Jump to content

Mail retrieval agent

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Citation bot (talk | contribs) at 03:35, 30 September 2020 (Alter: url. URLs might have been internationalized/anonymized. Add: isbn. | You can use this bot yourself. Report bugs here. | Suggested by AManWithNoPlan | All pages linked from cached copy of User:AManWithNoPlan/sandbox2 | via #UCB_webform_linked). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

A mail retrieval agent (MRA) is a computer application that retrieves or fetches e-mail from a remote mail server and works with a mail delivery agent to deliver mail to a local or remote email mailbox.[citation needed] MRAs may be external applications by themselves or be built into a bigger application like an MUA. Significant examples of standalone MRAs include fetchmail and getmail.[1][user-generated source]

The concept of an MRA is not standardized in email architecture. Although they operate like mail transfer agents, MRAs are technically clients when they retrieve and submit messages.

Delivery mechanisms

The mail retrieval agent may support delivery of retrieved mail via the following mechanisms:

  • Via a mail transport agent (Listening for SMTP transfers on port 25)
  • Via a mail delivery agent
  • Direct delivery to an mbox formatted mailbox
  • Direct delivery to a maildir directory
  • Output to standard output

Multiple mailbox support

The mail retriever agent may support retrieval of mail from multiple mailboxes simultaneously. This enables a mailserver to have a centrally configured mail retriever agent that runs against a dedicated mail system account and collects the mail for all users in a single invocation, rather than having the cron run the mail retriever agent against each mail recipients user account.

See also

References

Bibliography

  • Faircloth, Jeremy (25 Nov 2013). Enterprise Applications Administration: The Definitive Guide to Implementation and Operations. Newnes. ISBN 9780124078871. {{cite book}}: Invalid |ref=harv (help)
  • EC-Council (20 Dec 2012). Network Defense: Security and Vulnerability Assessment. Cengage Learning. ISBN 978-1435483590. {{cite book}}: Invalid |ref=harv (help)
  • Vakali, Athena (30 Sep 2006). Web Data Management Practices: Emerging Techniques and Technologies. Idea Group Inc (IGI). ISBN 9781599042305. {{cite book}}: Invalid |ref=harv (help)
  • McBee, Jim (26 Jan 2009). Mastering Microsoft Exchange Server 2007 SP1. John Wiley & Sons. ISBN 9780470478141. {{cite book}}: Invalid |ref=harv (help)