendation X.219 Remote operations model: Notation and service definition
- (see also ISO/IEC 9072-1)
- Recommendation X.400 Message handling - System and service overview (see also
- ISO/IEC 10021-1)
- Recommendation X.402 Message handling systems - Overall architecture (see also
- ISO/IEC 10021-2)
- Recommendation X.403 Message handling systems - Conformance testing
- Recommendation X.407 Message handling systems - Abstract service definition
- conventions (see also ISO/IEC 10021-3)
- Recommendation X.408 Message handling systems - Encoded information type
- convention rules
- Recommendation X.411 Message handling systems - Message transfer system:
- Abstract service definition and procedures (see
- also ISO/IEC 10021-4)
- Recommendation X.413 Message handling systems - Message store: Abstract
- service definition (see also ISO/IEC 10021-5)
- Recommendation X.419 Message handling systems - Protocol specifications (see
- also ISO/IEC 10021-6)
- Recommendation X.420 Message handling systems - Interpersonal messaging system
- (see also ISO/IEC 10021-7)
- Recommendation X.500 Directory - Overview (see also ISO/IEC 9594-1)
- Recommendation X.501 Directory - Models (see also ISO/IEC 9594-2)
- Recommendation X.509 Directory - Authentication (see also ISO/IEC 9594-8)
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
- Recommendation X.511 Directory - Abstract service definition (see also ISO/IEC
- 9594-3)
- Recommendation X.518 Directory - Procedures for distributed operations (see
- also ISO/IEC 9594-4)
- Recommendation X.519 Directory - Protocol specifications (see also ISO/IEC
- 9594-5)
- Recommendation X.520 Directory - Selected attribute types (see also ISO/IEC
- 9594-6)
- Recommendation X.521 Directory - Selected object classes (see also ISO/IEC
- 9594-7)
- 3 Definitions
- This Recommendation uses the terms listed below, and those defined in
- Annex A.
- Definitions of the elements of service applicable to MHS are contained in
- Annex B.
- 3.1 Open systems interconnection
- This Recommendation uses the following terms defined in Recommendation
- X.200:
- a) Application layer;
- b) Application-process;
- c) Open systems interconnection;
- d) OSI reference model.
- 3.2 Directory systems
- This Recommendation uses the following terms defined in Recommendation
- X.500:
- a) directory entry;
- b) directory system agent;
- c) directory system;
- d) directory user agent.
- This Recommendation uses the following terms defined in Recommendation
- X.501:
- e) attribute;
- f) group;
- g) member;
- h) name.
- 4 Abbreviations
- A Additional
- ADMD Administration management domain
- AU Access unit
- CA Contractual agreement
- DL Distribution list
- DSA Directory system agent
- DUA Directory user agent
- E Essential
- EIT Encoded information type
- I/O Input/output
- IP Interpersonal
- IPM Interpersonal messaging
- IPMS Interpersonal messaging system
- MD Management domain
- MH Message handling
- MHS Message handling system
- MS Message store
- MT Message transfer
- MTA Message transfer agent
- MTS Message transfer system
- N/A Not applicable
- O/R Originator/recipient
- OSI Open system interconnection
- PD Physical delivery
- PDAU Physical delivery access unit
- PDS Physical delivery system
- PM Per-message
- PR Per-recipient
- PRMD Private management domain
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
- PTLXAU Public telex access unit
- TLMA Telematic agent
- TLXAU Telex access unit
- TTX Teletex
- UA User agent
- 5 Conventions
- In this Recommendation the expression "Administration" is used for
- shortness to indicate a telecommunication Administration, a recognized private
- operating agency, and, in the case of intercommunication with public delivery
- service, a postal Administration.
- Note - This Recommendation is identical to Recommendation F.400. Because
- of the desired alignment with ISO, the conventions of ISO standards have been
- adopted for the structure of this text. These conventions differ from the CCITT
- style. The other Recommendations of the X.400-Series are in accordance with CCITT
- conventions.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
- PART 2 - GENERAL DESCRIPTION OF MHS
- 6 Purpose
- This Recommendation is one of a set of Recommendations and describes the
- system model and elements of service of the message handling system (MHS) and
- services. This Recommendation overviews the capabilities of an MHS that are used
- by Administrations for the provision of public MH services to enable users to
- exchange messages on a store-and-forward basis.
- The message handling system is designed in accordance with the principles
- of the reference model of open systems interconnection (OSI reference model) for
- CCITT applications (Recommendation X.200) and uses the presentation layer
- services and services offered by other, more general, application service
- elements. An MHS can be constructed using any network fitting in the scope of
- OSI. The message transfer service provided by the MTS is application independent.
- An example of a standardized application is the IPM service. End systems can use
- the MT service for specific applications that are defined bilaterally.
- Message handling services provided by Administrations belong to the group
- of telematic services defined in F-Series Recommendations.
- Various other telematic services and telex (Recommendations F.60, F.160,
- F.200, F.300, etc.), data transmission services (X.1), or physical delivery
- services (F.415) gain access to, and intercommunicate with, the IPM service or
- intercommunicate with each other, via access units.
- Elements of service are the service features provided through the
- application processes. The elements of service are considered to be components of
- the services provided to users and are either elements of a basic service or they
- are optional user facilities, classified either as essential optional user
- facilities, or as additional optional user facilities.
- 7 Functional model of MHS
- The MHS functional model serves as a tool to aid in the development of
- Recommendations for MHS, and aids in describing the basic concepts that can be
- depicted graphically. It comprises several different functional components that
- work together to provide MH services. The model can be applied to a number of
- different physical and organizational configurations.
- 7.1 Description of the MHS model
- A functional view of the MHS model is shown in Figure 1/X.400. In this
- model, a user is either a person or a computer process. Users are either direct
- users (i.e. engage in message handling by direct use of MHS), or are indirect
- users (i.e. engage in message handling through another communication system (e.g.
- a physical delivery system) that is linked to MHS). A user is referred to as
- either an originator (when sending a message) or a recipient (when receiving a
- message). Message handling elements of service define the set of message types
- and the capabilities that enable an originator to transfer messages of those
- types to one or more recipients.
- An originator prepares messages with the assistance of his user agent. A
- user agent (UA) is an application process that interacts with the message
- transfer system (MTS) or a message store (MS), to submit messages on behalf of a
- single user. The MTS delivers the messages submitted to it, to one or more
- recipient UAs, access units (AUs), or MSs, and can return notifications to the
- originator. Functions performed solely by the UA and not standardized as part of
- the message handling elements of service are called local functions. A UA can
- accept delivery of messages directly from the MTS, or it can use the capabilities
- of an MS to receive delivered messages for subsequent retrieval by the UA.
- The MTS comprises a number of message transfer agents (MTAs). Operating
- together, in a store-and-forward manner, the MTAs transfer messages and deliver
- them to the intended recipients.
- Access by indirect users of MHS is accomplished by AUs. Delivery to
- indirect users of MHS is accomplished by AUs, such as in the case of physical
- delivery, by the physical delivery access unit (PDAU).
- The message store (MS) is an optional general purpose capability of MHS
- that acts as an intermediary between the UA and the MTA. The MS is depicted in
- the MHS functional model shown in Figure 1/X.400. The MS is a functional entity
- whose primary purpose is to store and permit retrieval of delivered messages. The
- MS also allows for submission from, and alerting to the UA.
- The collection of UAs, MSs, AUs and MTAs is called the message handling
- system (MHS).
- Figure 1/X.400 - CCITT - 0100311-88
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
-
- 7.2 Structure of messages
- The basic structure of messages conveyed by the MTS is shown in Figure
- 2/X.400. A message is made up of an envelope and a content. The envelope carries
- information that is used by the MTS when transferring the message within the MTS.
- The content is the piece of information that the originating UA wishes delivered
- to one or more recipient UAs. The MTS neither modifies or examines the content,
- except for conversion (see S 16).
- Figure 2/X.400 - CCITT - 0100580-88
-
- 7.3 Application of the MHS model
- 7.3.1 Physical mapping
- Users access UAs for message processing purposes, for example, to create,
- present, or file messages. A user can interact with a UA via an input/output
- device or process (e.g. keyboard, display, printer, etc.). A UA can be
- implemented as a (set of) computer process(es) in an intelligent terminal.
- A UA and MTA can be co-located in the same system, or a UA/MS can be
- implemented in physically separate systems. In the first case the UA accesses the
- MT elements of service by interacting directly with the MTA in the same system.
- In the second case, the UA/MS will communicate with the MTA via standardized
- protocols specified for MHS. It is also possible for an MTA to be implemented in
- a system without UAs or MSs.
- Some possible physical configurations are shown in Figures 3/X.400 and
- 4/X.400. The different physical systems can be connected by means of dedicated
- lines or switched network connections.
- Figure 3/X.400- CCITT - 0100590
-
- Figure 4/X.400 - CCITT - 0100600-88
-
- 7.3.2 Organizational mapping
- An Administration or organization can play various roles in providing
- message handling services. An organization in this context can be a company or a
- non-commercial enterprise.
- The collection of at least one MTA, zero or more UAs, zero or more MSs,
- and zero or more AUs operated by an Administration or organization constitutes a
- management domain (MD). An MD managed by an Administration is called an
- Administration management domain (ADMD). An MD managed by an organization other
- than an Administration is called a private management domain (PRMD). An MD
- provides message handling services in accordance with the classification of
- elements of service as described in S 19. The relationships between management
- domains is shown in Figure 5/X.400.
- Figure 5/X.400 - CCITT - 0100321 -88
-
- Note 1 - It should be recognized that the provision of support of private
- messaging systems by CCITT members falls within the framework of national
- regulations. Thus the possibilities mentioned in this paragraph may or may not be
- offered by an Administration which provides message handling services. In
- addition, the UAs depicted in Figure 5/X.400 do not imply that UAs belonging to
- an MD must be exclusively located in the same country as their MDs.
- Note 2 - Direct interactions between PRMDs and internal interactions
- within an MD are outside the scope of this Recommendation.
- Note 3 - An Administration, in the context of CCITT, that manages an ADMD,
- is understood as being a member of ITU or a recognized private operating agency
- (RPOA), registered by a country with the ITU.
- 7.3.3 Administration management domain
- In one country one or more ADMDs can exist. An ADMD is characterized by
- its provision of relaying functions between other management domains and the
- provision of message transfer service for the applications provided within the
- ADMD.
- An Administration can provide access for its users to the ADMD in one or
- more of the following ways:
- - users to Administration provided UA
- - private UA to Administration MTA
- - private UA to Administration MS
- - private UA to Administration MTA
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
- - user to Administration provided UA.
- See also the examples of configurations shown in Figure 3/X.400 and Figure
- 4/X.400.
- Administration provided UAs can exist as part of an intelligent terminal
- that the user can use to access MHS. They can also exist as part of
- Administration resident equipment being part of MHS, in which case the user
- obtains access to the UA via an I/O device.
- In the case of a private UA, the user has a private stand-alone UA which
- interacts with the Administration provided MTA or MS, using submission, delivery
- and retrieval functions. A private, stand-alone UA can be associated with one or
- more MDs, provided that the required naming conventions are preserved.
- A private MTA as part of an PRMD can access one or more ADMDs in a
- country, following national regulations.
- Access can also be provided by Administration provided AUs described in SS
- 10 and 11.
- 7.3.4 Private management domain
- An organization other than an Administration can have one or more MTA(s),
- and zero or more UAs, AUs and MSs forming a PRMD which can interact with an ADMD
- on an MD to MD (MTA to MTA) basis. A PRMD is characterized by the provision of
- messaging functions within that management domain.
- A PRMD is considered to exist entirely within one country. Within that
- country, the PRMD can have access to one or more ADMDs as shown in Figure
- 5/X.400. However, in the case of a specific interaction between a PRMD and an
- ADMD (such as when a message is transferred between MDs), the PRMD is considered
- to be associated only with that ADMD. A PRMD will not act as a relay between two
- ADMDs.
- In the interaction between a PRMD and an ADMD, the ADMD takes
- responsibility for the actions of the PRMD which are related to the interaction.
- In addition to ensuring that the PRMD properly provides the message transfer
- service, the ADMD is responsible for ensuring that the accounting, logging,
- quality of service, uniqueness of names, and related operations of the PRMD are
- correctly performed. As a national matter, the name of a PRMD can be either
- nationally unique or relative to the associated ADMD. If a PRMD is associated
- with more than one ADMD, the PRMD can have more than one name.
- 7.4 Message store
- Because UAs can be implemented on a wide variety of equipment, including
- personal computers, the MS can complement a UA implemented, for example, on a
- personal computer by providing a more secure, continuously available storage
- mechanism to take delivery of messages on the user agent's behalf. The MS
- retrieval capability provides users who subscribe to an MS with basic message
- retrieval capabilities potentially applicable to messages of all types. Figure
- 6/X.400 shows the delivery, and subsequent retrieval of messages that are
- delivered to an MS, and the indirect submission of messages via the MS.
- Figure 6/X.400 - CCITT - 0100610-88
-
- One MS acts on behalf of only one user (one O/R address), i.e. it does not
- provide a common or shared MS capability to several users (see also PRMD3 of
- Figure 5/X.400).
- When subscribing to an MS, all messages destined for the UA are delivered
- to the MS only. The UA, if on line, can receive alerts when certain messages are
- delivered to the MS. Messages delivered to an MS are considered delivered from
- the MTS perspective.
- When a UA submits a message through the MS, the MS is in general
- transparent and submits it to the MTA before confirming the success of the
- submission to the UA. However, the MS can expand the message if the UA requests
- the forwarding of messages that exist in the MS.
- Users are also provided with the capability to request the MS to forward
- selected messages automatically upon delivery.
- The elements of service describing the features of the MS are defined in
- Annex B and classified in S 19. Users are provided with the capability based on
- various criteria, to get counts and lists of messages, to fetch messages, and to
- delete messages, currently held in the MS.
- 7.4.1 Physical configurations
- The MS can be physically located with respect to the MTA in a number of
- ways. The MS can be co-located with the UA, co-located with the MTA, or
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
- stand-alone. From an external point of view, a co-located UA and MS are
- indistinguishable from a stand-alone UA. Co-locating the MS with the MTA offers
- significant advantages which will probably make it the predominant configuration.
- 7.4.2 Organizational configurations
- Either ADMDs or PRMDs can operate MSs. In the case of Administration
- supplied MSs, the subscriber either provides his own UA or makes use of an
- Administration supplied UA via an I/O device. In either case, all the
- subscriber's messages are delivered to the MS for subsequent retrieval.
- The physical and organizational configurations described above are
- examples only and other equally cases can exist.
- 8 Message transfer service
- The MTS provides the general, application independent, store-and-forward
- message transfer service. The elements of service describing the features of the
- MT service are defined in Annex B and classified in S 19. Provision of public
- message transfer service by Administrations is described in Recommendation F.410.
- 8.1 Submission and delivery
- The MTS provides the means by which UAs exchange messages. There are two
- basic interactions between MTAs and UAs and/or MSs:
- 1) The submission interaction is the means by which an originating UA or
- MS transfers to an MTA the content of a message and the submission
- envelope. The submission envelope contains the information that the MTS
- requires to provide the requested elements of service.
- 2) The delivery interaction is the means by which the MTA transfers to a
- recipient UA or MS the content of a message plus the delivery envelope.
- The delivery envelope contains information related to delivery of the
- message.
- In the submission and delivery interactions, responsibility for the
- message is passed between the MTA and the UA or MS.
- 8.2 Transfer
- Starting at the originator's MTA, each MTA transfers the message to
- another MTA until the message reaches the recipient's MTA, which then delivers it
- to the recipient UA or MS using the delivery interaction.
- The transfer interaction is the means by which one MTA transfers to
- another MTA the content of a message plus the transfer envelope. The transfer
- envelope contains the information related to the operation of the MTS plus
- information that the MTS requires to provide elements of service requested by the
- originating UA.
- MTAs transfer messages containing any type of binary coded information.
- MTAs neither interpret not alter the content of messages except when performing a
- conversion.
- 8.3 Notifications
- Notifications in the MT service comprise the delivery and non-delivery
- notifications. When a message, or probe, cannot be delivered by the MTS, a
- non-delivery notification is generated and returned to the originator in a report
- signifying this. In addition, an originator can specifically ask for
- acknowledgement of successful delivery through use of the delivery notification
- element of service on submission.
- 8.4 User agent
- The UA uses the MT service provided by the MTS. A UA is a functional
- entity by means of which a single direct user engages in message handling.
- UAs are grouped into classes based on the type of content of messages they
- can handle. The MTS provides a UA with the ability to identify its class when
- sending messages to other UAs. UAs within a given class are referred to as
- cooperating UAs since they cooperate with each other to enhance the communication
- amongst their respective users.
- Note - A UA can support more than one type of message content, and hence
- belong to several UA classes.
- 8.5 Message store
- The message store (MS) uses the MT service provided by the MTS. An MS is a
- functional entity associated with a user's UA. The user can submit messages
- through it, and retrieve messages that have been delivered to the MS.
- 8.6 Access unit
- An access unit (AU) uses the MT service provided by the MTS. An AU is a
- functional entity associated with an MTA to provide for intercommunication
- between MHS and another system or service.
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
- 8.7 Use of the MTS in the provision of various services
- The MTS is used by application specific services for the provision of
- message handling services of various types. The interpersonal messaging service,
- described in S 9, is one example of this. Other services can be built on the
- foundation of the MTS, either with corresponding recommendations or as private
- applications.
- 9 IPM service
- The interpersonal message service (IPM service) provides a user with
- features to assist in communicating with other IPM service users. The IPM service
- uses the capabilities of the MT service for sending and receiving interpersonal
- messages. The elements of service describing the features of the IPM service are
- defined in Annex B and classified in S 19. The provision of public interpersonal
- messaging service by Administrations is described in Recommendation F.420.
- 9.1 IPM service functional model
- Figure 7/X.400 shows the functional model of the IPM service. The UAs used
- in the IPM service (IPM-UAs) comprise a specific class of cooperating UAs. The
- optional access units shown (TLMA, PTLXAU) allow for teletex and telex users to
- intercommunicate with the IPM service. The optional access unit (TLMA) also
- allows for teletex users to participate in the IPM service (see also S 11). The
- optional physical delivery access unit (PDAU) allows IPM users to send messages
- to users outside the IPM service who have no access to MHS. The message store can
- optionally be used by IPM users to take delivery of messages on their behalf.
- 9.2 Structure of IP-messages
- The IP class of UAs create messages containing a content specific to the
- IPM. The specific content that is sent from one IPM UA to another is a result of
- an originator composing and sending a message, called an IP-message. The
- structure of an IP-message as it release to the basic message structure of MHS is
- shown in Figure 8/X.400. The IP-message is conveyed with an envelope when being
- transferred through the MTS.
- Figure 9/X.400 shows an analogy between a typical office memo, and the
- corresponding IP-message structure. The IP-message contains information (e.g.,
- to, cc, subject) provided by the user which is transformed by the IPM UA into the
- heading of the IP-message. The main information that the user wishes to
- communicate (the body of the memo) is contained within the body of the
- IP-message. In the example shown, the body contains two types of encoded
- information: text and facsimile, which form what are called body parts. In
- general, an IP-message body can consist of a number of body parts, each which can
- be of a different encoded information type, such as voice, text, facsimile and
- graphics.
- Figure 7/X.400 -CCITT - 0100341-88
-
- Figure 8/X.400 - CCITT - 0100351-88
-
- Figure 9/X.400 - CCITT - 0100361-88
-
- 9.3 IP-notifications
- In the IPM service a user can request a notification of receipt or
- non-receipt of a message by a recipient. These notifications are requested by an
- originator and are generated as a result of some (such as reading/not reading the
- message) recipient action. In certain cases the non-receipt notification is
- generated automatically by the recipient's UA.
- 10 Intercommunication with physical delivery services
- 10.1 Introduction
- The value of message handling systems can be increased by connecting them
- to physical delivery (PD) systems such as the traditional postal service. This
- will allow for the physical (e.g., hardcopy) delivery of messages originated
- within MHS to recipients outside of MHS, and in some cases will allow for the
- return of notifications from the PD service to an MHS originator. The ability for
- origination of messages in the PD service for submission to MHS through the PDAU
- is for further study. The capability of intercommunication between PD and MH
- services is an optional capability of MHS, and is applicable to any application
- such as IPM. All users of MHS will have the ability to generate messages for
- subsequent physical delivery. Figure 10/X.400 shows the functional model of this
- interworking. Provision of intercommunication between public message handling
- services offered by Administrations and PD services is described in
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
- Recommendation F.415. The elements of service describing the features of this
- intercommunication are defined in Annex B and classified in S 19.
- Figure 10/X.400 - CCITT - 0100371-88
-
- A physical delivery system is a system, operated by a management domain,
- that transports and delivers physical messages. A physical message is a physical
- object comprising a relaying envelope and its content. An example of a PDS is the
- postal service. An example of a physical message is a paper letter and its
- enclosing paper envelope.
- A physical delivery access unit (PDAU) converts an MH user's message to
- physical form, a process called physical rendition. An example of this is the
- printing of a message and its automatic enclosure in a paper envelope. The PDAU
- passes the physically rendered message to a PDS for further relaying and eventual
- physical delivery.
- A PDAU can be viewed as a set of UAs, each UA being identified by a postal
- address. To perform its functions, a PDAU must support submission (notifications)
- and delivery interactions with the MTS, and also cooperate with other UAs. MH/PD
- service intercommunication is thus provided as part of the message transfer
- service.
- To enable MH users to address messages, to be delivered physically by a
- PDS, an address form appropriate for this exists and is described in S 12.
- 10.2 Organizational configurations
- Possible organizational mappings of the functional model described above
- are shown in Figure 11/X.400. In each model (A & B), the term PD domain denotes
- the domain of responsibility of an organization providing a PD service. In A, the
- PD domain comprises an MD and a PDS. The boundary between the PD domain and the
- rest of MHS is a boundary between MDs. In B, the PD domain comprises only the
- PDS; the PDAU is not part of the PD domain. The boundary between the PD domain
- and MHS lies at the point where the PDAU passes physical messages to the PDS.
- 11 Specialized access
- 11.1 Introduction
- The functional model of MHS (Figure 1/X.400) contains access units (AUs)
- to allow access between MHS and other communication systems and services. The
- model shows a generic access unit between MHS and telematic services.
- Also shown in a physical delivery access unit to allow for physical
- delivery of MHS messages to recipients without the need for terminal access to
- MHS. The access to physical delivery services is available to any application
- carried by the MTS, through a PDU described in S 10.
- Other forms of access are described below.
- Figure 11/X.400 - CCITT - 0100380-87
-
- 11.2 Teletex access
- 11.2.1 Registered access to the IPM service
- The specialized access unit defined for telematic access - telematic agent
- (TLMA) caters specially for teletex (TTX) terminals. This TLMA provides for
- teletex access to the IPM service as shown in Figure 7/X.400. The technical
- provisions of this access are defined in Recommendation T.330. The TLMA enables
- users of teletex terminals to participate fully in the IPM service.
- 11.2.2 Non-registered (public) access to the IPM service
- The specialized access unit defined for telematic access - telematic agent
- (TLMA) also provides for public access to the IPM service for TTX users who are
- not registered users of the IPM service. This is shown in Figure 7/X.400. The
- technical provisions of this access are defined in Recommendation T.330. The
- intercommunication between the IPM service and the teletex service is defined in
- Recommendation F.422.
- 11.3 Telex access
- 11.3.1 Registered access to the IPM service
- A telex access unit (TLXAU) is defined in the technical Recommendations to
- allow the intercommunication between IPM users and telex users. To provide a
- service with this type of AU is a national matter.
- 11.3.2 Non-registered (public) access to the IPM service
- A specialized access unit is defined to allow the intercommunication
- between IPM users and telex users. This AU provides for public access to the IPM
- service for telex users who are not registered users of the IPM service, and is
- called a public telex access unit (PTLXAU). This is shown in Figure 7/X.400. The
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
- telex users are not subscribers to the IPM service, but use some of the features
- of the IPM service to pass messages to IPM users. IPM users can also send
- messages to telex users via this AU. The intercommunication between the IPM
- service and the telex service is defined in Recommendation F.421.
- Note - Other types of access units are for further study (e.g., facsimile,
- videotex, etc.).
- PART 3 - CAPABILITIES OF MHS
- 12 Naming and addressing
- 12.1 Introduction
- In an MHS, the principal entity that requires naming is the user (the
- originator and recipient of messages). In addition, distribution lists (DLs) have
- names for use in MHS. Users of MHS and DLs are identified by O/R names. O/R names
- are comprised of directory names and/or addresses, all of which are described in
- this clause.
- 12.2 Directory names
- Users of the MH service, and DLs, can be identified by a name, called a
- directory name. A directory name must be looked up in a directory to find out the
- corresponding O/R address. The structure and components of directory names are
- described in the X.500-Series of Recommendations.
- A user can access a directory system directly to find out the O/R address
- of a user, or O/R addresses of the members of a DL (both of which are outside the
- scope of these Recommendations). As an alternative, a user can use the directory
- name and have MHS access a directory to resolve the corresponding O/R address or
- addresses automatically as described in S 14.
- An MH user or DL will not necessarily have a directory name, unless they
- are registered in a directory. As directories become more prevalent, it is
- expected that directory names will be the preferred method of identifying MHS
- users to each other.
- 12.3 O/R names
- Every MH user or DL will have one or more O/R name(s). An O/R name
- comprises a directory name, and O/R address, or both.
- Either or both components of an O/R name can be used on submission of a
- message. If only the directory name is present, MHS will access a directory to
- attempt to determine the O/R address, which it will then use to route and deliver
- the message. If a directory name is absent, it will use the O/R address as given.
- When both are given on submission, MHS will use the O/R address, but will carry
- the directory name and present both to the recipient. If the O/R address is
- invalid, it will then attempt to use the directory name as above.
- 12.4 O/R addresses
- An O/R address contains information that enables MHS to uniquely identify
- a user to deliver a message or return a notification to him. (The prefix "O/R"
- recognizes the fact that the user can be acting as either the originator or
- recipient of the message or notification in question.)
- An O/R address is a collection of information called attributes.
- Recommendation X.402 specifies a set of standard attributes from which O/R
- addresses can be constructed. Standard attributes mean that their syntax and
- semantics are defined in Recommendation X.402. In addition to standard
- attributes, and to cater for existing messaging systems, there are domain defined
- attributes whose syntax and semantics are defined by management domains.
- Various forms of O/R addresses are defined, each serving their own
- purpose. These forms and their purpose are as follows:
- - Mnemonic O/R address: Provides a user-friendly means of identifying
- users in the absence of a directory. It is also used for identifying a
- distribution list.
- - Terminal O/R address: Provides a means of identifying users with
- terminals belonging to various networks.
- - Numeric O/R address: Provides a means of identifying users by means of
- numeric keypads.
- - Postal O/R address: Provides a means of identifying originators and
- recipients of physical messages.
- 13 MHS use of directory
- 13.1 Introduction
- The directory defined by the X.500-Series of Recommendations provides
- capabilities useful in the use and provision of a variety of telecommunication
- services. This clause describes how a directory can be used in messages handling.
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
- Details can be found in other X.400 Recommendations.
- The directory capabilities used in message handling fall into the
- following four categories:
- a) User-friendly naming: The originator or recipient of a message can be
- identified by means of his directory name, rather than his machine
- oriented O/R address. At any time MHS can obtain the latter from the
- former by consulting the directory.
- b) Distribution lists (DLs): A group whose membership is stored in the
- directory can be used as a DL. The originator simply supplies the name
- of the list. At the DL's expansion point MHS can obtain the directory
- names (and then the O/R addresses) of the individual recipients by
- consulting the directory.
- c) Recipient UA capabilities: MHS capabilities of a recipient (or
- originator) can be stored in his directory entry. At any time MHS can
- obtain (and then act upon) those capabilities by consulting the
- directory.
- d) Authentication: Before two MHS functional entities (two MTAs, or a UA
- and an MTA) communicate with one another, each establishes the identity
- of the other. This can be done by using authentication capabilities of
- MHS based on information stored in the directory.
- Besides the above, one user can directly access the directory, for
- example, to determine the O/R address or MHS capabilities of another. The
- recipient's directory name is supplied to the directory, which returns the
- requested information.
- 13.2 Functional model
- Both UAs and MTAs can use the directory. A UA can present the directory
- with the directory name of the intended recipient, and obtain from the directory
- the recipient's O/R address. The UA can then supply both the directory name and
- the O/R address to the MTS. Another UA can supply just the recipient's directory
- name to the MTS. The MTS would then itself ask the directory for the recipient's
- O/R address and add it to the envelope. The originating MTA normally carries out
- the name to O/R address look up.
- A functional model depicting the above is shown in Figure 12/X.400.
- Figure 12/X.400 - CCITT - 0100422-88
-
- 13.3 Physical configurations
- Some possible physical configurations of the above functional model are
- shown in Figure 13/X.400. Where a directory user agent (DUA) and directory system
- agent (DSA) reside in physically separate systems, a standard directory protocol,
- defined in the X.500-Series of Recommendations, governs their interactions. It
- will often be desirable to physically co-locate a UA or MTA with a DUA/DSA.
- However, other physical configurations are also possible.
- Figure 13/X.400 - CCITT - 0100431-88
-
- 14 Distribution lists in MHS
- 14.1 Introduction
- The ability to make use of a distribution list (DL) is an optional
- capability of MHS provided through the MT service. DL expansion allows a sender
- to have a message transmitted to a group of recipients, by naming the group
- instead of having to enumerate each of the final recipients.
- 14.2 Properties of a DL
- The properties of a DL can be described as follows:
- - DL members: Users and other DLs that will receive messages addressed to
- the DL.
- - DL submit permission: A list of users and other DLs which are allowed
- to make use of the DL to send messages to the DL's members.
- - DL expansion point: Each DL has an unambiguous O/R address. This O/R
- address identifies the expansion point, which is the domain or MTA
- where the names of the members of the DL are added to the recipient
- list. The message is transported to the expansion point before
- expansion as shown in Figure 14/X.400.
- - DL owner: A user who is responsible for the management of a DL.
- 14.3 Submission
- Submission of a message to a DL is similar to the submission of a message
- to a user. The originator can include in the DL's O/R name, the directory name,
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
- the O/R address, or both (see S 12 for details). The originator need not be aware
- that the O/R name used is that of a DL. The originator can, however, through use
- of the element of service, DL expansion prohibited, prohibit the MTS from
- expanding a message unknowingly addressed to a DL.
- 14.4 DL use of a directory
- A directory may or may not be used to store information about the
- properties of a DL. Among the information that can be stored are the following:
- DL members, DL owner, DL submit permission and the DL expansion point.
- 14.5 DL expansion
- At the expansion point, the MTA responsible for expanding the DL will:
- a) Look up the information about the DL, e.g. in the directory, using
- access rights granted to the MTA. (Note - Since this is done by the MTA
- at the expansion point, support of DLs in MHS does not require a
- globally interconnected directory).
- b) Verify whether expansion is allowed by checking the identity of the
- sender against the DL's submit permission.
- c) If expansion is allowed, add the members of the DL to the list of
- recipients of the message and transmit the message to them.
- Figure 14/X.400 - CCITT - 0706800-89
-
- 14.6 Nesting
- A member of a DL can be another DL as shown in Figure 14/X.400. In this
- case the message is forwarded from the expansion point of the parent DL to the
- expansion point of the member DL for further expansion. Thus during each
- expansion, only the members of a single DL are added to the message.
- During expansion of a nested DL, the identity of the parent DL (e.g., DL1
- in Figure 14/X.400) rather than that of the message originator, is compared
- against the submit permission of the member DL (e.g., DL2 in Figure 14/X.400).
- Note - DL structures can be defined which reference a particular nested DL
- more than once at different levels of the nesting. Submission to such a parent DL
- can cause a recipient to receive multiple copies of the same message. The same
- result can occur if a message is addressed to multiple DLs which contain a common
- member. Correlation of such copies can be done at the recipient's UA, and/or in
- the MS.
- 14.7 Recursion control
- If a certain DL is directly or indirectly a member of itself (a situation
- which can validly arise), or when DLs are combined with redirection, then a
- message might get back to the same list and potentially circulate infinitely.
- This is detected by the MTS and prevented from occurring.
- 14.8 Delivery
- On delivery of the message, the recipient will find out that he received
- the message as a member of a DL, and through which DL, or chain or DLs he got the
- message.
- 14.9 Routing loop control
- A message can be originated in one domain/MTA, expanded in a second
- domain/MTA, and then sent back to a DL member in the first domain/MTA. The MTS
- will not treat this as a routing loop error.
- 14.10 Notifications
- Delivery and non-delivery notifications can be generated both at the DL
- expansion point (e.g. if submit permission is denied), and at delivery to the
- ultimate recipient.
- When a message coming from a DL generates a notification, this
- notification is sent to the DL from which the message came. The DL will then,
- depending on the policy of the list, forward the notification to the owner of the
- list, to the DL or originator from which it got the message, or both, as shown in
- Figure 15/X.400.
- Figure 15/X.400 - CCITT 0706810-89
-
- Note - When notifications are sent to the originator after DL expansion,
- the originator can receive many delivery/non-delivery notifications for one
- originator specified recipient (the DL itself). The originator can even receive
- more than one notification from an ultimate recipient, if that recipient received
- the message more than once via different lists.
- 14.11 DL handling policy
- An MTA may or may not provide different policies on DL handling. Such
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
- policies will control whether notifications generated at delivery to DL members
- should be propagated back through the previous DL, or to the originator if no
- such previous DL, and/or to this list owner. If the policy is such that
- notifications are to be sent only to the list owner, then the originator will
- receive notifications if requested, only during expansion of that DL. In order to
- accomplish this restriction, the MTS will, while performing the expansion, reset
- the notification requests according to the policy for the list.
- 15 Security capabilities of MHS
- 15.1 Introduction
- The distributed nature of MHS makes it desirable that mechanisms are
- available to protect against various security threats that can arise. The nature
- of these threats and the capabilities to counter them are highlighted below.
- 15.2 MHS security threats
- 15.2.1 Access threats
- Invalid user access into MHS is one of the prime security threats to the
- system. If invalid users can be prevented from using the system, then the
- subsequent security threat to the system is greatly reduced.
- 15.2.2 Inter-message threats
- Inter-message threats arise from unauthorized agents who are external to
- the message communication, and can manifest themselves in the following ways;
- - Masquerade: A user who does not have proof of whom he is talking to can
- be easily misled by an imposer into revealing sensitive information.
- - Message modification: A genuine message which has been modified by an
- unauthorized agent while it was transferred through the system can
- mislead the message recipient.
- - Replay: Messages whose originators and contents are genuine can be
- monitored by an unauthorized agent and could be recorded to be replayed
- to the message's intended recipient at a later date. This could be done
- in order to either extract more information from the intended recipient
- or to confuse him.
- - Traffic analysis: Analysis of message traffic between MH users can
- reveal to an eavesdropper how much data (if any) is being sent between
- users and how often. Even if the eavesdropper cannot determine the
- actual contents of the messages, he can still deduce a certain amount
- of information from the rate of traffic flow (e.g. continuous, burst,
- sporadic or none).
- 15.2.3 Intra-message threats
- Intra-message threats are those performed by the actual message
- communication participants themselves, and can manifest themselves in the
- following ways:
- - Repudiation of messages: One of the actual communication participants
- can deny involvement in the communication. This could have serious
- implications if financial transactions were being performed via MHS.
- - Security level violation: If a management domain within MHS employs
- different security clearance levels (e.g. public, personal, private and
- company confidential) then users must be prevented from sending or
- receiving any messages for which they have an inadequate security
- clearance level if the management domain's security is not to be
- compromised.
- 15.2.4 Data store threats
- An MHS has a number of data stores within it that must be protected from
- the following threats:
- - Modification of routing information: Unauthorized modification of the
- directory's contents could lead to messages being mis-routed or even
- lost while unauthorized modification to the deferred delivery data
- store or the hold for delivery data store could mislead or confuse the
- intended recipient.
- - Preplay: An unauthorized agent could make a copy of a deferred delivery
- message and send this copy to the intended recipient while the original
- was still being held for delivery in the MTA. This could fool the
- message recipient into replying to the message originator before the
- originator was expecting a reply or simply mislead or confuse the
- original intended message recipient.
- 15.3 Security model
- Security features can be provided by extending the capabilities of the
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
- components in the message handling system to include various security mechanisms.
- There are two aspects to security in message handling: secure access
- management and administration, and secure messaging.
- 15.3.1 Secure access management and administration
- The capabilities in this section cover the establishment of an
- authenticated association between adjacent components, and the setting up of
- security parameters for the association. This can be applied to any pair of
- components in the message handling system: UA/MTA, MTA/MTA, MS/MTA, etc.
- 15.3.2 Secure messaging
- The capabilities in this section cover the application of security
- features to protect messages in the message handling system in accordance with a
- defined security policy. This includes elements of service enabling various
- components to verify the origin of messages and the integrity of their content,
- and elements of service to prevent unauthorized disclosure of the message
- content.
- The capabilities in this section cover the application of security
- features to protect messages directly submitted to the message transfer system by
- a user agent, message store, or an access unit. They do not cover the application
- of security features to protect communication between users and the message
- handling system, or MH user-to-MH user communication (a large part of MH
- user-to-MH user communication is protected between two UAs). Thus they do not
- apply, for example, to communication between a remote user's terminal and its UA,
- or to communication between these users' terminal equipment and other users in
- the MHS. Security capabilities to protect MH user-to-MH user communication are
- for further study.
- Many of the secure messaging elements of service provide an originator to
- recipient capability, and require the use of user agents with security
- capabilities. They do not require the use of a message transfer system with
- security features. (As an example, content confidentiality can be applied by
- enciphering the message content by the originator, and deciphering by the
- recipient, with various security parameters transferred within the message
- envelope. Such a message can be transferred by an MTS which can handle the format
- of the content (unformatted octets), and transparently handle the security fields
- in the envelope.)
- Some of the secure messaging elements of service involve an interaction
- with the message transfer system, and require the use of message transfer agents
- with security capabilities. (As an example, non-repudiation of submission
- requires the MTA, to which the message is submitted, to contain mechanisms to
- generate a proof of submission field.)
- Some of the secure messaging elements of service apply to the MS as well
- as UAs and MTAs, such as message security labelling. In general, however, the MS
- is transparent to security features that apply between the originators' and the
- recipients' UAs.
- The scope of the secure messaging elements of service is given in Table
- 2/X.400. This describes the elements of service in terms of which MHS component
- is the "provider" or which is the "user" of the security service. For example,
- probe origin authentication is provided by the originating UA, and can be used by
- the MTAs through which the probe passes.
- This Recommendation describes the use of security services by the UA, and
- the MTA. How these features are applied to access units is for further study.
- 15.4 MHS security capabilities
- The elements of service describing the security features of MHS are
- defined in Annex B, and classified in S 19. An overview of these capabilities is
- as follows:
- - Message origin authentication: Enables the recipient, or any MTA
- through which the message passes, to authenticate the identity of the
- originator of a message.
- - Report origin authentication: Allows the originator to authenticate the
- origin of a delivery/non-delivery report.
- - Probe origin authentication: Enables any MTA through which the probe
- passes, to authenticate the origin of the probe.
- - Proof of delivery: Enables the originator of a message to authenticate
- the delivered message and its content, and the identity of the
- recipient(s).
- - Proof of submission: Enables the originator of a message to
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
- authenticate that the message was submitted to the MTS for delivery to
- the originally specified recipient(s).
- - Secure access management: Provides for authentication between adjacent
- components, and the setting up of the security context.
- - Content integrity: Enables the recipient to verify that the original
- content of a message has not been modified.
- - Content confidentiality: Prevents the unauthorized disclosure of the
- content of a message to a party other than the intended recipient.
- - Message flow confidentiality: Allows the originator of a message to
- conceal the message flow through MHS.
- - Message sequence integrity: Allows the originator to provide to a
- recipient proof that the sequence of messages has been preserved.
- - Non-repudiation of origin: Provides the recipient(s) of a message with
- proof of origin of the message and its content which will protect
- against any attempt by the originator to falsely deny sending the
- message or its content.
- - Non-repudiation of delivery: Provides the originator of a message with
- proof of delivery of the message which will protect against any attempt
- by the recipient(s) to falsely deny receiving the message of its
- content.
- - Non-repudiation of submission: Provides the originator of a message
- with proof of submission of the message, which will protect against any
- attempt by the MTS to falsely deny that the message was submitted for
- delivery to the originally specified recipient(s).
- - Message security labelling: Provides a capability to categorize a
- message, indicating its sensitivity, which determines the handling of a
- message in line with the security policy in force.
- TABLE 2/X.400
- Provision and use of secure messaging elements of service by MHS components
- Elements of service Originating MTS Recipient
- MTS user MTS user
- Message origin authentication P U U
- Report origin authentication U P -
- Probe origin authentication P U -
- Proof of delivery U - P
- Proof of submission U
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
- P -
- Secure access management P U P
- Content integrity P - U
- Content confidentiality P - U
- Message flow confidentiality P - U
- Message sequence integrity P - U
- Non-repudiation of origin P - U
- Non-repudiation of submission U P -
- Non-repudiation of delivery U -
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PAGE22 Fascicle VIII.7 - Rec. X.400
-
- P
- Message security labelling P U U
- P The MHS component is a provider of the service
- U The MHS component is a user of the service.
- 15.5 Security management
- Aspects of an asymmetric key management scheme to support the above
- features are provided by the directory system authentication framework, described
- in Recommendation X.509. The directory stores certified copies of public keys for
- MHS users which can be used to provide authentication and to facilitate key
- exchange for use in data confidentiality and data integrity mechanisms. The
- certificates can be read from the directory using the directory access protocol
- described in Recommendation X.519.
- Recommendations for other types of key management schemes, including
- symmetric encryption, to support the security features are for further study.
- 16 Conversion in MHS
- The MTS provides conversion functions to allow users to input messages in
- one or more encoded formats, called encoded information types (EITs), and have
- them delivered in other EITs to cater to users with various UA capabilities and
- terminal types. This capability is inherent in the MTS and increases the
- possibility of delivery by tailoring the message to the recipient's terminal
- capabilities. The EITs standardized in MHS are listed in Recommendation X.411.
- Conversions and the use of the elements of service relating to conversion are
- available for EITs not defined in Recommendation X.411, but supported by certain
- domains, either bilaterally between these domains or within a domain itself.
- MHS users have some control over the conversion process through various
- elements of service as described in Annex B. These include the ability for a user
- to explicitly request the conversion required or as a default to let the MTS
- determine the need for conversion, and the type of conversion performed. Users
- also have the ability to request that conversion not be performed or that
- conversion not be performed if loss of information will result. When the MTS
- performs conversion on a message it informs the UA to whom the message is
- delivered that conversion took place and what the original EITs were.
- The conversion process for IP-messages can be performed on body parts of
- specific types if they are present in a message. The general aspects of
- conversion and the specific conversion rules for conversion between different
- EITs are detailed in Recommendation X.408.
- Recommendation X.408 deals with conversion for the following: telex, IA5
- text, teletex, G3fax, G4 Class1, videotex, voice, and mixed mode.
- 17 Use of the MHS in provision of public services
- The message handling system is used in the provision of public MH services
- that are offered by Administrations for use by their subscribers. These public MH
- services are defined in the F.400-Series Recommendations and include:
- - the public message transfer service (Rec. F.410);
- - the public interpersonal messaging service (Rec. F.420).
- In addition complementary public services are offered by Administrations
- to allow for the intercommunication between CCITT services and the public MH
- services mentioned above, as follows:
- - intercommunication with public physical delivery services (Rec. F.415).
- - intercommunication between the IPM service and the telex service (Rec.
- F.421);
- - intercommunication between the IPM service and the teletex service
- (Rec. F.422);
- Recommendation F.401 describes the naming and addressing aspects for
- public MH services.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Fascicle VIII.7 - Rec. X.400 PAGE1
-
-