Table of Contents. Electronic mail. History of (2) History of (1) history. Basic concepts. Aka (or according to Knuth)

Size: px
Start display at page:

Download "Table of Contents. Electronic mail. History of (2) History of (1) history. Basic concepts. Aka (or according to Knuth)"

Transcription

1 Table of Contents Electronic mail Aka (or according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 17.7, 2017/10/03 11:29:40 UTC) Friday, September 29, history Basic concepts Message agents in detail Message transfer Message format security and validity Message storage formats Validating at OS3 History of (1) History of (2) 1971 Tomlinson s first ( ?) Introduces the use of First based on the CPYNET and SNDMSG program Later piggybacked on FTP over ARPANET 1979 UUCP-based introduces the bang (!) not based on TCP/IP (or NCP) 1982 SMTP (Simple Mail Transfer Protocol) specified 1983 sendmail released (4.1c BSD) (late) 1983 DNS specified 1984 DNS toplevel domains specified sendmail knows (ARPANET)! (UUCP) : (BerkNet)

2 Survey October 2001 (Dan Bernstein) Survey May 2003 (Thomas Pircher) 401 UNIX (Sendmail) 176 Windows (Exchange/IIS) 167 UNIX (qmail) 57 Windows (Ipswitch IMail) 23 UNIX (smap) 15 UNIX (IBM Postfix, formerly VMailer) 14 UNIX (Exim) (35.59%) Sendmail 4537 (8.42%) qmail 4104 (7.62%) Postfix 2812 (5.22%) Microsoft (Exchange/IIS) 2464 (4.57%) Exim Source: Thomas Pircher Source: Survey October 2004 (SNE) Survey 2006/2007 (MailChannels) (35.3%) Sendmail (21.0%) Microsoft (Exchange/IIS) 6836 (11.8%) Exim 4008 (6.9%) imail 3669 (6.3%) qmail 3172 (5.5%) Postfix Source: lost Source: O Reilly SysAdmin

3 Survey (securityspace) Survey graph (securityspace) Description Number of Servers Percent Total Number of MX Servers Queried 2,440, Number of Servers that didn t respond 414, Server didn t open socket 402, Server didn t provide banner 11, Server provided banner 2,025, Server banner identifies software in use 1,108, Source: Source: Surveys... warnings concepts Important questions Who did the survey? Were there personal interests? What assumptions were made? What model was chosen? What methods were employed? Is this reproducible? Without answers to these questions the result is worthless, or at least questionable Message transfer (RFC 5321) Message format (RFC 5322) Message agents (RFC 5598) Message stores (RFC 5598)

4 Message Agents Message User Agent Agent acronym MUA MTA MDA MSA MRA 2 MAA 2 Agent use Message 1 User Agent Message Transfer Agent Message Delivery Agent Message Submission Agent Message Retrieval Agent Message Access Agent Interface for the user Reads and composes messages Thunderbird, Outlook, mutt, pine, mh Webmail (browser frontend; backend is more like an MRA 3 ) Often uses SMTP to send mail ( MSA) Often uses IMAP/POP3 to get mail ( MAA) May have direct access to message store Direct access is less and less common 1 According to RFC 5598, called Mail User Agent in RFC Not standardised in RFC5598: Internet Mail Architecture 3 Open for discussion Message Transfer Agent Message Delivery Agent Transfers across the Internet Uses SMTP as transfer protocol sendmail, Postfix, qmail, Exim, Often also operates as a Message Submission Agent Makes use of MX records to route Delivers into the message store (MS) mail, local (Postfix), rmail, procmail, sieve May do filtering, SPAM and virus checking, Has knowledge about mailbox formats Can use Global file space (for example /var/mail/mbox) User specific file space (for example $HOME/mbox) Database (often not directly accessible)

5 Message Submission Agent (1) Message Submission Agent (2) See RFC 6409 Injects message into the mail system Sanitizes message content, for instance Message-ID: header must be generated if absent Envelope domains must be FQDNs Date: header must be added or corrected Often combined with MTA Should bind to its own port (587), if possible Often acts as an MTA-frontend Is sometimes integrated into the MTA Can also operate locally sendmail (no daemon mode) postdrop without SMTP or with piped SMTP Message Retrieval Agent Message Access Agent Program that uses a MAA 4 to collect mail Webmail could be seen as a combination of an MUA-frontend and an MRA-backend Possibly reinjects mail into the mail system Typical example is fetchmail which can use an MTA SMTP TURN (Insecure!) SMTP ETRN (More secure variant 5, RFC 1985) SMTP ATRN 6 (Authenticated variant, RFC 2645) Often not considered an agent in the mail handling system probably because it doesn t use SMTP but it is needed to complete the whole picture Knows about and interacts with the Message Store (MS) Offers services to access mail to MUA (or MRA) POP3 (Post Office Protocol) IMAP (Internet Message Access Protocol, version 4) 4 Or sometimes even an MTA 5 Starts a new SMTP connection instead of reusing the old one 6 Providing ODMR (On-Demand Mail Relay) for clients with dynamic IP addresses

6 Message Agent Relationships Message transfer MUA MAA MRA MS MSA Q MTA MDA protocol local process variable SMTP (RFC 5321) Uses the Network Virtual Terminal (NVT) presentation layer from the TELNET RFC (854) Net-ASCII might be replaced in the future by Net-Unicode, see RFC 5198 Mail objects content (in message format ) envelope (SMTP parameters) Normal (E)SMTP session EHLO options EHLO (newer form of HELO ) (greeting, option negotiation) MAIL FROM: (envelope sender) RCPT TO: (envelope recipient) DATA (content, ended by <CRLF>.<CRLF>) QUIT (goodbye) Response 7 from the OS3 mail server smtp.os3.nl to EHLO 250-PIPELINING 250-SIZE ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250 DSN 7 Checked

7 Message format Augmented Backus Naur Form (ABNF) Formally specified by ABNF syntax in RFC 5322 Headers, empty line, body Only 7-bit US-ASCII 8 (1-127) allowed MIME extends this to possibly 8-bit Lines are delimited by <CR><LF> Lines should be no longer than 78 characters Derived from BNF concatenation, choice, literal extended with constructs from EBNF optionals, repetition, grouping, comments Any context free language can be specified by ABNF which is a larger class than the regular languages which are defined by basic 9 regular expressions 8 Or simply ASCII; IANA prefers US-ASCII as character set name in MIME 9 Extended regular expressions are much stronger! Line delimiters (1) Line delimiters (2) Newline, line break, end-of-line (EOL) CR (U+000D) Mac OS before Mac OS X LF (U+000A) Unix CRLF (U+000D, followed by U+000A) Windows Network Virtual Terminal NEL (U+0085) IBM s Next Line More options for newline, line break, end-of-line (EOL) LS (U+2028) Unicode Line Separator PS (U+2029) Unicode Paragraph Separator RS (U+001E) Record Separator (obsolete) LFCR (U+000A, followed by U+000D) Sic!

8 Message (specified in the ABNF formalism) Header format message = (fields / obs-fields) [CRLF body] body = *(*998text CRLF) *998text CRLF = %d13.10 In mathematical terminology there is an isomorphism text + = (text {CRLF}) This is an example of deflation Note the + instead of a CRLF is delimiter or separator, not terminator or initiator <Field name>:<field body> <Field name> printable US-ASCII (33-126) except : (58) <Field body> US-ASCII (1-127) except CR(13) and LF(10) but also (un)folding is allowed Some important headers Internationalized From:<originator mailbox> Sender:<sender mailbox> To:<recipient mailbox> Message-ID:<unique message identification> Received:<recording of message transfer> MIME is only used for the body Headers are still 7-bit US-ASCII RFC 6532 extends the header field format Introduces support for UTF-8 encoded Unicode Permits the direct use of UTF-8 in header field data/values, including mail addresses Also needs SMTP extension from RFC 6531 Introduces SMTPUTF8 EHLO extension

9 Securing (1) Securing (2) Use secure protocols imap (port 143) imaps (port 993) pop3 (port 110) pop3s (port 995) smtp (port 25) smtps, ssmtp (port 465)? 10 SMTP improvements Authenticated SMTP AUTH extension (RFC 4954) Based on SASL 11 (RFC 4422) STARTTLS extension (RFC 3207) Replaces (s)smtp(s) These mechanisms are often used on mail submission via port Not registered as such with IANA 11 Simple Authentication and Security Layer Securing (3) Message store Use MUA-based encryption and authentication PGP (Pretty Good Privacy) Inline or PGP/MIME GPG (GNU Privacy Guard) Uses a web of trust S/MIME Uses a hierarchy of trust (PKI) MIME Multipurpose Internet Mail Extensions Different character sets, binary attachments, multiple parts, internationalised headers In database Only accessible via IMAP, POP3 In flat files Also accessible via direct access Enables grepping the message store

10 Mbox format MMDF format Ordinary file with multiple messages separated by From at start of line has extra blank line at end of message quotes From to >From and >From to >>From a first characteristic line From <envelopesender> <date> <optionalinfo> Variant of mbox format UsesˆA ˆAˆA as separator Optionally has the mbox From information MH format Maildir format Mailbox is a directory Every message is a file with a numeric name Used by mh, nmh, xnmh MUA s Mailbox is again a directory Subdirectories tmp, new, cur Arriving mail: tmp/<time>.<pid>.<host> No mailbox locking needed Works reliably over NFS

11 Mailbox locking Validating (1) Uses flock, lockf, fcntl system calls Does not always work reliably over NFS Needed if delivery agents and/or access agents operate on the same file (mailbox) SPF: Sender Policy Framework RFC 7208 Uses DNS TXT records at the zone apex Specifies whitelist for clients and envelope sender addresses Can check both MAIL FROM: and HELO/EHLO Rather crude and simple system Can break mail forwarding SPF examples Validating (2) apple.com IN TXT "v=spf1 ip4: /8 -all" google.com IN TXT "v=spf1 include:_spf.google.com ~all" uva.nl IN TXT "v=spf1 ip4: /27 ip4: /27 include:_spfout.mf.surf.net include:_spf.aanmelder.nl include:spf.mailtopay.nl?all" DKIM: DomainKeys Identified Mail RFC 6376 Uses DNS TXT records at the domain name <selector>._domainkey.<apex> where <selector> is the s attrribute in the DKIM-Signature header Signs (part of) the header and body of an , which is being checked by the public key of the sending domain Does not depend on the SMTP envelope

12 DKIM examples Validating (3) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s= ; h=from:mime-version:subject:message-id:date:to; _domainkey.gmail.com. 300 IN TXT "k=rsa; p=miibijanbgkqhkig9w0baqefaaocaq8 AMIIBCgKCAQEAviPGBk4ZB64UfSqWyA <snip> svpbq4lxuw9ixaewyzgcsgz4n5q8x8t ndowsduzoccpfghdwidaqab" DMARC: Domain-based Message Authentication, Reporting and Conformance RFC 7489 Focuses on the RFC5322.From (From:) message header Uses SPF and/or DKIM Uses DNS TXT records at the domain name _dmarc.<apex> Enables feedback reports Interesting cases are _dmarc.{apple,facebook,google,microsoft,twitter}.com DMARC examples Cyrus MDA/MAA at OS3 _dmarc.apple.com IN TXT "v=dmarc1;p=none; ruf 12 rua 13 _dmarc.google.com. 300 IN TXT "v=dmarc1; p=reject; IMAP server with support for local delivery through LMTP LMTP: Local Mail Transfer Protocol Similar to ESMTP Uses LHLO instead of EHLO Reports separate status results for every RCPT TO: Therefore no queueing is needed on the receiver side Uses (improved) Maildir format as message store Does not support direct access to mail files 12 Reporting URIs for failure data 13 Reporting URIs for aggregate data

13 OS3 Mail Infrastructure (1) OS3 Mail Infrastructure (2) Separate incoming and outgoing mail services Incoming: smtp.os3.nl Listens on port 25 to the world for mail destined for os3.nl Includes SPAM checking Delivers local mail via SMTP/LMTP to Cyrus on imap.os3.nl Forwards outbound aliases to mail.serv.os3.nl Outgoing: mail.serv.os3.nl Listens on port 25 to the internal network for mail destined for the world (including os3.nl) Forwards local mail to smtp.os3.nl Enable relaying for authenticated users Via smtp.os3.nl Listen on port 587 as a mail submission agent First enforce STARTTLS Use username/password authentication inside the protected connection Enable webmail Via imap.os3.nl Listen on port 443 for https connections and user login

Aka (or according to Knuth) Karst Koymans. Friday, September 25, 2015

Aka  (or  according to Knuth) Karst Koymans. Friday, September 25, 2015 .. Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 15.4, 2015/09/28 11:43:08 UTC) Friday, September 25, 2015 Karst Koymans

More information

Aka (or according to Knuth) Karst Koymans. Tuesday, September 27, 2016

Aka  (or  according to Knuth) Karst Koymans. Tuesday, September 27, 2016 .. Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 16.5, 2016/10/05 12:42:51 UTC) Tuesday, September 27, 2016 Karst Koymans

More information

How Internet Works

How Internet  Works How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If

More information

. SMTP, POP, and IMAP

. SMTP, POP, and IMAP E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Mailing 1/67 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 TB-Preferences 7

More information

ECE 435 Network Engineering Lecture 6

ECE 435 Network Engineering Lecture 6 ECE 435 Network Engineering Lecture 6 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 20 September 2018 HW#2 was due. Announcements HW#3 will be posted a bit different. Encryption

More information

CIT 470: Advanced Network and System Administration. Topics. Mail Policies.

CIT 470: Advanced Network and System Administration. Topics. Mail Policies. CIT 470: Advanced Network and System Administration E-mail CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Mail Policies 2. Anatomy of a Mail Message 3. Components of an E-mail System

More information

Electronic Mail

Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

CS 43: Computer Networks. 12: and SMTP September 28, 2018

CS 43: Computer Networks. 12:  and SMTP September 28, 2018 CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei November 15, 2010 Károly Erdei Debian/GNU Linux Mailing 1/43 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Links Károly Erdei

More information

Application: Electronic Mail

Application: Electronic Mail Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-

More information

ing With PHP History of Applications or Use

ing With PHP History of  Applications or Use Emailing With PHP What is Email? E mail, short for electronic mail and often abbreviated to e mail, email or simply mail, is a store and forward method of composing, sending, receiving and storing messages

More information

Introduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents

Introduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents Introduction to Internet Mail Philip Hazel University of Cambridge Computing Service MUA = Mail User Agent Mail agents Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Mulberry,

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei December 9, 2009 Károly Erdei Debian/GNU Linux Mailing 1/46 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Domain Name System

More information

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 03r. Application layer protocols:  . Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol

More information

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple

More information

Towards authentication

Towards  authentication Towards email authentication TLS SPF + DKIM + DMARC 2012/10/03 Roberto Innocente 1 Who adopted it? Hotmail.com Gmail.com AOL.com Verizon.com Ebay Paypal Yahoo.com 2012/10/03 Roberto Innocente 2 Tls/SPF/DKIM/DMARC

More information

Network Security (PhD Section)

Network Security (PhD Section) CSE508 Network Security (PhD Section) 4/7/2015 Email Michalis Polychronakis Stony Brook University 1 Email Overview MUA: Mail User Agent Thunderbird, webmail, Pine, MSA: Mail Submission Agent SMTP (port

More information

Internet Engineering Task Force (IETF) Request for Comments: ISSN: October 2012

Internet Engineering Task Force (IETF) Request for Comments: ISSN: October 2012 Internet Engineering Task Force (IETF) Request for Comments: 6758 Category: Informational ISSN: 2070-1721 A. Melnikov Isode Ltd K. Carlberg G11 October 2012 Tunneling of SMTP Message Transfer Priorities

More information

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2)

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2) Introduction to Internet Mail Noah Sematimba Based on Materials by Philip Hazel. Mail agents MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,

More information

CSCE 813 Internet Security Secure Services I

CSCE 813 Internet Security Secure  Services I CSCE 813 Internet Security Secure E-Mail Services I Professor Lisa Luo Fall 2017 Previous Class Why do we need cloud computing? Three models of cloud service Software as a service (SaaS) Platform as a

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1 Lecture 25 Reminders: Homework 7 due today. Homework 8 posted. Due at the beginning of the last day of class for final exam review. Programming Project 6 posted. Final project worth double. Due by 4:30pm,

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

Electronic Mail ( ) System

Electronic Mail ( ) System Chapter -1 Electronic Mail (E-Mail) System (M. Tariq Banday) Page (xxffi) conceal their tracks [1.15]. The IETF offers protocols that add security features to SMTP, but these have not been widely adopted.

More information

Security by Any Other Name:

Security by Any Other Name: Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

Application-layer Protocols and Internet Services

Application-layer Protocols and Internet Services Application-layer Protocols and Internet Services Computer Networks Lecture 8 http://goo.gl/pze5o8 Terminal Emulation 2 Purpose of Telnet Service Supports remote terminal connected via network connection

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified  Security Professional Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email

More information

MDaemon Vs. IceWarp Unified Communications Server

MDaemon Vs. IceWarp Unified Communications Server Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

Securing, Protecting, and Managing the Flow of Corporate Communications

Securing, Protecting, and Managing the Flow of Corporate Communications Securing, Protecting, and Managing the Flow of Corporate Communications Getting mailflow right Dave Stork Technical Consultant OGD ict-diensten QR: URL to Presentation Who am I? Dave Stork Technical consultant

More information

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo Internet Draft draft-hoffman-rfc2487bis-04.txt October 4, 2000 Expires in six months Paul Hoffman Internet Mail Consortium Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

Protocols and Software. Nixu Ltd.

Protocols and Software. Nixu Ltd. E-mail Protocols and Software Nixu Ltd. CONTENTS SMTP Interaction with DNS Sendmail IMAP and POP MIME Spam Nixu Ltd. 2/39 E-mail Protocols and Software History In the dawn of times (= before Internet)

More information

Mail Server Setup using Sendmail on CentOS 5.8 Jeong Chul tland12.wordpress.com Computer Science ITC and RUPP in Cambodia

Mail Server Setup using Sendmail on CentOS 5.8 Jeong Chul tland12.wordpress.com Computer Science ITC and RUPP in Cambodia Mail Server Setup using Sendmail on CentOS 5.8 Jeong Chul tland12.wordpress.com Computer Science ITC and RUPP in Cambodia Mail Server Setup using Sendmail on CentOS 5.8 Part 1 Step 1 Email Service Step

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

Lecture 6: Application Layer Web proxies, , and SMTP

Lecture 6: Application Layer Web proxies,  , and SMTP Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Internet Engineering Task Force (IETF) Request for Comments: 6857 Category: Standards Track March 2013 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6857 Category: Standards Track March 2013 ISSN: Internet Engineering Task Force (IETF) K. Fujiwara Request for Comments: 6857 JPRS Category: Standards Track March 2013 ISSN: 2070-1721 Post-Delivery Message Downgrading for Internationalized Email Messages

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

Applications & Application-Layer Protocols: FTP and (SMTP & POP)

Applications & Application-Layer Protocols: FTP and  (SMTP & POP) COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their

More information

MDaemon Vs. Zimbra Network Edition Professional

MDaemon Vs. Zimbra Network Edition Professional Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS Account

More information

System: Basic Functionality

System: Basic Functionality E-mail System: Basic Functionality E-mail systems support five basic functions: Composition: Creating messages Transfer: Moving messages from the originator to the recipient E-mail transfer is a connection-oriented

More information

Request for Comments: 7912 Category: Informational June 2016 ISSN:

Request for Comments: 7912 Category: Informational June 2016 ISSN: Independent Submission A. Melnikov Request for Comments: 7912 Isode Ltd Category: Informational June 2016 ISSN: 2070-1721 Abstract Message Authorizing Email Header Field and Its Use for the Draft and Release

More information

SCS3004 Networking Technologies Application Layer Protocols

SCS3004 Networking Technologies Application Layer Protocols SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:

More information

Chapter 62 Simple Mail Transfer Protocol

Chapter 62 Simple Mail Transfer Protocol Chapter 62 Simple Mail Transfer Protocol You've got Mail! President Bush said for security reasons, he's sworn off all e-mail communication. He will not be using email at the White House at all. Is that

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

Linux alternative text console clients to Thunderbird, fetchmail, Mutt, fetchmail + Alpine how to

Linux alternative text console clients to Thunderbird, fetchmail, Mutt, fetchmail + Alpine how to Email Linux alternative text console clients to Thunderbird, fetchmail, Mutt, fetchmail + Alpine how to Author : admin As a GNU / Linux user you might end up searching for the best email client to satisfy

More information

COSC 301 Network Management. Lecture 14: Electronic Mail

COSC 301 Network Management. Lecture 14: Electronic Mail COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information

FTP. FTP offers many facilities :

FTP. FTP offers many facilities : FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP

More information

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc.

DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc. DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc. Overview of DKIM Cryptography-based protocol, signs selected header fields and message body Intended to: Enable reliable domain name

More information

Best Practices. Kevin Chege

Best Practices. Kevin Chege Email Best Practices Kevin Chege Why your email setup is critical Billions of SPAM emails are generated every day The tips here can help you to reduced the chances of you receiving SPAM email or inadvertently

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of Email Server and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3,

More information

Mail Assure Quick Start Guide

Mail Assure Quick Start Guide Mail Assure Quick Start Guide Version: 11/15/2017 Last Updated: Wednesday, November 15, 2017 CONTENTS Getting Started with Mail Assure 1 Firewall Settings 2 Accessing Mail Assure 3 Incoming Filtering 4

More information

Network Working Group Internet Draft: SMTP Authentication Document: draft-myers-smtp-auth-00.txt April SMTP Service Extension for Authentication

Network Working Group Internet Draft: SMTP Authentication Document: draft-myers-smtp-auth-00.txt April SMTP Service Extension for Authentication HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 10:24:33 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 01 May 1995 22:00:00 GMT ETag: "361c6c-32a5-2fa559e0" Accept-Ranges: bytes Content-Length: 12965 Connection:

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of Email Server and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3,

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

Request for Comments: 2476 Category: Standards Track MCI December 1998

Request for Comments: 2476 Category: Standards Track MCI December 1998 Network Working Group Request for Comments: 2476 Category: Standards Track R. Gellens QUALCOMM J. Klensin MCI December 1998 Message Submission Status of this Memo This document specifies an Internet standards

More information

Application Layer Services Omer F. Rana. Networks and Data Communications 1

Application Layer Services Omer F. Rana. Networks and Data Communications 1 Application Layer Services Omer F. Rana Networks and Data Communications 1 Application Layer Protocols Distinction between Network Application and an Application-Layer Protocol an Application-layer Protocol

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information

Lab 3.4.3: Services and Protocols

Lab 3.4.3:  Services and Protocols Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5

More information

WASP. SoftwareArt Corporation

WASP. SoftwareArt Corporation WASP SoftwareArt Corporation WASP Mail Server [WASP] Introduction: WASP Mail Server is a complete email messaging solution designed for small to mid-sized businesses and is backed by the industry s best

More information

SMTP. George Porter CSE 124 February 12, 2015

SMTP. George Porter CSE 124 February 12, 2015 SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,

More information

Mail System. chenshh

Mail System. chenshh Mail System chenshh Mail System What behinds the scene when you send an email? Gmail 2 NCTU-CS Mailbox Mail System What behinds the scene when you send an email? Gmail Servers CS Mail Servers Internet

More information

Internet Engineering Task Force (IETF) Request for Comments: 8437 Updates: 3501 August 2018 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 8437 Updates: 3501 August 2018 Category: Standards Track ISSN: Internet Engineering Task Force (IETF) C. Newman Request for Comments: 8437 Oracle Updates: 3501 August 2018 Category: Standards Track ISSN: 2070-1721 Abstract IMAP UNAUTHENTICATE Extension for Connection

More information

Over 99% of s are SPAM! Useless for mankind!

Over 99% of  s are SPAM! Useless for mankind! Advanced Mail Introduction SPAM vs. non-spam Mail sent by spammer vs. non-spammer Problem of SPAM mail Over 99% of E-mails are SPAM! Useless for mankind! SPAM detection? Client-based detection These methods

More information

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0 Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet

More information

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections UNIT V Introduction to Application Layer: Introduction, Client Server Programming, WWW and HTTP,FTP, e-mail, TELNET, Secure Shell, Domain Name System, SNMP. HTTP The Hyper Text Transfer Protocol (HTTP)

More information

What is ? TCP/IP Standard Applications for Electronic Mail. Agenda. History

What is  ? TCP/IP Standard Applications for Electronic Mail. Agenda. History What is E-Mail? TCP/IP Standard Applications for Electronic Mail Email, SMTP, POP, IMAP, MIME E-Mail (or "email") is the most widely used Internet application Note: email was one of TCP/IP's keys to success:

More information

Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track

Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track Network Working Group J. Klensin Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track Status of This Memo Simple Mail Transfer Protocol This document specifies

More information

Mail Assure. Quick Start Guide

Mail Assure. Quick Start Guide Mail Assure Quick Start Guide Last Updated: Wednesday, November 14, 2018 ----------- 2018 CONTENTS Firewall Settings 2 Accessing Mail Assure 3 Application Overview 4 Navigating Mail Assure 4 Setting up

More information

SMTP Relay set up. Technical team

SMTP Relay set up. Technical team Technical team 09/08/2016 Summary Introduction... 3 SMTP Relay service description... 3 Presentation of our service... 4 Service set-up... 5 Infrastructure... 5 Set-up... 5 Customer sending authentication...

More information

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION Networking Revision TCP/IP Protocol Stack & OSI reference model Basic Protocols TCP/IP Model 1 OSI (Open Systems Interconnection) Model main purpose to aid in clearer understanding of the functions and

More information

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions

More information

Request for Comments: 7259 Category: Informational May 2014 ISSN:

Request for Comments: 7259 Category: Informational May 2014 ISSN: Independent Submission P. Saint-Andre Request for Comments: 7259 &yet Category: Informational May 2014 ISSN: 2070-1721 Abstract The Jabber-ID Header Field This document defines a header field that enables

More information

anti-spam techniques beyond Bayesian filters

anti-spam techniques beyond Bayesian filters anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based

More information

Components of an (1)

Components of an  (1) E-Mail System 2 Components of an E-Mail (1) Three major components The envelope Invisible to users Determine where the message should be delivered, or to whom it should be returned The headers Information

More information

April 24, 1998 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this memo

April 24, 1998 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 00:24:41 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Mon, 27 Apr 1998 14:31:00 GMT ETag: "2e9b64-31dd-354496a4" Accept-Ranges: bytes Content-Length: 12765 Connection:

More information

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

Chapter 20 SMTP. Slides from TCP/IP - Forouzan. User Agent (UA) Addressing Delayed Delivery Aliases Mail Transfer Agent (MTA) MIME POP.

Chapter 20 SMTP. Slides from TCP/IP - Forouzan. User Agent (UA) Addressing Delayed Delivery Aliases Mail Transfer Agent (MTA) MIME POP. Chapter 20 SMTP User Agent () Addressing Delayed Delivery Aliases Mail Transfer Agent () MIME POP 20-1 Figure 20-1 SMTP concept User User SMTP client TCP ephemeral port SMTP server TCP well-known port

More information

Category: Standards Track January 1999

Category: Standards Track January 1999 Network Working Group P. Hoffman Request for Comments: 2487 Internet Mail Consortium Category: Standards Track January 1999 Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

Applications FTP. FTP offers many facilities :

Applications FTP. FTP offers many facilities : Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Application Inspection and Control for SMTP

Application Inspection and Control for SMTP Application Inspection and Control for SMTP First Published: July 11, 2008 Last Updated: July 11, 2008 The Application Inspection for SMTP feature provides an intense provisioning mechanism that can be

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the

More information