Secure mail server

Post on 19-May-2015

340 views 0 download

Tags:

description

how to make mail servers with help of redhat servers.

Transcript of Secure mail server

By- Richa GulatiRoll No.-08EMTCS092

Secure Mail Server

• An application that Sends & receives incoming E-mail from Internet users.

• Location is not Fixed.

• Why it so Popular in Internet world?

1 . Very Fast2. Keep The Data3. Very Cheap 4. Able to send Attachment such as Audio and Video

File

What is Mail Server?

Structure of Mail Server• System uses following protocols for sending e-mail:

1. SMTP -Simple Mail Transfer Protocol2. ESMTP -extended SMTP

• And uses following protocols for receiving e-mail:

1. POP3(Post Office Protocol 3) 2. IMAP(Internet Message Access Protocol) for receiving

e-mail.

Working of Mail Server

Security Problems• Some Other Person can Use your account by Hacking.

• You may login to fake Web-site Eg. https://www.citybankindia.com

• Path Hacking may be possible

• Hacker may get access your user name & password via path Hacking.

Reasons Behind Security Problem• If the connection to your Webmail server is “insecure” (i.e.

the address is http:// and NOT https://).

• SMTP: Does not use TLS in SMTP.

Role of POP & IMAP• POP and IMAP: The POP and IMAP protocols require that

you send your username and password to login; these credentials are not encrypted. So, your messages and credentials can be read by any eavesdropper listening to the flow of information between your personal computer and your email service provider’s computer.

Solutions to problem1. Symmetric Encryption In symmetric encryption, you and your friend share a

“secret” key. Using this key, you can encrypt a message into “cyphertext”.

In asymmetric key encryption• In asymmetric key encryption, the two keys that each

person possesses are commonly named the “private” and “public” key.

Securing Your Email With SSL or TLSSSL is a combination of asymmetric and symmetric key

encryption mechanisms.

What is spam?• flooding the Internet with many copies of the same message, in

an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender

• Email spam targets individual users with direct mail messages. Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses.

• In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth.

Span Filters

Filtering by header

Filtering by body content

Filtering by attachment

How to make digital certificate

THANKYOU!!!

QUERIES???

Print master

• Your Text here

• Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat.

• Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla facilisi.