Email alias

Last updated

An email alias is simply a forwarding email address. The term alias expansion is sometimes used to indicate a specific mode of email forwarding, thereby implying a more generic meaning of the term email alias as an address that is forwarded in a simplistic fashion. [1]

An email address identifies an email box to which email messages are delivered. A wide variety of formats were used in early email systems, but only a single format is used today, following the standards developed for Internet mail systems since the 1980s. This article uses the term email address to refer to the addr-spec defined in RFC 5322, not to the address that is commonly used; the difference is that an address may contain a display name, a comment, or both.

Email forwarding generically refers to the operation of re-sending an email message delivered to one email address to a possibly different email address(es).

Contents

Usage

Email aliases can be created on a mail server. The mail server simply forwards email messages addressed to an email alias on to another, the specified email address. An email alias may be used to create a simple replacement for a long or difficult-to-remember email address. It can also be used to create a generic email address such as webmaster@example.com and info@example.com.

example.com, example.net, example.org, and example.edu are second-level domain names reserved for documentation purposes and examples of the use of domain names.

On UNIX-like systems, email aliases may be placed into the file /etc/aliases and have the form:

local-alias-name: adifferentlocaluser, anotherlocaluser, an@external.user.example.com

Control issue

Messages forwarded through an email alias retain the original SMTP envelope sender and recipient. If the message is a blind carbon copy, the recipient can only tell whether the message was forwarded through the alias by examining the message headers. However, the standard does not mandate mentioning the envelope recipient in the headers. Therefore, recipients of a message may not be able to recover what email address has been used by the sender to eventually deliver the message to their mailbox.

Blind carbon copy allows the sender of a message to conceal the person entered in the Bcc: field from the other recipients. This concept originally applied to paper correspondence and now also applies to email.

Recipients who cannot trace what address the sender used are unable to ask the sender to stop sending, because the sender most likely will not be able to associate their current email address with the one used for sending. Even if users are able to learn the exact address used for sending, their mail client may not provide a convenient way to submit a reply using the latter as the sender address of the response. In other words, aliasing is not reversible. This is particularly relevant in opt-out situations where the sender does not provide a reliable mechanism in the body of the message. Typically, newsletters sent to undisclosed recipients can be sent submitting the body once along with a list of recipients, which is much less resource intensive than submitting a different body for each recipient. However, if VERP or BATV are being used (e.g. to prevent email backscatter), the electronic mailing list software will send individual messages to each recipient with a different SMTP FROM address.

The term opt-out refers to several methods by which individuals can avoid receiving unsolicited product or service information. This ability is usually associated with direct marketing campaigns such as, e-mail marketing, or direct mail. A list of those who have opted out is called a Robinson list.

A newsletter is a printed report containing news (information) of the activities of a business or an organization that is sent by mail regularly to all its members, customers, employees or people, who are interested in. Newsletters generally contain one main topic of interest to its recipients. A newsletter may be considered grey literature. E-newsletters are delivered electronically via e-mail and can be viewed as spamming if e-mail marketing is sent unsolicited.

Backscatter is incorrectly automated bounce messages sent by mail servers, typically as a side effect of incoming spam.

Abuse issue

The recipient's SMTP server sees only the forwarding system's IP address. In general it has no reason to trust the Received: headerfield generated by the forwarding system and does not know the originating system's IP address. Therefore, recipients cannot reliably distinguish spam to the alias address from spam generated on the forwarding system. When a recipient reports a message to his ISP as spam, the ISP credits that spam to the forwarding system. ISPs with low abuse thresholds may begin blocking email from the forwarding system.

An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.

See also

Notes

  1. RFC 5321 defines alias expansion as opposed to the list expansion of mailing lists, noting that the replacement of the address to whom bounce messages are returned makes a key difference. An email alias is different from a contact group, or distribution list. According to Microsoft, a contact group is "a grouping of e-mail addresses collected under one name. A message sent to a contact group goes to all recipients listed in the group."

Related Research Articles

The Simple Mail Transfer Protocol (SMTP) is a communication protocol for electronic mail transmission. As an Internet standard, SMTP was first defined in 1982 by RFC 821, and updated in 2008 by RFC 5321 to Extended SMTP additions, which is the protocol variety in widespread use today. Mail servers and other message transfer agents use SMTP to send and receive mail messages. Proprietary systems such as Microsoft Exchange and IBM Notes and webmail systems such as Outlook.com, Gmail and Yahoo! Mail may use non-standard protocols internally, but all use SMTP when sending to or receiving email from outside their own systems. SMTP servers commonly use the Transmission Control Protocol on port number 25.

Open mail relay

An open mail relay is an SMTP server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users. This used to be the default configuration in many mail servers; indeed, it was the way the Internet was initially set up, but open mail relays have become unpopular because of their exploitation by spammers and worms. Many relays were closed, or were placed on blacklists by other servers.

A Domain Name System-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming. It is a "blacklist" of locations on the Internet reputed to send email spam. The locations consist of IP addresses which are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists. The term "Blackhole List" is sometimes interchanged with the term "blacklist" and "blocklist".

Various anti-spam techniques are used to prevent email spam.

Sender Policy Framework (SPF) is an email authentication method designed to detect forged sender addresses in emails, a technique often used in phishing and email spam.

Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate, the originating server will try again after a delay, and if sufficient time has elapsed, the email will be accepted.

A bounce message or just "bounce" is an automated message from a mail system, informing the sender of a previous message that that message had not been delivered. The original message is said to have "bounced". More formal terms for bounce message include "Non-Delivery Report" or "Non-Delivery Receipt" (NDR), [Failed] "Delivery Status Notification" (DSN) message, or a "Non-Delivery Notification" (NDN).

Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages and validating the identities of the any message MTAs who participated in transferring and possibly modifying a message.

Message submission agent computer program or software agent that receives electronic mail messages

A message submission agent (MSA) or mail submission agent is a computer program or software agent that receives electronic mail messages from a mail user agent (MUA) and cooperates with a mail transfer agent (MTA) for delivery of the mail. It uses ESMTP, a variant of the Simple Mail Transfer Protocol (SMTP), as specified in RFC 6409.

Disposable email addressing, also known as DEA or dark mail, refers to an approach where a unique email address is used for every contact or entity. The benefit is that if anyone compromises the address or utilises it in connection with email abuse, the address owner can easily cancel it without affecting any of their other contacts.

For a mail transfer agent (MTA), the Sender Rewriting Scheme (SRS) is a scheme for rewriting the envelope sender address of an email message, in view of remailing it. In this context, remailing is a kind of email forwarding. SRS was devised in order to forward email without breaking the Sender Policy Framework (SPF), in 2003.

Variable envelope return path (VERP) is a technique used by some electronic mailing list software to enable automatic detection and removal of undeliverable e-mail addresses. It works by using a different return path for each recipient of a message.

Email spoofing is the creation of email messages with a forged sender address.

A smart host or smarthost is an email server via which third parties can send emails and have them forwarded on to the email recipients' email servers.

A challenge–response system is a type of spam filter that automatically sends a reply with a challenge to the (alleged) sender of an incoming e-mail. It was originally designed in 1997 by Stan Weatherby, and was called Email Verification. In this reply, the sender is asked to perform some action to assure delivery of the original message, which would otherwise not be delivered. The action to perform typically takes relatively little effort to do once, but great effort to perform in large numbers. This effectively filters out spammers. Challenge–response systems only need to send challenges to unknown senders. Senders that have previously performed the challenging action, or who have previously been sent e-mail(s) to, would be automatically whitelisted.

A bounce address is an email address to which bounce messages are delivered. There are many variants of the name, none of them used universally, including return path, reverse path, envelope from, envelope sender, MAIL FROM, 5321-FROM, return address, From_, Errors-to, etc. It is not uncommon for a single document to use several of these names.

Invisible mail, also referred to as iMail, i-mail or Bote mail, is a method of exchanging digital messages from an author to one or more recipients in a secure and untraceable way. It is an open protocol and its java implementation (I2P-Bote) is free and open-source software, licensed under the GPLv3.

People tend to be much less bothered by spam slipping through filters into their mail box, than having desired e-mail ("ham") blocked. Trying to balance false negatives vs false positives is critical for a successful anti-spam system. As servers are not able to block all spam there are some tools for individual users to help control over this balance.