Draft-lemonade-imap-submit-01.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.

Slides:



Advertisements
Similar presentations
Kerberos Authentication. Kerberos Requires shared secret with KDC ( perhaps not for PKINIT) Shared session key established Time synchronization needed.
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
Securing Bruce Maggs. Separate Suites of Protocols Protocols for retrieving POP, IMAP, MAPI (Microsoft Exchange) Protocols for sending
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 VMO and SMTP TOI Aaron Belcher.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
By: E. Susheel Chandar M. Guna Sekaran Intranet Mail Server.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
Electronic Mail and SMTP
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Simple Mail Transfer Protocol
Architecture of SMTP, POP, IMAP, MIME.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Overview of Exchange 2013 Architecture Transport components shipping with Exchange 2013 Mail Routing Scenarios Transport High Availability SMTP Client.
Mail Server Fitri Setyorini. Content SMTP POP3 How mail server works IMAP.
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
Lecturer : Ms.Trần Thị Ngọc Hoa Chapter 8 File Transfer Protocol – Simple Mail Transfer Protocol.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Implementing POP3 and IMAP4 Using Dovecot
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Mail Services.
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Sending and Receiving Mails
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
File Transfer Protocol (FTP)
05/19/2003 Christiane Schmidt 1 IMAP internet message access protocol.
June 10, 2004IETF 59,5 - Richardson, TX, USA1 lemonade Interim 59,5 Eric Burger Glenn Parsons
What's new in the World IMAP/LEMONADE/SIEVE (no DKIM or EAI) Alexey Melnikov.
SIEVE Mail Filtering WG IETF 69, Chicago WG Chairs: Cyrus Daboo, Alexey Melnikov Mailing List: Jabber:
Module 7: Managing Message Transport. Overview Introduction to Message Transport Implementing Message Transport.
SIMPLE MAIL TRANSFER PROTOCOL. Introduction Simple Mail Transfer Protocol is the standard protocol on the Internet and part of the TCP/IP protocol.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
1 Information Systems 2/26/03 Tom Coppeto Mark Silis MIT Mail System Update 26 February 2003.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Post Office Protocol.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Xdeliver in P-IMAP for reply / forward of messages Stéphane H. Maes – Jean Sini –
World Wide Web r Most Web pages consist of: m base HTML page, and m several referenced objects addressed by a URL r URL has two components: host name and.
COMP 431 Internet Services & Protocols
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
Fall 2006CS 395: Computer Security1 Key Management.
Draft-lemonade-imap-submit-00.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Implementing POP3 and IMAP4 Using Dovecot AfNOG 2016 Scalable Internet Services (SS-E) Gaborone, Botswana Presented by Michuki Mwangi (Built on materials.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Networking Applications
draft-lemonade-imap-submit-01.txt “Forward without Download”
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Implementing POP3 and IMAP4 Using Dovecot
Chapter 2: Application layer
William Stallings Data and Computer Communications
The Application Layer: SMTP, FTP
Chapter 7 Network Applications
Chapter 2 Application Layer
Part II Application Layer.
Presentation transcript:

draft-lemonade-imap-submit-01.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message without downloading and then uploading the content Current version summarizes different technical approaches, with updates from Vienna (further refinements to both)

IMAP Push Mechanisms 1.Annotated outbox/external-agent –draft w/ annotation (SMTP envelope, “ready” flag) –external agent picks up and submits 2.IMAP does submit intrinsically –IMAP server queues outbound messages; submits now or later –IMAP client polls message to learn status 3.Proxy –IMAP opens connection to Submit –OK from IMAP command means message accepted by Submit server

IMAP does submit intrinsically Two submission mechanisms: Submit and IMAP –deprecate Submit: all clients use IMAP for submission –Maintain both (must add extensions to both) –Tie IMAP mechanism to Submit Requires IMAP have the ability to queue messages –Mail queue is very complex monitor for failures add & delete messages queue is simpler than full SMTP operations to manage a single queue are same as to manage a bunch of queues

IMAP does submit intrinsically (cont’d) ability to generate DSNs ability to forward to smart relay IMAP server queues outbound messages OK from IMAP doesn't mean msg accepted by Submit server Clients polls message to learn status or always gets DSNs likely implementation approach will be to bolt sendmail onto IMAP server

Proxy IMAP opens connection to Submit server in real- time; assembles data as it sends message Does not return OK until it gets ack from Submit. Command may thus take as long as SMTP permits for reply to DATA (10 minutes but we could shorten this) Client can close the connection before it gets an OK. Command continues. Server can mark message as to success or failure, and if failure specific error text from Submit server.

Proxy (cont’d 1) Add command to get EHLO response from Submit server. Mandate support for a base set of extensions. Client can issue new command if it needs to use an extension not mandated; may issue cmd only on occasion (once per session, per day, per week). New IMAP command to submit mail. –SMTP envelope sent as literal. –Data sent as literal or as reference. –Name of IMAP folder into which message will be deposited (optional). –Flag for fail entire message if any recipients fail. –IMAP sends as unsolicited response each response code.

Proxy (cont’d 2) Proxy authentication can be solved by having IMAP authenticate to Submit as an admin user (perhaps with TLS client certs), or if the client permits, by IMAP sending client's credentials to Submit. Require Submit to support SASL authorization IDs. Require support for MAIL FROM... AUTH=... Support for authorization ID allows IMAP server to send msgs from itself and to send msgs on behalf of a user, and for these cases to be distinguished. Can use SASL external if Submit server trusts IMAP server (perhaps by IP address).

Cons to IMAP submit Adds complexity to IMAP for a limited case. If IMAP used for non-SMTP messages (e.g., IM), IMAP must learn each submission mechanism Proxy authentication problem Admin complexity (admin must set up trust relationship between servers). Knowing what happened to a message that was not fully successful or which the client doesn't know (connection closed) requires sent mail folder with annotated message.

IMAP Pull “Pawn ticket” mechanism (urlauth) to authorize limited access to specific MAP data by submit server Per-mailbox access generation key Client can cause new secret to be generated at any time. Client creates URL which can include expiration time/role/user, and signs using mailbox secret. URL valid until earlier of expiration time or client issues command to generate new mailbox secret. Could avoid conflating pointer to data with authentication would be to separate URL from authentication, and have BURL command accept two parameters. Doesn't really help much.

IMAP Pull Cons Submit server needs to support a subset of IMAP FETCH. IMAP server needs to support per-user mailbox secrets. Case of forward with annotation without download and store result in sent mail requires IMAP server to supply address that causes new mail to be deposited into a folder (generally useful in itself), or client can use COMPOSE to assemble message in outbox, then submit completed message. This latter approach also solves future delivery with revocation as message can be deleted (or modified) prior to being sent. As bonus, queued message counts against user’s quota. Security issues with authorization token (eavesdropper can access message, during validity of token, but only if submission uses unprotected channel, hence no worse than current submission over unprotected channel).

IMAP COMPOSE Command Allows client to assemble draft from parts Useful with both IMAP Push and Pull Solution for sent mail copy Addresses future delivery –Quota –Cancel –Revise (still issues) Makes IMAP Pull easier

URL AUTH Can restrict authorization –Expiration time –User identity (user Maida only) –Role identity (submit server) Useful in areas outside lemonade

Encrypted/signed mail requires private key live in server (any approach)