Rec. ISO X.402 (11/1995) INFORMATION TECHNOLOGY MESSAGE HANDLING SYSTEMS (MHS): OVERALL ARCHITECTURE
FOREWORD
CONTENTS
Summary
SECTION 1 INTRODUCTION
1 Scope
2 Normative references
    2.1 Open Systems Interconnection
        2.1.1 Identical Recommendations | International Standards
        2.1.2 Paired Recommendations | International Standards equivalent in technical content
        2.1.3 Additional references
    2.2 Directory Systems
        2.2.1 Identical Recommendations | International Standards
    2.3 Message Handling Systems
        2.3.1 Identical Recommendations | International Standards
        2.3.2 Paired Recommendations | International Standards equivalent in technical content
        2.3.3 Additional References
    2.4 Country Codes
    2.5 Network Addresses
3 Definitions
    3.1 Open Systems Interconnection
    3.2 Directory Systems
    3.3 Message Handling Systems
4 Abbreviations
5 Conventions
    5.1 ASN.1
    5.2 Grade
    5.3 Terms
SECTION 2 ABSTRACT MODELS
6 Overview
7 Functional model
    7.1 Primary functional objects
        7.1.1 The Message Handling System
        7.1.2 Users
        7.1.3 Distribution lists
    7.2 Secondary functional objects
        7.2.1 The Message Transfer System
        7.2.2 User Agents
        7.2.3 Message stores
        7.2.4 Access units
    7.3 Tertiary functional objects
        7.3.1 Message Transfer Agents
    7.4 Selected AU types
        7.4.1 Physical delivery
        7.4.2 Telematic
        7.4.3 Telex
8 Information model
    8.1 Messages
    8.2 Probes
    8.3 Reports
9 Operational model
    9.1 Transmittal
    9.2 Transmittal roles
    9.3 Transmittal steps
        9.3.1 Origination
        9.3.2 Submission
        9.3.3 Import
        9.3.4 Transfer
        9.3.5 Export
        9.3.6 Delivery
        9.3.7 Retrieval
        9.3.8 Receipt
    9.4 Transmittal events
        9.4.1 Splitting
        9.4.2 Joining
        9.4.3 Name resolution
        9.4.4 DL expansion
        9.4.5 Redirection
        9.4.6 Conversion
        9.4.7 Non-delivery
        9.4.8 Non-affirmation
        9.4.9 Affirmation
        9.4.10 Routing
10 Security model
    10.1 Security policies
    10.2 Security services
        10.2.1 Origin Authentication security services
        10.2.2 Secure Access Management security service
        10.2.3 Data Confidentiality security services
        10.2.4 Data Integrity security services
        10.2.5 Non-Repudiation security services
        10.2.6 Message Security Labelling security service
        10.2.7 Security management services
    10.3 Security elements
        10.3.1 Authentication security elements
        10.3.2 Secure Access Management security elements
        10.3.3 Data Confidentiality security elements
        10.3.4 Data Integrity security elements
        10.3.5 Non-Repudiation security elements
        10.3.6 Security Label security elements
        10.3.7 Security Management security elements
        10.3.8 Double Enveloping Technique
        10.3.9 Encoding for encryption and hashing
SECTION 3 CONFIGURATIONS
11 Overview
12 Functional configurations
    12.1 Regarding the Directory
    12.2 Regarding the Message Store
13 Physical configurations
    13.1 Messaging Systems
        13.1.1 Access Systems
        13.1.2 Storage Systems
        13.1.3 Access and Storage Systems
        13.1.4 Transfer Systems
        13.1.5 Access and Transfer Systems
        13.1.6 Storage and Transfer Systems
        13.1.7 Access, Storage, and Transfer Systems
    13.2 Representative Configurations
        13.2.1 Fully centralized
        13.2.2 Centralized Message Transfer and Storage
        13.2.3 Centralized Message Transfer
        13.2.4 Fully distributed
14 Organizational configurations
    14.1 Management domains
        14.1.1 Administration management domains
        14.1.2 Private management domains
    14.2 Representative configurations
        14.2.1 Fully centralized
        14.2.2 Directly connected
        14.2.3 Indirectly connected
15 The Global MHS
SECTION 4 NAMING, ADDRESSING, AND ROUTING
16 Overview
17 Naming
    17.1 Directory names
    17.2 OR-Names
18 Addressing
    18.1 Attribute lists
    18.2 Character sets
    18.3 Standard attributes
        18.3.1 Administration-domain-name
        18.3.2 Common-name
        18.3.3 Country-name
        18.3.4 Extension-postal-O/R-address-components
        18.3.5 Extension-physical-delivery-address-components
        18.3.6 Local-postal-attributes
        18.3.7 Network-address
        18.3.8 Numeric-user-identifier
        18.3.9 Organization-name
        18.3.10 Organizational-unit-names
        18.3.11 Pds-name
        18.3.12 Personal-name
        18.3.13 Physical-delivery-country-name
        18.3.14 Physical-delivery-office-name
        18.3.15 Physical-delivery-office-number
        18.3.16 Physical-delivery-organization-name
        18.3.17 Physical-delivery-personal-name
        18.3.18 Post-office-box-address
        18.3.19 Postal-code
        18.3.20 Poste-restante-address
        18.3.21 Private-domain-name
        18.3.22 Street-address
        18.3.23 Terminal-identifier
        18.3.24 Terminal-type
        18.3.25 Unformatted-postal-address
        18.3.26 Unique-postal-name
    18.4 Attribute list equivalence
    18.5 OR-Address Forms
        18.5.1 Mnemonic OR-address
        18.5.2 Numeric OR-address
        18.5.3 Postal OR-address
        18.5.4 Terminal OR-address
        18.5.5 Determination of address forms
    18.6 Conditional attributes
19 Routing
SECTION 5 USE OF THE DIRECTORY
20 Overview
21 Authentication
22 Name resolution
23 DL expansion
24 Capability assessment
SECTION 6 OSI REALIZATION
25 Overview
26 Application service elements
    26.1 The ASE concept
    26.2 Symmetric and Asymmetric ASEs
    26.3 Message Handling ASEs
        26.3.1 Message Transfer
        26.3.2 Message Submission
        26.3.3 Message Delivery
        26.3.4 Message Retrieval
        26.3.5 Message Administration
    26.4 Supporting ASEs
        26.4.1 Remote Operations
        26.4.2 Reliable Transfer
        26.4.3 Association Control
27 Application contexts
SECTION 7 ABSTRACT SERVICE DEFINITION CONVENTIONS
28 Overview
29 Components of the Abstract model
    29.1 Abstract objects
    29.2 Abstract contracts
    29.3 Connection packages
    29.4 Abstract ports
    29.5 Abstract operations and Abstract errors
30 ROS realization
Annex A Directory object classes and attributes
A.1 Object classes
A.1.1 MHS Distribution List
A.1.2 MHS Message Store
A.1.3 MHS Message Transfer Agent
A.1.4 MHS User
A.1.5 MHS User Agent
A.2 Attributes
A.2.1 MHS Acceptable EITs
A.2.2 MHS Deliverable Classes
A.2.3 MHS Deliverable Content Types
A.2.4 MHS DL Archive Service
A.2.5 MHS DL Members
A.2.6 MHS DL Policy
A.2.7 MHS DL Related Lists
A.2.8 MHS DL Submit Permissions
A.2.9 MHS DL Subscription Service
A.2.10 MHS Exclusively Acceptable EITs
A.2.11 MHS Maximum Content Length
A.2.12 MHS Message Store Directory Name
A.2.13 MHS OR-Addresses
A.2.14 MHS OR-Addresses with Capabilities
A.2.15 MHS Supported Attributes
A.2.16 MHS Supported Automatic Actions
A.2.17 MHS Supported Content Types
A.2.18 MHS Supported Matching Rules
A.2.19 MHS Unacceptable EITs
A.3 Attribute syntaxes
A.3.1 DL Submit Permission
A.3.2 DL Policy
A.3.3 OR-Address
A.3.4 OR-Address with Capabilities
A.3.5 OR-Name
Annex B Reference Definition of Object Identifiers
Annex C Reference Definition of Directory object classes and attributes
Annex D Security threats
D.1 Masquerade
D.2 Message sequencing
D.3 Modification of information
D.4 Denial of service
D.5 Repudiation
D.6 Leakage of Information
D.7 Other threats
Annex E Provision of security services in ITU-T Rec. X.411 | ISO/IEC 10021-4
Annex F Representation of OR-addresses for human usage
F.1 Purpose
F.2 Scope
F.3 Format
F.3.1 General
F.3.2 Labelled format
F.3.3 Self-explanatory format
F.4 User interface
F.4.1 Examples of application
Annex G Use of OR-addresses by multinational organizations
G.1 Addressing principles
G.2 Example configurations
G.2.1 Multiple independent PRMDs
G.2.2 A single PRMD, named from a "home" country
G.2.3 A single PRMD with multiple country and domain names
G.3 Alias OR-addresses
Annex H Differences between ISO/IEC 10021-2 and ITU-T Rec. X.402
Annex I Summary of changes to previous editions
I.1 Differences between ISO/IEC 10021-2:1990 and CCITT Rec. X.402 (1992)
I.2 Differences between CCITT Rec. X.402 (1992) and ITU-T Rec. X.402 (1995) | ISO/IEC 10021-2:1996