home *** CD-ROM | disk | FTP | other *** search
- .\" Copyright (c) 1980 The Regents of the University of California.
- .\" All rights reserved.
- .\"
- .\" Redistribution and use in source and binary forms, with or without
- .\" modification, are permitted provided that the following conditions
- .\" are met:
- .\" 1. Redistributions of source code must retain the above copyright
- .\" notice, this list of conditions and the following disclaimer.
- .\" 2. Redistributions in binary form must reproduce the above copyright
- .\" notice, this list of conditions and the following disclaimer in the
- .\" documentation and/or other materials provided with the distribution.
- .\" 3. All advertising materials mentioning features or use of this software
- .\" must display the following acknowledgement:
- .\" This product includes software developed by the University of
- .\" California, Berkeley and its contributors.
- .\" 4. Neither the name of the University nor the names of its contributors
- .\" may be used to endorse or promote products derived from this software
- .\" without specific prior written permission.
- .\"
- .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
- .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
- .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- .\" SUCH DAMAGE.
- .\"
- .\" @(#)mail7.nr 6.3 (Berkeley) 4/17/91
- .\"
- .sh 1 "Format of messages"
- .pp
- This section describes the format of messages.
- Messages begin with a
- .i from
- line, which consists of the word
- .q From
- followed by a user name, followed by anything, followed by
- a date in the format returned by the
- .i ctime
- library routine described in section 3 of the Unix Programmer's
- Manual. A possible
- .i ctime
- format date is:
- .(l
- Tue Dec 1 10:58:23 1981
- .)l
- The
- .i ctime
- date may be optionally followed by a single space and a
- time zone indication, which
- should be three capital letters, such as PDT.
- .pp
- Following the
- .i from
- line are zero or more
- .i "header field"
- lines.
- Each header field line is of the form:
- .(l
- name: information
- .)l
- .i Name
- can be anything, but only certain header fields are recognized as
- having any meaning. The recognized header fields are:
- .i article-id ,
- .i bcc ,
- .i cc ,
- .i from ,
- .i reply-to ,
- .i sender ,
- .i subject ,
- and
- .i to .
- Other header fields are also significant to other systems; see,
- for example, the current Arpanet message standard for much more
- information on this topic.
- A header field can be continued onto following lines by making the
- first character on the following line a space or tab character.
- .pp
- If any headers are present, they must be followed by a blank line.
- The part that follows is called the
- .i body
- of the message, and must be ASCII text, not containing null characters.
- Each line in the message body must be no longer than 512 characters and
- terminated with an ASCII newline character.
- If binary data must be passed through the mail system, it is suggested
- that this data be encoded in a system which encodes six bits into
- a printable character (i.e.: uuencode).
- For example, one could use the upper and lower case letters, the digits,
- and the characters comma and period to make up the 64 characters.
- Then, one can send a 16-bit binary number
- as three characters. These characters should be packed into lines,
- preferably lines about 70 characters long as long lines are transmitted
- more efficiently.
- .pp
- The message delivery system always adds a blank line to the end of
- each message. This blank line must not be deleted.
- .pp
- The UUCP message delivery system sometimes adds a blank line to
- the end of a message each time it is forwarded through a machine.
- .pp
- It should be noted that some network transport protocols enforce
- limits to the lengths of messages.
-