Blackhole Documentation
|
|
- Domenic Sanders
- 6 years ago
- Views:
Transcription
1 Blackhole Documentation Release Kura April 30, 2013
2
3 CONTENTS 1 Using the blackhole.io service Testing via telnet Testing SSL Getting the source code 5 3 Running your own server Python versions Third party libraries Getting started Tests & Coverage Running tests manually Third party CI/Coverage Blackhole + PyPy 15 6 FAQ 17 7 Reference blackhole.connection blackhole.data blackhole.log blackhole.opts blackhole.ssl_utils blackhole.state blackhole.utils Indices and tables 23 Python Module Index 25 i
4 ii
5 Y8bod8P o888o Y888""8o Y8bod8P o888o o888o o888o o888o Y8bod8P o888o Y8bod8P Y8P o888o Y8b.o8 oooo oooo oooo oooo o8o " " 888oooo. 888.oooo..ooooo. 888 oooo 888.oo..ooooo. 888.ooooo. oooo.oo d88 88b 888 P )88b d88 "Y P 888P"Y88b d88 88b 888 d88 88b 888 d oP" ooo d8( o b o.o Blackhole is a Tornado powered MTA (mail transport agent) that is designed for handling large volumes of without handling any of the messages and doing no disk bound I/O. Blackhole is designed mostly for testing purposes and can be used to test numerous things suchs as; send rates, if you need to test how much mail you can send per minute, hour etc integration testing and finally if you work in the real world, chances are you ll need work on a copy of production data from time to time. You can try to anonymous all the data but there is always a chance you ll miss something. Configuring blackhole as your applications default SMTP gateway will remove any chance of a real person receiving an they shouldn t have received. CONTENTS 1
6 2 CONTENTS
7 CHAPTER ONE USING THE BLACKHOLE.IO SERVICE All data sent to blackhole.io will be forgotten instantly, we store nothing you send. 1. Point your application s outgoing SMTP server to blackhole.io, 2. Sit back and watch mail never get delivered to a real user. or, send an to blackhole.io using address, any address is fine e.g.: user1@blackhole.io 1.1 Testing via telnet $ telnet blackhole 25 Trying Connected to blackhole.io. Escape character is ^] OK, ready HELO fake.mail.server OK, done MAIL FROM:<user@address.tld> OK, done RCPT TO:<someone@another.tld> OK, done DATA Start mail input; end with <CRLF>.<CRLF> To: Someone <someone@another.tld> From: User <user@address.tld> Subject: Bye Bye bye OK, user not local, will forward QUIT Thank you for speaking to me Connection closed by foreign host. 1.2 Testing SSL 3
8 $ openssl s_client -connect blackhole.io:465 CONNECTED( ) depth=0 C = GB, ST = London, L = London, O = blackhole.io, OU = blackhole.io, CN = blackhole.io, emai... snip OK, ready HELO fake.mail.server OK, done MAIL FROM:<user@address.tld> OK, done RCPT TO:<someone@another.tld> OK, done DATA Start mail input; end with <CRLF>.<CRLF> To: Someone <someone@another.tld> From: User <user@address.tld> Subject: Bye Bye bye OK, user not local, will forward QUIT Thank you for speaking to me DONE 4 Chapter 1. Using the blackhole.io service
9 CHAPTER TWO GETTING THE SOURCE CODE The source code is available under the MIT license from GitHub. 5
10 6 Chapter 2. Getting the source code
11 CHAPTER THREE RUNNING YOUR OWN SERVER 3.1 Python versions Python 2.6 Python 2.7 Python 3.2 Python 3.3 PyPy 1.9 PyPy 2.0 # see notes below # see notes below Blackhole works on Python 2.6 and 2.7, it also works with PyPy (see Blackhole + PyPy section below). 3.2 Third party libraries tornado>=2.2.1,<=3.1 setproctitle>=1.1.6 deiman>=0.1.4 # setproctitle and above are required for all PyPy versions # older version of Deiman will not work because of API changes 3.3 Getting started Installation Packaged From PyPI pip install blackhole Or easy_install blackhole From GitHub pip install -e git+git://github.com/kura/blackhole.git#egg=blackhole 7
12 From source Download the latest tarball from PyPI or GitHub. Unpack and run: python setup.py install Configuration options Configuration options can be passed via the command line as below: SSL options --workers=num Number of child workers to spawn (default: # of CPUs/cores + 1 master) --host=ip IP address to bind go (default: ) --port=port Port to listen for connections on (default: 25) --pid=file --log=file --user=user --group=group --mode=mode --debug=bool --ssl=bool File to write process information to (default: /tmp/blackhole.pid) File to write logs to (not very verbose) (default: /tmp/blackhole.log) User to drop privs to during run time. (default: blackhole) Group to drop privs to during run time. (default: blackhole) Mode to run blackhole in (accept, bounce, random, unavailable, offline) (default: accept) - see Modes section Will set the debug flag and causes all received and sent command/ data to be logged. Will degrade performance with high throughput (default: False) Enabled or disable SSL, requires SSL compiled in to Python and OpenSSL. True or False (default: True) --ssl_port=port Port to listen for SSL enabled connections (default: 465) --ssl_key=path --ssl_cert=path X509 SSL keyfile X509 SSL certificate file You can also specify the conf option to load configuration from a file: --conf=file Config file to parse and use. Overrides command line args For more information on the configuration file format read Configuration file example. Deprecated options The following options are deprecated and should not be used. --ssl_ca_certs_dir=path Path to your operating system s repository of certificates authorities (default: None) Configuration file example 8 Chapter 3. Running your own server
13 host=" " port=25 pid="/tmp/blackhole.io" mode="offline" ssl_key=/etc/ssl/private/blackhole.io.key ssl_cert=/etc/ssl/certs/blackhole.io.crt Debug Flag After much debate and several s from developers a debug flag has been added to blackhole. You can enable debug using command line options Configuration options or via the configuration file Configuration file example. Enabling the debug flag will log all incoming and outgoing commands to the blackhole log file as well as all data sent after a DATA command. Each connection/ gets it s own unique identifier, this indentifier uses only hexidecimal characters and is 10 character in length, which means at some point the identifier will be reused. Example debug output :30:30,788 - Connection from :30:31,813 - [9AF260AB7F] RECV: HELO :30:31,814 - [9AF260AB7F] SEND: OK, done :30:35,074 - [9AF260AB7F] RECV: MAIL FROM:<1@1.com> :30:35,075 - [9AF260AB7F] SEND: OK, done :30:38,402 - [9AF260AB7F] RECV: RCPT TO:<2@2.com> :30:38,402 - [9AF260AB7F] SEND: OK, done :30:40,573 - [9AF260AB7F] RECV: DATA :30:40,573 - [9AF260AB7F] SEND: Start mail input; end with <CRLF>.<CRLF> :30:47,143 - [9AF260AB7F] RECV: From: <1@1.com> :30:52,181 - [9AF260AB7F] RECV: To: <2@2.com> :30:54,647 - [9AF260AB7F] RECV: Subject: Testing debug :30:56,550 - [9AF260AB7F] RECV: Hi 2@2.com :30:57,372 - [9AF260AB7F] RECV: This is a debug message :30:58,286 - [9AF260AB7F] RECV: :30:58,287 - [9AF260AB7F] SEND: OK, done :31:04,023 - [9AF260AB7F] RECV: QUIT :31:04,024 - [9AF260AB7F] SEND: Thank you for speaking to me :31:04,024 - Closing Controlling the server The following commands are for use when using blackhole without an init script. blackhole start Starts the server blackhole stop Stops the server blackhole restart Restarts the server blackhole status Shows the status of the server, running, not running etc For more information on controlling the server using init.d/rc.d read Controlling the server with init.d/rc.d Getting started 9
14 3.3.6 Controlling the server with init.d/rc.d /etc/init.d/blackhole start /etc/init.d/blackhole stop /etc/init.d/blackhole restart /etc/init.d/blackhole status Starts the server Stops the server Restarts the server Shows the status of the server, running, not running etc Installating the init.d/rc.d scripts The init script depends on /etc/blackhole.conf being in place and configured. Blackhole comes with a script that works with init.d/rc.d, to install it copy it from the init.d/your_distro folder in the root directory of this project to /etc/init.d/. The init scripts can be found here. i.e. for Debian/Ubuntu users, mv the file from init.d/debian-ubuntu/ to /etc/init.d/. Then make sure it s executable: chmod +x /etc/init.d/blackhole To make blackhole start on a reboot use the following: update-rc.d blackhole defaults Modes The server can run in several different modes, these are outlined below. See the Response codes section for more information on responses and which mode responds with which codes accept Accept all with code 250, 251, 252 or bounce Bounce all with a random code, excluding 250, 251, 252, random Randomly accept or bounce all with a random code unavailable Server always respondes with code service is unavailable offline Server always responds with code server does not accept mail. 10 Chapter 3. Running your own server
15 Response codes All Code message 220 OK, ready 221 Thank you for speaking to me 250 OK, done 251 OK, user not local, will forward 252 OK, cannot VRFY user but will attempt delivery 253 OK, messages pending 354 Start mail input; end with <CRLF>.<CRLF> 355 Octet-offset is the transaction offset 421 Service not available, closing transmission channel 450 Requested mail action not taken: mailbox unavailable 451 Requested action aborted: local error in processing 452 Requested action not taken: insufficient system storage 454 TLS not available due to temporary reason 458 Unable to queue message 459 Not allowed: unknown reason 500 Command not recognized 501 Syntax error, no parameters allowed 502 Command not implemented 503 Bad sequence of commands 504 Command parameter not implemented 521 Machine does not accept mail 530 Must issue a STARTTLS command first 534 Authentication mechanism is too weak 538 Encryption required for requested authentication mechanism 550 Requested action not taken: mailbox unavailable 551 User not local 552 Requested mail action aborted: exceeded storage allocation 553 Requested action not taken: mailbox name not allowed 554 Transaction failed 571 Blocked Accept This mode will respond with the following codes: Codes Bounce This mode will respond with the following codes: Codes Getting started 11
16 Offline This mode will respond with the following codes: Codes 521 Unavailable This mode will respond with the following codes: Codes Chapter 3. Running your own server
17 CHAPTER FOUR TESTS & COVERAGE 4.1 Running tests manually Running tests manually is pretty simple, there is a Make target dedicated to it. The test suite relies on unittest2 and nose, both if which get installed by the Make target during test running. make tests There is also a Make target for generating coverage: make coverage 4.2 Third party CI/Coverage You can find the latest build status on travis. And the test coverage report on coveralls. 13
18 14 Chapter 4. Tests & Coverage
19 CHAPTER FIVE BLACKHOLE + PYPY PyPy is a Python interpreter and just-in-time compiler. PyPy focuses on speed, efficiency and compatibility with the original CPython interpreter. Blackhole works well under PyPy 1.9, 2.0 beta1 and 2.0 beta2, you can see performance improvements of up to 30% in certain situations. However, blackhole does have issues with both PyPy 1.9 and 2.0 beta1 and 2.0 beta2 when using the pre-compiled binaries, this is due to a conflict in the version of OpenSSL compiled in to PyPy and the version compiled in to your CPython installation. If you wish to use blackhole with SSL support on PyPy I suggest you either compile PyPy yourself or try to make sure your PyPy and CPython have the same versions. 15
20 16 Chapter 5. Blackhole + PyPy
21 CHAPTER SIX FAQ A few people have ed me questions about why blackhole exists, how I use it, why Tornado and things like that so I have outlined some questions and responses in an faq. 17
22 18 Chapter 6. FAQ
23 CHAPTER SEVEN REFERENCE 7.1 blackhole.connection Provide mechanisms for processing socket data. This module provides methods for Blackhole to use internally for binding and listening on sockets as well as process all incoming socket data and responding appropriately blackhole.connection blackhole.connection.sockets() Spawn a looper which loops over socket data and creates the sockets. It should only ever loop over a maximum of two - standard (std) and SSL (ssl). This way we re able to detect incoming connection vectors and handle them accordingly. A dictionary of sockets is then returned to later be added to the IOLoop. blackhole.connection.connection_stream(connection) Detect which socket the connection is being made on, create and iostream for the connection, wrapping it in SSL if connected over the SSL socket. The parameter connection is an instance of socket from stdlib. blackhole.connection.handle_command(line, mail_state) Handle each SMTP command as it s sent to the server mail_state is an instance of black- The paramater line is the currently stream of data ending in n. hole.state.mailstate. blackhole.connection.connection_ready(sock, fd, events) Accepts the socket connections and passes them off to be handled. sock is an instance of socket. fd is an open file descriptor for the current connection. events is an integer of the number of events on the socket. blackhole.connection.write_response(stream, mail_state, resp) Write the response back to the stream 7.2 blackhole.data Provides SMTP response codes and methods for returning the correct response code. 19
24 This module contains all usable SMTP response codes for returning through the socket. It also provides mechanisms for picking response codes that mean a mail message has been accepted, rejected or that the server is offline blackhole.data blackhole.data.response(response) Return an SMTP response code and message. response an string refering to the code you wish to return. blackhole.data.get_response() Get our response from available responses based on configuration settings. blackhole.data.random_choice(response_list) Pick a random choice for the configured choices dictionary. response_list is a list of available response types from blackhole.data, this can be: - AC- CEPT_RESPONSES - BOUCNE_RESPONSES - OFFLINE_RESPONSES - UNAVAILABLE_RESPONSES - RANDOM_RESPONSES blackhole.data.response_message(response) Format our response in ESMTP format. response is a string containing the reponse code you wish to return. 7.3 blackhole.log Logging configuration for the blackhole server. 7.4 blackhole.opts Command line options for the blackhole server. Also creates a list of available ports for the server to be run on, based on configuration and responds with the help menu when requested or invalid options are given blackhole.opts blackhole.opts.ports() Create and return a list of sockets we need to create. A maximum of two will be returned, default is standard (std) and SSL (ssl) it is enabled. blackhole.opts.print_help(file) Prints all the command line options to stdout. 7.5 blackhole.ssl_utils Utility functions for SSL wrapped sockets. This module provides a simple default SSL configuration for the blackhole server and also exposes a custom BlackholeSSLException for SSL-based exceptions. 20 Chapter 7. Reference
25 7.5.1 blackhole.ssl_utils exception blackhole.ssl_utils.blackholesslexception A simple Exception class blackhole.ssl_utils.verify_ssl_opts() Verify our SSL configuration variables are correctly set-up. 7.6 blackhole.state State object for the current connection blackhole.state class blackhole.state.mailstate A state object used for remembering the current connections place in our runtime. This is mostly used for figuring out if we re receiving SMTP commands or have trigger the DATA command. _id ID is used to assign commands sent and received against an /connection ID. Only utilized when debug flag is set. reading MailState s reading property, used for figuring out where we are in the state chain. 7.7 blackhole.utils A utility module used for methods and features that do not belong in their own module blackhole.utils blackhole.utils.setgid() Change our existing group. Used to drop from root privileges down to a less privileged group. MUST be called BEFORE setuid, not after. blackhole.utils.setuid() Change our existing user. Used to drop from root privileges down to a less privileged user MUST be called AFTER setgid, not before. blackhole.utils.terminate(signum, frame) Terminate the parent process and send signals to shut down it s children Iterates over the child pids in the frame and sends the SIGTERM signal to shut them down. blackhole.utils.set_process_title() Set the title of the process. If the process is the master, set a master title, otherwise set worker blackhole.state 21
26 blackhole.utils. _id() Generate an HEX ID to assign to each connection. Will be reused later down the line due to the limited number of characters. 22 Chapter 7. Reference
27 CHAPTER EIGHT INDICES AND TABLES genindex modindex search 23
28 24 Chapter 8. Indices and tables
29 PYTHON MODULE INDEX b blackhole.connection (Unix), 19 blackhole.data (Unix), 19 blackhole.log (Unix), 20 blackhole.opts (Unix), 20 blackhole.ssl_utils (Unix), 20 blackhole.state (Unix), 21 blackhole.utils (Unix), 21 25
Appendix. Web Command Error Codes. Web Command Error Codes
Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting
More informationError Codes have 3 Digits
The top portion covers bounce back messages. The x.x.x The xxx Examples of real Error messages with an explaination. (the email client errors coming in the future) The 2nd half covers email connection
More informationsimplevisor Documentation
simplevisor Documentation Release 1.2 Massimo Paladin June 27, 2016 Contents 1 Main Features 1 2 Installation 3 3 Configuration 5 4 simplevisor command 9 5 simplevisor-control command 13 6 Supervisor
More informationECOM100 Send (EC ) Theory of Operation. Table of Contents
Table of Contents Table of Contents...1 1. CPU Firmware...2 2. ECOM100 Firmware Must Support SMTP Client Protocol...2 3. Slot Placement...2 4. ECOM100 TCP/IP Configuration...2 5. Dipswitch 7 on the ECOM100
More informationCiphermail Webmail Messenger Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login
More informationturbo-hipster Documentation
turbo-hipster Documentation Release 0.1 Joshua Hesketh October 07, 2015 Contents 1 Turbo-hipster 3 1.1 Turbo-hipster and Zuul.......................................... 3 1.2 Typical workflow diagram........................................
More informationAnswer to the written exam given on TDTS06 Computer networks, October 23,
Answer to the written exam given on TDTS06 Computer networks, October 23, 2009 --------------------------------------------------------------------- Answers provided by Juha Takkinen, IDA, juha.takkinen@liu.se.
More informationException Codes and Module Numbers Used in Cisco Unified MeetingPlace Express
CHAPTER 4 and Module Numbers Used in Cisco Unified MeetingPlace Express This chapter contains information about the exception codes used in the Cisco Unified MeetingPlace Express system. After reviewing
More informationbottle-rest Release 0.5.0
bottle-rest Release 0.5.0 February 18, 2017 Contents 1 API documentation 3 1.1 bottle_rest submodule.......................................... 3 2 What is it 5 2.1 REST in bottle..............................................
More informationRemote Exploit. compass-security.com 1
Remote Exploit compass-security.com 1 Content Intel Architecture Memory Layout C Arrays Buffer Overflow BoF Exploit Assembler Shellcode Function Calls Debugging Remote Exploit Exploit Mitigations Defeat
More informationhelper Documentation Release Gavin M. Roy
helper Documentation Release 2.1.0 Gavin M. Roy September 24, 2013 CONTENTS i ii helper is a command-line/daemon application wrapper package with the aim of creating a consistent and fast way to creating
More information21.1 FTP. Connections
21.1 FTP File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying a file from one host to another. Although transferring files from one system to another seems simple and straightforward,
More informationThe Application Layer: & SMTP
The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,
More informationI hate money. Release 1.0
I hate money Release 1.0 Nov 01, 2017 Contents 1 Table of content 3 2 Indices and tables 15 i ii «I hate money» is a web application made to ease shared budget management. It keeps track of who bought
More informationHow do I configure my LPL client to use SSL for incoming mail?
How do I configure my LPL email client to use SSL for incoming mail? When you begin using your modern graphical email client program (e.g., Thunderbird, Mac Mail, Outlook), it will present a series of
More informationElectronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur
Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple
More informationOutline. What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack
Attacks on TCP Outline What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack TCP Protocol Transmission Control Protocol (TCP) is a core protocol
More informationpolib Documentation Release David Jean Louis
polib Documentation Release 1.0.6 David Jean Louis January 04, 2015 Contents 1 Quick start guide 3 1.1 Installing polib.............................................. 3 1.2 Some basics
More informationRemote Exploit. Compass Security Schweiz AG Werkstrasse 20 Postfach 2038 CH-8645 Jona
Remote Exploit Compass Security Schweiz AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 team@csnc.ch www.csnc.ch Content Intel Architecture Memory Layout C Arrays
More informationBitnami OSQA for Huawei Enterprise Cloud
Bitnami OSQA for Huawei Enterprise Cloud Description OSQA is a question and answer system that helps manage and grow online communities similar to Stack Overflow. First steps with the Bitnami OSQA Stack
More informationMcAfee Gateway Appliance Patch 7.5.3
Release Notes McAfee Email Gateway Appliance Patch 7.5.3 Contents About this release Resolved issues Installation - incremental package Installation - full images Known issues Find product documentation
More informationESMTP Support for Cisco IOS Firewall
ESMTP Support for Cisco IOS Firewall Finding Feature Information ESMTP Support for Cisco IOS Firewall Last Updated: June 14, 2011 The ESMTP Support for Cisco IOS Firewall feature enhances the Cisco IOS
More informationPeer to Peer Instant Messaging
Peer to Peer Instant Messaging Assignment in Computer Networks I, Department of Information Technology, Uppsala University. Overview In this assignment you will implement an instant messaging system that
More informationCreating and Managing a Content Server Cluster
CHAPTER 10 This chapter describes the main features, system requirements, setup, and management of a Cisco TelePresence Content Server (TCS) cluster. To a user, a Content Server Cluster behaves exactly
More informationSystem Configuration
CHAPTER 2 This chapter provides information about how to use the Setup program to configure your host system for Cisco Configuration Engine, 2.0. Running Setup System configuration for Cisco Configuration
More informationMetasploit. Installation Guide Release 4.4
Metasploit Installation Guide Release 4.4 TABLE OF CONTENTS About this Guide Target Audience...1 Organization...1 Document Conventions...1 Support...2 Support for Metasploit Pro and Metasploit Express...2
More informationTroubleshooting SMTP Routing. Chris Miller Director of Messaging/Collab Connectria
Troubleshooting SMTP Routing Chris Miller Director of Messaging/Collab Connectria What We ll Cover Following the breadcrumbs in the forest Planning to be an archeologist Running relay races, jumping hurdles
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure
More informationBitnami ProcessMaker Community Edition for Huawei Enterprise Cloud
Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud Description ProcessMaker is an easy-to-use, open source workflow automation and Business Process Management platform, designed so Business
More informationContents: 1 Basic socket interfaces 3. 2 Servers 7. 3 Launching and Controlling Processes 9. 4 Daemonizing Command Line Programs 11
nclib Documentation Release 0.7.0 rhelmot Apr 19, 2018 Contents: 1 Basic socket interfaces 3 2 Servers 7 3 Launching and Controlling Processes 9 4 Daemonizing Command Line Programs 11 5 Indices and tables
More informationGoCD Python API client Documentation
GoCD Python API client Documentation Release 1.0.1 Grigory Chernyshev Dec 08, 2017 Contents 1 Intro 1 2 Contents: 3 2.1 Yet another GoCD python client..................................... 3 2.2 Usage...................................................
More informationJupyterHub Documentation
JupyterHub Documentation Release 0.4.0.dev Project Jupyter team January 30, 2016 User Documentation 1 Getting started with JupyterHub 3 2 Further reading 11 3 How JupyterHub works 13 4 Writing a custom
More informationCIS 505: Software Systems
CIS 505: Software Systems Spring 2018 Assignment 2: Email servers MS1 due February 16, 2018, at 10:00pm EST MS2+3 due March 1, 2018, at 10:00pm EST 1 Overview For this assignment, you will build two simple
More informationBitnami Pimcore for Huawei Enterprise Cloud
Bitnami Pimcore for Huawei Enterprise Cloud Description Pimcore is the open source platform for managing digital experiences. It is the consolidated platform for web content management, product information
More informationCHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS ANSWERS TO PROBLEMS
CHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS 22.1 RFC 821 defines SMTP which is the protocol for exchanging email messages. RFC 822 describes the format of those messages. 22.2 The Simple Mail
More informationUser Manual. Admin Report Kit for IIS 7 (ARKIIS)
User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...
More informationUranium Documentation
Uranium Documentation Release 0.1 Yusuke Tsutsumi Jul 26, 2018 Contents 1 What is Uranium? 1 1.1 Installation................................................ 2 1.2 Tutorial..................................................
More informationTangeloHub Documentation
TangeloHub Documentation Release None Kitware, Inc. September 21, 2015 Contents 1 User s Guide 3 1.1 Managing Data.............................................. 3 1.2 Running an Analysis...........................................
More informationSCS3004 Networking Technologies Application Layer Protocols
SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:
More informationContents. Error Message Descriptions... 7
2 Contents Error Message Descriptions.................................. 7 3 4 About This Manual This Unify DataServer: Error Messages manual lists the errors that can be produced by the Unify DataServer
More informationExim Practical. Patrick Okui. (based on materials from Brian Candler)
Exim Practical Patrick Okui (based on materials from Brian Candler) Objectives Part 1 is building and installing Exim.. Install Exim from ports. Replace Sendmail with Exim Part 2 is running basic tests.
More informationLab 1: Creating Secure Architectures (Revision)
Lab 1: Creating Secure Architectures (Revision) A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For
More informationP2P Programming Assignment
P2P Programming Assignment Overview This project is to implement a Peer-to-Peer (P2P) networking project similar to a simplified Napster. You will provide a centralized server to handle cataloging the
More informationVREDPro HPC Raytracing Cluster
1 HPC Raytracing Cluster... 1 1.1 Introduction... 1 1.2 Configuration... 2 1.2.1 Cluster Options... 4 1.2.2 Network Options... 5 1.2.3 Render Node Options... 6 1.2.4 Preferences... 6 1.2.5 Starting the
More informationConfire Documentation
Confire Documentation Release 0.2.0 Benjamin Bengfort December 10, 2016 Contents 1 Features 3 2 Setup 5 3 Example Usage 7 4 Next Topics 9 5 About 17 Python Module Index 19 i ii Confire is a simple but
More informationfeed2toot Documentation
feed2toot Documentation Release 0.10 Carl Chenet Oct 15, 2018 Contents 1 Guide 3 1.1 How to install Feed2toot......................................... 3 1.2 Configure Feed2toot...........................................
More informationCSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.0) Network Programming using C
CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.0) Network Programming using C Overview This homework is due by 11:59:59 PM on Thursday, April 26, 2018.
More informationSilk Performance Manager Installation and Setup Help
Silk Performance Manager 18.5 Installation and Setup Help Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright 2004-2017 Micro Focus. All rights reserved.
More informationyagmail Documentation
yagmail Documentation Release 0.10.189 kootenpv Feb 08, 2018 Contents 1 API Reference 3 1.1 Authentication.............................................. 3 1.2 SMTP Client...............................................
More informationSymantec ST0-250 Exam
Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question
More informationtreacle Documentation
treacle Documentation Release 0.1.2 Caramel April 02, 2014 Contents 1 Installing treacle 3 1.1 Installing stable version with pip.................................... 3 1.2 Installing development version
More informationAppliance Installation Guide
Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...
More informationBitnami Dolibarr for Huawei Enterprise Cloud
Bitnami Dolibarr for Huawei Enterprise Cloud Description Dolibarr is an open source, free software package for small and medium companies, foundations or freelancers. It includes different features for
More informationyardstick Documentation
yardstick Documentation Release 0.1.0 Kenny Freeman December 30, 2015 Contents 1 yardstick 3 1.1 What is yardstick?............................................ 3 1.2 Features..................................................
More informationNI-XNET Python API Documentation
NI-XNET Python API Documentation Release 0.3.0 National Instruments Oct 08, 2018 Table of Contents: 1 Quick Start 3 2 Resources 5 2.1 Product Support............................................. 5 2.2
More informationWindows 2000 / XP / Vista User Guide
Windows 2000 / XP / Vista User Guide Version 5.5.1.0 September 2008 Backup Island v5.5 Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.
More informationLab 2: Creating Secure Architectures
Lab 2: Creating Secure Architectures A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For this you will
More informationCS 43: Computer Networks. 12: and SMTP September 28, 2018
CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s
More informationCisco Encryption
This chapter contains the following sections: Overview of, page 1 How to Encrypt Messages with a Local Key Server, page 2 Encrypting Messages using the Email Security Appliance, page 3 Determining Which
More informationedeposit.amqp.antivirus Release 1.0.1
edeposit.amqp.antivirus Release 1.0.1 February 05, 2015 Contents 1 Installation 3 1.1 Initialization............................................... 3 2 Usage 5 3 Content 7 3.1 Standalone script.............................................
More informationBitnami Tiny Tiny RSS for Huawei Enterprise Cloud
Bitnami Tiny Tiny RSS for Huawei Enterprise Cloud Description Tiny Tiny RSS is an open source web-based news feed (RSS/Atom) reader and aggregator, designed to allow you to read news from any location,
More informationAdvanced option settings on the command line. Set the interface and ports for the OpenVPN daemons
Advanced option settings on the command line docs.openvpn.net/command-line/advanced-option-settings-on-the-command-line Set the interface and ports for the OpenVPN daemons In the Admin UI under Server
More informationAPPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.
APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.
More informationAnonymous Call Rejection
Contents Anonymous Call Rejection 4 Call Block 5 Call Forward 6-7 Call Return 8 Call Waiting 9 Caller ID 10-11 Do Not Disturb 12 Find Me 13 Selective Call Forwarding 14 Speed Dial 15 Three-Way Calling
More informationHeader Status Codes Cheat Sheet
Header Status Codes Cheat Sheet Thanks for downloading our header status codes cheat sheet! Below you ll find all the header status codes and their meanings. They are organized by sections, starting with
More informationStatus Node Reference
IceWarp Unified Communications Status Node Reference Version 10.4 Printed on 23 February, 2012 Contents Status 1 Message Queue... 2 Spam Queues... 3 Quarantine... 3 Whitelist... 4 BlackList... 5 Greylisting...
More informationFile Download Utility User s Guide
ScreenKey Consoles for the IBM 46xx File Download Utility User s Guide Version 3.20 Issue 1.2 March, 2006 Purpose The purpose of this document is to provide instructions on how to install and use the SK-7510
More informationSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol What is SMTP? SMTP stands for Simple Mail Transfer Protocol. This protocol allows transmitting electronic mail over the Internet or any other network. The protocol itself
More informationLDAP Queries. Overview of LDAP Queries. This chapter contains the following sections:
This chapter contains the following sections: Overview of, page 1 Working with, page 11 Using Acceptance Queries For Recipient Validation, page 18 Using Routing Queries to Send Mail to Multiple Target
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2014 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #1 Starts in one week Is your Linux environment all ready? Bring your laptop Work time after quick
More informationMigration from Citrix. White Paper Parallels Remote Application Server
Migration from Citrix White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Why Should You Migrate from Citrix to Parallels RAS?... 3 Migrating from Citrix to Parallels RAS...
More informationThe Applications and Gaming Tab - Port Range Forward
The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized
More information52 Remote Target. Simulation. Chapter
Chapter 52 Remote Target Simulation This chapter describes how to run a simulator on a target and connect it to the SDL simulator interface (SimUI) on the host via TCP/IP communication. July 2003 Telelogic
More informationPulp Python Support Documentation
Pulp Python Support Documentation Release 1.0.1 Pulp Project October 20, 2015 Contents 1 Release Notes 3 1.1 1.0 Release Notes............................................ 3 2 Administrator Documentation
More informationInternet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol
More informationBitnami Re:dash for Huawei Enterprise Cloud
Bitnami Re:dash for Huawei Enterprise Cloud Description Re:dash is an open source data visualization and collaboration tool. It was designed to allow fast and easy access to billions of records in all
More informationECE697AA Lecture 2. Today s lecture
ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo
More informationSome Ubuntu Practice...
Some Ubuntu Practice... SANOG 10 August 29 New Delhi, India 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control services
More informationBitnami Mantis for Huawei Enterprise Cloud
Bitnami Mantis for Huawei Enterprise Cloud Description Mantis is a complete bug-tracking system that includes role-based access controls, changelog support, built-in reporting and more. A mobile client
More informationMigrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server
Parallels Remote Application Server Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server Contents 1. Introduction a. Why Should You Migrate from Citrix to Parallels RAS b. Overview
More informationDNS and SMTP. James Walden CIT 485: Advanced Cybersecurity. James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31
DNS and SMTP James Walden CIT 485: Advanced Cybersecurity James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31 Table of contents 1. DNS 2. DNS Protocol Packets 3. DNS Caching 4. DNS Cache Poisoning
More informationErlangen API Documentation
Erlangen API Documentation Max Rottenkolber Monday, 20 November 2017 Table of Contents 1 erlangen (Package) 1 1.1 *agent-debug* (Variable).................... 1 1.2 *default-mailbox-size* (Variable)...............
More informationIntegrating Beamr Video Into a Video Encoding Workflow By: Jan Ozer
Integrating Beamr Video Into a Video Encoding Workflow By: Jan Ozer Beamr Video is a perceptual video optimizer that significantly reduces the bitrate of video streams without compromising quality, enabling
More informationOptimal Performance and Installation Guide
Outlook Connector for MDaemon How To Quick Start Guide Optimal Performance and Installation Guide This guide provides information on how to get the optimal performance from Outlook Connector, how to install
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More informationPrivileged Remote Access Appliance Interface (/appliance)
Privileged Remote Access Appliance Interface (/appliance) 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property
More informationdjango-sticky-uploads Documentation
django-sticky-uploads Documentation Release 0.2.0 Caktus Consulting Group October 26, 2014 Contents 1 Requirements/Installing 3 2 Browser Support 5 3 Documentation 7 4 Running the Tests 9 5 License 11
More information2016. All rights reserved. ecconnect V.11 User Guide
2016. All rights reserved. ecconnect V.11 User Guide Copyright and trademarks ecconnect User Guide Copyright and trademarks The information in this document is subject to change without notice. This document
More informationBitnami Piwik for Huawei Enterprise Cloud
Bitnami Piwik for Huawei Enterprise Cloud Description Piwik is a real time web analytics software program. It provides detailed reports on website visitors: the search engines and keywords they used, the
More informationBitnami OroCRM for Huawei Enterprise Cloud
Bitnami OroCRM for Huawei Enterprise Cloud Description OroCRM is a flexible open-source CRM application. OroCRM supports your business no matter the vertical. If you are a traditional B2B company, franchise,
More informationVersion 1.1 March 22, Secure Installation and Operation of Your WorkCentre 4250/4260
Version 1.1 March 22, 2010 Secure Installation and Operation of Your WorkCentre 4250/4260 Secure Installation and Operation of Your WorkCentre 4250/4260 Purpose and Audience This document provides information
More informationAdmin Guide ( Unix System Administration )
Admin Guide ( Unix System Administration ) ProFTPD Server Configuration ProFTPD is a secure and configurable FTP server, written for use on Unix and Unix-like operating systems. ProFTPD is modeled around
More informationFtp Secure Connection Error Return Code 23
Ftp Secure Connection Error Return Code 23 Sending the FTP server code 230 should establish a connection like it does when using the and if you get it call perror() or print an error made up with strerror(),
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationHow to Configure Authentication and Access Control (AAA)
How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual
More informationComtarsia SignOn Agent for Linux User Guide
Comtarsia SignOn Agent for Linux 2006 User Guide Version: 1.2.10.11, 04-Jul-2006 Contents 1. SignOn Agent for Linux...3 1.1 Introduction...3 1.2 System Requirements...4 1.3 SignOn Agent Installation...4
More informationLDAP Queries. Overview of LDAP Queries. Understanding LDAP Queries
This chapter contains the following sections: Overview of, on page 1 Working with, on page 10 Using Acceptance Queries For Recipient Validation, on page 17 Using Routing Queries to Send Mail to Multiple
More informationInstall and upgrade Qlik Sense. Qlik Sense 3.2 Copyright QlikTech International AB. All rights reserved.
Install and upgrade Qlik Sense Qlik Sense 3.2 Copyright 1993-2017 QlikTech International AB. All rights reserved. Copyright 1993-2017 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik
More informationSimple Binary Search Tree Documentation
Simple Binary Search Tree Documentation Release 0.4.1 Adrian Cruz October 23, 2014 Contents 1 Simple Binary Search Tree 3 1.1 Features.................................................. 3 2 Installation
More informationStratumGS Documentation
StratumGS Documentation Release 0.1.0 Dave Korhumel May 14, 2016 Contents 1 Documentation 3 1.1 Design.................................................. 3 1.2 Guides..................................................
More information