Peer-to-Peer Support for Distributed Mail Transfer Mechanism. Abstract
|
|
|
- Berniece Gilbert
- 9 years ago
- Views:
Transcription
1 Peer-to-Peer Support for Distributed Mail Transfer Mechanism Kai-Hsiang Yang, Jenq-Haur Wang, Chi-Chien Pan, and Tzao-Lin Lee Department of Computer Science and Information Engineering, National Taiwan University, No. 1, Sec. 4, Roosevelt Rd., Taipei, 106, Taiwan. {f , jhwang, d , Keywords: peer-to-peer technology, location service, load balancing, personalization, mobile IP Abstract In current Internet mail transfer mechanism, mail servers usually do a lot of extra mail processing like mail filtering. The workload of mail servers is heavy in terms of storage and processing time. Junk mails as well as important messages are all stored on mail server, retrieved and then deleted by end users. It s a waste of processing time, storage space, and precious network resources. In this paper, peer-to-peer technology was included in ordinary mail transfer mechanism to reduce unnecessary overhead. Through the user location service, mail server can dynamically query the online status and current location of users. By redirecting mails to online users hosts, workload of mail servers will be greatly reduced, and personalization of mail processing configuration can be better supported. I. INTRODUCTION With the tremendous growth of the Internet, various networking applications such as WWW (World-Wide Web), , and FTP (File Transfer Protocol), have been widely used. Specifically, applications have become indispensable and critical to many people s daily lives. All kinds of information like important messages, notifications, and advertisements, to name just a few examples, arrive at your mailbox by without classification. However, in current mail transfer mechanism, mail server plays a crucial role since every step in mail delivery requires the intervention of mail servers. The protocol used in mail delivery, Simple Mail Transfer Protocol (SMTP) [1], is store-and-forward in nature where guarantee of mail delivery is the main concern. Therefore, mails in the process of delivery will have to be queued in every intermediate mail transfer agent (MTA) before arriving at the destination mail server. This takes too much overhead in network bandwidth and processing time. When a user gets online, a mail user agent (MUA), such as Outlook Express or Netscape Mail, can be used to check if there are new s or not. Mails are retrieved from a mail server via POP3 (Post Office Protocol version 3) [2]. However, both junk mails and important messages arrive at the same mail server regardless of their priority. Users can only retrieve each mail in order, filter them automatically or manually, and then delete unwanted s. In this architecture, mail server plays a very important role, and wastes its storage and processing time.
2 There is one well-known filtering language, SIEVE, [17] for users to write some mail filters in the mail server side or in the user s side. One current mail reader Mulberry can generate both kinds of filters. These filters could filter mail at time of final delivery, when the message is moved to the user-accessible mailbox. However the mail servers still have to deal with these junk mails, save them into the user-accessible mailbox, and then run these filters to filter incoming mails. Mail servers don t decrease its load but increase its load for filtering mails. Another protocol called IMAP4 (Internet Message Access Protocol version 4) [3] provides more advanced mail management functions, for example, one can get mail headers first before deciding which s to get. Mail synchronization problems can also be easily resolved. However, not all mail servers implement IMAP4 functions. Most users still have to use POP3 clients for mail retrieving. But mail servers using IMAP4 still have to deal with all incoming mails and waste their resources. On the other hand, peer-to-peer technology has been widely deployed in various applications, for example, file sharing applications like Napster and ezpeer, instant messaging software like ICQ and MSN Messenger, and open source protocols like Jabber [4] and GnuTella [5]. Moreover, decentralized systems evolve towards centralization if scalability is concerned, and centralized applications evolve towards decentralization [6]. We have to find out what combination of centralization and decentralization works best for current Internet applications. Therefore, an infrastructure for integrating current Internet mail transfer mechanism and peer-to-peer instant messaging was proposed to provide better services. II. MOTIVATION We will quickly review the current architecture for mail transfer and its shortcomings, and then propose our infrastructure as a feasible solution. In current Internet mail transfer mechanism, separate protocols are used: SMTP [1] for mail delivery and POP3 [2] or IMAP4 [3] for mail retrieval and management. As shown in Fig. 1, a typical scenario for current mail transfer mechanism is illustrated. As shown in Fig. 1, a user composes his by a MUA like Outlook Express or Netscape Mail and then sends it to the MTA in his domain (or the ISP he connects to), or sender MTA, via SMTP (step 1, 2). Sender MTA then checks the recipient address for its validity and determines how to relay this mail to the right person. Usually the MX Record of the DNS (Domain Name System) [7] server will be queried for the mail exchanger of the domain specified in the recipient address (step 3, 4). After a relayed mail is received, (step 5, 6), receiver MTA will store it into the recipient mailbox. When the recipient gets online, he can use a MUA to check and retrieve his own s from the mail server via POP3 or IMAP4 (step 7, 8). No matter if the recipient is online or not, s will be delivered to his domain mail server first. Then after the user decides to check his s, he will connect to the mail
3 server and fetch them back. Mail servers cannot notify users of incoming mails unless their MUA is configured to periodically check for new s. Cs 1 2 Sender MTA 5 Receiver MTA 3 DNS server Cr sender domain receiver domain Fig. 1. Typical scenario for mail transfer and retrieval where Cs: mail sender, Cr: mail recipient, Sender domain: home domain for sender, Receiver domain: home domain for receiver, Sender MTA: MTA for sender domain, Receiver MTA: MTA for receiver domain, User-side SMTPd: SMTP daemon on the user side This process works fine, but there are several drawbacks that affect the performance of mail servers. Firstly, the workload on a mail server is heavy in terms of storage for mailboxes and processing time for SMTP/POP3/IMAP4. Mail server has to deal with every destined for domain users no matter they are currently online or not. This could be a waste of server storage and processing time since s are unnecessarily stored in server and then retrieved by on-line users. As the number of users and s grow, the storage requirement of mails in receiver MTA will become larger and larger. Secondly, personalization cannot be done very efficiently in mail server. For example, it s common to configure an anti-spam list on receiver MTA for the whole domain. But for each individual domain user, different configurations may be needed. We need a finer-grain control of such configuration for each individual user, for example, a separate anti-spam list for each user, which is more reasonable since each
4 user may want to filter mails from different senders and hosts. Although it s possible to configure external programs for mail processing, for example: SIEVE [17] or procmail [8] or Milter API [8] in sendmail [10, 11] version 8.10 or above. But it s still time-consuming for mail server to deal with personal configurations for all domain users. In current implementations junk mails are removed as soon as possible after a user checks and retrieves his s from server. That would be a waste of time and space for storing these unwanted junk mails in server followed by deleting them anyway. In order to offload mail server and to provide complete customization in mail processing, a peer-to-peer infrastructure for mail transfer was proposed. Specifically, we want to bypass the mail server if the recipient is currently online and ready for receiving s. Users can customize their personal configurations for all kinds of mail processing. Cs Sender MTA Receiver MTA Location server 7 DNS server Cr sender domain receiver domain Fig. 2. Our infrastructure for peer-to-peer mail transfer III. INFRASTRUCTURE As shown in Fig. 2, key components in the infrastructure include: location servers, DNS servers, mail servers (sender and receiver MTAs), and mail clients (sender and receiver MUAs). The functional description of each component is provided as follows. A. Location Server Location server is responsible for storing the current location and way of contact for each domain user. User Location Record (ULR) includes user name, address, current online status, current IP address,
5 device capabilities (audio/video support), and user profiles like access control list (ACL) for user resources. Since the amount of data may be quite large, a distributed scheme may be used, for example, one location server for each domain (like DNS server) may be a feasible way. ULR of each user is stored in the location server of his own domain as specified in the address. Most of the related works in location service are about geographical positioning of mobile nodes in a wireless network, the location of servers, and location-based services. They mainly focused on the physical positioning of mobile nodes or server, not the current way of contact for clients and users. As shown in Fig. 3, there are two possible operations for a location server: update and query. Clients update the ULRs to location server when users login, logout, change their location, or modify their configurations. On the other hand, mail servers query the location server for ULR of a particular user in order to directly deliver s to him. In other words, location server has to be coupled with the management of user sign-on and sign-off. Users must do registration/de-registration when sign-on/sign-off. However, when mobile user is roaming into a foreign network, he must register to his home location server for location update. This can be done directly or through the help of foreign location server (Indirect Update). For a mobile node to detect its movement into a foreign network, the mechanism of Agent Advertisement/Solicitation in Mobile IP [12] can be deployed. Home location server Location Update Foreign location server Register/ C 1 De-register Query mail server Location Update Indirect update C 2 roaming C 2 home network foreign network Fig. 3. Operations of location servers. B. Mail Transport Agent (MTA) As shown in Fig. 2, after sender forwards his mail to his mail server (sender MTA) (step 1, 2), sender
6 MTA will query the MX Record of DNS server for mail exchanger (step 3, 4) in order to know which mail server to redirect to. When connected from sender MTA (step 5), receiver MTA will not receive the directly. Instead, location server is queried for the online status of recipient (step 6). If he is not on-line, mail gets delivered in its normal way, and saved in recipient mailbox. On the other hand, if recipient is currently online and ready for receiving mail (step 7), receiver MTA will reply to sender MTA a SMTP REDIRECT message (SMTP return code 251/551 [1]) (step 8), and sender MTA will send mails directly to recipient host. Then user-side SMTPd will check the validity of destination address and start receiving his (step 9, 10). After reception of s, MUAs will be popped up for recipient to read s. When the recipient is online, he can choose his online status to: 1. ready for receiving mail and 2. busy but notification message only. If the online status is 1, the mail server could redirect to the recipient s host. But if the online status is 2, the domain mail server should receive this mail and notify the recipient by sending a short message via SMTP to recipient s host. Then the SMTPd pops up one message box to notify the recipient of the incoming mail. One possible error may occur under the circumstances when the recipient host cannot be reached by sender MTA. Possible reasons could be abnormal broken connection or power failure that may not be immediately reflected in location server. In such cases, sender MTA will queue this mail delivery request in its local waiting queue as usual. After a configurable timeout, sender MTA will retry transmission to the normal mail exchanger (receiver MTA) queried from MX record of DNS server, not directly to user-side SMTPd since user location may have been updated again. This is very important for the implementation issue. There is one design issue for location server. The user on-line status stored in a location server could be inconsistent with his exact location due to possible reasons as power failure or broken connection. We didn t focus on maintaining the timeliness of location information in a location server. Alternatively, applications making use of location information are the ones that try their best to query location server just before connections are to be established to the user host. The reason for such design is user host mobility can be checked only when needed since it may often change. One design alternative is to modify mail servers to query ULR from a location server, instead of querying DNS server for MX record. But every application must be modified. Therefore, another alternative is to modify DNS server for handling user location queries. ULRs can be stored in a DNS server, and DNS protocol has to be modified since the input of ULR queries is user address, not hostname. Thus every application using DNS service will be able to utilize the user location service.
7 Mail User Agent (MUA) 6 7 SMTPd POP3d Personal mailbox sender MTA POP3c 1 SMTPc 2 Domain MTA User-Side Mail Client Fig. 4. Operations of a user-side mail client C. Mail User Agent (MUA) As shown above in Fig. 4, SMTPd and POP3d (POP3 daemon) are needed in addition to the original SMTPc (SMTP client) and POP3c (POP3 client) in order to receive s from sender MTA and to automatically pop up MUA for notifying recipient. Specifically, when user logs in, POP3c should be configured to automatically receive mails from domain mail server via POP3 (step 1, 2), and then SMTPd and POP3d will be initiated waiting for incoming connections from sender MTA. After mails are received (step 3, 4) and saved in a personal mailbox (step 5), MUA will be triggered (step 6) and popped up for receiving mails from its default POP3 server (step 7), the local POP3d, which in turn reads the saved mail in personal mailbox (step 8). Note that mails delivered to an off-line user will be stored in mailboxes on receiver MTA. When recipient gets online, POP3c automatically receives mails from domain mail server in order to keep the original mail order in the local personal mailbox. IV. ADVANTAGES In this infrastructure, several advantages are possible. Firstly, load balancing between mail server and clients can be achieved. Mail servers can be offloaded since they don t have to receive s when recipient is online. Secondly, finer-grain personal configuration for mail processing like mail filtering can be done
8 separately on each client in a distributed way, which further contributes to more offloading from mail servers. Global mail filtering can still be done on mail server. Thirdly, peer-to-peer support can be integrated into current mail transfer mechanism. Users will be automatically notified of their new mails immediately when they get on-line. Lastly, mail clients with different levels of capabilities, such as the presence of POP3d/SMTPd functionality, can be integrated in this infrastructure since capability information is also available through our location server. ULR query also serves as a way of capability exchange. V. IMPLEMENTATION ISSUES In this section, we introduce our implementation method. A. Location Server Since the design of LDAP (Lightweight Directory Access Protocol v3) [13] server is optimized for reading, and the tree structure in LDAP is easy to maintain the different level of user information, we choose LDAP server as the location server. In our experiment, we use the OpenLDAP system developed by LDAP community which is an open source [14]. Besides, we also use the DB library developed by the University of Berkeley. To store the user location information, we design one new object ULR (user location record) in LDAP server, and also define some suitable attributes as we need: (1) Username: the name to login. (2) Userpassword: the password to login and receive . (3) the account. (4) Online: show the user s online status ( 0: Offline, 1: Ready for receiving mail, 2: Busy but notification message only. ) (5) Ipaddress: the IP address of the current user computer. In practical, we insert the following definitions of attributes and objectclass into the LDAP schema: (1) attributetype ( NAME ( 'username' ) SUP name ) (2) attributetype ( NAME 'userpassword' EQUALITY octetstringmatch SYNTAX {128} ) (3) attributetype ( NAME ( ' ' )
9 EQUALITY caseignoreia5match SUBSTR caseignoreia5substringsmatch SYNTAX {256} ) (4) attributetype ( NAME 'online' EQUALITY numericstringmatch SYNTAX {16} ) (5) attributetype ( NAME 'Ipaddress' DESC 'IP address as a dotted decimal, eg , omitting leading zeros EQUALITY caseignoreia5match SYNTAX {128} ) (6) objectclass ( NAME 'UserLocationRecord' SUP organizationalperson STRUCTURAL MAY ( username $ userpassword $ $ online $ Ipaddress ) ) When one user logins, the user-side software automatically registers to the location server, and then update the Ipaddress and online status. When a user closes the software or logouts, it will automatically cancel the Ipaddress and set the online status to 0. B. Personal Mail Filter In our system, each user could set his mail filters to avoid receiving garbage mails. These personal mail filters are stored in the location server, and are read by the login procedure when the user logins. For the mail filter, we design one ordered list of (operation, right) pairs. The operation field contains: (1) <sender > (2) <sender host> (3) <sender domain> (4) <relay host>. The right field contains: (1) allow (2) deny. In our implementation, we use one combined string to show the (operation, right) pair as follows: n [Octet 0]: represent the right field. 1 is allow, and 2 is deny. [Octet 1]: represent the operation type. 1 is <sender >, 2 is <sender host>, 3 is <sender domain>, and 4 is <relay host>. [Octet 2-n]: the real domain name, IP address, or . For example, the following two mail filters make the domain ( *) acceptable, but the IP address ( ) is unacceptable * => ( *, allow)
10 => ( , deny) Against this design, we define one more attribute and add it into ULR object. (7) attributetype ( NAME 'mailfilter' DESC 'Personal mail filter EQUALITY caseignoreia5match SYNTAX {128} ) (8) objectclass ( NAME 'UserLocationRecord' SUP organizationalperson STRUCTURAL MAY ( username $ userpassword $ $ online $ Ipaddress $ mailfilter) ) One example of UserLocationRecord data when user james logins is listed as follows: { dn: cn=james,o=oanet objectclass: top objectclass: UserLocationRecord username: james userpassword: [email protected] online: 1 Ipaddress: mailfilter: * mailfilter: } C. Mail Server In our experiment, we choose the sendmail [10] package based on Linux environment. We modify sendmail to check the user status from location server when new mail is coming. If the online status is 1, it sends the redirect message back to sender mail server for sending the mail directly to the user. If the user is offline, it receives the mail for the user as usual. If the online status is 2, it receives this mail first and then notifies the recipient by sending a short message via SMTP to recipient s host. Then one message box will be popped up to notify the recipient.
11 D. Personal SMTP/POP3 Daemons and Login Procedure In the user side, we focus on the Windows platform and develop the login/logout software and SMTP/POP3 daemon by the Java language. When one user logins, he has to input his username and password, then the login procedure connects to location server for authentication, and reads the user s mail filters in his ULR record if it passes the authentication. After these operations finish, the POP3 client immediately connects to domain mail server for receiving mails, and then we run SMTP daemon with parameters (username, mail filters), and run POP3 daemon with parameters (username, password). VI. FUTURE WORK There are some cases where the infrastructure still needs some modifications. Firstly, we have to deal with the cases for users behind firewall or NAT (Network Address Translator) [15]. In the case of firewalls that only allow certain types of traffic (for example, HTTP) to pass through, some encapsulation methods could be used, for example, Firewall Enhancement Protocol (FEP) [16]. For users inside a private network or NAT, some address and port translation has to be done, for example, Network Address Port Translation (NAPT) [15]. Secondly, we can also implement peer-to-peer support for other applications like FTP and HTTP, and a universal messaging service will be possible. Finally, security issues for Instant Messaging (IM) are also likely to occur in such environment, for example, IM Virus for MSN. All these need further considerations. VII. CONCLUSION In the fast-changing world of efficiency, instant messaging and communications are critical for all people. The rapid growth of wireless devices and technology facilitates broader range of applications in wireless communications. Location service plays a major role in such an environment where user mobility management must be maintained for various services. In this paper, an infrastructure for peer-to-peer mail transfer mechanism was proposed for offloading mail servers and providing better personal customization on mail processing. This infrastructure can also be applied in all kinds of Internet applications where peer-to-peer support is needed. REFERENCES [1] J. Klensin, Ed., Simple mail transfer protocol, RFC 2821, April [2] J. Myers and M. Rose, Post office protocol version 3, STD 53, RFC 1939, May 1996.
12 [3] M. Crispin, Internet message access protocol version 4rev1, RFC 2060, December [4] Jabber Software Foundation, Jabber, available at: [5] GnuTella, available at: [6] A. Oram, Peer-to-peer for academia, available at: October [7] P. Mockapetris, Domain names implementation and specification, STD 13, RFC 1053, November [8] S. R. Berg and P. Guenther, procmail, available at: [9] Sendmail, Inc., Filtering mail with sendmail, available at: [10] Sendmail Consortium, sendmail, available at: [11] B. Costales and E. Allman, Sendmail, 2 nd ed., O Reilly & Associates, Inc., January [12] C. Perkins, IP mobility support for IPv4, RFC 3220, Jan [13] M. Wahl, T. Howes, and S. Kille, Lightweight directory access protocol (v3), RFC 2251, December [14] OpenLDAP Foundation, OpenLDAP, available at: [15] P. Srisuresh and K. Egevang, Traditional IP network address translator (traditional NAT), RFC 3022, January [16] M. Gaynor and S. Bradner, Firewall enhancement protocol, RFC 3093, April [17] SIEVE: A Mail Filtering Language. RFC3028, January 2001.
1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
Libra Esva. Whitepaper. Glossary. How Email Really Works. Email Security Virtual Appliance. May, 2010. It's So Simple...or Is It?
Libra Esva Email Security Virtual Appliance Whitepaper May, 2010 How Email Really Works Glossary 1 2 SMTP is a protocol for sending email messages between servers. DNS (Domain Name System) is an internet
1 Attack Top Attackers Report, Top Targets Report, Top Protocol Used by Attack Report, Top Attacks Report, Top Internal Attackers Report, Top External Attackers Report, Top Internal Targets Report, Top
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Zimbra Open Source Email and Collaboration Suite
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with the Zimbra Open Source Email and Collaboration Suite Table of Contents Table of Contents Deploying the BIG-IP LTM with the Zimbra Open Source
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Linux Network Administration
Linux Network Administration Sendmail Evolution of Email The birth of electronic mail (email) occurred in the early 1960s The mailbox was a file in a user's home directory that was readable only by that
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
Web Hosting Getting Started Guide
Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
Using email over FleetBroadband
Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Administrator Quick Start Guide
Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain
Cloud Email & Web Security. Administrator Quick Start Guide
Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain
"Charting the Course... Enterprise Linux Networking Services Course Summary
Course Summary Description This an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement these services
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
How To Upgrade To Symantec Mail Security Appliance 7.5.5
Release notes Information Foundation 2007 Symantec Mail Security Appliance 7.5 Copyright 1999-2007 Symantec Corporation. All rights reserved. Before installing or upgrading: Migration issues If you are
QUESTION 1 You deploy a server that has the Exchange Server 2013 Mailbox server role and Client Access server role installed.
QUESTION 1 You deploy a server that has the Exchange Server 2013 Mailbox server role and Client Access server role installed. You need to configure anti-spam to meet the following requirements: - Email
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Networking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
Chapter 4: Security of the architecture, and lower layer security (network security) 1
Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access
POP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
IceWarp Server. IM Server Reference. Version 10
IceWarp Server IM Server Reference Version 10 Printed on 12 August, 2009 i Contents Instant Messaging 3 V10 New Features... 4 Libpurple Implementation 15 Networks... 4 Shared Roster... 4 Multi-Session
Help for System Administrators
Help for System Administrators Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Help for System Administrators
Service Overview & Installation Guide
Service Overview & Installation Guide Contents Contents... 2 1.0 Overview... 3 2.0 Simple Setup... 4 3.0 OWA Setup... 5 3.1 Receive Test... 5 3.2 Send Test... 6 4.0 Advanced Setup... 7 4.1 Receive Test
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Anti-Spam Configuration in Outlook 2003 INDEX. Webmail settings Page 2. Client settings Page 6. Creation date 12.12.06 Version 1.2
Anti-Spam Configuration in Outlook 2003 INDEX Webmail settings Page 2 Client settings Page 6 Creation date 12.12.06 Version 1.2 Webmail settings In this section, you will learn how to activate and configure
CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015
CS43: Computer Networks Email Kevin Webb Swarthmore College September 24, 2015 Three major components: mail (MUA) mail transfer (MTA) simple mail transfer protocol: SMTP User Agent a.k.a. mail reader composing,
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
ENTERPRISE LINUX NETWORKING SERVICES
ENTERPRISE LINUX NETWORKING SERVICES The is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM
WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create
Configuring Your Gateman Email Server
Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile
CipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
Using WinGate 6 Email. Concepts, Features, and Configurations.
WinGate Feature Guide Using WinGate 6 Email Concepts, Features, and Configurations. Neil Gooden Qbik New Zealand Limited Rev 1.0 December 2004 2 Introduction...3 Basic Email Concepts... 3 Differences in
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
GL275 - ENTERPRISE LINUX NETWORKING SERVICES
Length: 5 days The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement these services securely,
Pine Exchange mini HOWTO
Pine Exchange mini HOWTO Alexandru Roman v1.0, 2002 03 28 Revision History Revision 1.0 2002 03 28 Revised by: ar Submitted to the LDP for publication. Revision 0.3 2002 03 25 Revised
Change is Coming: z/os Mail Overview and Futures
Change is Coming: z/os Mail Overview and Futures (Including Motivations and Considerations for migrating from SMTPD/Sendmail to CSSMTP) Kim Bailey ([email protected]) IBM, Enterprise Networking Solutions
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Troubleshooting IMAP Clients and ViewMail for Outlook in Cisco Unity Connection 8.x
CHAPTER 17 Troubleshooting IMAP Clients and ViewMail for Outlook in Cisco Unity Connection 8.x See the following sections for problems that can occur in IMAP clients and in Cisco Unity Connection ViewMail
A New Approach to Enhance E-mail Performance Through SMTP Protocol
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.4, April 2008 299 A New Approach to Enhance E-mail Performance Through SMTP Protocol Hussein A.Al bazar,sureswaran Ramadass,
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started
Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction
GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days
GL-275: Red Hat Linux Network Services Course Length: 5 days Course Description: The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention
Technology Primer. OPS Manager, Release 7.4. Integrating Your Directory Server with our Directory Service Solution
Technology Primer OPS Manager, Release 7.4 Integrating Your Directory Server with our Directory Service Solution The Mitel Integrated Directory Services (IDS) application synchronizes the telephone directory
Start Thunderbird and follow its prompts to configure it for your Yale Central email account.
e/ Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, [email protected] Thunderbird Before you begin Download and install a current version of
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
Internet Technology 2/13/2013
Internet Technology 03r. Application layer protocols: email Email: Paul Krzyzanowski Rutgers University Spring 2013 1 2 Simple Mail Transfer Protocol () Defined in RFC 2821 (April 2001) Original definition
Articles Fighting SPAM in Lotus Domino
Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called
Terminology. Internet Addressing System
Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics
Filtering Mail with Milter. David F. Skoll Roaring Penguin Software Inc.
Filtering Mail with Milter David F. Skoll Roaring Penguin Software Inc. Why filter mail? Overview Different filtering approaches Delivery agent (e.g. Procmail) Central filtering (Milter) Milter Architecture
eprism Enterprise Tech Notes
eprism Enterprise Tech Notes Utilizing Microsoft Active Directory for eprism s Directory Services Context eprism can integrate with an existing LDAP (Lightweight Directory Access Protocol) directory for
New SMTP client for sending Internet mail
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server New SMTP client for sending Internet mail z/os Communications Server Development, Raleigh, North Carolina This presentation
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
F-Secure Internet Gatekeeper
F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
ENTERPRISE LINUX NETWORKING SERVICES
ENTERPRISE LINUX NETWORKING SERVICES COURSE DESCRIPTION: The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts
Emacs SMTP Library. An Emacs package for sending mail via SMTP. Simon Josefsson, Alex Schroeder
Emacs SMTP Library An Emacs package for sending mail via SMTP Simon Josefsson, Alex Schroeder Copyright c 2003, 2004 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify
Kerio Connect. Step-by-Step. Kerio Technologies
Kerio Connect Step-by-Step Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Connect, version 7.2. All additional modifications and
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
CONTENTS. 1. Outline of how to use.1 2. How to setup each step...1
CONTENTS 1. Outline of how to use.1 2. How to setup each step...1 2.1 Connect your IP Camera to the LAN..1 2.2 Install the following software before view video.....2 2.3 Basic configuration setting...2
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
PrinterOn Enterprise Administration Support Guide
PrinterOn Enterprise Administration Support Guide Version 2.5 Doc Rev: 1.1 Table of Contents 1. Overview...4 2. Hardware and Operating System Requirements...5 2.1. Hardware Requirements...5 2.2. Software
Reliable & Secure Email. Professional, Dependable, Complete Easy to Learn, Use and Grow
Reliable & Secure Email Professional, Dependable, Complete Easy to Learn, Use and Grow About this Presentation Summarizes primary purposes of email, plus the needs of email providers and users. Introduces
FTP: the file transfer protocol
File Transfer: FTP FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that
Borderware MXtreme. Secure Email Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved
Borderware MXtreme Secure Email Gateway QuickStart Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview MXtreme is a hardened appliance with a highly robust
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter explains the procedure on how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Migration Quick Reference Guide for Administrators
Migration Quick Reference Guide for Administrators 10 Easy Steps for Migration Maximize Performance with Easy Settings Changes Communicating with Your Users Reporting Spam Resources Page 1 10 Easy Steps
Administrator Guide. v 11
Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
MDaemon Vs. Microsoft Exchange Server 2013 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
MailEnable Web Mail End User Manual V 2.x
MailEnable Web Mail End User Manual V 2.x MailEnable Messaging Services for Microsoft Windows NT/2000/2003 MailEnable Pty. Ltd. 486 Neerim Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61
Using MailStore to Archive MDaemon Email
Using MailStore to Archive MDaemon Email This guide details how to archive all inbound and outbound email using MailStore, as well as archiving any emails currently found in the users accounts in MDaemon.
HOSTED MICROSOFT EXCHANGE
HOSTED MICROSOFT EXCHANGE HOSTED MICROSOFT EXCHANGE (HME) can be accessed via Outlook Web Access (OWA) anytime, anywhere you have access to the Internet. OUTLOOK WEB ACCESS - Log in with your HME username
