SlideShare ist ein Scribd-Unternehmen logo
1 von 30
History
 Simple Mail Transfer Protocol (SMTP) is
an Internet standard for electronic mail (email)
transmission.
 First defined by RFC 821in 1982
 SMTP became widely used in the early 1980s. At
the time, it was a complement to Unix to Unix
Copy Program (UUCP) mail, which was better
suited for handling email transfers between
machines that were intermittently connected.
Introduction
 SMTP (Simple Mail Transfer Protocol) is
a TCP/IP protocol used in sending and
receiving e-mail.
 Users typically use a program that uses
SMTP for sending e-mail and either POP3 or
IMAP for receiving e-mail.
SMTP Concept
Working
 SMTP is a simple ASCII protocol that is based on client-
server model. After establishing the TCP connection, the
sending machine, operating as the client, waits for the
receiving machine, operating as the server, to talk first.
The server starts by sending a line of text giving its
identity and telling whether or not it is prepared to receive
mail. If it is not, the client releases the connection and
tries again later.
 If the server is willing to accept e-mail, the client
announces whom the e-mail is coming from and
destination, the server gives the client the go ahead to
send the message. Then the client sends the message
and the server acknowledges it.
Smtp commands
 The HELO command is used to initiate an
SMTP session. When one host needs to
establish an SMTP session with another host
 MAIL FROM: command is used primarily to
send email addresses
 The RCPT TO: command tells the receiving
host the email address of the message
recipient
Smtp commands contd.
 DATA has the body of the mail
 The QUIT command is used to terminate an
SMTP session
 The RSET command performs an SMTP
reset, and then aborts the message that is
currently being sent.
 EXPN includes the mailing list to be expanded
SMTP response codes
 Responses are 3 digit codes sent from server to client
 220: The SMTP service is ready
 221: SMTP is closing the transmission channel
 250: The command has been completed
 354: OK to transmit message
 450: Command can not be completed because the
mailbox is busy
 451: Command has been aborted because of an error
 452: Command has been aborted because the receiving
host
is out of disk space
 500: Syntax error
 550: Specified mailbox is unavailable or does not exist
 552: Command was aborted because the recipient has
exceeded
their storage quota
 554: The transaction has failed
Mail Transfer Phases
 Connection Establishment
 Mail transfer
 Connection termination
Connection Establishment
 An SMTP sender will attempt to set up a TCP connection with a
target host when it has one or more mail message to deliver to
that host. The following sequence occurs during connection
setup:

 1. The sender opens a TCP connection with the receiver.
 2. Once the connection is established, the receiver identifies
itself with '220 Service Ready".
 3. The sender identifies itself with the HELO command.
 4. The receiver accepts the sender's identification with "250 'OK".
 5. If the mail service on the destination is not available, the
destination host returns a "421 Service Not Available" reply in
step 2 and the process is terminated.
Mail Transfer
• Once the connection has been established, the
SMTP sender may send one or more messages to
the SMTP receiver.
• There are three logical phases to the transfer of a
message :
 1. A MAIL command identifies the originator of the
message.
 2. One or more RCPT commands identify the
recipients of this message.
 3. A DATA command transfers the message text.
Connection termination
The SMTP sender closes the connection in the
following manner:
 1. The sender sends a QUIT command and
waits for a reply.
 2. Sender initiates TCP close operation for the
TCP connection.
 3. The receiver initiates its TCP close after
sending is reply to the QUIT command.
LATEST DEVELOPMENTS
 Today’s email content needs to be lively,
dynamic and time-dependent.
 A drop in click rates and falling conversion
rates, just like everyone else who still sends
the same email to everyone in their database
 The latest development is real-time content in
emails. Previously the content of an email
was fixed at the time it was sent. Now the
content of your mails can be updated in real-
time, every single time the email is opened.
Examples
 Offer of the day
 Live data
 Limited time content
 Social content
 Agile emails
The most recent development stage is agile
emails where the content is updated each
time the email is opened. Combined with
dynamic content and automisation, this
creates fantastic and unlimited opportunities.
IDN
 International email (IDN email or Intl email) is
email that contains international characters
(characters which do not exist in
the ASCII character set), encoded as UTF-8, in
the email header and in supporting mail transfer
protocols. The most significant aspect of this is the
allowance of email addresses (also known as
email identities) in most of the world's writing
systems, at both interface and transport levels.
IDN Contd.
 A Russian might wish to
use дерек@екзампил.ком as their identifier
but be forced to use a transcription such
as derek@example.com
 International email, by contrast,
uses Unicode characters encoded as UTF-8 -
allowing for the encoding the text of
addresses in most of the world's writing
systems
Usage
 All email servers use SMTP
 godaddy- 250 msgs per day
 gmail- 150 msgs a day
 But we can pay and create if we want to
create full fledged email servers
Evolution
 Earlier using SMTP only text needed to be
transferred. However nowadays, additional
features such multimedia also
 Security and encryption features added
 Both provide a way to encrypt a
communication channel between two
computers (e.g. your computer and our
server).
 TLS is the successor to SSL and the terms
SSL and TLS are used interchangeably
unless you're referring to a specific version of
the protocol.
Versions
 STARTTLS is a way to take an existing insecure
connection and upgrade it to a secure connection
using SSL/TLS.
 Note that despite having TLS in the name,
STARTTLS doesn't mean you have to use TLS,
you can use SSL
 So the ordering of protocols in terms of oldest to
newest is: SSL v2, SSL v3, TLS v1.0, TLS v1.1,
TLS v1.2, TLS v1.3 (currently proposed).
 Recently Google enabled smtp/tls - for security
purposes. both parties need to support this.
 When you connect to an SSL/TLS encrypted port, or
use STARTTLS to upgrade an existing connection,
both sides will negotiate which protocol and which
version to use based on what has been configured in
the software and what each side supports.
 SSL/TLS is virtually universal these days
 SSL v2 was deprecated and phased out many
years ago due to security issues. SSL v3 is
currently deprecated due to security issues, and
 support has or is being phased out by most
services these days. Almost all software supports
TLS v1.0. As at October 2016, support for TLS
v1.1
 and TLS v1.2 is also very good, though there are
some exceptions, mostly with Internet Explorer.
 To add security to some existing protocols (e.g. IMAP,
POP, etc.), it was decided to just add SSL/TLS
encryption as a layer underneath the existing protocol.
 To distinguish that software should talk the SSL/TLS
encrypted version of the protocol rather than the
plaintext one, a different port number was used for
each protocol. So you have:
 IMAP uses port 143, but SSL/TLS encrypted IMAP
uses port 993.
 POP uses port 110, but SSL/TLS encrypted POP uses
port 995.
 SMTP uses port 25, but SSL/TLS encrypted SMTP
uses port 465.
 This has now basically become the de facto
standard that everyone uses.
 IMAP SSL/TLS encrypted over port 993 or
POP SSL/TLS encrypted over port 995.
 Many sites (including FastMail) now disable
plain IMAP (port 143) and plain POP (port
110) altogether so people must use an
SSL/TLS encrypted connection.
Thank You 

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Smtp
SmtpSmtp
Smtp
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Routing
RoutingRouting
Routing
 
Transmission impairments(presentation)
Transmission impairments(presentation)Transmission impairments(presentation)
Transmission impairments(presentation)
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Application Layer
Application Layer Application Layer
Application Layer
 
Tcp
TcpTcp
Tcp
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 

Andere mochten auch

Email protocol & courtesy
Email protocol & courtesyEmail protocol & courtesy
Email protocol & courtesyNB0208
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolVinod Gurram
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios
 
TFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolTFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolPeter R. Egli
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolPrasenjit Gayen
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
Quiz 090323090328 Phpapp02
Quiz 090323090328 Phpapp02Quiz 090323090328 Phpapp02
Quiz 090323090328 Phpapp02Athith Kr
 
Quizzardo online cricket quiz
Quizzardo online cricket quizQuizzardo online cricket quiz
Quizzardo online cricket quizAthith Kr
 

Andere mochten auch (20)

Email protocol & courtesy
Email protocol & courtesyEmail protocol & courtesy
Email protocol & courtesy
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Smtp
SmtpSmtp
Smtp
 
What is tcp
What is tcpWhat is tcp
What is tcp
 
Ch21
Ch21Ch21
Ch21
 
Smtp
SmtpSmtp
Smtp
 
SMTP MULE
SMTP  MULESMTP  MULE
SMTP MULE
 
Smtp protocol
Smtp protocolSmtp protocol
Smtp protocol
 
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios PluginsNagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
 
Telnet
TelnetTelnet
Telnet
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
TFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolTFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer Protocol
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Data link control protocol(2)
Data link control protocol(2)Data link control protocol(2)
Data link control protocol(2)
 
HTTP
HTTPHTTP
HTTP
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Quiz 090323090328 Phpapp02
Quiz 090323090328 Phpapp02Quiz 090323090328 Phpapp02
Quiz 090323090328 Phpapp02
 
Cultural Quiz Spandan IIT Jodhpur
Cultural Quiz Spandan IIT JodhpurCultural Quiz Spandan IIT Jodhpur
Cultural Quiz Spandan IIT Jodhpur
 
Quizzardo online cricket quiz
Quizzardo online cricket quizQuizzardo online cricket quiz
Quizzardo online cricket quiz
 

Ähnlich wie Simple Mail Transfer Protocol

SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLVidhu Arora
 
FILE TRANSFER PROTOCOL
FILE TRANSFER PROTOCOLFILE TRANSFER PROTOCOL
FILE TRANSFER PROTOCOLkeerthikaA8
 
E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTPMd Syed Ahamad
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview PptAntonio Ieranò
 
SMTP(simple mail transfer protocol).ppsx
SMTP(simple mail transfer protocol).ppsxSMTP(simple mail transfer protocol).ppsx
SMTP(simple mail transfer protocol).ppsxanjubala996089
 
Application layer
Application layerApplication layer
Application layerAnithaRaj31
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptxAmnaNadeem27
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocolAnagha Ghotkar
 
Email Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailEmail Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailRalph van der Pauw
 
Dictributed application by Waqas
Dictributed application by WaqasDictributed application by Waqas
Dictributed application by WaqasWaqas !!!!
 
Distributedapplications
DistributedapplicationsDistributedapplications
DistributedapplicationsWaqas !!!!
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical OverviewVenkatesh Iyer
 

Ähnlich wie Simple Mail Transfer Protocol (20)

SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Cn u5
Cn u5Cn u5
Cn u5
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Mail server
Mail serverMail server
Mail server
 
Mail server
Mail serverMail server
Mail server
 
FILE TRANSFER PROTOCOL
FILE TRANSFER PROTOCOLFILE TRANSFER PROTOCOL
FILE TRANSFER PROTOCOL
 
E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTP
 
How Email Works
How Email WorksHow Email Works
How Email Works
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
SMTP(simple mail transfer protocol).ppsx
SMTP(simple mail transfer protocol).ppsxSMTP(simple mail transfer protocol).ppsx
SMTP(simple mail transfer protocol).ppsx
 
Application layer
Application layerApplication layer
Application layer
 
Parallel and distributed computing .pptx
Parallel and distributed computing .pptxParallel and distributed computing .pptx
Parallel and distributed computing .pptx
 
Smtp
SmtpSmtp
Smtp
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Email Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailEmail Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mail
 
Dictributed application by Waqas
Dictributed application by WaqasDictributed application by Waqas
Dictributed application by Waqas
 
Distributedapplications
DistributedapplicationsDistributedapplications
Distributedapplications
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
 
Email
EmailEmail
Email
 

Mehr von Ujjayanta Bhaumik (8)

Foreign studies and internships
Foreign studies and internshipsForeign studies and internships
Foreign studies and internships
 
Disney Quiz
Disney QuizDisney Quiz
Disney Quiz
 
Light field
Light field Light field
Light field
 
Auto-tech quiz
Auto-tech quizAuto-tech quiz
Auto-tech quiz
 
Augmented reality
Augmented realityAugmented reality
Augmented reality
 
Enter the dragon.pptx
Enter the dragon.pptxEnter the dragon.pptx
Enter the dragon.pptx
 
General Quiz
General QuizGeneral Quiz
General Quiz
 
Airlines Quiz
Airlines QuizAirlines Quiz
Airlines Quiz
 

Kürzlich hochgeladen

School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 

Kürzlich hochgeladen (20)

School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 

Simple Mail Transfer Protocol

  • 1.
  • 2.
  • 3. History  Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.  First defined by RFC 821in 1982  SMTP became widely used in the early 1980s. At the time, it was a complement to Unix to Unix Copy Program (UUCP) mail, which was better suited for handling email transfers between machines that were intermittently connected.
  • 4. Introduction  SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.  Users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail.
  • 6. Working  SMTP is a simple ASCII protocol that is based on client- server model. After establishing the TCP connection, the sending machine, operating as the client, waits for the receiving machine, operating as the server, to talk first. The server starts by sending a line of text giving its identity and telling whether or not it is prepared to receive mail. If it is not, the client releases the connection and tries again later.  If the server is willing to accept e-mail, the client announces whom the e-mail is coming from and destination, the server gives the client the go ahead to send the message. Then the client sends the message and the server acknowledges it.
  • 7. Smtp commands  The HELO command is used to initiate an SMTP session. When one host needs to establish an SMTP session with another host  MAIL FROM: command is used primarily to send email addresses  The RCPT TO: command tells the receiving host the email address of the message recipient
  • 8. Smtp commands contd.  DATA has the body of the mail  The QUIT command is used to terminate an SMTP session  The RSET command performs an SMTP reset, and then aborts the message that is currently being sent.  EXPN includes the mailing list to be expanded
  • 9. SMTP response codes  Responses are 3 digit codes sent from server to client  220: The SMTP service is ready  221: SMTP is closing the transmission channel  250: The command has been completed  354: OK to transmit message  450: Command can not be completed because the mailbox is busy
  • 10.  451: Command has been aborted because of an error  452: Command has been aborted because the receiving host is out of disk space  500: Syntax error  550: Specified mailbox is unavailable or does not exist  552: Command was aborted because the recipient has exceeded their storage quota  554: The transaction has failed
  • 11. Mail Transfer Phases  Connection Establishment  Mail transfer  Connection termination
  • 12. Connection Establishment  An SMTP sender will attempt to set up a TCP connection with a target host when it has one or more mail message to deliver to that host. The following sequence occurs during connection setup:   1. The sender opens a TCP connection with the receiver.  2. Once the connection is established, the receiver identifies itself with '220 Service Ready".  3. The sender identifies itself with the HELO command.  4. The receiver accepts the sender's identification with "250 'OK".  5. If the mail service on the destination is not available, the destination host returns a "421 Service Not Available" reply in step 2 and the process is terminated.
  • 13. Mail Transfer • Once the connection has been established, the SMTP sender may send one or more messages to the SMTP receiver. • There are three logical phases to the transfer of a message :  1. A MAIL command identifies the originator of the message.  2. One or more RCPT commands identify the recipients of this message.  3. A DATA command transfers the message text.
  • 14. Connection termination The SMTP sender closes the connection in the following manner:  1. The sender sends a QUIT command and waits for a reply.  2. Sender initiates TCP close operation for the TCP connection.  3. The receiver initiates its TCP close after sending is reply to the QUIT command.
  • 16.  Today’s email content needs to be lively, dynamic and time-dependent.  A drop in click rates and falling conversion rates, just like everyone else who still sends the same email to everyone in their database
  • 17.  The latest development is real-time content in emails. Previously the content of an email was fixed at the time it was sent. Now the content of your mails can be updated in real- time, every single time the email is opened.
  • 18. Examples  Offer of the day  Live data  Limited time content  Social content
  • 19.  Agile emails The most recent development stage is agile emails where the content is updated each time the email is opened. Combined with dynamic content and automisation, this creates fantastic and unlimited opportunities.
  • 20. IDN  International email (IDN email or Intl email) is email that contains international characters (characters which do not exist in the ASCII character set), encoded as UTF-8, in the email header and in supporting mail transfer protocols. The most significant aspect of this is the allowance of email addresses (also known as email identities) in most of the world's writing systems, at both interface and transport levels.
  • 21. IDN Contd.  A Russian might wish to use дерек@екзампил.ком as their identifier but be forced to use a transcription such as derek@example.com  International email, by contrast, uses Unicode characters encoded as UTF-8 - allowing for the encoding the text of addresses in most of the world's writing systems
  • 22. Usage  All email servers use SMTP  godaddy- 250 msgs per day  gmail- 150 msgs a day  But we can pay and create if we want to create full fledged email servers
  • 23. Evolution  Earlier using SMTP only text needed to be transferred. However nowadays, additional features such multimedia also  Security and encryption features added
  • 24.  Both provide a way to encrypt a communication channel between two computers (e.g. your computer and our server).  TLS is the successor to SSL and the terms SSL and TLS are used interchangeably unless you're referring to a specific version of the protocol.
  • 25. Versions  STARTTLS is a way to take an existing insecure connection and upgrade it to a secure connection using SSL/TLS.  Note that despite having TLS in the name, STARTTLS doesn't mean you have to use TLS, you can use SSL  So the ordering of protocols in terms of oldest to newest is: SSL v2, SSL v3, TLS v1.0, TLS v1.1, TLS v1.2, TLS v1.3 (currently proposed).
  • 26.  Recently Google enabled smtp/tls - for security purposes. both parties need to support this.  When you connect to an SSL/TLS encrypted port, or use STARTTLS to upgrade an existing connection, both sides will negotiate which protocol and which version to use based on what has been configured in the software and what each side supports.  SSL/TLS is virtually universal these days
  • 27.  SSL v2 was deprecated and phased out many years ago due to security issues. SSL v3 is currently deprecated due to security issues, and  support has or is being phased out by most services these days. Almost all software supports TLS v1.0. As at October 2016, support for TLS v1.1  and TLS v1.2 is also very good, though there are some exceptions, mostly with Internet Explorer.
  • 28.  To add security to some existing protocols (e.g. IMAP, POP, etc.), it was decided to just add SSL/TLS encryption as a layer underneath the existing protocol.  To distinguish that software should talk the SSL/TLS encrypted version of the protocol rather than the plaintext one, a different port number was used for each protocol. So you have:  IMAP uses port 143, but SSL/TLS encrypted IMAP uses port 993.  POP uses port 110, but SSL/TLS encrypted POP uses port 995.  SMTP uses port 25, but SSL/TLS encrypted SMTP uses port 465.
  • 29.  This has now basically become the de facto standard that everyone uses.  IMAP SSL/TLS encrypted over port 993 or POP SSL/TLS encrypted over port 995.  Many sites (including FastMail) now disable plain IMAP (port 143) and plain POP (port 110) altogether so people must use an SSL/TLS encrypted connection.