` ` Alice’s Mail Provider Bob’s Mail Provider Architecture Mary

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

PGP Overview 2004/11/30 Information-Center meeting peterkim.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Computer Networks An Overview. A Computer Network!
Lesson 7: Business, , & Personal Information Management
CSCI 530L Public Key Infrastructure. Who are we talking to? Problem: We receive an . How do we know who it’s from? address Can be spoofed.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
Chapter 2: Application layer  2.1 Web, HTTP and HTML (We will continue…)  2.2 FTP  2.3 SMTP 9/22/2009 Lecture 7, MAT 279, Fall
2440: 141 Web Site Administration Services Instructor: Enoch E. Damson.
Mail Server Fitri Setyorini. Content SMTP POP3 How mail server works IMAP.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Application Layer Chapter
Mail Server Setup MAIL SERVER SETUP.
Mail Server Three major components MTA MUA MDA Mail Transfer Agent
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
© 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer.
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Masud Hasan Secue VS Hushmail Project 2.
Webmail. Agenda Why use webmail? Why use webmail? What is webmail What is webmail – basic » system MDA MDA MTA MTA MUA MUA »Protocol SMTP SMTP.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
How to use the right way ^ securely. Disclaimer  /me is not Mac literate Ask Ryan ;-)  Things may go wrong Grab the back of your pants and let’s.
Mail Service Mail Service using Postfix Campus-Booster ID : **XXXXX
Thornbury U3A Computer Club – Mike Farquhar July 2014.
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
1 COP 4343 Unix System Administration Unit 14: – send and receive mail – mail filtering – mail server – mailing lists.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
Firefox Browser Firefox Browser and Extensions Thunderbird (maybe) Danbury Area Computer Society October 3, 2006 Jim Scheef, Immediate Past President.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
1 Architecture 2 User Agent 3 Message Transfer Agent 4 Message Access Agent 5 MIME 6 Web-Based Mail 7 Electronic Mail Security.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
101 Derek Carter
Secure .
Contents Spelling Origin of Operation Message Format
concepts & protocols
Chapter 5a - Pretty Good Privacy (PGP)
Key management issues in PGP
Internet Business Associate v2.0
PGP Key Management Basic Principals
Development of Web Applications - Introduction
Protocols and networks in the TCP/IP model initially.
PGP Key Management Basic Principals
Misc. Security Items.
CIW Lesson 7 Part A Name: _______________________________________
Implementing POP3 and IMAP4 Using Dovecot
CIT 383: Administrative Scripting
asymmetric cryptography
An Installation Guide of PGP on Windows 2000
Protocols 2 Key Revision Points.
PGP Key Management Basic Principles
Unit 8 Network Security.
Chapter 7 Network Applications
Chapter 2 Application Layer
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
The new EDAMIS and its security
Presentation transcript:

` ` Alice’s Mail Provider Bob’s Mail Provider Email Architecture Mary Maxwell Mailbox Mailbox IMAP Server SMTP Server Malcolm SMTP Server IMAP Server Melissa Michael ` ` Mail Client Mail Client Bob Alice

` ` Alice’s Mail Provider Bob’s Mail Provider Email Architecture Webmail Edition Mary Maxwell Mailbox Mailbox IMAP Server SMTP Server Malcolm SMTP Server IMAP Server Webmail Client Webmail Client Michael Melissa ` ` Web Browser Web Browser Bob Alice

Some Acronyms SMTP: Simple Mail Transport Protocol Used to submit email to SMTP server Also used by SMTP servers to relay mail between each other Example SMTP servers: Postfix, Exim, Courier IMAP: Internet Message Access Protocol Used by mail clients to access mailbox Example IMAP servers: eg Dovecot, Cyrus, Courier Mail Client: eg Thunderbird (fetches mail from IMAP or POP server and displays it to user) Used by humans to send and read email POP3: Post Office Protocol version 3 IMAP and POP3 traditionally do the same job in a different way They have evolved to have largely the same features MTA: Mail Transport Agent (ie SMTP server) MDA: Mail Delivery Agent (takes mail from MTA and delivers it to the mailbox) PGP: Pretty Good Privacy The standard for encrypting and decrypting data GPG or GnuPG: GNU Privacy Guard A program which implements the PGP standard Enigmail: Extension for Thunderbird for PGP

Amy Anne Bob Alice

Bob’s Public Key PGP Encryption Bob’s Private Key

Bob’s Private Key PGP Signing Bob’s Public Key

https://emailselfdefense.fsf.org Install Thunderbird (called IceDove on Debian) Configure your email account Install Thunderbird Extension Enigmail Install GnuPG (version 1 or 2) if not already installed Create PGP keys Open Thunderbird, Select Enigmail → Key Management → Generate → New Key Pair Select the email account Input a passphrase Select desired key expiry Click Generate Key Do other stuff on the computer to generate some randomness required for key generation Generate revokation certificate

License: CC-BY-SA 3.0 Australia Clipart from: openclipart.org By: David Joshua Geary License: CC-BY-SA 3.0 Australia Clipart from: openclipart.org Clipart license: CC0 1.0 Universal Made with: Libreoffice With special thanks to: Robert – for encouragement Terence – for aesthetics SLUG attendees

https://blog.activeneutral.org/2016-11-07.html