The Technical Development of Internet Email
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
The Technical Development of
Internet Email
Craig Partridge
BBN Technologies
Development and evolution of the technologies and standards for
Internet email took more than 20 years, and arguably is still under
way. The protocols to move email between systems and the rules for
formatting messages have evolved, and been largely replaced at least
once. This article traces that evolution, with a focus on why things
look as they do today.
The explosive development of networked Each subsystem internally has a rich set of
electronic mail (email) has been one of the protocols and services to perform its job. For
major technical and sociological develop- instance, the UA typically includes network
ments of the past 40 years. A number of protocols to manage mailboxes kept on remote
authors have already looked at the develop- storage at a user’s Internet service provider or
ment of email from various perspectives.1 The place of work. The MHS includes protocols to
goal of this article is to explore a perspective reliably move email messages from one MTA to
that, surprisingly, has not been thoroughly another, and to determine how to route a
examined: namely, how the details of the message through the MTAs to its recipients.
technology that implements email in the The UA and MHS must also have some
Internet have evolved. standards in common. In particular, they need
This is a detailed history of email’s plumb- to agree on the format of email messages and
ing. One might imagine, therefore, that it is the format of the metadata (the so-called
only of interest to a plumber. It turns out, envelope) that accompanies each message on
however, that much of how email has evolved its path through the network.
has depended on seemingly obscure decisions. The focus of this article is how these
Writing this article has been a reminder of different pieces incrementally came into being
how little decisions have big consequences, and exploring why each one emerged and how
and I have sought to highlight those decisions its emergence affected the larger email system.
in the narrative. In the interests of space, this survey stops
around the end of 1991. That termination date
Architecture of email leaves out at least four stories: (1) the develop-
In telling the story of how email came to ment of graphics-based user interfaces for
look as it does today, we start by describing (in personal computers and the incorporation of
broad strokes) today’s world, so that the steps those interfaces into web browsers; (2) the rise
in the evolution can be marked more clearly. of UA protocols such as the Post Office Protocol
Today’s email system can be divided into (POP)2 and IMAP3 (these protocols existed
two distinct subsystems. One subsystem, the prior to 1991, but much of their evolution
message handling system (MHS), is responsible occurred later); (3) the continuing efforts to
for moving email messages from sending users further internationalize email (e.g., allowing
to receiving users, and is built on a set of non-ASCI characters in email addresses); and
servers called message transfer agents (MTAs). (4) the rise of unwanted email (dubbed
The other subsystem, which we will call the ‘‘spam’’) and tools that sought to diminish it.
user agent (UA), works with the user to receive, Furthermore, in the interests of space, I do not
manage (e.g., delete, archive, or print), and consider the development of technical stan-
create email messages, and interacts with the dards for the support of email lists.
MHS to cause messages to be delivered.
Readers may recognize this terminology as First steps
being roughly that developed by the X.400 Electronic mail existed before networks did.
email standardization process. In the 1960s, time-shared operating systems
IEEE Annals of the History of Computing Published by the IEEE Computer Society 1058-6180/08/$25.00 G 2008 IEEE 3The Technical Development of Internet Email
developed local email systems delivering mail had received local email. In TENEX, they got a
between users on a single system.4 The ‘‘You have mail’’ message when they logged
importance of this work is that email requires in. Mail was read by viewing or printing the
a certain amount of local infrastructure. There mailbox file, usually with the TYPE command.
needs to be a place to put each user’s email. (Almost immediately, TYPE MAILBOX was
There needs to be a way for a user to discover replaced with a TENEX macro READMAIL).
that he or she has new email. By the early Messages were deleted by deleting the relevant
1970s, many operating systems had these lines with a text editor.
facilities. Tomlinson made two important contribu-
In July 1971, Dick Watson of SRI Interna- tions. First, he found a way to express the
tional published an Internet Request for networked email address. He chose to use the
Comments5 (RFC-196) describing what he ‘‘@’’ sign to divide the user’s account name
called ‘‘A Mail Box Protocol.’’ The idea was to from the name of the host where the account
provide a mechanism where the new Network resided, resulting in the now ubiquitous
Information Center (NIC) could distributed user@remote format.11 Second, SNDMSG was the
documents to sites on the Arpanet. Watson first MTA—it took a message and delivered it
described a way to send files (documents) to a (using the CPYnet protocol) to a remote user’s
teletype printer, with different mailboxes for mailbox.
different types of printers. Mailbox 0 was a Observe that the last contribution is a
teletype surprise. We might imagine that the first
program was more of a user agent (UA) than
assumed to have a print line 72 characters a message transfer agent (MTA). But SNDMSG
wide, and a page of 66 lines. The new line could only deliver mail, it could not receive
convention will be carriage return (X90D9) mail, and it delivered the email all the way to
followed by line feed (X90A9) … The standard the recipient’s mailbox. Therefore, SNDMSG was
printer will accept form feed (X90C9) as much closer in spirit to an MTA (and, indeed,
meaning move paper to the top of a new as we shall see, was used as an MTA for a
page.6 number of years). At the same time, SNDMSG
was primitive. If there were multiple email
Ray Tomlinson of Bolt Beranek and New- recipients on the same host, it copied the
man (now BBN Technologies or BBN) read message once for each recipient. If the remote
Watson’s memo and reacted that ‘‘it was host was down, SNDMSG simply returned a
overly complicated because it tried to deal failure message—it made no effort to retrans-
with printing ink on paper with a line printer mit.
and delivered the paper to numbered mail- Despite its primitive nature, Tomlinson’s
boxes.’’7 In Tomlinson’s view, the correct creation took off. The next few years saw it
approach was to send documents to a user’s mature from a fun idea to a central feature of
electronic mailbox and let the user decide if the Arpanet (and later the Internet).
the document merited printing.8 So Tomlin-
son set out to see if he could send email this From primitive to production
way between two TENEX systems9 over the By late 1973, email was widely used on the
Arpanet. His approach was simple. Arpanet. What happened after Tomlinson’s
TENEX already had an existing local email experiment to make this happen? Obviously,
program called SNDMSG,10 which, given a mes- email met a need. But there were also technical
sage, appended that message to a file called steps: standardization of the transfer protocol
MAILBOX in a user’s directory. TENEX also had a and the development of user interfaces.
homegrown file transfer service called CPYnet
(written by Tomlinson). In a passive mode, A standard transfer protocol
CPYnet listened at a particular address for First, the community replaced CPYnet with
requests to read, write, or append to a particular a standardized file transfer service, the first
local file. Email was achieved by incorporating generation of the File Transfer Protocol (FTP).
CPYnet into SNDMSG. If SNDMSG was given a This process took a while. In 1971, FTP was
message addressed to a user at a remote host, it simply a set of rather complex ideas written up
opened a CPYnet connection to the remote in a set of RFCs by a team led by Abhay
host and instructed CPYnet to append the Bhushan of the Massachusetts Institute of
message to the user’s mailbox on that host. Technology (MIT).12 The goal behind these
Users learned that they had received net- ideas was to create a general tool to manage
work email the same way they learned they files (including deleting and renaming files) on
4 IEEE Annals of the History of Computingremote machines and to do it in a way that name (local to the remote host). The user id
met the needs of any envisioned application.13 could also be left out, in which case the mail
At the same time, Dick Watson’s mailbox was to be delivered to a printer. After the MLFL
idea was continuing to mature. In November command was accepted, the email file was
1971, a team including Watson proposed a transmitted over an FTP data channel (with
way to enhance (the still nascent) FTP with the end of the file indicating the end of the
an explicit MAIL command to support message). The file was required to be in ASCII.
appending a file to a mailbox. They further A separate copy of the file was sent for each
proposed that email be simply ASCII strings recipient at a host.
of text (no binary images) and that mailbox MLFL was an important step. A key flaw in
numbers be replaced with text user identi- Tomlinson’s prototype email was that you had
fiers. The identifiers were ‘‘NIC handles.’’ NIC to know where in the receiving host’s file
handles were given out by the Network system a user’s mailbox was located, so that
Information Center to authorized network you could append to it.18 This limitation
users (and were used as login IDs on Arpanet probably explains why most of the email
terminal servers, called TIPS). This idea, of activity in 1971 and 1972 appears to have
course, meant that every host would need to taken place between TENEX systems, where the
maintain a table mapping NIC handles of file name for the mailbox was consistent.
local users to the location of their mailbox MLFL adopted Watson’s notion that mailbox-
file. Retaining Watson’s original idea of acc- es are symbolic names that the receiving
essing a printer, the MAIL command could be system translates into an appropriate user
given the name ‘‘Printer’’ instead of a NIC mailbox file and thereby freed email from
handle and the file would be printed. system-specific limitations.
Concurrently, Tomlinson distributed An interactive command, MAIL, was also
SNDMSG to other TENEX systems and people defined, so that users logged into a TIP could
began to get hands-on experience with email. type in an email message using only FTP’s
TENEX was the most common operating system control connection. In this case, a line with a
on the Arpanet at the time, and so probably at single dot (‘‘.’’) on it marked the end of the
least half the Arpanet users had access to message. Ending a message with a single dot is
SNDMSG. still how email is moved over the Internet today.
In April 1972, most of the interested parties, The MAIL—and, more important, MLFL—
including both Tomlinson and Watson, met at commands remained the way email was
MIT to discuss revisions to the File Transfer delivered between systems for several years.
Protocol. The meeting made several decisions, In the fall of 1972, Bob Clements of BBN
at least one of which proved to have a long- updated SNDMSG to use the new commands.
term impact: the group agreed to use text Several other email-cognizant FTP implemen-
(ASCII) commands and replies (previous ver- tations appeared. The most notable is probably
sions of FTP had used binary commands) to aid the system for MIT’s Multics. Ken Pogran
interactive use.14 To this day, the Internet uses wrote the FTP implementation and Mike
text commands to transfer email (and the Padlipsky wrote the NETML program that
tradition lives on in much later protocols, such handled email.19 Multics was exceptional for
as the Web’s transfer protocol, HTTP). A new the time because it had good security includ-
version of the FTP specification, based on these ing user file privileges, so Padlipsky had to
ideas and written by Bhushan, came out in invent a special user (ANONYMOUS) to receive
July 1972.15 email and distribute it to users.20 The concept
The new specification envisioned that email of an anonymous login account caught on as a
would be delivered via the APPEND command, way to permit FTP access to users who did not
which appended data to a file. Discussions have an account and remains a central feature
about FTP and email continued, however, and of FTP to this day.
a month later, Bhushan issued a revision to the
FTP specification16 to include a new com- First user agents
mand, MLFL (Mail File). It is said Bhushan The second development of 1972 and 1973
came up with MLFL because, one evening was the creation of tools to create and manage
while he was writing the revision, a fellow email. Here the center of innovation was
graduate student at MIT stopped by to suggest within the Advanced Research Projects Agency
that a better solution was required for email.17 (ARPA) itself. Larry Roberts, head of the ARPA
MLFL took one argument, a user id, which office funding Arpanet, was an early and
could either be a NIC handle or a local user aggressive user of email. Early in 1972, Stephen
April–June 2008 5The Technical Development of Internet Email
Lukasik, the head of ARPA, also began using
email and that induced a number of others,
including the ARPA department heads, to use One challenge in RD and
email too.21
Soon Lukasik became frustrated with READ- NRD was the lack of a
MAIL, which forced him to read through all
the messages in his mailbox in order. Lukasik standard format for email
liked to keep copies of email he received,
which made the problem worse. He appealed messages. Headers varied.
to Roberts for something better.
One night in July, Roberts wrote a tool It was hard to find where
using macros for the TECO (Text Editor and
COrrector22) text editor to manage a mail- one message ended and
box.23 The tool was dubbed RD. RD made it
possible to list the messages in the mailbox, to the next one started.
pick which message to read next, and to print
individual messages.
Roberts’ colleague at ARPA, Barry Wessler,
Headers varied. It was hard to find where one
promptly rewrote RD as a standalone program
message ended and the next one started.
in the programming language SAIL and added
Wessler remembers trying to get NRD to find
additional features for usability. Improve-
the start of headers, but it was too hard because
ments in Wessler’s ‘‘New RD’’ or NRD included
messages routinely had other messages em-
the ability to manage more than one file of
bedded in them. Therefore, NRD (and RD and
messages, and mechanisms to file, retrieve,
BANANARD) relied on the receiving system to
and delete messages. RD and NRD were the
place a start-of-message delimiter before each
first mailbox management tools, the first true
message in the mailbox.26 The delimiter had
user agents.
four SOH (Start Of Header, also known as
Wessler’s NRD was not distributed outside
Control-A) bytes followed by information
ARPA. (RD was.) In early 1973, Martin Yonke
about the message (initially just a byte count,
was a graduate student intern at the University
of Southern California’s Information Sciences later somewhat more information).27 In one of
Institute (ISI) and looking for something to do. those odd quirks, part of the start-of-message
Steve Crocker of ARPA gave Yonke a copy of delimiter has lived on. While some present-
Wessler’s code (which ran on TENEX) and day email systems parse for a header, others
suggested Yonke look at improving it. Yonke still expect messages separated by a line with
added command completion (type the first four consecutive SOH bytes.
letter or two of a command and the rest of the
name would be filled in) and a help interface. Transitions
A user could type a question mark in most In March 1973, another meeting of people
places in a command to learn what the choices working on FTP was held, to try to clarify issues
were. The revised NRD was dubbed BANANARD.24 lingering from the April 1972 meeting. It
(At the time, ‘‘banana’’ was technical slang for marked a subtle transition.
‘‘cool’’ or ‘‘better’’.) Yonke distributed and Originally, clarifying and improving the
maintained BANANARD for a bit less than a year support for email in FTP was part of the
although it remained in use for several years agenda.28 Yet the meeting was ambivalent
more. about the relationship between FTP and email.
Among the amusing stories from that year, Prodded by a late-in-the-meeting arrival of
one concerned mailbox sizes: BANANARD kept an ARPA’s Steve Crocker, who asked how they
index of messages in a file, so Yonke had to were doing on email support, the group
estimate how big the index (which was read decided to formally incorporate the MLFL
into memory) might be. Yonke estimated the and MAIL commands into the new specifica-
largest possible mailbox size, doubled that, tion29 (recall that the commands had previ-
and concluded that assuming a mailbox was ously been in a separate addendum). Between
never larger than 5,000 messages was safe. the meeting and the issuances of the new FTP
Within a few months, Steve Crocker exceeded specification, it was decided that email should
the limit. So did John Vittal.25 really be a separate, auxiliary protocol.30 Email
One challenge in RD and NRD was the lack had become important (or complex) enough
of a standard format for email messages. to merit distinction.
6 IEEE Annals of the History of ComputingSecond, the community was shifting. Al- nights and weekends), and when he left ISI for
though both meetings had over 20 attendees, BBN in 1976, he took MSG with him.
they were different sets of people. Only five MSG was, in fact, surprisingly simple. It was
people31 attended both meetings.32 Abhay a stand-alone program with its own set of
Bhushan, who had been driving the develop- commands. There were just 30 commands,
ment of and writing the specifications for FTP, named such that their first letter uniquely
would soon move on to other things. Nancy identified all but six. Combined with a
Neigus of BBN wrote the new FTP specifica- command-completion scheme, this usually-
tion. unique-on-first letter approach permitted con-
The research focus was also changing. By cise typing by experienced users. (Many early
year’s end, Larry Roberts (probably email’s computer users were hunt-and-peck typists, so
most important early adopter) would leave keeping commands to a letter or two in length
ARPA, and under his successor, Bob Kahn, was a big time-saver.)
ARPA’s networking focus would change to Of these 30 commands, several were new
developing networks over media other than from BANANARD. Some were minor, such as a
telephone wires (e.g., satellites and radios) and command to toggle the user interface between
the problems of interconnecting those net- a concise and a verbose mode. However, three
works. commands reflect important changes:
Finally, at least from a standards perspec-
tive, the protocol for delivering email enters a N Move reflected Vittal’s attention to user
kind of limbo. The auxiliary protocol specifi- behavior. He noticed that one of the most
cation for email envisioned in the new FTP common activities was to save a message in
specification never appeared. After three years, a file and then delete the message from the
Jon Postel wrote a two-page memo that never inbound mailbox. Vittal created the com-
appeared online, documenting the, by then bined Save/Delete command, Move.
well-established, practice of using MAIL and N Answer (now usually called ‘‘reply’’) is
MLFL. The memo suggests some sites had not widely held to be Vittal’s most insightful
bothered to update their FTP from before the and important invention. Answer exam-
1973 FTP meeting.33 There were multiple ined a received message to determine to
attempts to allow FTP to send a single copy whom a reply should be sent, then placed
of a message to multiple recipients. All of them these addresses, along with a copy of the
apparently failed.34 It would take seven years original SUBJECT field, in a responding
from the FTP meeting before the community message. Among the challenges Vittal had
seriously returned to the problems of a new to solve were the varying email-addressing
email protocol.35 Innovation over the next few standards and what options to give a user
years would come from user agents and a long- (reply to everyone? reply only to the sender
running debate over the format of email of the note?). It took three implementa-
messages, especially email headers. tions to get right.36
N The wonder of Answer is that it suddenly
Rise of the user agent made replying to email easy. Rather than
In early 1974, John Vittal worked in the manually copying the addresses, the user
office next door to Martin Yonke’s office at ISI. could just type Answer and Reply. Users at
Vittal had helped Yonke with BANANARD, and the time remember the creation of Answer
about the time Yonke stopped working on as transforming—converting email from a
BANANARD so he could finish his graduate system of receiving memos into a system
degree, Vittal took a copy of the code and for conversation. (There are anecdotal
began to think about building an improved reports that email traffic grew sharply
user agent. shortly after Answer appeared.37)
N Forward provided the mechanism to send
MSG an email message to a person who was not
Vittal called his new program MSG. In it already a recipient. How much of an
he sought to write a user agent that was simple innovation Forward was is unclear. Barry
yet did all the things a user needed it to do. It Wessler had to struggle with messages
had roughly the same functionality as BANA- embedded in messages in NRD. But the
NARD, but the structure of its commands reflect- formalization of the idea was new.
ed feedback Vittal sought out from users about
how they wanted to manage their email. MSG MSG became the Arpanet’s most popular user
was a personal effort by Vittal (writing code on agent and remained so for several years.
April–June 2008 7The Technical Development of Internet Email
Hermes and MH MS was a user agent for the Unix operating
About the same time Vittal was starting system (apparently the first Unix user agent).
work on MSG, Steve Walker at ARPA created a MS was funded by Steve Walker at ARPA and
new committee called the ‘‘Message Services was created by William Crosby, Steven Tepper,
Committee,’’ charged with thinking about and Dave Crocker.42 MS’s defining character-
email issues. Its focus was on user agents (Al istic appears to have been that it supported
Vezza of MIT remembers a push to get user multiple user interfaces, including one that
agents to support command completion) and sought to mimic a Unix command shell and
email headers. In the summer of 1975, Walker another that mimicked MSG.
also created the MsgGroup mailing list, to Soon after MS was working in 1977, Stock
encourage greater discussion.38 Gaines and Norm Shapiro of RAND wrote an
Motivating these efforts was an ARPA internal memo suggesting that MS was incon-
program called the Military Message Experi- sistent with the style of other Unix pro-
ment (MME) to make email into a useful grams.43 Unix encouraged the use of many
service to the military. As part of this program, small programs, each of which did something
between 1975 and 1979, ISI, BBN, and MIT (in well and creating metaprograms by combining
an advisory role) sought to create user agents the small programs together using a mecha-
designed for the needs of the military. The nism called ‘‘pipes.’’44 Gaines and Shapiro
initial goal was a system for personnel at the suggested the same approach for email: a set
office of the Navy Commander in Chief for the of small programs that managed email, where
Pacific (CINCPAC).39 In a related effort, RAND email messages were stored as separate files in
Corporation was funded to develop a Unix a user’s directory.
email user agent.40 Two years after the memo, a new RAND
Hermes (a BBN project) and MH (at RAND) employee, Bruce Bordon, was assigned to
were products of this program. Another sys- upgrade MS. He recommended to his manage-
tem, called SIGMA, was developed by ISI for ment that rather than upgrade MS, he should
CINCPAC but never used elsewhere. They illus- implement Gaines and Shapiro’s idea. The
trate some of the diversity of user agents of the result was MH.
time. (An interesting side note is that John The virtue of MH is that it makes email part
Vittal worked on both SIGMA and Hermes, of the user’s larger environment.45 Output of
while continuing his work on MSG. So Vittal’s email display programs can be filtered through
personal project was competing with the in- search programs such as grep or simply sent to
house official product. At both ISI and BBN, the printing program. MH, in some ways
MSG won.) anticipated today’s world, where clicking on
Hermes was designed for an office (or an attachment opens the correct program.
command) environment where much of the Culturally, in Unix, rather than clicking on an
email received was kept for reference. It attachment, one pipes data from one program
contained a sophisticated set of mechanisms to the next to produce the desired result.
for filing and searching for messages, including Because MH puts every message in a
a database that recorded key fields from each separate file in a folder (directory), it is easy
message to make searches fast. Hermes also to manipulate both individual messages and
provided a high degree of customization. folders. Accordingly, MH (unlike MS46) has
Readers could create a template of how powerful tools to sort folders and to search,
messages should be displayed, how they should mark, and label messages.
be printed, and even how they should be Through most of the 1980s, MH was
created (what fields a user should be prompted maintained by Marshall Rose, with help from
for). To support this customization, Hermes a number of people, most notably John
had a per-user configuration file (called a Romine, Jerry Sweet, and Van Jacobson.47
profile) remembered as having been large and Others have picked up the task since and MH
complex, though documentation suggests it (much evolved in its code, but still recogniz-
was far simpler than the MH profile file became able as Bordon’s suite of programs) continues
by the mid-1980s.41 Initially known as the to be widely used today.
MAILSYS project, the Hermes team at various
times included Jerry Burchfiel, Ted Meyer, Message formats and headers
Austin Henderson, Doug Dodds, Debbie When Ray Tomlinson sent his email be-
Deutsch, Charlotte Mooers, and John Vittal. tween TENEX systems, he used a format similar
MH (‘‘Mail Handler’’) was the successor and to a business memo. But there was no standard
response to an earlier RAND system, called MS. format for email messages and creating and
8 IEEE Annals of the History of Computingrevising standards for email message formats line)? Or was it ‘‘PDL@MIT-DMS’’ (picking up
would consume a tremendous amount of the host from the ‘‘From: JFH@MIT-DMS’’
effort over the next several years. elsewhere in the header)?
Various mail programs adopted different
such ‘‘abbreviations’’ which drove me crazy.
First message format standard
… To handle all of this protocol chaos, I wrote
Abhay Bhushan, Ken Pogran, Ray Tom- (and rewrote, and tweaked) a sizable (for a
linson, and Jim White (of SRI) took the first LISPish world) chunk of code to try to deduce
step to standardize email headers in RFC-561, the precise meaning of each message header
published in September 1973.48 Their proposal contents and semantics based on where the
was mild. Every email message should have message came from. Different mail programs
three fields (FROM, SUBJECT, and DATE) at the had different ideas about the interpretation of
start. Additional fields were permitted, one per fields in the headers.
line, with each line starting with a single word That code first tried to figure out where an
incoming message had come from. This was
(no spaces) followed by a colon (:). The end of
not so obvious as it might seem because of
this header section was marked by a single redistribution and forwarding of messages,
blank line, after which came the contents of and differences in behavior of various versions
the message. of the other guy’s software. So it wasn’t
The proposed standard was forward looking enough to just look to see if you were talking
even as it lacked some basic features. The to MIT-MULTICS. I remember having condi-
ability to make any word into a header field tional clauses that in essence said ‘‘If I see a
was progressive and left plenty of room for pattern like such-and-such in the headers, this
experimentation. The date field was surpris- is probably a message from version xx.yy of
Ken Pogran’s Multics mailer.’’ With enough
ingly precise, specifying the time to the
such tests, it formed an opinion about which
minute and the time zone. The blank line
mail daemon it was talking with, and which
after the header remains a feature of email mail UI program had created a message.
today. Yet there was no TO field, so a recipient Having hopefully figured out the other
wouldn’t necessarily know who else was to guy’s genealogy (and therefore protocol dia-
receive the message, and, while use of the @ lect), the code then acted based on a painfully
sign was already common, the address format collected set of observations about how that
required using the word ‘‘at,’’ as in TOMLIN- system behaved.52
SON AT BBN-TENEX, with the odd conse-
quence that for several years, people would RFC-680 is notable for documenting the
send emails using ‘‘at’’ in the FROM (and soon, increase in header fields that had taken place
TO) field and yet within the message itself list over two years. It defined a number of widely
their email address with an ‘‘@.’’ used but not standardized header fields,
including most notably, the TO field, but also
Partial progress CC (carbon copy), BCC (blind carbon copy), IN-
In 1975, a team of people working on email REPLY-TO, SENDER, and MESSAGE-ID. Introduction
systems at BBN sought to update RFC-561 with of the TO field meant a format needed to be
RFC-680.49 The work was produced under the chosen for sending to multiple recipients. The
auspices of ARPA’s Message Services Commit- proposal called for multiple email addresses in
tee.50 The RFC authors were Ted Meyer and a field separated by commas. The RFC also
Austin Henderson, but email on the documented the use of @ instead of ‘‘at.’’
MsgGroup mailing list suggests Charlotte RFC-680 was a clear step forward from RFC-
Mooers51 also played a major role. RFC-680 561. Still, RFC-680 had limitations. It was
set out to document a large number of fields, based on practices on TENEX systems, which
many of which were already in widespread but were not always representative of the Arpanet
informal use, and to standardize their formats community as a whole. (For example, the
in a way that computer programs (e.g., user decision to separate addresses in the TO field
agents) could easily parse. with commas was a TENEX convention.) Its
That the header standard needed updating syntax had bugs (it unintentionally permitted
was becoming increasingly clear. Jack Haverty ‘‘@’’ and comma in mailbox names). Further-
offered the following example from his time more, pragmatically, RFC-680, while intended
maintaining the MIT-ITS mailer. to become a standard, was never officially
issued as a standard.53
[A] field like ‘‘To: PDL, Cerf@ISIA’’ was In addition, RFC-680 revealed a philosoph-
ambiguous was ‘‘PDL’’ really ‘‘PDL@ISIA’’ ical split between members of the Message
(picking up the host from the end of the Services Committee. The MIT members (Vezza
April–June 2008 9The Technical Development of Internet Email
and Haverty) felt email headers were primarily The MsgGroup discussion raised two issues.
of use to the email handling programs and First, was the new RFC going to cause much
should be designed to be machine-readable. longer message headers that users would have
Others felt that headers should focus on being to see? Second, wasn’t the major issue simply a
human readable. RFC-680 tried to strike a desire to embed users’ real names into TO and
compromise, which apparently pleased nei- FROM fields and, in that light, were all the other
ther side.54 header fields necessary? The conclusion was
The result was confusion. Some sites up- that extra header information simply reflected
dated their mailers to conform to RFC-680 the reality of what had already happened, and
while others continued to follow RFC-561. the desire not to see them pointed to a need for
user agents to edit header information, and
A new standard that yes, adding names mattered.
Sometime in 1976, the Message Services The Header-People debate was rooted in
Committee was replaced by the ARPA Com- specification details. The best example of the
mittee on Human-Aided Communication.55 tenor of discussion is a multiday argument
One of the new committee’s early actions was (rich with ad hominem remarks) about wheth-
to seek to clarify the state of standards for er to use 12-hour or 24-hour times in the DATE
email message formats. A vigorous email field, with much debate about whether
discussion on the Header-People mailing list ‘‘12am’’, ‘‘12pm’’, or ‘‘12m’’ was the correct
in the fall of 1976 led to a new proposed abbreviation for midnight. The upshot was to
standard in RFC-724 (‘‘Proposed Standard for eliminate support for 12-hour times.58
Message Format’’) written by Ken Pogran The result was RFC-733, a revision (by the
(MIT), John Vittal (now at BBN), Dave Crocker, same authors) of RFC-724. The major improve-
and Austin Henderson.56 It came out in early ment in the revision (beyond the date field)
1977. was a clear statement of how to include names
The RFC-724 authors, like the RFC-680 with email addresses. The format was to put
authors, sought mostly to document current the email address in angle brackets (, .) as in
practice. Vittal nicely summarized the goals as: ‘‘David H. Crocker’’ ,crocker@rand-unix.,
and if the text before the brackets contained
to take RFC680 plus what we felt were things any special characters such as punctuation or
which people were already doing that were control characters, it had to be in quotes. The
useful to most, take out some things that RFC also made clear that mailing lists looked
weren’t terribly useful and probably shouldn’t like any other mailbox.59 Issued in November
have been in 680 in the first place, and come 1977, RFC-733 was the official standard for
up with a new specification. There were message formats for five years, and a de facto
several things that some systems were already standard well into the mid-1980s.
doing: comments (e.g. the day of week in
parentheses), association of people names Today’s standard
with user names (like at places like Stanford,
In 1982, as the email community was
CMU and MIT, also using parenthesization),
random date format preferences (Multics vs
preparing to transition to the Internet, the
Tenex, etc.), and so on. Elements of 680 which authors of RFC-733 were asked to update it.
were not perceived as necessary were mostly The authors of 733 had several conversations
the military-like field names such as prece- about what the changes should be, but only
dence, as well as syntactic inconsistencies Dave Crocker (who had become a graduate
(bugs), and syntactic limitations. These could student at the University of Delaware) had the
all be accomplished by using the notion of time to undertake the revisions. Several fea-
user-defined fields.57 tures of RFC-733 that had failed to win popular
acceptance were deleted, and three new fields,
RFC-724 defined a text-only message format. FORWARDED, RESENT-FROM, and RESENT-TO, were
The message header and contents were ASCII. added (to support the common practice of
The authors observed that, at some point in forwarding an email message to someone else).
the future, clearly email would use richer A more startling feature (in retrospect) was
binary formats, but that was beyond the the addition of the RECEIVED field. RECEIVED is
immediate need. odd because it, alone of all the fields in the
The new RFC provoked a tremendous message header, was created by MTAs rather
amount of debate on Header-People and a than UAs. Every MTA was required to insert a
more focused (and very distinct) discussion on RECEIVED field into the message, to track the
MsgGroup. message’s path through the network. Looking
10 IEEE Annals of the History of Computingback, this is an odd and subtle architectural and they used it.64 By the mid-1970s, imple-
change that made MTAs responsible for menting an MTA was getting harder, not
understanding the format of messages, which because email had become more difficult, but
previously (ignoring the practical problem of because the profusion of slightly different
address rewriting; see the next section) MTAs MTAs meant that everyone’s MTA had to be
had not needed to understand. programmed to deal with the differences.
The result, written by Crocker and pub- For example, there was considerable dis-
lished in August 1982, was RFC-822. RFC-822, agreement about whether one had to login to
or more commonly, simply 822 format, the remote system (FTP had a login command
remains the basic standard a quarter century called User) before trying to deliver email with
later. (An updated version appeared as RFC- MLFL. Multics required a login. TENEX did not.
2822 in 2001, but the basic format is un- So MTAs had to include code to recognize
changed.)60 when they were talking to Multics and when
Before we leave the discussion of the to TENEX and adapt their behavior accordingly.
evolution of message formats, a few observa- SMTP, because it was well-specified, even-
tions are in order. First, developing a message tually solved this problem (see the ‘‘SMTP and
format was a difficult intellectual problem. avoiding second system syndrome’’ section).
RFC-822 is 47 pages long and a combination of Unfortunately, by this point, a new problem
an augmented Backus-Naur notation that had arisen: multiple email networks.
defined each field’s format and briefly stated
each field’s semantics. It is comparable in Bitnet, CSnet, and UUCP
complexity to the computer language specifi- Between 1978 and 1981, three major email
cations of the time. Second, it is hard to networks were created. Although the Internet
understate the importance of RFC-733. RFC- remained the largest network throughout the
733 came out early enough to become the de 1980s, these three networks (UUCP, CSnet,
facto standard for email message formats and Bitnet) would grow big enough to influ-
throughout much of the world. The UUCP ence email standards. The UUCP network was
network, the Computer Science Network comparable to the Internet in size. And, almost
(CSnet) and Bitnet all ended up using RFC- from the start, the four networks were inter-
733 format for their email messages.61 connected,65 creating massive challenges for
MTAs of routing between four networks (not
Evolving the MTA counting the smaller networks that appeared)
SNDMSG was the earliest MTA. It simply with different address formats.
delivered the message or returned an immedi-
ate error message saying it had failed. After
about a year, Bob Clements enhanced SNDMSG UUCP network. The UUCP network
to retransmit messages if the remote host was (named for the Unix-to-Unix CoPy program
down.62 About two years later, SNDMSG was over which it was built) began inside AT&T in
updated to place each message in a file in the 1978.66 It used dial-up telephone links to
user’s directory (one file per email) and a new exchange files and within a few months was
program, called MAILER, would periodically moving email. AT&T soon distributed the
pick up and deliver email files in the user’s software and the UUCP network, made up of
directory.63 (Observe that this change convert- cooperating sites, was off and running. Over
ed SNDMSG to a user agent, with MAILER taking the next decade it grew at a prodigious rate,
on the role of MTA.) such that by 1990, its population was estimat-
In a nutshell, that incremental evolution ed at a million users—comparable to the
describes the experience of developing MTAs Internet’s population.67
in the 1970s. Each operating system would The UUCP network was a multihop net-
implement an MTA, which was then refined work. To reach machine V, an email from
over the years to deal with environmental machine M might have to pass through
conditions. intermediate systems Q and T. The motivation
Unfortunately, the different MTAs evolved for this approach was to minimize phone bills.
differently. The underlying problem was that In the 1970s and early 1980s, long distance
email via FTP was underspecified. (It is useful to calls were expensive, and the rates differed by
observe that the specification for email delivery hour (with evening and night rates being
with FTP was two pages long, while the SMTP sharply lower). Modems were slow (a couple
specification, when it appeared, was 68 pages hundred bytes per second was considered
long.) Implementers had considerable latitude, good) and files were (relatively speaking) large.
April–June 2008 11The Technical Development of Internet Email
So the typical operating mode at any UUCP
site was to save up all email until 5 p.m., then
call a nearby UUCP site to forward email along CSnet was designed to
and receive inbound email. Indeed, over the
course of the night, several phone calls would become self-supporting.
be made to push outbound mail and receive
inbound mail. Depending on the calling The ARPA and NSF fund-
schedules and the connectivity of the ma-
chines, email could travel a few or several hops ing was only to provide
before the nightly calling frenzy ended.
Initially, the person composing the email start-up capital and an
had to spell out the entire path a piece of email
needed to take through the network. In the initial operations budget.
UUCP network, the hops were separated by
exclamation points (‘‘!,’’ pronounced as
‘‘bang’’). So, someone mailing the author via CSnet was designed to become self-support-
UUCP from UC Berkeley in the 1980s would ing. The ARPA and NSF funding was only to
send it to ucbvax!ihnp4!harvard!bbn!craig (in provide start-up capital and an initial operations
which each text string followed by a ‘‘!’’ is budget. For the first two years, CSnet operations
known as a hop; this example has four hops). were distributed between the University of
In 1982, Steve Bellovin wrote pathalias, a Wisconsin and the University of Delaware, with
tool designed to compute paths from a help from RAND (which ran a gateway on the
network map. He refined it with Peter Honey- West Coast). Beginning in 1983, the network
man.68 Pathalias was distributed widely. Now,
was operated by BBN, where a team of roughly
by keeping a map of regional connectivity, it
10 people provided technical support (includ-
became possible to email via landmark sites
ing writing or maintaining much of the email
and have them fill in the missing hops. So, for
software used by CSnet members), user services,
instance, the author’s address could be re-
and did marketing and sales. By 1988, CSnet was
duced to ihnp4!bbn!craig and the harvard hop
self-supporting and had approximately 180
would be dynamically inserted.
members, most of them computer science
In 1984, Mark Horton began an effort to
departments in North America.
create a complete UUCP network map, which
Technologically, CSnet did everything pos-
reached fruition about 1986. After that, UUCP
sible to make its members feel part of the
users could simply type sitename!user, and
Internet community. Initially, connectivity
pathalias would compute a path to sitename
for them. An even fancier trick was to add a was almost entirely email only, using dial-up
network domain to the sitename, such as phone service. Over time, direct access via IP
bbn.arpa!craig, and pathalias would compute a was also supported over a variety of media,
path to an email gateway between the UUCP including IP over X.2571 and the first dial-up IP
network and the Internet. network.72
After 1983, email in CSnet all went through
CSnet. By the late 1970s, the computer a single email gateway, CSNET-RELAY, which sat
science research community realized that the on both CSnet and the Internet. Email was
Arpanet was changing how people did re- routed by addressing it to the relay, with the
search. Researchers who had access to a user address being the target address on the
network got information more quickly, and other network. The syntax used a percent sign
could collaborate and share work more easily. (%) to divide the next hop user name from
Thus was identified the first ‘‘digital divide’’— relay address. So, to get from the Internet to a
between computer science departments that CSnet host, one emailed to user%host.csnet@
had access to Arpanet and those that did csnet-relay.arpa. From CSnet, one emailed
not.69 user%host.arpa@csnet-relay.csnet. Email was for-
The goal of the Computer Science Network matted according to RFC-733 and 822 stan-
(CSnet) was to bridge that gap. Created in 1981 dards.
by the National Science Foundation in coop-
eration with ARPA, CSnet linked computer Bitnet. Bitnet was established in the
science departments and industrial research same year as CSnet, but with a different
laboratories to the Arpanet (and then the driving force. Bitnet (‘‘Because It’s There’’ or,
Internet).70 later, ‘‘Because It’s Time’’) was created by
12 IEEE Annals of the History of Computinguniversity computer centers (now information instance, if someone told you he was bob@
technology offices) to interconnect their com- princeton, one had to immediately ask ‘‘which
puting facilities with email and file transfer. network’’ because princeton.bitnet and princeton.
Because the centers typically used IBM main- csnet were different machines and were not
frames running the VM operating system, interconnected. If a user forgot, or her email
Bitnet was constructed from low-speed leased software removed the network appellation
lines running IBM networking software, on (e.g., .csnet) the email would be delivered to
which email was overlaid. the bob@princeton in whichever network the
Like CSnet, Bitnet used Internet email sender was in.
standards (with the %-hack in the email The second problem was that, even if one
address for gatewaying). Unlike CSnet, Bitnet knew which network an email address was in,
did not have a central management or support getting it there was not easy. To take a
center. Instead, most functions were volunteer relatively common example, consider the
activities, with coordination provided by following four addresses:
Educom (Interuniversity Communications
ihnp4!ucbvax!bob%princeton.csnet@
Council). In mid-1988, Bitnet had nearly 400
csnet-relay.arpa
member sites.
bob%princeton.csnet%csnet-relay.arpa@
The boards of Bitnet and CSnet overlapped
wiscvm
and the two networks eventually merged, so
bob%princeton.csnet@csnet-relay.arpa
one may wonder why they were distinct in the
bob@princeton
first place. The distinction lies in the relation-
ship, often contentious, between computer These represent the four likely addresses for
science departments and computing centers in reaching bob at Princeton’s CSnet host, from
the 1970s and 1980s. Computer science depart- the UUCP network, Bitnet, the Internet, and
ments typically maintained their own comput- CSnet respectively. If the examples are not
ing facilities, to enable research by computer painful enough, consider the first address and
science faculty. Computing centers were uni- how it would be handled in transit.
versity-wide resources that sought to provide It starts in the UUCP network and is passed
stable computing environments for researchers to ihnp4 (a key UUCP relay at Bell Labs in
in other disciplines. The stereotype was that Naperville, Illinois). Ihnp4 must puzzle out
computer science departments ran cutting-edge ucbvax!bob%princeton.csnet@csnet-relay.arpa and
operating systems on minicomputers and decide if the email address is to the left of
workstations while computing centers ran the @ sign (Internet style) or to the right of
established commercial operating systems on the bang (UUCP style). As ihnp4 is a UUCP-
mainframes. More important, from an institu- only system, it knows to use UUCP ad-
tional perspective, the computer science de- dressing and passes the message to ucbvax
partment typically provided a haven for those at the University of California at Berkeley.
on campus who were (for whatever reason) Ucbvax is a gateway on both the Internet
disgruntled with the computing center. Neither and UUCP networks so it must puzzle out
party particularly wanted to rely on the other for bob%princeton.csnet@csnet-relay.arpa. Thank-
network access, with the result that there were fully, ucbvax was not on CSnet and clearly
two networks: one for each community. not the same system as csnet-relay.arpa, so
bob%princeton.csnet is no good. Thus the
Email addressing across networks. The message must be sent to the CSnet relay
four networks (including the Internet) period- (and, because Arpanet did not strip mailing
ically viewed themselves as competitors. Yet information, it remains bob%princeton.csnet@
the four networks were also committed to csnet-relay.arpa). CSnet’s relay in turn extracts
making email work among them. A number of the address to the left of the @ sign, to get
sites brought up gateways between the net- bob%princeton.csnet and delivers the email to
works. Even more sites made a point of Princeton.
residing on more than one network, to ensure Observe that there’s ample chance for
ease of mailing for their users. confusion. Another nasty problem was that
It is widely agreed that, by the early 1980s, each mailer had to make sure that the FROM
email addresses were a disaster both for users address in the email was updated (and some-
trying to email across networks, and network times the TO and CC addresses as well) so that
administrators trying to keep the email flowing. the recipient of the email could successfully
The disaster had two dimensions. First, one reply to it. Yet another challenge was that, for
had to know which network a user was on. For a period, the United Kingdom decided to
April–June 2008 13The Technical Development of Internet Email
reverse the order of labels in a domain name regarding delivery. If, by some mischance, the
(so Kirstein@uk.ac.ucl.cs) with the result that message had to be queued, arpa (not deliver-
some mailers had to parse names backward mail) would queue it.
and forward (‘‘bothways’’ mode) to see if they To parse the address, delivermail used the
made sense. simple expedient of assuming that an at-sign
It is no surprise that the people who made meant Arpanet mail, an exclamation point in
major contributions to email MTAs at this the address meant UUCP, and a colon meant
time were people closely affiliated with email the local BERKNET protocols. For each address
gateways. type, delivermail could be configured either to
call a program to deliver the mail, or call a
program to relay the mail to the appropriate
delivermail, sendmail, and mmdf
gateway (one email gateway per type).
The appearance of new email networks
The delivermail MTA had a powerful aliases
transformed the complexity of the MTA. Now,
features, in which a destination address could
at least on systems that were on multiple email
be expanded to a list of email addresses. It also
networks, the MTA had to understand multiple
had a first class logging system (a way to record
addressing formats and routing rules and
what delivermail did) called syslog. Email
competently move messages between the var-
systems were developing increasingly sophis-
ious networks as appropriate. One sign that the ticated logging mechanisms; syslog was so good
problem of writing an MTA had gotten hard that it eventually became a standard part of
was that it became the subject of serious BSD Unix and is now used by a wide range of
academic research. The major contributions applications.
were made by two graduate students: Eric One surprising feature of delivermail was
Allman at UC Berkeley (delivermail and send- that part of its configuration was compiled
mail) and Dave Crocker (who had left RAND to into the program. That is, for each machine,
study at the University of Delaware, where he one compiled a custom version of delivermail.
wrote mmdf). So, for instance, if the machine was connected
Both men were trying to solve essentially the to Arpanet, one compiled delivermail with the
same problem: supporting multiple email net- –DHAS_ARPA flag to the C compiler.
works in one system. Allman needed an MTA
for UC Berkeley’s main email system, which
mmdf. About the same time that Allman
served as the university’s email gateway be-
was creating delivermail, Dave Crocker was
tween the UUCP network and the Arpanet and
writing the first version of mmdf (the Multi-
local email delivery. Crocker needed an MTA to
channel Memo Distribution Facility).74 Rather
support local email, Arpanet email, and a new
than seek to process each message immediate-
phone-based delivery system which eventually
ly, as delivermail did, Crocker sought to
became CSnet’s PhoneNet protocol. The two
decompose the process into multiple stages.
men solved the problem very differently.
When a message arrived (via the network or
from a user agent), the message was given to a
delivermail. Allman’s delivermail, the program called submit, which checked that the
simplest of these MTAs, was written for message format was correct (here the common
Berkeley’s BSD Unix operating system in use of 733 format was a big win) and then
1979 and was a basic program73 not greatly looked at the address to decide what network
more complex in its workings than Bob the message was to go out on. The message was
Clements’ 1973-vintage SNDMSG. When in- assigned to a ‘‘channel.’’ Each channel had its
voked by a user agent (or the inbound FTP own queue: a directory where messages and
server), delivermail expected to be given a their ‘‘envelopes’’ (control information) were
message, which it would either deliver or stored. Simply, submit placed the message in
return an error message. The big difference the right queue.
was that delivermail implemented a layer of Another program, called deliver, was regu-
indirection. Rather than delivering the mes- larly scanning the queues for messages. When
sage to a mailbox or a remote system, deliver- a new message appeared, deliver called on a
mail looked at the destination address and channel-specific program (e.g., mmdf’s equiv-
then picked a program to deliver the message alent of delivermail’s arpa program for Arpanet
to. So, for instance, to deliver Arpanet mail via email) to deliver the message. If message
FTP, delivermail called an auxiliary program delivery failed, submit was called to send the
called arpa and passed the mail to the arpa message back to its sender. If there was a
program and waited for a (real-time) response transient error (e.g., the remote host was
14 IEEE Annals of the History of Computingdown), the message was left in the queue and N The address parsing rules and message
deliver would try it again later. delivery rules were defined by a grammar
The mmdf MTA also supported aliases and in the configuration file.
had a fine logging system. N sendmail now maintained its own message
An important contribution of mmdf was queue.
achieving an effective split of the message N Certain delivery programs (most notably
delivery process. Diagnosing email problems email delivery via SMTP) were compiled
(whether configuration problems or problems into sendmail instead of client programs
with particular messages) was cleanly com- (e.g., arpa).
partmentalized. Similarly, submit prevented
junk from entering the system; deliver handled But this list understates the transformation
problems in delivery. An operator knew where from delivermail to sendmail: sendmail was
the problem was by seeing which program was almost an order of magnitude more complex
complaining in the logs. (measured in lines of code) and tremendously
Another contribution was restriction of more flexible.
privileges. One of the key problems in any The changes had an interesting mix of con-
mail system is that whatever program delivers sequences. Probably the most important conse-
mail to the user’s mailbox needs special quence was flexibility. Placing address parsing
privileges. In mmdf, that was one small and configuration rules in a grammar made it
program, the local channel delivery process. possible to dynamically configure sendmail for
All the other processes could be run as a regular arbitrarily complex email environments.
user (usually called ‘‘mmdf’’). Another consequence was a reinforcement
The channel model also proved flexible. A of delivermail’s approach of putting all the
message could go through multiple channels email expertise into one program. SMTP was
before leaving a system. Soon, mmdf developed now embedded in sendmail. So too was queue
a ‘‘list’’ channel to handle mailing lists. A management. It made sendmail a complex
message was placed in the list channel to have program and hard to change. Allman later
its destination address expanded. It exited the noted that sendmail should have been better
list channel by being placed in one or more decomposed into constituent functions, even
channels to be delivered to members of the if only internally.76
mailing list. Later, when MX resource records An unexpected consequence was that craft-
were introduced (see the ‘‘Email routing with ing and debugging sendmail’s single configu-
domain names’’ section), they introduced a ration file (sendmail.cf) became a central
new error: a domain name that (because of preoccupation (some would say headache)
DNS problems) could not currently be looked for system administrators over the next several
up. In mmdf this was trivially handled by years. A properly working email system re-
creating a new channel, where submit placed quired the configuration file be right. And
messages whose addresses could not be re- sendmail’s grammar (with a fondness for
solved at the moment. single-letter tokens, which made mnemonic
A downside of mmdf was that rather than naming impossible) gave administrators many
one configuration file, there were several, opportunities to make a mistake.
scattered in different places. While each con-
figuration file was simple (a list of attribute: Evolution and perspective
value pairs), the sheer number of them could Over the 1980s, both sendmail and mmdf
prove frustrating. prospered: mmdf was substantially reworked
by Crocker, Doug Kingston (of the Army’s
sendmail. Based on experience with deli- Ballistic Research Laboratory), Steve Kille (of
vermail, Eric Allman decided to write a new University College London), and Dan Long
MTA for release with the 4.2 version of BSD and me (of BBN) into a new release called
Unix. The new MTA was called sendmail. mmdf2, which was used at a number of major
Culturally, sendmail was similar to deliver- email centers in the mid- and late 1980s.
mail. But from a practical perspective, it was Also, mmdf inspired PMDF, a rewrite of
quite different. Major differences included the mmdf in Pascal for the VMS operating system.
following:75 The initial implementation was done by Ira
Winston at the University of Pennsylvania. It
N Configuration was determined by a file, was then maintained and substantially revised
called sendmail.cf, rather than being com- by Mark Vassol and Ned Freed (then at
piled in. Oklahoma State University). PMDF became a
April–June 2008 15You can also read