1. 안전하게 제거하기 : 안전제거는 외부 저장장치에 사용되는 쓰기 캐쉬 버퍼에 남아있는 데이터를 위한 옵션임. 장치 관리자에서 디스크 드라이브에 해당 USB메모리의 속성창에서 정책탭에 있는 옵션중에서 빠른 제거를 위해 최적화를 선택하면 안전제거를 하지 않아도 되며, 성능을 위해 최적화를 선택하면 반드시 안전제거를 해야 한다.
2. USB의 종류 SLC : 메모리 셀 하나에 1bit를 저장하는 방식 속도는 빠르나 메모리당 담을 수 있는 용량이 적어 가격이 비싸다.
MLC : 메모리 셀 하나에 여러 bit를 저장하는 방식 속도는 느리지만 가격이 싸다.
3. 메모리 드라이크 아이콘 만들기 메모리 루트에 ico파일을 넣고 autorun.inf파일을 아래와 같이 루트에 생성한다.
서버 개체 오류 'ASP 0178 : 80070005' Server.CreateObject 액세스 오류 /DEXTUploadSamples/ProgressWithBanner/ProgressWithBanner.asp, 줄 12 사용권한을 확인하는 동안 Server.CreateObject를 호출하지 못했습니다.이개체에 액세스할수 없습니다.
2. 오류발생 원인 및 해결방법
- 이와같은 오류는 Visual Studio 6.0 서버시팩을 설치했을경우 필요한 dll 파일의 권한이 변경되어서 발생
하는 오류 입니다. DextSolution 사이트에 올라온 하기의 자료를 참조하시면 해결할수 있습니다.
[오류해결-참조자료] 내용 출처 : http://www.dextsolution.com/FAQ/FAQViewDetail.aspx?idx=22 제목 : Error 80070005 "Server.CreateObject Access" 제품 : DextUpload Pro 분류 : 컴포넌트 일반 [설명] DEXTUpload.dll과 msvbvm60.dll에 대해 IUSR_계정에 읽기와 실행권한이 주어져 있는지 확인하고
없으면 액세스 권한을 주어야 합니다. 여기서, msvbvm60.dll은 c:\winnt\system32 폴더에 있고, 권한을 주실때 IUSR_계정이 보통
Everyone, Authenticated user, Users 등 그룹계정에 포함되어 있기 때문에 이들 중 하나를 지정해
주어도 됩니다. 이 중에서 특히 msvbvm60.dll파일에 대한 액세스 권한 문제가 생기는 경우는, Windows 2000 서버에
Visual Studio 6.0 서비스팩 4를 설치했을 때입니다.
이는 서비스팩 4의 버그로서,단순히 msvbvm60.dll파일에 대해 위와같이 액세스 권한을 지정해 주기만
하면 문제를 해결할 수 있습니다. BUG: ASP Error 80070005 "Server.CreateObject Access" When You Create a Visual Basic Component ( http://support.microsoft.com/support/kb/articles/Q278/0/13.ASP?LN=EN-US&SD=SO&FR=1&qry=%28kbASP*%29%20and%20%28not%20kbfile%20and%20not%20kbhowto%20and%20not%20kbinfo% )
3. 웹 서핑 도중 ‘YES or NO’를 당신에게 묻는 창이 나타나면 ‘NO’라고 하는 습관을 기르자. ‘YES’ 몇 번 만에 사망한 컴퓨터를 만날지도 모른다.
4. 구입하는 부품에 딸려오는 매뉴얼과 설치 CD는 반드시 챙겨두자. 분실하면 나중에 친구가 도와주고 싶어도 난감해진다.
5. 새로 산 하드 디스크에 OS를 설치할 때는 반드시 파티션을 최소한 두 개 이상으로 나누자. 데이터는 OS가 없는 파티션에 따로 보관해야 한다.
6. 정전 후 부팅이 안 된다면? 정전이 될 경우 컴퓨터를 다시 켜면 분명히 작동하는 소리는 들리는데 화면에 아무것도 안 나올 때가 있다. 이럴 때는 파워 버튼을 누른 채 5초만 기다려보자. PC에 남은 전류를 완전히 방전해줘야만 제대로 켜지게 된다. BIOS 오류 메시지가 나올 경우도 있는데 이때는 메인 보드 매뉴얼에 따라 CMOS를 리셋해주면 된다.
7. 요즘 그래픽 카드를 살 때는 메인 보드가 AGP 슬롯인지 PCI-EXPRESS 슬롯인지 반드시 확인하고 이에 맞춰서 구입해야 한다.
8. 바탕화면에 세 줄 이상 아이콘을 깔아놓는다면 당신이 컴맹이라고 광고하는 꼴이다. 두 줄도 많다.
9. 노트북을 사용할 때 별도 마우스를 사용한다면 터치패드는 노트북 설정 프로그램에서 <사용 안 함>으로 설정해두는 게 좋다.
10. 원인을 알 수 없는 다운이 계속되면? 원인을 알 수 없는 리부팅은 파워 부족때문인 경우도 있다. 즉 파워 서플라이의 용량에 비해 지나치게 많은 주변 기기가 있다는 얘기다. 최근의 컴퓨터 경향으로 볼 때 3D 게임을 위해 조금 비싼 그래픽 카드를 달고 다운받은 자료 때문에 하드 디스크를 추가로 달았다면 350W 정도의 파워 서플라이를 달아야만 마음을 놓을 수 있다.
11. 매킨토시나 PC-9801이나 옛날의 MSX나 모두 다 PC다. 하지만 워낙 IBM Compatible PC가 압도적으로 대중적이다 보니 PC 하면 보통 IBM PC를 지칭한다. 만약 다른 개인용 컴퓨터들과 구별하여 말하려면 X86이라고 하면 된다.
12. 하드 디스크는 하나의 디스크가 아니라 몇 개의 디스크(플래터)로 이루어져 있다.
13. 왜 병렬 전송인 PATA가 직렬 전송인 SATA보다 느린가? 상식적으로 생각해볼 때 직렬보다는 병렬이 빨라야 한다. 하지만 최근 대세인 직렬 하드 디스크인 SATA 타입이 병렬 하드 디스크인 PATA보다 훨씬 빠르다. 그 이유는 양보다 질에 있다. 병렬 하드 디스크가 새총에 돌 여덟 개를 담아 발사하는 거라면 직렬 하드 디스크는 기관총으로 난사하는 거라고 보면 된다.
14. ODD에 광학 매체가 들어 있을 경우 부팅 시 엄청난 굉음이 들린다.
15. 최근의 대세를 따른다며 SATA 하드 디스크를 무조건 사지 말고 자기 메인 보드에서 지원해 주는지 먼저 확인하자.
16. 컴퓨터 부팅 시 ‘딸깍’거리는 소리가 나면 하드 디스크가 맛이 가기 시작했을 가능성이 높다.
17. 조각 모음을 빨리 하고 싶다면? 시만텍의 고스트를 사용하면 된다. 조각 모음을 하고 싶은 드라이브를 고스트로 통째로 백업한 후 다시 압축을 풀면 조각 모음이 완료된 상태로 압축이 풀린다.
18. 어둠의 경로에서 파일을 받았다면 반드시 nfo 파일을 메모장으로 열어보자. 모든 릴리스 정보가 들어 있다.
19. 컴퓨터가 저절로 꺼지고 켜진다면? 한때 RPC 에러가 유행했는데 RPC 메시지도 없이 저절로 꺼지고 켜지는 게 반복된다면 단순한 곳에서 원인을 찾는 게 빠르다. 바로 파워 버튼이 망가진 것이다. 의외로 많이 발생하는 일인데 수리 맡기는 게 귀찮다면 전원선을 잘라내서 필요할 때마다 선을 붙였다 떼는 방법도 있다. 영화에서 자동차 열쇠 없이 차에 시동 거는 것처럼 말이다.
20. 하드 디스크를 여러 개 사용한다면 보통의 납작 케이블 대신 라운드 케이블을 사용하는 것이 현명하다.
21. 정품, 벌크, 역수 정품은 말 그대로 정상적으로 출고된 제품이고, 벌크는 포장을 제외하고 안의 내용물만 유통되는 형태다. 주로 A/S 기간이 짧거나 유상 A/S 등으로 정품과 차별화 된다. 역수는 수출된 제품이 다시 국내로 수입된 걸 말하는데 특히 ODD에 많다. 따라서 정품과 같은 제품인데 가격은 역수가 더 싸다. 국내 소비자를 등쳐먹는 증거라고 할 만하다. 심지어 LG의 ODD 제품은 정품보다 A/S 기간이 긴 경우도 있다.
22. 메신저 서비스 창으로 계속 원치 않는 대출, 성인 광고가 나온다면 관리 도구의 서비스 관리에서 메신저 서비스를 중지시키자.
23. ALZ(알집 독자 압축 포맷), LCD(CD SPACE 독자 이미지 포맷)는 결코 네티즌에게 환영받지 못한다. 범용적인 ZIP과 ISO를 사용하자.
24. 인터넷 페이지가 늦게 열린다면? 인터넷에서 자료를 다운로드 받을 때는 빠르지만 웹사이트에 접속만 하면 느린 사람은 일차적으로 백신의 실시간 감시 기능을 꺼보자. 그래도 안 되면 모든 웹하드 서비스의 다운로드 프로그램도 꺼보자. 만약 온보드 랜을 사용한다면 CMOS에서 사용을 중지하고 값싼 리얼텍 랜카드로라도 달아보자. 순식간에 해결될 가능성이 높다.
25. 새로운 하드 디스크를 설치하고 포맷 할 때 마우스를 열나게 흔들어주면 총알같이 포맷된다.
26. 인터넷에서 마우스로 긁어온 글을 아래아 한글에 붙여넣기 할 때 웹페이지 형식이 아닌 텍스트로만 넣으려면 <환경 설정 ? 코드 형식 ? HTML 문서 붙이기 형식 지정>을 체크하고 텍스트 문서 붙이기를 선택하면 된다.
27. 익스플로러에서 인쇄할 때 페이지가 잘린다면? 먼저 http://www.visiontech.ltd.uk/software/download/IEPrint.htm 이 주소로 접속하여 ACTIVE X 컨트롤러를 설치하자. 그러면 익스플로러 도구 모음에 빨간 W 아이콘이 생기는데 이를 이용해서 인쇄 할 수 있다.
28. 윈도 XP에서 폴더별 보안 기능을 제대로 활용하려면 하드 디스크 포맷 시 반드시 NTFS를 선택해야 한다. 단, DOS로 부팅할 때 디스크가 안 보인다.
29. 부팅 시 자동 시작 프로그램이 많으면 부팅 속도가 현저히 느려지거나 다운될 수 있다. <시작 -> 설정>에서 Msconfig를 실행시켜 조절할 수 있다.
30. CD 레코더의 버퍼가 널뛰기를 해서 레코딩이 중단되거나 굽는 속도가 느려진다면 <시스템 ? 장치 관리자 ? IDE채널 ?고급 설정>을 선택한 후 레코더의 전송 모드를 DMA로 바꾸자.
31. 최근 중고 CRT 모니터의 가격은 19˝가 17˝보다 싸다. 공간에 제약을 받지 않는다면 구입의 적기다.
32. 빠른 속도나 높은 전력이 필요한 USB 기기는 컴퓨터 앞이나 위가 아닌 무조건 뒤에 접속해야 한다.
33. 마우스 오른쪽 버튼이 안 먹는다? 정보 유출을 우려해 제한을 두는 사이트가 많다. 간단한 방법은 Webma(왜임마)를 사용하면 된다. <도구 → 현재탭 보안 설정 → 현재페이지 마우스 제한 해제>를 선택하면 끝.
34. LCD 모니터를 살 때는 무조건 DVI 입력이 있는 모델로 사고 DVI 출력으로 연결하자.
35. 대한민국 어둠의 세계 중 양대 산맥은 짱공유닷컴과 맨살영화세상이다.
36. 회사에서는 고정 IP, 집에서는 유동 IP를 사용하는 노트북 유저는 대체 구성 항목에 별도로 IP를 설정해두자. 별다른 설정 없이 두 곳에서 인터넷을 사용할 수 있다.
37. 당신 집에 들어오는 인터넷 회선이 느리다면? 인터넷 익스플로러 말고도 웹브라우저는 많다. 파이어폭스라는 놈을 써보자. 이놈은 모뎀으로 인터넷을 해도 될 만큼 압도적인 속도를 자랑한다. 단! 인터넷 게임을 많이 하는 사람은 비추다. 다운로드 주소는 www.mozilla.or.kr
38. 최근의 그래픽 카드는 모두 듀얼 모니터를 지원한다. 아직도 안 써봤다면 모니터 값도 싸니 반드시 도전해보자.
39. 시스템을 새로 구성하면 OS를 깔자마자 반드시 제일 먼저 해당 메인 보드 칩셋을 패치하자. 메인 보드 제조사에서 제공하는 CD를 이용하면 된다.
40. 파일을 저장할 때는 일일이 내용을 기록하므로 느리지만 삭제는 파일은 그대로 놔두고 해당 주소만 삭제하므로 훨씬 빠르다.
41. 시스템 종료를 중단시키자! 하던 작업을 제대로 마무리 안 했는데 깜빡 잊고 종료를 했다해도 중간에 중지할 수 있다. 바탕화면에 우클릭 후 바로가기를 만들자. <항목 위치 입력>에 %windir%\system32\shutdown.exe -a라고 써넣어 바로가기를 만들어놓고 급할 때 클릭하면 종료가 중단된다.
42. CD의 바닥면을 긁으면 레이저가 산란되어 데이터를 읽을 수 없고, 위의 인쇄면을 긁으면 데이터 자체가 날아가 버린다.
43. 디스크를 보호하기 위해 케이스 통째로 로딩하는 광학 디스크도 있다. 소니 PSP의 UMD가 대표적이다.
44. 공유기 포트가 모자라다면? 한 집에 컴퓨터가 한 대 있는 시대는 지났다. 식구마다 하나씩 가지고 있는 데다 게임기까지 인터넷 연결이 필요한 시대다. 그런데 가격이 저렴한 대부분의 공유기는 포트가 4개 뿐이다. 이럴 때는 미니 허브를 구입하면 간단히 해결된다. 보통 5포트 미니 허브가 1만원대니 부담도 없다.
45. CRT 모니터는 화면 재생 빈도를 75HZ 이상으로 해야 눈이 아프지 않다. 하지만 LCD 모니터는 아무 상관이 없다.
46. 익스플로러 시작페이지가 계속 엉뚱한 곳에 고정된다면 Adfree 등을 이용해 치료해줘야 한다.
47. 사운드 카드를 두 개 달고 TV 출력을 이용하면 귀찮게 하는 여친에게 영화를 틀어주고 당신은 원하는 음악을 들으며 평온하게 놀 수 있다.
48. 잡음이 들린다면? 원인은 거의 무한대지만 초보자는 아주 단순한 이유인 경우가 더 많다. 그중 흔한 게 잭이 더러워지거나 케이스에 쇼트가 나는 경우다. 청소를 하거나 잭을 살짝 떼어놓으면 간단히 해결된다. 또 오디오나 볼륨 조절이 가능한 스피커에 연결해 사용하는 경우 소프트웨어에서는 볼륨을 반 이상 올리지 않는 것이 좋다.
49. 게임 CD를 이미지 파일로 만들어 하드 디스크에 넣어두면 게임을 빠르고 간편하게 즐길 수 있다.
50. 조립을 했는데 파워가 안 들어온다. 조립 초보자 중에 메인 보드를 케이스에 무작정 붙이는 사람이 있다. 메인 보드와 케이스 사이에는 원래 끼워 넣는 나사가 있는데 이걸 무시하는 것이다. 그럴 경우 메인보드와 케이스 사이에 쇼트가 나서 전원이 안 들어오는 경우가 있다. 최소한 종이 쪼가리라도 사이에 끼워줘야 한다.< div>div>
RFC란? ==>
Request for Comments documents ( RFCs )는 Internet research와 develop-ment community의 작업 note들이 다.
대부분의 RFCs는 종종, 그것들을 구현함에 있어 요구되는 상세한 절차와 Format들을 제공하는 네트 웍 프로토콜들이나 Service들의 서술이다.
필요하다면 E-mail을 통하여 원하는 RFC를 입수할 수 있으며, 직접 특정한Host에 접속하여 FTP로 RFC Document를 가져올 수 있다.
한 Document에 일단 RFC 번호가 부여되고 출판되면, 그 RFC는 영원히 수정되거나 같은 번호가 부여되 는 일은 없다.
RFC 1939 는 POP3 프로토콜에 관련된 기술문서 이다.
이전에 웹메일 시스템 관련해서 자료를 찾아보느라 구했던 자료인데..
아직 제대로 써먹어 본적은 없다. -_-;;;;;;;;;;;;;
영문이라 보기 껄끄럽기는 하겠지만..
이자료를 안보고 메일시스템을 구축한다든지의 말은 조금 어불성설이 아닐까 싶기도 하고..
하긴 요새는 상용컴포넌트들이 워낙 잘나와서리..
그래도 개발자라면 기본에 충실해야 하지 않을까 하는 생각이 든다.
Network Working Group J. Myers
Request for Comments: 1939 Carnegie Mellon
STD: 53 M. Rose
Obsoletes: 1725 Dover Beach Consulting, Inc.
Category: Standards Track May 1996
Post Office Protocol - Version 3
Status of this Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Table of Contents
1. Introduction ................................................ 2
2. A Short Digression .......................................... 2
3. Basic Operation ............................................. 3
4. The AUTHORIZATION State ..................................... 4
QUIT Command ................................................ 5
5. The TRANSACTION State ....................................... 5
STAT Command ................................................ 6
LIST Command ................................................ 6
RETR Command ................................................ 8
DELE Command ................................................ 8
NOOP Command ................................................ 9
RSET Command ................................................ 9
6. The UPDATE State ............................................ 10
QUIT Command ................................................ 10
7. Optional POP3 Commands ...................................... 11
TOP Command ................................................. 11
UIDL Command ................................................ 12
USER Command ................................................ 13
PASS Command ................................................ 14
APOP Command ................................................ 15
8. Scaling and Operational Considerations ...................... 16
9. POP3 Command Summary ........................................ 18
10. Example POP3 Session ....................................... 19
11. Message Format ............................................. 19
12. References ................................................. 20
13. Security Considerations .................................... 20
14. Acknowledgements ........................................... 20
15. Authors' Addresses ......................................... 21
Appendix A. Differences from RFC 1725 .......................... 22
Appendix B. Command Index ...................................... 23
1. Introduction
On certain types of smaller nodes in the Internet it is often
impractical to maintain a message transport system (MTS). For
example, a workstation may not have sufficient resources (cycles,
disk space) in order to permit a SMTP server [RFC821] and associated
local mail delivery system to be kept resident and continuously
running. Similarly, it may be expensive (or impossible) to keep a
personal computer interconnected to an IP-style network for long
amounts of time (the node is lacking the resource known as
"connectivity").
Despite this, it is often very useful to be able to manage mail on
these smaller nodes, and they often support a user agent (UA) to aid
the tasks of mail handling. To solve this problem, a node which can
support an MTS entity offers a maildrop service to these less endowed
nodes. The Post Office Protocol - Version 3 (POP3) is intended to
permit a workstation to dynamically access a maildrop on a server
host in a useful fashion. Usually, this means that the POP3 protocol
is used to allow a workstation to retrieve mail that the server is
holding for it.
POP3 is not intended to provide extensive manipulation operations of
mail on the server; normally, mail is downloaded and then deleted. A
more advanced (and complex) protocol, IMAP4, is discussed in
[RFC1730].
For the remainder of this memo, the term "client host" refers to a
host making use of the POP3 service, while the term "server host"
refers to a host which offers the POP3 service.
2. A Short Digression
This memo does not specify how a client host enters mail into the
transport system, although a method consistent with the philosophy of
this memo is presented here:
When the user agent on a client host wishes to enter a message
into the transport system, it establishes an SMTP connection to
its relay host and sends all mail to it. This relay host could
be, but need not be, the POP3 server host for the client host. Of
course, the relay host must accept mail for delivery to arbitrary
recipient addresses, that functionality is not required of all
SMTP servers.
3. Basic Operation
Initially, the server host starts the POP3 service by listening on
TCP port 110. When a client host wishes to make use of the service,
it establishes a TCP connection with the server host. When the
connection is established, the POP3 server sends a greeting. The
client and POP3 server then exchange commands and responses
(respectively) until the connection is closed or aborted.
Commands in the POP3 consist of a case-insensitive keyword, possibly
followed by one or more arguments. All commands are terminated by a
CRLF pair. Keywords and arguments consist of printable ASCII
characters. Keywords and arguments are each separated by a single
SPACE character. Keywords are three or four characters long. Each
argument may be up to 40 characters long.
Responses in the POP3 consist of a status indicator and a keyword
possibly followed by additional information. All responses are
terminated by a CRLF pair. Responses may be up to 512 characters
long, including the terminating CRLF. There are currently two status
indicators: positive ("+OK") and negative ("-ERR"). Servers MUST
send the "+OK" and "-ERR" in upper case.
Responses to certain commands are multi-line. In these cases, which
are clearly indicated below, after sending the first line of the
response and a CRLF, any additional lines are sent, each terminated
by a CRLF pair. When all lines of the response have been sent, a
final line is sent, consisting of a termination octet (decimal code
046, ".") and a CRLF pair. If any line of the multi-line response
begins with the termination octet, the line is "byte-stuffed" by
pre-pending the termination octet to that line of the response.
Hence a multi-line response is terminated with the five octets
"CRLF.CRLF". When examining a multi-line response, the client checks
to see if the line begins with the termination octet. If so and if
octets other than CRLF follow, the first octet of the line (the
termination octet) is stripped away. If so and if CRLF immediately
follows the termination character, then the response from the POP
server is ended and the line containing ".CRLF" is not considered
part of the multi-line response.
A POP3 session progresses through a number of states during its
lifetime. Once the TCP connection has been opened and the POP3
server has sent the greeting, the session enters the AUTHORIZATION
state. In this state, the client must identify itself to the POP3
server. Once the client has successfully done this, the server
acquires resources associated with the client's maildrop, and the
session enters the TRANSACTION state. In this state, the client
requests actions on the part of the POP3 server. When the client has
issued the QUIT command, the session enters the UPDATE state. In
this state, the POP3 server releases any resources acquired during
the TRANSACTION state and says goodbye. The TCP connection is then
closed.
A server MUST respond to an unrecognized, unimplemented, or
syntactically invalid command by responding with a negative status
indicator. A server MUST respond to a command issued when the
session is in an incorrect state by responding with a negative status
indicator. There is no general method for a client to distinguish
between a server which does not implement an optional command and a
server which is unwilling or unable to process the command.
A POP3 server MAY have an inactivity autologout timer. Such a timer
MUST be of at least 10 minutes' duration. The receipt of any command
from the client during that interval should suffice to reset the
autologout timer. When the timer expires, the session does NOT enter
the UPDATE state--the server should close the TCP connection without
removing any messages or sending any response to the client.
4. The AUTHORIZATION State
Once the TCP connection has been opened by a POP3 client, the POP3
server issues a one line greeting. This can be any positive
response. An example might be:
S: +OK POP3 server ready
The POP3 session is now in the AUTHORIZATION state. The client must
now identify and authenticate itself to the POP3 server. Two
possible mechanisms for doing this are described in this document,
the USER and PASS command combination and the APOP command. Both
mechanisms are described later in this document. Additional
authentication mechanisms are described in [RFC1734]. While there is
no single authentication mechanism that is required of all POP3
servers, a POP3 server must of course support at least one
authentication mechanism.
Once the POP3 server has determined through the use of any
authentication command that the client should be given access to the
appropriate maildrop, the POP3 server then acquires an exclusive-
access lock on the maildrop, as necessary to prevent messages from
being modified or removed before the session enters the UPDATE state.
If the lock is successfully acquired, the POP3 server responds with a
positive status indicator. The POP3 session now enters the
TRANSACTION state, with no messages marked as deleted. If the
maildrop cannot be opened for some reason (for example, a lock can
not be acquired, the client is denied access to the appropriate
maildrop, or the maildrop cannot be parsed), the POP3 server responds
with a negative status indicator. (If a lock was acquired but the
POP3 server intends to respond with a negative status indicator, the
POP3 server must release the lock prior to rejecting the command.)
After returning a negative status indicator, the server may close the
connection. If the server does not close the connection, the client
may either issue a new authentication command and start again, or the
client may issue the QUIT command.
After the POP3 server has opened the maildrop, it assigns a message-
number to each message, and notes the size of each message in octets.
The first message in the maildrop is assigned a message-number of
"1", the second is assigned "2", and so on, so that the nth message
in a maildrop is assigned a message-number of "n". In POP3 commands
and responses, all message-numbers and message sizes are expressed in
base-10 (i.e., decimal).
Here is the summary for the QUIT command when used in the
AUTHORIZATION state:
QUIT
Arguments: none
Restrictions: none
Possible Responses:
+OK
Examples:
C: QUIT
S: +OK dewey POP3 server signing off
5. The TRANSACTION State
Once the client has successfully identified itself to the POP3 server
and the POP3 server has locked and opened the appropriate maildrop,
the POP3 session is now in the TRANSACTION state. The client may now
issue any of the following POP3 commands repeatedly. After each
command, the POP3 server issues a response. Eventually, the client
issues the QUIT command and the POP3 session enters the UPDATE state.
Here are the POP3 commands valid in the TRANSACTION state:
STAT
Arguments: none
Restrictions:
may only be given in the TRANSACTION state
Discussion:
The POP3 server issues a positive response with a line
containing information for the maildrop. This line is
called a "drop listing" for that maildrop.
In order to simplify parsing, all POP3 servers are
required to use a certain format for drop listings. The
positive response consists of "+OK" followed by a single
space, the number of messages in the maildrop, a single
space, and the size of the maildrop in octets. This memo
makes no requirement on what follows the maildrop size.
Minimal implementations should just end that line of the
response with a CRLF pair. More advanced implementations
may include other information.
NOTE: This memo STRONGLY discourages implementations
from supplying additional information in the drop
listing. Other, optional, facilities are discussed
later on which permit the client to parse the messages
in the maildrop.
Note that messages marked as deleted are not counted in
either total.
Possible Responses:
+OK nn mm
Examples:
C: STAT
S: +OK 2 320
LIST [msg]
Arguments:
a message-number (optional), which, if present, may NOT
refer to a message marked as deleted
Restrictions:
may only be given in the TRANSACTION state
Discussion:
If an argument was given and the POP3 server issues a
positive response with a line containing information for
that message. This line is called a "scan listing" for
that message.
If no argument was given and the POP3 server issues a
positive response, then the response given is multi-line.
After the initial +OK, for each message in the maildrop,
the POP3 server responds with a line containing
information for that message. This line is also called a
"scan listing" for that message. If there are no
messages in the maildrop, then the POP3 server responds
with no scan listings--it issues a positive response
followed by a line containing a termination octet and a
CRLF pair.
In order to simplify parsing, all POP3 servers are
required to use a certain format for scan listings. A
scan listing consists of the message-number of the
message, followed by a single space and the exact size of
the message in octets. Methods for calculating the exact
size of the message are described in the "Message Format"
section below. This memo makes no requirement on what
follows the message size in the scan listing. Minimal
implementations should just end that line of the response
with a CRLF pair. More advanced implementations may
include other information, as parsed from the message.
NOTE: This memo STRONGLY discourages implementations
from supplying additional information in the scan
listing. Other, optional, facilities are discussed
later on which permit the client to parse the messages
in the maildrop.
Note that messages marked as deleted are not listed.
Possible Responses:
+OK scan listing follows
-ERR no such message
S: 2 200
S: .
...
C: LIST 2
S: +OK 2 200
...
C: LIST 3
S: -ERR no such message, only 2 messages in maildrop
RETR msg
Arguments:
a message-number (required) which may NOT refer to a
message marked as deleted
Restrictions:
may only be given in the TRANSACTION state
Discussion:
If the POP3 server issues a positive response, then the
response given is multi-line. After the initial +OK, the
POP3 server sends the message corresponding to the given
message-number, being careful to byte-stuff the termination
character (as with all multi-line responses).
Possible Responses:
+OK message follows
-ERR no such message
Examples:
C: RETR 1
S: +OK 120 octets
S:
S: .
DELE msg
Arguments:
a message-number (required) which may NOT refer to a
message marked as deleted
Restrictions:
may only be given in the TRANSACTION state
Discussion:
The POP3 server marks the message as deleted. Any future
reference to the message-number associated with the message
in a POP3 command generates an error. The POP3 server does
not actually delete the message until the POP3 session
enters the UPDATE state.
Possible Responses:
+OK message deleted
-ERR no such message
Examples:
C: DELE 1
S: +OK message 1 deleted
...
C: DELE 2
S: -ERR message 2 already deleted
NOOP
Arguments: none
Restrictions:
may only be given in the TRANSACTION state
Discussion:
The POP3 server does nothing, it merely replies with a
positive response.
Possible Responses:
+OK
Examples:
C: NOOP
S: +OK
RSET
Arguments: none
Restrictions:
may only be given in the TRANSACTION state
Discussion:
If any messages have been marked as deleted by the POP3
server, they are unmarked. The POP3 server then replies
When the client issues the QUIT command from the TRANSACTION state,
the POP3 session enters the UPDATE state. (Note that if the client
issues the QUIT command from the AUTHORIZATION state, the POP3
session terminates but does NOT enter the UPDATE state.)
If a session terminates for some reason other than a client-issued
QUIT command, the POP3 session does NOT enter the UPDATE state and
MUST not remove any messages from the maildrop.
QUIT
Arguments: none
Restrictions: none
Discussion:
The POP3 server removes all messages marked as deleted
from the maildrop and replies as to the status of this
operation. If there is an error, such as a resource
shortage, encountered while removing messages, the
maildrop may result in having some or none of the messages
marked as deleted be removed. In no case may the server
remove any messages not marked as deleted.
Whether the removal was successful or not, the server
then releases any exclusive-access lock on the maildrop
and closes the TCP connection.
Possible Responses:
+OK
-ERR some deleted messages not removed
Examples:
C: QUIT
S: +OK dewey POP3 server signing off (maildrop empty)
...
C: QUIT
S: +OK dewey POP3 server signing off (2 messages left)
...
7. Optional POP3 Commands
The POP3 commands discussed above must be supported by all minimal
implementations of POP3 servers.
The optional POP3 commands described below permit a POP3 client
greater freedom in message handling, while preserving a simple POP3
server implementation.
NOTE: This memo STRONGLY encourages implementations to support
these commands in lieu of developing augmented drop and scan
listings. In short, the philosophy of this memo is to put
intelligence in the part of the POP3 client and not the POP3
server.
TOP msg n
Arguments:
a message-number (required) which may NOT refer to to a
message marked as deleted, and a non-negative number
of lines (required)
Restrictions:
may only be given in the TRANSACTION state
Discussion:
If the POP3 server issues a positive response, then the
response given is multi-line. After the initial +OK, the
POP3 server sends the headers of the message, the blank
line separating the headers from the body, and then the
number of lines of the indicated message's body, being
careful to byte-stuff the termination character (as with
all multi-line responses).
Note that if the number of lines requested by the POP3
client is greater than than the number of lines in the
body, then the POP3 server sends the entire message.
Possible Responses:
+OK top of message follows
-ERR no such message
Examples:
C: TOP 1 10
S: +OK
S:
message, a blank line, and the first 10 lines
of the body of the message>
S: .
...
C: TOP 100 3
S: -ERR no such message
UIDL [msg]
Arguments:
a message-number (optional), which, if present, may NOT
refer to a message marked as deleted
Restrictions:
may only be given in the TRANSACTION state.
Discussion:
If an argument was given and the POP3 server issues a positive
response with a line containing information for that message.
This line is called a "unique-id listing" for that message.
If no argument was given and the POP3 server issues a positive
response, then the response given is multi-line. After the
initial +OK, for each message in the maildrop, the POP3 server
responds with a line containing information for that message.
This line is called a "unique-id listing" for that message.
In order to simplify parsing, all POP3 servers are required to
use a certain format for unique-id listings. A unique-id
listing consists of the message-number of the message,
followed by a single space and the unique-id of the message.
No information follows the unique-id in the unique-id listing.
The unique-id of a message is an arbitrary server-determined
string, consisting of one to 70 characters in the range 0x21
to 0x7E, which uniquely identifies a message within a
maildrop and which persists across sessions. This
persistence is required even if a session ends without
entering the UPDATE state. The server should never reuse an
unique-id in a given maildrop, for as long as the entity
using the unique-id exists.
Note that messages marked as deleted are not listed.
While it is generally preferable for server implementations
to store arbitrarily assigned unique-ids in the maildrop,
this specification is intended to permit unique-ids to be
calculated as a hash of the message. Clients should be able
to handle a situation where two identical copies of a
message in a maildrop have the same unique-id.
Possible Responses:
+OK unique-id listing follows
-ERR no such message
Examples:
C: UIDL
S: +OK
S: 1 whqtswO00WBw418f9t5JxYwZ
S: 2 QhdPYR:00WBw1Ph7x7
S: .
...
C: UIDL 2
S: +OK 2 QhdPYR:00WBw1Ph7x7
...
C: UIDL 3
S: -ERR no such message, only 2 messages in maildrop
USER name
Arguments:
a string identifying a mailbox (required), which is of
significance ONLY to the server
Restrictions:
may only be given in the AUTHORIZATION state after the POP3
greeting or after an unsuccessful USER or PASS command
Discussion:
To authenticate using the USER and PASS command
combination, the client must first issue the USER
command. If the POP3 server responds with a positive
status indicator ("+OK"), then the client may issue
either the PASS command to complete the authentication,
or the QUIT command to terminate the POP3 session. If
the POP3 server responds with a negative status indicator
("-ERR") to the USER command, then the client may either
issue a new authentication command or may issue the QUIT
command.
The server may return a positive response even though no
such mailbox exists. The server may return a negative
response if mailbox exists, but does not permit plaintext
password authentication.
Possible Responses:
+OK name is a valid mailbox
-ERR never heard of mailbox name
Examples:
C: USER frated
S: -ERR sorry, no mailbox for frated here
...
C: USER mrose
S: +OK mrose is a real hoopy frood
PASS string
Arguments:
a server/mailbox-specific password (required)
Restrictions:
may only be given in the AUTHORIZATION state immediately
after a successful USER command
Discussion:
When the client issues the PASS command, the POP3 server
uses the argument pair from the USER and PASS commands to
determine if the client should be given access to the
appropriate maildrop.
Since the PASS command has exactly one argument, a POP3
server may treat spaces in the argument as part of the
password, instead of as argument separators.
Possible Responses:
+OK maildrop locked and ready
-ERR invalid password
-ERR unable to lock maildrop
Examples:
C: USER mrose
S: +OK mrose is a real hoopy frood
C: PASS secret
S: -ERR maildrop already locked
...
C: USER mrose
S: +OK mrose is a real hoopy frood
C: PASS secret
S: +OK mrose's maildrop has 2 messages (320 octets)
APOP name digest
Arguments:
a string identifying a mailbox and a MD5 digest string
(both required)
Restrictions:
may only be given in the AUTHORIZATION state after the POP3
greeting or after an unsuccessful USER or PASS command
Discussion:
Normally, each POP3 session starts with a USER/PASS
exchange. This results in a server/user-id specific
password being sent in the clear on the network. For
intermittent use of POP3, this may not introduce a sizable
risk. However, many POP3 client implementations connect to
the POP3 server on a regular basis -- to check for new
mail. Further the interval of session initiation may be on
the order of five minutes. Hence, the risk of password
capture is greatly enhanced.
An alternate method of authentication is required which
provides for both origin authentication and replay
protection, but which does not involve sending a password
in the clear over the network. The APOP command provides
this functionality.
A POP3 server which implements the APOP command will
include a timestamp in its banner greeting. The syntax of
the timestamp corresponds to the `msg-id' in [RFC822], and
MUST be different each time the POP3 server issues a banner
greeting. For example, on a UNIX implementation in which a
separate UNIX process is used for each instance of a POP3
server, the syntax of the timestamp might be:
where `process-ID' is the decimal value of the process's
PID, clock is the decimal value of the system clock, and
hostname is the fully-qualified domain-name corresponding
to the host where the POP3 server is running.
The POP3 client makes note of this timestamp, and then
issues the APOP command. The `name' parameter has
identical semantics to the `name' parameter of the USER
command. The `digest' parameter is calculated by applying
the MD5 algorithm [RFC1321] to a string consisting of the
timestamp (including angle-brackets) followed by a shared
secret. This shared secret is a string known only to the
POP3 client and server. Great care should be taken to
prevent unauthorized disclosure of the secret, as knowledge
of the secret will allow any entity to successfully
masquerade as the named user. The `digest' parameter
itself is a 16-octet value which is sent in hexadecimal
format, using lower-case ASCII characters.
When the POP3 server receives the APOP command, it verifies
the digest provided. If the digest is correct, the POP3
server issues a positive response, and the POP3 session
enters the TRANSACTION state. Otherwise, a negative
response is issued and the POP3 session remains in the
AUTHORIZATION state.
Note that as the length of the shared secret increases, so
does the difficulty of deriving it. As such, shared
secrets should be long strings (considerably longer than
the 8-character example shown below).
Possible Responses:
+OK maildrop locked and ready
-ERR permission denied
Examples:
S: +OK POP3 server ready <1896.697170952@dbc.mtview.ca.us>
C: APOP mrose c4c9334bac560ecc979e58001b3e22fb
S: +OK maildrop has 1 message (369 octets)
In this example, the shared secret is the string `tan-
staaf'. Hence, the MD5 algorithm is applied to the string
<1896.697170952@dbc.mtview.ca.us>tanstaaf
which produces a digest value of
c4c9334bac560ecc979e58001b3e22fb
8. Scaling and Operational Considerations
Since some of the optional features described above were added to the
POP3 protocol, experience has accumulated in using them in large-
scale commercial post office operations where most of the users are
unrelated to each other. In these situations and others, users and
vendors of POP3 clients have discovered that the combination of using
the UIDL command and not issuing the DELE command can provide a weak
version of the "maildrop as semi-permanent repository" functionality
normally associated with IMAP. Of course the other capabilities of
IMAP, such as polling an existing connection for newly arrived
messages and supporting multiple folders on the server, are not
present in POP3.
When these facilities are used in this way by casual users, there has
been a tendency for already-read messages to accumulate on the server
without bound. This is clearly an undesirable behavior pattern from
the standpoint of the server operator. This situation is aggravated
by the fact that the limited capabilities of the POP3 do not permit
efficient handling of maildrops which have hundreds or thousands of
messages.
Consequently, it is recommended that operators of large-scale multi-
user servers, especially ones in which the user's only access to the
maildrop is via POP3, consider such options as:
* Imposing a per-user maildrop storage quota or the like.
A disadvantage to this option is that accumulation of messages may
result in the user's inability to receive new ones into the
maildrop. Sites which choose this option should be sure to inform
users of impending or current exhaustion of quota, perhaps by
inserting an appropriate message into the user's maildrop.
* Enforce a site policy regarding mail retention on the server.
Sites are free to establish local policy regarding the storage and
retention of messages on the server, both read and unread. For
example, a site might delete unread messages from the server after
60 days and delete read messages after 7 days. Such message
deletions are outside the scope of the POP3 protocol and are not
considered a protocol violation.
Server operators enforcing message deletion policies should take
care to make all users aware of the policies in force.
Clients must not assume that a site policy will automate message
deletions, and should continue to explicitly delete messages using
the DELE command when appropriate.
It should be noted that enforcing site message deletion policies
may be confusing to the user community, since their POP3 client
may contain configuration options to leave mail on the server
which will not in fact be supported by the server.
One special case of a site policy is that messages may only be
downloaded once from the server, and are deleted after this has
been accomplished. This could be implemented in POP3 server
software by the following mechanism: "following a POP3 login by a
client which was ended by a QUIT, delete all messages downloaded
during the session with the RETR command". It is important not to
delete messages in the event of abnormal connection termination
(ie, if no QUIT was received from the client) because the client
may not have successfully received or stored the messages.
Servers implementing a download-and-delete policy may also wish to
disable or limit the optional TOP command, since it could be used
as an alternate mechanism to download entire messages.
9. POP3 Command Summary
Minimal POP3 Commands:
USER name valid in the AUTHORIZATION state
PASS string
QUIT
STAT valid in the TRANSACTION state
LIST [msg]
RETR msg
DELE msg
NOOP
RSET
QUIT
Optional POP3 Commands:
APOP name digest valid in the AUTHORIZATION state
TOP msg n valid in the TRANSACTION state
UIDL [msg]
POP3 Replies:
+OK
-ERR
Note that with the exception of the STAT, LIST, and UIDL commands,
the reply given by the POP3 server to any command is significant
only to "+OK" and "-ERR". Any text occurring after this reply
may be ignored by the client.
All messages transmitted during a POP3 session are assumed to conform
to the standard for the format of Internet text messages [RFC822].
It is important to note that the octet count for a message on the
server host may differ from the octet count assigned to that message
due to local conventions for designating end-of-line. Usually,
during the AUTHORIZATION state of the POP3 session, the POP3 server
can calculate the size of each message in octets when it opens the
maildrop. For example, if the POP3 server host internally represents
end-of-line as a single character, then the POP3 server simply counts
each occurrence of this character in a message as two octets. Note
that lines in the message which start with the termination octet need
not (and must not) be counted twice, since the POP3 client will
remove all byte-stuffed termination characters when it receives a
multi-line response.
12. References
[RFC821] Postel, J., "Simple Mail Transfer Protocol", STD 10, RFC
821, USC/Information Sciences Institute, August 1982.
[RFC822] Crocker, D., "Standard for the Format of ARPA-Internet Text
Messages", STD 11, RFC 822, University of Delaware, August 1982.
[RFC1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321,
MIT Laboratory for Computer Science, April 1992.
[RFC1730] Crispin, M., "Internet Message Access Protocol - Version
4", RFC 1730, University of Washington, December 1994.
It is conjectured that use of the APOP command provides origin
identification and replay protection for a POP3 session.
Accordingly, a POP3 server which implements both the PASS and APOP
commands should not allow both methods of access for a given user;
that is, for a given mailbox name, either the USER/PASS command
sequence or the APOP command is allowed, but not both.
Further, note that as the length of the shared secret increases, so
does the difficulty of deriving it.
Servers that answer -ERR to the USER command are giving potential
attackers clues about which names are valid.
Use of the PASS command sends passwords in the clear over the
network.
Use of the RETR and TOP commands sends mail in the clear over the
network.
Otherwise, security issues are not discussed in this memo.
14. Acknowledgements
The POP family has a long and checkered history. Although primarily
a minor revision to RFC 1460, POP3 is based on the ideas presented in
RFCs 918, 937, and 1081.
In addition, Alfred Grimstad, Keith McCloghrie, and Neil Ostroff
provided significant comments on the APOP command.
15. Authors' Addresses
John G. Myers
Carnegie-Mellon University
5000 Forbes Ave
Pittsburgh, PA 15213
EMail: jgm+@cmu.edu
Marshall T. Rose
Dover Beach Consulting, Inc.
420 Whisman Court
Mountain View, CA 94043-2186
EMail: mrose@dbc.mtview.ca.us
Appendix A. Differences from RFC 1725
This memo is a revision to RFC 1725, a Draft Standard. It makes the
following changes from that document:
- clarifies that command keywords are case insensitive.
- specifies that servers must send "+OK" and "-ERR" in
upper case.
- specifies that the initial greeting is a positive response,
instead of any string which should be a positive response.
- clarifies behavior for unimplemented commands.
- makes the USER and PASS commands optional.
- clarified the set of possible responses to the USER command.
- reverses the order of the examples in the USER and PASS
commands, to reduce confusion.
- clarifies that the PASS command may only be given immediately
after a successful USER command.
- clarified the persistence requirements of UIDs and added some
implementation notes.
- specifies a UID length limitation of one to 70 octets.
- specifies a status indicator length limitation
of 512 octets, including the CRLF.
- clarifies that LIST with no arguments on an empty mailbox
returns success.
- adds a reference from the LIST command to the Message Format
section
- clarifies the behavior of QUIT upon failure
- clarifies the security section to not imply the use of the
USER command with the APOP command.
- adds references to RFCs 1730 and 1734
- clarifies the method by which a UA may enter mail into the
transport system.
- clarifies that the second argument to the TOP command is a
number of lines.
- changes the suggestion in the Security Considerations section
for a server to not accept both PASS and APOP for a given user
from a "must" to a "should".
- adds a section on scaling and operational considerations
Appendix B. Command Index
APOP ....................................................... 15
DELE ....................................................... 8
LIST ....................................................... 6
NOOP ....................................................... 9
PASS ....................................................... 14
QUIT ....................................................... 5
QUIT ....................................................... 10
RETR ....................................................... 8
RSET ....................................................... 9
STAT ....................................................... 6
TOP ........................................................ 11
UIDL ....................................................... 12
USER ....................................................... 13