SMTP By Antoinette Davis.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Lesson 7: Business, , & Personal Information Management
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
POP3 Post Office Protocol v.3. Intro The Post Office Protocol (POP) is currently the most popular TCP/IP access and retrieval protocol. It implements.
Chapter 30 Electronic Mail Representation & Transfer
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Architecture of SMTP, POP, IMAP, MIME.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
1 Application Layer Protocols. 2 Those protocols run on top of/over TCP/IP: Those protocols run on top of/over TCP/IP: TelnetTelnet File Transfer Protocol.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Electronic Mail (SMTP, POP, IMAP, MIME)
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
SMTP, POP3, IMAP.
Mail Services.
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
1 Chinese Information Processing (I): Basic Concepts and Practice Unit 5: Asynchronous Communication.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
1 Applications Electronic Mail. 2 Electronic Mail Many user applications use client-server architecture. Electronic mail client accepts mail.
FTP (File Transfer Protocol) & Telnet
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
Simple Mail Transfer Protocol (SMTP)
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
(or ?) Short for Electronic Mail The transmission of messages over networks.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
1 Blackboard To Log In: Go To: Click On: Login Username: Firstname.Lastname Password: Last 4 digits of S.S. # View often for.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
File Transfer Protocol (FTP)
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
SMTP / MIME Florin Zidaru.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
SMTP - Simple Mail Transfer Protocol RFC 821
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
More TCP/IP Protocols Chapter 6. TCP Transmission Control Protocol Connection-oriented Provides flow control Sequencing (putting the segments back in.
COMP 431 Internet Services & Protocols
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
By Toby Reed.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
© MMII JW RyderCS 428 Computer Networks1 Electronic Mail  822, SMTP, MIME, POP  Most widely used application service  Sometimes only way a person ever.
Network Programming 10- SMTP-POP3
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Networking Applications
SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when is delivered from an client, such as Outlook Express, to an server.
SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when is delivered from an client, such as Outlook Express, to an server.
THE BASICS.
Chapter 6: Distributed Applications
Topic 5: Communication and the Internet
What is it? Why do I keep getting from Barracuda? SPAM.
HOW DO I KEEP MY COMPUTER SAFE?
William Stallings Data and Computer Communications
Chapter 2 Application Layer
Presentation transcript:

SMTP By Antoinette Davis

What is SMTP? Simple Mail Transfer Protocol A TCP/IP protocol used in sending and receiving email

SMTP Mail Processing Model

What does that mean TONI?! The email address of the originator is always enclosed in angle brackets (“<”and “>”). The SMTP receiver acknowledges the command with a 250 (“OK”) reply message, sometimes sending back the address as a confirmation. For example: 250 <joe@someplace.org>… Sender ok Next, the SMTP sender uses RCPT commands to specify the intended recipients of the e-mail that is being sent. Assuming the server accepts the e-mail, it will give a 250 “OK” reply again, such as this: 250 <jane@somewhereelse.com>… Recipient ok The SMTP sender then issues the DATA command, which tells the SMTP receiver that the message is coming: DATA The SMTP receiver responds with a 354 “intermediate” reply message, such as this: 354 Enter mail, end with “.” on a line by itself

Transaction Example MAIL FROM:<joe@someplace.org> 250 <joe@someplace.org>… Sender ok RCPT TO:<jane@somewhereelse.com> 250 <jane@somewhereelse.com>… Recipient ok DATA 354 Enter mail, end with "." on a line by itself From: Joe Sender <joe@someplace.org> To: Jane Receiver <jane@somewhereelse.com> Date: Sun, 1 Jun 2003 14:17:31 —0800 Subject: Lunch tomorrow Hey Jane, It's my turn for lunch tomorrow. I was thinking we could [rest of message] Hope you are free. Send me a reply back when you get a chance. Joe. . 250 OK

SMTP Limitations Body must be encoded in 7 bit ASCII: no binaries g7 bit = 128 possible characters Images, video, etc, are inherently g8 bit No National Language Characters (8-bit) SMTP servers may have arbitrary size limit SMTP gateways have inconsistent ASCII to EBCDIC Mappings SMTP gateways to X.400 cannot handle non-textual data X.400 is the messaging (notably e-mail) standard specified by the ITU-TS (International Telecommunications Union - Telecommunication Standard Sector).

Because of limitations… it is usually used with one of two other protocols, POP3 or IMAP that let the user save messages in a server mailbox and download them periodically from the server users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail On Unix-based systems, sendmail is the most widely-used SMTP server for e-mail

Sendmail When a sendmail server receives e-mail, it attempts to deliver the mail to the intended recipient immediately and, if the recipient is not present, it queues messages for later delivery However, because it does not provide a mailbox facility and for other reasons, other software such as a POP3 or Internet Message Access Protocol server are also needed Most Internet service providers provide both an SMTP server (such as sendmail) and a POP or IMAP server.

POP3 POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server POP3 is designed to delete mail on the server as soon as the user has downloaded it some implementations allow users or an administrator to specify that mail be saved for some period of time

IMAP IMAP (Internet Message Access Protocol) is a standard protocol for accessing e-mail from your local server IMAP (the latest version is IMAP Version 4) is a client/server protocol in which e-mail is received and held for you by your Internet server. You (or your e-mail client) can view just the heading and the sender of the letter and then decide whether to download the mail. You can also create and manipulate multiple folders or mailboxes on the server, delete messages, or search for certain parts or an entire note. IMAP requires continual access to the server during the time that you are working with your mail.

POP3 vs IMAP less sophisticated protocol is Post Office Protocol 3 (POP3). With POP3, your mail is saved for you in a single mailbox on the server. When you read your mail, all of it is immediately downloaded to your computer and, except when previously arranged, no longer maintained on the server. IMAP provides the user more capabilities for retaining e-mail on the server and for organizing it in folders on the server. IMAP can be thought of as a remote file server. POP3 can be thought of as a "store-and-forward" service.

How the SMTP, POP3, and IMAP relate POP and IMAP deal with the receiving of e-mail and are not to be confused with the Simple Mail Transfer Protocol (SMTP), a protocol for transferring e-mail across the Internet. You send e-mail with SMTP and a mail handler receives it on your recipient's behalf. Then the mail is read using POP or IMAP.

Think you can trust unsigned email. Think again Think you can trust unsigned email? Think again. Here's how easy it is to spoof SMTP mail on some servers: C:\>telnet whatever.com 25 Connected to whatever.com. Escape character is '^]'. 220 whatever.com ESMTP Exim 4.20 Tue, 15 Jul 2003 14:09:37-0700 MAIL FROM: <god@heaven.com> 250 OK RCPT TO: <scott@wannabe.guru.org> 250 Accepted DATA 354 Enter message, ending with "." on a line by itself Subject: a message from God Don't fake any more email or I'll send you to hell. . 250 OK id=19cX3k-0000Cw-Mm QUIT 221 whatever.com closing connection Connection closed by foreign host.

Email Spoofing Email spoofing may occur in different forms, but all have a similar result: a user receives email that appears to have originated from one source when it actually was sent from another source. Email spoofing is often an attempt to trick the user into making a damaging statement or releasing sensitive information (such as passwords).

How Spoofing can affect security.. email claiming to be from a system administrator requesting users to change their passwords to a specified string and threatening to suspend their account if they do not do this email claiming to be from a person in authority requesting users to send them a copy of a password file or other sensitive information

Step 1 A mail spoofer connects (either directly or indirectly) to the victim mail server and begins to deliver mail normally. Once accepted by the Victim Mail Server, the mail spoofer provides a false (or possibly blank ) MAIL FROM command to the mail server. In the example, MAIL FROM: indicates a fake address and domain.

Step 2 The Victim Mail Server accepts the false MAIL FROM command and continues to accept delivery. At this point the mail spoofer provides a destination address (or addresses) and proceeds to the DATA portion of the email transaction. In the example, the mail spoofer sends email with a fake address and domain, which is accepted by the Victim Mail Server. The acceptance is due to the previous acceptance of the mail spoofer. In the DATA portion of the email transaction, the spoofer provides false FROM: information (which will be displayed in the email client of our victim).

Step 3 The spoofer may at this point continue with mail delivery as normal, delivering any number of negative payloads to the victim(s)

Who uses email spoofing? Mail spoofing, when performed for malicious reasons, is used mostly by spammers as a method of delivering malicious payloads (viruses, worms, etc.) to unsuspecting victims

What Can you Do to Protect Yourself from Spoofing Theft DON'T click on the link in an email that asks for your personal information. If someone contacts you and says you’ve been a victim of fraud, verify the person’s identity before you provide any personal information. Be suspicious if someone contacts you unexpectedly and asks for your personal information. Act immediately if you’ve been hooked by a phisher. Review credit card and bank account statements as soon as you receive them to determine whether there are any unauthorized charges. Stay educated of latest spoofing techniques

Cites Used SMTP: http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol#Mail_processing_model SMTP: http://searchexchange.techtarget.com/definition/SMTP POP3: http://searchexchange.techtarget.com/definition/POP3 IMAP: http://searchexchange.techtarget.com/definition/IMAP Model: http://www.tcpipguide.com/free/t_SMTPMailTransactionProcess-3.htm

Limitations: http://www.soi.wide.ad.jp/class/20000009/slides/11/8.html Sendmail: http://searchenterpriselinux.techtarget.com/definition/sendmail Spoofing: http://www.cert.org/tech_tips/email_spoofing.html http://www.symantec.com/business/support/index?page=content&id=TECH82284 Prevention: http://www.consumerfraudreporting.org/spoofing.php