security
|
|
|
- Prosper Riley
- 10 years ago
- Views:
Transcription
1 security Simple Mail Transfer Protocol First defined in RFC821 (1982), later updated in RFC 2821 (2001) and most recently in RFC5321 (Oct 2008) Communication involves two hosts SMTP Client SMTP Server TCP on port 587 or 25 is used for communication Commands Replies SMTP Client SMTP Server EITF05 - Web Security 1 EITF05 - Web Security 2 Mail User Agent (MUA): client, provides the user interface Eudora, pine, outlook, kmail,... Mail Submission Agent (MSA) Usually implemented with MTA Mail Transfer Agent (MTA): The software used to transfer s between servers Implements SMTP Sendmail, Microsoft Exchange Server,... Message Delivery Agent (MDA): The software that delivers received to the MUA procmail Usually implemented with MTA Originating SMTP system Introduces mail into the Internet, or into another environment Delivery SMTP system Ultimately receives the mail and delivers it to the mail user agent Relay SMTP system Passes on mail from a client to another server Adds trace information in header, nothing more Gateway SMTP system Receives mail from one transport environment, and releases it into another environment Allowed to change information in header (not received header) in order to comply with new environment Can include spam filter to reduce traffic SMTP may or may not be used on both sides MUA MSA MTA MTA MDA MUA MUA MSA MTA MTA MDA MUA EITF05 - Web Security 3 EITF05 - Web Security 4 1
2 HELO Initiate a mail transaction EHLO Extended HELO MAIL FROM: - Provides sender identification RCPT TO: - Provides recipient identification DATA - Provides message. End of data indicated by. on an empty line VRFY Ask server to verify an address EXPN Ask the server to expand a mailing list QUIT Close transmission channel RSET Reset current transaction HELP Ask server to return help of commands Commands and arguments are not case sensitive VRFY, vrfy, or VrFy can be used However local-part of mailbox can be case sensitive Local-part [email protected] Domain [email protected] may not be same as [email protected]. [email protected] is always same as [email protected] EITF05 - Web Security 5 EITF05 - Web Security 6 4 main categories 2XX Positive Completion reply Action successful, you can start another one 3XX Positive Intermediate reply Command accepted, but you are not done yet 4XX Transient Negative Completion reply Command not accepted, but you are encouraged to try it again. It might work next time 5XX Permanent Negative Completion reply Command not accepted, do not try the same thing again Possible to disable VRFY Can be used by spammers to check for valid addresses Possible to disable EXPN Can be used to harvest addresses from mailing lists EITF05 - Web Security 7 EITF05 - Web Security 8 2
3 S: 220 server.com Ready C: EHLO client.com S: 250-server.com greets client.com S: 250-8BITMIME S: 250-SIZE Extensions supported by server S: 250-DSN } S: 250 HELP C: MAIL FROM:<[email protected]> S: 250 OK C: RCPT TO:<[email protected]> S: 250 OK C: RCPT TO:<[email protected]> S: 250 OK C: DATA S: 354 Start mail input; end with <CRLF>.<CRLF> C: This is my message C:. S: 250 OK C: QUIT S: 221 server.com Service closing transmission channel Included in DATA part Usually hidden by MUA From: and To: header is provided by sender Can easily be forged Return-path is added by last SMTP server Used for e.g., error messages if mailbox does not exist Derived from the MAIL FROM command Can have several other names (bounce address, return path, envelope from etc) Received: Information added by each involved SMTP server Message-id: An ID for the message which is added by the first SMTP server X-Header: Headers starting with X- are not part of the standard but used for information only X-Mailer identifies the mailing program X-Headers can be added by anti spam software, anti virus software etc EITF05 - Web Security 9 EITF05 - Web Security 10 An MTA must add the header received when it receives/forwards a message Example From HELO/EHLO command From TCP connection MTAs own identity together with ID Received: from mail.sender.com (mail.sender.com [ ]) by mail.receiver.com with ESMTP id 31si fkt; Fri, 03 Oct :49: (PDT) It is easy for anyone to connect to port 25 of a mail server and send an Commands can be chosen arbitrarily Without additional checks of involved parties s can easily be forged Headers can be used to track and (hopefully) find who initiated the EITF05 - Web Security 11 EITF05 - Web Security 12 3
4 Return-Path: Received: from smtp.server1.com (smtp.server1.com [ ]) by smtp.server2.com with ESMTP id ; Fri, 12 Dec :46: (EDT) Received: from google.com (dklku64.someisp.com [ ]) by smtp.server1.com; Fri, 12 Dec :45: (PDT) Date: Fri, 12 Dec :45: (PDT) From: cheap products To: Subject: The best offer only for you Here we can see that the bottom received header stems from a forged Claims that google.com was the SMTP client while it was in fact someone else ( ) IP used in TCP connection cannot be spoofed EITF05 - Web Security 13 DNS entry specifying where to send Final delivery server Relay Gateway 1. MTA makes DNS query for MX record for recipient s domain name 2. Receives list of servers that can receive the mail 3. MTA tries to establish SMTP connection to MTA given in MX record 4. Each server on the list has a priority number Lower number higher priority EITF05 - Web Security 14 C:\>nslookup -type=mx gmail.com Server: *** Address: *** Non-authoritative answer: gmail.com MX preference = 5, mail exchanger = gmail-smtp-in.l.google.com gmail.com MX preference = 10, mail exchanger = alt1.gmail-smtp-in.l.google.com gmail.com MX preference = 20, mail exchanger = alt2.gmail-smtp-in.l.google.com gmail.com MX preference = 30, mail exchanger = alt3.gmail-smtp-in.l.google.com gmail.com MX preference = 40, mail exchanger = alt4.gmail-smtp-in.l.google.com gmail-smtp-in.l.google.com internet address = alt1.gmail-smtp-in.l.google.com internet address = alt2.gmail-smtp-in.l.google.com internet address = alt3.gmail-smtp-in.l.google.com internet address = alt4.gmail-smtp-in.l.google.com internet address = Priority can help with load balancing If there are multiple destinations with the same preference and there is no clear reason to favor one (e.g., by recognition of an easily reached address), then the sender-smtp MUST randomize them to spread the load across multiple mail exchangers for a specific organization. RFC5321 Use lower priority servers as backup servers If server is offline: No backup server: MTA will queue message and retry sending later. MTA has no idea when server is online again With backup server: MTA sends message to backup server. Backup server will (potentially) know when primary server is online again more efficient delivery Backup servers sometimes have worse spam filtering than primary servers EITF05 - Web Security 15 EITF05 - Web Security 16 4
5 C:\>nslookup -type=mx hotmail.com Server: *** Address: *** Non-authoritative answer: hotmail.com MX preference = 5, mail exchanger = mx2.hotmail.com hotmail.com MX preference = 5, mail exchanger = mx3.hotmail.com hotmail.com MX preference = 5, mail exchanger = mx4.hotmail.com hotmail.com MX preference = 5, mail exchanger = mx1.hotmail.com mx1.hotmail.com internet address = mx1.hotmail.com internet address = mx1.hotmail.com internet address = mx1.hotmail.com internet address = mx1.hotmail.com internet address = mx1.hotmail.com internet address = mx1.hotmail.com internet address = mx1.hotmail.com internet address = mx1.hotmail.com internet address = mx1.hotmail.com internet address = mx1.hotmail.com internet address = mx1.hotmail.com internet address = Anyone can connect to the SMTP server and send messages from anyone, to anyone Will provide anonymity of real sender Typically used by spammers Used to be very common less common now SMTP servers that are not open relays Will deliver messages to its supported domain Will send messages from IP addresses it supports EITF05 - Web Security 17 EITF05 - Web Security 18 DomainKeys Identified Mail, described in RFC4871 Digital signature of message put in message header Certificates are not used Associates a domain name to an message Verification that domain has not been spoofed Assuming receiver knows that DKIM should be used for that domain Additionally provides integrity protection of message Hash algorithm: SHA-256, (SHA-1) Signature Algorithm: RSA Hashes, signatures and keys represented in base64 DKIM-Signature: v=1; a=rsa-sha256; c=simple/relaxed; d=gmail.com; s=gamma; Version Algorithms used Canonicalization (How message was prepared) Domain Selector h=domainkey-signature:received:received: message-id:date:from:to:subject:mimeversion:content-type; bh=9gicsznlclk7yyh6virgyammrziwssbwqspihc 78RRk=; b=k4ofvphpkaqmvusogvhrrncspk+jeuv9kurzo7a iypvf/6y1n2iiatvlvdzwonzx/w6kxyx6z4ybuk8d qk/vntie7jpy+gquuhfvm0nftmzo1cbgrvo8ddhnx RBB/qWwlV+Z6wxw/mq7lNuJknVprOAaTLws5mwcZ+ AWL8KwHg0= Signed headers Hash of body Signature EITF05 - Web Security 19 EITF05 - Web Security 20 5
6 SMTP server can check the signature by receiving the public key through DNS Always stored in subdomain _domainkey Selector is subdomain of _domainkey Example: >nslookup -type=txt gamma._domainkey.gmail.com Server: *** Address: *** Non-authoritative answer: gamma._domainkey.gmail.com text = "k=rsa; t=y; p=migfma0gcsqgsib3dqebaquaa4gnadcbiqkbgqdihyr3oitoy22zoabrive9m /ime3rqojeasanspg2ythtyv+xtp4xwf5gtjcmhqemos0qyu0fyinqpqogj2t0m fx9znu06rfrbdjiiu9tpx2t+nglwz8qhbilo5by8apjavlyqtlavypsrvsx0b3y zc63t4age2cdqzya+owsmwqidaqab" Sender Policy Framework (originally Sender Permitted From) Background: Many spammers send s from fake domains Find an open relay somewhere, send message from domain server.com MAIL FROM: [email protected] Idea: Let server.com decide which mail servers that can send mail from server.com A domain can put an entry in the DNS that lists the SMTP servers that are allowed to send mail from the domain Server MTA receiving mail can check DNS record for servers domain If originating client MTA is not allowed to send from given domain, then server MTA can choose to not accept message Can be seen as a backwards MX record MX record tells us where to send a mail going to a specific domain SPF tells us from where we are allowed to send mail from specific domain EITF05 - Web Security 21 EITF05 - Web Security 22 SPF (and/or TXT) record specifies rules all: Any IP matches a: IP match if domain has A record that resolves to sender s IP mx: IP match if domain has MX record that resolves to sender s IP ipv4: IP match if within given interval and qualifiers +: pass?: neutral (default) ~: suspicious -: fail Examples: v=spf1 a mx -all Domain-based Message Authentication, Reporting and Conformance There are issues with both DKIM and SPF: What are the effects? How does client handle bad signatures or IP s? DKIM: Sender does not know if there are s with bad signatures SPF: Mistake(s) in list of allowed IP addresses? DMARC combines DKIM and SPF with application rules and a feedback system Three components: DKIM SPF Alignment (From header verified against DKIM and SPF domains) v=spf1 a:sub.server.com ipv4: /24 EITF05 - Web Security 23 EITF05 - Web Security 24 6
7 DMARC record uses tag=value syntax v: Version, must be DMARC1 p: Policy, one of none, quarantine and reject pct: Percentage (0-100) of messages to which the policy is applied (default 100) rua: URI to send aggregate feedback to ruf: URI to send forensic feedback to adkim: Alignment mode for DKIM, strict or relaxed (default) aspf: Alignment mode for SPF, strict or relaxed (default) sp: Same as p tag but applied to subdomains ri: Report interval for aggregate reports (seconds, default 86400) rf: Format for forensic reports _dmarc.amazon.com v=dmarc1; p=quarantine; pct=100; rua=mailto:[email protected]; ruf=mailto:[email protected]; EITF05 - Web Security 25 About 100 billion spam s sent per day Several methods used to combat the problem with spam Can be divided into filtering and blocking We will look at DNS Blacklists (DNSBL) Greylisting and nolisting Hashcash Statistical Filters Hybrids EITF05 - Web Security 26 DNS blacklists, also called DNS blocklist Also known as RBL (Realtime Blacklist) A list with IP addresses that are (considered by blacklist provider) used for spamming IP can be identified by e.g., honeypots Server MTA can check if client MTA is on list MTA DNS Is client on blacklist? MTA Easy to use IPs can be checked using DNS queries IP(r).dnsbl.server.com IP(r) is the reverse byte ordering of the IP address to check Some big ones: spamhaus, spamcop Some are more aggressive than other Problem: False positives and false negatives Problem 2: What is a positive and what is a negative Client Server If client is reported in blacklist, server can take appropriate action Can be used as one part in a spam scoring system EITF05 - Web Security 27 EITF05 - Web Security 28 7
8 Some IPs can be blocked by one blacklist but not with another Example: Check IP >nslookup zen.spamhaus.org Server: *** Address: *** **Server can t find zen.spamhaus.org: NXDOMAIN >nslookup spam.dnsbl.sorbs.net Server: *** Address: *** Non-authoritative answer: Name: spam.dnsbl.sorbs.net Address: Advantages: You can choose the blacklist that suits you Aggressive lists will prevent most spam but also reject some legitimate s Conservative lists will miss some spam but are less likely to reject legitimate Message can be rejected before it is actually sent since server can drop connection with client immediately Drawbacks: Same mailserver can be used by both spammers and legitimate users If a mistake puts you on a blacklist, it may be difficult to get off the list EITF05 - Web Security 29 EITF05 - Web Security 30 URI version of DNSBL Targets URLs and IPs in message body Server MTA can check message body for links that are not likely used in normal , but known to be used in spam Works in the same way as DNSBL URI is checked with DNS Background: Many spam programs do not fully comply with SMTP They might not retry sending an that was previously rejected Idea: Always reject unrecognized transactions For incoming messages, look at (SMTP Client IP, sender address, receiver address) If not previously used, then save in database and temporarily reject message (Transient Negative Completion reply) If recently used, then accept message Advantages: Easy and not very resource consuming compared to some other methods Can be used before other spam filters to reduce their workload Drawbacks: is no longer realtime Relies on legitimate servers implementing the retry EITF05 - Web Security 31 EITF05 - Web Security 32 8
9 Background: Many spam programs do not fully comply with SMTP Some only try the highest priority server in the MX record A few try the lowest priority server in the MX record only, assuming it is used as backup and does not have good spam filters Idea: Let the server with highest priority be non-existing server.com: 10 dummy.server.com 20 real1.server.com 20 real2.server.com 30 real3.server.com EITF05 - Web Security 33 Pay to send an , but receive for free Background: Computers and connections are fast, sending many s is fast and cheap Idea: If it takes 1 microsecond to prepare a message to send, then many messages can be sent in a short time If it takes 1 second to prepare a message, not so many can be sent in reasonable time Idea similar to Key strengthening Slow hash functions used to strengthen password protection Hashcash is asymmetric in the sense that it is expensive to prepare the message but cheap to verify that it was prepared with hashcash EITF05 - Web Security 34 The string is hashed with SHA-1 *ver* is version number (currently 1) *bits* indicates how costly the function is for sender *date* gives current date *resource* is recipients address *ext* is extensions *rand* is a random number (separates different senders) *counter* is a counter value If the first *bits* bits of hash are zero, then string is added in message header Otherwise, increase counter by 1 and hash again *ver*:*bits*:*date*:*resource*:[*ext*]:*rand*:*counter* X-Hashcash: 1:20:131015:[email protected]:: :35976 String verified by receiver and saved in database Can only be used once EITF05 - Web Security 35 Advantages Will not block mail from legitimate senders Not costly for receiver Drawbacks Botnets can be used instead of single computer preparing messages Slow computers have more problems than fast ones Embedded devices EITF05 - Web Security 36 9
10 Background: Some words are more common than others in spam s Idea: Construct an algorithm that can sort out spams based on the content of the message Bayesian filtering Use training data to teach an algorithm how to separate spam from legitimate s Let D be the event that a document contains a set of words w 0, w 1, w 2,... Let S be the event that the document is spam and S the event that it is not spam Then Use Bayes law Thus Divide: Take logarithm From training We assume that words occur independently Spam if log-likelihood ratio is larger than some threshold, e.g., 0 EITF05 - Web Security 37 EITF05 - Web Security 38 Some or all of the previous methods can be combined Then passing/failing a test can contribute to a total score for an If score is higher than threshold then is considered as spam An open source implementation is SpamAssassin Can be used in MTA, MDA and/or in MUA EITF05 - Web Security 39 10
CipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
Network Services. Email SMTP, Internet Message Format. Johann Oberleitner SS 2006
Network Services Email SMTP, Internet Message Format Johann Oberleitner SS 2006 Agenda Email SMTP Internet Message Format Email Protocols SMTP Send emails POP3/IMAPv4 Read Emails Administrate mailboxes
Technical Note. FORTIMAIL Configuration For Enterprise Deployment. Rev 2.1
Technical Note FORTIMAIL Configuration For Enterprise Deployment Rev 2.1 April 7, 2009 Table of Contents 1 Introduction... 3 1.1 Objective... 3 1.2 Network deployment... 3 1.3 Convention... 3 2 System
Protect Outbound Mail with DMARC
MDaemon Messaging Server How To Quick Start Guide Protect Outbound Mail with DMARC To protect outbound mail from your domain, you will need to create a DMARC record for your domain. We recommend carefully
Spam, Spam and More Spam. Spammers: Cost to send
Spam, Spam and More Spam cs5480/cs6480 Matthew J. Probst *with some slides/graphics adapted from J.F Kurose and K.W. Ross Spammers: Cost to send Assuming a $10/mo dialup account: 13.4 million messages
Collateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH.
Consequences of Spam and Virus Filtering for the E-Mail System 22C3 Introduction 12 years of spam... 24 years of SMTP... Things have changed: SMTP is no longer enough. Spam filters, virus filters are part
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
This user guide provides guidelines and recommendations for setting up your business s domain authentication to improve your deliverability rating.
BLUEHORNET USER GUIDE EMAIL AUTHENTICATION AND DOMAIN MONITORING TOOLS This user guide provides guidelines and recommendations for setting up your business s domain authentication to improve your deliverability
Advanced Settings. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods
Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
Simple Mail Transfer Protocol
Page 1 of 6 Home : Network Programming Simple Mail Transfer Protocol Contents What is SMTP? Basics of SMTP SMTP Commands Relaying of Messages Time Stamps and Return Path in Message Header Mail Exchangers
Exim4U. Email Server Solution For Unix And Linux Systems
Email Server Solution For Unix And Linux Systems General Overview, Feature Comparison and Screen Shots Exim4U Email Server Solution For Unix And Linux Systems Version 2.x.x October 12, 2012 Copyright 2009
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
Libra Esva. Whitepaper. Glossary. How Email Really Works. Email Security Virtual Appliance. May, 2010. It's So Simple...or Is It?
Libra Esva Email Security Virtual Appliance Whitepaper May, 2010 How Email Really Works Glossary 1 2 SMTP is a protocol for sending email messages between servers. DNS (Domain Name System) is an internet
Mail system components. Electronic Mail MRA MUA MSA MAA. David Byers
Electronic Mail PRINCIPLES DNS ARCHITECTURES SPAM Mail system components () () David Byers MRA [email protected] IDA/ADIT/IISLAB Mail User Agent Reads and writes e-mail Writes e-mail to using (usually)
How To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall
Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks
What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4
Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
Comprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders
Mail agents Introduction to Internet Mail Philip Hazel University of Cambridge MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom, Mulberry,
DKIM last chance for mail service? TFMC2 01/2006
DKIM last chance for mail service? TFMC2 01/2006 Mail service status More and more spam, fishing, spoofing, virus More and more energy in spam fighting More and more messages lost because : Imperfect automatic
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Security. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Security Antivirus Administration SmarterMail is equipped with
SPAMfighter SMTP Anti Spam Server
SPAMfighter SMTP Anti Spam Server Users Manual Copyright SPAMfighter ApS 2005 Revised 4/27/2006 1 Table of Contents 2 Terminology...3 3 Technology...4 3.1 Tunneling and Interception...4 3.2 Content Classification...5
Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
Enhanced Spam Defence
Enhanced Spam Defence An approach to making SMTP connect time blocking a reliable method for e-mail filtering By John Jensen, Topsec Technology Ltd. As the spam problem keeps growing and the associated
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
Understanding SMTP authentication and securing your IBM Lotus Domino 8 server from spam
Understanding SMTP authentication and securing your IBM Lotus Domino 8 server from spam Shrikant Jamkhandi IBM Software Group Senior Software Engineer Pune, India September 2009 Copyright International
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
MDaemon Vs. Microsoft Exchange Server 2013 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th)
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th) YOUR ASSIGNMENT Your assignment is to write an SMTP (Simple
Anti-spam filtering techniques
Anti-spam filtering techniques Stéphane Bortzmeyer AFNIC (.fr registry) [email protected] ITU, 19 january 2006 1 Anti-spam filtering techniques Background on this work This work started in the french Working
DomainKeys Identified Mail DKIM authenticates senders, message content
DomainKeys Identified Mail DKIM authenticates senders, message content Alt-N Technologies, Ltd. 2201 East Lamar Blvd, Suite 270 Arlington, Texas 76006 Phone: (817) 525-2005 Fax: (817) 525-2019 http://www.altn.com/
AntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
Articles Fighting SPAM in Lotus Domino
Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called
Internet Technologies Internet Protocols and Services
QAFQAZ UNIVERSITY Computer Engineering Department Internet Technologies Internet Protocols and Services Dr. Abzetdin ADAMOV Chair of Computer Engineering Department [email protected] http://ce.qu.edu.az/~aadamov
QMAIL & SMTP: A Secure Application for an Unsecure Protocol. Orr Dunkelman. [email protected]. January 27, 2004 SMTP and QMAIL Slide 1
QMAIL & SMTP: A Secure Application for an Unsecure Protocol Orr Dunkelman January 27, 2004 SMTP and QMAIL Slide 1 SMTP, MUA and MTA Speak English Whenever we deal with protocols we (=Internet geeks) like
E-Mail Security. Raj Jain. Washington University in St. Louis
E-Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
Trust in Email Begins with Authentication
Abstract Trust in Email Begins with Authentication Issued by the Messaging Anti-Abuse Working Group (MAAWG) March 2008 Edited by Dave Crocker Brandenburg InternetWorking The Internet s growth allows us
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Do you need to... Do you need to...
TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce
Protect your brand from phishing emails by implementing DMARC 1
Protect your brand from phishing emails by implementing DMARC 1 Message from the Certified Senders Alliance supported by AOL, Microsoft and Google In the following article we want to clarify why marketers
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
ETH Zürich - Mail Filtering Service
Eidgenössische Technische Hochschule Zürich Swiss Federal Institute of Technology Zurich Informatikdienste / IT-Services ETH Zürich - Mail Filtering Service (TERENA 2009) 09 Dec 2009 - D. McLaughlin ([email protected])
Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
English Translation of SecurityGateway for Exchange/SMTP Servers
Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose
DMARC. How. is Saving Email. The New Authentication Standard Putting an End to Email Abuse
Messaging Masters Series How DMARC is Saving Email The New Authentication Standard Putting an End to Email Abuse by Alec Peterson, CTO, Message Systems, and Mike Hillyer, Senior Director, Global Solution
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Email Reputation Metrics Troubleshooter. Share it!
Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,
SMTP Servers. Determine if an email message should be sent to another machine and automatically send it to that machine using SMTP.
SMTP Servers SMTP: Simple Mail Transfer Protocol (TCP Port 25) The Simple Mail Transfer Protocol (SMTP) is an Internet standard for transferring electronic mail between computers. UNIX systems implement
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
Domain Name System (DNS)
Application Layer Domain Name System Domain Name System (DNS) Problem Want to go to www.google.com, but don t know the IP address Solution DNS queries Name Servers to get correct IP address Essentially
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
Email Message-IDs helpful for forensic analysis?
Email Message-IDs helpful for forensic analysis? Satheesaan Pasupatheeswaran School of Computer and Information Science Edith Cowan University Perth, Western Australia [email protected] [email protected]
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
IronPort Email Authentication
IronPort Email Authentication W h i t e P a p e r Executive Summary The problems of spam, viruses, phishing and most email denial-of-service attacks can all be traced back to a single common cause lack
WEBMAIL USER MANUAL AN INTRODUCTION TO WLINK WEBMAIL. Table of content:
WEBMAIL USER MANUAL Table of content: An introduction to Wlink WebMail Interface guide Read/Delete Email Compose/Send Email Attachment Searching Email Message filter Spam setting Whitelist/Blacklist Email
Frequently Asked Questions
Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange
one million mails a day: open source software to deal with it Charly Kühnast Municipal Datacenter for the Lower Rhine Area Moers, Germany
one million mails a day: open source software to deal with it Charly Kühnast Municipal Datacenter for the Lower Rhine Area Moers, Germany Internet many years ago... mail server mail client Seite: 2 today,
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
E-mail Marketing: Methods to Block Spam
Turkish Journal of Electrical Engineering & Computer Sciences http:// journals. tubitak. gov. tr/ elektrik/ Research Article Turk J Elec Eng & Comp Sci (2013) 21: 2259 2268 c TÜBİTAK doi:10.3906/elk-1112-55
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
Email Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand [email protected] (408) 834-7577 x125
Email Marketing 201 How a SPAM Filter Works Craig Stouffer Pinpointe On-Demand [email protected] (408) 834-7577 x125 Mark Feldman NetProspexVP Marketing [email protected] (781) 290-5714 www.twitter.com/pinpointe
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Cannot send Autosupport e-mail, error message: Unknown User
Cannot send Autosupport e-mail, error message: Unknown User Symptoms Unable to send Autosupport e-mails and the following error message is reported: asup.smtp.fail http://now.netapp.com/eservice/ems?emsaction=details&eventid=200573&software=ontap&em
BITS EMAIL SECURITY TOOLKIT:
BITS EMAIL SECURITY TOOLKIT: PROTOCOLS AND RECOMMENDATIONS FOR REDUCING THE RISKS A PUBLICATION OF THE BITS SECURITY AND RISK ASSESSMENT WORKING GROUP April 2007 BITS The Financial Services Roundtable
ORF ENTERPRISE EDITION 1. Getting the Most Out of ORF
ORF ENTERPRISE EDITION 1 Getting the Most Out of ORF Revision: 1.8 (for ORF version 4.3) Date: June 12, 2009 1 ORF ENTERPRISE EDITION 2 Preface WHAT IS THIS GUIDE ABOUT? This documentation provides ORF
SMTP Status Codes & SMTP Error Codes Reference
& SMTP Error Codes Reference There comes a time in the life of a Computer Consultant where, one day, he/she will have to deal with email server problems. It is inevitable. Sometimes these problems will
Blackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
Migration Quick Reference Guide for Administrators
Migration Quick Reference Guide for Administrators 10 Easy Steps for Migration Maximize Performance with Easy Settings Changes Communicating with Your Users Reporting Spam Resources Page 1 10 Easy Steps
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel Table of Contents Incoming... 1 Incoming Spam Quarantine... 2 Incoming Log Search... 4 Delivery Queue... 7 Report Non-Spam...
Email Configuration Network Management Card-2
Email Configuration Network Management Card-2 AP9630, AP9631 and 2GrPDUs(AP8XXX) Email Overview The NMC can be configured to send email to up to four recipients when it encounters a problem or event selected
Mail Avenger. David Mazières New York University
Mail Avenger David Mazières New York University Early design goals for email Work over weakly connected networks - E.g., early Internet, UUCP, etc. - Move mail closer to recipient whenever you can... -
DNS Record Information for the Pushex Exchange server
DNS Record Information for the Pushex Exchange server Changing your DNS records can be daunting if you haven t had much experience doing it before. We d be pleased to make all the required changes for
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
20.12. smtplib SMTP protocol client
20.12. smtplib SMTP protocol client The smtplib module defines an SMTP client session object that can be used to send mail to any Internet machine with an SMTP or ESMTP listener daemon. For details of
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
XGENPLUS SECURITY FEATURES...
Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...
CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015
CS43: Computer Networks Email Kevin Webb Swarthmore College September 24, 2015 Three major components: mail (MUA) mail transfer (MTA) simple mail transfer protocol: SMTP User Agent a.k.a. mail reader composing,
OCS Training Workshop LAB14. Email Setup
OCS Training Workshop LAB14 Email Setup Introduction The objective of this lab is to provide the skills to develop and trouble shoot email messaging. Overview Electronic mail (email) is a method of exchanging
Instructions Microsoft Outlook Express Page 1
Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express This manual is written for users who already have an e-mail account configured in Outlook Express and will therefore
Mail Service Reference
IceWarp Unified Communications Mail Service Reference Version 10.4 Printed on 3 January, 2013 Contents Mail Service 1 General... 2 Delivery... 2 Routing... 5 Advanced... 7 Security... 14 General... 14
