CONTENTS

SECTION  1  –  INTRODUCTION    
 1     Scope 
 2     Normative references 
        2.1     Open Systems Interconnection 
        2.2     Directory Systems 
        2.3     Message Handling Systems 
        2.4     Country Codes 
        2.5     Network Addresses 
        2.6     Language Code 
        2.7     Character Sets 
 3     Definitions 
        3.1     Open Systems Interconnection 
        3.2     Directory Systems 
        3.3     Message Handling Systems 
 4     Abbreviations 
 5     Conventions 
        5.1     ASN.1 
        5.2     Grade 
        5.3     Terms 
SECTION  2  –  ABSTRACT  MODELS    
 6     Overview  
 7     Functional Model
        7.1     Primary Functional Objects 
                  7.1.1     The Message Handling System  
                  7.1.2     Users 
                  7.1.3     Distribution Lists 
        7.2     Secondary Functional Objects 
                  7.2.1     The Message Transfer System  
                  7.2.2     User Agents 
                  7.2.3     Message Stores 
                  7.2.4     Access Units 
        7.3     Tertiary Functional Objects 
                  7.3.1     Message Transfer Agents 
        7.4     Selected AU Types 
                  7.4.1     Physical Delivery 
                  7.4.2     Telematic 
                  7.4.3     Telex 
 8     Information Model
        8.1     Messages 
        8.2     Probes 
        8.3     Reports 
 9     Operational Model
        9.1     Transmittal
        9.2     Transmittal Roles 
        9.3     Transmittal Steps 
                  9.3.1     Origination 
                  9.3.2     Submission 
                  9.3.3     Import
                  9.3.4     Transfer
                  9.3.5     Export
                  9.3.6     Delivery 
                  9.3.7     Retrieval
                  9.3.8     Receipt
        9.4     Transmittal Events 
                  9.4.1     Splitting 
                  9.4.2     Joining 
                  9.4.3     Name Resolution 
                  9.4.4     DL Expansion 
                  9.4.5     Redirection 
                  9.4.6     Conversion 
                  9.4.7     Non-delivery 
                  9.4.8     Non-affirmation 
                  9.4.9     Affirmation 
                  9.4.10     Routing   
10     Security Model
       10.1     Security Policies 
       10.2     Security Services 
                  10.2.1     Origin Authentication Security Services 
                  10.2.2     Secure Access Management Security Service 
                  10.2.3     Data Confidentiality Security Services 
                  10.2.4     Data Integrity Security Services 
                  10.2.5     Non-Repudiation Security Services 
                  10.2.6     Message Security Labelling Security Service 
                  10.2.7     Security Management Services 
       10.3     Security Elements 
                  10.3.1     Authentication Security Elements 
                  10.3.2     Secure Access Management Security Elements 
                  10.3.3     Data Confidentiality Security Elements 
                  10.3.4     Data Integrity Security Elements 
                  10.3.5     Non-repudiation Security Elements 
                  10.3.6     Security Label Security Elements 
                  10.3.7     Security Management Security Elements 
                  10.3.8     Double Enveloping Technique 
                  10.3.9     Encoding for Encryption and Hashing 
SECTION  3  –  CONFIGURATIONS    
11     Overview  
12     Functional Configurations 
       12.1     Regarding the Directory 
       12.2     Regarding the Message Store 
13     Physical Configurations 
       13.1     Messaging Systems 
                  13.1.1     Access Systems 
                  13.1.2     Storage Systems 
                  13.1.3     Access and Storage Systems 
                  13.1.4     Transfer Systems 
                  13.1.5     Access and Transfer Systems 
                  13.1.6     Storage and Transfer Systems 
                  13.1.7     Access, Storage, and Transfer Systems 
       13.2     Representative Configurations 
                  13.2.1     Fully Centralized 
                  13.2.2     Centralized Message Transfer and Storage 
                  13.2.3     Centralized Message Transfer
                  13.2.4     Fully Distributed 
14     Organizational Configurations 
       14.1     Management Domains 
                  14.1.1     Administration Management Domains 
                  14.1.2     Private Management Domains 
       14.2     Representative Configurations 
                  14.2.1     Fully Centralized 
                  14.2.2     Directly Connected 
                  14.2.3     Indirectly Connected 
15     The Global MHS 
SECTION  4  –  NAMING,  ADDRESSING,  AND  ROUTING    
16     Overview  
17     Naming 
       17.1     Directory Names 
       17.2     OR‑Names 
18     Addressing 
       18.1     Attribute Lists 
       18.2     Character Sets 
       18.3     Standard Attributes 
                  18.3.1     Administration-domain-name 
                  18.3.2     Common-name 
                  18.3.3     Country-name 
                  18.3.4     Extension-postal-OR-address-components 
                  18.3.5     Extension-physical-delivery-address-components 
                  18.3.6     Local-postal-attributes 
                  18.3.7     Network-address 
                  18.3.8     Numeric-user-identifier
                  18.3.9     Organization-name 
                  18.3.10     Organizational-unit-names 
                  18.3.11     Pds-name   
                  18.3.12     Personal-name 
                  18.3.13     Physical-delivery-country-name 
                  18.3.14     Physical-delivery-office-name 
                  18.3.15     Physical-delivery-office-number
                  18.3.16     Physical-delivery-organization-name 
                  18.3.17     Physical-delivery-personal-name 
                  18.3.18     Post-office-box-address 
                  18.3.19     Postal-code 
                  18.3.20     Poste-restante-address 
                  18.3.21     Private-domain-name 
                  18.3.22     Street-address 
                  18.3.23     Terminal-identifier
                  18.3.24     Terminal-type 
                  18.3.25     Unformatted-postal-address 
                  18.3.26     Unique-postal-name 
       18.4     Attribute List Equivalence 
       18.5     OR‑Address Forms 
                  18.5.1     Mnemonic OR‑Address 
                  18.5.2     Numeric OR‑Address 
                  18.5.3     Postal OR‑Address 
                  18.5.4     Terminal OR‑Address 
                  18.5.5     Determination of Address Forms 
       18.6     Conditional Attributes 
19     Routing 
SECTION  5  –  USE  OF  THE  DIRECTORY    
20     Overview  
21     Authentication 
22     Name Resolution 
23     DL Expansion 
24     Capability Assessment
SECTION  6  –  OSI  REALIZATION    
25     Overview  
26     Application Service Elements 
       26.1    The ASE Concept
       26.2     Symmetric and Asymmetric ASEs 
       26.3     Message Handling ASEs 
                  26.3.1     Message Transfer
                  26.3.2     Message Submission 
                  26.3.3     Message Delivery 
                  26.3.4     Message Retrieval
                  26.3.5     Message Administration 
       26.4     Supporting ASEs 
                  26.4.1     Remote Operations 
                  26.4.2     Reliable Transfer
                  26.4.3     Association Control
27     Application Contexts 
SECTION  7  –  ABSTRACT  SERVICE  DEFINITION  CONVENTIONS    
28     Overview  
29     Components of the Abstract Model
       29.1     Abstract Objects 
       29.2     Abstract Contracts 
       29.3     Connection Packages 
       29.4     Abstract Ports 
       29.5     Abstract Operations and Abstract Errors 
30     ROS Realization 
Annex  A – Directory Object Classes and Attributes    
        A.1     Object Classes 
                  A.1.1     MHS Distribution List
                  A.1.2     MHS Message Store 
                  A.1.3     MHS Message Transfer Agent
                  A.1.4     MHS User
                  A.1.5     MHS User Agent
        A.2     Attributes 
                  A.2.1     MHS Acceptable EITs 
                  A.2.2     MHS Deliverable Classes 
                  A.2.3     MHS Deliverable Content Types 
                  A.2.4     MHS DL Archive Service 
                  A.2.5     MHS DL Members 
                  A.2.6     MHS DL Policy 
                  A.2.7     MHS DL Related Lists 
                  A.2.8     MHS DL Submit Permissions 
                  A.2.9     MHS DL Subscription Service 
                  A.2.10     MHS Exclusively Acceptable EITs 
                  A.2.11     MHS Maximum Content Length 
                  A.2.12     MHS Message Store Directory Name 
                  A.2.13     MHS OR‑Addresses 
                  A.2.14     MHS OR‑Addresses with Capabilities 
                  A.2.15     MHS Supported Attributes 
                  A.2.16     MHS Supported Automatic Actions 
                  A.2.17     MHS Supported Content Types 
                  A.2.18     MHS Supported Matching Rules 
                  A.2.19     MHS Unacceptable EITs 
        A.3     Attribute Syntaxes 
                  A.3.1     DL Submit Permission 
                  A.3.2     DL Policy 
                  A.3.3     OR‑Address 
                  A.3.4     OR‑Address with Capabilities 
                  A.3.5     OR‑Name 
        A.4     Contexts 
                  A.4.1     DL Administrator Annotation 
                  A.4.2      DL Nested DL 
                  A.4.3     DL Reset Originator
        A.5     Certificate Subject Alternative Names 
                  A.5.1     MTA Name 
Annex  B – Reference Definition of Object Identifiers    
Annex  C – Reference Definition of Directory Object Classes and Attributes    
Annex  D – Security Threats    
        D.1     Masquerade 
        D.2     Message Sequencing 
        D.3     Modification of Information 
        D.4     Denial of Service 
        D.5     Repudiation 
        D.6     Leakage of Information 
        D.7     Other Threats 
Annex  E – Provision of Security Services in ITU‑T Rec. X.411 | ISO/IEC 10021‑4    
Annex  F – Representation of OR‑Addresses for Human Usage    
        F.1     Purpose 
        F.2     Scope 
        F.3     Format
                  F.3.1     General
                  F.3.2     Labelled format
                  F.3.3     Self-explanatory format
        F.4     User Interface 
Annex  G – Use of OR‑Addresses by Multinational Organizations    
        G.1     Addressing principles 
        G.2     Example configurations 
                  G.2.1     Multiple Independent PRMDs 
                  G.2.2     A single PRMD, named from a "home" country 
                  G.2.3     A single PRMD with multiple country and domain names 
        G.3     Alias OR‑addresses 
Annex  H – Use of Protected Passwords for Message Store Access    
Annex  I – Differences Between ISO/IEC 10021‑2 and ITU‑T Rec. X.402    
Annex  J – Summary of Changes to Previous Editions    
        J.1     Differences between ISO/IEC 10021‑2:1990 and CCITT Rec. X.402 (1992)
        J.2     Differences between CCITT Rec. X.402 (1992) and ITU‑T Rec. X.402 (1995) | ISO/IEC 10021‑2:1996 
        J.3     Differences between ITU‑T Rec. X.402 (1995) | ISO/IEC 10021‑2:1996 and ITU‑T Rec. X.402 (1999) | ISO/IEC 10021‑2:1999    
Annex  K – Index