NORDUnet Nordic Infrastructure for Research & Education. Intro. SPAM-hantering på NUNOC och internt i SUNET
|
|
- Pauline Burns
- 6 years ago
- Views:
Transcription
1 Intro SPAM-hantering på NUNOC och internt i SUNET
2 Intro Förkortningar som är bra att kunna: MTA MUA MDA Mail Transfer Agent ex. Sendmail, Postfix, Qmail Mail User Agent ex. Thunderbird, Eudora, Pine, mutt Mail Delivery Agent ex. Procmail, mail.local
3 Intro (Något förenklat) består ett av: Envelope (from / to) De adresser under SMTP-handskakningen (MAIL FROM: / RCPT TO:) Header(s) + Body Det som kommer i SMTP-fasen DATA <CRLF> ---> <CRLF>. <CRLF>
4 Intro
5 Kort om lite olika tekniker att förhindra spam & falsk epost i osorterad ordning...
6 RFC Polis Följ alla RFC:er nitiskt! (och kanske mer än vad som står ändå...) 220 ex1.mydomain.com ESMTP mailer ready at Wed, 14 Nov :53: HELO ex2.yourdomain.com 250 ex1.mydomain.com Hello ex2.yourdomain.com [x.x.x.x], pleased to meet you MAIL FROM: Sender ok RCPT TO: Recipient ok DATA 354 Enter mail, end with "." on a line by itself laekrmfo Message accepted for delivery
7 Svartlistor DNSBL (aka. RBL) SpamHaus.org SORBS.net SpamCop.net njabl.org RHSBL RFC-ignorant Tarpits
8 Grålistning Greylisting (och Whitelisting) Evan Harris
9 Grålistning
10 SPF med fl. Responsible Submitter RFC 4405 E. Allman, H. Katz Sender-ID / PRA RFC 4406, RFC 4407 J. Lyon, M. Wong SPF (Classic) RFC 4408 M. Wong, W. Schlitt
11 SPF / Sender ID IN TXT v=spf1... -all IN TXT spf2.0/mfrom,pra... -all
12 DomainKey med fl. DomainKey RFC 4870, M. Delany Internet Identified Mail draft, J. Fenton DKIM RFC 4871, E. Allman, J. Callas, M. Delany, M. Libbey, J. Fenton, M. Thomas DKIM-SSP draft, E. Allman, m.fl.
13 DKIM header Hur ser DKIM headern ut? DKIM-Signature: a=rsa-sha1; c=nowsp/nowsp; d=mydomain.com; s=selector; t= ; h=x-domainkeys:domainkey-signature:received:received: X-MimeOLE:Content-class:MIME-Version:Content-Type:Subject:Date: Message-ID:X-MS-Has-Attach:X-MS-TNEF-Correlator:Thread-Topic: Thread-Index:From:To:Cc:X-OriginalArrivalTime:X-Virus-Scanned: X-Virus-Status; b=l3chfr+gswrdsvbxv3cxmfhry/9vn+zbvodb6+9gemiuwtv6 LJB4SjNCP9K3rYqIQLmKkPvmXc59913GP6RFZ5OQ5B3o0Ki/vm6Wy7luBd89G5ckEXV UY/UQ+k+4iG43O3zETbB6DZaPSKGqCq8F8KBi3a3NT/F1MdGAYPDqKn4=
14 Hur gör vi? Följer Statskontorets vägledning Dock ingen karantän. dvs. det som släpps igenom, hamnar i användarens inkorg/spam-folder. Droppa inget på golvet. reject:a i värsta fall.
15 En Kombi? Idé: Om man skulle kombinera white, grey och black -list?
16 Exempel på Svartlista Exempel S ORBS http.dnsbl.sorbs.net socks.dnsbl.sorbs.net misc.dnsbl.sorbs.net smtp.dnsbl.sorbs.net new.spam.dnsbl.sorbs.net recent.spam.dnsbl.sorbs.net old.spam.dnsbl.sorbs.net spam.dnsbl.sorbs.net escalations.dnsbl.sorbs.net web.dnsbl.sorbs.net block.dnsbl.sorbs.net zombie.dnsbl.sorbs.net dul.dnsbl.sorbs.net badconf.rhsbl.sorbs.net nomail.rhsbl.sorbs.net
17 Tekniska specs. Vad använder vi oss av? Sendmail + LOCAL_RULESETS tillägg milter-greylist MIMEDefang (standard filter + egna tillägg) SpamAssassin ClamAV Perl moduler, bla. Net::DNS, Net::ValidMX (i mimedefang-filter) spamd / pf
18 Slut Frågor?
How Internet Works
How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If
More informationanti-spam techniques beyond Bayesian filters
anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based
More informationCIT 470: Advanced Network and System Administration. Topics. Mail Policies.
CIT 470: Advanced Network and System Administration E-mail CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Mail Policies 2. Anatomy of a Mail Message 3. Components of an E-mail System
More informationDomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc.
DomainKeys Identified Mail Overview (-01) Eric Allman Sendmail, Inc. Overview of DKIM Cryptography-based protocol, signs selected header fields and message body Intended to: Enable reliable domain name
More informationCSN09101 Networked Services. Module Leader: Dr Gordon Russell Lecturers: G. Russell
CSN09101 Networked Services Week 11: Email Management Module Leader: Dr Gordon Russell Lecturers: G. Russell This lecture SMTP Linux Email Discussions SMTP SMTP Email is send between source and destination
More informationBased on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman
DKIM Patrik Fältström Based on material produced by among others: Sanjay Pol, Ashok Ramaswami, Jim Fenton and Eric Allman September 22, 2005 1 What is Domain Keys Identified Mail? Method of using cryptographic
More informationAka (or according to Knuth) Karst Koymans. Tuesday, September 27, 2016
.. Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 16.5, 2016/10/05 12:42:51 UTC) Tuesday, September 27, 2016 Karst Koymans
More informationAka (or according to Knuth) Karst Koymans. Friday, September 25, 2015
.. Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 15.4, 2015/09/28 11:43:08 UTC) Friday, September 25, 2015 Karst Koymans
More informationHit the Ground Spam(fight)ing
Hit the Ground Spam(fight)ing LISA 05, San Diego December, 2005 John Rowan Littell Earlham College littejo (at) earlham (dot) edu $ARGV[0] There is no magic bullet. Many products, both commercial and open
More informationOver 99% of s are SPAM! Useless for mankind!
Advanced Mail Introduction SPAM vs. non-spam Mail sent by spammer vs. non-spammer Problem of SPAM mail Over 99% of E-mails are SPAM! Useless for mankind! SPAM detection? Client-based detection These methods
More informationTable of Contents. Electronic mail. History of (2) History of (1) history. Basic concepts. Aka (or according to Knuth)
Table of Contents Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 17.7, 2017/10/03 11:29:40 UTC) Friday, September 29, 2017
More information. SMTP, POP, and IMAP
E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters
More informationCertified Spam Assassin Professional VS-1114
Certified Spam Assassin Professional VS-1114 Certified Spam Assassin Professional Certified SpamAssassin Professional Certification Code VS-1114 Vskills certification for SpamAssassin Professional assesses
More informationSmart elab volume 3, anno 2014 Networking. Setup of a clustered antispam and antivirus service based on Mailcleaner suite
Setup of a clustered antispam and antivirus service based on Mailcleaner suite Andrea Lora, Giuseppe Nantista, Luca Ianniello, Augusto Pifferi, C.N.R., via Salaria km 29.300, 00015 Monterotondo, Italia.
More informationSpecially Prepared Advertising Material How do we manage it? Andy Linton
Specially Prepared Advertising Material How do we manage it? Andy Linton asjl@citylink.co.nz CityLink Case Study What s the problem with SPAM? Who are we? What systems do we run? How well does it work?
More informationBest Practices. Kevin Chege
Email Best Practices Kevin Chege Why your email setup is critical Billions of SPAM emails are generated every day The tips here can help you to reduced the chances of you receiving SPAM email or inadvertently
More informationCOSC 301 Network Management. Lecture 14: Electronic Mail
COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How
More informationi-mscp OpenDKIM plugin
2019/01/23 02:32 1/5 i-mscp OpenDKIM plugin Bear in mind that this documentation is for the last available version. If you use an older version, you must refer to the README.md file inside the plugin archive.
More informationHigh-Capacity Systems. Steve VanDevender University of Oregon
High-Capacity Email Systems Steve VanDevender University of Oregon Goals of this tutorial Present a comprehensive overview of email systems (transmission, delivery, access) Discuss issues important to
More informationNetwork Working Group. Category: Experimental pobox.com April 2006
Network Working Group Request for Comments: 4406 Category: Experimental J. Lyon Microsoft Corp. M. Wong pobox.com April 2006 Sender ID: Authenticating E-Mail Status of This Memo This memo defines an Experimental
More informationSMTP. George Porter CSE 124 February 12, 2015
SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,
More informationIntroduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents
Introduction to Internet Mail Philip Hazel University of Cambridge Computing Service MUA = Mail User Agent Mail agents Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Mulberry,
More informationNetwork Security (PhD Section)
CSE508 Network Security (PhD Section) 4/7/2015 Email Michalis Polychronakis Stony Brook University 1 Email Overview MUA: Mail User Agent Thunderbird, webmail, Pine, MSA: Mail Submission Agent SMTP (port
More informationSPF classic. Przemek Jaroszewski CERT Polska / NASK The 17th TF-CSIRT and FIRST joint Event, Amsterdam, January 2006
SPF classic Przemek Jaroszewski CERT Polska / NASK The 17th TF-CSIRT and FIRST joint Event, Amsterdam, 23-25 January 2006 Agenda What is SPF and how does it work? History and current status Mitigations
More informationChapter 62 Simple Mail Transfer Protocol
Chapter 62 Simple Mail Transfer Protocol You've got Mail! President Bush said for security reasons, he's sworn off all e-mail communication. He will not be using email at the White House at all. Is that
More informationMessage Header Field for Indicating Message Authentication Status draft-kucherawy-sender-auth-header-14
Network Working Group M.S. Kucherawy Internet Draft Sendmail, Inc. March 19, 2008 Intended status: Standards Track Expires: September 2008 Message Header Field for
More informationMail agents. Introduction to Internet Mail. Message format (1) Message format (2)
Introduction to Internet Mail Noah Sematimba Based on Materials by Philip Hazel. Mail agents MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
More informationPostscreen for Zimbra
Protecting Your Zimbra Collaboration Environment A Zimbra Collaboration Whitepaper Table of Contents MTA Boosts Email Security 3 How Does It Work? 4 Scenario without Postscreen 4 Scenario with Postscreen
More informationStatus Node Reference
IceWarp Unified Communications Status Node Reference Version 10.4 Printed on 23 February, 2012 Contents Status 1 Message Queue... 2 Spam Queues... 3 Quarantine... 3 Whitelist... 4 BlackList... 5 Greylisting...
More informationApplication: Electronic Mail
Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-
More informationTowards authentication
Towards email authentication TLS SPF + DKIM + DMARC 2012/10/03 Roberto Innocente 1 Who adopted it? Hotmail.com Gmail.com AOL.com Verizon.com Ebay Paypal Yahoo.com 2012/10/03 Roberto Innocente 2 Tls/SPF/DKIM/DMARC
More informationMail System. chenshh
Mail System chenshh Mail System What behinds the scene when you send an email? Gmail 2 NCTU-CS Mailbox Mail System What behinds the scene when you send an email? Gmail Servers CS Mail Servers Internet
More informationElectronic mail security
Electronic mail security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Outline Pretty Good Privacy (PGP) S/MIME 2 1 Pretty Good Privacy Philip R.
More informationDKIM Sender Signing Practices draft-ietf-dkim-ssp-00
Network Working Group Internet Draft Intended status: Standards Track Expires: December 2007 E. Allman Sendmail, Inc. M. Delany Yahoo! Inc. J. Fenton Cisco Systems, Inc. June 2007
More informationIntroduction to Antispam Practices
By Alina P Published: 2007-06-11 18:34 Introduction to Antispam Practices According to a research conducted by Microsoft and published by the Radicati Group, the percentage held by spam in the total number
More informationUntitled Page. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Antispam Administration SmarterMail comes equipped with a number
More informationDelivery incomplete. Detected a bounce of message #36, list gbird (bounce type DSN)
1 of 5 2/3/2018 6:03 PM Subject: Bounce detected (list gbird) from Toni.J.Piaggio@aphis.usda.gov From: mj2-owner@lists.ncsu.edu Date: 2/17/2017 12:06 PM To: gbird-owner@lists.ncsu.edu Detected a bounce
More informationAn Introduction to Internet Standards Barry Leiba
www.computer.org/internet computing An Introduction to Internet Standards Barry Leiba Vol. 12, No. 1 January/February, 2008 This material is presented to ensure timely dissemination of scholarly and technical
More informationEIT070. Computer Organization
EIT070 Computer Organization Course Organization Course homepage: http://www.eit.lth.se/kurs/eit070 Lab web-pages: http://www.eit.lth.se/index.php?ciuid=943&coursepage=5669 The labs are mandatory part
More informationComodo Dome Antispam Software Version 6.0
St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.6.051117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...
More informationFortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional
Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email
More informationZombies suck the life out of the mail server ( new developments from LISA 2010 presentation)
Zombies suck the life out of the mail server ( new developments from LISA 2010 presentation) Wietse Venema IBM T. J. Watson Research Center Hawthorne, NY, USA 2009: You built a mail system that has world-class
More informationSpamAssassin. SpamAssassinis an extensible filter which is used to identify spam. Yung-Zen Lai 2004/10
SpamAssassin SpamAssassinis an extensible email filter which is used to identify spam. Yung-Zen Lai (yzlai@tp.edu.tw) 2004/10 Agenda Introducing SpamAssassin How It Works Mailer and SpamAssassin SpamAssassin
More informationDeliverability Terms
Email Deliverability Terms The Purpose of this Document Deliverability is an important piece to any email marketing strategy, but keeping up with the growing number of email terms can be tiring. To help
More informationInput validation. Checking the user input
Input validation Checking the user input Kontroll av att alla fält är ifyllda Skapa konto: Om ett eller flera fält är tomma? Visa ett meddelande för varje fel? Visa ett meddelande med sammanfattning? Skapa
More informationMail Server. Introduction
Mail Server Introduction This article is an introduction to Mail Server and it's related protocols. Here I am explaining some basic ideas how a e-mail works and background information you need. Electronic
More informationFiltering 7 April 2014
Email Filtering 2014 Fortinet Inc. All rights reserved. The information contained herein is subject to change without notice. No part of this publication including text, examples, diagrams 1 or illustrations
More informationInternet Engineering Task Force (IETF) Request for Comments: 6591 April 2012 Category: Standards Track ISSN:
Internet Engineering Task Force (IETF) H. Fontana Request for Comments: 6591 April 2012 Category: Standards Track ISSN: 2070-1721 Authentication Failure Reporting Using the Abuse Reporting Format Abstract
More informationDebian/GNU Linux Mailing
Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei November 15, 2010 Károly Erdei Debian/GNU Linux Mailing 1/43 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Links Károly Erdei
More informationFighting Spam at the Frontline
Fighting Spam at the Frontline Using DNS, Log Files and Other Tools in the Fight Against Spam Aaron Poffenberger akp@hypernote.com 2018-06-09T18:30:00Z Aaron Poffenberger (akp@hypernote.com) Fighting Spam
More informationProtocols and Software. Nixu Ltd.
E-mail Protocols and Software Nixu Ltd. CONTENTS SMTP Interaction with DNS Sendmail IMAP and POP MIME Spam Nixu Ltd. 2/39 E-mail Protocols and Software History In the dawn of times (= before Internet)
More informationSPF (Sender Policy Framework)
SPF (Sender Policy Framework) Harpreet Singh Riat (hsr22@bath.ac.uk) 1 Agenda What s SPF? Why is it needed? How does it work? Who uses it? 2 Security flaws in SMTP Flaw: SMTP allows any computer to send
More informationMail Protocol, Postfix and Mail security
Mail Protocol, Postfix and Mail security How Email Appears to Works How Email Really Works Message Format Envelop Routing information for the "postman" Message Header Sender Recipients (simple, lists,
More informationCS 43: Computer Networks. 12: and SMTP September 28, 2018
CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s
More informationDebian/GNU Linux Mailing
Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Mailing 1/67 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 TB-Preferences 7
More informationD. Crocker, Ed. Updates: RFC4871 June 10, 2009 (if approved) Intended status: Standards Track Expires: December 12, 2009
DKIM D. Crocker, Ed. Internet-Draft Brandenburg InternetWorking Updates: RFC4871 June 10, 2009 (if approved) Intended status: Standards Track Expires: December 12, 2009 RFC 4871 DomainKeys Identified Mail
More informationUSERS GUIDE. Step-by-step instructions for installing, Configuring. and using BarricadeMX version 2.2.
2009 USERS GUIDE Step-by-step instructions for installing, Configuring and using BarricadeMX version 2.2. Includes installation, operation and troubleshooting information For BarricadeMX 2.x Fort Systems
More informationInternet Architecture
Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use
More informationSMTP Scanner Creation
SMTP Scanner Creation GWAVA4 Copyright 2009. GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com SMTP Scanner SMTP scanners allow the incoming and outgoing
More informationAXIGEN Features and Supported Platforms
AXIGEN Features and Supported Platforms GECAD Technologies 10A Dimitrie Pompei Blvd., BUCHAREST 2, ROMANIA Tel.: +40 21 303 20 80 +40 21 303 20 81 Last modified: 09/18/2007 Product Features v 4.0 and v
More informationMDaemon Vs. Kerio Connect
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS Account
More informationComponents of an (1)
E-Mail System 2 Components of an E-Mail (1) Three major components The envelope Invisible to users Determine where the message should be delivered, or to whom it should be returned The headers Information
More informationDebian/GNU Linux Mailing
Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei December 9, 2009 Károly Erdei Debian/GNU Linux Mailing 1/46 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Domain Name System
More informationComodo Dome Antispam Software Version 6.0
St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.7.073118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...5
More informationsecurity. MHS (Message Handling System)
E-mail security Antonio Lioy < lioy @ polito.it> Politecnico di Torino Dip. Automatica e Informatica MHS (Message Handling System) MTA MSA MTA chain MTA MSA MS MS MUA MUA MUA (Message User Agent) MSA (Message
More informationElectronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur
Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple
More informationMDaemon Vs. Kerio Connect
Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS
More informationMDaemon Vs. Microsoft Exchange Server 2016 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
More informationMDaemon Vs. MailEnable Enterprise Premium
Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP
More informationis still the most used Internet app. According to some studies around 85% of Internet users still use for communication.
1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a
More informationMDaemon Vs. MailEnable Enterprise Premium
Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP
More informationMDaemon Vs. IceWarp Unified Communications Server
Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS
More informationMDaemon Vs. SmarterMail Enterprise Edition
Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,
More informationECE 435 Network Engineering Lecture 6
ECE 435 Network Engineering Lecture 6 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 20 September 2018 HW#2 was due. Announcements HW#3 will be posted a bit different. Encryption
More informationMxVault Questions and Answers
Table of Contents INCOMING SERVICE... 2 1. INCOMING FILTERING SERVICE... 2 2. DOMAIN ALIASING... 5 3. ENCRYPTION TLS... 6 4. REPORTING SPAM... 6 5. ERROR CODE 500... 8 6. GREYLISTING... 8 7. MESSAGE QUEUING...
More informationBACKTRACING S. Michael Sonntag
BACKTRACING E-MAILS Michael Sonntag SOURCE E-MAILS Source of E-Mails: My personal spam folder! real_viagra.eml Fake GMX E-Mail For comparison a real GMX messages: Beispielmail_GMX.eml As_lecture.eml A
More informationPureMessage for Unix. help
help Contents Getting Started... 1 Welcome to PureMessage for Unix... 1 Deployment Strategies... 6 Installing PureMessage... 18 Upgrading PureMessage...52 Quick Reference Guide...65 Contacting Sophos...
More informationLinux Education. E mail
Linux Education E mail How E mail Works An e mail message passes through several steps from source to destination How E mail Works MUA mail user agent composes/reads mail MSA mail submission agent submits
More informationLab 3.4.3: Services and Protocols
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5
More informationdesign knowledge: Explicit -- as rules Implicit -- by patterns
Assignment Feedback 1/4 chapter 7 design knowledge: Explicit -- as rules Implicit -- by patterns Referanser Ingen av paperene jeg har lest benytter referanser i teksten. De som har en referanseliste referer
More informationUnderstanding Forgery Properties of Spam Delivery Paths
Understanding Forgery Properties of Spam Delivery Paths Fernando Sanchez Florida State University sanchez@cs.fsu.edu Zhenhai Duan Florida State University duan@cs.fsu.edu Yingfei Dong University of Hawaii
More informationInternet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol
More informationSMTP [in]security. Ian Foster Jon Larson
SMTP [in]security Ian Foster Jon Larson Goals 1. Does the global email system currently provide security against passive adversary (eavesdropper)? 2. Against an active adversary (man in the middle)? Brief
More informationNSE6_FML exam.14q
NSE6_FML-5.3.8.exam.14q Number: NSE6_FML-5.3.8 Passing Score: 800 Time Limit: 120 min NSE6_FML-5.3.8 FortiMail 5.3.8 Specialist Exam A QUESTION 1 Examine the nslookup output shown in the exhibit; then
More informationRFC 4871 DomainKeys Identified Mail (DKIM) Signatures -- Update draft-ietf-dkim-rfc4871-errata-03-01dc
Network Working Group D. Crocker, Editor Internet Draft Brandenburg InternetWorking April 2, 2009 Updates: RFC4871 (if approved) Intended status: Standards Track
More informationInternet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University
More informationSpam, Scams and Filtering (and incontrovertible proof that most spammers are young males!)"
Title Slide Kingston University CISM Faculty Research Seminar................................................................................... Spam, Scams and Filtering (and incontrovertible proof that
More informationCS 356 Internet Security Protocols. Fall 2013
CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5
More informationDKIM Implementation How
DKIM Implementation How Murray S. Kucherawy Principal Engineer, Cloudmark June 8, 2009 Planning Your Deployment Selecting Key Rotation Policy How long do your keys live? Similar in nature to your password
More informationSecuring, Protecting, and Managing the Flow of Corporate Communications
Securing, Protecting, and Managing the Flow of Corporate Communications Getting mailflow right Dave Stork Technical Consultant OGD ict-diensten QR: URL to Presentation Who am I? Dave Stork Technical consultant
More informationNetwork Services, VU 2.0
Network Services, VU 2.0 Email (SMTP, POP3, IMAP) News Dipl.-Ing. Johann Oberleiter Institute for Informationsystems, Distributed Systems Group Agenda Mail general info SMTP (Simple Mail Transfer Protocol)
More informationHandling unwanted . What are the main sources of junk ?
Handling unwanted email Philip Hazel Almost entirely based on a presentation by Brian Candler What are the main sources of junk email? Spam Unsolicited, bulk email Often fraudulent penis enlargement, lottery
More informationEnterprise Mail Servers: Part I Incoming Mail
BY ADAM THORNTON Enterprise Mail Servers: Part I Incoming Mail Setting Up Sendmail Using M4 Macros As this series demonstrates, Linux plays an important role in implementing mail infrastructures for an
More informationDesign and Implementation of a DMARC Verification Result Notification System
Proceedings of the APAN Research Workshop 2016 ISBN 978-4-9905448-6-7 Design and Implementation of a DMARC Verification Result Notification System Naoya Kitagawa, Toshiki Tanaka, Masami Fukuyama and Nariyoshi
More informationSecurity by Any Other Name:
Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San
More informationThe Application Layer: & SMTP
The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,
More informationSpam, Security and SORBS v2.0
Spam, Security and SORBS v2.0 Michelle Sullivan Engineering Director, GFI Software Ltd Creator, Spam and Open Relay Blocking System (SORBS) Email: michelle@sorbs.net Tel: +356 79 543115 About this Presentation
More informationInternet Engineering Task Force (IETF) Request for Comments: 6686 Category: Informational July 2012 ISSN:
Internet Engineering Task Force (IETF) M. Kucherawy Request for Comments: 6686 Cloudmark Category: Informational July 2012 ISSN: 2070-1721 Abstract Resolution of the Sender Policy Framework (SPF) and Sender
More informationMDaemon Vs. SmarterMail Enterprise Edition
Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of Email Server and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3,
More informationNote 1: Compendium 4, 5 and 6 are not allowed during the exam.
Institutionen för Dataoch Systemvetenskap *:9 (SU) and 2I123 (KTH) Internet Application Protocols and Standards STOCKHOLMS UNIVERSITET KUNGLIGA TEKNISKA HÖGSKOLAN Exam 1999-09-18 The following documents
More information