mailto

from Wikipedia, the free encyclopedia

mailto ( English for [send] mail to ) is a URI scheme for e-mail addresses and is used on websites to create hyperlinks (abbreviated to links), via which users cansendan e-mail to a specified e-mail -Address without having toenterit in an e-mail program beforehand.

mailto was originally defined as RFC 2368 in the Request for Comments (RFC) and published in July 1998. In October 2010, the revised specification was published as RFC 6068 .

use

Creating a link with mailto to send emails:

<a href="mailto:jemand@beispiel.com">E-Mail senden</a>

Specification of the header data and the message text via the URL ; spaces, carriage return and line feed cannot be embedded, but must be encoded in percent:

<a href="mailto:jemand@beispiel.com?subject=Betreff&cc=jemand_anderes@beispiel.com&body=Dies%20ist%20eine%20Textnachricht">E-Mail senden</a>

Specification of several email addresses:

<a href="mailto:jemand@beispiel.com,jemand_anderes@beispiel.com">E-Mail senden</a>

Information without pre-setting the recipient address:

<a href="mailto:?to=&subject=mailto%20mit%20Beispielen&body=https%3A%2F%2Fde.wikipedia.org%2Fwiki%2FMailto"> Dieses Wissen teilen ... </a>

Security and data protection

A number of security problems are known for the mailto - URI scheme RFC 2368 of July 1998. The greatest concern here is the automated collection of email addresses by bots (abbreviation for robots ). mailto constructs, which also include DOM constructs or regular expressions , can be read out on HTML pages on the World Wide Web (WWW) using various scripting languages . E-mail addresses collected in this way can generate large amounts of unsolicited e-mail ( spam ) for the recipients when used via mailing lists .

There are various options for protecting mailto links from being automatically read out, for example by munging addresses or disguising JavaScript- based addresses, but this protection can also be circumvented by using sufficiently complicated e-mail harvesters . Other techniques, such as addressing behind a CAPTCHA or a similar "humanity check", offer the security of other contact methods, especially web forms, which have similar problems with spam blocking, but are also not entirely secure.

Web links

Individual evidence

  1. Jürgen Schmidt: Microsoft's Outlook also falls into the URI trap . heise online, October 9, 2007.
  2. Hide Email Address from Bots - Keep mailto: on Stack Overflow, accessed April 5, 2019
  3. Till Krüss: PHP-Plugin: Email Address Encoder on GitHub, March 4, 2018.
  4. Thomas von Mengden: 15 ways to protect the e-mail address . HostEurope, November 7, 2015.
  5. Address Munging Lab , University of Washington, Paul G. Allen School of Computer Science & Engineering, 2007 (English)
  6. The Official CAPTCHA Site ( Memento of the original from April 4, 2012 in the Internet Archive ) Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice. , Carnegie Mellon University, Pittsburgh, USA, accessed April 5, 2019 @1@ 2Template: Webachiv / IABot / www.captcha.net
  7. Bert Ungerer: Google knows enough: Invisible reCAPTCHA without a click . heise online, March 11, 2017.
  8. Sascha Dubbel: This is how artificial intelligence cracks the CAPTCHAs . Computer Week , July 9, 2018.
  9. Signe Brewster: Time to abandon the CAPTCHA? AI software solves them with 90 percent accuracy . GIGAOM, October 28, 2013 (English)