NORDUnet Nordic Infrastructure for Research & Education. Intro. SPAM-hantering på NUNOC och internt i SUNET

Size: px
Start display at page:

Download "NORDUnet Nordic Infrastructure for Research & Education. Intro. SPAM-hantering på NUNOC och internt i SUNET"

Transcription

1 Intro SPAM-hantering på NUNOC och internt i SUNET

2 Intro Förkortningar som är bra att kunna: MTA MUA MDA Mail Transfer Agent ex. Sendmail, Postfix, Qmail Mail User Agent ex. Thunderbird, Eudora, Pine, mutt Mail Delivery Agent ex. Procmail, mail.local

3 Intro (Något förenklat) består ett av: Envelope (from / to) De adresser under SMTP-handskakningen (MAIL FROM: / RCPT TO:) Header(s) + Body Det som kommer i SMTP-fasen DATA <CRLF> ---> <CRLF>. <CRLF>

4 Intro

5 Kort om lite olika tekniker att förhindra spam & falsk epost i osorterad ordning...

6 RFC Polis Följ alla RFC:er nitiskt! (och kanske mer än vad som står ändå...) 220 ex1.mydomain.com ESMTP mailer ready at Wed, 14 Nov :53: HELO ex2.yourdomain.com 250 ex1.mydomain.com Hello ex2.yourdomain.com [x.x.x.x], pleased to meet you MAIL FROM: Sender ok RCPT TO: Recipient ok DATA 354 Enter mail, end with "." on a line by itself laekrmfo Message accepted for delivery

7 Svartlistor DNSBL (aka. RBL) SpamHaus.org SORBS.net SpamCop.net njabl.org RHSBL RFC-ignorant Tarpits

8 Grålistning Greylisting (och Whitelisting) Evan Harris

9 Grålistning

10 SPF med fl. Responsible Submitter RFC 4405 E. Allman, H. Katz Sender-ID / PRA RFC 4406, RFC 4407 J. Lyon, M. Wong SPF (Classic) RFC 4408 M. Wong, W. Schlitt

11 SPF / Sender ID IN TXT v=spf1... -all IN TXT spf2.0/mfrom,pra... -all

12 DomainKey med fl. DomainKey RFC 4870, M. Delany Internet Identified Mail draft, J. Fenton DKIM RFC 4871, E. Allman, J. Callas, M. Delany, M. Libbey, J. Fenton, M. Thomas DKIM-SSP draft, E. Allman, m.fl.

13 DKIM header Hur ser DKIM headern ut? DKIM-Signature: a=rsa-sha1; c=nowsp/nowsp; d=mydomain.com; s=selector; t= ; h=x-domainkeys:domainkey-signature:received:received: X-MimeOLE:Content-class:MIME-Version:Content-Type:Subject:Date: Message-ID:X-MS-Has-Attach:X-MS-TNEF-Correlator:Thread-Topic: Thread-Index:From:To:Cc:X-OriginalArrivalTime:X-Virus-Scanned: X-Virus-Status; b=l3chfr+gswrdsvbxv3cxmfhry/9vn+zbvodb6+9gemiuwtv6 LJB4SjNCP9K3rYqIQLmKkPvmXc59913GP6RFZ5OQ5B3o0Ki/vm6Wy7luBd89G5ckEXV UY/UQ+k+4iG43O3zETbB6DZaPSKGqCq8F8KBi3a3NT/F1MdGAYPDqKn4=

14 Hur gör vi? Följer Statskontorets vägledning Dock ingen karantän. dvs. det som släpps igenom, hamnar i användarens inkorg/spam-folder. Droppa inget på golvet. reject:a i värsta fall.

15 En Kombi? Idé: Om man skulle kombinera white, grey och black -list?

16 Exempel på Svartlista Exempel S ORBS http.dnsbl.sorbs.net socks.dnsbl.sorbs.net misc.dnsbl.sorbs.net smtp.dnsbl.sorbs.net new.spam.dnsbl.sorbs.net recent.spam.dnsbl.sorbs.net old.spam.dnsbl.sorbs.net spam.dnsbl.sorbs.net escalations.dnsbl.sorbs.net web.dnsbl.sorbs.net block.dnsbl.sorbs.net zombie.dnsbl.sorbs.net dul.dnsbl.sorbs.net badconf.rhsbl.sorbs.net nomail.rhsbl.sorbs.net

17 Tekniska specs. Vad använder vi oss av? Sendmail + LOCAL_RULESETS tillägg milter-greylist MIMEDefang (standard filter + egna tillägg) SpamAssassin ClamAV Perl moduler, bla. Net::DNS, Net::ValidMX (i mimedefang-filter) spamd / pf

18 Slut Frågor?

How Internet Works

How Internet  Works How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If

More information

anti-spam techniques beyond Bayesian filters

anti-spam techniques beyond Bayesian filters anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based

More information

CIT 470: Advanced Network and System Administration. Topics. Mail Policies.

CIT 470: Advanced Network and System Administration. Topics. Mail Policies. CIT 470: Advanced Network and System Administration E-mail CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Mail Policies 2. Anatomy of a Mail Message 3. Components of an E-mail System

More information

DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc.

DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc. DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc. Overview of DKIM Cryptography-based protocol, signs selected header fields and message body Intended to: Enable reliable domain name

More information

CSN09101 Networked Services. Module Leader: Dr Gordon Russell Lecturers: G. Russell

CSN09101 Networked Services. Module Leader: Dr Gordon Russell Lecturers: G. Russell CSN09101 Networked Services Week 11: Email Management Module Leader: Dr Gordon Russell Lecturers: G. Russell This lecture SMTP Linux Email Discussions SMTP SMTP Email is send between source and destination

More information

Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman

Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman DKIM Patrik Fältström Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman September 22, 2005 1 What is Domain Keys Identified Mail? Method of using cryptographic

More information

Aka (or according to Knuth) Karst Koymans. Tuesday, September 27, 2016

Aka  (or  according to Knuth) Karst Koymans. Tuesday, September 27, 2016 .. Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 16.5, 2016/10/05 12:42:51 UTC) Tuesday, September 27, 2016 Karst Koymans

More information

Aka (or according to Knuth) Karst Koymans. Friday, September 25, 2015

Aka  (or  according to Knuth) Karst Koymans. Friday, September 25, 2015 .. Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 15.4, 2015/09/28 11:43:08 UTC) Friday, September 25, 2015 Karst Koymans

More information

Hit the Ground Spam(fight)ing

Hit the Ground Spam(fight)ing Hit the Ground Spam(fight)ing LISA 05, San Diego December, 2005 John Rowan Littell Earlham College littejo (at) earlham (dot) edu $ARGV[0] There is no magic bullet. Many products, both commercial and open

More information

Over 99% of s are SPAM! Useless for mankind!

Over 99% of  s are SPAM! Useless for mankind! Advanced Mail Introduction SPAM vs. non-spam Mail sent by spammer vs. non-spammer Problem of SPAM mail Over 99% of E-mails are SPAM! Useless for mankind! SPAM detection? Client-based detection These methods

More information

Table of Contents. Electronic mail. History of (2) History of (1) history. Basic concepts. Aka (or according to Knuth)

Table of Contents. Electronic mail. History of  (2) History of  (1)  history. Basic concepts. Aka  (or  according to Knuth) Table of Contents Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 17.7, 2017/10/03 11:29:40 UTC) Friday, September 29, 2017

More information

. SMTP, POP, and IMAP

. SMTP, POP, and IMAP E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters

More information

Certified Spam Assassin Professional VS-1114

Certified Spam Assassin Professional VS-1114 Certified Spam Assassin Professional VS-1114 Certified Spam Assassin Professional Certified SpamAssassin Professional Certification Code VS-1114 Vskills certification for SpamAssassin Professional assesses

More information

Smart elab volume 3, anno 2014 Networking. Setup of a clustered antispam and antivirus service based on Mailcleaner suite

Smart elab volume 3, anno 2014 Networking. Setup of a clustered antispam and antivirus service based on Mailcleaner suite Setup of a clustered antispam and antivirus service based on Mailcleaner suite Andrea Lora, Giuseppe Nantista, Luca Ianniello, Augusto Pifferi, C.N.R., via Salaria km 29.300, 00015 Monterotondo, Italia.

More information

Specially Prepared Advertising Material How do we manage it? Andy Linton

Specially Prepared Advertising Material How do we manage it? Andy Linton Specially Prepared Advertising Material How do we manage it? Andy Linton asjl@citylink.co.nz CityLink Case Study What s the problem with SPAM? Who are we? What systems do we run? How well does it work?

More information

Best Practices. Kevin Chege

Best Practices. Kevin Chege Email Best Practices Kevin Chege Why your email setup is critical Billions of SPAM emails are generated every day The tips here can help you to reduced the chances of you receiving SPAM email or inadvertently

More information

COSC 301 Network Management. Lecture 14: Electronic Mail

COSC 301 Network Management. Lecture 14: Electronic Mail COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How

More information

i-mscp OpenDKIM plugin

i-mscp OpenDKIM plugin 2019/01/23 02:32 1/5 i-mscp OpenDKIM plugin Bear in mind that this documentation is for the last available version. If you use an older version, you must refer to the README.md file inside the plugin archive.

More information

High-Capacity Systems. Steve VanDevender University of Oregon

High-Capacity  Systems. Steve VanDevender University of Oregon High-Capacity Email Systems Steve VanDevender University of Oregon Goals of this tutorial Present a comprehensive overview of email systems (transmission, delivery, access) Discuss issues important to

More information

Network Working Group. Category: Experimental pobox.com April 2006

Network Working Group. Category: Experimental pobox.com April 2006 Network Working Group Request for Comments: 4406 Category: Experimental J. Lyon Microsoft Corp. M. Wong pobox.com April 2006 Sender ID: Authenticating E-Mail Status of This Memo This memo defines an Experimental

More information

SMTP. George Porter CSE 124 February 12, 2015

SMTP. George Porter CSE 124 February 12, 2015 SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,

More information

Introduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents

Introduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents Introduction to Internet Mail Philip Hazel University of Cambridge Computing Service MUA = Mail User Agent Mail agents Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Mulberry,

More information

Network Security (PhD Section)

Network Security (PhD Section) CSE508 Network Security (PhD Section) 4/7/2015 Email Michalis Polychronakis Stony Brook University 1 Email Overview MUA: Mail User Agent Thunderbird, webmail, Pine, MSA: Mail Submission Agent SMTP (port

More information

SPF classic. Przemek Jaroszewski CERT Polska / NASK The 17th TF-CSIRT and FIRST joint Event, Amsterdam, January 2006

SPF classic. Przemek Jaroszewski CERT Polska / NASK The 17th TF-CSIRT and FIRST joint Event, Amsterdam, January 2006 SPF classic Przemek Jaroszewski CERT Polska / NASK The 17th TF-CSIRT and FIRST joint Event, Amsterdam, 23-25 January 2006 Agenda What is SPF and how does it work? History and current status Mitigations

More information

Chapter 62 Simple Mail Transfer Protocol

Chapter 62 Simple Mail Transfer Protocol Chapter 62 Simple Mail Transfer Protocol You've got Mail! President Bush said for security reasons, he's sworn off all e-mail communication. He will not be using email at the White House at all. Is that

More information

Message Header Field for Indicating Message Authentication Status draft-kucherawy-sender-auth-header-14

Message Header Field for Indicating Message Authentication Status draft-kucherawy-sender-auth-header-14 Network Working Group M.S. Kucherawy Internet Draft Sendmail, Inc. March 19, 2008 Intended status: Standards Track Expires: September 2008 Message Header Field for

More information

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2)

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2) Introduction to Internet Mail Noah Sematimba Based on Materials by Philip Hazel. Mail agents MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,

More information

Postscreen for Zimbra

Postscreen for Zimbra Protecting Your Zimbra Collaboration Environment A Zimbra Collaboration Whitepaper Table of Contents MTA Boosts Email Security 3 How Does It Work? 4 Scenario without Postscreen 4 Scenario with Postscreen

More information

Status Node Reference

Status Node Reference IceWarp Unified Communications Status Node Reference Version 10.4 Printed on 23 February, 2012 Contents Status 1 Message Queue... 2 Spam Queues... 3 Quarantine... 3 Whitelist... 4 BlackList... 5 Greylisting...

More information

Application: Electronic Mail

Application: Electronic Mail Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-

More information

Towards authentication

Towards  authentication Towards email authentication TLS SPF + DKIM + DMARC 2012/10/03 Roberto Innocente 1 Who adopted it? Hotmail.com Gmail.com AOL.com Verizon.com Ebay Paypal Yahoo.com 2012/10/03 Roberto Innocente 2 Tls/SPF/DKIM/DMARC

More information

Mail System. chenshh

Mail System. chenshh Mail System chenshh Mail System What behinds the scene when you send an email? Gmail 2 NCTU-CS Mailbox Mail System What behinds the scene when you send an email? Gmail Servers CS Mail Servers Internet

More information

Electronic mail security

Electronic mail security Electronic mail security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Outline Pretty Good Privacy (PGP) S/MIME 2 1 Pretty Good Privacy Philip R.

More information

DKIM Sender Signing Practices draft-ietf-dkim-ssp-00

DKIM Sender Signing Practices draft-ietf-dkim-ssp-00 Network Working Group Internet Draft Intended status: Standards Track Expires: December 2007 E. Allman Sendmail, Inc. M. Delany Yahoo! Inc. J. Fenton Cisco Systems, Inc. June 2007

More information

Introduction to Antispam Practices

Introduction to Antispam Practices By Alina P Published: 2007-06-11 18:34 Introduction to Antispam Practices According to a research conducted by Microsoft and published by the Radicati Group, the percentage held by spam in the total number

More information

Untitled Page. Help Documentation

Untitled Page. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Antispam Administration SmarterMail comes equipped with a number

More information

Delivery incomplete. Detected a bounce of message #36, list gbird (bounce type DSN)

Delivery incomplete. Detected a bounce of message #36, list gbird (bounce type DSN) 1 of 5 2/3/2018 6:03 PM Subject: Bounce detected (list gbird) from Toni.J.Piaggio@aphis.usda.gov From: mj2-owner@lists.ncsu.edu Date: 2/17/2017 12:06 PM To: gbird-owner@lists.ncsu.edu Detected a bounce

More information

An Introduction to Internet Standards Barry Leiba

An Introduction to Internet Standards Barry Leiba www.computer.org/internet computing An Introduction to Internet Standards Barry Leiba Vol. 12, No. 1 January/February, 2008 This material is presented to ensure timely dissemination of scholarly and technical

More information

EIT070. Computer Organization

EIT070. Computer Organization EIT070 Computer Organization Course Organization Course homepage: http://www.eit.lth.se/kurs/eit070 Lab web-pages: http://www.eit.lth.se/index.php?ciuid=943&coursepage=5669 The labs are mandatory part

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.6.051117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...

More information

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified  Security Professional Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email

More information

Zombies suck the life out of the mail server ( new developments from LISA 2010 presentation)

Zombies suck the life out of the mail server ( new developments from LISA 2010 presentation) Zombies suck the life out of the mail server ( new developments from LISA 2010 presentation) Wietse Venema IBM T. J. Watson Research Center Hawthorne, NY, USA 2009: You built a mail system that has world-class

More information

SpamAssassin. SpamAssassinis an extensible filter which is used to identify spam. Yung-Zen Lai 2004/10

SpamAssassin. SpamAssassinis an extensible  filter which is used to identify spam. Yung-Zen Lai 2004/10 SpamAssassin SpamAssassinis an extensible email filter which is used to identify spam. Yung-Zen Lai (yzlai@tp.edu.tw) 2004/10 Agenda Introducing SpamAssassin How It Works Mailer and SpamAssassin SpamAssassin

More information

Deliverability Terms

Deliverability Terms Email Deliverability Terms The Purpose of this Document Deliverability is an important piece to any email marketing strategy, but keeping up with the growing number of email terms can be tiring. To help

More information

Input validation. Checking the user input

Input validation. Checking the user input Input validation Checking the user input Kontroll av att alla fält är ifyllda Skapa konto: Om ett eller flera fält är tomma? Visa ett meddelande för varje fel? Visa ett meddelande med sammanfattning? Skapa

More information

Mail Server. Introduction

Mail Server. Introduction Mail Server Introduction This article is an introduction to Mail Server and it's related protocols. Here I am explaining some basic ideas how a e-mail works and background information you need. Electronic

More information

Filtering 7 April 2014

Filtering 7 April 2014 Email Filtering 2014 Fortinet Inc. All rights reserved. The information contained herein is subject to change without notice. No part of this publication including text, examples, diagrams 1 or illustrations

More information

Internet Engineering Task Force (IETF) Request for Comments: 6591 April 2012 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6591 April 2012 Category: Standards Track ISSN: Internet Engineering Task Force (IETF) H. Fontana Request for Comments: 6591 April 2012 Category: Standards Track ISSN: 2070-1721 Authentication Failure Reporting Using the Abuse Reporting Format Abstract

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei November 15, 2010 Károly Erdei Debian/GNU Linux Mailing 1/43 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Links Károly Erdei

More information

Fighting Spam at the Frontline

Fighting Spam at the Frontline Fighting Spam at the Frontline Using DNS, Log Files and Other Tools in the Fight Against Spam Aaron Poffenberger akp@hypernote.com 2018-06-09T18:30:00Z Aaron Poffenberger (akp@hypernote.com) Fighting Spam

More information

Protocols and Software. Nixu Ltd.

Protocols and Software. Nixu Ltd. E-mail Protocols and Software Nixu Ltd. CONTENTS SMTP Interaction with DNS Sendmail IMAP and POP MIME Spam Nixu Ltd. 2/39 E-mail Protocols and Software History In the dawn of times (= before Internet)

More information

SPF (Sender Policy Framework)

SPF (Sender Policy Framework) SPF (Sender Policy Framework) Harpreet Singh Riat (hsr22@bath.ac.uk) 1 Agenda What s SPF? Why is it needed? How does it work? Who uses it? 2 Security flaws in SMTP Flaw: SMTP allows any computer to send

More information

Mail Protocol, Postfix and Mail security

Mail Protocol, Postfix and Mail security Mail Protocol, Postfix and Mail security How Email Appears to Works How Email Really Works Message Format Envelop Routing information for the "postman" Message Header Sender Recipients (simple, lists,

More information

CS 43: Computer Networks. 12: and SMTP September 28, 2018

CS 43: Computer Networks. 12:  and SMTP September 28, 2018 CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Mailing 1/67 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 TB-Preferences 7

More information

D. Crocker, Ed. Updates: RFC4871 June 10, 2009 (if approved) Intended status: Standards Track Expires: December 12, 2009

D. Crocker, Ed. Updates: RFC4871 June 10, 2009 (if approved) Intended status: Standards Track Expires: December 12, 2009 DKIM D. Crocker, Ed. Internet-Draft Brandenburg InternetWorking Updates: RFC4871 June 10, 2009 (if approved) Intended status: Standards Track Expires: December 12, 2009 RFC 4871 DomainKeys Identified Mail

More information

USERS GUIDE. Step-by-step instructions for installing, Configuring. and using BarricadeMX version 2.2.

USERS GUIDE. Step-by-step instructions for installing, Configuring. and using BarricadeMX version 2.2. 2009 USERS GUIDE Step-by-step instructions for installing, Configuring and using BarricadeMX version 2.2. Includes installation, operation and troubleshooting information For BarricadeMX 2.x Fort Systems

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

SMTP Scanner Creation

SMTP Scanner Creation SMTP Scanner Creation GWAVA4 Copyright 2009. GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com SMTP Scanner SMTP scanners allow the incoming and outgoing

More information

AXIGEN Features and Supported Platforms

AXIGEN Features and Supported Platforms AXIGEN Features and Supported Platforms GECAD Technologies 10A Dimitrie Pompei Blvd., BUCHAREST 2, ROMANIA Tel.: +40 21 303 20 80 +40 21 303 20 81 Last modified: 09/18/2007 Product Features v 4.0 and v

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS Account

More information

Components of an (1)

Components of an  (1) E-Mail System 2 Components of an E-Mail (1) Three major components The envelope Invisible to users Determine where the message should be delivered, or to whom it should be returned The headers Information

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei December 9, 2009 Károly Erdei Debian/GNU Linux Mailing 1/46 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Domain Name System

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.7.073118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...5

More information

security. MHS (Message Handling System)

security. MHS (Message Handling System) E-mail security Antonio Lioy < lioy @ polito.it> Politecnico di Torino Dip. Automatica e Informatica MHS (Message Handling System) MTA MSA MTA chain MTA MSA MS MS MUA MUA MUA (Message User Agent) MSA (Message

More information

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

MDaemon Vs. IceWarp Unified Communications Server

MDaemon Vs. IceWarp Unified Communications Server Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information

ECE 435 Network Engineering Lecture 6

ECE 435 Network Engineering Lecture 6 ECE 435 Network Engineering Lecture 6 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 20 September 2018 HW#2 was due. Announcements HW#3 will be posted a bit different. Encryption

More information

MxVault Questions and Answers

MxVault Questions and Answers Table of Contents INCOMING SERVICE... 2 1. INCOMING FILTERING SERVICE... 2 2. DOMAIN ALIASING... 5 3. ENCRYPTION TLS... 6 4. REPORTING SPAM... 6 5. ERROR CODE 500... 8 6. GREYLISTING... 8 7. MESSAGE QUEUING...

More information

BACKTRACING S. Michael Sonntag

BACKTRACING  S. Michael Sonntag BACKTRACING E-MAILS Michael Sonntag SOURCE E-MAILS Source of E-Mails: My personal spam folder! real_viagra.eml Fake GMX E-Mail For comparison a real GMX messages: Beispielmail_GMX.eml As_lecture.eml A

More information

PureMessage for Unix. help

PureMessage for Unix. help help Contents Getting Started... 1 Welcome to PureMessage for Unix... 1 Deployment Strategies... 6 Installing PureMessage... 18 Upgrading PureMessage...52 Quick Reference Guide...65 Contacting Sophos...

More information

Linux Education. E mail

Linux Education. E mail Linux Education E mail How E mail Works An e mail message passes through several steps from source to destination How E mail Works MUA mail user agent composes/reads mail MSA mail submission agent submits

More information

Lab 3.4.3: Services and Protocols

Lab 3.4.3:  Services and Protocols Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5

More information

design knowledge: Explicit -- as rules Implicit -- by patterns

design knowledge: Explicit -- as rules Implicit -- by patterns Assignment Feedback 1/4 chapter 7 design knowledge: Explicit -- as rules Implicit -- by patterns Referanser Ingen av paperene jeg har lest benytter referanser i teksten. De som har en referanseliste referer

More information

Understanding Forgery Properties of Spam Delivery Paths

Understanding Forgery Properties of Spam Delivery Paths Understanding Forgery Properties of Spam Delivery Paths Fernando Sanchez Florida State University sanchez@cs.fsu.edu Zhenhai Duan Florida State University duan@cs.fsu.edu Yingfei Dong University of Hawaii

More information

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 03r. Application layer protocols:  . Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol

More information

SMTP [in]security. Ian Foster Jon Larson

SMTP [in]security. Ian Foster Jon Larson SMTP [in]security Ian Foster Jon Larson Goals 1. Does the global email system currently provide security against passive adversary (eavesdropper)? 2. Against an active adversary (man in the middle)? Brief

More information

NSE6_FML exam.14q

NSE6_FML exam.14q NSE6_FML-5.3.8.exam.14q Number: NSE6_FML-5.3.8 Passing Score: 800 Time Limit: 120 min NSE6_FML-5.3.8 FortiMail 5.3.8 Specialist Exam A QUESTION 1 Examine the nslookup output shown in the exhibit; then

More information

RFC 4871 DomainKeys Identified Mail (DKIM) Signatures -- Update draft-ietf-dkim-rfc4871-errata-03-01dc

RFC 4871 DomainKeys Identified Mail (DKIM) Signatures -- Update draft-ietf-dkim-rfc4871-errata-03-01dc Network Working Group D. Crocker, Editor Internet Draft Brandenburg InternetWorking April 2, 2009 Updates: RFC4871 (if approved) Intended status: Standards Track

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University

More information

Spam, Scams and Filtering (and incontrovertible proof that most spammers are young males!)"

Spam, Scams and Filtering (and incontrovertible proof that most spammers are young males!) Title Slide Kingston University CISM Faculty Research Seminar................................................................................... Spam, Scams and Filtering (and incontrovertible proof that

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

DKIM Implementation How

DKIM Implementation How DKIM Implementation How Murray S. Kucherawy Principal Engineer, Cloudmark June 8, 2009 Planning Your Deployment Selecting Key Rotation Policy How long do your keys live? Similar in nature to your password

More information

Securing, Protecting, and Managing the Flow of Corporate Communications

Securing, Protecting, and Managing the Flow of Corporate Communications Securing, Protecting, and Managing the Flow of Corporate Communications Getting mailflow right Dave Stork Technical Consultant OGD ict-diensten QR: URL to Presentation Who am I? Dave Stork Technical consultant

More information

Network Services, VU 2.0

Network Services, VU 2.0 Network Services, VU 2.0 Email (SMTP, POP3, IMAP) News Dipl.-Ing. Johann Oberleiter Institute for Informationsystems, Distributed Systems Group Agenda Mail general info SMTP (Simple Mail Transfer Protocol)

More information

Handling unwanted . What are the main sources of junk ?

Handling unwanted  . What are the main sources of junk  ? Handling unwanted email Philip Hazel Almost entirely based on a presentation by Brian Candler What are the main sources of junk email? Spam Unsolicited, bulk email Often fraudulent penis enlargement, lottery

More information

Enterprise Mail Servers: Part I Incoming Mail

Enterprise Mail Servers: Part I Incoming Mail BY ADAM THORNTON Enterprise Mail Servers: Part I Incoming Mail Setting Up Sendmail Using M4 Macros As this series demonstrates, Linux plays an important role in implementing mail infrastructures for an

More information

Design and Implementation of a DMARC Verification Result Notification System

Design and Implementation of a DMARC Verification Result Notification System Proceedings of the APAN Research Workshop 2016 ISBN 978-4-9905448-6-7 Design and Implementation of a DMARC Verification Result Notification System Naoya Kitagawa, Toshiki Tanaka, Masami Fukuyama and Nariyoshi

More information

Security by Any Other Name:

Security by Any Other Name: Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

Spam, Security and SORBS v2.0

Spam, Security and SORBS v2.0 Spam, Security and SORBS v2.0 Michelle Sullivan Engineering Director, GFI Software Ltd Creator, Spam and Open Relay Blocking System (SORBS) Email: michelle@sorbs.net Tel: +356 79 543115 About this Presentation

More information

Internet Engineering Task Force (IETF) Request for Comments: 6686 Category: Informational July 2012 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6686 Category: Informational July 2012 ISSN: Internet Engineering Task Force (IETF) M. Kucherawy Request for Comments: 6686 Cloudmark Category: Informational July 2012 ISSN: 2070-1721 Abstract Resolution of the Sender Policy Framework (SPF) and Sender

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of Email Server and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3,

More information

Note 1: Compendium 4, 5 and 6 are not allowed during the exam.

Note 1: Compendium 4, 5 and 6 are not allowed during the exam. Institutionen för Dataoch Systemvetenskap *:9 (SU) and 2I123 (KTH) Internet Application Protocols and Standards STOCKHOLMS UNIVERSITET KUNGLIGA TEKNISKA HÖGSKOLAN Exam 1999-09-18 The following documents

More information