26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.

Slides:



Advertisements
Similar presentations
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Advertisements

1 Electronic Mail u Three major components: u user agents u mail servers u simple mail transfer protocol: SMTP u User Agent u a.k.a. “mail reader” u composing,
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
Remote Login: TELNET and
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
Electronic Mail and SMTP
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Simple Mail Transfer Protocol
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
Electronic Mail: SMTP, POP, and IMAP
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Electronic Mail (SMTP, POP, IMAP, MIME)
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
FTP (File Transfer Protocol) & Telnet
Simple Mail Transfer Protocol (SMTP)
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
File Transfer Protocol (FTP)
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Electronic Mail: SMTP, POP IMAP, and MIME.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
COMP 431 Internet Services & Protocols
1 Architecture 2 User Agent 3 Message Transfer Agent 4 Message Access Agent 5 MIME 6 Web-Based Mail 7 Electronic Mail Security.
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Dr. Adil Yousif University of Alneelian – Master of CS - IT Electronic Mail.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Remote Logging, Electronic Mail, and File Transfer
Instructor Materials Chapter 5 Providing Network Services
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
SMTP, POP3, IMAP.
Chapter 2: Application layer
Remote Logging, Electronic Mail,
The Application Layer: SMTP, FTP
Chapter 7 Network Applications
Chapter 2 Application Layer
Presentation transcript:

26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

REMOTE LOGGING It would be impossible to write a specific client/server program for each demand. The better solution is a general-purpose client/server program that lets a user access any application program on a remote computer. TELNET SSH Topics discussed in this section:

TELNET is a general-purpose client/server application program. Remote virtual terminal One server supports multiple VTs Note

26.4 Example of Telnet (Character mode) Image from Dr. Wang’s course at:

26.5 Some Common Features of Telnet Telnet is on a single TCP connection to port 23 Telnet connection is unencrypted So easy for eavesdropper! In most cases, telnet is a remote terminal. Each character is transmitted in a separated packet The same is true for SSH login stage A feature that could be exploited for “timing attack”.

26.6 Telnet Commands telnet longwood.eecs.ucf.edu setup a remote shell to the server telnet longwood.eecs.ucf.edu 25 Setup a TCP connection to port 25 ( service) We will show this usage in lecture

26.7 SSH – Secure Shell Replacement of old unsecure Telnet program Both ends authenticate with each other Rely on public key cryptography Will introduce PK in last chapter All communication messages are encrypted SSH is used also as a secure tunneling channel for other applications File transfer Port forwarding (such as X window) Virtual private network (VPN)

26.8 SSH – Secure Shell Under Unix machine: Hidden directory.ssh saves all configuration files “known_hosts” saves public keys of all previous connected SSH servers Attacker cannot impersonates as a known SSH server anymore Have to trust what you get in the first connection attempt

26.9 SSH Programs and Usages Many open source ssh client software PuTTY SSH uses TCP connection on port 22 Login methods: Password private key kept on client, public key stored on server (come to this in later security chapter)

ELECTRONIC MAIL One of the most popular Internet services is electronic mail ( ). The designers of the Internet probably never imagined the popularity of this application program. Its architecture consists of several components that we discuss in this chapter. Architecture User Agent Message Transfer Agent: SMTP Message Access Agent: POP and IMAP Web-Based Mail Topics discussed in this section:

26.11 Figure 26.6 First scenario in electronic mail MUA: mail user agent

When the sender and the receiver of an are on the same system, we need only two user agents. MUA:Outlook Express, Netscape Messenger, Mozilla Thunderbird, Eudora, Foxmail,…… Note

26.13 When the sender and the receiver of an are on different systems, Wikipidia shows a good example of operation (next page) Note

26.14 Typical Operation (from Wikipidia) server’s DNS name and IP DNS query for MX RR Could also be IMAP4

26.15 Client’s Operation Mode Remote terminal using SSH to server directly Then uses MUA on server Such as Pine, Elm on Unix machines Use MUA on a client’s own computer The MUA formats and sends to sender’s server Web-based systems using web browser Gmail, yahoo mail, hotmail,…. Spammer: program a simple code sending to servers via SMTP protocol

26.16 Figure Services of user agent

26.17 Some examples of command-driven user agents are mail, pine, and elm (under Unix). Note

26.18 Some examples of GUI-based user agents are Eudora, Outlook, and Netscape. Note

26.19 Figure Format of an

26.20 Figure address Sender uses DNS query for MX record on the domain name in order to find the name and IP of the target server

26.21 Figure MIME (Multipurpose Internet Mail Extensions) NVT: network virtual terminal (telnet) SMTP protocol only this data

26.22 MIME User agents makes the translation between non-ASCII data and ASCII message If you check the source file of an that has attachment, you will find the MIME usage This is the main reason why your with an attachment becomes bigger?

26.23 Figure MIME header

26.24 Table 26.5 Data types and subtypes in MIME

26.25 Table 26.6 Content-transfer-encoding

26.26 Figure SMTP (Simple Mail Transfer Protocol) range POP3 or IMAP4

26.27 Figure Commands and responses

26.28 Figure Command format

26.29 Table 26.7 Commands

26.30 Table 26.8 Responses

26.31 Table 26.8 Responses (continued)

26.32 Let us see how we can directly use SMTP to send an and simulate the commands and responses we described in this section. We use TELNET to log into port 25 (the service port for SMTP). We then use the commands directly to send an . Through this process, you can see why you cannot trust the “sender” or any part of a received , why spam is so easy to be generated. Example 26.3

Sample sending using telnet “telnet longwood.cs.ucf.edu 25” C: HELO fake.domain S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with "." on a line by itself C: from: “fake man” C: to: “dr. who” C: subject: who am I? C: Do you like ketchup? C: How about pickles? C:. S: 250 Message accepted for delivery C: QUIT S: 221 longwood.cs.ucf.edu closing connection

Try SMTP interaction for yourself: telnet servername 25 see 220 reply from server enter HELO, MAIL FROM, RCPT TO, DATA, QUIT commands “mail from” the domain may need to be existed “rcpt to” the user needs to be existed A mail server may or may not support “relay” CS server supports relay from inside campus Enable you send without using user agent

26.35 NOTES: Ethnical Issue on Manual Sending Do not try to use telnet on department server except for the homework! Do not try to use it to spam your friends without upfront notice!

26.36 Figure POP3 (Post Office Protocol) and IMAP4 (Internet Mail Access Protocol)

26.37 Figure The exchange of commands and responses in POP3

26.38 POP3 and IMAP4 IMAP4 provides more functionalities Both POP3 and IMAP4 have corresponding encrypted protocols

26.39 Web-based clients use web browser for all interactions A user can access his/her at any where, via any computer that has Internet access provider may provide more functions Gmail has very good search capability Gmail has the message grouping function Many provide bundled services with their other products Voice/video, photo sharing, ….

FILE TRANSFER Transferring files from one computer to another is one of the most common tasks expected from a networking or internetworking environment. As a matter of fact, the greatest volume of data exchange in the Internet today is due to file transfer. File Transfer Protocol (FTP) Anonymous FTP Topics discussed in this section:

26.41 FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection and the well-known port 20 for the data connection. Note

26.42 Figure FTP

26.43 Figure Using the control connection

26.44 Figure Using the data connection

26.45 Example 26.4 (continued)

26.46 We show an example of anonymous FTP. We assume that some public data are available at internic.net. Example 26.5 We show an example of anonymous FTP. We assume that some public data are available at internic.net. continued on next slide

26.47 Example 26.5 (continued)

26.48 Dying of FTP People seldom use FTP nowadays Replaced with two ways: Web-based file upload/download Browser shows a directory content if the directory does not have a default html file SSH-based file transfer