SECTION 1 – INTRODUCTION
1 Scope
2 Normative
references
2.1 Open Systems Interconnection
2.2 Directory Systems
2.3 Message Handling Systems
2.4 Country Codes
2.5 Network Addresses
2.6 Language Code
2.7 Character Sets
3 Definitions
3.1 Open Systems Interconnection
3.2 Directory Systems
3.3 Message Handling Systems
4 Abbreviations
5 Conventions
5.1 ASN.1
5.2 Grade
5.3 Terms
SECTION 2
– ABSTRACT MODELS
6 Overview
7 Functional
Model
7.1 Primary Functional Objects
7.1.1 The Message Handling System
7.1.2 Users
7.1.3 Distribution Lists
7.2 Secondary Functional Objects
7.2.1 The Message Transfer System
7.2.2 User Agents
7.2.3 Message Stores
7.2.4 Access Units
7.3 Tertiary Functional Objects
7.3.1 Message Transfer Agents
7.4 Selected AU Types
7.4.1 Physical Delivery
7.4.2 Telematic
7.4.3 Telex
8 Information
Model
8.1 Messages
8.2 Probes
8.3 Reports
9 Operational
Model
9.1 Transmittal
9.2 Transmittal Roles
9.3 Transmittal Steps
9.3.1 Origination
9.3.2 Submission
9.3.3 Import
9.3.4 Transfer
9.3.5 Export
9.3.6 Delivery
9.3.7 Retrieval
9.3.8 Receipt
9.4 Transmittal Events
9.4.1 Splitting
9.4.2 Joining
9.4.3 Name Resolution
9.4.4 DL Expansion
9.4.5 Redirection
9.4.6 Conversion
9.4.7 Non-delivery
9.4.8 Non-affirmation
9.4.9 Affirmation
9.4.10 Routing
10 Security Model
10.1 Security Policies
10.2 Security Services
10.2.1 Origin Authentication Security
Services
10.2.2 Secure Access Management Security
Service
10.2.3 Data
Confidentiality Security Services
10.2.4 Data Integrity Security Services
10.2.5 Non-Repudiation Security Services
10.2.6 Message Security Labelling
Security Service
10.2.7 Security Management Services
10.3 Security Elements
10.3.1 Authentication Security Elements
10.3.2 Secure Access Management Security
Elements
10.3.3 Data Confidentiality Security
Elements
10.3.4 Data Integrity Security Elements
10.3.5 Non-repudiation Security Elements
10.3.6 Security Label Security Elements
10.3.7 Security
Management Security Elements
10.3.8 Double Enveloping Technique
10.3.9 Encoding for Encryption and
Hashing
SECTION 3
– CONFIGURATIONS
11 Overview
12 Functional Configurations
12.1 Regarding the Directory
12.2 Regarding the Message Store
13 Physical
Configurations
13.1 Messaging Systems
13.1.1 Access Systems
13.1.2 Storage Systems
13.1.3 Access
and Storage Systems
13.1.4 Transfer Systems
13.1.5 Access and Transfer Systems
13.1.6 Storage and Transfer Systems
13.1.7 Access, Storage, and Transfer
Systems
13.2 Representative Configurations
13.2.1 Fully Centralized
13.2.2 Centralized Message Transfer and
Storage
13.2.3 Centralized Message Transfer
13.2.4 Fully Distributed
14 Organizational
Configurations
14.1 Management Domains
14.1.1 Administration Management Domains
14.1.2 Private Management Domains
14.2 Representative Configurations
14.2.1 Fully Centralized
14.2.2 Directly Connected
14.2.3 Indirectly Connected
15 The Global MHS
SECTION 4
– NAMING, ADDRESSING,
AND ROUTING
16 Overview
17 Naming
17.1 Directory Names
17.2 OR‑Names
18 Addressing
18.1 Attribute Lists
18.2 Character Sets
18.3 Standard Attributes
18.3.1 Administration-domain-name
18.3.2 Common-name
18.3.3 Country-name
18.3.4 Extension-postal-OR-address-components
18.3.5 Extension-physical-delivery-address-components
18.3.6 Local-postal-attributes
18.3.7 Network-address
18.3.8 Numeric-user-identifier
18.3.9 Organization-name
18.3.10 Organizational-unit-names
18.3.11 Pds-name
18.3.12 Personal-name
18.3.13 Physical-delivery-country-name
18.3.14 Physical-delivery-office-name
18.3.15 Physical-delivery-office-number
18.3.16 Physical-delivery-organization-name
18.3.17 Physical-delivery-personal-name
18.3.18 Post-office-box-address
18.3.19 Postal-code
18.3.20 Poste-restante-address
18.3.21 Private-domain-name
18.3.22 Street-address
18.3.23 Terminal-identifier
18.3.24 Terminal-type
18.3.25 Unformatted-postal-address
18.3.26 Unique-postal-name
18.4 Attribute List Equivalence
18.5 OR‑Address Forms
18.5.1 Mnemonic OR‑Address
18.5.2 Numeric
OR‑Address
18.5.3 Postal OR‑Address
18.5.4 Terminal OR‑Address
18.5.5 Determination of Address Forms
18.6 Conditional Attributes
19 Routing
SECTION 5
– USE OF THE DIRECTORY
20 Overview
21 Authentication
22 Name Resolution
23 DL Expansion
24 Capability Assessment
SECTION 6
– OSI REALIZATION
25 Overview
26 Application Service
Elements
26.1 The ASE
Concept
26.2 Symmetric and Asymmetric ASEs
26.3 Message Handling ASEs
26.3.1 Message Transfer
26.3.2 Message Submission
26.3.3 Message Delivery
26.3.4 Message
Retrieval
26.3.5 Message Administration
26.4 Supporting ASEs
26.4.1 Remote Operations
26.4.2 Reliable Transfer
26.4.3 Association Control
27 Application Contexts
SECTION 7
– ABSTRACT SERVICE
DEFINITION CONVENTIONS
28 Overview
29 Components of the
Abstract Model
29.1 Abstract Objects
29.2 Abstract Contracts
29.3 Connection Packages
29.4 Abstract Ports
29.5 Abstract Operations and Abstract Errors
30 ROS Realization
Annex A – Directory Object Classes and Attributes
A.1 Object Classes
A.1.1 MHS Distribution List
A.1.2 MHS Message Store
A.1.3 MHS Message Transfer Agent
A.1.4 MHS User
A.1.5 MHS User Agent
A.2 Attributes
A.2.1 MHS Acceptable EITs
A.2.2 MHS Deliverable Classes
A.2.3 MHS Deliverable Content Types
A.2.4 MHS DL Archive Service
A.2.5 MHS DL Members
A.2.6 MHS DL Policy
A.2.7 MHS DL Related Lists
A.2.8 MHS DL Submit Permissions
A.2.9 MHS DL Subscription Service
A.2.10 MHS Exclusively Acceptable EITs
A.2.11 MHS
Maximum Content Length
A.2.12 MHS Message Store Directory Name
A.2.13 MHS OR‑Addresses
A.2.14 MHS OR‑Addresses with
Capabilities
A.2.15 MHS Supported Attributes
A.2.16 MHS Supported Automatic Actions
A.2.17 MHS Supported Content Types
A.2.18 MHS Supported Matching Rules
A.2.19 MHS Unacceptable EITs
A.3 Attribute Syntaxes
A.3.1 DL Submit Permission
A.3.2 DL Policy
A.3.3 OR‑Address
A.3.4 OR‑Address with Capabilities
A.3.5 OR‑Name
A.4 Contexts
A.4.1 DL Administrator Annotation
A.4.2 DL Nested DL
A.4.3 DL Reset Originator
A.5 Certificate Subject Alternative Names
A.5.1 MTA Name
Annex B – Reference Definition of Object Identifiers
Annex C – Reference Definition of Directory Object Classes and
Attributes
Annex D – Security Threats
D.1 Masquerade
D.2 Message Sequencing
D.3 Modification of Information
D.4 Denial of Service
D.5 Repudiation
D.6 Leakage of Information
D.7 Other Threats
Annex E – Provision of Security
Services in ITU‑T Rec. X.411 | ISO/IEC 10021‑4
Annex F – Representation of OR‑Addresses
for Human Usage
F.1 Purpose
F.2 Scope
F.3 Format
F.3.1 General
F.3.2 Labelled format
F.3.3 Self-explanatory format
F.4 User Interface
Annex G – Use of OR‑Addresses
by Multinational Organizations
G.1 Addressing principles
G.2 Example configurations
G.2.1 Multiple Independent PRMDs
G.2.2 A single PRMD, named from a
"home" country
G.2.3 A single PRMD with multiple
country and domain names
G.3 Alias OR‑addresses
Annex H – Use of Protected
Passwords for Message Store Access
Annex I – Differences Between
ISO/IEC 10021‑2 and ITU‑T Rec. X.402
Annex J – Summary of Changes to
Previous Editions
J.1 Differences between ISO/IEC 10021‑2:1990
and CCITT Rec. X.402 (1992)
J.2 Differences between CCITT Rec. X.402 (1992)
and ITU‑T Rec. X.402 (1995) | ISO/IEC 10021‑2:1996
J.3 Differences between ITU‑T Rec. X.402
(1995) | ISO/IEC 10021‑2:1996 and ITU‑T Rec. X.402 (1999) | ISO/IEC
10021‑2:1999
Annex K – Index