UNINETT
January 1998
Mapping between X.400 and RFC-822/MIME Message Bodies
Status of this Memo
-
This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.
Copyright Notice
-
Copyright © The Internet Society (1998). All Rights Reserved.
Table of Contents
-
1 Introduction ........................................... 2 1.1 Glossary ............................................. 3 2 Basic rules for body part conversion ................... 4 2.1 Generating the IPM Body from MIME .................... 5 2.2 Generating the MIME Body from the IPMS.Body .......... 6 2.3 Mapping the EMA FTBP parameters ...................... 7 2.3.1 Mapping GraphicStrings ............................. 7 2.3.2 Mapping specific parameters ........................ 7 2.3.3 Summary of FTBP elements generated ................. 10 2.4 Information that is lost when mapping ................ 11 3 Encapsulation of body parts ............................ 11 3.1 Encapsulation of MIME in X.400 ....................... 12 3.1.1 FTBP encapsulating body part ....................... 12 3.1.2 BP15 encapsulating body part ....................... 13 3.1.3 Encapsulation using IA5 (HARPOON) .................. 15 3.1.4 Content passing using BP14 ......................... 16 3.2 Encapsulating X.400 Body Parts in MIME ............... 16 3.3 Encapsulating FTBP body parts in MIME ................ 17 4 User control over the gateway choice ................... 18 4.1 Conversion from MIME to X.400 ........................ 18 4.2 Conversion from X.400 to MIME ........................ 20 5 The equivalence registry ............................... 21 5.1 What information one must give about a mapping ..................................................... 21 5.2 Equivalence summary for known X.400 and MIME Types ................................................ 22 5.3 MIME to X.400 Table .................................. 23 5.4 X.400 to MIME Table .................................. 23 5.5 Use of OBJECT IDENTIFIERs and ASN.1 MACROS ........... 24 6 Defined Equivalences ................................... 26 6.1 IA5Text - text/plain ................................. 26 6.2 GeneralText - text/plain (ISO-8859) .................. 27 6.3 BilaterallyDefined - application/octet-stream ...................................................... 29 6.4 FTBP EMA Unknown Attachment - application/octet-stream ............................. 29 6.5 MessageBodyPart - message/RFC822 ..................... 30 6.6 MessageBodyPart - multipart/* ........................ 31 6.7 Teletex - Text/Plain (Teletex) ....................... 32 7 Body parts where encapsulation is recommended .......... 33 7.1 message/external-body ................................ 34 7.2 message/partial ...................................... 35 7.3 multipart/signed ..................................... 35 7.4 multipart/encrypted .................................. 36 8 Conformance requirements ............................... 37 9 Security Considerations ................................ 38 10 Author's Address ...................................... 38 11 Acknowledgements ...................................... 38 References .............................................. 38 APPENDIXES .............................................. 41 Appendix A: Escape code normalization ................... 41 Appendix B: OID Assignments ............................. 44 Appendix C: Registration information for the Teletex character set ............................... 46 Appendix D: IANA Registration form for new mappings ................................................ 48 Full Copyright Statement ................................. 49
1. Introduction
-
This document is a companion to [MIXER], which defines the principles and translation of headers for interworking between MIME-based RFC- 822 mail and X.400 mail.
This document defines how to map body parts of X.400 messages into MIME entities and vice versa, including the handling of multipart messages and forwarded messages.
1.1. Glossary
-
The following terms are defined in this document:
Body part
-
Part of a message that has a unique type. This term comes from X.400; the corresponding term in MIME (RFC 2046) is limited to use in parts of a multipart message; the term "body" may correspond better.
Content-type
-
Type information indicating what the content of a body part actually is. This term comes from MIME; the corresponding X.400 term is "body part type".
Mapping
-
(noun): A description of how to transform an X.400 body part into a MIME body part, or how to transform a MIME body part into an X.400 body part.
Equivalence
-
A set of two mappings that taken together provide a lossless conversion between an X.400 body part and a MIME body part
Encapsulation
-
The process of wrapping something from one of the mail systems in such a way that it can be carried inside the other mail system. When encapsulating, it is not expected that the other mail system can make reasonable sense of the body part, but a gateway back into the first system will always be able to convert the body part without loss back to its original format.
HARPOON encapsulation
-
The encapsulating of a MIME body part by putting it inside an IA5 body with all headers and encoding intact. First described in RFC 1496 [HARPOON].
Tunneling
-
What happens when one gateway encapsulates a message and sends it to another gateway that decapsulates it. The hope is that this will cause minimal damage to the message in transit.
DISCUSSION
-
At many points in this document, the author has found it useful to include material that explains part of the reasoning behind the specification. These sections all start with DISCUSSION: and continue to the next numbered section heading; they do not dictate any additional requirements on a gateway.
The words MUST, SHOULD and MAY, when capitalized, are used as defined in RFC 2119 [MUST].
2. Basic rules for body part conversion
-
The basic approach for translating body parts is described in section 2.1 and 2.2.
Chapter 3 gives details on "encapsulation", which allows you to be certain that no information is lost even when unknown types are encountered.
Chapter 6 gives the core mappings for various body parts.
The conformance requirements in chapter 8 describe what the minimum conformance for a MIXER gateway is with respect to body part conversion.
DISCUSSION:
At the moment both the MIME and the X.400 worlds seem to be in a stable state of flux with regards to carrying around stuff that is not text. In such a situation, there is little chance of defining a mapping between them that is the best for all people, all of the time. For this reason, this specification allows a gateway considerable latitude in deciding exactly what conversion to apply.
The decision taken by the gateway may be based on various information sources:
(1) If the gateway knows what body parts or content types the recipient is able to handle, or has registered a particular set of preferences for a user, and knows how to convert the message reasonably to those body parts, the gateway may choose to convert body parts in the message to those types only. (2) If the gateway gets indications (via special headers or heading-extensions defined for the purpose) that the sender wanted a particular representation on the "other side", and the gateway is able to satisfy the request, it may do so. Such a mechanism is defined in chapter 4 of this document. (3) If the gateway gets a message that might be appropriate to send as one out of several types, but where the typing information does not tell you which one to use (like an X.400 BP14, FTAM "just a file", or MIME application/octet-stream), it may apply heuristics like looking at content or looking at filenames to figure out how to deal with the message. (4) If the gateway knows that the next hop for the message has limited capabilities (like X.400/84), it may choose to perform conversions appropriate for that medium. (5) Where no mapping is known by the gateway, it may choose to drop the body part, reject the message, or encapsulate the body part as described in chapter 3. The choice may be configurable, but a conformant MIXER gateway MUST be able to be configured for encapsulation.
In many cases, a message that goes SMTP->X.400->SMTP will arrive without loss of information.
In some cases, the reverse translation may not be possible, or two gateways may choose to apply different translations, based on the criteria above, leading to an apparently inconsistent service.
In addition, service will vary because some gateways will have implemented conversions not implemented by other gateways.
This is believed to be unavoidable.
2.1. Generating the IPM Body from MIME
-
When converting the body of a message from MIME to X.400, the following steps are taken:
If the header does not contain a 822.MIME-Version field, then generate an IPMS.Body with a single IPMS.BodyPart of type IPMS.IA5TextBodyPart containing the body of the RFC 822 message with IPMS.IA5TextBodyPart.parameters.repertoire set to the default (IA5).
If 822.MIME-Version is present, the body is analyzed as a MIME message and the body is converted according to the mappings configured and implemented in the gateway.
2.2. Generating the MIME Body from the IPMS.Body
-
When converting the body of a message from X.400 to MIME, the following steps are taken:
If there is more than one body part, and the first body part is IA5 and starts with the string "RFC-822-Headers:" as the first line, then the remainder of this body part shall be appended to the RFC 822 header. This relies upon the theory that this body part has been generated according to Appendix B of MIXER. A gateway shall check the consistency and syntax of this body part, to ensure that the resulting message is conformant with RFC 822.
If the remaining IPMS.Body consists of a single IPMS.Bodypart, there are three possibilities.
(1) If it is of type IPMS.IA5Text, and the first line is "MIME-Version: 1.0", it is assumed to be a HARPOON-encapsulated body part. The complete body content is then appended to the headers; the separating blank line is inside the message. If an RFC 822 syntax error is discovered inside the message, it may be mapped directly as described below instead. (2) If it is of type IPMS.IA5Text, then this is mapped directly and the default MIME encoding (7bit) is used, unless very long lines or non-ASCII or control characters are found in the body part, in which case Quoted-Printable SHOULD be used. (3) All other types are mapped according to the mappings configured and implemented in the gateway.
If the IPMS.Body contains multiple IPMS.Bodypart fields, then a MIME message of content type multipart is generated. If all of the body parts are messages, then this is multipart/digest. Otherwise it is multipart/mixed. The components of the multipart are generated in the same order as in the IPMS.Body.
Each component is mapped according to the mappings configured and implemented in the gateway; any IA5 body parts are checked to see if they are HARPOON mappings, as described above.
2.3. Mapping the EMA FTBP parameters
-
DISCUSSION:
EMA has defined a profile for use of the File Transfer Body Part (FTBP). [MAWG]
New mappings are expected to use this as the mechanism for carrying body parts, and since it is important to have a consistent mapping for the special FTBP parameters, these are defined here.
The mapping of the body will depend on the content-type in MIME and on the application-reference in FTBP, and is not specified here.
However, in many cases, we expect that the translation will involve simply copying the octets from one format to the other; that is, "no conversion".
2.3.1. Mapping GraphicStrings
-
Some parameters of the EMA Profile are encoded as ASN.1 GraphicStrings, which are troublesome because they can contain any ISO registered graphic character set. To map these to ASCII for use in mail headers, the gateway may either:
(1) Use the RFC 2047 [MIME-HDR] encoding mechanism to create appropriate encoded-words for the headers involved. Note that in some cases, such as within Content-Disposition filenames, the encoded-words must be in quotes, which is not the normal usage of encoded-words. (2) Apply the normalization procedure given in Appendix A to identify the ASCII characters of the string, and replace all non-ASCII characters with the question mark (?).
Both procedures are valid for MIXER gateways; the simplified procedure of ignoring escape sequences and bit-stripping the result is NOT valid.
2.3.2. Mapping specific parameters
-
The following parameters are mapped in both directions:
Content-ID
-
The mapping of this element is complex.
The Content-ID is encoded as an IPM.MessageIdentifier and entered into the FTBP.FileTransferParameters.related-stored-file. file- identifier.cross-reference.message-reference. FTBP.FileTransferParameters.related-stored-file. relationship.descriptive-relationship is set to the string "Internet MIME Body Part". FTBP.FileTransferParameters.related-stored-file. file- identifier.cross-reference.application-crossreference is set to a null OCTET STRING.
-
The reverse mapping is only performed if the FTBP.FileTransferParameters.related-stored-file. relationship.descriptive-relationship has the string value "Internet MIME Body Part".
Content-Description
-
The value of this field is mapped to and from the first string in FTBP.FileTransferParameters.environment.user-visible-string.
Content-Disposition
-
This field is defined in [CDISP]. It has multiple components; the handling of each component is given below.
The "disposition" component is ignored on MIME -> X.400 mapping, and is always "attachment" on X.400 -> MIME mapping.
C-D:
filename
-
The filename component of the C-D header is mapped to and from FileTransferParameters.file-attributes.pathname.
The EBNF.disposition-type is ignored when creating the FTBP pathname, and always set to "attachment" when creating the Content-Disposition header. For example:
-
Content-Disposition: attachment; filename=dodo.doc
-
or
Content-Disposition: attachment; filename=/etc/passwd
-
-
The filename will be carried as a single incomplete-pathname string. No special significance is assumed for the characters "/" and "\". Note that normal security precautions MUST be taken in using a filename on a local file system; this should be obvious from the second example.
This is done to be conformant with the EMA Profile.
C-D:
Creation-date Mapped to and from FileTransferParameters.file-attributes.date- and-time-of-creation
-
For this and all other date fields, the RFC-822 date format is used (822.date-time). Note that the parameter syntax of [CDISP] requires that all dates be quoted!
C-D:
Modification-date Mapped to and from FileTransferParameters.file-attributes.date- and-time-of-last-modification
C-D:
Read-date Mapped to and from FileTransferParameters.file-attributes.date- and-time-of-last-read-access
C-D:
Size
-
Mapped to and from FileTransferParameters.file-attributes.object- size. If the value is "no-value-available", the component is NOT generated.
Other RFC-822 headers Mapped to extension in FTBP.FileTransferParameters.extensions using the rfc-822-field HEADING-EXTENSION from [MIXER].
NOTE:
-
The set of headers that are mapped will depend on the placement of the body part (single body part or multipart).
When it is the only body of a message, headers starting with "content-" SHOULD be put into the FTAM extension, and all other headers should be put into the IPMS extension for the message. When it is a single bodypart of a multipart, ALL headers on the body part are included, since there is nowhere else to put them. Note that only headers that start with "content-" have defined semantics in this case.
EMA NOTE
-
The EMA profile, version 1.5, specifies that handling of extensions is Optional for reception. This means that some non- MIXER gateways may not implement handling of this field, and some UAs may not have the possibility of showing the content of this field to the user.
An alternative approach using FTBP.FileTransferParameters.environment.user-visible-string was suggested to EMA, and the EMA MAWG recommended in its April 1996 conference that the IETF MIXER group should rather choose this approach.
-
2.3.3. Summary of FTBP elements generated
-
This is a summary of the preceding section, and does not add new information.
The following elements of the FTBP parameters are mapped or used (the rightmost column gives their status in the EMA profile; M=Mandatory, O=Optional, R=Recommended for Origination/Receipt):
FileTransferParameters M/M Related-Stored-File O/O file-identifier cross-reference application-crossreference NULL message-reference Content-ID descriptive-relationship Used as marker contents-type Must be unstructured-binary M/M environment M/M application-reference Selects mapping M/M user-visible-string Content-description R/M file-attributes pathname C-D: Filename R/M date-and-time-of-creation C-D: Creation-Date O/O date-and-time-of-last-modification C-D: Modification-Date R/M date-and-time-of-last-read-access C-D: Read-Date O/O object-size C-D: Size R/M extensions Other headers O/O
-
All other elements of the FTBP parameters are discarded.
NOTE: There is ongoing work on defining a more complete mapping between FTBP headers and a set of RFC-822 headers. A gateway MAY choose to support the larger set once it is available, but MUST support this limited set.
2.4. Information that is lost when mapping
-
MIME defines fields which add information to MIME contents. Two of these are "Content-ID", and "Content-Description", which have special rules here, but MIME allows new fields to be defined at any time.
The possibilities are limited about what one can do with this information:
(1) When using encapsulation, the information can be preserved (2) When using mapping to FTBP, the information can be preserved in the FileTransferParameters.extensions defined for that purpose. (3) When mapping to a single-body message, the information can be preserved as P22 header extensions (4) When mapping to other body part types, the information must be discarded.
3. Encapsulation of body parts
-
Where no mapping is possible, the gateway may choose any of the following alternatives:
- Discard the body part, leaving a "marker" saying what happened - Reject the message - "Encapsulate" the body part, by wrapping it in a body part defined for that purpose in the other mail system
The choice to be made should be configurable in the gateway, and may depend on both policy and knowledge of the recipient's capabilities.
3.1. Encapsulation of MIME in X.400
-
Four body parts are defined here to encapsulate MIME body parts in X.400.
This externally-defined body part is backwards compatible with RFC 1494. The FTBP body part is compatible with the EMA MAWG document [MAWG], version 1.5, but has some extensions, in particular the one for extra headers.
The imagined scenarios for each body part are:
FTBP For use when sending to recipients that can handle
-
generic FTBP, and for tunnelling MIME to a MIME UA
BP15 For use when tunnelling MIME to a MIME UA through an
-
X.400(88) network, or to UAs that have been written
to RFC 1494
IA5 For use when tunneling MIME to a MIME UA through an X.400 network, where some of the links may involve X.400(84).
BP14 For use when the recipient may be an X.400(84) UA
-
with BP14 handling capability, and the loss of information in headers is not regarded as important.
but the gateway is free to use any method it finds appropriate in any situation.
FTBP is expected to be the most useful body part in sending to X.400(92) systems, while the BP14 content passing is primarily useful for sending to X.400(84) systems.
3.1.1. FTBP encapsulating body part
-
This body part utilizes the fundamental assumption in MIME that all message content can be legally and completely represented by a single octet stream, the "canonical format".
The FTBP encapsulating body part is defined by the application- reference id-mime-ftbp-data; all headers are mapped to the FTBP headers, including putting the "Content-type:" header inside the FTBP ExtensionsField.
Translation from the MIME body part is done by:
- Undoing the content-transfer-encoding - Setting the "FileTransferData.FTdata.value.octet- aligned" to the resulting string of octets - Putting the appropriate parameters into the headers.
Reversing the translation is done by:
- Extracting the headers - Applying an appropriate content-transfer-encoding to the body. If this is for some reason different from the content-transfer-encoding: header retrieved from the headers, the old one must be deleted.
This mapping is lossless, and therefore counts as "no conversion".
Note that this mapping does not work with multipart types; the multipart must first be mapped to a ForwardedIPMessage.
3.1.2. BP15 encapsulating body part
-
This section defines an extended body part, based on body part 15, which may be used to hold any MIME content.
mime-body-part EXTENDED-BODY-PART-TYPE PARAMETERS MimeParameters IDENTIFIED BY id-mime-bp-parameters DATA OCTET STRING ::= id-mime-bp-data
MimeParameters ::=
-
-
SEQUENCE {
-
content-type IA5String, content-parameters SEQUENCE OF SEQUENCE { parameter IA5String parameter-value IA5String } other-header-fields RFC822FieldList }
The OBJECT IDENTIFIERS id-mime-bp-parameter and id-mime-bp-data are defined in Appendix B. A MIME content is mapped onto this body part. The MIME headers of the body part are mapped as follows:
RFC822FieldList is defined in Appendix L of [MIXER].
Content-Type:
-
The "type/subtype" string is mapped to MimeParameters.content-type.
For each "parameter=value" string create a MimeParameters.content-parameters element. The MimeParameters.content-Parameters.parameter field is
set to the parameter and the MimeParameters.content- parameters.parameter-value field is set to the value.Quoting is preserved in the parameter-value.
Other
Take all other headers and create MimeParameters.other-header-fields. The MIME-version, content-type and content-transfer- encoding fields are NOT copied.
NOTE:
-
The set of headers that are mapped will depend on the placement of the body part (single body part or
multipart).
When it is the only body of a message, headers
starting with "content-" SHOULD be put into the other-header-fields, and all other headers should be put into the IPMS extension for the message.
When it is a single bodypart of a multipart, ALL
headers on the body part are included, since there is nowhere else to put them. Note that only headers that start with "content-" have defined semantics in this
case.
The body is mapped as follows:
Convert the MIME body part into its canonical form, as specified in Appendix H of MIME [MIME]. This canonical form is used to generate the mime-body-part.data octet string.
The Parameter mapping may be used independently of the body part mapping (e.g., in order to use a different encoding for a mapped MIME body part).
This body part contains all of the MIME information, and so can be mapped back to MIME without loss of information.
The OID id-mime-bp-data is added to the Encoded Information Types of the envelope.
This body part is completely compatible with RFC 1494.
When converting back to a MIME body part, the gateway is responsible for:
(1) Selecting an appropriate content-transfer-encoding, and deleting any content-transfer-encoding header from the other-header-fields (2) Adding quotes to any parameters that need them (but not adding quotes to parameters that are already quoted) (3) Removing any content-type field that is left in the RFC822FieldList of the message that is redundant or conflicting with the one from the mime-body-part (4) Make sure that on multipart messages, the boundary string actually used is reflected in the boundary- parameter of the content-type header, and does not occur within the body of the message.
3.1.3. Encapsulation using IA5 (HARPOON)
-
This approach is the one taken in RFC 1496 - HARPOON - for tunneling any MIME body part through X.400/84 networks. It has proven rather unhelpful for bringing information to X.400 users, but preserves all the information of a MIME body part.
The following IA5Text body part is made:
- Content = IA5String - First bytes of content: (the description is in US ASCII, with C escape sequences used to represent control characters): MIME-version: <version>\r\n Content-type: <the proper MIME content type>\r\n Content-transfer-encoding: <7bit, quoted-printable or base64>\r\n <Possibly other Content headings here, terminated by\r\n> \r\n <Here follows the bytes of the content, encoded in the proper encoding>
All implementations MUST place the MIME-version: header first in the body part. Headers that are placed by [MIXER] into other parts of the message MUST NOT be placed in the MIME body part.
This encapsulation may also be applied to subtypes of multipart, creating a single IA5 body part that contains a single multipart/*, which in turn may contain multiple MIME body parts.
3.1.4. Content passing using BP14
-
This is described in this section because it is at the same conceptual level as encapsulation. It is a lossy transformation; it is impossible to reconstruct the MIME type information from it.
Nevertheless, there is a demand for such functionality.
This "encapsulation" simply strips off all headers, undoes the content-transfer-encoding, and creates a BilaterallyDefined body part (BP14) from the resulting octet stream.
No reverse translation is defined; when a BP14 arrives at a MIXER gateway, it will be turned into an application/octet-stream according to chap. 6.3
3.2. Encapsulating X.400 Body Parts in MIME
-
This section specifies a generic mechanism to map X.400 body parts to a MIME content. This allows for the body part to be tunneled through MIME. It may also be used directly by an appropriately configured MIME UA.
This content-type is defined to carry any X.400 extended body part. The mapping of all standard X.400 body parts is defined in this document. The content-type field is "application/x400-bp". The parameter is defined by the EBNF:
mime-parameter = "bp-type=" ( object-identifier / 1*DIGIT=
If the body is a basic body part, the bp-type parameter is set to the number of the body part's context-specific tag, that is, the tag of the IPMS.Body.BodyPart component.
If the body is an Extended Body Part, the EBNF.object-dentifier is set to the OBJECT IDENTIFIER from IPMS.body.externally- defined.data.direct-reference.
For example, a basic VideotexBodyPart will have
Content-type=application/x400-bp; bp-type=6
whilst a Extended Videotex body part will have
Content-type=application/x400-bp; bp-type=2.6.1.4.5
The body contains the raw ASN.1 IPM body octet stream, that is, the BER encoding of the IPM.Body.BodyPart, including the initial tag octet. The content may use a content-transfer-encoding of either base64 or quoted-printable when carried in 7-bit MIME. It is recommended to use the one which gives the more compact encoding of the data. If this cannot be determined, Base64 is recommended. No attempt is made to turn the parameters of Extended Body Parts into MIME parameters, as this cannot be done in a general manner.
For extended body parts, the
3.3. Encapsulating FTBP body parts in MIME
-
The File Transfer Body Part is believed to be important in the future as "the" means of carrying well-identified data in X.400 networks.
They also share the property (at lest when limited to the EMA MAWG functional profile) of having a well-defined data part that is always representable as a sequence of bytes.
This conversion will have to fail, and the x400-bp encapsulation used instead, if:
- FileTransferData has more than one element - Contents-type is not unstructured-binary - Parameters that are not mappable, but important, are present (like Compression, which EMA doesn't recommend).
Otherwise, it can be encapsulated in MIME by:
- Creating the "content-type" value by forming the string "application/x-ftbp." and appending the numbers of the OID found in FileTransferParameters.environment.application- reference.registered-identifier - Mapping all other parameters according to the standard FTBP parameter mapping - Applying an appropriate content-transfer-encoding to the data contained in FileTransferData.value.encoding
DISCUSSION:
The choice of the somewhat strange, and by necessity unregistered, MIME type "application/x-ftbp.n.n.n.n" is because for any concrete example of this usage, it will be easy to configure any MIME reader to take advantage of the identification. If the MIME type registration rules are ever changed to allow the registration of a namespace, rather than just of names, the "x-" can be deleted, and the types can be "application/ftbp.n.n.n.n".
4. User control over the gateway choice
-
In some cases, the gateway may make an inappropriate choice when deciding what to do about a particular body part.
To allow an escape clause, this chapter defines a way in which the user can signal the gateway what action it finds most appropriate.
The headers given here override any "conversion prohibited" and "conversion with loss prohibited" on the message.
It is still the gateway's responsibility that the generated messages conform to the destination domain's syntax rules.
DISCUSSION:
The intent of this mechanism is to allow the sender to efficiently get a message through to a single recipient when the sender has information about the recipient that the gateway does not have.
It is not a part of the minimum functionality listed in chapter 8; a gateway does not have to implement this spec to be MIXER conformant, but if implemented, it should be done like this.
The additional complexity, both in user interface and in protocol, of making this field selectable per recipient was not thought worthwhile;
4.1. Conversion from MIME to X.400
-
The header field described below specifies explicit MIXER conversion. Comments are allowed within the field according to the usual RFC 822 convention.
If "x400-object-id" is omitted, "tunnel" is assumed.
-
mime-to-x400 = "Wanted-X400-Conversion" ":"
-
[ mime-from ] [ x400-object-id ]
-
"in" x400-encoding x400-object-id = "to" ( object-identifier-2 / "tunnel" ) x400-encoding = "bp14" / "bp15" / "ftbp" / "ia5" mime-from = "from" mime-type mime-type = word
There is no way to ask for a different conversion based on MIME parameters or bodypart content.
Examples:
Wanted-X400-Conversion: from application/msword to 1.2.840.113556.4.2 (Microsoft defined ms-word) in ftbp
This uses the MAWG definitions, and leads to an FTBP encoding.
Wanted-X400-Conversion: from application/msword to tunnel in bp14
This leads to a Body Part 14 encoding for all body parts of type application/msword.
Wanted-X400-Conversion:
in bp14
This requests that this specific body part be encoded in Body Part 14.
This field may be used in two places:
(1) In the heading of an unstructured MIME body part. In this case the EBNF.mime-from is omitted, and the requested conversion applies to the body part. (2) In a multipart. In this case, the body part type to which the conversion applies is defined by EBNF.mime-from, and the conversion applies to all body parts of this MIME type contained in the multipart, including those contained in nested messages and multiparts. If a contained body part has its own heading, this takes precedence. Note that the "from" parameter is mandatory when used in a multipart.
The EBNF.x400-object-id shall be present when "bp15" or "ftbp" encoding is selected.
The value "tunnel" implies encapsulation as defined in
Chapter 3.The "object identifier" used below is:
- For BP 15, it is the value of the EXTENDED-BODY-PART- TYPE macro that defines the body part, which is found in ExternallyDefinedBodyPart.data.direct-reference. - For FTBP, it is the value of the Environment.application-reference.
4.2. Conversion from X.400 to MIME
-
The IPM heading defined here shall be present in the heading of a message. It defines the mapping for all body parts of the specified types, including those in nested messages.
wanted-MIME-conversion HEADING-EXTENSION
VALUE WantedMIMEConversions ::= id-wanted-MIME-conversions WantedMIMEConversions ::= SEQUENCE OF X400toMIMEConversion
X400toMIMEConversion ::= SEQUENCE {
x400-type X400Type, mime-type MIMEType }
X400Type ::= CHOICE {
standard [0] INTEGER, -- standard body part extended [1] OBJECT IDENTIFIER, -- BP 15 ftbp [2] OBJECT IDENTIFIER} -- FTBP -- application-reference
MIMEType ::= SEQUENCE {
type IA5String, -- type (e.g., application/ms-word) encoding [1] IA5String OPTIONAl -- e.g. quoted-printable parameters [2] IA5String OPTIONAL } -- MIME Parameters
The heading extension includes all requested conversions, with explicit information as to how each body part type is encoded in MIME.
FTBP is identified as a separate body part type, as there will be a need for different encodings, dependent on what is being carried.
Encapsulation is requested by asking for "application/x400-bp" or "application/ftbp" as the destination type.
For FTAM body parts, the parameters will survive the gatewaying process. For other body parts, there are three alternatives:
(1) The gateway knows a defined mapping for this particular body part and destination type. It will be used, and parameters mapped accordingly. (2) The gateway knows how to extract an OCTET STRING from the body part, and the destination is a simple MIME body part. All information outside the OCTET STRING is lost. (This may be the case for a BP14 that should end up in an application/xyzzy, for instance). (3) The gateway knows of no relevant mapping, and does not know how to simplify the X.400 body part. The gateway will then proceed as if the mapping control field had not been present.
5. The equivalence registry
5.1. What information one must give about a mapping
-
The following information MUST be supplied when describing an equivalence or a mapping:
MIME type name (which must be preregistered)
X.400 body part (often BP15 or FTAM Body Part)
If BP15 is used, the following information must be given:
(1) Object Identifier for X.400 BP15 Data (2) Object Identifier for X.400 BP15 Parameters (3) X.400 ASN.1 Syntax (must be an EXTENDED-BODY-PART- TYPE macro)
If FTBP is used, the following information must be given:
<1) Object Identifier for the FTAM Environment.application- reference <2) Object Identifier for the FTAM Contents-type, if unstructured-binary is not used (3) Any other special considerations
In all cases, the following must be given:
Conversion algorithms. The expected effect of "Conversion prohibited" and "Conversion with loss prohibited" should be noted.
The conversion must be specified with enough detail to permit independent implementation; literature references are acceptable.
An equivalence can be registered with IANA using the form at the end of this document. The purpose of the registration is to achieve a greater uniformity among gateways implementing the same translation; there is no requirement that a gateway must support all of the translations that are registered with IANA, and there is no requirement that all conversions supported by a gateway are registered with IANA. Specific conformance requirements for MIXER are given at the end of this document.
Anyone can register an equivalence with IANA, and may update the registered equivalence at any time, or reassign the right to update the registry entry at any time. However, the IESG has the power to "lock" a registration, so that changing it requires IESG approval, and to update such a "locked" registration. All registered equivalences defined in standards-track documents (including this one) are locked.
5.2. Equivalence summary for known X.400 and MIME Types
-
This section itemizes the equivalences for all currently known MIME content-types and X.400 body parts.
For each MIME content-type/X.400 body part pair, the equivalence table contains an entry with the following sections:
-
X.400 Body Part
-
This section identifies the X.400 Body Part governed by this
Table entry. It includes any OBJECT IDENTIFIERs or other
parameters necessary to uniquely identify the Body Part.
-
-
MIME Content-Type
-
This section identifies the MIME content-type governed by this Table entry. The MIME content-type named here must be registered with the IANA.
Section/document reference
-
Reference to section of this document, or to the other document that describes this mapping.
The initial Equivalence Table entries in this document are described using this convention.
Further registrations of equivalences should be submitted to the IANA after a public review, using the example form given at the end of this document.
-
5.3. MIME to X.400 Table
-
MIME content-type X.400 Body Part Section ----------------- ------------------ ------- text/plain charset=us-ascii ia5-text 6.1 charset=ISO-8859-x EBP - GeneralText 6.2 text/richtext no mapping defined Encap application/oda EBP - ODA [ODA] application/octet-stream bilaterally-defined or 6.3 FTBP unknown attachment 6.4 application/postscript EBP - mime-postscript-body [POSTSCRIPT] image/g3fax g3-facsimile [IMAGES] image/jpeg EBP - mime-jpeg-body [IMAGES] image/gif EBP - mime-gif-body [IMAGES] audio/basic no mapping defined Encap video/mpeg no mapping defined Encap message/RFC822 ForwardedIPMessage 6.5 multipart/* ForwardedIPMessage 6.6 multipart/signed HARPOON encap 7.3 multipart/encrypted HARPOON encap 7.4
Abbreviation:
-
-
-
-
EBP - Extended Body Part
-
-
-
5.4. X.400 to MIME Table
Basic Body Parts
-
X.400 Basic Body Part MIME content-type Section --------------------- -------------------- ------- ia5-text text/plain;charset=us-ascii 6.1 voice No Mapping Defined Encap g3-facsimile image/g3fax [IMAGES] g4-class1 no mapping defined Encap teletex text/plain;charset=teletex 6.7 videotex no mapping defined Encap encrypted no mapping defined Encap bilaterally-defined application/octet-stream 6.3 nationally-defined no mapping defined Encap externally-defined See Extended Body Parts below ForwardedIPMessage message/RFC822 or multipart 6.5,6.6 X.400 Extended Body Part MIME content-type Section ------------------------- -------------------- ------- GeneralText text/plain;charset=ISO-8859-x 6.2 ODA application/oda [ODA] mime-postscript-body application/postscript [POSTSCRIPT] mime-jpeg-body image/jpeg [IMAGES] mime-gif-body image/gif [IMAGES] FTAM various 2.3,6.4 FTAM application ID MIME content type Section ------------------- ----------------- ------- ema-unknown-attachment application/octet-stream 6.4
5.5. Use of OBJECT IDENTIFIERs and ASN.1 MACROS
-
When one wants to define new BP15 body parts for use with equivalences, it is important to know that X.420 dictates that Extended Body Parts shall:
(1) use OBJECT IDENTIFIERs (OIDs) to uniquely identify the contents, and (2) be defined by using the ASN.1 Macro: EXTENDED-BODY-PART-TYPE MACRO::= BEGIN TYPE NOTATION ::= Parameters Data VALUE NOTATION ::= value (VALUE OBJECT IDENTIFIER) Parameters ::= "PARAMETERS" type "IDENTIFIED" "BY" value(OBJECT IDENTIFIER) | empty; Data ::= "DATA" type END
To meet these requirements, this document uses the OID
mixer
defined in [MIXER], as the root OID for X.400 Extended Body Parts defined for MIME interworking.
Each Extended Body Part contains Data and optional Parameters, each being named by an OID. To this end, two OID subtrees are defined under mixer-bodies, one for Data, and the other for Parameters:
mixer-bp-data OBJECT IDENTIFIER ::= { mixer 1 } mixer-bp-parameter OBJECT IDENTIFIER ::= { mixer 2 }
All definitions of extended X.400 body parts submitted to the IANA for registration with a mapping must use the Extended Body Part Type macro for the definition. See [IMAGES] for an example.
Lastly, the IANA will use the mixer-bp-data and mixer-bp-parameter OIDs as root OIDs for any new MIME content-type/subtypes that aren't otherwise registered in the Equivalence Table.
NOTE:
-
-
The ASN.1 for an ExternallyDefinedBodyPart is
ExternallyDefinedBodyPart ::= SEQUENCE {
-
parameters [0] ExternallyDefinedParameters OPTIONAL, data ExternallyDefinedData } ExternallyDefinedParameters ::= EXTERNAL ExternallyDefinedData ::= EXTERNAL
The ASN.1 for EXTERNAL is (from X.208):
EXTERNAL ::= [UNIVERSAL 8] IMPLICIT SEQUENCE {direct-reference OBJECT IDENTIFIER OPTIONAL, indirect-reference INTEGER OPTIONAL, data-value-descriptor ObjectDescriptor OPTIONAL, encoding CHOICE {single-ASN1-type [0] ANY, octet-aligned [1] IMPLICIT OCTET STRING, arbitrary [2] IMPLICIT BIT STRING}} ObjectDescriptor ::= [UNIVERSAL 7] IMPLICIT GraphicString
There are a bit too many choices here; the common X.400 usage for BP15 encoding is to:
(1) Always use direct-reference (2) Omit indirect-reference and data-value-descriptor (3) Use the single-ASN1-type encoding only
Unfortunately, some implementations have chosen to use the octet- aligned choice when constructing values where the ASN.1 type is OCTET STRING, which of course caused interoperability problems.
An attempt to specify that X.420 only allowed the single-ASN1-type choice in the 1996 versions is still (Sept 1995) being debated in ISO; the end result seems to be that all agree in principle that single-ASN1-type should be used, but that one has to allow the generation of the octet-aligned choice as being conformant.
6. Defined Equivalences
6.1. IA5Text - text/plain
-
X.400 Body Part: IA5Text MIME Content-type: text/plain; charset=US- ASCII Conversion Type: No conversion Comments:
When mapping from X.400 to MIME, the "repertoire" parameter is ignored.
When mapping from MIME to X.400, the "repertoire" parameter is set to IA5 (5).
NOTE: The MIME Content-type headers are omitted, when mapping from X.400 to MIME, if and only if the IA5Text body part is the only body part in the IPMS.Body sequence.
NOTE: IA5Text specifies the "currency" symbol in position 2/4. This is converted without comment to the "dollar" symbol, since the author of this document has seen many documents in which the position was intended to indicate "dollar" while he has not yet seen one in which the "currency" symbol is intended.
(For reference: The T.50 (1988) recommendation, which defines IA5, talks about ISO registered set number 2, while ASCII, using the "dollar" symbol, is ISO registered set number 6. There are no other differences.)
NOTE: It is not uncommon, though it is a violation of the standard, to use 8-bit character sets inside an IA5 body part. Gateways that can expect to encounter this situation should consider implementing something like the guidance given in RFC 1428 [MIMETRANS], "Transition of Internet Mail from just-send-8 to 8-bit SMTP/MIME", and generate appropriate charset parameters for the MIME messages they generate. This behavior is not required for MIXER conformance, since it is only needed when the base standards are violated.
6.2. GeneralText - text/plain (ISO-8859)
-
X.400 Body Part: GeneralText; CharacterSets in 6, 14, 42, 87, 100,101,109,110,126,127,138,144,148 MIME Content-Type: text/plain; charset=ISO-8859-(1-9) or iso-2022-jp Conversion Type: Text conversion without character change When mapping from X.400 to MIME, the character-set is chosen from the table below according to the value of Parameters.CharacterSets. If no match is found, and the gateway does not support a conversion, the character set shall be encoded as x-iso-nnn-nnn-nnn, where "nnn" is the numbers of the Parameters.CharacterSets, sorted in numeric order.
When mapping from MIME to X.400, GeneralText is an Extended Body Part, hence it requires an OID. The OID for the GeneralText body is defined in [MOTIS], part 8, annex D, as {2 6 1 4 11}. The OID for the parameters is {2 6 1 11 11}.
The Parameters.CharacterSets is set from table below according to the value of "charset"
The following table lists the MIME character sets and the corresponding ISO registry numbers. If no correspondence is found, this conversion fails, and the generic body part approach is used.
MIME charset ISO IR numbers Comment ----------------------------------------------- ISO-8859-1 6, 100 West European "8-bit ASCII" ISO-8859-2 6, 101 East European ISO-8859-3 6, 109 <regarded as obsolete> ISO-8859-4 6, 110 <regarded as obsolete> ISO-8859-5 6, 144 Cyrillic ISO-8859-6 6, 127 Arabic ISO-8859-7 6, 126 Greek ISO-8859-8 6, 138 Hebrew ISO-8859-9 6, 148 Other Latin-using languages ISO-2022-JP 6, 14, 42, 87 Japanese
When converting from MIME to X.400, generate the correct OIDs for use in the message envelope's Encoded Information Types by looking up the ISO IR numbers in the above table, and then appending each to the id-cs-eit-authority {1 0 10021 7 1 0} OID, generating 2-4 OIDs.
Similar procedures can be used with other MIME charsets that map to a set of ISO character sets.
The escape sequences to designate and invoke the relevant character sets in their proper positions must be added to the front of the GeneralText character string.
For ISO 8859-1, the relevant escape sequence will be:
ESC 28 42
ASCII in G0
ESC 2D 41
ISO-IR-100 in G1
ESC 21 41
-
-
High control character set in C1
-
ESC 7E
-
-
Locking shift 1 Right
-
These escape sequences are removed when converting from GeneralText to text/plain.
Note that new character sets may be defined on both the Internet side and the X.400 side; a gateway MAY choose to implement more conversions in the same fashion.
DISCUSSION:
The conversion of text is a problematic one, and one in which it is likely that gateways should be given wide latitude to make decisions based upon their knowledge of the user's preferences. The text given below is thought to give the best approximation to a gateway conforming to current and anticipated usage in the MIME and X.400 worlds, and is the way recommended when no knowledge of the recipient's capabilities exists.
The lossless changes, such as normalizing escape sequences, can be done even when "conversion-prohibited" is set. If "conversion-with- loss-prohibited" is set, translation to a character set that is not able to encode all characters cannot be done, and the message should be non-delivered with an appropriate non-delivery reason.
The common use of character sets in MIME is somewhat different from the rules given by X.400; in particular, it is common in MIME to assume that the character sets follow strict rules. For the ISO- 8859-x character sets, it is assumed that they are designated and invoked at the beginning of the text, and that no designation or invocation sequences occur within the body of the text.
The rules for ISO-2022-JP are given in RFC 1468 [2022-JP], and are even more particular, using a pure 7-bit encoding in which each line of text starts in ASCII.
Therefore, the text must be "normalized" by going through the whole message, using a state machine or similar device to remove or rewrite all escape and shift sequences.
Appendix A gives pseudocode for such a conversion.
NOTE: In 1988, the GeneralText body part was defined in ISO 10021-8 [MOTIS], and NOT in the corresponding CCITT recommendation; this was added later. Also, the parameters have been heavily modified; they should be a SET OF INTEGER in the currently valid text. Use the latest version of the standard that you can get hold of.
6.3. BilaterallyDefined - application/octet-stream
-
X.400 Body Part: BilaterallyDefined MIME Content-Type: Application/Octet-Stream (no parameters) Conversion Type: No conversion
When mapping from MIME to X.400, if there are parameters present in the Content-Type: header field, they are removed.
DISCUSSION:
The parameters "name" "type" and "conversions" are advisory; name and conversions are depreciated in RFC 2046.
The parameter "padding" changes the interpretation of the last byte of the data, but it is deemed better by the WG to delete this information than to non-deliver the body part. The "padding" parameter is rarely used with MIME.
Use of BilaterallyDefined Body Parts is specifically deprecated in both 1988 and 1992 X.400. It is retained solely for backward compatibility with 1984 systems, and because it is in common use.
6.4. FTBP EMA Unknown Attachment - application/octet-stream
-
X.400 Body Part: FTBP EMA Unknown Attachment MIME Content-Type: Application/Octet-Stream Conversion Type: No conversion The OID for the Unknown Attachment is { joint-iso-ccitt(2) country(16) us(840) organization(1) ema(113694) objects(2) messaging(2) attachments(1) unknown(1) }, or 2.16.840.1.113694.2.2.1.1 for short. NOTE: Previous EMA drafts gave it as { iso(1) countries(2) usa(840) organization (1) ema (113694) objects(2) messaging(2) attachments(1) unknown (1)}, or 1.2.840.1.113694.2.2.1.1 for short.
The parameters for this type must be mapped according to chapter 2.3, with the following extensions for the parameters of the application/octet-stream:
-
If there is no Content-Disposition parameter with a filename, and there is a name parameter, the FTBP.FileTransferParameters.File- attributes.pathname is generated from this parameter. Note that RFC 2046 recommends not using the "name" parameter.
The "type", "conversions" and "padding" attributes are ignored; "type" is for human consumption; "conversions" are discouraged in RFC 2046.
The body mapping is just copying the bytes in both directions.
-
6.5. MessageBodyPart - message/RFC822
-
X.400 body part: MessageBodyPart MIME Content-Type: message/RFC822 Conversion Type: Special NOTE: If the headers of the X.400 MessageBodyPart contains the "multipart-message" heading extension with the isAMessage bit set (either explicitly or implicitly), the mapping should be to multipart/* according to section 6.6, below. To map an IPMS.MessageBodyPart, the full X.400 -> RFC 822 mapping is recursively applied, to generate an RFC 822 Message. If present, the IPMS.MessageBodyPart.parameters.delivery-envelope is used for the MTS Abstract Service Mappings. If present, the IPMS.MessageBodyPart.parameters.delivery-time is mapped to the extended RFC 822 field "Delivery-Date:".
When a message/RFC822 is contained within a MIME message, it is mapped to an IPMS.MessageBodyPart according to MIXER. specification. Any mappings that would have been made to the MTS Abstract Service are placed in IPMS.MessageBodyPart.parameters.delivery-envelope.
6.6. MessageBodyPart - multipart/*
-
X.400 body part: MessageBodyPart MIME Content-Type: multipart/* Conversion Type: Special
NOTE: If the headers of the X.400 MessageBodyPart do not contain the "multipart-message" heading extension with the "isAMessage" flag FALSE=, the mapping should be to message/RFC822.
A MIME multipart is a set of content-types and not a message with a set of content types. When the multipart is at the outermost MIME header, elements of the multipart are mapped directly onto IPMS.Bodypart.
When the MIME multipart is not at the outermost level, it is mapped to an IPMS.MessageBodyPart containing an IPMS.Bodypart for each element of the multipart.
When a nested IPMS.Message is generated from a multipart, an IPMS.heading shall always be generated. The only mandatory field is the IPMS.Heading.this-IPM message id, which shall be generated by the gateway. An IPMS.Heading.subject field shall also be generated, in order to provide useful information to non-MIME capable X.400(88) UAs and to all X.400(84) UAs. The subject field is set as follows according to the multipart subtype:
mixed:
"Multipart Message"
alternative:
-
"Alternative Body Parts containing the same information"
digest:
"Message Digest"
parallel:
-
"Body Parts interpreted in parallel"
other:
"Multipart Message (<subtype>)"
For other types of multipart, the multipart subtype shall be included in the subject line.
For each multipart, the following IPMS.HeadingExtension shall be generated, with the value set according to the subtype.
If the multipart is the outermost multipart, and the subtype is "mixed", it may be omitted.
-
-
multipart-message HEADING-EXTENSION
-
-
VALUE MultipartType
-
-
::= id-hex-multipart-message-v2
-
-
-
MultipartType ::= SEQUENCE {
-
-
-
-
subtype IA5String,
isAMessage BOOLEAN DEFAULT TRUE }
-
-
-
-
The MultipartType contains the subtype, for example "digest". If this heading is present when mapping from X.400 to MIME, the appropriate multipart may be generated.
The isAMessage flag is needed because of the case where a message contains a ForwardedIPMessage, which itself was generated from a MIME message that was a Multipart; it is set whenever the multipart is the outermost level of nesting inside a Message/RFC822.
NOTE:
-
When downgrading to X.400/84, the content-type SHOULD be regenerated from this heading-extension and put into the RFC-822- HEADERS extra body part.
NOTE:
-
This definition is different from the one in RFC 1494, because the RFC 1494 definition turned out to be insufficient when new subtypes of Multipart (like Signed or Related) were defined. That is the reason for the "-v2" part of the name of the OID.
If both the old and the new heading extensions occur on a message, a MIXER gateway should give preference to the new one.
-
6.7. Teletex - Text/Plain (Teletex)
-
X.400 Body Part: Teletex MIME Content-Type: text/plain; charset=Teletex Conversion Type: Text conversion
From X.400 to RFC-822, the conversion shall take the bytes
of all the pages in the "data" part of the
TeletexBodyPart, add a FF character (0x0C, control-L) to each part that does not already end in one, and
concatenate them together to form the body of the
Text/Plain.The character set shall be "Teletex", which is especially registered for this purpose. Its definition is shown in an appendix.
The parameters are discarded.
From RFC-822 to X.400, the conversion shall split the
content at each occurrence of the FF character (0x0C),
delete the character and construct the Teletex body part
as a SEQUENCE OF TeletexString, as described in X.420(88), section 7.3.5The TeletexParameters may, but need not, contain the number-of-pages component.
NOTE: It is recommended, but not mandated, that the data be converted into a more widespread character set like ISO-8859-1 or ISO-2022-JP (if applicable) if possible.
This will result in the reverse translation giving a GeneralText body part, which will have to be dealt with appropriately at the X.400/88 to X.400/84 downgrading boundary, if possible, but will give a much greater chance that the MIME recipient can actually read the message.DISCUSSION:
The Teletex body part is frequently used in X.400(84) to send around text with slightly extended character sets beyond ASCII.
Its body consists of a series of "pages", separated by ASN.1 representation. It is important to many people to have this mapped into something that is readable to most end-users; therefore, it is recommended to map this onto Text/Plain; however, since this is not plain text, the conversion must be specified.
Note that the definition of Text/Plain permits only CRLF as a line separator; the sequences "CR FF" and "CR LF LF LF.." permitted in Teletex must be encoded as Quoted-Printable.
7. Body parts where encapsulation is recommended
-
Some body parts are MIME constructs, and their functionality will be severely damaged if they are coerced into an X.400 framework.
Special care needs to be taken with these; they are described below.
7.1. message/external-body
-
The gateway MUST support the encapsulation of this body part using the HARPOON encapsulation (IA5).
It MAY support some kind of retrieval of the referred object.
DISCUSSION:
The message/external-body part points to an object that can be retrieved using Internet protocols.
There are three cases to consider for the recipient's capabilities:
(1) The user has no Internet access. In this case, the user might be grateful if the gateway fetches the body part and inserts it into the message. If the body part is large or dynamic, it might not be appropriate. (2) The user has Internet access, but no UA support for fetching external-body objects. (3) The user has Internet access and UA support for fetching external-body objects, based on an understanding of this document.
Some access-types, like anonymous FTP, are easy to resolve. Others, like the Mailserver access-type, are almost impossible to resolve at a gateway.
To support the second case above, the tunneling method chosen is the HARPOON encapsulation described in section 3.1.3, using an IA5 body part, inserting the string "MIME-Version: 1.0 (generated by gateway)" at the beginning of the body part. (The part in parentheses can be changed at will).
This will:
(1) Maximize the chance that the user will see the message (2) Give the user hints that will enable him to fetch the message using other Internet tools (3) Identify the message as a MIME object in a reliable fashion, allowing UAs to support the fetching of the object if the UA implementor desires.
7.2. message/partial
-
This represents part of a larger message, where it is only possible to parse the complete message after getting all the pieces.
The gateway MUST support the encapsulation of this body part.
It MAY implement transparent reassembly of the message, but in this case, it MUST support a configurable timeout
for the reassembly, defaulting back to encapsulation.
DISCUSSION:
The gateway's choices are:
(1) Wait until all the pieces arrive at the gateway, reassemble the message, and use normal processing (2) Encapsulate the message, using any encapsulation method (BP15, FTAM or HARPOON).
In some cases, not all pieces will arrive at the gateway; some may have been transferred through other gateways due to route changes or machine outages; some may have been lost in transit.
7.3. multipart/signed
-
A gateway MUST implement encapsulation of multipart/signed using HARPOON.
The gateway MAY be configured to do other processing, as outlined in the discussion below. This is outside the scope of the standard.
DISCUSSION:
Gatewaying security is a problem. The gateway can basically take three approaches:
- Strip the multipart/signed, leaving the bare body part unsecured, possibly with a comment that the signature was stripped - Attempt to check the signature and re-signing the message using X.400 security functions, then stripping as above - Encapsulate the message. This is the only approach that allows end to end security, but requires MIME functionality at the recipient. - Replace the message content with multiple body parts, containing first an unsecured body part and then the encapsulated multipart/signed.
All these are valid options for a MIXER gateway.
Note that the encapsulation must use HARPOON, as the signature is computed on the ENCODED body part, not on the canonical representation, and HARPOON is the only encapsulation that preserves the content transfer encoding of the message.
Note also that all methods except for encapsulation break end-to-end security; the recipient can place no more trust in the integrity of the message than he can place in the security of the gateway.
7.4. multipart/encrypted
-
A gateway MUST implement encapsulation of multipart/encrypted using HARPOON.
If the implementor chooses to allow other processing at the gateway, as outlined below, he/she is advised that there are grave security concerns with such a solution, since it violates the general rule of keeping decryption keys as close to the user as possible.
DISCUSSION:
There are two basic cases for a gateway:
- The gateway is trusted with the user's keys. In this case, the gateway can decrypt the message, possibly add a note that it has done so, and gateway the unencrypted form, possibly applying X.400 security functions, and possibly attaching a copy of the original, encrypted material for reference. This does nothing to protect the transfer from gateway to recipient, unless suitable X.400-native security is applied. It also means that the gateway must be part of the user's trusted environment. - The gateway is not trusted with the recipient's keys. In this case, encapsulation is the only approach that preserves any information at all.
The valid options for a MIXER gateway are therefore:
- Decrypt the body part - Encapsulate the body part - Drop the body part
The MIXER WG has shown strong preference for the encapsulation alternative, and urges anyone who thinks of buying or implementing gateway decryption to carefully evaluate this choice in light of the company's general security policy.
8. Conformance requirements
-
In order to be called MIXER conformant, a gateway must implement:
- Encapsulation of MIME content in the FTBP body part - Encapsulation of X.400 body parts in the x400-bp body part - Encapsulation of FTBP body parts in the application/x-ftbp.oid body part - Encapsulation of security multiparts using HARPOON - Text/plain <-> IA5Text - Text/plain; charset=iso-8859-* <-> GeneralText - Multipart/* <-> ForwardedIPMessage - message/RFC822 <-> ForwardedIPMessage - application/octet-stream <-> FTBP unknown - application/octet-stream <-> BilaterallyDefined - A configuration choice of which application/octet- stream translation to use
All other parts of this specification MAY be implemented by the gateway. If they are implemented at all, they MUST be implemented conformant to this specification.
In this context, a feature is "implemented" in a product if it is possible to configure the product in such a way that this feature is used. This specification does not restrict the product to only be configured in such a fashion.
9. Security Considerations
-
The security issues identified in this memo are:
(1) Security implications of using filenames that arrive in body part headers (section 2.3.2) (2) Security implications of letting a gateway handle encrypted and/or signed content (section 7.3 and 7.4)
If a gateway fetches message/external-body on behalf of the recipient, as described in section 7.1, it may be tricked into performing inappropriate actions by malicious senders.
In addition, all the normal caveats that apply to sending data that may contain executable code apply to UAs on both sides of the gateway.
10. Author's Address
-
Harald Tveit Alvestrand
UNINETT
P.O.box 6883 Elgeseter
N-7002 Trondheim
NORWAYEMail: Harald.T.Alvestrand@uninett.no
11. Acknowledgements
-
The author wishes to thank all the members of the MIXER WG for their valuable input, and in particular (in no particular order):
Steve Kille, Peter Sylvester, Ned Freed, Julian Onions, Ruth Moulton, Keith Moore, Alain Zahm, Urs Eppenberger, Kevin Jordan, Jeroen Houttuin, Claudio Allocchio, Colin Robbins, Steven Thomson, Jim Craigie, Efifiom Edem, David Wilson, and many others who have been active over the long lifetime of this document.
References
-
[RFC-822]
Crocker, D., "Standard for the Format of ARPA Internet Text Messages", STD 11, RFC 822, August, 1982.
[MIME]
Freed, N. and N. Borenstein, "Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types", RFC 2046, November 1996.
[MIME-HDR]
Moore, K., "MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text", RFC 2047, November 1996.
[HARPOON]
Alvestrand, H., Romaguera, J., and K. Jordan, "Rules for downgrading messages from X.400/88 to X.400/84 when MIME content-types are present in the messages", RFC 1496, August 1993.
[MIMETRANS]
Vaudreuil, G., "Transition of Internet Mail from Just-Send-8 to 8Bit-SMTP/MIME", RFC 1428, February 1993.
[MIXER]
Kille, S., "Mapping between X.400(1988) / ISO 10021 and RFC-822", RFC 1327, May 1992.
[T.4]
-
CCITT Recommendation T.4, Standardization of Group 3 Facsimile Apparatus for Document Transmission (1988)
[T.30]
-
CCITT Recommendation T.30, Procedures For Document Facsimile Transmission in the General Switched Telephone Network (1988)
[T.411]
-
CCITT Recommendation T.411 (1988), Open Document Architecture (ODA) and Interchange Format, Introduction and General Principles
[MOTIS]
-
ISO/IEC International Standard 10021, Information technology - Text Communication - Message-Oriented Text Interchange Systems (MOTIS) (Parts 1 to 8)
[X.400]
CCITT, Data Communication Networks - Message Handling Systems - Recommendations X.400 - X.420 (1988 version)
[X.420]
CCITT Recommendation X.420 (1988), Interpersonal Messaging System
[RFC-X400USE]
Alvestrand, H., "X.400 use of extended Character Sets", RFC 1502, August 1993.
[MAWG]
-
Electronic Messaging Association Message Attachment Working Group (MAWG): File Transfer Body Part Feasibility Project Guide - version 1.5 - September 1995
[CDISP]
Troost, R., and S. Dorner, "Communicating Presentation Information in Internet Messages: The Content-Disposition Header", RFC 1806, June 1995.
[POSTSCRIPT]
Alvestrand, H., "Carrying PostScript in X.400 and MIME", RFC 2160, June 1997.
[IMAGES]
-
Alvestrand, H., "X.400 Image Body Parts", RFC 2158, June 1997.
[ODA]
-
Alvestrand, H., "A MIME Body Part for ODA", RFC 2161, June 1997.
[ISO 2022]
ISO/IEC 2022:1994(E): Information technology - Character code structure and extension techniques
[ISO 8859]
ISO 8859: Information processing -- 8-bit single-byte coded graphic character sets (various parts)
[2022-JP]
Murai, J., Crispin, M., and E. van der Poel, "Japanese Character Encoding for Internet Messages", RFC 1468, June 1993.
[MUST]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", RFC 2119, March 1997.
APPENDIXES
Appendix A: Escape code normalization
-
The algorithm given here in pseudocode will reduce a GeneralString ISO-2022 unlimited use of shifts sequence to a pure 8-bit sequence that does not use shift sequences, if possible.
Some error conditions, like EOF, are not tested for. It crashes if asked to do something it cannot. Control character set switching is missing.
A similar routine, albeit more complex, can be written for normalizing to the ISO-2022-JP character set.
BEGIN: (from X.209)
-
g0 = 6 (should be 2, but ignore the difference)
g1 = NULL
g2 = NULL
g3 = NULL
c0 = 1 (ASCII control)
c1 = NULL
leftset = &g0 (current input set, low)
rightset = &g1 (current input set, high)
lowset = 6 (output set, low)
highset = NULL (output set, high)
charset = US-ASCII
(Init for the set tables) chartoid[{2D,2E,2F}, 41] = 100 ..... idtoname[100] = "ISO-8859-1" .....
WHILE (more data)
-
CASE head of input
{These are the locking shift sequences} INCASE "00/14": (LS0, SO) leftset = &g0; INCASE "00/15": (LS1, SI) leftset = &g INCASE "ESC 07/14": (LS1R) rightset = &g1; INCASE "ESC 07/13": (LS2R) rightset = &g2; INCASE "ESC 07/12": (LS3R) rightset = &g3; {There is missing code for handling the single shift function} {These are the changes of graphic character sets} {Note that G0 can contain only 94-character charsets} INCASE "ESC 28" g0 = chartoid[lastchar, next character] sethiset(g0) INCASE "ESC 2D", "ESC 29" g1 = chartoid[lastchar, next character] sethiset(g1) INCASE "ESC 2E", "ESC 2A" g2 = chartoid[lastchar, next character] sethiset(g2) INCASE "ESC 2F", "ESC 2B" g3 = chartoid[lastchar, next character] sethiset(g3) {control characters. There is missing code for changing these} INCASE 00/00-01/15 {normal control} write(char) INCASE 08/00-09/15 {upper control} write(char) {Normal characters} INCASE 02/00-07/15 (Left) IF (*leftset == lowset) write(char) ELSIF (*leftset == highset) write(char+80) ELSE ERROR "Shift error" ENDIF INCASE 10/00-15/15 IF (*rightset == highset) write(char) ELSIF (*rightset == lowset) write(char-80) ELSE ERROR "Shift error" ENDIF ENDCASE ENDWHILE SUBROUTINE sethighset(g1) IF (highset == NULL) charset = idtoname[g1] highset = g1 ELSIF (highset == g1) (it's OK) ELSE ERROR "Too many charsets encountered" ENDIF ENDROUTINE
Appendix B: OID Assignments
-
MIXER-MAPPINGS DEFINITIONS ::= BEGIN EXPORTS -- everything --; IMPORTS mixer -- { iso(1) org(3) dod(6) internet(1) mail(7) mixer(1) } FROM MIXER --Companion RFC--;
mixer-headings OBJECT IDENTIFIER ::=
{ mixer 1 } -- called mime-mhs-headings in RFC 1495 --
-
mixer-bodies OBJECT IDENTIFIER ::=
{ mixer 2 } -- called mime-mhs-bodies in RFC 1495 --
-
-- mixer-core is defined as { mixer core(3) } in [MIXER] mixer-bp-data OBJECT IDENTIFIER ::= { mixer-bodies 1 }; -- called mime-mhs-bp-data in RFC 1494 -- mixer-bp-parameter OBJECT IDENTIFIER ::= { mixer-bodies 2 }; id-mime-bp-data OBJECT IDENTIFIER ::= { mixer-bp-data 1 }; -- for debugging: mixer-bp-data is 1.3.6.1.7.1.2.1.1 id-mime-bp-parameters OBJECT IDENTIFIER ::= { mixer-bp-parameter 1 };
-- the following assignments were done in RFC 1494, using -- slightly different names, but the same numbers.
-- their defining text is now is now in other documentsid-mime-postscript-body OBJECT IDENTIFIER ::= { mixer-bp-data 2 } id-mime-jpeg-body OBJECT IDENTIFIER ::= { mixer-bp-data 3 } id-mime-gif-body OBJECT IDENTIFIER ::= { mixer-bp-data 4 } -- This is a new definition, and defines an FTAM application reference, -- not a BP15 data OID. id-mime-ftbp-data OBJECT IDENTIFIER ::= { mixer-bp-data 5 } -- The following heading extensions are defined id-hex-partial-message OBJECT IDENTIFIER ::= { mixer-headings 1 } id-hex-multipart-message OBJECT IDENTIFIER ::= { mixer-headings 2 } -- from RFC 1495; obsolete id-hex-multipart-message-v2 OBJECT IDENTIFIER ::= { mixer-headings 3 } END
Appendix C: Registration information for the Teletex
character set
-
The Teletex character set is a character set in which the ISO 2022 character set switching mechanism may be used to switch between the following registered ISO character sets:
ISO-IR-87 - JIS_C6226-1983; a 16-bit Japanese character set ISO-IR-102 - a fairly standard US-ASCII variant ISO-IR-103 - Latin characters using non-spacing accents ISO-IR-106 - Control characters for C0 use; CR, LF, FF and a few more. ISO-IR-107 - Control characters for C1 use
Its intended use of this character set is to represent data that comes from ISO protocols that use the ASN.1 construct "TeletexString" or "T61string" without conversion.
The set of allowed character sets can be found in CCITT recommendation X.208(1988), chapter 31.2 and Table 6/X.208.
The rules for encoding the data type can be found in CCITT recommendation X.209(1988), chapter 23. It states that at the beginning of the string, G0 is always ISO-IR-102, C0 is ISO-IR-106, and C1 is ISO-IR-107.
The specification seems somehow to have missed the implicit assumption that ISO-IR-103 is designated and invoked as G1 and shifted into the upper half of the character set which seems to be assumed at least by the X.400 and X.500 software that uses TeletexStrings; implementors should act as if the sequence ESC 2/9 7/6 LS1R is always present at the beginning of the data; however, when generating Teletex strings, implementors should include the sequence ESC 2/9 7/6 within the string before the first occurence of a character from ISO-IR-103.
The rules for interpreting T.61 data are found (I believe) in CCITT recommendations T.51, T.52 and T.53 (data from the ITU WWW server):
T.51 (09/92) [Rev.1] [26 pp.] [Publ.: May.93] Latin based coded character sets for telematic services T.52 (1993) [New] [88 pp.] [Publ.: Apr.94] Non-Latin coded character sets for telematic services T.53 (04/94) [New] [68 pp.] [Publ.: Jan.95] Character coded control functions for telematic services
The Teletex character set is closely related to (but not identical with) that specified in ISO 6937.
No further restrictions are imposed by this registration; in particular, character set switching can occur anywhere, and there is no guarantee that the character sets will be switched "back" at the end.
Appendix D: IANA Registration form for new mappings
To: IANA@isi.edu Subject: Registration of new X.400/MIME content type mapping
MIME type name:
(this must have been registered previously with IANA)
X.400 body part:
IF BP15:
- X.400 Object Identifier for Data:
(If left empty, an OID will be assigned by IANA under mixer-bp-data)
- X.400 Object Identifier for Parameters:
(If left empty, an OID will be assigned by IANA under mixer-bp- parameter. If it is not used, fill in the words NOT USED.)
X.400 ASN.1 Syntax:
(must be an EXTENDED-BODY-PART-TYPE macro, or reference to a Basic body part type)
IF FTBP:
- FTAM Object Identifier for application-reference:
- FTAM Object Identifier for contents-type:
(if left empty, unstructured-binary is assumed)
Conversion algorithm:
(must be defined completely enough for independent implementation. It may be defined by reference to RFCs).
Person & email address to contact for further information:INFORMATION TO THE SUBMITTER:
The accepted registrations will be listed in the "Assigned Numbers" series of RFCs. The information in the registration form is freely distributable.
Full Copyright Statement
-
Copyright © The Internet Society (1998). All Rights Reserved.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.