s. has become a primary means of communication. can easily be forged. can be abused

Size: px
Start display at page:

Download "s. has become a primary means of communication. can easily be forged. can be abused"

Transcription

1 s has become a primary means of communication. can easily be forged can be abused Spam Aid in committing a crime Threatening ,

2 Challenges to Authenticity Origin & Sender of the Party refutes the s, allege forgery IP Address of sender matches, still the party refute the s Sender accept the mail but challenge attachments coming from Proxy Server

3 tracing Study of Identifying the source system domain, IP Address Tracing the sender Date/time of sending Message / contents Locate the source of & its sender

4 Protocols: program such as outlook is a client application. Needs to interact with an server: Post Office Protocol (POP) Internet Message Access Protocol (IMAP) Simple Mail Transfer Protocol: SMTP

5 Protocols: Post Office Service Protocol Characteristics Stores only incoming messages. Stores all messages Web-based send and receive. POP IMAP MS MAPI Lotus Notes HTTP Investigation must be at the workstation. Copies of incoming and outgoing messages might be stored on the workstation or on the server or on both. Incoming and outgoing messages are stored on the server, but there might be archived or copied messages on the workstation. Easy to spoof identity.

6 Client based s

7 Web based s

8 sending mail to

9 SMTP SMTP, SMTP. POP3 or IMAP4 Rediff Server Internet Gmail Server Naresh Ram SMTP SMTP POP3/IMAP C1 HCU HYD BITS Goa C2

10 HYD Lucknow Jaipur Delhi Rediff Mail SMTP Server 2 SMTP Server 3 Gmail HCU CBI Naresh Ram

11 Click On Click On This Down Arrow

12 Click on Show Original Window Showing Full Header Appears

13 X-Remote-IP: X-REDF-OSEN: Date: 6 Jul :09: Message-ID: < qmail@f4mail rediffmail.com> MIME-Version: 1.0 To: "cyber.nk@gmail.com" <cyber.nk@gmail.com> 3 Received: from unknown by rediffmail.com via HTTP; 06 Jul :09: X-Senderscore: D=0&S=0 Sender: naresh3151@rediffmail.com 1 Subject: =?utf-8?b?twfpbcbmb3igsgvhzgvyiefuywx5c2lz?= From: "Naresh Kumar" <naresh3151@rediffmail.com> Content-Type: multipart/alternative; boundary="=_bbc614545e533ca7186fc46b513e40f5" --=_bbc614545e533ca7186fc46b513e40f5 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="utf-8" Hi This mail is for testing purpose only. --=_bbc614545e533ca7186fc46b513e40f5 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset="utf-8" Hi<br><br>This mail is for testing purpose only.<br><br><br><br> --=_bbc614545e533ca7186fc46b513e40f

14 Delivered-To: 6 Received: by with SMTP id 7csp649857ivj; Tue, 5 Jul :09: (PDT) X-Received: by with SMTP id m24mr pfi ; Tue, 05 Jul :09: (PDT) Return-Path: <naresh3151@rediffmail.com> Received: from rediffmail.com (f4mail rediffmail.com. [ ]) 5 by mx.google.com with ESMTPS id 15si pfx for <cyber.nk@gmail.com> (version=tls1_2 cipher=aes128-gcm-sha256 bits=128/128); Tue, 05 Jul :09: (PDT) Received-SPF: pass (google.com: domain of naresh3151@rediffmail.com designates as permitted sender) client-ip= ; Authentication-Results: mx.google.com; spf=pass (google.com: domain of naresh3151@rediffmail.com designates as permitted sender) smtp.mailfrom=naresh3151@rediffmail.com Received: (qmail invoked by uid 510); 6 Jul :09: Comment: DomainKeys? See DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=redf; d=rediffmail.com; b=jowwdtsl1llu/9tohon/wlscr8zlpxrmyrmaekyhotuauoblwt9klutujtosvj4zcezid8yol5nwqzjilqotyas5aozk974gh3uj Wh5QPJoZsbx9+e8h6lAAJUwgpyOw85s+YEUVbXyaBsotwzUjxkYZWLEKWGTTBerxqZaaPPI= ; x-m-msg: asd54ad564ad7aa6sd5as6d5; a6da7d6asas6dasd77; 5dad65ad5sd;

15 In this example, we have sent an from to 1. Sender: This represent the name and address of the person who send the Received: from unknown by rediffmail.com via HTTP; 06 Jul :09: This is probably the most vital part of the header from investigation point of view. It represents us that - The was sent from a computer having IP address The was sent on 06 Jul :09:15 (GMT).

16 3. To: This represent the name and address of the receiver. Contd 4. Message-ID: Message ID can be broken into the following parts: : Represent the time stamp of the in yyyymmddhhmmss format : This number is the reference number that represents the corresponding which is unique.

17 Contd 5. Received: from rediffmail.com (f4mail rediffmail.com. [ ]) by mx.google.com with ESMTPS id 15si pfx for (version=tls1_2 cipher=aes128-gcm-sha256 bits=128/128); Tue, 05 Jul :09: (PDT) This represent that the was received by an SMTP server at Google Called mx.google.com from Rediffmail server at the given date and time that has the IP Address

18 6. Delivered-To: Contd This shows that the was delivered to the account You have noticed that time and date in the above examples have been mentioned as 06 Jul :09: It means that the time mentioned above i.e. 06:09:15 is in GMT which is 0000 hours. IST time is 05:30 hours ahead of GMT. To calculate time in IST, add 05:30 hours to make it IST.

19 What are we looking for? ? Verification of IP addresses: Regional Internet Registry APNIC (Asia Pacific Network Information Centre). ARIN (American Registry of Internet Numbers). LACNIC Latin American and Caribbean IP address Regional Registry. RIPE NCC (Réseau IP Européens Network Coordination Centre). Whois (whois.apnic.net) Numerous other websites. The best

20 Whois IP % [whois.apnic.net] % Whois data copyright terms % Information related to ' ' inetnum: netname: BHARTI-IN Descr: Bharti Airtel Limited descr: Transport Network Group descr: 234, Okhla Phase III country: IN admin-c: NA40-AP tech-c: NA40-AP status: ALLOCATED NON-PORTABLE mnt-by: MAINT-IN-BBIL mnt-irt: IRT-BHARTI-IN source: APNIC

21 Fake mails We have seen a general flow How do you identify fake mails

22

23 1. From: "Naresh Kumar" 2. Received: from emkei.cz ([2a01:5e0:36:5001::20]) by mx.google.com with ESMTP id uy1si wjb for Tue, 05 Jul :14: (PDT) 3. Delivered-To: 4. Message-Id: Wed, 6 Jul :18: (CEST) Server of Rediffmail is Missing Emkei Server Internet Gmail Server Naresh Ram

24 They are sent using Open relays Compromised systems Self owned servers Proxy Server Hijacked accounts

25 Proxy Gmail Internet Naresh Internet Internet Internet Ram Rediff

26 NeoTracePro Visual IP Trace Visual Route Tracker Pro tracer (from CDAC, India)

Investigating . Tracing & Recovery

Investigating  . Tracing & Recovery Investigating Email Tracing & Recovery Overview Email has become a primary means of communication. Email can easily be forged. Email can be abused Spam Aid in committing a crime Threatening email, Email

More information

59YHTgcmmrUbp965ht2TugQFZRjjak9Ckrp66CTxKEsgBZZJZqJvz462M3ePt5EGVcuL

59YHTgcmmrUbp965ht2TugQFZRjjak9Ckrp66CTxKEsgBZZJZqJvz462M3ePt5EGVcuL Delivered-To: bmackenty@gmail.com Received: by 10.79.136.130 with SMTP id k124csp2649542ivd; Mon, 7 Aug 2017 04:59:05-0700 (PDT) X-Received: by 10.84.231.194 with SMTP id g2mr312696pln. 5.1502107145823;

More information

bh=40lsbgolp7pbwmgrxdkxpu2gosgmm2ifbkmg6lw1jeu=; b=wmry1ugcb83u5xihbivsnolgzuj07gjvzmm+469p5b +8PzVhEWlQ1wqSjQBPAFHp6J

bh=40lsbgolp7pbwmgrxdkxpu2gosgmm2ifbkmg6lw1jeu=; b=wmry1ugcb83u5xihbivsnolgzuj07gjvzmm+469p5b +8PzVhEWlQ1wqSjQBPAFHp6J Delivered-To: bmackenty@aswarsaw.org Received: by 10.55.80.139 with SMTP id e133csp463209qkb; Mon, 1 May 2017 03:07:15-0700 (PDT) X-Received: by 10.107.5.12 with SMTP id 12mr16189961iof. 186.1493633235602;

More information

BACKTRACING S. Michael Sonntag

BACKTRACING  S. Michael Sonntag BACKTRACING E-MAILS Michael Sonntag SOURCE E-MAILS Source of E-Mails: My personal spam folder! real_viagra.eml Fake GMX E-Mail For comparison a real GMX messages: Beispielmail_GMX.eml As_lecture.eml A

More information

Over 99% of s are SPAM! Useless for mankind!

Over 99% of  s are SPAM! Useless for mankind! Advanced Mail Introduction SPAM vs. non-spam Mail sent by spammer vs. non-spammer Problem of SPAM mail Over 99% of E-mails are SPAM! Useless for mankind! SPAM detection? Client-based detection These methods

More information

Anti-spam WG. RIPE 49 Manchester, September Rodney Tillotson, JANET-CERT

Anti-spam WG. RIPE 49 Manchester, September Rodney Tillotson, JANET-CERT Anti-spam WG RIPE 49 Manchester, September 2004 Rodney Tillotson, JANET-CERT R.Tillotson@ukerna.ac.uk Agenda A Administrative matters B Update C Technical measures D Interactions E Advice X AOB Y Future

More information

<OF1C8DBAB4.F6DD93FA ON852580F EA Mon, Mar 27, 2017 at 2:22 PM (Delivered after 239 seconds)

<OF1C8DBAB4.F6DD93FA ON852580F EA Mon, Mar 27, 2017 at 2:22 PM (Delivered after 239 seconds) Original Message Message ID Created at: From: To: Mon, Mar 27, 2017 at 2:22 PM (Delivered after 239 seconds) IBM Knowledge

More information

APNIC Whois Database and use of Incident Response Team (IRT) registration. Terry Manderson APNIC AusCERT 2003

APNIC Whois Database and use of Incident Response Team (IRT) registration. Terry Manderson APNIC AusCERT 2003 APNIC Whois Database and use of Incident Response Team (IRT) registration Terry Manderson APNIC AusCERT 2003 Contents What is APNIC? The APNIC Whois Database Reporting abuse Invalid contacts IRT object

More information

Phishing and Ransomware

Phishing and Ransomware Phishing and Ransomware Dave Phillips Information Technology Resources March 2, 2016 Phishing Phishing What it looks like How to identify What happens to your credentials Remember that ITR will NEVER,

More information

WHOIS Database and MyAPNIC

WHOIS Database and MyAPNIC APNIC elearning: WHOIS Database and MyAPNIC Issue Date: 01/04/2015 Revision: Overview What is the APNIC Database? Resource Registration Object Types Inetnum/Inet6num Objects Person and Role Objects Maintainers

More information

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database

More information

Database Update. Paul Palse Database Manager, RIPE NCC

Database Update. Paul Palse Database Manager, RIPE NCC Database Update Paul Palse Database Manager, RIPE NCC Outline Introduction to the Database Group Status of APs and outstanding deliverables Projects completed between RIPE 60 and 61 RIPE Labs publication

More information

CLOUD MAIL End User Guide. (Version 1.0)

CLOUD MAIL End User Guide. (Version 1.0) End User Guide () Table of Contents 1. How to Activate New Account... 3 2. How to Compose a New Email Message... 5 3. How to View and Edit the Email Draft... 6 4. How to View Sent Email Messages... 6 5.

More information

bh=9f8/dl/qo6zqvut76gpsxonsryoygj7+iz3zai0nyty=; b=uzb/khk +qtkuju4s0ehm4kowgbvgoagiofkkbeqgxde79wrvtbe2kdtnqhenm+vnp1

bh=9f8/dl/qo6zqvut76gpsxonsryoygj7+iz3zai0nyty=; b=uzb/khk +qtkuju4s0ehm4kowgbvgoagiofkkbeqgxde79wrvtbe2kdtnqhenm+vnp1 Delivered-To: bmackenty@aswarsaw.org Received: by 10.55.75.144 with SMTP id y138csp364924qka; Sat, 21 Jan 2017 01:28:46-0800 (PST) X-Received: by 10.157.54.139 with SMTP id h11mr10253536otc. 86.1484990925933;

More information

APNIC Training. Internet Routing Registry (IRR)

APNIC Training. Internet Routing Registry (IRR) APNIC Training Internet Routing Registry (IRR) Objectives To provide an introduction to the APNIC Routing Registry Explain concepts of the global RR Outline the benefits of the APNIC Routing Registry Discuss

More information

Forensics. CSF: Forensics Cyber-Security. Part III. Techniques and Tools for Network Forensics. Fall 2017 Nuno Santos

Forensics. CSF: Forensics Cyber-Security. Part III. Techniques and Tools for Network Forensics. Fall 2017 Nuno Santos Email Forensics Part III. Techniques and Tools for Network Forensics CSF: Forensics Cyber-Security Fall 2017 Nuno Santos Motivation for email investigations! Email has become a primary means of communication!

More information

Case 3:09-cv F Document Filed 04/07/11 Page 17 of 23 PageID 16514

Case 3:09-cv F Document Filed 04/07/11 Page 17 of 23 PageID 16514 Case 3:09-cv-00988-F Document 440-1 Filed 04/07/11 Page 17 of 23 PageID 16514 To: "'Elizabeth M. Schurig'" , "'jeffbaron1@gmail.com'" , "Michelle Rosenblatt" ,

More information

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes 1 Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes 2 Internal prefixes originated in IP core network Loopback Transport Connect inter-regional

More information

<deb61fd5 4d79 a Fri, Feb 17, 2017 at 4:08 PM (Delivered after 8 seconds) Bill MacKenty

<deb61fd5 4d79 a Fri, Feb 17, 2017 at 4:08 PM (Delivered after 8 seconds) Bill MacKenty Original Message Message ID Created at: From: To: Subject: SPF: DKIM:

More information

Delivery incomplete. Detected a bounce of message #36, list gbird (bounce type DSN)

Delivery incomplete. Detected a bounce of message #36, list gbird (bounce type DSN) 1 of 5 2/3/2018 6:03 PM Subject: Bounce detected (list gbird) from Toni.J.Piaggio@aphis.usda.gov From: mj2-owner@lists.ncsu.edu Date: 2/17/2017 12:06 PM To: gbird-owner@lists.ncsu.edu Detected a bounce

More information

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes Internal prefixes originated in IP core network Loopback Transport Connect inter-regional

More information

RIPE NCC Status Update

RIPE NCC Status Update RIPE NCC Status Update IPv4 and more Marco Hogewoning, Trainer IPv4 Run Out IPv4 Distribution IANA 3 February 2011 15 April 2011 AfriNIC ARIN RIPE NCC APNIC LACNIC? 7,000 LIRs End Users 3 Business As Usual

More information

IRT-Object in the RIPE Database, "interim" meeting

IRT-Object in the RIPE Database, interim meeting IRT-Object in the RIPE Database, "interim" meeting Overview Ulrich Kiermayr, Wilfried Wöber: ACOnet-CERT TF-CSIRT, 10th meeting Amsterdam, NL September 26, 2003 1 What does the IRT-Object do?? documents

More information

Header- A Forensic Key to Examine an

Header- A Forensic Key to Examine an E-Mail Header- A Forensic Key to Examine an E-Mail Swapnil Gupta 1, Kopal Gupta 2, Dr. Anu Singla 3 1,2,3 Institute of Forensic Science & Criminology, Bundelkhand University, Jhansi (U.P.), India ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

The whois Database. Introduction and Usage. Anne Lord & Mirjam Kühne. AfNOG Workshop, 10 May

The whois Database. Introduction and Usage. Anne Lord & Mirjam Kühne. AfNOG Workshop, 10 May The whois Database Introduction and Usage Overview What is the whois database? Why use it? Who uses it? Database query process Database update process 2 What is the whois Database? Network Management Database

More information

LEA Workshop. Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013

LEA Workshop. Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013 LEA Workshop Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013 Agenda Introduction to APNIC Know about APNIC Internet Policy Development How the Internet Policies are developed

More information

The IRT Object in the RIPE Database

The IRT Object in the RIPE Database The IRT Object in the RIPE Database The direct link from IP numbers to CSIRTs Don Stikvoort, Elsinore Wilfried Wöber, Vienna University 1 Problem Outline Despite all high tech, wizardry and risk management

More information

Networking and the Internet

Networking and the Internet ICS 101 Fall 2012 Networking and the Asst. Prof. Lipyeow Lim Information & Computer Science Department University of Hawaii at Manoa 9/4/2012 Lipyeow Lim -- University of Hawaii at Manoa 1 Problem Ancient

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

SETUP FOR OUTLOOK (Updated October, 2018)

SETUP FOR OUTLOOK (Updated October, 2018) EMAIL SETUP FOR OUTLOOK (Updated October, 2018) This tutorial will show you how to set up your email in Outlook using IMAP or POP. It also explains how to configure Outlook for MAC. Click on your version

More information

APNIC. Database Tutorial. 3 September, Kitakyushu, Japan. 14 th APNIC Open Policy Meeting

APNIC. Database Tutorial. 3 September, Kitakyushu, Japan. 14 th APNIC Open Policy Meeting APNIC Database Tutorial 3 September, Kitakyushu, Japan 14 th APNIC Open Policy Meeting Introduction Presenters Nurani Nimpuno Training Development Officer nurani@apnic.net Champika Wijayatunga Training

More information

https://mail.google.com/mail/u/0/?ui=2&ik=4a9d5ab0fe&vi...

https://mail.google.com/mail/u/0/?ui=2&ik=4a9d5ab0fe&vi... Delivered-To: bmackenty@aswarsaw.org Received: by 10.194.158.100 with SMTP id wt4csp1082891wjb; X-Received: by 10.55.50.149 with SMTP id y143mr16553555qky.86.1445001190398; Return-Path:

More information

International Journal of Advance Engineering and Research Development. Legalistic Evaluation of Headers Based on Address Spoofing

International Journal of Advance Engineering and Research Development. Legalistic Evaluation of  Headers Based on Address Spoofing Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 5, Issue 01, January -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Legalistic

More information

Supporting Notes for the Provider Independent (PI) Assignment Request Form

Supporting Notes for the Provider Independent (PI) Assignment Request Form Supporting Notes for the Provider Independent (PI) Assignment Request Form RIPE NCC Document-ID: ripe-357 Date: October 2005 Obsolete: ripe-337 This document contains instructions for LIRs on how to complete

More information

ISP-NAP & Direct Members (Feb 2018)

ISP-NAP & Direct Members (Feb 2018) ISP-NAP & Direct Members (Feb 2018) Total ISP and NAP: 368 (Des 2016) and 417 companies (Feb 2018) Total Direct Member: 655 (Des 2016) and 836 users (Feb 2018) increase 13,3% increase 27,6% 1400 1050 700

More information

Set Up with Microsoft Outlook 2013 using POP3

Set Up  with Microsoft Outlook 2013 using POP3 Page 1 of 14 Help Center Set Up E-mail with Microsoft Outlook 2013 using POP3 Learn how to configure Microsoft Outlook 2013 for use with your 1&1 e-mail account using the POP3 Protocol. Before you begin,

More information

Note: CONTENTS. 1. Outlook Express (IMAP) 2. Microsoft Outlook (IMAP) 3. Eudora (IMAP) 4. Thunderbird (IMAP) 5. Outlook Express (POP)

Note: CONTENTS. 1. Outlook Express (IMAP) 2. Microsoft Outlook (IMAP) 3. Eudora (IMAP) 4. Thunderbird (IMAP) 5. Outlook Express (POP) CONTENTS 1. Outlook Express (IMAP) 2. Microsoft Outlook (IMAP) 3. Eudora (IMAP) 4. Thunderbird (IMAP) 5. Outlook Express (POP) Note: Prior to configuring, please ensure that your ID is enabled for POP/IMAP.

More information

APNIC Internet Routing Registry. Tutorial Seoul 19 August 2003

APNIC Internet Routing Registry. Tutorial Seoul 19 August 2003 APNIC Internet Routing Registry Tutorial Seoul 19 August 2003 Overview What is an IRR Why use an IRR? RPSL IRR objects Recap attributes of some objects Routing Policy What is routing policy? Why define

More information

& Online Evidence Collection

& Online Evidence Collection Email & Online Evidence Collection Domestic violence offenders frequently misuse email and online spaces to stalk, abuse, terrorize, and monitor victims. Abusers may send messages from random email addresses

More information

Supporting Notes for the Provider Independent (PI) Assignment Request Form

Supporting Notes for the Provider Independent (PI) Assignment Request Form Supporting Notes for the Provider Independent (PI) Assignment Request Form RIPE NCC Document-ID: ripe-455 Date: March 2009 Obsoletes: ripe-337,ripe-357, ripe-454 This document contains instructions for

More information

ECE697AA Lecture 2. Today s lecture

ECE697AA Lecture 2. Today s lecture ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo

More information

RSC Part II: Network Layer 3. IP addressing (2nd part)

RSC Part II: Network Layer 3. IP addressing (2nd part) RSC Part II: Network Layer 3. IP addressing (2nd part) Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to the book Computer Networking:

More information

Electronic Mail. Electronic Mailboxes

Electronic Mail. Electronic Mailboxes Electronic Mail E-mail belongs to the Application Layer Has been around since the early 80 s Enables new forms of interaction Fast Automatic processing (sorting, reply) Can carry other content Electronic

More information

To assist you with debugging problems, this whois query was received from IP Address. Your web client may be behind a web proxy.

To assist you with debugging problems, this whois query was received from IP Address. Your web client may be behind a web proxy. APNIC - Query the APNIC Whois Database To assist you with debugging problems, this whois query was received from IP Address [59.90.151.244] Your web client may be behind a web proxy. % APNIC found the

More information

Experiment No: Group A-6

Experiment No: Group A-6 R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: Group A-6 Problem Definition: Write a program in C++ /Python to analyze email header. 6.1Prerequisite: Application Layer Protocols 6.2 Learning

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

. indigoo.com INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R.

. indigoo.com  INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R. EMAIL INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET Peter R. Egli INDIGOO.COM 1/35 Contents 1. EMail Electronic Mail RFC821/RFC822 2. Email Elements 3. Email Message 4. Email Transfer with SMTP

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

This process should take approximately 10 minutes to complete

This process should take approximately 10 minutes to complete How to set up your Endeavor Email with the Gmail App You can use the Gmail or Outlook app depending on personal preference. If you would like to use the Outlook app please see the How to set up your Endeavor

More information

Using Resource Certificates Progress Report on the Trial of Resource Certification

Using Resource Certificates Progress Report on the Trial of Resource Certification Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC From the RIPE Address Policy Mail List 22 25 Sept 06, address-policy-wg@lists.ripe.net

More information

TURNING LEGAL WEBSITE into DDoS TOOL. OWASP Jakarta Tech Day Meetup Kalpin Erlangga Silaen

TURNING LEGAL WEBSITE into DDoS TOOL. OWASP Jakarta Tech Day Meetup Kalpin Erlangga Silaen TURNING LEGAL WEBSITE into DDoS TOOL OWASP Jakarta Tech Day Meetup Kalpin Erlangga Silaen DISCLAIMER Segala cara, tehnik, peragaan serta alat yang digunakan dalam sesi presentasi ini adalah untuk tujuan

More information

Office 365: Secure configuration

Office 365: Secure  configuration Office 365: Secure email configuration Published September 2017 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

Using Resource Certificates Progress Report on the Trial of Resource Certification

Using Resource Certificates Progress Report on the Trial of Resource Certification Using Resource Certificates Progress Report on the Trial of Resource Certification October 2006 Geoff Huston APNIC Sound Familiar? 4:30 pm Mail: Geoff, mate, I ve been dealing with your phone people and

More information

Welcome! APNIC Internet Routing Registry Tutorial. In conjunction with SANOG IV

Welcome! APNIC Internet Routing Registry Tutorial. In conjunction with SANOG IV Welcome! APNIC Internet Routing Registry Tutorial 29 July 2004, Kathmandu, Nepal In conjunction with SANOG IV Introduction Presenters PART I Champika Wijayatunga champika@apnic.net PART II Gaurab Raj Upadhaya

More information

IPv6 Allocation Policy and Procedure. Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan

IPv6 Allocation Policy and Procedure. Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan IPv6 Allocation Policy and Procedure Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan 1 Overview Introduction to APNIC Policy development process IPv6 policy and procedures

More information

RIPE NCC Status Update

RIPE NCC Status Update RIPE NCC Status Update IPv4 and more Marco Hogewoning, Trainer The five RIRs 2 RIPE NCC Service region: Europe, Middle East and parts of Central Asia Supports coordination of Internet operations Not-for-profit

More information

Sample Headers Understanding Headers Interpreting Headers

Sample  Headers Understanding  Headers Interpreting  Headers Sample Email Headers Return-Path: Received: from smtp.alphanet.com (smtp.alphanet.com [192.168.0.100]) by mailhost.betanet.com with smtp (Exim 4.44)id 1DtsVC-0001I2-O2 Mon, 25

More information

Internet Engineering Task Force (IETF) Request for Comments: 6591 April 2012 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6591 April 2012 Category: Standards Track ISSN: Internet Engineering Task Force (IETF) H. Fontana Request for Comments: 6591 April 2012 Category: Standards Track ISSN: 2070-1721 Authentication Failure Reporting Using the Abuse Reporting Format Abstract

More information

Service User Manual. Outlook By SYSCOM (USA) May 2, Version 2.0. Outlook 2007 Ver. 2.0

Service User Manual. Outlook By SYSCOM (USA) May 2, Version 2.0. Outlook 2007 Ver. 2.0 Outlook 2007 By SYSCOM (USA) May 2, 2013 Version 2.0 1 Contents 1. How to Setup POP3/SMTP Setup for Outlook 2007... 3 2. How to Setup IMAP for Outlook 2007... 13 3. How to Manage Spam Filter... 22 2 1.

More information

IPv6 Allocation Policy and Procedure. Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan

IPv6 Allocation Policy and Procedure. Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan IPv6 Allocation Policy and Procedure Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan 1 Overview Introduction to APNIC Policy development process IPv6 policy and procedures

More information

i-mscp OpenDKIM plugin

i-mscp OpenDKIM plugin 2019/01/23 02:32 1/5 i-mscp OpenDKIM plugin Bear in mind that this documentation is for the last available version. If you use an older version, you must refer to the README.md file inside the plugin archive.

More information

sender) client-ip= ; dkim=pass

sender) client-ip= ; dkim=pass Delivered-To: ryanlawhsv@gmail.com Received: by 10.129.162.146 with SMTP id z140csp2021593ywg; X-Received: by 10.200.36.81 with SMTP id d17mr24690451qtd.99.1487704818927; Return-Path:

More information

Security by Any Other Name:

Security by Any Other Name: Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San

More information

S a p m a m a n a d n d H a H m 성균관대학교 최형기

S a p m a m a n a d n d H a H m 성균관대학교 최형기 Spam and Ham 성균관대학교 최형기 Agenda Email Protocol Introduction to spam Techniques spammers use Kinds of spam Solutions to spam Conclusion CINS/F1-01 Sungkyunkwan University, Hyoung-Kee Choi 2 SMTP 1 Electronic

More information

COSC 301 Network Management. Lecture 14: Electronic Mail

COSC 301 Network Management. Lecture 14: Electronic Mail COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How

More information

This form should be sent following the submission of Provider Aggregatable (PA) Assignment Request Form(s) found at:

This form should be sent following the submission of Provider Aggregatable (PA) Assignment Request Form(s) found at: Supporting Notes for the IPv4 First Allocation Request Form Filiz Yilmaz Bican, Emma Bretherick, Agata Peszkowska, Ingrid Wijte Document ID: ripe-312 Date: 26 April 2004 Obsoletes: ripe-236, ripe-273 See

More information

Contents. Management. Client. Choosing One 1/20/17

Contents.  Management.  Client. Choosing One 1/20/17 Contents Email Management CSCU9B2 Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP, HTTP,

More information

CIDR. The Life Belt of the Internet 2005/03/11. (C) Herbert Haas

CIDR. The Life Belt of the Internet 2005/03/11. (C) Herbert Haas CIDR The Life Belt of the Internet (C) Herbert Haas 2005/03/11 Early IP Addressings Before 1981 only class A addresses were used Original Internet addresses comprised 32 bits (8 bit net-id = 256 networks)

More information

Objectives. What Is and How Does It Work? Objectives. and How Does It Work? and How Does It Work?

Objectives. What Is  and How Does It Work? Objectives. and How Does It Work? and How Does It Work? Objectives E-MAIL BASICS Evaluating Integrated Browser E-Mail Programs and a Web-Based E-Mail Service New Perspectives on THE INTERNET Learn about e-mail and how it works Configure and use two popular

More information

Progress Report on APNIC Trial of Certification of IP Addresses and ASes

Progress Report on APNIC Trial of Certification of IP Addresses and ASes Progress Report on APNIC Trial of Certification of IP Addresses and ASes APNIC 22 September 2006 Geoff Huston Motivation: Address and Routing Security What we have today is a relatively insecure system

More information

Service User Manual. Outlook By SYSCOM (USA) May 7, Version 2.0. Outlook 2003 Ver. 2.0

Service User Manual. Outlook By SYSCOM (USA) May 7, Version 2.0. Outlook 2003 Ver. 2.0 Outlook 2003 By SYSCOM (USA) May 7, 2013 Version 2.0 1 Contents 1. How to set up POP3/SMTP for Outlook 2003... 3 2. How to Setup IMAP for Outlook 2003... 10 3. How to Manage Spam Filter... 15 2 1. How

More information

Overview. Electronic mail. History Format of . Sending . Retrieving . RFC 822, MIME, addresses SMTP, DNS. POP, IMAP, Web-based

Overview. Electronic mail. History Format of  . Sending  . Retrieving  . RFC 822, MIME,  addresses SMTP, DNS. POP, IMAP, Web-based Electronic Mail Electronic mail History Format of email Overview RFC 822, MIME, email addresses Sending email SMTP, DNS Retrieving email POP, IMAP, Web-based 2 Flashback to the 70s ARPANET just recently

More information

Clergy Table of Contents

Clergy  Table of Contents Clergy E-mail Table of Contents How to access your @riotx.org Email using your web browser...2 How to set up @riotx.org Clergy Email Forwarding...5 How to add a @riotx.org on your Microsoft Outlook: First

More information

Design and Implementation of a DMARC Verification Result Notification System

Design and Implementation of a DMARC Verification Result Notification System Proceedings of the APAN Research Workshop 2016 ISBN 978-4-9905448-6-7 Design and Implementation of a DMARC Verification Result Notification System Naoya Kitagawa, Toshiki Tanaka, Masami Fukuyama and Nariyoshi

More information

Why Firewalls? Firewall Characteristics

Why Firewalls? Firewall Characteristics Why Firewalls? Firewalls are effective to: Protect local systems. Protect network-based security threats. Provide secured and controlled access to Internet. Provide restricted and controlled access from

More information

Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman

Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman DKIM Patrik Fältström Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman September 22, 2005 1 What is Domain Keys Identified Mail? Method of using cryptographic

More information

Handling Network Abuse Reports at APNIC

Handling Network Abuse Reports at APNIC Handling Network Abuse Reports at APNIC 17 November 2010 APT Cybersecurity Forum, Sydney George Kuo Member Services Manager, APNIC 1 APT Bali Plan of Action Nov 2009 A. Widen broadband connectivity B.

More information

Hybrid setup. Product Note

Hybrid setup. Product Note Hybrid setup Product Note Proposed by: 1 On premise vs cloud email Email is considered a mission-critical system in almost all organizations that employ email and to host emails on-premise or in a cloud

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer IV Dmitri Loguinov Texas A&M University February 13, 2018 1 Chapter 2: Roadmap 2.1 Principles of network applications 2.2

More information

Backtracing s Computer Forensics

Backtracing  s Computer Forensics Mag. iur. Dr. techn. Michael Sonntag Backtracing E-Mails Computer Forensics E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

n Define active and passive footprinting n Identify methods and procedures in information gathering Chapter #2:

n Define active and passive footprinting n Identify methods and procedures in information gathering Chapter #2: Outline n Define active and passive footprinting n Identify methods and procedures in information gathering Chapter #2: n Understand the use of social networking, search engines, and Google hacking in

More information

Service User Manual. Outlook By SYSCOM (USA) May 2nd, Version 1.0. Outlook 2013 Ver.1.0

Service User Manual. Outlook By SYSCOM (USA) May 2nd, Version 1.0. Outlook 2013 Ver.1.0 Outlook 2013 By SYSCOM (USA) May 2nd, 2016 Version 1.0 1 Contents 1. How to Setup POP3/SMTP Setup for Outlook 2013... 3 2. How to Setup IMAP for Outlook 2013... 14 3. How to Manage Spam Filter... 25 2

More information

Outline. Tools

Outline.  Tools E-mail Tools 1 Outline Goals and Objectives Topics Headlines Introduction Communication Protocols Content, Attachments, and Etiquette Acronyms and Emoticons E-mail clients and Webbased E-mail Eudora Outlook

More information

Spam and Ham 성균관대학교 최형기

Spam and Ham 성균관대학교 최형기 Spam and Ham 성균관대학교 최형기 Agenda Introduction to spam Techniques spammers use Kinds of spam Solutions to spam Conclusion CINS/F1-01 2 Electronic Mail outgoing message queue Three major components: user agents

More information

Reading Headers with MX Tool Box By Matt Flederbach

Reading  Headers with MX Tool Box By Matt Flederbach Reading Email Headers with MX Tool Box By Matt Flederbach Often times, you'll get a customer asking Why did it take so long for my email to be delivered? or Why was my email blocked? or even Why was this

More information

How do I setup Outlook Express to get my s?

How do I setup Outlook Express to get my  s? How do I setup Outlook Express to get my e-mails? Before you set up a mail account in Outlook Espress you must first have your POP3 mailbox details provided to you by your Account Manager, this will be

More information

CS 43: Computer Networks. 12: and SMTP September 28, 2018

CS 43: Computer Networks. 12:  and SMTP September 28, 2018 CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s

More information

Internet Routing Protocols, DHCP, and NAT

Internet Routing Protocols, DHCP, and NAT Internet Routing Protocols, DHCP, and NAT Hwajung Lee Modified from Slides Courtesy of Cisco Networking Academy and the book titled Communication Networks by Leon-Garcia Contents Basic Routing Single Area

More information

t and Migration of WLCG TEIR-2

t and Migration of WLCG TEIR-2 IPv6 Deploymen t and Migration of WLCG TEIR-2 site resources on Privat te Cloud Saqib Haleem Saqib Haleem National Centre for Physics, Pakistan Agenda Introduction of National Centre for Physics (NCP)

More information

Forensic Analysis of Date and Time Spoofing

Forensic Analysis of  Date and Time Spoofing Third International Conference on Computer and Communication Technology Forensic Analysis of E-mail and Spoofing Preeti Mishra, Emmanuel S. Pilli and R. C. Joshi Department of Computer Science & Engineering

More information

Configure Outlook to use port 587 with authentication

Configure Outlook to use port 587 with authentication Configure Outlook 2003 email to use port 587 with authentication In order to send and receive E-mail through your website hosted with FastWebEngine, you can configure Outlook as your preferred E-mail client.

More information

The Application Layer: SMTP, FTP

The Application Layer: SMTP, FTP The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)

More information

Advanced Introduction to Machine Learning CMU-10715

Advanced Introduction to Machine Learning CMU-10715 Advanced Introduction to Machine Learning CMU-10715 MLE, MAP, Bayes classification Barnabás Póczos Sept 9, 2015 Outline Theory: Probabilities: Dependence, Independence, Conditional Independence Parameter

More information

Outlook Express(POP3)

Outlook Express(POP3) Outlook Express(POP3) 1. Click on Tools in the menu bar and then go to Accounts 2. The Internet Accounts pop-up window appears. 3. Click on the Mail tab. If you are starting Outlook Express for the first

More information

OFFICE 365 SERVICES INCLUSIONS AND EXCLUSIONS

OFFICE 365 SERVICES INCLUSIONS AND EXCLUSIONS INCLUSIONS AND EXCLUSIONS OFFICE 365 MIGRATION AS A SERVICE SOURCE Exchange 2003, 2007, 2010, 2013 and 2016 Google Mail (Gmail) WHAT WE WILL MIGRATE FROM SOURCE MAILBOX Emails Mailbox rules Mailbox contacts

More information

A Policy Story - IPv4 Transfer. TWNIC OPM 26, Taipei 14 December 2016 George Kuo, Services Director

A Policy Story - IPv4 Transfer. TWNIC OPM 26, Taipei 14 December 2016 George Kuo, Services Director A Policy Story - Transfer TWNIC OPM 26, Taipei 14 December 2016 George Kuo, Services Director 1 About APNIC Membership-based, not-for-profit, Regional Internet Registry (RIR) Delegates and registers IP

More information

How to set up an account in Outlook

How to set up an  account in Outlook How to set up an e-mail account in Outlook Note: To complete these steps, you will need to know your email address, password, incoming mail server name, and outgoing mail server name that is provided by

More information

Password Change and Mail Client Configuration Guide for sltnet.lk/slt.lk Mail Server

Password Change and Mail Client Configuration Guide for sltnet.lk/slt.lk Mail Server User Guide Password Change and Mail Client Configuration Guide for sltnet.lk/slt.lk Mail Server 2018/05/10 LEGAL INFORMATION Copyright 2018 Sri Lanka Telecom Plc All rights reserved. We reserve the right

More information

Towards authentication

Towards  authentication Towards email authentication TLS SPF + DKIM + DMARC 2012/10/03 Roberto Innocente 1 Who adopted it? Hotmail.com Gmail.com AOL.com Verizon.com Ebay Paypal Yahoo.com 2012/10/03 Roberto Innocente 2 Tls/SPF/DKIM/DMARC

More information