Mail Protocol, Postfix and Mail security

Size: px
Start display at page:

Download "Mail Protocol, Postfix and Mail security"

Transcription

1 Mail Protocol, Postfix and Mail security

2 How Appears to Works

3 How Really Works

4 Message Format Envelop Routing information for the "postman" Message Header Sender Recipients (simple, lists, copies, blind copies) Other fields of control (date, subject) Message Body Free text Structured document (i.e.: MIME)

5 Message Format From: GZ Kabir To: Diep Kong < > Cc: Moin < > Subject: How Internet mail works Hi Kong, I'm going to be running a course on... ü Format was originally defined by RFC 822 in 1982 ü Now superseded by RFC 2822 ü Message consists of ü Header lines ü A blank line ü Body lines

6 Message Format Embedded MUA uses inter-process call to send to MTA Freestanding MUA uses SMTP to send mail Headers added by the MUA before sending From: GZ Kabir To: Diep Kong < > Cc: Moin < > Subject: How Internet mail works Hi Kong, I'm going to be running a course on...

7 Headers added by MTAs Mail Delivery Agent (MDA) / Mail Transfer Agent (MTA) From: GZ Kabir <gzkabir@office.bdcom.com> To: Diep Kong < diepkong@gmail.com > Cc: Moin < moin@bofh.im > Subject: How Internet mail works..

8 A message in Transit A message is transmitted with an envelope: MAIL FROM:<gzkabir@office.bdcom.com> RCPT TO:<moin@bofh.im> The envelope is separate from the RFC 2822 message Envelope (RFC 2821) fields need not be the same as the header (RFC 2822) fields MTAs are (mainly) concerned with envelopes Just like the Post Office... Error ( bounce ) messages have null senders or Postmaster s MAIL FROM:<>

9 An SMTP Session telnet mail7i.protonmail.ch mail7i.protonmail.ch ESMTP Postfix... EHLO mail-pg0-f54.google.com 250- mail7i.protonmail.ch SIZE PIPELINING 250 HELP MAIL 250 OK RCPT 250 Accepted DATA 354 Enter message, ending with. (continued >>>>) Received: from... From:... To:... etc OK id=10spdr-00034h-00 quit 221 mail-pg0-f54.google.com closing conn... SMTP return codes 2xx OK 3xx send more data 4xx temporary failure 5xx permanent failure

10 DNS Resolution and Transfer Process To find the recipient's IP address and mailbox, the MTA must drill down through the DNS system, which consists of a set of servers distributed across the Internet beginning with the root name servers root servers refer requests for a given domain to the root nameservers that handle requests for that tld MTA can bypass this step because it has already knows which domain nameservers handle requests for these.tlds e.g. bofh.im asks the appropriate DNS server which Mail Exchange (MX) servers have knowledge of the subdomain or local host in the address DNS server responds with an MX record: a prioritized list of MX servers for this domain To the DNS server, the server that accepts messages is an MX server. When is transferring messages, it is called an MTA. MTA contacts the MX servers on the MX record in order of priority until it finds the designated host for that address domain sending MTA asks if the host accepts messages for the recipient's username at that domain (i.e., username@domain.tld) and transfers the message

11 Firewalls, Spam and Virus Filters An encountering a firewall may be tested by spam and virus filters before it is allowed to pass inside the firewall filters test to see if the message qualifies as spam or malware If the message contains malware, the file is usually quarantined and the sender is notified If the message is identified as spam, it will probably be deleted without notifying the sender.

12 Troubleshooting Issues transient failures If a transient error occurs, the MTA will hang onto the message, periodically retrying the delivery until it either succeeds or fails, or until the MTA decides that the transient issue is really a permanent condition. permanent failures If the MTA cannot deliver the message (it has received a fatal error message or failed to complete the transfer after repeated attempts), it bounces the message back to the sender. If the sender is a mailing list, the bounce may be handled by automated bounce-handling software.

13

14 Concept of Mail Protocols

15 Component of system Mail Transport Agent/Message Transfer Agent (MTA) Mail User Agent (MUA) Mail Delivery Agent(MDA)

16 MTA The actual mail transfer is done through message transfer agents (MTAs). To send mail, a system must have the client MTA, and to receive mail, a system must have a server MTA. The formal protocol that defines the MTA client and server in the Internet is called Simple Mail Transfer Protocol (SMTP) SMTP uses commands and responses to transfer mail between an MTA client and MTA server.

17 SMTP Mail transfer Flow

18 MTA connection setup

19 MTA Connection Setup..Contd.. Sender opens TCP connection with receiver Once connected, receiver identifies itself 220 service ready Sender identifies itself HELO <domain> Receiver accepts sender s identification 250OK If mail service not available, step 2 above becomes: 421 service not available

20 SMTP Exchange of command response pair

21 Message Transfer Sender may send one or more messages to receiver Each message transfer has the following phases: One MAIL command, identifies originator Gives reverse path to use for error reporting Receiver returns 250 OK or appropriate fail/error message One or more RCPT commands, identifies recipients for the message Each recipient identified by a separate RCPT Separate reply for each recipient (250 OK etc.) One DATA command transfers message text End of message indicated by line containing just period (.)

22 MTA connection termination

23 MTA connection termination Sender sends QUIT and waits for reply Then initiate TCP close operation Receiver initiates TCP close after sending reply to QUIT

24 Optimization If message is sent to multiple users on a given host,it is sent only once. Delivery to users handled by destination host If Multiple messages are ready for given host,a single TCP connection can be used. Saves overhead of setting up and termination of connection

25 Possible Errors Host unreachable Host out of operation TCP connection fail during transfer Faulty destination address User error Target user address has changed Redirect if possible Inform user if not Sender re-queue the mail - will retry till a configurable period of time

26 SMTP protocol reliability TCP connection is used to transfer mail from sender to receiver over TCP connection Attempts to provide reliable service No guarantee to recover lost messages No end-to-end ack to sender Error indication report not guaranteed

27 SMTP receiver Accepts arriving message Places in user mailbox or copies to outbound message queue for forwarding Receiver must verify local mail destination deal with errors Transmission Lack of disk space

28 SMTP status codes(dsn- Delivery status Notification) Leading digits Indicates catagories 2XX-Positive Completion Reply(Successful) 3XX-Positive Intermediate Reply(Redirection) 4XX-Transient negative completion reply(client error) 5XX-Permanent negative completion reply(server error)

29 SMTP status codes..cont.

30 Problems with SMTP No inherent security n Authentication n Encryption Only uses NVT (Network Virtual Terminal) 7- bit ASCII format

31 s can be forged.. HELO mail.rose.edu MAIL FROM: RCPT TO: DATA From: Dr. Art Zenner To: Professor Richards Subject: CIT 2243 Professor Richards, By department decree all students in your Introduction to Unix class are hereby to be granted automatic A s. Thank you, Dr. Art Zenner. QUIT

32 Extensions to SMTP MIME Multipurpose Internet Mail Extensions n Transforms non-ascii data to NVT (Network Virtual Terminal) ASCII data w w w w w Text Application Image Audio Video

33 MIME and Base64 Encoding If the internet is the information highway, then the path for is a narrow tunnel n Only very small vehicles can pass trough Then how do you send a big truck through a small ravine? n You have to break it down to smaller pieces and transport the pieces through the ravine, and reassemble the truck

34 MIME and Base64 Encoding The same happens when you send a file attachment via . This is known as encoding n the binary data (256 bits) is transformed to ASCII text (128 bits n allowing it to fit through the tunnel On the recipient's end, the data is decoded and the original file is rebuilt.

35 Mail Transfer Agents (MTA) MTAs do the actual mail transfers MTAs are not meant to be directly accessed by users. Other MTA s are: n n n n n n Postfix Qmail MS Exchange CC:Mail Lotus Notes.etc.

36 Problems with simple SMTP The first one relates to message length. Some older implementations cannot handle messages exceeding 64KB. Another problem relates to timeouts. If the Client and server have different timeouts, one of them may give up while the other is still busy, unexpectedly terminating the connection. Infinite mail storms can be triggered. For example, If host 1 holds mailing list A and host 2 holds mailing list B and each list contains an entry for the other one, then a message sent to either list could generate a never ending amount of traffic unless somebody checks for it.

37 ESMTP (RFC 2821) To get around the problems with simple SMTP, extended SMTP has been defined in RFC Clients wanting to use it should send an EHLO message instead of HELO initially. If this is rejected, then the server is a regular SMTP server, and the client should proceed in the usual way. If the EHLO is accepted, then new commands and parameters are allowed.

38 POP3 Mail access protocol: POST OFFICE PROTOCOL [RFC 1939] Simple and limited functionality,consists of client software and Server software, Server performs user authorization IMAP: Internet mail access protocol [Version 4]

39 POP3 Retrieves messages from a mail server Typically, messages are downloaded to your mail client, and deleted from the server Designed for use with dial-up connections when people were intermittently connected Listens on Port 110 (with Secure POP generally on port 995)

40 POP3 Connection Establishment

41 POP3 protocol session ~]# telnet mail.amberit.com.bd 110 Trying Connected to mail.amberit.com.bd. Escape character is '^]'. +OK Dovecot ready. user +OK pass letmein +OK Logged in. list +OK 1 messages: retr 1 +OK 482 octets <snip>message Headers</snip> This is my short message quit +OK Logging out.

42 Basic POP3 commands USER <name> - identifies the user PASS <password> - authentication for user STAT - lists all messages in the mailbox of user LIST <msg no.> - lists the content of a message RETR <msg no.> - retrieves a particular message DELE <msg no.> - Deletes a particular message NOOP RSET QUIT Replies +OK ERR

43 IMAP Protocol session ~]# telnet mail.amberit.com.bd 143 Trying Connected to mail.amberit.com.bd Escape character is '^]'. * OK Dovecot ready. A1 LOGIN user@testing.comletmein A1 OK Logged in. A2 SELECTInbox * FLAGS (\Answered \Flagged \Deleted \Seen \Draft) *

44 IMAP Protocol session..cont. OK [PERMANENTFLAGS (\Answered \Flagged \Deleted \Seen \Draft \*)] Flags permitted. * 1 EXISTS * 0 RECENT * OK [UIDVALIDITY ] UIDs valid * OK [UIDNEXT 2] Predicted next UID A2 OK [READ-WRITE] Select completed. A3 FETCH 1 BODY[HEADER] * 1 FETCH (BODY[HEADER] {454} <snip> Message Header Delivered</snip> A3 OK Fetch completed. A4 LOGOUT * BYE Logging out A4 OK Logout completed. Connection closed by foreign host.

45 Webmail

46 Webmail Webmail (or web-based ) is any client implemented as a web application running on a web server Online in nature IMAP connections mostly Secured HTTP (HTTPS) must Can be hosted, e.g.: RoundCube, SquirrelMail, Horde, Zimbra, Rainloop, Kite, MailPile,iRedMail, etc. Webmail Service providers : Gmail, Outlook, AOL, Yahoo, etc. Privacy and Security Concern Easy to configure, easy to host.

47 Common Threat Landscape Eavesdropping Spamming and Phishing Spoofing Malicious Attachments Replying and Forwarding Issues CC & BCC Issues

48

49 Postfix

50 Short History Originally developed in the late 90s at IBM by Wietse Venema, author of security software (SATAN, TCPwrappers,...), as IBM Secure Mailer Place under an Open Source license, and renamed Postfix Intended as a replacement for then insecure mail systems, such as Sendmail

51 Design Goals Safety Robustness Performance Modularity Compatibility

52 Safety Postfix makes it very hard to lose mails many checks to ensure that mail has been written to disk or delivered Back off mechanisms in case of repeated failure

53 Security Collection of daemons working together Doesn't use environment for communication Very paranoid about input checking, all allocation is dynamic (avoiding buffer overflows) chroot support out of the box for almost all processes & daemons No data is ever exchanged directly between processes all is done via IPC, and files on disk Conservative resource usage

54 Performance Designed to be fast from the ground up Also behaves well with neighbors, doesn't flood them with mail, and instead uses a throughput adaptation Will not block delivery for a message if one recipient domain fails

55 Modular One program, one function All programs controlled from master.cf Many small programs working together, with limited privileges Compatible with Sendmail's /etc/aliases and.forward conventions

56 Features Virtual domains domains and users are completely independent of system (UNIX) users Aliases sendmail compatible Rewriting senders, recipients, globally RBL support (Realtime Blackhole Lists) support Content filtering using pipes, SMTP or milter Support for arbitrary mail manipulation with policy services (custom programs talking to postfix)

57 More Features Restriction classes Conditional filtering Sender or recipient address verification (test addresses before accepting mail from them) TLS support

58 Core Concepts : maps In postfix, everything is looked up in a map (table) Maps can be in many formats or use many data sources: hash/btree regexp/pcre CIDR NIS LDAP, *SQL (user defined queries)

59 Architecture Architecture

60 Basic Postfix Configuration Two primary configuration files main.cf Main configuration file where all the subsystems are configured (smtp, smtpd, cleanup, routing,...) master.cf File controlling how the master process of postfix will launch all the necessary postfix daemons to perform mail routing, on-demand

61 Other Configuration Details Reside in maps mentioned earlier Tables containing values and conditions, referred to from main.cf, controlling all aspects such as: Virtual and local domains Routing rules Access control Rewriting...

62 Configuration: postconf command postconf used to view and edit configuration parameters For changing the configuration, it is usually done vi editing main.cf directly

63 Some Basic main.cf smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated defer_unauth_destination myhostname = group1.group01.net alias_maps = hash:/etc/aliases alias_database = hash:/etc/aliases myorigin = /etc/mailname mydestination = group1.group01.net, localhost.group01.net,, localhost relayhost = group1.group01.net mynetworks = / /24 [2001:df0:a:4::]/64 [::ffff: ]/104 [::1]/128 mailbox_size_limit = 0 recipient_delimiter = + inet_interfaces = all inet_protocols = all

64 # TLS parameters Some Basic main.cf smtpd_tls_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem smtpd_tls_key_file=/etc/ssl/private/ssl-cert-snakeoil.key smtpd_use_tls=yes smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache

65 ## in the file /etc/mailname Some Basic main.cf group1.group01.net ## in the file /etc/aliases postmaster: root sysadm: apnic

66

. SMTP, POP, and IMAP

. SMTP, POP, and IMAP E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters

More information

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple

More information

Postfix Mail Server. Kevin Chege ISOC

Postfix Mail Server. Kevin Chege ISOC Postfix Mail Server Kevin Chege ISOC What is Postfix? Postfix is a free and open-sourcemail transfer agent (MTA) that routes and delivers electronic mail, intended as an alternative to the widely used

More information

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 03r. Application layer protocols:  . Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol

More information

Electronic Mail

Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2)

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2) Introduction to Internet Mail Noah Sematimba Based on Materials by Philip Hazel. Mail agents MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,

More information

Network Applications Electronic Mail

Network Applications Electronic Mail Network Applications Electronic Mail The OSI way to do this is specified in X.400 (84 & 88) Overall Architecture UA P3 UA MS P7 P1 MTS At the core of the X.400 Message Handling System (MHS) is the Message

More information

How Internet Works

How Internet  Works How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If

More information

CS 43: Computer Networks. 12: and SMTP September 28, 2018

CS 43: Computer Networks. 12:  and SMTP September 28, 2018 CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the

More information

anti-spam techniques beyond Bayesian filters

anti-spam techniques beyond Bayesian filters anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

CIT 470: Advanced Network and System Administration. Topics. Mail Policies.

CIT 470: Advanced Network and System Administration. Topics. Mail Policies. CIT 470: Advanced Network and System Administration E-mail CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Mail Policies 2. Anatomy of a Mail Message 3. Components of an E-mail System

More information

SMTP. George Porter CSE 124 February 12, 2015

SMTP. George Porter CSE 124 February 12, 2015 SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,

More information

Application: Electronic Mail

Application: Electronic Mail Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

Introduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents

Introduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents Introduction to Internet Mail Philip Hazel University of Cambridge Computing Service MUA = Mail User Agent Mail agents Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Mulberry,

More information

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

Lecture 6: Application Layer Web proxies, , and SMTP

Lecture 6: Application Layer Web proxies,  , and SMTP Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

FTP. FTP offers many facilities :

FTP. FTP offers many facilities : FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

System: Basic Functionality

System: Basic Functionality E-mail System: Basic Functionality E-mail systems support five basic functions: Composition: Creating messages Transfer: Moving messages from the originator to the recipient E-mail transfer is a connection-oriented

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified  Security Professional Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

Appendix. Web Command Error Codes. Web Command Error Codes

Appendix. Web Command Error Codes. Web Command Error Codes Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting

More information

Applications & Application-Layer Protocols: FTP and (SMTP & POP)

Applications & Application-Layer Protocols: FTP and  (SMTP & POP) COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their

More information

Overview. Electronic mail. History Format of . Sending . Retrieving . RFC 822, MIME, addresses SMTP, DNS. POP, IMAP, Web-based

Overview. Electronic mail. History Format of  . Sending  . Retrieving  . RFC 822, MIME,  addresses SMTP, DNS. POP, IMAP, Web-based Electronic Mail Electronic mail History Format of email Overview RFC 822, MIME, email addresses Sending email SMTP, DNS Retrieving email POP, IMAP, Web-based 2 Flashback to the 70s ARPANET just recently

More information

Network Services, VU 2.0

Network Services, VU 2.0 Network Services, VU 2.0 Email (SMTP, POP3, IMAP) News Dipl.-Ing. Johann Oberleiter Institute for Informationsystems, Distributed Systems Group Agenda Mail general info SMTP (Simple Mail Transfer Protocol)

More information

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0 Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet

More information

Application Inspection and Control for SMTP

Application Inspection and Control for SMTP Application Inspection and Control for SMTP First Published: July 11, 2008 Last Updated: July 11, 2008 The Application Inspection for SMTP feature provides an intense provisioning mechanism that can be

More information

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network

More information

ESMTP Support for Cisco IOS Firewall

ESMTP Support for Cisco IOS Firewall ESMTP Support for Cisco IOS Firewall Finding Feature Information ESMTP Support for Cisco IOS Firewall Last Updated: June 14, 2011 The ESMTP Support for Cisco IOS Firewall feature enhances the Cisco IOS

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Fig (1) sending and receiving s

Fig (1) sending and receiving  s Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and

More information

What is ? TCP/IP Standard Applications for Electronic Mail. Agenda. History

What is  ? TCP/IP Standard Applications for Electronic Mail. Agenda. History What is E-Mail? TCP/IP Standard Applications for Electronic Mail Email, SMTP, POP, IMAP, MIME E-Mail (or "email") is the most widely used Internet application Note: email was one of TCP/IP's keys to success:

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

HUL SOVANNAROTH PANG DA TIP SAROTH

HUL SOVANNAROTH PANG DA TIP SAROTH HUL SOVANNAROTH PANG DA TIP SAROTH Contents I. Server C configuration (Debian)... 4 II. Server A configuration (CentOS)... 15 IP configuration on server A... 15 Webmail... 18 Configure DNS... 18 Install

More information

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers 2007, Jae-sul Lee. All rights reserved. 1 Agenda 11.1 TCP/IP Transport Layer 11.2 The Application Layer What does the TCP/IP transport layer

More information

The Application Layer: SMTP, FTP

The Application Layer: SMTP, FTP The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)

More information

COSC 301 Network Management. Lecture 14: Electronic Mail

COSC 301 Network Management. Lecture 14: Electronic Mail COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

Using Centralized Security Reporting

Using Centralized  Security Reporting This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the

More information

SMTP Simple Mail Transfer Protocol

SMTP Simple Mail Transfer Protocol SMTP Simple Mail Transfer Protocol What is SMTP? SMTP stands for Simple Mail Transfer Protocol. This protocol allows transmitting electronic mail over the Internet or any other network. The protocol itself

More information

SCS3004 Networking Technologies Application Layer Protocols

SCS3004 Networking Technologies Application Layer Protocols SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:

More information

Electronic Mail. Electronic Mailboxes

Electronic Mail. Electronic Mailboxes Electronic Mail E-mail belongs to the Application Layer Has been around since the early 80 s Enables new forms of interaction Fast Automatic processing (sorting, reply) Can carry other content Electronic

More information

. indigoo.com INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R.

. indigoo.com  INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R. EMAIL INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET Peter R. Egli INDIGOO.COM 1/35 Contents 1. EMail Electronic Mail RFC821/RFC822 2. Email Elements 3. Email Message 4. Email Transfer with SMTP

More information

The Application Layer

The Application Layer The Application Layer Subject Name: Fundamentals of Networking (FON) Subject Code: 640001 Domain Name System, Electronic Mail 21-Apr-12 Having finished all the preliminaries, we now come to the layer where

More information

Internet Technology 2/10/2016

Internet Technology 2/10/2016 Internet Technology 03r. Application layer protocols: email Email: (Simple Mail Transfer Protocol) Paul Krzyzanowski Rutgers University Spring 2016 1 2 Simple Mail Transfer Protocol () Protocol defined

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1 Lecture 25 Reminders: Homework 7 due today. Homework 8 posted. Due at the beginning of the last day of class for final exam review. Programming Project 6 posted. Final project worth double. Due by 4:30pm,

More information

DNS and SMTP. James Walden CIT 485: Advanced Cybersecurity. James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31

DNS and SMTP. James Walden CIT 485: Advanced Cybersecurity. James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31 DNS and SMTP James Walden CIT 485: Advanced Cybersecurity James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31 Table of contents 1. DNS 2. DNS Protocol Packets 3. DNS Caching 4. DNS Cache Poisoning

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

Version SurfControl RiskFilter - Administrator's Guide

Version SurfControl RiskFilter -  Administrator's Guide Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with

More information

Practical classes Lab5. Integration of global services in enterprise environments II:

Practical classes Lab5. Integration of global services in enterprise environments II: Computer Engineering Degree Computer Engineering Year 2017/18 Practical classes Lab5 CSDA Unit III INTERNET Integration of global services in enterprise environments II: The INTERNET Deployment of a secure

More information

Outline. EEC-484/584 Computer Networks. Slow Start Algorithm. Internet Congestion Control Algorithm

Outline. EEC-484/584 Computer Networks. Slow Start Algorithm. Internet Congestion Control Algorithm EEC-484/584 Computer Networks Lecture 19 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline TCP slow start and congestion avoidance The

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Protocols and Software. Nixu Ltd.

Protocols and Software. Nixu Ltd. E-mail Protocols and Software Nixu Ltd. CONTENTS SMTP Interaction with DNS Sendmail IMAP and POP MIME Spam Nixu Ltd. 2/39 E-mail Protocols and Software History In the dawn of times (= before Internet)

More information

Electronic Mail (SMTP)

Electronic Mail (SMTP) Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,

More information

Comprehensive Setup Guide for TLS on ESA

Comprehensive Setup Guide for TLS on ESA Comprehensive Setup Guide for TLS on ESA Contents Introduction Prerequisites Requirements Components Used Background Information Functional Overview and Requirements Bring Your Own Certificate Update a

More information

Understanding the Pipeline

Understanding the  Pipeline This chapter contains the following sections: Overview of the Email Pipeline, page 1 Email Pipeline Flows, page 2 Incoming / Receiving, page 4 Work Queue / Routing, page 6 Delivery, page 10 Overview of

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

Symantec ST0-250 Exam

Symantec ST0-250 Exam Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question

More information

Basics BUPT/QMUL

Basics BUPT/QMUL Email Basics BUPT/QMUL 2014-04-28 Agenda Brief introduction to email Components of email system Email Standards Summary 2 Brief Introduction To Email 3 What is Email? Electronic Mail (email, e-mail) Provides

More information

Application Level Protocols

Application Level Protocols Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application

More information

Electronic mail, usually called , consists of simple text messages a piece of text sent to a recipient via the internet.

Electronic mail, usually called  , consists of simple text messages a piece of text sent to a recipient via the internet. 1 Electronic Mail Electronic mail, usually called e-mail, consists of simple text messages a piece of text sent to a recipient via the internet. E-mail Clients To read e-mail, we use an e-mail client,

More information

Computer Network 1 1

Computer Network 1 1 Computer Network 1 1 Chapter 10: Application Layer Advanced Principal Concepts Samples and Techniques Foundation Summary Question and Answer 2 Outline Application Layer There is a need for support protocols,

More information

Agenda. What is ? Brief Introduction To . History Of . Components Of System. Basics

Agenda. What is  ? Brief Introduction To  . History Of  . Components Of  System.  Basics Agenda Email Basics BUPT/QMUL 2012-04-09 Brief introduction to email Components of email system Email Standards Summary Refer to Chapter 27, textbook 2 Brief Introduction To Email 3 What is Email? Electronic

More information

WWW: the http protocol

WWW: the http protocol Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC

More information

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance. CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server

More information

13. Internet Applications 최양희서울대학교컴퓨터공학부

13. Internet Applications 최양희서울대학교컴퓨터공학부 13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network

More information

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION Networking Revision TCP/IP Protocol Stack & OSI reference model Basic Protocols TCP/IP Model 1 OSI (Open Systems Interconnection) Model main purpose to aid in clearer understanding of the functions and

More information

Linux Education. E mail

Linux Education. E mail Linux Education E mail How E mail Works An e mail message passes through several steps from source to destination How E mail Works MUA mail user agent composes/reads mail MSA mail submission agent submits

More information

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions

More information

WASP. SoftwareArt Corporation

WASP. SoftwareArt Corporation WASP SoftwareArt Corporation WASP Mail Server [WASP] Introduction: WASP Mail Server is a complete email messaging solution designed for small to mid-sized businesses and is backed by the industry s best

More information

Error Codes have 3 Digits

Error Codes have 3 Digits The top portion covers bounce back messages. The x.x.x The xxx Examples of real Error messages with an explaination. (the email client errors coming in the future) The 2nd half covers email connection

More information

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail

More information

Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track

Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track Network Working Group J. Klensin Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track Status of This Memo Simple Mail Transfer Protocol This document specifies

More information

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among

More information

ing With PHP History of Applications or Use

ing With PHP History of  Applications or Use Emailing With PHP What is Email? E mail, short for electronic mail and often abbreviated to e mail, email or simply mail, is a store and forward method of composing, sending, receiving and storing messages

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Q-1 Explain DNS (Domain Name System) in detail with example. OR Explain : DNS and its advantages DNS is an internet service that translates domain names into IP addresses. Because domain names are alphabetic,

More information

Investigating . Tracing & Recovery

Investigating  . Tracing & Recovery Investigating Email Tracing & Recovery Overview Email has become a primary means of communication. Email can easily be forged. Email can be abused Spam Aid in committing a crime Threatening email, Email

More information

Postscreen for Zimbra

Postscreen for Zimbra Protecting Your Zimbra Collaboration Environment A Zimbra Collaboration Whitepaper Table of Contents MTA Boosts Email Security 3 How Does It Work? 4 Scenario without Postscreen 4 Scenario with Postscreen

More information

User Manual. Admin Report Kit for Exchange Server

User Manual. Admin Report Kit for Exchange Server User Manual Admin Report Kit for Exchange Server Table of Contents 1 About ARKES-Admin Report Kit for Exchange Server 1 1.1 System requirements 2 1.2 How to activate the software? 3 1.3 ARKES Reports Primer

More information

Additional laboratory

Additional laboratory Additional laboratory This is addicional laboratory session where you will get familiar with the working environment. Firstly, you will learn about the different servers present in the lab and how desktops

More information

Basics BUPT/QMUL

Basics BUPT/QMUL Email Basics BUPT/QMUL 2017-05-08 Agenda Brief introduction to email Components of email system Email Standards Summary 2 Brief Introduction To Email 3 What is Email? Electronic Mail (email, e-mail) Provides

More information

Answer to the written exam given on TDTS06 Computer networks, October 23,

Answer to the written exam given on TDTS06 Computer networks, October 23, Answer to the written exam given on TDTS06 Computer networks, October 23, 2009 --------------------------------------------------------------------- Answers provided by Juha Takkinen, IDA, juha.takkinen@liu.se.

More information

Applications FTP. FTP offers many facilities :

Applications FTP. FTP offers many facilities : Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol

More information

Filtering 7 April 2014

Filtering 7 April 2014 Email Filtering 2014 Fortinet Inc. All rights reserved. The information contained herein is subject to change without notice. No part of this publication including text, examples, diagrams 1 or illustrations

More information

Electronic Mail ( ) System

Electronic Mail ( ) System Chapter -1 Electronic Mail (E-Mail) System (M. Tariq Banday) Page (xxffi) conceal their tracks [1.15]. The IETF offers protocols that add security features to SMTP, but these have not been widely adopted.

More information

Application-layer Protocols and Internet Services

Application-layer Protocols and Internet Services Application-layer Protocols and Internet Services Computer Networks Lecture 8 http://goo.gl/pze5o8 Terminal Emulation 2 Purpose of Telnet Service Supports remote terminal connected via network connection

More information

Postfix Overview - Introduction

Postfix Overview - Introduction Postfix Overview - Introduction Page 1 of 1 Postfix Overview - Introduction Up one level Introduction Goals and features Global architecture Queue Management Security Postfix is the freeware project that

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

SMTP Mail. February 14, 2012 Lotus Mail Routing Team IBM Corporation

SMTP Mail. February 14, 2012 Lotus Mail Routing Team IBM Corporation SMTP Mail February 14, 2012 Lotus Mail Routing Team Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 SMTP: A Brief History SMTP (Simple Message Transfer Protocol) SMTP evolved and became a

More information

Lab 3.4.3: Services and Protocols

Lab 3.4.3:  Services and Protocols Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5

More information