Mail Server. Introduction

Size: px
Start display at page:

Download "Mail Server. Introduction"

Transcription

1 Mail Server Introduction This article is an introduction to Mail Server and it's related protocols. Here I am explaining some basic ideas how a works and background information you need. Electronic mail ( ) is the term given to an electronic message, usually a form of simple text message, that a user types at a computer system and is transmitted over some form of computer network to another user, who can read it. has become one of the driving forces behind connecting businesses to the Internet. It offers fast, economical transfer of messages anywhere in the world. messages doesn't require paper or resources other than storage space thus we can support Green Environment policy. Terminology I think you heard about MUA, MTA and MDA while doing Linux training sessions. Do you know what is the exact role for these programs in a mail server? Here we are explaining in detail. Mail User Agent (MUA) is mail client like Thunderbird,outlook, that allows a user to compose send and receive . Mail Transfer Agent (MTA) The MTA basically acts as a "mail router". Which is responsible for sending the to the recipient MTA. An MTA transfers mails via SMTP protocol. Later we explain in detail. Mail Delivery Agent The recipient s MTA receives the and passes it on to a MDA. An MDA manages the user's mailbox and handles the mails to deliver the MUA ie, (mail client) using either the POP3 or IMAP protocol. In other words, the MDA reads the header and sent back to a remote machine for delivery. How a Mail Server Works We all have an address. Do you ever think how an works while we sending an e mail to some other recipient address. When we are clicking on the send button, within minutes the will deliver to the destination. But at first we have no idea, what are process take place behind the scene and to make sure that the reaches it's final destination. Here we are giving an introduction on various back end process of a Mail Server

2 1. When you compose an with the help of Client, the client will connect to your SMTP server the configuration that we have provided, while configuring your client. 2. For an example here the SMTP server is (mail.example.com). Once the client has connected to mail.example.com SMTP server, it will forward the message that you have just composed to the server. 3. An SMTP server is also called as MTA. Why we called as an MTA, because it's works as a messenger. For example it transfers the mails and messages to the required recipients SMTP server. 4. Next step is the SMTP server will do a DNS query for getting the SMTP server of your receiver. And the SMTP server will try to find the domain SMTP server detail and handed over the message for the particular user. For example when you are sending an to user@example.com. In that case the SMTP server will try to find the responsible domain SMTP server detail, example.com and hand over the message for the user. 5. Once your SMTP server finds the target receivers SMTP server, using an MX record lookup, it will forward the message to that server. Then the SMTP server will forward the message to POP3 or IMAP server responsible for the domain. Mail server functionality can be divided into two processes: Sending and Receiving s Sending Simple Mail Transfer Protocol (SMTP) Receiving Post Office Protocol (POP3) / Internet Message Access Protocol (IMAP) What is an SMTP protocol and why we are using this protocol in mail servers?

3 SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e- mail. In simply the purpose of SMTP is to set up communication rules between servers, like (postman). When we are sending a mail to some other recipient address, the connection happens via SMTP protocol. Comparison between IMAP and POP3 protocol IMAP and POP3 are two different protocols The main difference is that IMAP(Internet Messaged Access Protocol) always syncs with mail server. So whenever you made any changes on your mail client, the result will instantly appears on your inbox. The biggest advantage of using IMAP is you can access your mail from multiple mail clients like Thunderbird and each mail client will shows real-time update. Suppose mail server is connected with two different mail clients on different computers. If one of the user deletes a message from mail client, the changes will immediately update on both mail server and client. This why IMAP is more suitable and if you're going to access your s from different locations or if your mails are managed by multiple users. In POP3 (Post Office Protocol), your mail client (Thunderbird) and mail server will not synced. This means the mails are downloaded in your computer and the changes won t reflect on the server. In POP3 multiple mail clients access were not supported. Here you can download s from mail server to your computer using POP3. After downloading, the original mails were removed from the server. Hence you can t access the mails from another computer. Mail Service protocols and ports Simple Mail Transfer Protocol (SMTP) Port 25 - SMTP non-encrypted port Port SMTP secure port Post Office Protocol version 3 (POP3) Port POP3 non-encrypted port Port POP3 secure port Internet Message Access Protocol (IMAP) Port IMAP non-encrypted port Port IMAP secure port MX Record & priorities

4 Mail exchange is just another name for the machine whose primary function is receiving and sending . An MX record is set to point a canonical hostname, like example.com or mail.example.com. You can find your domain mail server detail either from dig or online tools, like intodns.com and mxtoolbox.com The MX record uses preference values to specify the routing order --low value = high priority. The MX priority determines the order (which mail server) that your mail will be attempted to be delivered. The mail server with the lowest MX priority will first be attempted to deliver. google.com. 600 IN MX 40 alt3.aspmx.l.google.com. google.com. 600 IN MX 30 alt2.aspmx.l.google.com. google.com. 600 IN MX 50 alt4.aspmx.l.google.com. google.com. 600 IN MX 10 aspmx.l.google.com. google.com. 600 IN MX 20 alt1.aspmx.l.google.com. So, if you have five MX records with levels 10, 20, 30, 40,50 the following would occur. Mail would always be first tried to be delivered to the MX record with MX priority of 10. If that mail server is down then the mail will try to be delivered to the mail server at 20. If the mail server at priority 20 is down then the mail will be attempted to be delivered at the mail server at priority 30. If you have multiple MX records with the same MX priority, then it will setup a round robin configuration for your . Types of Mail Service Dovecot Courier In cpanel servers we are using dovecot and courier mail services. This is the service which delivers the to your inbox while exim is the one which sends the mails to the servers. Dovecot Dovecot uses less memory,better performance and is more configurable. Dovecot is a POP3 and IMAP mail server that can work with standard mbox and maildir formats. Dovecot is much faster than Courier and the advantage is its intelligent use of configuration files. Files Program Init Script Config : /usr/sbin/dovecot : /etc/init.d/dovecot : /etc/dovecot.conf Courier Courier is extremely reliable, but it needs a larger memory. Why it takes heavy memory usage, because when ever you open web mail client it has to reload the entire inbox. Which makes it a bit slower to load compared to dovecot, when we are dealing with large mailboxes.

5 Files Program Init Script Config : /usr/lib/courier-imap/libexec/couriertcpd : /etc/init.d/courier : /usr/local/libexec/courier-imap If you are running a shared server, dovecot need to deliver better performance while you have a dedicated server for one or two websites, courier can be more efficient. The default choice for cpanel is the dovecot and if you need to change you need to navigate to WHM Main >> Service Configuration >> Mailserver Selection OR You can change it from back-end command line using cpanel script and editing config file. /scripts/setupmailserver dovecot Then set /var/cpanel/cpanel.config maildir=1 mailserver=dovecot Exim Configuration files Exim is an open source mail transfer agent (MTA), which is a program responsible for Receiving, Routing, Delivering messages Exim commands exim -bp: shows messages in queue exim -bpc : shows the no.of messages in queue exiwhat : Finding out what Exim processes are doing exim -qff : Attempt to flush frozen messages exim -bp exiqsumm : Print a summary of messages in the queue exiqgrep usage exiqgrep -f [luser]@domain : Search the queue for messages from a specific sender exiqgrep -r [luser]@domain : Search the queue for messages for a specific recipient/domain exiqgrep -i : To Print just the message-id of the entire queue exim -Mrm: <message-id> : Remove a message from the queue exim -M <message-id>: Deliver a specific message exiqgrep -z -i xargs exim -Mrm: Remove all frozen messages Files /etc/exim.conf - mail server configuration file

6 /etc/localdomains - exim related file. All the domains using the same server's MX, should be listed here to be able to send/receive s. /etc/valiases/domainname - catchall and forwarders are set here. /etc/vfilters/domainname - filters are set here. /var/spool/exim/input - Mail queue. /var/spool/exim/msglog - message logs. /var/cpanel/horde - version file, backups and logs stored here /var/cpanel/roundcube - version file, backups and logs stored here /var/cpanel/squirrelmail - version file stored here. You can also edit and modify exim configuration from WHM Home >> Service Configuration >> Exim Configuration Manager >> Advanced Editor How to change exim Mail server IP address When ever our main server is blacklisted in RBL sites. This is only a temporary work around to the blacklist problem and you have to make sure that you have identify the spammer and resolved the issue. As a temporary solution we can change the mail server IP address, this resolve the bounce back issue. If you have any script under the domains, then you need to change the outgoing mail IP address on that script. In some cases PHP mailer script will give you bounce back message after changing the mail server IP address. Changing the IP Globally You need edit the following file /etc/mailips *: xxx.xxx.xxx.xxx Then add the IP and it's matching PTR to /etc/mail_reverse_dns: xxx.xxx.xxx.xxx hostname.tld This will tell Exim to use that IP for any sender on the server. Spamassin Apache SpamAssassin is an utility that examines incoming and tests for spam characteristics. SpamAssassin is designed to identify and mark s that score beyond your threshold value. SpamAssassin has 10 different levels of settings to catch spam. By default the spam score will be 5. You can enable the SpamAssassin from the domain cpanel itself. How spam score works If you set lower the score, more will be caught as spam. For example, you have enabled spam score as "1" that means only one hit needs to be flagged against the to be considered as spam. If you set the spam score higher, more hits will be required on an for it to be labeled as spam. So if we set lower spam score, more s should be flagged as spam.

7 0 means everything incoming will be marked as spam. 5 is the default setting (and works well for typical users). 10 means that any message with a score of 10 or less will not be marked as spam. RBL What is an RBL? A DNS-based Blackhole List or Real-time Blackhole List is a list of IP addresses which are most often used to publish the addresses of computers or networks linked to spamming, most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists. Eg: spamhaus,spamcop etc How to check whether an IP is blacklisted? You can check whether the server mail IP address is blacklisted in any RBL's using the below link Eg: How to delist the IP address For delisting you need to contact the blacklist provider from there you can check whether the IP address was listed on their database. eg, will take 48 hours to complete the delist process. How we can prevent spamming activities and what are the methods? We all know about spam mails right? We are getting so many spam mail in our personal mails, but in Gmail,yahoo and other service providers have their own techniques to prevent spam mails. Here I am sharing a brief description about two different technologies in cpanel SPF and DKIM. Whenever you create a domain on CPanel server using WHM, it won't add domainkeys and SPF records for particular domains. We need to add it manually. Sender Policy Framework (SPF) SPF helps prevent spammers, SPF can also reduce the amount of bounce messages that you receive. SPF uses DNS records that specify the mail servers and IP addresses that are authorized to send messages from a domain. To Enable SPF Records for a domain Log into cpanel Click Authentication

8 Click ENABLE beside the SPF section. Click the Go Back link Verify that the Status now says that it is Active and Enabled You can add from command prompt too. /usr/local/cpanel/bin/domain_keys_installer domain username DomainKeys Identified Mail (DKIM) You can use DKIM to verify an incoming message is actually from the stated sender, and that the message has not been altered during transit. When DKIM is enabled, the sender digitally signs a message using a private key. The recipient uses DNS to retrieve the sender's public key and verify the message's signature. If the signature is invalid, then the message is assumed to be forged and therefore spam. To Enable Domain Keys Log into cpanel Click Authentication Click ENABLE beside the Domain Keys section Click the Go Back link Verify that the Status now says that it is Active and Enabled You can add from command prompt too. /usr/local/cpanel/bin/domain_keys_installer domain user name How to check log using exigrep Here I am explaining how to trace and identify the mail log symbols. One of the best tools you can use when tracking down problems is mail logs. First, it is a good idea to get to know the following symbols. <= => -> *> ** At least one of these symbols will be on nearly every line of exim s mainlog. Other abbreviations in the log will change their meaning based on which of these symbols is on that line. These abbreviations consist of one or two letters :41:47 [4578] 1XbPOr-0001Bq-OC H=ccm181.constantcontact.com [ ]:58477 I=[ ]:25 Warning: "SpamAssassin as ahmedkha detected message

9 as NOT spam (-4.6)" :41:47 [4578] 1XbPOr-0001Bq-OC <= ontact.com H=ccm181.constantcontact.com [ ]:58477 I=[ ]:25 P=esmtp S=37537 M8S=0 T="Ne ratez pas le RV incontournable du business de la television en\n Afrique!" from tcontact.com> for Beginning of the Line Each line starts with the date and time. Immediately following is exim s internal message ID: First Line The next item on the first line starts with H=. This specifies the host name of the server that the mail originates from. Next (in square brackets) is the IP address of that server, followed by the port number. I= looks similar, but is describing your mail server. A warning follows: Spamassassin believes that this message is not spam. Second Line The second line almost starts the same (with H and I), but before that the <= symbol is used. This indicates that this line is describing the arrival of the message on your mail server. Immediately after this symbol is the address that this mail is being sent from. After H and I, the P abbreviation designates the protocol being used (here esmtps). Note that this only means this because it is on a <= line; if this were a => line it would indicate the return path of the message. The X tells us the particular cipher suite that is used; this is usually not something you would be looking for when troubleshooting a mail issue. CV refers to certification verification status, and S is the size of the message. Next, id refers to the message id that was created by the sending server and sent as one of the mail headers. T (for topic) is the subject of the . The line ends with for user@example.com, letting us know just who the message is for. Steps to troubleshooting spamming Using the following exim commands we can find out the spammer, also take relevant action. Check mail queue exim -bpc

10 Check present in the queue with the mail id and sender ID # exim -bp # exim -bp less To view the header of a particular using mail ID: # exim -MvH mail_id To view the body of a particular using mail ID: # exim -Mvb mail_id To view a message log: # exim -Mvl mail_id To trace path: # exim -d -bt user@domain.com To get sorted list of sender in exim queue: # exim -bpr grep "<" awk {'print $4'} cut -d "<" -f 2 cut -d ">" -f 1 sort -n uniq -c sort -n To check the script that will originate spam mails: # grep "cwd=" /var/log/exim_mainlog awk '{for(i=1;i<=10;i++){print $i}}' sort uniq -c grep cwd sort -n If we need to find out exact spamming script. To do this, run following command: # ps auxwwwe grep user grep --color=always "/home/user/public_html/" head After finding the spammer, disable the file or change username of that acc: Delete the mail from the specified user # exim -bp grep "user_ -account" awk '{print $3}' xargs exim -Mrm To delete Frozen s from the queue: # exiqgrep -z -i xargs exim -Mrm

Webmail Which Webmail applications are available?

Webmail Which Webmail applications are available? Mail FAQ Webmail Which Webmail applications are available? Why is the Webmail application that I want to use missing? Can I reconfigure access to Webmail from http://example.com/webmail to webmail.example.com?

More information

Filtering 7 April 2014

Filtering 7 April 2014 Email Filtering 2014 Fortinet Inc. All rights reserved. The information contained herein is subject to change without notice. No part of this publication including text, examples, diagrams 1 or illustrations

More information

Mail Assure. Quick Start Guide

Mail Assure. Quick Start Guide Mail Assure Quick Start Guide Last Updated: Wednesday, November 14, 2018 ----------- 2018 CONTENTS Firewall Settings 2 Accessing Mail Assure 3 Application Overview 4 Navigating Mail Assure 4 Setting up

More information

Mail Assure Quick Start Guide

Mail Assure Quick Start Guide Mail Assure Quick Start Guide Version: 11/15/2017 Last Updated: Wednesday, November 15, 2017 CONTENTS Getting Started with Mail Assure 1 Firewall Settings 2 Accessing Mail Assure 3 Incoming Filtering 4

More information

Message-IDs and spool files

Message-IDs and spool files Here are some useful things to know for managing an Exim 4 server. This assumes a prior working knowledge of SMTP, MTAs, and a UNIX shell prompt. Message-IDs and spool files The message-ids that Exim uses

More information

Security by Any Other Name:

Security by Any Other Name: Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the

More information

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified  Security Professional Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

Untitled Page. Help Documentation

Untitled Page. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Antispam Administration SmarterMail comes equipped with a number

More information

Best Practices. Kevin Chege

Best Practices. Kevin Chege Email Best Practices Kevin Chege Why your email setup is critical Billions of SPAM emails are generated every day The tips here can help you to reduced the chances of you receiving SPAM email or inadvertently

More information

. SMTP, POP, and IMAP

. SMTP, POP, and IMAP E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters

More information

How Internet Works

How Internet  Works How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If

More information

Version SurfControl RiskFilter - Administrator's Guide

Version SurfControl RiskFilter -  Administrator's Guide Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with

More information

On the Surface. Security Datasheet. Security Datasheet

On the Surface.  Security Datasheet.  Security Datasheet Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record

More information

My The guide.

My  The guide. My email The guide Read our Blog: http://.co.uk/blog View our support site: http://123-reg.co.uk/support Follow us on Twitter: https://twitter.com/123reg Contents 1. How do I get my own personalised email

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials. Email Defense Admin Panel Managing Spam The admin panel enables you to configure spam settings for messages. Tuning your spam settings can help you reduce the number of spam messages that get through to

More information

Validating Recipients Using an SMTP Server

Validating Recipients Using an SMTP Server This chapter contains the following sections: Overview of SMTP Call-Ahead Recipient Validation, page 1 SMTP Call-Ahead Recipient Validation Workflow, page 1 How to Validate Recipients Using an External

More information

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2)

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2) Introduction to Internet Mail Noah Sematimba Based on Materials by Philip Hazel. Mail agents MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,

More information

Introduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents

Introduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents Introduction to Internet Mail Philip Hazel University of Cambridge Computing Service MUA = Mail User Agent Mail agents Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Mulberry,

More information

Electronic Mail

Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

anti-spam techniques beyond Bayesian filters

anti-spam techniques beyond Bayesian filters anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based

More information

Tracking Messages

Tracking  Messages This chapter contains the following sections: Tracking Service Overview, page 1 Setting Up Centralized Message Tracking, page 2 Checking Message Tracking Data Availability, page 4 Searching for Email Messages,

More information

NSE6_FML exam.14q

NSE6_FML exam.14q NSE6_FML-5.3.8.exam.14q Number: NSE6_FML-5.3.8 Passing Score: 800 Time Limit: 120 min NSE6_FML-5.3.8 FortiMail 5.3.8 Specialist Exam A QUESTION 1 Examine the nslookup output shown in the exhibit; then

More information

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0

Synology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0 Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Mailing 1/67 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 TB-Preferences 7

More information

Troubleshooting IMAP Clients and ViewMail for Outlook

Troubleshooting IMAP Clients and ViewMail for Outlook Troubleshooting IMAP Clients and ViewMail for Outlook, page 1 Troubleshooting Problems with Changing Passwords When users change their Cisco Personal Communications Assistant (PCA) password in the Messaging

More information

Mail Assure. User Guide - Admin, Domain and Level

Mail Assure. User Guide - Admin, Domain and  Level Mail Assure User Guide - Admin, Domain and Email Level Last Updated: Friday, June 15, 2018 ----------- 2018 CONTENTS Getting Started 1 Useful Links 1 What's New 1 Accessing Mail Assure 6 User Permissions

More information

Introduction This paper will discuss the best practices for stopping the maximum amount of SPAM arriving in a user's inbox. It will outline simple

Introduction This paper will discuss the best practices for stopping the maximum amount of SPAM arriving in a user's inbox. It will outline simple Table of Contents Introduction...2 Overview...3 Common techniques to identify SPAM...4 Greylisting...5 Dictionary Attack...5 Catchalls...5 From address...5 HELO / EHLO...6 SPF records...6 Detecting SPAM...6

More information

Using on Your Sprint PCS Vision Smart Device PPC-6700

Using  on Your Sprint PCS Vision Smart Device PPC-6700 Using Email on Your Sprint PCS Vision Smart Device PPC-6700 2006 Sprint Nextel. All rights reserved. SPRINT, the "Going Forward" logo, and other trademarks are trademarks of Sprint Nextel. June 7, 2006

More information

Advanced Settings. Help Documentation

Advanced Settings. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

Exim Practical. Patrick Okui. (based on materials from Brian Candler)

Exim Practical. Patrick Okui. (based on materials from Brian Candler) Exim Practical Patrick Okui (based on materials from Brian Candler) Objectives Part 1 is building and installing Exim.. Install Exim from ports. Replace Sendmail with Exim Part 2 is running basic tests.

More information

Introduction to Antispam Practices

Introduction to Antispam Practices By Alina P Published: 2007-06-11 18:34 Introduction to Antispam Practices According to a research conducted by Microsoft and published by the Radicati Group, the percentage held by spam in the total number

More information

SMTP Mail. February 14, 2012 Lotus Mail Routing Team IBM Corporation

SMTP Mail. February 14, 2012 Lotus Mail Routing Team IBM Corporation SMTP Mail February 14, 2012 Lotus Mail Routing Team Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 SMTP: A Brief History SMTP (Simple Message Transfer Protocol) SMTP evolved and became a

More information

Notmuch mail with afew tags and the alot user interface. September 15, 2012

Notmuch mail with afew tags and the alot user interface. September 15, 2012 Notmuch mail with afew tags and the alot user interface Software Freedom Day 2012 Hamburg September 15, 2012 c Justus Winter This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported

More information

WestHost Knowledgebase. Introduction to cpanel

WestHost Knowledgebase. Introduction to cpanel WestHost Knowledgebase Introduction to cpanel cpanel is the interface that all our clients use in order to manage a shared hosting account. This document will provide a very basic overview of the available

More information

Using Your New Webmail

Using Your New Webmail Using Your New Webmail Table of Contents Composing a New Message... 2 Adding Attachments to a Message... 4 Inserting a Hyperlink... 6 Searching For Messages... 8 Downloading Email from a POP3 Account...

More information

Defining Which Hosts Are Allowed to Connect Using the Host Access Table

Defining Which Hosts Are Allowed to Connect Using the Host Access Table Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, on page 1 Defining Remote

More information

Account Customer Portal Manual

Account Customer Portal Manual Account Customer Portal Manual Table of Contents Introduction Dashboard Section Reporting Section My Settings Section My Account Section Billing Section Help Section 2 4 7 15 20 25 27 1 Introduction SMTP

More information

1 Installing KEEP is Easy

1 Installing KEEP is Easy Installing KEEP is Easy 1 Installing KEEP is Easy 1. Plug in the network cable to in Internet enabled port, either directly connected to the Internet or behind a router. 2. Connect the power supply to

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

Symantec ST Symantec Messaging Gateway Download Full Version :

Symantec ST Symantec Messaging Gateway Download Full Version : Symantec ST0-199 Symantec Messaging Gateway 10.0 Download Full Version : https://killexams.com/pass4sure/exam-detail/st0-199 QUESTION: 111 When configuring DKIM signing, how should the domain key generated

More information

Test-king q

Test-king q Test-king 700-280 64q Number: 700-280 Passing Score: 800 Time Limit: 120 min File Version: 28.5 http://www.gratisexam.com/ 700-280 Email Security for Field Engineers Passed on 2-02-15 with an 890. Dump

More information

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4 Lotus Protector Mail Security and Mail Encryption Interop Guide Lotus Protector Interop Guide Mail Encryption 2.1.0.1 Mail Security 2.5.1 Version 1.4 Lotus Protector Mail Security and Mail Encryption Configuration

More information

SmarterMail Edition Comparison

SmarterMail Edition Comparison SmarterMail Edition Comparison Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. SmarterMail Edition Explanation

More information

Defining Which Hosts Are Allowed to Connect Using the Host Access Table

Defining Which Hosts Are Allowed to Connect Using the Host Access Table Defining Which Hosts Are Allowed to Connect Using the Host Access Table This chapter contains the following sections: Overview of Defining Which Hosts Are Allowed to Connect, page 1 Defining Remote Hosts

More information

MxVault Questions and Answers

MxVault Questions and Answers Table of Contents INCOMING SERVICE... 2 1. INCOMING FILTERING SERVICE... 2 2. DOMAIN ALIASING... 5 3. ENCRYPTION TLS... 6 4. REPORTING SPAM... 6 5. ERROR CODE 500... 8 6. GREYLISTING... 8 7. MESSAGE QUEUING...

More information

Optimization of your deliverability: set up & best practices. Jonathan Wuurman, ACTITO Evangelist

Optimization of your  deliverability: set up & best practices. Jonathan Wuurman, ACTITO Evangelist Optimization of your email deliverability: set up & best practices Jonathan Wuurman, ACTITO Evangelist ACTITO Webinar Tour Replays & presentations available at www.actito.com/nl Our mission We help our

More information

M-Switch MIXER Evaluation Guide

M-Switch MIXER Evaluation Guide M-Switch MIXER Evaluation Guide Configuring M-Switch as a MIXER (SMTP/X.400) Gateway M-Switch MIXER Evaluation Guide Page 1 of 46 Objectives The purpose of this guide is to give the reader the tools to

More information

Univention Corporate Server. Cyrus mail server

Univention Corporate Server. Cyrus mail server Univention Corporate Server Cyrus mail server 2 Table of Contents 1. Introduction... 4 2. Installation... 5 3. Management of the mail server data... 6 3.1. Management of mail domains... 6 3.2. Assignment

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

Deployment Guides. Help Documentation

Deployment Guides. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2019 SmarterTools Inc. Deployment Guides SmarterMail in Individual and Micro-business

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

Anti-Spoofing. Inbound SPF Settings

Anti-Spoofing. Inbound SPF Settings Anti-Spoofing SonicWall Hosted Email Security solution allows you to enable and configure settings to prevent illegitimate messages from entering your organization. Spoofing consists of an attacker forging

More information

Electronic Mail. Electronic Mailboxes

Electronic Mail. Electronic Mailboxes Electronic Mail E-mail belongs to the Application Layer Has been around since the early 80 s Enables new forms of interaction Fast Automatic processing (sorting, reply) Can carry other content Electronic

More information

Settings. Help Documentation

Settings. Help Documentation Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2019 SmarterTools Inc. General To access the general settings for SmarterMail server,

More information

Microsoft Exam

Microsoft Exam Microsoft Exam 70-662 TS: Microsoft Exchange Server 2010, Configuring Skills Being Measured This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

Using Centralized Security Reporting

Using Centralized  Security Reporting This chapter contains the following sections: Centralized Email Reporting Overview, on page 1 Setting Up Centralized Email Reporting, on page 2 Working with Email Report Data, on page 4 Understanding the

More information

Error Sending Mail Message To Smtp Server. Return Code 552

Error Sending Mail Message To Smtp Server. Return Code 552 Error Sending Mail Message To Smtp Server. Return Code 552 The best mail server response code you can get. A 400-style message is usually returned when some sort of transient error is easing off the throttle

More information

Comprehensive Setup Guide for TLS on ESA

Comprehensive Setup Guide for TLS on ESA Comprehensive Setup Guide for TLS on ESA Contents Introduction Prerequisites Requirements Components Used Background Information Functional Overview and Requirements Bring Your Own Certificate Update a

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

Ethical Hacking and. Version 6. Spamming

Ethical Hacking and. Version 6. Spamming Ethical Hacking and Countermeasures Version 6 Module XL Spamming News Source: http://www.nzherald.co.nz/ Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How

More information

Chapter 10: Application Layer

Chapter 10: Application Layer Chapter 10: Application Layer Application, Session and Presentation Presentation and Session Layers Session layer Functions, creates, and maintains dialogs between source and destination applications Handles

More information

MDaemon Vs. IceWarp Unified Communications Server

MDaemon Vs. IceWarp Unified Communications Server Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

MDaemon Vs. MailEnable Enterprise Premium

MDaemon Vs. MailEnable Enterprise Premium Comparison Guide Vs. Enterprise Premium The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei November 15, 2010 Károly Erdei Debian/GNU Linux Mailing 1/43 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Links Károly Erdei

More information

Comodo Dome Antispam Software Version 6.0

Comodo Dome Antispam Software Version 6.0 St rat Comodo Dome Antispam Software Version 6.0 Admin Guide Guide Version 6.6.051117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Dome Anti-spam...

More information

Status Node Reference

Status Node Reference IceWarp Unified Communications Status Node Reference Version 10.4 Printed on 23 February, 2012 Contents Status 1 Message Queue... 2 Spam Queues... 3 Quarantine... 3 Whitelist... 4 BlackList... 5 Greylisting...

More information

MDaemon Vs. Kerio Connect

MDaemon Vs. Kerio Connect Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS Account

More information

An Overview of Webmail

An Overview of Webmail An Overview of Webmail Table of Contents What browsers can I use to view my mail? ------------------------------------------------------- 3 Email size and storage limits -----------------------------------------------------------------------

More information

Symantec ST0-250 Exam

Symantec ST0-250 Exam Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question

More information

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION Networking Revision TCP/IP Protocol Stack & OSI reference model Basic Protocols TCP/IP Model 1 OSI (Open Systems Interconnection) Model main purpose to aid in clearer understanding of the functions and

More information

Kerio Connect. Step-by-Step. Kerio Technologies

Kerio Connect. Step-by-Step. Kerio Technologies Kerio Connect Step-by-Step Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Connect, version 7.3. All additional modifications and

More information

Anti-Spam. Overview of Anti-Spam Scanning

Anti-Spam. Overview of Anti-Spam Scanning This chapter contains the following sections: Overview of Scanning, on page 1 How to Configure the Appliance to Scan Messages for Spam, on page 2 IronPort Filtering, on page 3 Cisco Intelligent Multi-Scan

More information

1 Installing OPI is Easy

1 Installing OPI is Easy Installing OPI is Easy 1 Installing OPI is Easy 1. Plug in the network cable to in Internet enabled port, either directly connected to the Internet or behind a router. 2. Plug connect the supplied USB

More information

Installation & Configuration Guide Version 1.4

Installation & Configuration Guide Version 1.4 TekSMTP Installation & Configuration Guide Version 1.4 Document Revision 1.7 https://www.kaplansoft.com/ TekSMTP is built by Yasin KAPLAN Read Readme.txt for last minute changes and updates which can be

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei December 9, 2009 Károly Erdei Debian/GNU Linux Mailing 1/46 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Domain Name System

More information

SMTP Scanner Creation

SMTP Scanner Creation SMTP Scanner Creation GWAVA4 Copyright 2009. GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com SMTP Scanner SMTP scanners allow the incoming and outgoing

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message WebMail Help User Manual Index Accessing WebMail Logging In Check your Mail Main Mail Screen Reading Messages Search Sending a new message Address book Spelling Attaching files Html Text Managing addresses

More information

S a p m a m a n a d n d H a H m 성균관대학교 최형기

S a p m a m a n a d n d H a H m 성균관대학교 최형기 Spam and Ham 성균관대학교 최형기 Agenda Email Protocol Introduction to spam Techniques spammers use Kinds of spam Solutions to spam Conclusion CINS/F1-01 Sungkyunkwan University, Hyoung-Kee Choi 2 SMTP 1 Electronic

More information

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections:

Tracking Messages. Message Tracking Overview. Enabling Message Tracking. This chapter contains the following sections: This chapter contains the following sections: Message Tracking Overview, page 1 Enabling Message Tracking, page 1 Searching for Messages, page 2 Working with Message Tracking Search Results, page 4 Checking

More information

Reading Headers with MX Tool Box By Matt Flederbach

Reading  Headers with MX Tool Box By Matt Flederbach Reading Email Headers with MX Tool Box By Matt Flederbach Often times, you'll get a customer asking Why did it take so long for my email to be delivered? or Why was my email blocked? or even Why was this

More information

Technical Note. FortiMail Best Practices Version 3.0 MR4.

Technical Note. FortiMail Best Practices Version 3.0 MR4. Technical Note FortiMail Best Practices Version 3.0 MR4 www.fortinet.com FortiMail Best Practices Technical Note Version 3.0 MR4 October 29, 2008 06-30004-0392-20081029 Copyright 2007 Fortinet, Inc. All

More information

SMTP Simple Mail Transfer Protocol

SMTP Simple Mail Transfer Protocol SMTP Simple Mail Transfer Protocol What is SMTP? SMTP stands for Simple Mail Transfer Protocol. This protocol allows transmitting electronic mail over the Internet or any other network. The protocol itself

More information

Error Codes have 3 Digits

Error Codes have 3 Digits The top portion covers bounce back messages. The x.x.x The xxx Examples of real Error messages with an explaination. (the email client errors coming in the future) The 2nd half covers email connection

More information

MDaemon Vs. SmarterMail Enterprise Edition

MDaemon Vs. SmarterMail Enterprise Edition Comparison Guide Vs. Enterprise Edition The following chart is a side-by-side feature comparison of and Enterprise Edition. Flex Licensing û Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP,

More information

Configuring Gmail (G Suite) with Cisco Cloud Security

Configuring Gmail (G Suite) with Cisco Cloud  Security Configuring Gmail (G Suite) with Cisco Cloud Email Security This document covers the steps required to integrate Cisco Cloud Email Security with Google G Suite for inbound and outbound email delivery.

More information

The Undo Sent (USE) Protocol

The Undo Sent  (USE) Protocol International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 593-602 International Research Publications House http://www. irphouse.com /ijict.htm The

More information

User Guide. RLComputing, LLC Phone: Fax:

User Guide. RLComputing, LLC Phone: Fax: E-Mail User Guide RLComputing, LLC Phone: 716.656.8958 Fax: 1.866.375.3393 www.rlcomputing.com Email: info@rlcomputing.com Who is this manual for? The purpose of this manual is to help any user who has

More information

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING &

CUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING & Table of Contents CUSTOMER CONTROL PANEL... 2 LOGGING IN... 2 RESET YOUR PASSWORD... 2 DASHBOARD... 3 HOSTING & EMAIL... 4 WEB FORWARDING... 4 WEBSITE... 5 Usage... 5 Subdomains... 5 SSH Access... 6 File

More information

700 Fox Glen Barrington, Illinois ph: [847] fx: [847] Webmail System User Guide

700 Fox Glen Barrington, Illinois ph: [847] fx: [847] Webmail System User Guide 700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com Webmail System User Guide Last Updated November 7, 2017 -2- Table of Contents Welcome

More information

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections:

Spam Quarantine. Overview of the Spam Quarantine. This chapter contains the following sections: This chapter contains the following sections: Overview of the, page 1 Local Versus External, page 2 Setting Up the Local, page 2 Setting Up the Centralized, page 3 Edit Page, page 6 Using Safelists and

More information

Configuring SMTP Routing

Configuring SMTP Routing This chapter contains the following sections: SMTP Routes Overview, page 1 Routing Email for Local Domains, page 2 Managing SMTP Routes, page 3 SMTP Routes Overview This chapter explains the features that

More information

Hit the Ground Spam(fight)ing

Hit the Ground Spam(fight)ing Hit the Ground Spam(fight)ing LISA 05, San Diego December, 2005 John Rowan Littell Earlham College littejo (at) earlham (dot) edu $ARGV[0] There is no magic bullet. Many products, both commercial and open

More information