Internet Messaging in 60 Minutes Terry Gray -University of Washington Policy Issues Mission Critical Messaging Goals Relevant Standards Standards Update.

Slides:



Advertisements
Similar presentations
1 Effective, secure and reliable hosted security and continuity solution.
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Overview of Server Roles in Exchange Server 2010 In Exchange Server 2010, servers are installed with specific functional roles: Mailbox Server role Edge.
The complete application platform Danny Angus Apache James.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Lesson 7: Business, , & Personal Information Management
Server Upgrade From UW to Cyrus. What is an IMAP Server? Provides access to your mail messages stored on the mail server Requires authentication.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
S/MIME and PKI Dartmouth College PKI Lab. What Is S/MIME? RFC 2633 (S/MIME Version 3)RFC 2633 Extensions to MIME Uses PKI certificates, keys, and.
Chapter 30 Electronic Mail Representation & Transfer
Guide to Operating System Security Chapter 10 Security.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
CT NIKHEF Nov Mail NIKHEF CT system support.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
1 © 2001, Cisco Systems, Inc. All rights reserved. Voice Connector Features Voic Interoperability – 4.0(5) Voice Connector features Rahul Singh.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Application Layer Chapter
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
PKI in Higher Education: Dartmouth PKI Lab Update Internet2 Virtual Meeting 5 October 2001.
Intranet, Extranet, Firewall. Intranet and Extranet.
Sun One IMAP & Microsoft Exchange Coexistence Dan Oberst Princeton University CSG 9/21/04.
Nov E. Burger, SnowShore Networks G. Parsons, Nortel Networks G. Vaudreuil, Lucent Technologies J.K. Wong, Nortel Networks.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet-Based Client Access
Module 8: Managing Client Configuration and Connectivity.
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Securing Microsoft® Exchange Server 2010
Module 6: Manage and Configure Messaging. Configuring Internet Mail Using Small Business Server (SBS) 2008 Console Configuring Protection Configuring.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
Systems and Next Generation Collaboration Kevin Woods Director of Marketing and Product Management Mirapoint Inc.
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
NHIN-Direct SMTP/ Notes 6/8/2010. Why we chose Concepts match the charter exactly Implementations match the charter exactly* Well understood.
Module 6 Planning and Deploying Messaging Security.
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
Service CPTE 433 John Beckett. The Fundamentals Reliable Scalable –Issue is speed Flexible –Clients, locations Growing issue: Spam control Growing.
Copyright © 2002 Deerfield.com. All Rights Reserved. Deerfield.com Distributor Confidential.
The Internet Just the Facts. Protocols TCP/IP are the TRANSPORT protocols of the Internet Services use TCP/IP to connect to other computers on Internet.
Module 9: Fundamentals of Securing Network Communication.
Update on  Mail Gateways  Servers  Spam Tagging  Anti-Virus  IMAP  Web Mail  LISTSERV  POP.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Module 7: Managing Message Transport. Overview Introduction to Message Transport Implementing Message Transport.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Module 12 Integrating Exchange Server 2010 with Other Messaging Systems.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Security Unix Mail Services David Funk Systems Administrators Computer Systems Support COE, University of Iowa.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Stroeder.COM TF-LSD Meeting S/MIME Certificate Collector  Motivation  Proposed Solution  Discussion.
Security fundamentals Topic 9 Securing internet messaging.
Enterprise Messaging & Collaboration. e-Interact Modules.
Internet User’s Guide The path to... GB757. Internet User's Guide2 Objectives  Understand the Internet architecture  Understand Internet Services 
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Seminar in “ICT Service Oriented Architectures” April 28 th 2009 Marino Di Nillo Advanced Interoperabilty Unit at the Italian National Agency for Digital.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
concepts & protocols
Internet Business Associate v2.0
CIW Lesson 7 Part A Name: _______________________________________
IIS.
Simple Mail Transfer Protocol
Enterprise Topography
Presentation transcript:

Internet Messaging in 60 Minutes Terry Gray -University of Washington Policy Issues Mission Critical Messaging Goals Relevant Standards Standards Update Sample Architecture Designing for Reliability Designing for Scalability Mobility Security Trends Open Issues

Policy Issues Spam Harassment Privacy Legal discovery Records management Monitoring, Tracing requirements

Mission Critical Messaging Goals User view –Availability/Reliability –Interoperability –Usability/Convenience –Mobility –Message security Administrator view –Availability/Reliability –Scalability –Maintainability/Manageability –Administrative Flexibility –Infrastructure Security

Relevant Standards ESMTP -Mail transport NNTP -News transport RFC822 & Header definitions MIME -Content encoding & labeling DSNs -Delivery Service Notifications POP, IMAP -Remote mail access ACAP -Remote configuration access LDAP -Directory access S/MIME, PGP -Secure messaging SIEVE -Filtering

Standards Update IETF activities: updates, extensions Givens: SMTP, POP, IMAP, LDAP Dueling: S/MIME, Open PGP Upstarts: ACAP, SIEVE Unstarted: notification

Sample Architecture Mail Client Outgoing SMTP Server Message Store Option/ Config Store Directory Store Delivery & Filtering Agents SMTPIMAP ACAP LDAP Incoming Mail Forwarder Other Message Handlers NNTP SMTP

Designing for Reliability Reduce "single points of failure" –Redundancy Reduce size of "fault zones" –"Horizontal Scaling" Graceful degradation, failure –Time outs, retries, DSNs Reduce complexity, heterogeneity –Avoid gateways; use Internet standards

Designing for Scalability Big boxes vs. (lots of) little boxes Mapping user names to servers Mapping folder/newsgroup names to servers Client configuration

Mobility: the unlearned lesson Incoming folders Secondary folders Global address books Personal address books Configuration info Subscription lists Bookmarks Public key rings Private key rings Filter rules

Security S/MIME will dominate for secure mail PKI issues –# of certs, kinds, revocation, escrow, archiving IMAP/POP security options –SSL, K4, K5, OTP, CRAM-MD5… SMTP security Attachment handling risks

Trends Mostly free clients WebMail Outlook/Exchange “virus” No SMTP relaying; impact on mobile users LDAP & HTTP for everything –whither ACAP?? Growing pressure for better filtering –Will Sieve catch on??

Open Issues Management tools –Moving mailboxes among servers –Knowing when things are broken X.509 certificate infrastructure Delivery filtering and responding List servers Attachment handling Delivery notification Efficient new mail notification Integrated open calendaring Intranets vs Internets; Firewalls, VPNs Higher-Ed-specific issues, e.g. Labs

References New Book: Internet Messaging Marshall Rose and David Strom Prentice Hall ISBN All things IMAP: