Email client

From Wikipedia, the free encyclopedia
  (Redirected from E-mail client)
Jump to: navigation, search
Mozilla Thunderbird email client user interface on a GNU/Linux operating system

An email client, email reader, or more formally mail user agent (MUA), is a computer program used to access and manage a user's email.

The term can refer to any system capable of accessing the user's email mailbox, regardless of it being a mail user agent, a relaying server, or a human typing on a terminal.[contradiction] In addition, a web application that provides message management, composition, and reception functions is sometimes also considered an email client, but more commonly referred to as webmail.

Popular locally installed email clients include Microsoft Outlook, IBM Lotus Notes, Pegasus Mail, Mozilla's Thunderbird, The Bat!, Eudora, KMail in the Kontact suite, Evolution and Apple Inc.'s Mail.

Popular web-based email clients include: Gmail, Lycos Mail, Mail.com, Outlook.com and Yahoo! Mail.

Retrieving messages from a mailbox[edit]

Like most client programs, an email client is only active when a user runs it. The most common arrangement is for an email user (the client) to make an arrangement with a remote Mail Transfer Agent (MTA) server for the receipt and storage of the client's emails. The MTA, using a suitable mail delivery agent (MDA), adds email messages to a client's storage as they arrive. The remote mail storage is referred to as the user's mailbox. The default setting on many Unix systems is for the mail server to store formatted messages in mbox, within the user's HOME directory. Of course, users of the system can log-in and run a mail client on the same computer that hosts their mailboxes; in which case, the server is not actually remote, other than in a generic sense.

Emails are stored in the user's mailbox on the remote server until the user's email client requests them to be downloaded to the user's computer, or can otherwise access the user's mailbox on the possibly remote server. The email client can be set up to connect to multiple mailboxes at the same time and to request the download of emails either automatically, such as at pre-set intervals, or the request can be manually initiated by the user.

A user's mailbox can be accessed in two dedicated ways. The Post Office Protocol (POP) allows the user to download messages one at a time and only deletes them from the server after they have been successfully saved on local storage. It is possible to leave messages on the server to permit another client to access them. However, there is no provision for flagging a specific message as seen, answered, or forwarded, thus POP is not convenient for users who access the same mail from different machines.

Alternatively, the Internet Message Access Protocol (IMAP) allows users to keep messages on the server, flagging them as appropriate. IMAP provides folders and sub-folders, which can be shared among different users with possibly different access rights. Typically, the Sent, Drafts, and Trash folders are created by default. IMAP features an idle extension for real time updates, providing faster notification than polling, where long lasting connections are feasible. See also the remote messages section below.

In addition, the mailbox storage can be accessed directly by programs running on the server or via shared disks. Direct access can be more efficient but is less portable as it depends on the mailbox format; it is used by some email clients, including some webmail applications.

Message composition[edit]

Email clients usually contain user interfaces to display and edit text. Some applications permit the use of a program-external editor.

The email clients will perform formatting according to RFC 5322 for headers and body, and MIME for non-textual content and attachments. Headers include the destination fields, To, Cc, and Bcc, and the originator fields From which is the message's author(s), Sender in case there are more authors, and Reply-To in case responses should be addressed to a different mailbox. To better assist the user with destination fields, many clients maintain one or more address books and/or are able to connect to an LDAP directory server. For originator fields, clients may support different identities.

Client settings require the user's real name and email address for each user's identity, and possibly a list of LDAP servers.

Submitting messages to a server[edit]

When a user wishes to create and send an email, the email client will handle the task. The email client is usually set up automatically to connect to the user's mail server, which is typically either an MSA or an MTA, two variations of the SMTP protocol. The email client which uses the SMTP protocol creates an authentication extension, which the mail server uses to authenticate the sender. This method eases modularity and nomadic computing. The older method was for the mail server to recognize the client's IP address, e.g. because the client is on the same machine and uses internal address 127.0.0.1, or because the client's IP address is controlled by the same internet service provider that provides both internet access and mail services.

Client settings require the name or IP address of the preferred outgoing mail server, the port number (25 for MTA, 587 for MSA), and the user name and password for the authentication, if any. There is a non-standard port 465 for SSL encrypted SMTP sessions, that many clients and servers support for backward compatibility.

Encryption[edit]

With no encryption, much like for postcards, email activity is plainly visible by any occasional eavesdropper. Email encryption enables privacy to be safeguarded by encrypting the mail sessions, the body of the message, or both. Without it, anyone with network access and the right tools can monitor email and obtain login passwords. Examples of concern include the government censorship and surveillance and fellow wireless network users such as at an Internet cafe.

Encryption of mail sessions[edit]

All relevant email protocols have an option to encrypt the whole session, to prevent a user's name and password from being sniffed. They are strongly suggested for nomadic users and whenever the internet access provider is not trusted.[1] When sending mail, users can only control encryption at the first hop from a client to its configured outgoing mail server. At any further hop, messages may be transmitted with or without encryption, depending solely on the general configuration of the transmitting server and the capabilities of the receiving one.

Encrypted mail sessions deliver messages in their original format, i.e. plain text or encrypted body, on a user's local mailbox and on the destination server's. The latter server is operated by an email hosting service provider, possibly a different entity than the internet access provider currently at hand.

Encryption of the message body[edit]

There are two models for managing cryptographic keys. S/MIME employs a model based on a trusted certificate authority (CA) that signs users' public keys. OpenPGP employs a somewhat more flexible web of trust mechanism that allows users to sign one another's public keys. OpenPGP is also more flexible in the format of the messages, in that it still supports plain message encryption and signing as they used to work before MIME standardization.

In both cases, only the message body is encrypted. Header fields, including originator, recipients, and subject, remain in plain text.

Webmail[edit]

In addition to the fat client email clients and small email clients, there are also Web-based email applications called webmail. Webmail has several advantages, including an ability to send and receive email away from the user's normal base using a web browser, thus eliminating the need for an email client.

Some websites are dedicated to providing email services, including AOL, Gmail, Outlook.com and Yahoo; but there are many internet service providers which provide webmail services as part of their internet service package. The main limitations of webmail are that user interactions are subject to the website's operating system and the general inability to download email messages and compose or work on the messages offline, although Gmail does offer Offline Gmail through the installation of a Google Chrome extension and there are also other tools[2] to integrate parts of the webmail functionality into the OS (e.g. creating messages directly from third party applications via MAPI).

Like MAPI, webmail provides for email messages to remain on the mail server. See next section.

Remote messages[edit]

POP3 has an option to leave messages on the server, but it doesn't work very well. By contrast, both IMAP and webmail provide for keeping messages on the server as their method of operating, albeit users can make local copies as they like. Keeping messages on the server has advantages and disadvantages.[3]

Advantages[edit]

  • Messages can be accessed from various computers or mobile devices at different locations, using different clients.
  • Some kind of backup is usually provided by the server.

Disadvantages[edit]

  • With limited bandwidth, access to long messages can be lengthy, unless the client keeps a local cache.
  • There may be privacy concerns, since messages staying on the server at all times have more chances to be casually accessed by IT personnel, unless end-to-end encryption is used.

Protocols[edit]

While popular protocols for retrieving mail include POP3 and IMAP4, sending mail is usually done using the SMTP protocol.

Another important standard supported by most email clients is MIME, which is used to send binary file email attachments. Attachments are files that are not part of the email proper, but are sent with the email.

Most email clients use a User-Agent[4] header field to identify the software used to send the message. According to RFC 2076, this is a common but non-standard header field.

RFC 6409, Message Submission for Mail, details the role of the Mail submission agent.

RFC 5068, Email Submission Operations: Access and Accountability Requirements, provides a survey of the concepts of MTA, MSA, MDA, and MUA. It mentions that "Access Providers MUST NOT block users from accessing the external Internet using the SUBMISSION port 587" and that "MUAs SHOULD use the SUBMISSION port for message submission."

Port numbers[edit]

Email servers and clients by convention use the TCP port numbers in the following table. For MSA, IMAP and POP3, the table reports also the labels that a client can use to query the SRV records and discover both the host name and the port number of the corresponding service.[5]

protocol use plain text or
encrypt sessions
plain text
sessions only
encrypt sessions
only
POP3 incoming mail 110
_pop3._tcp
995
_pop3s._tcp
IMAP4 incoming mail 143
_imap._tcp
993
_imaps._tcp
SMTP outgoing mail 25 (unofficial)[6] 465
MSA outgoing mail 587
_submission._tcp
HTTP webmail 80 443

Note that while webmail obeys the earlier HTTP disposition of having separate ports for encrypt and plain text sessions, mail protocols use the STARTTLS technique, thereby allowing encryption to start on an already established TCP connection. RFC 2595 discourages the use of the previously established ports 995 and 993 and promotes the use of a single port for POP, IMAP and SMTP while using TLS when available.

Proprietary client protocols[edit]

Microsoft mail systems define the proprietary Messaging Application Programming Interface (MAPI) that is used in client applications, such as Microsoft Outlook, to access Microsoft Exchange electronic mail servers.

History[edit]

See Partridge[7] for early history of email clients. Email clients pre-date networks, with early email providing only local delivery on mainframe computers in the 1960s.

See also[edit]

Notes[edit]

[8]

References[edit]

  1. ^ C. Hutzler; D. Crocker; P. Resnick; E. Allman; T. Finch (November 2007). "Email Submission Operations: Access and Accountability Requirements". Best Current Practice. IETF. Retrieved 24 August 2011. "This document does not provide recommendations on specific security implementations. It simply provides a warning that transmitting user credentials in clear text over insecure networks SHOULD be avoided in all scenarios as this could allow attackers to listen for this traffic and steal account data. In these cases, it is strongly suggested that an appropriate security technology MUST be used." 
  2. ^ MAPI4Webmail, Affixa
  3. ^ "Is IMAP Right for Me?". IT Services. Stanford University. 4 March 2010. Retrieved 14 April 2013. 
  4. ^ "User-Agent". Netnews Article Format. IETF. November 2009. sec. 3.2.13. RFC 5536. https://tools.ietf.org/html/rfc5536#section-3.2.13. "Some of this information has previously been sent in non-standardized header fields such as X-Newsreader, X-Mailer, X-Posting-Agent, X-Http-User-Agent, and others"
  5. ^ Cyrus Daboo (March 2011). Use of SRV Records for Locating Email Submission/Access Services. IETF. RFC 6186. https://tools.ietf.org/html/rfc6186. Retrieved 17 April 2013.
  6. ^ "PORT NUMBERS". IANA. 2010-01-15. Retrieved 2010-01-16. "urd 465/tcp URL Rendesvous Directory for SSM" 
  7. ^ Partridge, Craig (April–June 2008). "The Technical Development of Internet Email" (PDF). IEEE Annals of the History of Computing (Berlin: IEEE Computer Society) 30 (2): 3–29. ISSN 1934-1547. 
  8. ^ List of Best Emails Clients for Windows in 2014

External links[edit]

  1. Best Email Clients for Windows
  2. Email Clients for Desktop in 2014
  3. Email Clients for MAC OS X