Simple Mail Transfer Protocol (SMTP)

Slides:



Advertisements
Similar presentations
INTRANET MAIL SERVER (DESIGN OF SMTP and POP3)
Advertisements

TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
SMTP – Simple Mail Transfer Protocol
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6: Distributed Applications Business Data Communications, 5e.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Simple Mail Transfer Protocol (SMTP) CS-328 Dick Steflik.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
Simple Mail Transfer Protocol (SMTP) Team: Zealous Team: Zealous Presented By: Vishal Parikh ( ) Vishal Parikh ( ) Ribhu Pathria( )
Architecture of SMTP, POP, IMAP, MIME.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
Electronic Mail (SMTP, POP, IMAP, MIME)
Electronic Mail Security
SMTP, POP3, IMAP.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Application Layer Protocols Simple Mail Transfer Protocol.
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
Simple Mail Transfer Protocol (SMTP)
Electronic mail security. Outline Pretty good privacy S/MIME.
SMTP – Simple Mail Transfer Protocol
File Transfer Protocol (FTP)
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
CSCE 815 Network Security Lecture 11 Security PGP February 25, 2003.
SIMPLE MAIL TRANSFER PROTOCOL. Introduction Simple Mail Transfer Protocol is the standard protocol on the Internet and part of the TCP/IP protocol.
SIMPLE MAIL TRANSFER PROTOCOL PRADEEP KOLLIPARA SANDEEP PINNAMANENI.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
SMTP - Simple Mail Transfer Protocol RFC 821
Chapter 16: Distributed Applications Business Data Communications, 4e.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
1 Architecture 2 User Agent 3 Message Transfer Agent 4 Message Access Agent 5 MIME 6 Web-Based Mail 7 Electronic Mail Security.
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
© MMII JW RyderCS 428 Computer Networks1 Electronic Mail  822, SMTP, MIME, POP  Most widely used application service  Sometimes only way a person ever.
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Applications:Electronic Mail (SMTP,POP,IMAP,MIME)
Electronic mail security
Networking Applications
Remote Logging, Electronic Mail, and File Transfer
Security is one of the most widely used and regarded network services
SMTP: simple mail transfer protocol
Networking CS 3470, Section 1 Sarah Diesburg
Secure Sockets Layer (SSL)
Security Pretty Good Privacy (PGP)
Selected Research Topics Electronic Mail Security
Electronic Mail Security
MAIL AND SECURITY PERTEMUAN 13
HTTP Protocol.
Chapter 6: Distributed Applications
Social Media And Global Computing Sending
ELECTRONIC MAIL SECURITY
Chapter 2: Application layer
Networking CS 3470, Section 1 Sarah Diesburg
ELECTRONIC MAIL SECURITY
William Stallings Data and Computer Communications
Remote Logging, Electronic Mail,
Chapter 7 Network Applications
Chapter 2 Application Layer
Electronic Mail Security
Presentation transcript:

Simple Mail Transfer Protocol (SMTP) Team: Zealous Presented By: Vishal Parikh (003749955) Ribhu Pathria(004698318) Deval Dudhia(004692975) Vaibhav Patel(004413124) Jainip Desai (004677635)

Agenda Introduction Format of E-mail Basic SMTP architecture SMTP Communication model Commands of SMTP Session Establishment and Termination SMTP mail transaction process Security Basics PGP-SMIME-PEM Server Authentication Advantages Limitations Special Features Conclusion References

Introduction SMTP stands for Simple Mail Transfer Protocol. MTP preceded SMTP. The Commands of MTP are based directly on those of FTP. What is the need of SMTP ???? Came into existence in 1981 (RFC 780) SMTP is simpler than MTP it replaced. When an e-mail is sent from the sender to receiver, in most cases this involves, the sender machine sends the email to local SMTP sever, which in then sends mail to recipients local SMTP sever, and finally to recipients local machine.

How messages are sent to SMTP server? E-mail communication using Relaying Used during initial days of SMTP. SMTP routing information is included along with E-mail address. Problem with this method. Using DNS This method is used at present. The senders SMTP server makes the use of DNS to find MX record of the domain to which the E-mail is to be sent.

Format of an e-mail Mail is a Text File. Envelope: It contains with sender address, receiver address and other information. Message: It contains Mail Header and Mail Body. Mail Header: It defines the sender, the receiver, the subject of the message and other information Mail Body: It contains the actual information in the message Why to use an envelope if sender and recipient’s email address is already contained in the headers of the message itself?

Basic SMTP Architecture SMTP clients and servers have two main components: User Agents (UA): It prepares a message and encloses in an envelope. Mail Transfer Agents (MTA): It transfers the mail across the internet.

SMTP Communication Model

Commands of SMTP HELO : Request to initiate SMTP session MAIL FROM : Sender’s E-Mail address RCPT TO : Receiver’s E-Mail address DATA : Body of message QUIT : Terminates SMTP connection RSET : Aborts mail transaction VRFY : Asks receiver to verify the validity of the mailbox EXPN : Asks receiver to identify mailing list HELP : Causes receiver to send help information NOOP : Forces server to verify the communication with SMTP receiver

Session Establishment and Termination

SMTP Mail Transaction Process 1. Transaction Initiation and Sender Identification S: HELO sjsu.edu R: 250 Hello sjsu.edu S: MAIL FROM:<cooldd10@yahoo.com> R: 250 Ok 2. Recipient Identification S: RCPT TO:<jainip_1983@gmail.com> R: 250 Ok 3. Mail Transfer S: DATA R: 354 End data with <CR><LF>.<CR><LF> S: <The message data> S:. R: 250 Ok, message accepted for delivery: queued as 12345 S: QUIT R: 221 Bye

Status Codes The Server responds with a three digit code that may be followed by the text info. 2XX – The SMTP server has accepted the command and has completed the request. 3XX - Command is accepted and more information follows. 4XX - Try again later as there was a temporary failure with the command or the server. 5XX – The requested operation will never be completed due to permanent error.

Security Basics

SMTP SECURITY FEATURES ???

NOTHING!!!

PGP-SMIME-PEM C I A PGP: It incorporates mechanisms for authentication, confidentiality, compression, e-mail compatibility and segmentation & reassembly . MAIL & FILE Symmetric encryption-CAST-128, 3-DES, IDEA SHA DSS+ SHA or RSA+SHA SMIME: S/MIME provides the functionality of Enveloped data, signed data, clear signed data and signed and enveloped data. MIME Diffe-Hellman ( Key Exchange) Triple-DES or RC2/40 SHA-1/MD5 SHA-1/MD5 + DSS/RSA PEM: Mechanism of key management for authentication purposes. Text Based DES MD2/MD5 DES+MD5

Authentication for Server

Advantages Very Popular Supported on many platforms Low administration and implementation costs Simple addressing scheme

Limitations Security matters for SMTP are worse. Its usefulness is limited by its simplicity. Transmission of executable files and binary files using SMTP is not possible without converting into text files. Use MIME to send mail in other format. It cannot transmit text data that contains national language characters. These national language characters use 8-bit codes with values of 128 decimal or more. It is limited to 7-bit ASCII characters only. SMTP servers may reject mail messages beyond some specific length.

Special Features Mail Forwarding: SMTP server may agree to accept e-mail for non-local mailbox and forward it to the appropriate destination. Mail Gatewaying: SMTP servers can be implemented as e-mail gateways which can translate TCP/IP email in a suitable form for some another e-mail system and vice-versa. Mail Relaying: SMTP includes the ability to relay mail from one server to another, as explained earlier, provided certain conditions are met. Address Debugging: VRFY command allows the client to ask the sender to verify address of recipient without sending mail to recipient. Mailing List Expansion: EXPN command allows to expand mailing list.

Conclusion SMTP is one of the most widely used and implemented application. With the explosively growing reliance on electronic mail for commercial and personal services, there grows the demand of authentication and confidentiality. To complement the weak security feature of SMTP industry use PGP-SMIME-PEM. Still there is need of implementing the measures to eliminate spam and other security breaches.

References Web Sites: http://www.faqs.org/rfcs/rfc821.html (RFC 821). http://www.tcpipguide.com/free/t_SMTPSpecialFeaturesCapabilitiesandExtensions.html http://cns.utoronto.ca/usg/technotes/smtp-intro.html http://computer.howstuffworks.com/email5.htm Books: Programmer's Guide to Internet Mail by John Rhoton TCP/IP Illustrated Volume 1 by Richard Stevens

QUESTIONS SUGGESTIONS COMMENTS THANK YOU