LinxChix Email And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,

Slides:



Advertisements
Similar presentations
Protocols and Troubleshooting Brandon Checketts.
Advertisements

SMTP – Simple Mail Transfer Protocol
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Chapter 30 Electronic Mail Representation & Transfer
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Dave Roberts.  Dynamic Host Configuration Protocol  DHCP  Simple Mail Transport Protocol  SMTP 2.
SMTP Simple Mail Transfer Protocol. Content I.What is SMTP? II.History of SMTP III.General Features IV.SMTP Commands V.SMTP Replies VI.A typical SMTP.
Simple Mail Transfer Protocol
2440: 141 Web Site Administration Services Instructor: Enoch E. Damson.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
Electronic Mail: SMTP, POP, and IMAP
Introduction to Internet Mail Noah Sematimba Based on Materials by Philip Hazel.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Electronic Mail (SMTP, POP, IMAP, MIME)
1 Introduction AfNOG CHIX 2011 Blantyre, Malawi By Evelyn NAMARA.
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Mail Server Three major components MTA MUA MDA Mail Transfer Agent
Mail Services.
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
1 北區機房 IP 維運處暨 IDC 維運組 鄭任峰 郵件系統維運 課程 : Sendmail 與 postfix 的設定與比較 北區機房 IP 維運處暨 IDC 維運組 鄭任峰.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
1 Applications Electronic Mail. 2 Electronic Mail Many user applications use client-server architecture. Electronic mail client accepts mail.
Electronic Mail. Familiar to most of us 4 What are the functions we expect? –Outgoing mail Compose send –compress –encrypt –Incoming Mail read forward.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
Sending and Receiving Mails
Simple Mail Transfer Protocol (SMTP)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
Introduction to Internet Mail Abridged & Updated by Hervey Allen Noah Sematimba Based on Materials by Philip Hazel.
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
SMTP – Simple Mail Transfer Protocol
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
File Transfer Protocol (FTP)
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
1 and Exim Introduction AfNOG 2012 Serekunda, The Gambia Chimwemwe Fredrick.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
SMTP - Simple Mail Transfer Protocol RFC 821
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
concepts & protocols
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Networking Applications
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
SMTP, POP3, IMAP.
Social Media And Global Computing Sending
Chapter 2: Application layer
William Stallings Data and Computer Communications
Chapter 2 Application Layer
Presentation transcript:

LinxChix And Exim

Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,  Mulberry, Pegasus, Simeon, Netscape, Outlook,... Multiple MUAs on one system - end user choice MTA = Mail Transfer Agent Receives and delivers messages  Sendmail, Smail, PP, MMDF, Charon, Exim, qmail,  Postfix,... One MTA per system - sysadmin choice

Message format (1)  From: Philip Hazel  To: Julius Caesar  Cc: Mark Anthony  Subject: How Internet mail works  Julius,  I'm going to be running a course on... Format was originally defined by RFC 822 in 1982 Now superseded by RFC 2822 Message consists of  Header lines  A blank line  Body lines

Message format (2) An address consists of a local part and a domain  A basic message body is unstructured Other RFCs (MIME, 2045) add additional headers which define structure for the body MIME supports attachments of various kinds and in various encodings Creating/decoding attachments is the MUA's job

Folders log in MTA MUA Spool Mailbo x Folders MTA Spool MTA MUA Spool Mailbo x Folders SMTP POP / IMAP Ser­ ver SMTP

A message in transit (3) A message is transmitted with an envelope:  MAIL FROM:  RCPT TO: The envelope is separate from the RFC 2822 message Envelope (RFC 2821) fields need not be the same as the header (RFC 2822) fields MTAs are (mainly) concerned with envelopes  Just like the Post Office... Error (“bounce”) messages have null senders  MAIL FROM:<>

An SMTP session (1)  telnet relay.ancient-rome.net 25  220 relay.ancient-rome.net ESMTP Exim...  EHLO taurus.cus.cam.ac.uk  250-relay.ancient-rome.net...  250-SIZE  250-PIPELINING  250 HELP  MAIL FROM:  250 OK  RCPT TO:  250 Accepted  DATA  354 Enter message, ending with “.”  Received: from...  (continued on next slide)

An SMTP session (2)  From:...  To:...  etc... .  250 OK id=10sPdr-00034H-00  quit  221 relay.ancient-rome.net closing conn... SMTP return codes  2xx OK  3xx send more data  4xx temporary failure  5xx permanent failure

forgery It is trivial to forge unencrypted, unsigned mail This is an inevitable consequence when the sender and recipient hosts are independent It is less trivial to forge really well! Most SPAM usually contains some forged header lines Be alert for forgery when investigating

Use of the DNS for (1) Two DNS record types are used for routing mail Mail Exchange (MX) records map mail domains to host names, and provide a list of hosts with preferences:  hermes.cam.ac.uk. MX 5 green.csi.cam.ac.uk.  MX 7 ppsw3.csi.cam.ac.uk.  MX 7 ppsw4.csi.cam.ac.uk. Address (A) records map host names to IP addresses:  green.csi.cam.ac.uk. A  ppsw3.csi.cam.ac.uk. A  ppsw4.csi.cam.ac.uk. A

Use of the DNS for (2) MX records were added to the DNS after its initial deployment Backwards compatibility rule:  If no MX records found, look for an A record, and if found, treat as an MX with 0 preference MX records were invented for gateways to other mail systems, but are now heavily used for handling generic mail domains

Routing a message Process local addresses  Alias lists  Forwarding files Recognize special remote addresses  e.g. local client hosts Look up MX records for remote addresses If self in list, ignore all MX records with preferences greater than or equal to own preference For each MX record, get IP address(es)

Delivering a message Perform local delivery For each remote delivery  Try to connect to each remote host until one succeeds  If it accepts or permanently reject the message, that's it After temporary failures, try again at a later time Time out after deferring too many times Addresses are often sorted to avoid sending multiple copies

Relay control Incoming: From any host to specified domains  e.g. incoming gateway or backup MTA Outgoing: From specified hosts to anywhere  e.g. outgoing gateway on local network From authenticated hosts to anywhere  e.g. travelling employee or ISP customer connected to remote network Encryption can be used for password protection during authentication Authentication can also be done using certificates