POP3 Post Office Protocol v.3. Intro The Post Office Protocol (POP) is currently the most popular TCP/IP e-mail access and retrieval protocol. It implements.

Slides:



Advertisements
Similar presentations
Securing Bruce Maggs. Separate Suites of Protocols Protocols for retrieving POP, IMAP, MAPI (Microsoft Exchange) Protocols for sending
Advertisements

Trivial Protocols CS-328 Dick Steflik. What’s a Protocol The rules that govern the exchange of information between to hosts –when a dignitary visits a.
By: E. Susheel Chandar M. Guna Sekaran Intranet Mail Server.
INTRANET MAIL SERVER (DESIGN OF SMTP and POP3)
1 Electronic Mail u Three major components: u user agents u mail servers u simple mail transfer protocol: SMTP u User Agent u a.k.a. “mail reader” u composing,
Electronic Mail and SMTP
Simple Mail Transfer Protocol (SMTP) CS-328 Dick Steflik.
Implementing Application Protocols. Overview An application protocol facilitates communication between applications. For example, an client uses.
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Simple Mail Transfer Protocol
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Mail Server Fitri Setyorini. Content SMTP POP3 How mail server works IMAP.
Lecturer : Ms.Trần Thị Ngọc Hoa Chapter 8 File Transfer Protocol – Simple Mail Transfer Protocol.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Electronic Mail (SMTP, POP, IMAP, MIME)
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Mail Services.
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
TEST SUITE DEVELOPMENT FOR CONFORMANCE TESTING OF PROTOCOLS Anastasia Tugaenko Scientific Adviser: Nikolay Pakulin, PhD Institute for System Programming.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
( Post Office Protocol - Version 3 ) POP3 RFC 1939 報告學生 : 駱正哲.
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Application Protocols: ELECTRONIC MAIL (SMTP, POP) CSNB534 Semester 2, 2007/2008 Asma Shakil.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Sending and Receiving Mails
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
POP3
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Securing Bruce Maggs. Separate Suites of Protocols Protocols for retrieving POP, IMAP, MAPI (Microsoft Exchange) Protocols for sending
Chapter 16: Distributed Applications Business Data Communications, 4e.
ColdFusion Foundations: POP3 Mosh Teitelbaum evoch, LLC.
P.O.P. A presentation brought to you by Thomas. Topics Introduction General Information Area of use Functionality The alternative way POP3 vs. IMAP Conclusion.
SMTP - Simple Mail Transfer Protocol RFC 821
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Post Office Protocol.
CS440 Computer Networks 1 Neil Tang 12/01/2008.
More TCP/IP Protocols Chapter 6. TCP Transmission Control Protocol Connection-oriented Provides flow control Sequencing (putting the segments back in.
COMP 431 Internet Services & Protocols
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
Network Programming 10- SMTP-POP3
Securing Bruce Maggs.
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Remote Logging, Electronic Mail, and File Transfer
Instructor Materials Chapter 5 Providing Network Services
Securing Bruce Maggs.
Secure Sockets Layer (SSL)
Securing Bruce Maggs.
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
CIT 383: Administrative Scripting
Working at a Small-to-Medium Business or ISP – Chapter 7
ColdFusion Foundations: POP3
Remote Logging, Electronic Mail,
Chapter 7 Network Applications
Securing Bruce Maggs.
Securing Bruce Maggs.
Presentation transcript:

POP3 Post Office Protocol v.3

Intro The Post Office Protocol (POP) is currently the most popular TCP/IP access and retrieval protocol. It implements the offline access model, allowing users to retrieve mail from their SMTP server and use it on their local client computers. It is specifically designed to be a very simple protocol and has only small number of commands. The current revision of POP is version 3, and the protocol is usually abbreviated POP3 for that reason. There are some implementations of POP that attempt to implement the disconnected access model, with limited success. More often, however, IMAP is used for this purpose, since it is better suited to that access model.

POP3 General Operation POP3 is a client/server protocol that is described using a simple linear sequence of states. A POP3 session begins with a POP3 client making a TCP connection to a POP3 server, at which point the session is in the Authorization state. After successful authentication, the session moves to the Transaction state, where the client can perform mail access transactions. When it is done, the client ends the session and the Update state is entered automatically, where cleanup functions are performed and the POP3 session ended.

Session States

Authorization State: The server provides a greeting to the client to indicate that it is ready for commands. The client then provides authentication information to allow access to the user's mailbox. Transaction State: The client is allowed to perform various operations on the mailbox. These include listing and retrieving messages, and marking retrieved messages for deletion. Update State: When the client is done with all of its tasks and issues the QUIT command, the session enters this state automatically, where the server actually deletes the messages marked for deletion in the Transaction state. The session is then concluded and the TCP connection between the two terminated.

POP3 Authorization State

Standard POP3 Authentication The normal method of authorization in POP3 is a standard “username / password” login. First the client issues a USER command along with the user's mailbox name (his or her user name or address). The server responds with an intermediate acknowledgment. The client then uses the PASS command to send the user's password. Assuming the login is valid, the server responds to the client with an acknowledgment that indicates successful authentication. The response will also typically specify the number of messages waiting for the user in the mailbox If authorization is successful, the POP3 session transitions to the Transaction state. If the user name or password are incorrect, an error response is given and the session cannot proceed.

Alternative Authentication Using APOP Since user/password authorization is considered by many people to be insufficient for the security needs of modern internetworks, the POP3 standard also defines an alternative authentication method, using the APOP command. This is a more sophisticated technique based on the MD5 “message digest” encryption algorithm. If the server supports this technique, in its opening greeting it provides a string indicating a timestamp that is unique for each POP3 session. The client then performs an MD5 calculation using this timestamp value and a “shared secret” known by the server and client. The result of this calculation is included in the client's APOP command. If it matches the server's calculation, authentication is successful; otherwise the session remains in the Authorization state.

POP3 Transaction State Typical POP3 Mail Exchange Sequence The Transaction state is relatively “unstructured” in that commands do not need to be issued in any particular order to meet the requirements of the standard. However, there is a natural progression to how a mailbox is retrieved, and that means the commands are usually used in the following way: 1.The client issues a STAT command to see the number of messages in the mailbox. 2.The client issues a LIST command and the server tells it the number of each message to be retrieved. 3.The client issues a RETR command to get the first message and if successful, marks it for deletion with DELE. The client uses RETR/DELE for each successive message.

Typical POP3 Mail Exchange Sequence

POP3 Update State When the POP3 client is done with its transactions, it issues the QUIT command. This causes the Update state to be automatically entered, where the server performs necessary clean-up operations, including deleting any messages marked for deletion in the Transaction state.

S: C: S: +OK POP3 server ready C: APOP mrose c4c9334bac560ecc979e58001b3e22fb The client may instead use USER and PASS --> C: USER mrose S +OK User accepted C: PASS mrosepass S +OK Pass accepted S: +OK mrose's maildrop has 2 messages (320 octets) C: STAT S: +OK C: LIST S: +OK 2 messages (320 octets) S: S: S:. C: RETR 1 S: +OK 120 octets S: S:. C: DELE 1 S: +OK message 1 deleted C: RETR 2 S: +OK 200 octets S: C: DELE 2 S: +OK message 2 deleted C: QUIT S: +OK dewey POP3 server signing off (maildrop empty) C: S:

References PostOfficeProtocolPOPPOP3.htmhttp:// PostOfficeProtocolPOPPOP3.htm