Download presentation
Presentation is loading. Please wait.
Published byOpal Price Modified over 9 years ago
1
Simple Mail Transfer Protocol (SMTP) Team: Zealous Team: Zealous Presented By: Vishal Parikh (003749955) Vishal Parikh (003749955) Ribhu Pathria(004698318) Ribhu Pathria(004698318) Deval Dudhia(004692975) Deval Dudhia(004692975) Vaibhav Patel(004413124) Vaibhav Patel(004413124) Jainip Desai (004677635) Jainip Desai (004677635)
2
Agenda Introduction Introduction Format of E-mail Format of E-mail Basic SMTP architecture Basic SMTP architecture SMTP Communication model SMTP Communication model Commands of SMTP Commands of SMTP Session Establishment and Termination Session Establishment and Termination SMTP mail transaction process SMTP mail transaction process Security Basics Security Basics PGP-SMIME-PEM PGP-SMIME-PEM Server Authentication Server Authentication Advantages Advantages Limitations Limitations Special Features Special Features Conclusion Conclusion References References
3
Introduction SMTP stands for Simple Mail Transfer Protocol. MTP preceded SMTP. The Commands of MTP are based directly on those of FTP. MTP preceded SMTP. The Commands of MTP are based directly on those of FTP. What is the need of SMTP ???? What is the need of SMTP ???? Came into existence in 1981 (RFC 780) Came into existence in 1981 (RFC 780) SMTP is simpler than MTP it replaced. SMTP is simpler than MTP it replaced. When an e-mail is sent from the sender to receiver, in most cases this involves, the sender machine sends the email to local SMTP sever, which in then sends mail to recipients local SMTP sever, and finally to recipients local machine. When an e-mail is sent from the sender to receiver, in most cases this involves, the sender machine sends the email to local SMTP sever, which in then sends mail to recipients local SMTP sever, and finally to recipients local machine.
4
How messages are sent to SMTP server? E-mail communication using Relaying E-mail communication using Relaying Used during initial days of SMTP. SMTP routing information is included along with E-mail address. Problem with this method. Using DNS Using DNS This method is used at present. The senders SMTP server makes the use of DNS to find MX record of the domain to which the E-mail is to be sent.
5
Format of an e-mail Mail is a Text File. Envelope: It contains with sender address, receiver address and Envelope: It contains with sender address, receiver address and other information. other information. Message: It contains Mail Header and Mail Body. Message: It contains Mail Header and Mail Body. Mail Header: It defines the sender, the receiver, the subject of the message and other information message and other information Mail Body: It contains the actual information in the message Why to use an envelope if sender and recipient’s email address is already contained in the headers of the message itself?
6
Basic SMTP Architecture SMTP clients and servers have two main components: User Agents (UA): User Agents (UA): It prepares a message and encloses in an envelope. It prepares a message and encloses in an envelope. Mail Transfer Agents (MTA): Mail Transfer Agents (MTA): It transfers the mail across the internet. It transfers the mail across the internet.
7
SMTP Communication Model SMTP Communication Model
8
Commands of SMTP HELO : Request to initiate SMTP session MAIL FROM : Sender’s E-Mail address RCPT TO : Receiver’s E-Mail address DATA : Body of message QUIT : Terminates SMTP connection RSET : Aborts mail transaction VRFY : Asks receiver to verify the validity of the mailbox EXPN : Asks receiver to identify mailing list HELP : Causes receiver to send help information NOOP : Forces server to verify the communication with SMTP receiver receiver
9
Session Establishment and Termination Session Establishment and Termination
10
SMTP Mail Transaction Process 1. Transaction Initiation and Sender Identification S: HELO sjsu.edu R: 250 Hello sjsu.edu S: MAIL FROM: R: 250 Ok 2. Recipient Identification S: RCPT TO: R: 250 Ok 3. Mail Transfer S: DATA R: 354 End data with. S: S:. R: 250 Ok, message accepted for delivery: queued as 12345 S: QUIT R: 221 Bye
11
Status Codes The Server responds with a three digit code that may be followed by the text info. the text info. 2XX – The SMTP server has accepted the command and has completed the request. 2XX – The SMTP server has accepted the command and has completed the request. 3XX - Command is accepted and more information follows. 3XX - Command is accepted and more information follows. 4XX - Try again later as there was a temporary failure with the command or the server. 4XX - Try again later as there was a temporary failure with the command or the server. 5XX – The requested operation will never be completed due to permanent error. 5XX – The requested operation will never be completed due to permanent error.
12
Security Basics
13
SMTP SECURITY FEATURES ???
14
NOTHING!!!
15
CIA PGP: It incorporates mechanisms for authentication, confidentiality, compression, e-mail compatibility and segmentation & reassembly. MAIL & FILE Symmetric encryption- CAST-128, 3- DES, IDEA SHADSS+ SHA or RSA+SHA. MIME SMIME: S/MIME provides the functionality of Enveloped data, signed data, clear signed data and signed and enveloped data. MIME Diffe-Hellman ( Key Exchange) Triple-DES or RC2/40 SHA- 1/MD5 SHA-1/MD5 + DSS/RSA. Text Based PEM: Mechanism of key management for authentication purposes. Text Based DESMD2/MD5 DES+MD5 PGP-SMIME-PEM
16
Authentication for Server
17
Advantages Very Popular Very Popular Supported on many platforms Supported on many platforms Low administration and implementation costs Low administration and implementation costs Simple addressing scheme Simple addressing scheme
18
Limitations Security matters for SMTP are worse. Security matters for SMTP are worse. Its usefulness is limited by its simplicity. Its usefulness is limited by its simplicity. Transmission of executable files and binary files using SMTP is not possible without converting into text files. Use MIME to send mail in other format. Transmission of executable files and binary files using SMTP is not possible without converting into text files. Use MIME to send mail in other format. It cannot transmit text data that contains national language characters. These national language characters use 8-bit codes with values of 128 decimal or more. It cannot transmit text data that contains national language characters. These national language characters use 8-bit codes with values of 128 decimal or more. It is limited to 7-bit ASCII characters only. It is limited to 7-bit ASCII characters only. SMTP servers may reject mail messages beyond some specific length. SMTP servers may reject mail messages beyond some specific length.
19
Special Features Mail Forwarding: SMTP server may agree to accept e-mail for non- local mailbox and forward it to the appropriate destination. Mail Forwarding: SMTP server may agree to accept e-mail for non- local mailbox and forward it to the appropriate destination. Mail Gatewaying: SMTP servers can be implemented as e-mail gateways which can translate TCP/IP email in a suitable form for some another e-mail system and vice-versa. Mail Gatewaying: SMTP servers can be implemented as e-mail gateways which can translate TCP/IP email in a suitable form for some another e-mail system and vice-versa. Mail Relaying: SMTP includes the ability to relay mail from one server to another, as explained earlier, provided certain conditions are met. Mail Relaying: SMTP includes the ability to relay mail from one server to another, as explained earlier, provided certain conditions are met. Address Debugging: VRFY command allows the client to ask the sender to verify address of recipient without sending mail to recipient. Address Debugging: VRFY command allows the client to ask the sender to verify address of recipient without sending mail to recipient. Mailing List Expansion: EXPN command allows to expand mailing list. Mailing List Expansion: EXPN command allows to expand mailing list.
20
Conclusion SMTP is one of the most widely used and implemented application. With the explosively growing reliance on electronic mail for commercial and personal services, there grows the demand of authentication and confidentiality. To complement the weak security feature of SMTP industry use PGP-SMIME-PEM. Still there is need of implementing the measures to eliminate spam and other security breaches. SMTP is one of the most widely used and implemented application. With the explosively growing reliance on electronic mail for commercial and personal services, there grows the demand of authentication and confidentiality. To complement the weak security feature of SMTP industry use PGP-SMIME-PEM. Still there is need of implementing the measures to eliminate spam and other security breaches.
21
References Web Sites: http://www.faqs.org/rfcs/rfc821.html (RFC 821). http://www.faqs.org/rfcs/rfc821.html (RFC 821). http://www.faqs.org/rfcs/rfc2821.html (RFC 2821) http://www.faqs.org/rfcs/rfc2821.html (RFC 2821) http://www.tcpipguide.com/free/t_SMTPSpecialFeaturesCapabili tiesandExtensions.html http://www.tcpipguide.com/free/t_SMTPSpecialFeaturesCapabili tiesandExtensions.html http://cns.utoronto.ca/usg/technotes/smtp-intro.html http://cns.utoronto.ca/usg/technotes/smtp-intro.html http://computer.howstuffworks.com/email5.htm http://computer.howstuffworks.com/email5.htmBooks: Programmer's Guide to Internet Mail by John Rhoton Programmer's Guide to Internet Mail by John Rhoton TCP/IP Illustrated Volume 1 by Richard Stevens TCP/IP Illustrated Volume 1 by Richard Stevens
22
QUESTIONS QUESTIONSSUGGESTIONSCOMMENTS THANK YOU
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.