Mail Protocol, Postfix and Mail security
|
|
- Louise Preston
- 6 years ago
- Views:
Transcription
1 Mail Protocol, Postfix and Mail security
2 How Appears to Works
3 How Really Works
4 Message Format Envelop Routing information for the "postman" Message Header Sender Recipients (simple, lists, copies, blind copies) Other fields of control (date, subject) Message Body Free text Structured document (i.e.: MIME)
5 Message Format From: GZ Kabir To: Diep Kong < > Cc: Moin < > Subject: How Internet mail works Hi Kong, I'm going to be running a course on... ü Format was originally defined by RFC 822 in 1982 ü Now superseded by RFC 2822 ü Message consists of ü Header lines ü A blank line ü Body lines
6 Message Format Embedded MUA uses inter-process call to send to MTA Freestanding MUA uses SMTP to send mail Headers added by the MUA before sending From: GZ Kabir To: Diep Kong < > Cc: Moin < > Subject: How Internet mail works Hi Kong, I'm going to be running a course on...
7 Headers added by MTAs Mail Delivery Agent (MDA) / Mail Transfer Agent (MTA) From: GZ Kabir <gzkabir@office.bdcom.com> To: Diep Kong < diepkong@gmail.com > Cc: Moin < moin@bofh.im > Subject: How Internet mail works..
8 A message in Transit A message is transmitted with an envelope: MAIL FROM:<gzkabir@office.bdcom.com> RCPT TO:<moin@bofh.im> The envelope is separate from the RFC 2822 message Envelope (RFC 2821) fields need not be the same as the header (RFC 2822) fields MTAs are (mainly) concerned with envelopes Just like the Post Office... Error ( bounce ) messages have null senders or Postmaster s MAIL FROM:<>
9 An SMTP Session telnet mail7i.protonmail.ch mail7i.protonmail.ch ESMTP Postfix... EHLO mail-pg0-f54.google.com 250- mail7i.protonmail.ch SIZE PIPELINING 250 HELP MAIL 250 OK RCPT 250 Accepted DATA 354 Enter message, ending with. (continued >>>>) Received: from... From:... To:... etc OK id=10spdr-00034h-00 quit 221 mail-pg0-f54.google.com closing conn... SMTP return codes 2xx OK 3xx send more data 4xx temporary failure 5xx permanent failure
10 DNS Resolution and Transfer Process To find the recipient's IP address and mailbox, the MTA must drill down through the DNS system, which consists of a set of servers distributed across the Internet beginning with the root name servers root servers refer requests for a given domain to the root nameservers that handle requests for that tld MTA can bypass this step because it has already knows which domain nameservers handle requests for these.tlds e.g. bofh.im asks the appropriate DNS server which Mail Exchange (MX) servers have knowledge of the subdomain or local host in the address DNS server responds with an MX record: a prioritized list of MX servers for this domain To the DNS server, the server that accepts messages is an MX server. When is transferring messages, it is called an MTA. MTA contacts the MX servers on the MX record in order of priority until it finds the designated host for that address domain sending MTA asks if the host accepts messages for the recipient's username at that domain (i.e., username@domain.tld) and transfers the message
11 Firewalls, Spam and Virus Filters An encountering a firewall may be tested by spam and virus filters before it is allowed to pass inside the firewall filters test to see if the message qualifies as spam or malware If the message contains malware, the file is usually quarantined and the sender is notified If the message is identified as spam, it will probably be deleted without notifying the sender.
12 Troubleshooting Issues transient failures If a transient error occurs, the MTA will hang onto the message, periodically retrying the delivery until it either succeeds or fails, or until the MTA decides that the transient issue is really a permanent condition. permanent failures If the MTA cannot deliver the message (it has received a fatal error message or failed to complete the transfer after repeated attempts), it bounces the message back to the sender. If the sender is a mailing list, the bounce may be handled by automated bounce-handling software.
13
14 Concept of Mail Protocols
15 Component of system Mail Transport Agent/Message Transfer Agent (MTA) Mail User Agent (MUA) Mail Delivery Agent(MDA)
16 MTA The actual mail transfer is done through message transfer agents (MTAs). To send mail, a system must have the client MTA, and to receive mail, a system must have a server MTA. The formal protocol that defines the MTA client and server in the Internet is called Simple Mail Transfer Protocol (SMTP) SMTP uses commands and responses to transfer mail between an MTA client and MTA server.
17 SMTP Mail transfer Flow
18 MTA connection setup
19 MTA Connection Setup..Contd.. Sender opens TCP connection with receiver Once connected, receiver identifies itself 220 service ready Sender identifies itself HELO <domain> Receiver accepts sender s identification 250OK If mail service not available, step 2 above becomes: 421 service not available
20 SMTP Exchange of command response pair
21 Message Transfer Sender may send one or more messages to receiver Each message transfer has the following phases: One MAIL command, identifies originator Gives reverse path to use for error reporting Receiver returns 250 OK or appropriate fail/error message One or more RCPT commands, identifies recipients for the message Each recipient identified by a separate RCPT Separate reply for each recipient (250 OK etc.) One DATA command transfers message text End of message indicated by line containing just period (.)
22 MTA connection termination
23 MTA connection termination Sender sends QUIT and waits for reply Then initiate TCP close operation Receiver initiates TCP close after sending reply to QUIT
24 Optimization If message is sent to multiple users on a given host,it is sent only once. Delivery to users handled by destination host If Multiple messages are ready for given host,a single TCP connection can be used. Saves overhead of setting up and termination of connection
25 Possible Errors Host unreachable Host out of operation TCP connection fail during transfer Faulty destination address User error Target user address has changed Redirect if possible Inform user if not Sender re-queue the mail - will retry till a configurable period of time
26 SMTP protocol reliability TCP connection is used to transfer mail from sender to receiver over TCP connection Attempts to provide reliable service No guarantee to recover lost messages No end-to-end ack to sender Error indication report not guaranteed
27 SMTP receiver Accepts arriving message Places in user mailbox or copies to outbound message queue for forwarding Receiver must verify local mail destination deal with errors Transmission Lack of disk space
28 SMTP status codes(dsn- Delivery status Notification) Leading digits Indicates catagories 2XX-Positive Completion Reply(Successful) 3XX-Positive Intermediate Reply(Redirection) 4XX-Transient negative completion reply(client error) 5XX-Permanent negative completion reply(server error)
29 SMTP status codes..cont.
30 Problems with SMTP No inherent security n Authentication n Encryption Only uses NVT (Network Virtual Terminal) 7- bit ASCII format
31 s can be forged.. HELO mail.rose.edu MAIL FROM: RCPT TO: DATA From: Dr. Art Zenner To: Professor Richards Subject: CIT 2243 Professor Richards, By department decree all students in your Introduction to Unix class are hereby to be granted automatic A s. Thank you, Dr. Art Zenner. QUIT
32 Extensions to SMTP MIME Multipurpose Internet Mail Extensions n Transforms non-ascii data to NVT (Network Virtual Terminal) ASCII data w w w w w Text Application Image Audio Video
33 MIME and Base64 Encoding If the internet is the information highway, then the path for is a narrow tunnel n Only very small vehicles can pass trough Then how do you send a big truck through a small ravine? n You have to break it down to smaller pieces and transport the pieces through the ravine, and reassemble the truck
34 MIME and Base64 Encoding The same happens when you send a file attachment via . This is known as encoding n the binary data (256 bits) is transformed to ASCII text (128 bits n allowing it to fit through the tunnel On the recipient's end, the data is decoded and the original file is rebuilt.
35 Mail Transfer Agents (MTA) MTAs do the actual mail transfers MTAs are not meant to be directly accessed by users. Other MTA s are: n n n n n n Postfix Qmail MS Exchange CC:Mail Lotus Notes.etc.
36 Problems with simple SMTP The first one relates to message length. Some older implementations cannot handle messages exceeding 64KB. Another problem relates to timeouts. If the Client and server have different timeouts, one of them may give up while the other is still busy, unexpectedly terminating the connection. Infinite mail storms can be triggered. For example, If host 1 holds mailing list A and host 2 holds mailing list B and each list contains an entry for the other one, then a message sent to either list could generate a never ending amount of traffic unless somebody checks for it.
37 ESMTP (RFC 2821) To get around the problems with simple SMTP, extended SMTP has been defined in RFC Clients wanting to use it should send an EHLO message instead of HELO initially. If this is rejected, then the server is a regular SMTP server, and the client should proceed in the usual way. If the EHLO is accepted, then new commands and parameters are allowed.
38 POP3 Mail access protocol: POST OFFICE PROTOCOL [RFC 1939] Simple and limited functionality,consists of client software and Server software, Server performs user authorization IMAP: Internet mail access protocol [Version 4]
39 POP3 Retrieves messages from a mail server Typically, messages are downloaded to your mail client, and deleted from the server Designed for use with dial-up connections when people were intermittently connected Listens on Port 110 (with Secure POP generally on port 995)
40 POP3 Connection Establishment
41 POP3 protocol session ~]# telnet mail.amberit.com.bd 110 Trying Connected to mail.amberit.com.bd. Escape character is '^]'. +OK Dovecot ready. user +OK pass letmein +OK Logged in. list +OK 1 messages: retr 1 +OK 482 octets <snip>message Headers</snip> This is my short message quit +OK Logging out.
42 Basic POP3 commands USER <name> - identifies the user PASS <password> - authentication for user STAT - lists all messages in the mailbox of user LIST <msg no.> - lists the content of a message RETR <msg no.> - retrieves a particular message DELE <msg no.> - Deletes a particular message NOOP RSET QUIT Replies +OK ERR
43 IMAP Protocol session ~]# telnet mail.amberit.com.bd 143 Trying Connected to mail.amberit.com.bd Escape character is '^]'. * OK Dovecot ready. A1 LOGIN user@testing.comletmein A1 OK Logged in. A2 SELECTInbox * FLAGS (\Answered \Flagged \Deleted \Seen \Draft) *
44 IMAP Protocol session..cont. OK [PERMANENTFLAGS (\Answered \Flagged \Deleted \Seen \Draft \*)] Flags permitted. * 1 EXISTS * 0 RECENT * OK [UIDVALIDITY ] UIDs valid * OK [UIDNEXT 2] Predicted next UID A2 OK [READ-WRITE] Select completed. A3 FETCH 1 BODY[HEADER] * 1 FETCH (BODY[HEADER] {454} <snip> Message Header Delivered</snip> A3 OK Fetch completed. A4 LOGOUT * BYE Logging out A4 OK Logout completed. Connection closed by foreign host.
45 Webmail
46 Webmail Webmail (or web-based ) is any client implemented as a web application running on a web server Online in nature IMAP connections mostly Secured HTTP (HTTPS) must Can be hosted, e.g.: RoundCube, SquirrelMail, Horde, Zimbra, Rainloop, Kite, MailPile,iRedMail, etc. Webmail Service providers : Gmail, Outlook, AOL, Yahoo, etc. Privacy and Security Concern Easy to configure, easy to host.
47 Common Threat Landscape Eavesdropping Spamming and Phishing Spoofing Malicious Attachments Replying and Forwarding Issues CC & BCC Issues
48
49 Postfix
50 Short History Originally developed in the late 90s at IBM by Wietse Venema, author of security software (SATAN, TCPwrappers,...), as IBM Secure Mailer Place under an Open Source license, and renamed Postfix Intended as a replacement for then insecure mail systems, such as Sendmail
51 Design Goals Safety Robustness Performance Modularity Compatibility
52 Safety Postfix makes it very hard to lose mails many checks to ensure that mail has been written to disk or delivered Back off mechanisms in case of repeated failure
53 Security Collection of daemons working together Doesn't use environment for communication Very paranoid about input checking, all allocation is dynamic (avoiding buffer overflows) chroot support out of the box for almost all processes & daemons No data is ever exchanged directly between processes all is done via IPC, and files on disk Conservative resource usage
54 Performance Designed to be fast from the ground up Also behaves well with neighbors, doesn't flood them with mail, and instead uses a throughput adaptation Will not block delivery for a message if one recipient domain fails
55 Modular One program, one function All programs controlled from master.cf Many small programs working together, with limited privileges Compatible with Sendmail's /etc/aliases and.forward conventions
56 Features Virtual domains domains and users are completely independent of system (UNIX) users Aliases sendmail compatible Rewriting senders, recipients, globally RBL support (Realtime Blackhole Lists) support Content filtering using pipes, SMTP or milter Support for arbitrary mail manipulation with policy services (custom programs talking to postfix)
57 More Features Restriction classes Conditional filtering Sender or recipient address verification (test addresses before accepting mail from them) TLS support
58 Core Concepts : maps In postfix, everything is looked up in a map (table) Maps can be in many formats or use many data sources: hash/btree regexp/pcre CIDR NIS LDAP, *SQL (user defined queries)
59 Architecture Architecture
60 Basic Postfix Configuration Two primary configuration files main.cf Main configuration file where all the subsystems are configured (smtp, smtpd, cleanup, routing,...) master.cf File controlling how the master process of postfix will launch all the necessary postfix daemons to perform mail routing, on-demand
61 Other Configuration Details Reside in maps mentioned earlier Tables containing values and conditions, referred to from main.cf, controlling all aspects such as: Virtual and local domains Routing rules Access control Rewriting...
62 Configuration: postconf command postconf used to view and edit configuration parameters For changing the configuration, it is usually done vi editing main.cf directly
63 Some Basic main.cf smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated defer_unauth_destination myhostname = group1.group01.net alias_maps = hash:/etc/aliases alias_database = hash:/etc/aliases myorigin = /etc/mailname mydestination = group1.group01.net, localhost.group01.net,, localhost relayhost = group1.group01.net mynetworks = / /24 [2001:df0:a:4::]/64 [::ffff: ]/104 [::1]/128 mailbox_size_limit = 0 recipient_delimiter = + inet_interfaces = all inet_protocols = all
64 # TLS parameters Some Basic main.cf smtpd_tls_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem smtpd_tls_key_file=/etc/ssl/private/ssl-cert-snakeoil.key smtpd_use_tls=yes smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
65 ## in the file /etc/mailname Some Basic main.cf group1.group01.net ## in the file /etc/aliases postmaster: root sysadm: apnic
66
. SMTP, POP, and IMAP
E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters
More informationElectronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur
Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple
More informationPostfix Mail Server. Kevin Chege ISOC
Postfix Mail Server Kevin Chege ISOC What is Postfix? Postfix is a free and open-sourcemail transfer agent (MTA) that routes and delivers electronic mail, intended as an alternative to the widely used
More informationInternet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol
More informationElectronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
More informationMail agents. Introduction to Internet Mail. Message format (1) Message format (2)
Introduction to Internet Mail Noah Sematimba Based on Materials by Philip Hazel. Mail agents MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
More informationNetwork Applications Electronic Mail
Network Applications Electronic Mail The OSI way to do this is specified in X.400 (84 & 88) Overall Architecture UA P3 UA MS P7 P1 MTS At the core of the X.400 Message Handling System (MHS) is the Message
More informationHow Internet Works
How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If
More informationCS 43: Computer Networks. 12: and SMTP September 28, 2018
CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s
More informationThis material is based on work supported by the National Science Foundation under Grant No
This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the
More informationanti-spam techniques beyond Bayesian filters
anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More informationInternet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University
More informationis still the most used Internet app. According to some studies around 85% of Internet users still use for communication.
1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a
More informationCiphermail Webmail Messenger Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login
More informationCIT 470: Advanced Network and System Administration. Topics. Mail Policies.
CIT 470: Advanced Network and System Administration E-mail CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Mail Policies 2. Anatomy of a Mail Message 3. Components of an E-mail System
More informationSMTP. George Porter CSE 124 February 12, 2015
SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,
More informationApplication: Electronic Mail
Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-
More informationThe Application Layer: & SMTP
The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,
More informationIntroduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents
Introduction to Internet Mail Philip Hazel University of Cambridge Computing Service MUA = Mail User Agent Mail agents Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Mulberry,
More informationSimple Network Management Protocol (SNMP)
Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed
More informationCSC 4900 Computer Networks:
CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols
More informationLecture 6: Application Layer Web proxies, , and SMTP
Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationFTP. FTP offers many facilities :
FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationSystem: Basic Functionality
E-mail System: Basic Functionality E-mail systems support five basic functions: Composition: Creating messages Transfer: Moving messages from the originator to the recipient E-mail transfer is a connection-oriented
More informationInternet Architecture
Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use
More informationFortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional
Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email
More informationCS348: Computer Networks (SMTP, POP3, IMAP4); FTP
CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange
More informationAppendix. Web Command Error Codes. Web Command Error Codes
Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting
More informationApplications & Application-Layer Protocols: FTP and (SMTP & POP)
COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their
More informationOverview. Electronic mail. History Format of . Sending . Retrieving . RFC 822, MIME, addresses SMTP, DNS. POP, IMAP, Web-based
Electronic Mail Electronic mail History Format of email Overview RFC 822, MIME, email addresses Sending email SMTP, DNS Retrieving email POP, IMAP, Web-based 2 Flashback to the 70s ARPANET just recently
More informationNetwork Services, VU 2.0
Network Services, VU 2.0 Email (SMTP, POP3, IMAP) News Dipl.-Ing. Johann Oberleiter Institute for Informationsystems, Distributed Systems Group Agenda Mail general info SMTP (Simple Mail Transfer Protocol)
More informationSynology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0
Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet
More informationApplication Inspection and Control for SMTP
Application Inspection and Control for SMTP First Published: July 11, 2008 Last Updated: July 11, 2008 The Application Inspection for SMTP feature provides an intense provisioning mechanism that can be
More informationCompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network
More informationESMTP Support for Cisco IOS Firewall
ESMTP Support for Cisco IOS Firewall Finding Feature Information ESMTP Support for Cisco IOS Firewall Last Updated: June 14, 2011 The ESMTP Support for Cisco IOS Firewall feature enhances the Cisco IOS
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationFig (1) sending and receiving s
Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and
More informationWhat is ? TCP/IP Standard Applications for Electronic Mail. Agenda. History
What is E-Mail? TCP/IP Standard Applications for Electronic Mail Email, SMTP, POP, IMAP, MIME E-Mail (or "email") is the most widely used Internet application Note: email was one of TCP/IP's keys to success:
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationHUL SOVANNAROTH PANG DA TIP SAROTH
HUL SOVANNAROTH PANG DA TIP SAROTH Contents I. Server C configuration (Debian)... 4 II. Server A configuration (CentOS)... 15 IP configuration on server A... 15 Webmail... 18 Configure DNS... 18 Install
More informationCCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers
CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers 2007, Jae-sul Lee. All rights reserved. 1 Agenda 11.1 TCP/IP Transport Layer 11.2 The Application Layer What does the TCP/IP transport layer
More informationThe Application Layer: SMTP, FTP
The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)
More informationCOSC 301 Network Management. Lecture 14: Electronic Mail
COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How
More informationElectronic Mail Paradigm
Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.
More informationUsing Centralized Security Reporting
This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the
More informationSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol What is SMTP? SMTP stands for Simple Mail Transfer Protocol. This protocol allows transmitting electronic mail over the Internet or any other network. The protocol itself
More informationSCS3004 Networking Technologies Application Layer Protocols
SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:
More informationElectronic Mail. Electronic Mailboxes
Electronic Mail E-mail belongs to the Application Layer Has been around since the early 80 s Enables new forms of interaction Fast Automatic processing (sorting, reply) Can carry other content Electronic
More information. indigoo.com INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R.
EMAIL INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET Peter R. Egli INDIGOO.COM 1/35 Contents 1. EMail Electronic Mail RFC821/RFC822 2. Email Elements 3. Email Message 4. Email Transfer with SMTP
More informationThe Application Layer
The Application Layer Subject Name: Fundamentals of Networking (FON) Subject Code: 640001 Domain Name System, Electronic Mail 21-Apr-12 Having finished all the preliminaries, we now come to the layer where
More informationInternet Technology 2/10/2016
Internet Technology 03r. Application layer protocols: email Email: (Simple Mail Transfer Protocol) Paul Krzyzanowski Rutgers University Spring 2016 1 2 Simple Mail Transfer Protocol () Protocol defined
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationLecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1
Lecture 25 Reminders: Homework 7 due today. Homework 8 posted. Due at the beginning of the last day of class for final exam review. Programming Project 6 posted. Final project worth double. Due by 4:30pm,
More informationDNS and SMTP. James Walden CIT 485: Advanced Cybersecurity. James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31
DNS and SMTP James Walden CIT 485: Advanced Cybersecurity James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31 Table of contents 1. DNS 2. DNS Protocol Packets 3. DNS Caching 4. DNS Cache Poisoning
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationSimple Network Management Protocol (SNMP)
Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed
More informationVersion SurfControl RiskFilter - Administrator's Guide
Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with
More informationPractical classes Lab5. Integration of global services in enterprise environments II:
Computer Engineering Degree Computer Engineering Year 2017/18 Practical classes Lab5 CSDA Unit III INTERNET Integration of global services in enterprise environments II: The INTERNET Deployment of a secure
More informationOutline. EEC-484/584 Computer Networks. Slow Start Algorithm. Internet Congestion Control Algorithm
EEC-484/584 Computer Networks Lecture 19 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline TCP slow start and congestion avoidance The
More informationAPPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.
APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.
More informationProtocols and Software. Nixu Ltd.
E-mail Protocols and Software Nixu Ltd. CONTENTS SMTP Interaction with DNS Sendmail IMAP and POP MIME Spam Nixu Ltd. 2/39 E-mail Protocols and Software History In the dawn of times (= before Internet)
More informationElectronic Mail (SMTP)
Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,
More informationComprehensive Setup Guide for TLS on ESA
Comprehensive Setup Guide for TLS on ESA Contents Introduction Prerequisites Requirements Components Used Background Information Functional Overview and Requirements Bring Your Own Certificate Update a
More informationUnderstanding the Pipeline
This chapter contains the following sections: Overview of the Email Pipeline, page 1 Email Pipeline Flows, page 2 Incoming / Receiving, page 4 Work Queue / Routing, page 6 Delivery, page 10 Overview of
More informationObjectives CINS/F1-01
Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.
More informationSymantec ST0-250 Exam
Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question
More informationBasics BUPT/QMUL
Email Basics BUPT/QMUL 2014-04-28 Agenda Brief introduction to email Components of email system Email Standards Summary 2 Brief Introduction To Email 3 What is Email? Electronic Mail (email, e-mail) Provides
More informationApplication Level Protocols
Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application
More informationElectronic mail, usually called , consists of simple text messages a piece of text sent to a recipient via the internet.
1 Electronic Mail Electronic mail, usually called e-mail, consists of simple text messages a piece of text sent to a recipient via the internet. E-mail Clients To read e-mail, we use an e-mail client,
More informationComputer Network 1 1
Computer Network 1 1 Chapter 10: Application Layer Advanced Principal Concepts Samples and Techniques Foundation Summary Question and Answer 2 Outline Application Layer There is a need for support protocols,
More informationAgenda. What is ? Brief Introduction To . History Of . Components Of System. Basics
Agenda Email Basics BUPT/QMUL 2012-04-09 Brief introduction to email Components of email system Email Standards Summary Refer to Chapter 27, textbook 2 Brief Introduction To Email 3 What is Email? Electronic
More informationWWW: the http protocol
Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC
More informationCN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.
CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server
More information13. Internet Applications 최양희서울대학교컴퓨터공학부
13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network
More informationNetworking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION
Networking Revision TCP/IP Protocol Stack & OSI reference model Basic Protocols TCP/IP Model 1 OSI (Open Systems Interconnection) Model main purpose to aid in clearer understanding of the functions and
More informationLinux Education. E mail
Linux Education E mail How E mail Works An e mail message passes through several steps from source to destination How E mail Works MUA mail user agent composes/reads mail MSA mail submission agent submits
More informationObjective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro
CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions
More informationWASP. SoftwareArt Corporation
WASP SoftwareArt Corporation WASP Mail Server [WASP] Introduction: WASP Mail Server is a complete email messaging solution designed for small to mid-sized businesses and is backed by the industry s best
More informationError Codes have 3 Digits
The top portion covers bounce back messages. The x.x.x The xxx Examples of real Error messages with an explaination. (the email client errors coming in the future) The 2nd half covers email connection
More informationElectronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol
SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail
More informationRequest for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track
Network Working Group J. Klensin Request for Comments: 5321 October 2008 Obsoletes: 2821 Updates: 1123 Category: Standards Track Status of This Memo Simple Mail Transfer Protocol This document specifies
More informationComputer Networking. Chapter #1. Dr. Abdulrhaman Alameer
Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among
More informationing With PHP History of Applications or Use
Emailing With PHP What is Email? E mail, short for electronic mail and often abbreviated to e mail, email or simply mail, is a store and forward method of composing, sending, receiving and storing messages
More information[Prof. Rupesh G Vaishnav] Page 1
Q-1 Explain DNS (Domain Name System) in detail with example. OR Explain : DNS and its advantages DNS is an internet service that translates domain names into IP addresses. Because domain names are alphabetic,
More informationInvestigating . Tracing & Recovery
Investigating Email Tracing & Recovery Overview Email has become a primary means of communication. Email can easily be forged. Email can be abused Spam Aid in committing a crime Threatening email, Email
More informationPostscreen for Zimbra
Protecting Your Zimbra Collaboration Environment A Zimbra Collaboration Whitepaper Table of Contents MTA Boosts Email Security 3 How Does It Work? 4 Scenario without Postscreen 4 Scenario with Postscreen
More informationUser Manual. Admin Report Kit for Exchange Server
User Manual Admin Report Kit for Exchange Server Table of Contents 1 About ARKES-Admin Report Kit for Exchange Server 1 1.1 System requirements 2 1.2 How to activate the software? 3 1.3 ARKES Reports Primer
More informationAdditional laboratory
Additional laboratory This is addicional laboratory session where you will get familiar with the working environment. Firstly, you will learn about the different servers present in the lab and how desktops
More informationBasics BUPT/QMUL
Email Basics BUPT/QMUL 2017-05-08 Agenda Brief introduction to email Components of email system Email Standards Summary 2 Brief Introduction To Email 3 What is Email? Electronic Mail (email, e-mail) Provides
More informationAnswer to the written exam given on TDTS06 Computer networks, October 23,
Answer to the written exam given on TDTS06 Computer networks, October 23, 2009 --------------------------------------------------------------------- Answers provided by Juha Takkinen, IDA, juha.takkinen@liu.se.
More informationApplications FTP. FTP offers many facilities :
Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol
More informationFiltering 7 April 2014
Email Filtering 2014 Fortinet Inc. All rights reserved. The information contained herein is subject to change without notice. No part of this publication including text, examples, diagrams 1 or illustrations
More informationElectronic Mail ( ) System
Chapter -1 Electronic Mail (E-Mail) System (M. Tariq Banday) Page (xxffi) conceal their tracks [1.15]. The IETF offers protocols that add security features to SMTP, but these have not been widely adopted.
More informationApplication-layer Protocols and Internet Services
Application-layer Protocols and Internet Services Computer Networks Lecture 8 http://goo.gl/pze5o8 Terminal Emulation 2 Purpose of Telnet Service Supports remote terminal connected via network connection
More informationPostfix Overview - Introduction
Postfix Overview - Introduction Page 1 of 1 Postfix Overview - Introduction Up one level Introduction Goals and features Global architecture Queue Management Security Postfix is the freeware project that
More informationAppliance Installation Guide
Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...
More informationSMTP Mail. February 14, 2012 Lotus Mail Routing Team IBM Corporation
SMTP Mail February 14, 2012 Lotus Mail Routing Team Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 SMTP: A Brief History SMTP (Simple Message Transfer Protocol) SMTP evolved and became a
More informationLab 3.4.3: Services and Protocols
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5
More information