CIT 470: Advanced Network and System Administration. Topics. Mail Policies.
|
|
- Nickolas Gibbs
- 6 years ago
- Views:
Transcription
1 CIT 470: Advanced Network and System Administration CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Mail Policies 2. Anatomy of a Mail Message 3. Components of an System 4. SMTP 5. IMAP & POP 6. Addresses 7. Aliases and Lists CIT 470: Advanced Network and System Administration Slide #2 1. Privacy Policy 2. Namespaces 3. Reliability 4. Scaling 5. Security Mail Policies CIT 470: Advanced Network and System Administration Slide #3 1
2 Privacy Policy Personal Use Policy Personal v. commercial use. When may employee be read? By whom Under what circumstances Automatic monitoring Retention Policy Legal requirements. CIT 470: Advanced Network and System Administration Slide #4 Namespaces Avoid first.last format addresses. There will be duplicates: John.Smith. Use middle initials? Append numbers? Create unique organization-wide namespace. Use directory to lookup addresses. CIT 470: Advanced Network and System Administration Slide #5 Reliability Customers expect same reliability as power. Failures generate many support calls. Reliability measures Redundant servers. Backup MX hosts. RAID arrays. Multiple NICs, power supplies, processors, etc. CIT 470: Advanced Network and System Administration Slide #6 2
3 Header Scalability Types of scability To address growth in avg messages/day. To address spikes in mail traffic. Number of messages grows faster than linearly with number of users. with time, even if user base is constant. due to spam too. Size of messages grows due to technology: more + larger attachments. CIT 470: Advanced Network and System Administration Slide #7 Security Mail server as a target Complexity of mail leads to vulnerabilities. Mail is an asset attackers want to take. as a conduit Brings viruses and trojans into organization. Leaks confidential information outward. ex (2005): Apple sues bloggers over releasing data about upcoming products. relaying Open relays used by spammers and scammers. Intercepting CIT 470: Advanced Network and System Administration Slide #8 Anatomy of a Mail Message Received: from mailfe2.nku.edu ([ ]) by brahms.utoledo.edu (8.11.9) with ESMTP id k3cjcm for <him@utoledo.edu>; Wed, 12 Apr :12: (EDT) Received: from mailfac1.nku.edu ([ ]) by mailfe2.nku.edu with MS SMTPSVC( ); Wed, 12 Apr :15: Subject: Test Date: Wed, 12 Apr :15: Message-ID: <F01E4499C4EC5842A@mailfac1.hh.nku.edu> From: You" <you@nku.edu> To: <him@utoledo.edu> Blank Body This is a test message. CIT 470: Advanced Network and System Administration Slide #9 3
4 Header Header Format Header-name: Header-data Common headers From: To:, CC:, Reply-To: Date: Message-ID: Subject: Multiple headers Received: for each mail server handling message. CIT 470: Advanced Network and System Administration Slide #10 Body Separated from header by blank line. Contains 7-bit ASCII text by default. Any non-ascii text must be encoded: uuencode MIME CIT 470: Advanced Network and System Administration Slide #11 MIME Multipurpose Internet Mail Extensions Text in non-ascii character sets. Non-text attachments. Multi-part message bodies. Identified by Content-Type: header. text/plain: regular text/html: HTML markup multipart/mixed: text/plain + attachments image/jpeg: JPEG image attachment Many other formats CIT 470: Advanced Network and System Administration Slide #12 4
5 Base64 Binary to text encoding scheme Each character represents 6 bits. Uses 64 characters from 7-bit ASCII: A-Za-z0-9+= Encodes in 3-byte chunks 3 bytes = 24 bits = 4 base-64 characters M a n T W F u CIT 470: Advanced Network and System Administration Slide #13 Multipart MIME Message Example MIME-version: 1.0 Content-type: multipart/mixed; boundary="frontier This is a multi-part message in MIME format. --frontier Content-type: text/plain This is the body of the message. --frontier Content-type: application/octet-stream Content-transfer-encoding: base64 PGh0bWw+CiAgPGhlYWQ+CiAgPC9oZWFkPgogIDxib2R5PgogICA gpha+vghpcybpcyb0agug Ym9keSBvZiB0aGUgbWVzc2FnZS48L3A+CiAgPC9ib2R5Pgo8L2h0 bww+cg== --frontier-- CIT 470: Advanced Network and System Administration Slide #14 Envelope Headers aren t the full story Recipient isn t necessarily on To: or CC: Sender isn t necessarily given on From: header. Envelope specifies sender/receiver Specified via SMTP commands. Envelope recipient used for BCC: Envelope recipient used by mail lists. Envelope facilities used by spammers too. CIT 470: Advanced Network and System Administration Slide #15 5
6 Components of a Mail System UA Eudora DA mail.local Msg Store UA Outlook TA Sendmail TA Sendmail UA mutt UA mutt AA imapd CIT 470: Advanced Network and System Administration Slide #16 MTAs Mail Transport Agents Receive mail from MUAs. Route mail across internet. MTA Protocol: SMTP MTA Examples sendmail postfix qmail CIT 470: Advanced Network and System Administration Slide #17 SMTP 220 brahms.nku.edu ESMTP Sendmail ; Wed, 12 Apr 2006 helo mydomain.com 250 brahms.nku.edu Hello mydomain.com, pleased to meet you mail from: me@mydomain.com me@mydomain.com... Sender ok rcpt to: friend@nku.edu friend@nku.edu... Recipient ok data 354 Enter mail, end with "." on a line by itself Subject: Test From: me@mydomain.com To: friend@nku.edu This is a test k3gicr Message accepted for delivery quit brahms.nku.edu closing connection CIT 470: Advanced Network and System Administration Slide #18 6
7 HELO hostname EHLO hostname MAIL FROM: addr RCPT TO: addr VRFY addr EXPN addr DATA QUIT RSET HELP SMTP Commands CIT 470: Advanced Network and System Administration Slide #19 Message Store Communication Receives data from MDA (mail.local, procmail) Provides data to MAA (IMAP, POP, NFS, web) Types of stores Files (all messages for a user in one file) Directories (directory per user) Databases CIT 470: Advanced Network and System Administration Slide #20 Mail Access Agents Older systems directly accessed mail files. Modern systems use network POP: Post Office Protocol Simple download protocol for offline reading. IMAP: Internet Mail Access Protocol Online and offline modes of reading. Partial message fetch (headers, attachments, etc.) Message state stored on server, not client. Multiple mailbox and multiple client support. CIT 470: Advanced Network and System Administration Slide #21 7
8 IMAP Servers Cyrus UW IMAP Features Message store types Authentication Security (SSL) IMAP CIT 470: Advanced Network and System Administration Slide #22 Mail User Agents Text clients mail mutt pine GUI clients Eudora Mozilla Thunderbird MS Outlook Web clients Run on remote web server. CIT 470: Advanced Network and System Administration Slide #23 Mail Addressing Relative Addresses mcvax!uunet!ucbvax!hao!boulder!air!evi Absolute Addresses MX Records Mail clients use MX records, not A records. Lowest preference # = highest priority. Permits failover if server down. CIT 470: Advanced Network and System Administration Slide #24 8
9 Aliases Allow mail to be rerouted. Sysadmin: files (/etc/mail/aliases), local db, NIS, LDAP Personal: ~/.forward Alias destinations Local: address Remote: File: :include:pathname Program: pathname Required aliases postmaster, abuse, root CIT 470: Advanced Network and System Administration Slide #25 Mailing List Aliases Mailing List Aliases mylist: :include:/etc/mail/include/mylist owner-mylist: mylist-request mylist-request: me owner-owner: postmaster Purpose owner: Messages appear to be from owner. Receives bounces, list management mail. request: Indirection ensures owner s real address doesn t appear on Return-Path. owner-owner: Receives errors from messages destined for owner-* aliases. CIT 470: Advanced Network and System Administration Slide #26 Mailing List Software Automate list management. interface. Web interface. Packages Mailman Majordomo Listserv List Archiving Mailman MHonArc CIT 470: Advanced Network and System Administration Slide #27 9
10 References 1. Bryan Cosales with Eric Allman, Sendmail, 3 rd edition, O Reilly, David H. Crocker, RFC 822: STANDARD FOR THE FORMAT OF ARPA INTERNET TEXT MESSAGES, Aeleen Frisch, Essential System Administration, 3 rd edition, O Reilly, MIME, 5. Evi Nemeth et al, UNIX System Administration Handbook, 3 rd edition, Prentice Hall, Thomas A. Limoncelli and Christine Hogan, The Practice of System and Network Administration, Addison-Wesley, RedHat, Red Hat Enterprise Linux 4 System Administration Guide, Manual/sysadmin-guide/, Alan Schwartz, Managing Mailing Lists, O Reilly, CIT 470: Advanced Network and System Administration Slide #28 10
Application: Electronic Mail
Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-
More informationHow Internet Works
How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If
More informationSimple Network Management Protocol (SNMP)
Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed
More information. SMTP, POP, and IMAP
E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters
More informationDebian/GNU Linux Mailing
Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Mailing 1/67 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 TB-Preferences 7
More informationInternet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol
More informationDNS and SMTP. James Walden CIT 485: Advanced Cybersecurity. James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31
DNS and SMTP James Walden CIT 485: Advanced Cybersecurity James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31 Table of contents 1. DNS 2. DNS Protocol Packets 3. DNS Caching 4. DNS Cache Poisoning
More informationDebian/GNU Linux Mailing
Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei November 15, 2010 Károly Erdei Debian/GNU Linux Mailing 1/43 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Links Károly Erdei
More informationSimple Network Management Protocol (SNMP)
Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed
More informationCOSC 301 Network Management. Lecture 14: Electronic Mail
COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How
More informationMail System. chenshh
Mail System chenshh Mail System What behinds the scene when you send an email? Gmail 2 NCTU-CS Mailbox Mail System What behinds the scene when you send an email? Gmail Servers CS Mail Servers Internet
More informationis still the most used Internet app. According to some studies around 85% of Internet users still use for communication.
1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a
More informationSMTP. George Porter CSE 124 February 12, 2015
SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,
More informationProtocols and Software. Nixu Ltd.
E-mail Protocols and Software Nixu Ltd. CONTENTS SMTP Interaction with DNS Sendmail IMAP and POP MIME Spam Nixu Ltd. 2/39 E-mail Protocols and Software History In the dawn of times (= before Internet)
More informationElectronic mail, usually called , consists of simple text messages a piece of text sent to a recipient via the internet.
1 Electronic Mail Electronic mail, usually called e-mail, consists of simple text messages a piece of text sent to a recipient via the internet. E-mail Clients To read e-mail, we use an e-mail client,
More informationThe Application Layer: & SMTP
The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,
More informationInternet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University
More informationComponents of an (1)
E-Mail System 2 Components of an E-Mail (1) Three major components The envelope Invisible to users Determine where the message should be delivered, or to whom it should be returned The headers Information
More informationMail agents. Introduction to Internet Mail. Message format (1) Message format (2)
Introduction to Internet Mail Noah Sematimba Based on Materials by Philip Hazel. Mail agents MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
More informationApplication Inspection and Control for SMTP
Application Inspection and Control for SMTP First Published: July 11, 2008 Last Updated: July 11, 2008 The Application Inspection for SMTP feature provides an intense provisioning mechanism that can be
More informationAka (or according to Knuth) Karst Koymans. Friday, September 25, 2015
.. Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 15.4, 2015/09/28 11:43:08 UTC) Friday, September 25, 2015 Karst Koymans
More informationDebian/GNU Linux Mailing
Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei December 9, 2009 Károly Erdei Debian/GNU Linux Mailing 1/46 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Domain Name System
More informationObjectives CINS/F1-01
Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.
More informationECE 435 Network Engineering Lecture 6
ECE 435 Network Engineering Lecture 6 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 20 September 2018 HW#2 was due. Announcements HW#3 will be posted a bit different. Encryption
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationElectronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
More informationAka (or according to Knuth) Karst Koymans. Tuesday, September 27, 2016
.. Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 16.5, 2016/10/05 12:42:51 UTC) Tuesday, September 27, 2016 Karst Koymans
More informationIntroduction to Internet Mail. Philip Hazel. University of Cambridge Computing Service. Mail agents
Introduction to Internet Mail Philip Hazel University of Cambridge Computing Service MUA = Mail User Agent Mail agents Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Mulberry,
More informationInternet Electronic Mail
Internet Electronic Mail Antonio Carzaniga Faculty of Informatics University of Lugano March 9, 2010 Outline General concepts Transport protocol: SMTP Basic message format MIME format A Postal Service
More informationSystem: Basic Functionality
E-mail System: Basic Functionality E-mail systems support five basic functions: Composition: Creating messages Transfer: Moving messages from the originator to the recipient E-mail transfer is a connection-oriented
More informationElectronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur
Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple
More informationThis material is based on work supported by the National Science Foundation under Grant No
This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the
More informationElectronic Mail Paradigm
Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.
More informationCS 43: Computer Networks. 12: and SMTP September 28, 2018
CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s
More informationCompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network
More informationCSC 4900 Computer Networks:
CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols
More informationLecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1
Lecture 25 Reminders: Homework 7 due today. Homework 8 posted. Due at the beginning of the last day of class for final exam review. Programming Project 6 posted. Final project worth double. Due by 4:30pm,
More informationNetwork Working Group Request for Comments: 1844 Obsoletes: 1820 August 1995 Category: Informational
Network Working Group E. Huizer Request for Comments: 1844 SURFnet bv Obsoletes: 1820 August 1995 Category: Informational Status of this Memo Multimedia E-mail (MIME) User Agent checklist This memo provides
More informationApplications & Application-Layer Protocols: FTP and (SMTP & POP)
COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their
More information. indigoo.com INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R.
EMAIL INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET Peter R. Egli INDIGOO.COM 1/35 Contents 1. EMail Electronic Mail RFC821/RFC822 2. Email Elements 3. Email Message 4. Email Transfer with SMTP
More informationFTP. FTP offers many facilities :
FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP
More informationBasics BUPT/QMUL
Email Basics BUPT/QMUL 2017-05-08 Agenda Brief introduction to email Components of email system Email Standards Summary 2 Brief Introduction To Email 3 What is Email? Electronic Mail (email, e-mail) Provides
More informationElectronic Mail. Electronic Mailboxes
Electronic Mail E-mail belongs to the Application Layer Has been around since the early 80 s Enables new forms of interaction Fast Automatic processing (sorting, reply) Can carry other content Electronic
More informationElectronic Mail (SMTP)
Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,
More informationWWW: the http protocol
Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC
More informationNetwork Applications Electronic Mail
Network Applications Electronic Mail The OSI way to do this is specified in X.400 (84 & 88) Overall Architecture UA P3 UA MS P7 P1 MTS At the core of the X.400 Message Handling System (MHS) is the Message
More informationNetwork Services, VU 2.0
Network Services, VU 2.0 Email (SMTP, POP3, IMAP) News Dipl.-Ing. Johann Oberleiter Institute for Informationsystems, Distributed Systems Group Agenda Mail general info SMTP (Simple Mail Transfer Protocol)
More informationBasics BUPT/QMUL
Email Basics BUPT/QMUL 2014-04-28 Agenda Brief introduction to email Components of email system Email Standards Summary 2 Brief Introduction To Email 3 What is Email? Electronic Mail (email, e-mail) Provides
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationInvestigating . Tracing & Recovery
Investigating Email Tracing & Recovery Overview Email has become a primary means of communication. Email can easily be forged. Email can be abused Spam Aid in committing a crime Threatening email, Email
More informationThe Application Layer: SMTP, FTP
The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)
More informationApplication Layer Services Omer F. Rana. Networks and Data Communications 1
Application Layer Services Omer F. Rana Networks and Data Communications 1 Application Layer Protocols Distinction between Network Application and an Application-Layer Protocol an Application-layer Protocol
More informationAgenda. What is ? Brief Introduction To . History Of . Components Of System. Basics
Agenda Email Basics BUPT/QMUL 2012-04-09 Brief introduction to email Components of email system Email Standards Summary Refer to Chapter 27, textbook 2 Brief Introduction To Email 3 What is Email? Electronic
More informationIntegration Guide Xura Messaging SMTP- Interface
Integration Guide Xura Messaging SMTP- Interface Version 1.3.0 Content is subject to change Xura Secure Communications GmbH Tel.: +49 89 201 727 0 e-mail.: asc-support@xura.com All rights reserved. This
More informationElectronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol
SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail
More informationSCS3004 Networking Technologies Application Layer Protocols
SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:
More informationCSN09101 Networked Services. Module Leader: Dr Gordon Russell Lecturers: G. Russell
CSN09101 Networked Services Week 11: Email Management Module Leader: Dr Gordon Russell Lecturers: G. Russell This lecture SMTP Linux Email Discussions SMTP SMTP Email is send between source and destination
More informationWhat is ? TCP/IP Standard Applications for Electronic Mail. Agenda. History
What is E-Mail? TCP/IP Standard Applications for Electronic Mail Email, SMTP, POP, IMAP, MIME E-Mail (or "email") is the most widely used Internet application Note: email was one of TCP/IP's keys to success:
More informationChapter 20 SMTP. Slides from TCP/IP - Forouzan. User Agent (UA) Addressing Delayed Delivery Aliases Mail Transfer Agent (MTA) MIME POP.
Chapter 20 SMTP User Agent () Addressing Delayed Delivery Aliases Mail Transfer Agent () MIME POP 20-1 Figure 20-1 SMTP concept User User SMTP client TCP ephemeral port SMTP server TCP well-known port
More informationFTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks
TDTS0: Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se FTP Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides
More informationOutline. EEC-484/584 Computer Networks. Slow Start Algorithm. Internet Congestion Control Algorithm
EEC-484/584 Computer Networks Lecture 19 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline TCP slow start and congestion avoidance The
More informationLecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 7 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts
More informationInternet Technology 2/10/2016
Internet Technology 03r. Application layer protocols: email Email: (Simple Mail Transfer Protocol) Paul Krzyzanowski Rutgers University Spring 2016 1 2 Simple Mail Transfer Protocol () Protocol defined
More informationEnterprise Mail Servers: Part I Incoming Mail
BY ADAM THORNTON Enterprise Mail Servers: Part I Incoming Mail Setting Up Sendmail Using M4 Macros As this series demonstrates, Linux plays an important role in implementing mail infrastructures for an
More informationFortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional
Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email
More informationanti-spam techniques beyond Bayesian filters
anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based
More informationLecture 6: Application Layer Web proxies, , and SMTP
Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationChapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1
Chapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 26-1 REMOTE LOGGING It would be impossible
More informationInformation Network Systems The application layer. Stephan Sigg
Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012 Introduction 04.10.2012 Introduction to the internet 11.10.2012 The link layer 18.10.2012 The network layer 25.10.2012
More informationApplications FTP. FTP offers many facilities :
Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationing With PHP History of Applications or Use
Emailing With PHP What is Email? E mail, short for electronic mail and often abbreviated to e mail, email or simply mail, is a store and forward method of composing, sending, receiving and storing messages
More informationMail Protocol, Postfix and Mail security
Mail Protocol, Postfix and Mail security How Email Appears to Works How Email Really Works Message Format Envelop Routing information for the "postman" Message Header Sender Recipients (simple, lists,
More informationECE697AA Lecture 2. Today s lecture
ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo
More informationNetwork Working Group. Category: Standards Track January 1996
Network Working Group K. Moore Request for Comments: 1891 University of Tennessee Category: Standards Track January 1996 Status of this Memo SMTP Service Extension for Delivery Status Notifications This
More informationCIT 470: Advanced Network and System Administration. Topics. Workstation Management. Workstations
CIT 470: Advanced Network and System Administration Workstations CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Machine Lifecycle 2. Automated Installs 3. Updates 4. Network Configuration
More informationCIT 470: Advanced Network and System Administration. Topics. Why Document. Documentation
CIT 470: Advanced Network and System Administration Documentation CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Why document 2. How to document 3. External documentation 4. Man
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network
More informationOverview. Electronic mail. History Format of . Sending . Retrieving . RFC 822, MIME, addresses SMTP, DNS. POP, IMAP, Web-based
Electronic Mail Electronic mail History Format of email Overview RFC 822, MIME, email addresses Sending email SMTP, DNS Retrieving email POP, IMAP, Web-based 2 Flashback to the 70s ARPANET just recently
More informationCiphermail Webmail Messenger Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login
More informationWho s Marcus? mail() 2008 Marcus Bointon
1 Who s Marcus? Programming since 1982 Years of multimedia production for CD-ROM In PHP since 2001 Technical Director of Synchromedia Ltd Sole architect and coder of Smartmessages.net Delivering around
More informationTable of Contents. Electronic mail. History of (2) History of (1) history. Basic concepts. Aka (or according to Knuth)
Table of Contents Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans Informatics Institute University of Amsterdam (version 17.7, 2017/10/03 11:29:40 UTC) Friday, September 29, 2017
More informationSynology MailPlus Server Administrator's Guide. Based on MailPlus Server 1.4.0
Synology MailPlus Server Administrator's Guide Based on MailPlus Server 1.4.0 Table of Contents Chapter 1: Introduction Chapter 2: Getting Started with MailPlus Server Connect Synology NAS to the Internet
More informationSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol What is SMTP? SMTP stands for Simple Mail Transfer Protocol. This protocol allows transmitting electronic mail over the Internet or any other network. The protocol itself
More informationVeritas Enterprise Vault Setting up SMTP Archiving 12.2
Veritas Enterprise Vault Setting up SMTP Archiving 12.2 Veritas Enterprise Vault: Setting up SMTP Archiving Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved.
More informationOutline. Tools
E-mail Tools 1 Outline Goals and Objectives Topics Headlines Introduction Communication Protocols Content, Attachments, and Etiquette Acronyms and Emoticons E-mail clients and Webbased E-mail Eudora Outlook
More informationNetwork Encryption Methods
Network Encryption Network Encryption Methods CSC362, Information Security Objectives understanding the impact of employing encryption at different protocol layers application layer encryption transport
More informationInternet Mail: The SMTP Model
Internet Mail: The SMTP Model User File System Sender- SMTP SMTP Commands Replies Receiver- SMTP File System Simple Mail Transfer Protocol (SMTP) to transfer e-mails Depending on the operating system,
More informationChapter 2: Application layer
Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with TCP 2.8 Socket
More informationLinux Education. E mail
Linux Education E mail How E mail Works An e mail message passes through several steps from source to destination How E mail Works MUA mail user agent composes/reads mail MSA mail submission agent submits
More informationWhat is ? A method of composing, sending, and receiving messages over electronic communication systems. Internet addresses
Communication over the Internet E-mail MIME Newsgroup Netiquette Instant Messenger Internet Telephony What is e-mail? A method of composing, sending, and receiving messages over electronic communication
More informationProtocols. Networking CS 3470, Section 1 Sarah Diesburg
Protocols Networking CS 3470, Section 1 Sarah Diesburg Applications Applications need their own protocols Just like we are writing our network programs with a certain specification so that any two randomly-chosen
More informationChapter 2 Application Layer
Chapter 2 Application Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Application Layer 1 Chapter 2: Application layer 2.1 Principles
More informationLab 3.4.3: Services and Protocols
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5
More informationContents. Management. Client. Choosing One 1/20/17
Contents Email Management CSCU9B2 Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP, HTTP,
More informationWeek 3: . Johan Bollen Old Dominion University Department of Computer Science
Week 3: E-mail Johan Bollen Old Dominion University Department of Computer Science jbollen@cs.odu.edu http://www.cs.odu.edu/ jbollen September 11, 2003 Page 1 Demo SSH Not always available on windows machines:
More informationEnterprise Vault Setting up SMTP Archiving 12.3
Enterprise Vault Setting up SMTP Archiving 12.3 Enterprise Vault : Setting up SMTP Archiving Last updated: 2018-03-29. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas,
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More informationAnti-Spam. Overview of Anti-Spam Scanning
This chapter contains the following sections: Overview of Scanning, on page 1 How to Configure the Appliance to Scan Messages for Spam, on page 2 IronPort Filtering, on page 3 Cisco Intelligent Multi-Scan
More informationVeritas Enterprise Vault Setting up SMTP Archiving 12.1
Veritas Enterprise Vault Setting up SMTP Archiving 12.1 Veritas Enterprise Vault: Setting up SMTP Archiving Last updated: 2017-07-28. Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved.
More information