Recent from talks
Nothing was collected or created yet.
Post Office Protocol
View on WikipediaThis article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
| Internet protocol suite |
|---|
| Application layer |
| Transport layer |
| Internet layer |
| Link layer |
In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server.[1] Today, POP version 3 (POP3) is the most commonly used version. Together with IMAP, it is one of the most common protocols for email retrieval.
Purpose
[edit]The Post Office Protocol provides access via an Internet Protocol (IP) network for a user client application to a mailbox (maildrop) maintained on a mail server. The protocol supports list, retrieve and delete operations for messages. POP3 clients connect, retrieve all messages, store them on the client computer, and finally delete them from the server.[2] This design of POP and its procedures was driven by the need of users having only temporary Internet connections, such as dial-up access, allowing these users to retrieve e-mail when connected, and subsequently to view and manipulate the retrieved messages when offline.
POP3 clients also have an option to leave mail on the server after retrieval, and in this mode of operation, clients will only download new messages which are identified by using the UIDL command (unique-id list). By contrast, the Internet Message Access Protocol (IMAP) was designed to normally leave all messages on the server to permit management with multiple client applications, and to support both connected (online) and disconnected (offline) modes of operation.
A POP3 server listens on TCP well-known port number 110 for service requests. Encrypted communication for POP3 is either requested after protocol initiation, using the STLS command, if supported, or by POP3S, which connects to the server using Transport Layer Security (TLS) or Secure Sockets Layer (SSL) on well-known TCP port number 995.
Messages available to the client are determined when a POP3 session opens the maildrop, and are identified by message-number local to that session or, optionally, by a unique identifier assigned to the message by the POP server. This unique identifier is permanent and unique to the maildrop and allows a client to access the same message in different POP sessions. Mail is retrieved and marked for deletion by the message-number. When the client exits the session, mail marked for deletion is removed from the maildrop.
History
[edit]The first version of the Post Office Protocol, POP1, was specified in RFC 918 (1984) by Joyce K. Reynolds. POP2 was specified in RFC 937 (1985).
POP3 is the version in most common use. It originated with RFC 1081 (1988) but the most recent specification is RFC 1939, updated with an extension mechanism (RFC 2449) and an authentication mechanism in RFC 1734. This led to a number of POP implementations such as Pine, POPmail, and other early mail clients.
While the original POP3 specification supported only an unencrypted USER/PASS login mechanism or Berkeley .rhosts access control, today POP3 supports several authentication methods to provide varying levels of protection against illegitimate access to a user's e-mail. Most are provided by the POP3 extension mechanisms. POP3 clients support SASL authentication methods via the AUTH extension. MIT Project Athena also produced a Kerberized version. RFC 1460 introduced APOP into the core protocol. APOP is a challenge–response protocol which uses the MD5 hash function in an attempt to avoid replay attacks and disclosure of the shared secret. Clients implementing APOP include Mozilla Thunderbird, Opera Mail, Eudora, KMail, Novell Evolution, RimArts' Becky!,[3] Windows Live Mail, PowerMail, Apple Mail, and Mutt. RFC 1460 was obsoleted by RFC 1725, which was in turn obsoleted by RFC 1939.
POP4
[edit]POP4 exists only as an informal proposal adding basic folder management, multipart message support, as well as message flag management to compete with IMAP; however, its development has not progressed since 2003. There are now two known POP4 server implementations. As of October 2013, the POP4.org domain and website are now hosted by simbey.com, which also runs the other POP4 server implementation.[4]
Extensions and specifications
[edit]An extension mechanism was proposed in RFC 2449 to accommodate general extensions as well as announce in an organized manner support for optional commands, such as TOP and UIDL. The RFC did not intend to encourage extensions, and reaffirmed that the role of POP3 is to provide simple support for mainly download-and-delete requirements of mailbox handling.
The extensions are termed capabilities and are listed by the CAPA command. With the exception of APOP, the optional commands were included in the initial set of capabilities. Following the lead of ESMTP (RFC 5321), capabilities beginning with an X signify local capabilities.
STARTTLS
[edit]The STARTTLS extension allows the use of Transport Layer Security (TLS) or Secure Sockets Layer (SSL) to be negotiated using the STLS command, on the standard POP3 port, rather than an alternate. Some clients and servers instead use the alternate-port method, which uses TCP port 995 (POP3S).
SDPS
[edit]Demon Internet introduced extensions to POP3 that allow multiple accounts per domain, and has become known as Standard Dial-up POP3 Service (SDPS).[5] To access each account, the username includes the hostname, as john@hostname or john+hostname.
Google Apps uses the same method.[6]
Kerberized Post Office Protocol
[edit]In computing, local e-mail clients can use the Kerberized Post Office Protocol (KPOP), an application-layer Internet standard protocol, to retrieve e-mail from a remote server over a TCP/IP connection. The KPOP protocol is based on the POP3 protocol – differing in that it adds Kerberos security and that it runs by default over TCP port number 1109 instead of 110. One mail server software implementation is found in the Cyrus IMAP server.
Session example
[edit]The following POP3 session dialog is an example in RFC 1939:[7]
S: <wait for connection on TCP port 110> C: <open connection> S: +OK POP3 server ready <1896.697170952@dbc.mtview.ca.us> C: APOP mrose c4c9334bac560ecc979e58001b3e22fb S: +OK mrose's maildrop has 2 messages (320 octets) C: STAT S: +OK 2 320 C: LIST S: +OK 2 messages (320 octets) S: 1 120 S: 2 200 S: . C: RETR 1 S: +OK 120 octets S: <the POP3 server sends message 1> S: . C: DELE 1 S: +OK message 1 deleted C: RETR 2 S: +OK 200 octets S: <the POP3 server sends message 2> S: . C: DELE 2 S: +OK message 2 deleted C: QUIT S: +OK dewey POP3 server signing off (maildrop empty) C: <close connection> S: <wait for next connection>
POP3 servers without the optional APOP command expect the client to log in with the USER and PASS commands:
C: USER mrose S: +OK User accepted C: PASS tanstaaf S: +OK Pass accepted
Comparison with IMAP
[edit]The Internet Message Access Protocol (IMAP) is an alternative and more recent mailbox access protocol. The highlights of differences are:
- POP is a simpler protocol, making implementation easier.
- POP moves the message from the email server to the local computer, although there is usually an option in email clients to leave the messages on the email server as well. IMAP defaults to leaving the message on the email server, simply downloading a local copy.
- POP treats the mailbox as a single store, and has no concept of folders
- An IMAP client performs complex queries, asking the server for headers, or the bodies of specified messages, or to search for messages meeting certain criteria. Messages in the mail repository can be marked with various status flags (e.g. "deleted" or "answered") and they stay in the repository until explicitly removed by the user—which may not be until a later session. In short: IMAP is designed to permit manipulation of remote mailboxes as if they were local. Depending on the IMAP client implementation and the mail architecture desired by the system manager, the user may save messages directly on the client machine, or save them on the server, or be given the choice of doing either.
- POP provides a completely static view of the current state of the mailbox, and does not provide a mechanism to show any external changes in state during the session (the client must reconnect and re-authenticate to get an updated view).
- IMAP provides a dynamic view, and sends responses for external changes in state, including newly arrived messages, as well as changes made to the mailbox by other concurrently connected clients.
- POP can either retrieve an entire message with the RETR command, and for servers that support it, the headers, as well as a specified number of body lines can be accessed with the TOP command.
- IMAP allows clients to retrieve any of the individual MIME parts separately – for example, retrieving the plain text without retrieving attached files, or retrieving only one of many attached files.
- IMAP supports flags on the server to keep track of message state: for example, whether or not the message has been read, replied to, forwarded, or deleted.
- POP provides the ability to associate unique identifiers with each message for servers which support the UIDL command. This can be any string of standard visible (non-whitespace) 7-bit ASCII characters up to 70 characters.
- IMAP instead provides unique numerical identifiers for each message, local to each folder, in conjunction with a folder specific UIDVALIDITY number.
- The above two message identification methods (POP UIDL and IMAP UID) are not at all related unless a server implementation which supports both protocols purposely builds the POP3 UIDL string by combining the IMAP UID and UIDVALIDITY values.
Related requests for comments (RFCs)
[edit]- RFC 918 – POST OFFICE PROTOCOL
- RFC 937 – POST OFFICE PROTOCOL – VERSION 2
- RFC 1081 – Post Office Protocol – Version 3
- RFC 1939 – Post Office Protocol – Version 3 (STD 53)
- RFC 1957 – Some Observations on Implementations of the Post Office Protocol (POP3)
- RFC 2195 – IMAP/POP AUTHorize Extension for Simple Challenge/Response
- RFC 2384 – POP URL Scheme
- RFC 2449 – POP3 Extension Mechanism
- RFC 2595 – Using TLS with IMAP, POP3 and ACAP
- RFC 3206 – The SYS and AUTH POP Response Codes
- RFC 5034 – The Post Office Protocol (POP3) Simple Authentication and Security Layer (SASL) Authentication Mechanism
- RFC 8314 – Cleartext Considered Obsolete: Use of Transport Layer Security (TLS) for Email Submission and Access
See also
[edit]References
[edit]- ^ Dean, Tamara (2010). Network+ Guide to Networks. Delmar. p. 519. ISBN 978-1423902454.
- ^ Allen, David (2004). Windows to Linux. Prentice Hall. p. 192. ISBN 1423902459.
- ^ (in Japanese), (Becky! tutorial) Archived 2010-01-31 at the Wayback Machine, 2001-04-26.
- ^ "POP4 specification although pop is used to receive mail after system is not online". 2003. Archived from the original on 2017-10-21. Retrieved 2011-10-17.
- ^ Demon Online Help Centre Archived 2011-07-23 at archive.today. E.demon.net (2013-01-23). Retrieved on 2013-07-17.
- ^ "Google Apps and Gmail differences". Gmail Help Center. Archived from the original on September 13, 2008.
- ^ RFC 1939, page 19 (https://datatracker.ietf.org/doc/rfc1939/)
Further reading
[edit]- Hughes, L (1998). Internet e-mail Protocols, Standards and Implementation. Artech House Publishers. ISBN 0-89006-939-5.
- Johnson, K (2000). Internet Email Protocols: A Developer's Guide. Addison-Wesley Professional. ISBN 0-201-43288-9.
- Loshin, P (1999). Essential Email Standards: RFCs and Protocols Made Practical. John Wiley & Sons. ISBN 0-471-34597-0.
- Rhoton, J (1999). Programmer's Guide to Internet Mail: SMTP, POP, IMAP, and LDAP. Elsevier. ISBN 1-55558-212-5.
- Wood, D (1999). Programming Internet Mail. O'Reilly. ISBN 1-56592-479-7.
- Post Office Protocol – Version 3. IETF. May 1996.
External links
[edit]- IANA port number assignments
- POP3 Sequence Diagram (Archived on 6 July 2017)
Post Office Protocol
View on GrokipediaOverview
Definition and Purpose
The Post Office Protocol (POP) is an application-layer Internet standard protocol, designated as STD 53, used for retrieving electronic mail messages from a remote server over TCP/IP networks.[6] It operates primarily in a client-server model where an email client connects to a mail server to access a user's maildrop, a repository of incoming messages.[1] The primary purpose of POP is to enable email clients to download messages from the server, supporting core operations such as listing available messages, retrieving their contents, and optionally marking them for deletion.[1] This design facilitates efficient mail retrieval for end-users, particularly in environments with limited client resources, by allowing the transfer of messages to local storage on the client device.[1] POP typically assumes intermittent network connections, such as dial-up access, where users connect briefly to fetch mail before disconnecting, with messages downloaded to the client and deleted from the server by default to free up server space.[7] Key benefits of POP include its inherent simplicity, which minimizes implementation complexity and supports widespread adoption across diverse email clients; reduced server resource demands, as retrieved messages are removed from the server; and suitability for offline access on a single primary device, where users manage mail locally without ongoing server dependency.[7] POP evolved alongside the Simple Mail Transfer Protocol (SMTP) to complement email systems, handling message retrieval after SMTP delivers incoming mail to the server. POP connections occur over TCP port 110 for unencrypted sessions or port 995 for encrypted ones.[8]Basic Architecture
The Post Office Protocol (POP) employs a client-server architecture in which a mail user agent (MUA), such as an email client on a workstation, establishes a connection to a mail server hosting the user's maildrop. The server, which hosts the user's mailbox, maintains incoming emails in a dedicated mailbox for each user, accessible dynamically over the network. This model enables the MUA to retrieve and store messages locally on the client device, contrasting with protocols like SMTP that focus on message transmission.[9] POP sessions proceed through three distinct phases: authorization, transaction, and update. During the authorization phase, the client authenticates with the server, which then locks the user's maildrop to prevent concurrent access. The transaction phase allows the client to interact with the mailbox contents, such as listing or fetching messages, while deferring any permanent changes. Finally, in the update phase, upon session termination, the server processes deletions, releases the lock, and closes the connection, ensuring data consistency.[9] Messages in POP are stored server-side in a single, linear mailbox per user, with the client retrieving entire messages sequentially by their ordinal numbers, typically downloading them in full to the local device. This approach assumes offline access post-retrieval, often resulting in server-side deletion after successful transfer, though clients may choose to leave copies. The protocol uses TCP port 110 for unencrypted connections, while secure variants operate on port 995 with TLS encryption.[8] At its core, POP is a simple, text-oriented protocol relying on ASCII-encoded commands and responses exchanged over the TCP stream. Commands are short, fixed-length strings (three or four characters) terminated by a carriage return and line feed (CRLF), with responses prefixed by "+OK" for success or "-ERR" for failure. Multi-line data, such as message bodies, is delimited by a single period (.) on a line by itself, supporting efficient transfer of octet-based email content without complex parsing.[9]History
Early Development
The Post Office Protocol (POP) was first introduced in 1984 through RFC 918, which specified version 1 (POP1) as an experimental protocol for the ARPA-Internet community. Authored by J. K. Reynolds, POP1 provided a basic mechanism for workstations to dynamically access and retrieve mail from a mailbox server using TCP.[10] The development of POP1 was driven by the need for simple, client-initiated email retrieval in the ARPANET environment, where limited bandwidth and local storage made it impractical for users to maintain full mailboxes on remote servers. This allowed messages to be downloaded to local systems for offline reading, addressing the growing demand for personal email access amid the network's resource constraints.[10] In 1985, POP version 2 (POP2) followed with RFC 937, authored by M. Butler, J. Postel, D. Chase, J. Goldberger, and J. K. Reynolds, refining the protocol for use over reliable transport like TCP on port 109. POP2 introduced improvements such as enhanced error handling through acknowledgment commands (ACKS, ACKD, NACK) and the READ command to obtain message sizes before full retrieval with RETR, while still emphasizing straightforward download and deletion of entire messages.[11] Despite these advancements, early POP versions shared fundamental limitations, including rudimentary authentication restricted to plaintext username and password exchanges, and no provisions for organizing messages into folders or handling multi-part content. These constraints reflected the protocols' focus on minimalism for early network conditions.[10][11] POP1 and POP2 established the core principles of server-based mail retrieval, setting the stage for more comprehensive standards as email traffic on the Internet proliferated.[11]POP3 Standardization
The Post Office Protocol version 3 (POP3) was first standardized in November 1988 through RFC 1081, which defined a protocol for workstations to dynamically access maildrops on server hosts, enabling efficient retrieval of email messages over TCP/IP networks.[12] This initial specification established POP3's core commands and session states, focusing on simplicity to support the growing use of personal computers for email access.[12] Over the following years, POP3 underwent several revisions to address ambiguities and implementation issues. RFC 1081 was obsoleted by a series of updates, including RFC 1225 (1991), RFC 1460 (1993), and RFC 1725 (1994), culminating in RFC 1939 in May 1996, which provided clearer specifications and fixed minor bugs while maintaining backward compatibility.[9] RFC 1939 incorporated POP3 into Internet Standard 53 (STD 53), solidifying its status as the definitive reference for the protocol.[6] Key enhancements in these updates included the addition of the APOP command for challenge-response authentication using MD5 digests to avoid transmitting plaintext passwords, the UIDL command for generating unique identifiers for messages to prevent duplication across sessions, and the optional TOP command for previewing message headers and a limited number of body lines without full retrieval.[9] POP3's widespread adoption as the de facto standard for email retrieval stemmed from its straightforward design, which required minimal server resources and integrated seamlessly with early graphical email clients such as Pine (released in 1991) and Eudora (introduced in 1988).[13] These clients leveraged POP3's efficiency for offline storage and local management of messages, making it ideal for dial-up connections prevalent in the 1990s.[13] Since the publication of RFC 1939, POP3 has remained stable with no major revisions, allowing consistent implementation across diverse systems while optional extensions handle evolving needs.[9]POP4 Proposal
In 2003, an informal proposal for POP4 emerged as an extension to POP3, aiming to remedy key limitations such as the absence of server-side folder management and suboptimal handling of multipart messages, which restricted POP3's utility for more complex email workflows.[14] The proposed protocol incorporated several IMAP-inspired enhancements while preserving POP3's simplicity, including namespace commands for creating and navigating folders (e.g., LISTFOLDERS and SELECTFOLDER), support for up to 32 message flags (such as Read, Deleted, and Answered), and server-side search capabilities via the SEARCH command; these features were designed to enable hybrid POP/IMAP environments where users could maintain server-side organization without fully migrating to IMAP.[15] Development of POP4 stalled shortly after its introduction, overshadowed by IMAP's established dominance in providing advanced email management; as of the last documented update in 2013, only two experimental implementations were available—the O3 mail server and SimbeyServer—neither of which achieved broader deployment.[14][16] POP4's lack of adoption stems from its functional overlap with IMAP, which already addressed demands for folder support and message flagging, coupled with limited interest in bolstering POP amid the rise of web-based email interfaces that diminished reliance on client-side protocols. No further progress on the proposal has been observed as of 2025.[17][18]Protocol Mechanics
Commands and Responses
The Post Office Protocol version 3 (POP3) employs a simple, text-based command structure where clients send commands consisting of case-insensitive keywords, typically three or four characters long, optionally followed by arguments separated by a single space, and terminated by a carriage return and line feed (CRLF). Arguments are limited to 40 characters in length. Examples include USER followed by a username or PASS followed by a password string, both used in the authorization phase.[19] Server responses in POP3 follow a standardized format to indicate success, failure, or data transmission. Positive responses begin with +OK, optionally followed by human-readable information, and end with CRLF. Negative responses start with -ERR, also terminated by CRLF, signaling errors such as unrecognized commands or invalid arguments. Multi-line responses, used for transmitting message content or metadata, commence with +OK, followed by one or more lines of data (with lines beginning with a single period byte-stuffed by prepending another period (i.e., to '..') to avoid premature termination), and conclude with a single period on a line by itself followed by CRLF (i.e., ".CRLF").[20] POP3 operates through a state machine with three primary states: authorization, transaction, and update. In the authorization state, the client must issue USER and PASS commands to authenticate before proceeding; successful authentication transitions the session to the transaction state. The transaction state allows message manipulation, and issuing QUIT transitions to the update state, where deletions are finalized before the connection closes. If authentication fails or QUIT is issued prematurely, the connection terminates without entering subsequent states.[21] Key commands in the authorization state include USER name, which identifies the mailbox and prompts for a subsequent PASS or QUIT, and PASS string, which authenticates the user following a valid USER command; both elicit +OK on success or -ERR on failure. In the transaction state, STAT returns the total number of messages (nn) and their cumulative size in octets (mm) as "+OK nn mm". LIST [msg] lists message numbers and sizes, either for a specific message or all messages in multi-line format if no argument is provided. RETR msg retrieves the full content of the specified message in multi-line format. DELE msg marks the message for deletion, which is only executed during the update state to allow transaction rollback if needed.[22] Additional transaction commands enhance functionality without altering the core retrieval model. UIDL [msg] provides unique identifiers for messages, either for a specific one or all in multi-line format, enabling clients to track messages across sessions without relying on sequential numbers. TOP msg n retrieves the message headers plus the first n lines of the body in multi-line format, useful for previewing without full download. NOOP performs no operation but returns +OK, often used to maintain the connection or test server responsiveness.[22] Error handling in POP3 relies on -ERR responses for invalid syntax, unimplemented commands, or state-inappropriate actions, such as issuing transaction commands before authorization. Servers may include descriptive text after -ERR for diagnostics, but clients must not depend on it. The QUIT command handles session termination: in the authorization state, it closes the connection immediately; in the transaction state, it first triggers the update state to remove marked messages and release resources before closing. Unrecognized commands always yield -ERR without state changes.[20]| Command | Syntax | State | Description |
|---|---|---|---|
| USER | USER name | Authorization | Specifies the mailbox name; requires PASS next on success. |
| PASS | PASS string | Authorization | Authenticates the password; transitions to transaction on success. |
| APOP | APOP name digest | Authorization | Authenticates using MD5 challenge-response. |
| STAT | STAT | Transaction | Returns message count and total size. |
| LIST | LIST [msg] | Transaction | Lists message numbers and sizes (multi-line if no msg). |
| RETR | RETR msg | Transaction | Retrieves full message (multi-line). |
| DELE | DELE msg | Transaction | Marks message for deletion (deferred until update). |
| UIDL | UIDL [msg] | Transaction | Lists unique IDs for messages (multi-line if no msg). |
| TOP | TOP msg n | Transaction | Retrieves headers + n body lines (multi-line). |
| NOOP | NOOP | Transaction | No operation; returns +OK. |
| QUIT | QUIT | Any | Terminates session, performing update if in transaction. |
Authentication Process
The Post Office Protocol version 3 (POP3) authentication process begins with the server sending a greeting message to the client upon connection establishment, typically in the form of "+OK" to provide the plaintext password for verification. This sequence transmits credentials in clear text, making it susceptible to interception by network eavesdroppers if not protected by external encryption layers.
Security Considerations
Encryption Methods
The primary encryption method for POP3 communications is the use of Transport Layer Security (TLS), which protects the confidentiality and integrity of email retrieval sessions against eavesdropping and tampering. This integration, specified in RFC 2595, enables secure upgrades from plaintext connections and supports modern cryptographic standards to mitigate risks associated with unencrypted transmissions. RFC 8314 further deprecates cleartext POP3, recommending implicit TLS on port 995 as the preferred method and urging a transition away from unencrypted access.[27][28] STARTTLS provides an opportunistic mechanism for encrypting POP3 sessions on the standard port 110. After establishing a plaintext TCP connection, the client issues the STLS command to initiate a TLS handshake, converting the session to encrypted transport if the server supports it; this upgrade typically occurs before authentication to avoid exposing credentials in cleartext.[28] Servers advertise STLS capability via the CAPA command, as defined in RFC 2449, allowing clients to detect and negotiate encryption support early in the session. In contrast, POP3S establishes a dedicated TLS-secured connection directly on port 995, where the TLS handshake begins immediately upon TCP connection without requiring an explicit upgrade command.[27] This implicit TLS approach, outlined in RFC 2595 and reinforced by RFC 8314, simplifies deployment by eliminating negotiation overhead and is recommended for environments prioritizing security from the outset.[28] Additional extensions enhance POP3 security in specialized contexts. The KPOP variant integrates Kerberos V5 authentication on port 1109, replacing plaintext passwords with encrypted Kerberos tickets for secure credential verification, though it may still benefit from concurrent TLS for full transport protection. Since the retirement of basic authentication in Exchange Online in December 2022, access requires modern methods like OAuth 2.0 over TLS-secured connections, with TLS 1.2 mandated since October 2020 to support these flows without insecure fallbacks.[26]Vulnerabilities and Mitigations
The Post Office Protocol version 3 (POP3) is susceptible to several security vulnerabilities primarily stemming from its original design, which did not incorporate modern cryptographic protections. One major risk is the transmission of data in plaintext over the default port 110, enabling eavesdropping attacks where unauthorized parties can intercept credentials and email content during transit.[29] This vulnerability facilitates man-in-the-middle (MITM) attacks, as demonstrated by reports indicating nearly 3.3 million POP3 and IMAP servers exposed to network sniffing in January 2025.[30] Additionally, the default authentication mechanism using USER and PASS commands sends credentials in cleartext, making it prone to brute-force attacks where attackers repeatedly guess passwords without rate limiting in basic implementations.[31] POP3 also lacks inherent end-to-end encryption, leaving messages vulnerable after download to the client device.[32] Historically, POP3 faced exploits in the pre-TLS era, where unencrypted sessions allowed widespread packet sniffing to capture sensitive data, a common threat in the 1990s and early 2000s before widespread adoption of transport-layer security.[32] The APOP extension, intended to provide challenge-response authentication using MD5 hashing, has been compromised by vulnerabilities such as collision-based key-recovery attacks and MITM techniques that exploit MD5 weaknesses, allowing partial password recovery.[33][34] To mitigate these risks, administrators should enforce the use of STARTTLS to upgrade plaintext connections to encrypted ones or mandate POP3S on port 995 for implicit TLS, as outlined in RFC 2595 and recommended by RFC 8314, which significantly reduces eavesdropping and MITM threats.[35][36] Integrating Simple Authentication and Security Layer (SASL) mechanisms, such as SCRAM-SHA-256, provides stronger password-based authentication resistant to offline attacks, with support available in modern POP3 servers like Dovecot.[37] For providers like Microsoft Exchange Online, the 2022 retirement of basic authentication mandates OAuth 2.0, which uses token-based access over TLS without plaintext credentials.[26][38] Best practices include disabling legacy authentication methods to prevent fallback to insecure options, monitoring CAPA responses to verify support for secure extensions like STLS and advanced AUTH mechanisms, and combining POP3 with TLS-secured SMTP for holistic email security.[39][40] In 2025, enterprise trends emphasize restricting insecure POP3 usage through authentication policies rather than full protocol retirement, driven by regulatory pressures and ongoing vulnerability reports highlighting exposed servers.[41][42]Practical Usage
Sample Session
A sample POP3 session illustrates the protocol's operation from connection establishment through authentication, message retrieval, deletion, and disconnection, as defined in the core specification.[9] This example demonstrates transitions between the AUTHORIZATION, TRANSACTION, and UPDATE states, showing typical client-server interactions over a TCP connection on port 110.[20] The following is a complete example session extracted from the specification, where the client uses the APOP command for authentication (an optional MD5-based method), retrieves both messages, deletes them, and quits.[43] Lines prefixed with "S:" represent server responses, and "C:" denote client commands; multi-line responses end with a single period (.) on its own line.S: <wait for connection on TCP port 110>
C: <open connection>
S: +OK POP3 server ready <[email protected]>
C: APOP mrose c4c9334bac560ecc979e58001b3e22fb
S: +OK mrose's maildrop has 2 messages (320 octets)
C: STAT
S: +OK 2 320
C: LIST
S: +OK 2 messages (320 octets)
S: 1 120
S: 2 200
S: .
C: RETR 1
S: +OK 120 octets
S: <the POP3 server sends message 1>
S: .
C: DELE 1
S: +OK message 1 deleted
C: RETR 2
S: +OK 200 octets
S: <the POP3 server sends message 2>
S: .
C: DELE 2
S: +OK message 2 deleted
C: QUIT
S: +OK dewey POP3 server signing off (maildrop empty)
C: <close connection>
S: <wait for next connection>
S: <wait for connection on TCP port 110>
C: <open connection>
S: +OK POP3 server ready <[email protected]>
C: APOP mrose c4c9334bac560ecc979e58001b3e22fb
S: +OK mrose's maildrop has 2 messages (320 octets)
C: STAT
S: +OK 2 320
C: LIST
S: +OK 2 messages (320 octets)
S: 1 120
S: 2 200
S: .
C: RETR 1
S: +OK 120 octets
S: <the POP3 server sends message 1>
S: .
C: DELE 1
S: +OK message 1 deleted
C: RETR 2
S: +OK 200 octets
S: <the POP3 server sends message 2>
S: .
C: DELE 2
S: +OK message 2 deleted
C: QUIT
S: +OK dewey POP3 server signing off (maildrop empty)
C: <close connection>
S: <wait for next connection>
C: <open connection>
S: +OK POP3 server ready <timestamp>
C: CAPA
S: +OK Capability list follows
S: STLS
S: .
C: STLS
S: +OK Begin TLS negotiation
<TLS Negotiation, e.g., ClientHello, ServerHello, key exchange>
C: APOP mrose <hashed credentials>
... (remainder as in unsecured session, now over TLS)
C: <open connection>
S: +OK POP3 server ready <timestamp>
C: CAPA
S: +OK Capability list follows
S: STLS
S: .
C: STLS
S: +OK Begin TLS negotiation
<TLS Negotiation, e.g., ClientHello, ServerHello, key exchange>
C: APOP mrose <hashed credentials>
... (remainder as in unsecured session, now over TLS)
