SlideShare a Scribd company logo
1 of 15
Overview
• Introduction to SMTP
• History of Smtp
• General features of SMTP
• Sendmail
• Relays And Gate ways
• How SMTP works
• Limitations in SMTP
• Example of SMTP
3
4
Composes, reads,
replies to
,forwards and
handles mailboxes
Transfers mails
from one host to
another
Collects mail
and delivers to
user agent
Transfers mails
from one host to
another
Collects mail
and delivers to
user agentIntroduction…
Introduction to SMTP
• SMTP is an Internet standard for electronic mail.
• SMTP is the protocol in widespread use today.
• It is the actual protocol used to transfer mail from MTA to
MTA.
• MTA: Mail Transfer Agent .... A program that actually
routes and delivers mail.
• MUA: Mail User Agen t ... A program that is used to
access mail after delivery.
• The objective of SMTP is to transfer mail reliably and
efficiently.
History of SMTP
• The SMTP specification originally started with the Mail
Transfer Protocol in 1980
• It evolved into Simple Mail Transfer Protocol (SMTP) in 1981
• Specified in RFC 821
• Most recent RFC is 2821
• First and most important implementation is sendmail
General Features
• Independent of underlying transmission subsystem.
• Just needs a reliable ordered data stream channel.
• Operates over TCP port 25.
• Uses an request-response protocol that is useful to human
readers (SMTP commands).
• SMTP sessions are stateful, with both parties carefully
maintaining a common view of the current state.
8
Sendmail
Mail Transfer Agent [MTA] : is a computer program or software agent
that transfers electronic mail messages from one computer to another.
• Sendmail is a MTA
• Supports several mail transfers including SMTP
• Pro’s
• Can perform header rewriting, mail routing
• Extensive support available
• Con’s
• Not secure
• Code is bulky [compared to other MTA’s such as qmail]
9
Message transfer…
SMTP is a push
protocol
10
• SMTP server can also
assume the role of a
“relay”
• SMTP mail gateways
are used to transport
mail prepared by a
protocol other than
SMTP
Relays and Gateways
SMTP supported
Non-SMTP
supported
11
Link Layer PCI IP-PCI
Keyword: argument(s)
Command format:
Response format:
3-digit status code [textual information]
How SMTP works?
Link Layer PCI IP-PCI TCP-PCI SMTP command/responseTCP-PCI SMTP command/responseTCP-PCI SMTP command/response
12
How SMTP works : Status Codes
The Server responds with a 3 digit code that may be followed
by text info
– 2## - Success
– 3## - Command can be accepted with
more information
– 4## - Command was rejected, but error
condition is temporary
– 5## - Command rejected, Bad User!
13
Limitations in SMTP
• Only uses NVT 7 bit ASCII format
– How to represent other data types?
• Susceptible to misuse (Spamming,
faking sender address)
SMTP transport example
Simple mail transfer protocol

More Related Content

What's hot

Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Rajan Pandey
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
rahul kundu
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
Chhatra Thapa
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 

What's hot (20)

Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Application layer
Application layerApplication layer
Application layer
 
E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTP
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Mail server
Mail serverMail server
Mail server
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
IP Security
IP SecurityIP Security
IP Security
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
 
Transport Protocols
Transport ProtocolsTransport Protocols
Transport Protocols
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Tcp
TcpTcp
Tcp
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 

Similar to Simple mail transfer protocol

E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
Venkatesh Iyer
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
YouTubeCONTRA
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linux
Gracia Marcom
 

Similar to Simple mail transfer protocol (20)

how email works
how email workshow email works
how email works
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
Mail server
Mail serverMail server
Mail server
 
E mail flow
E mail flowE mail flow
E mail flow
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Application layer
Application layerApplication layer
Application layer
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
 
How Email Works
How Email WorksHow Email Works
How Email Works
 
Computer networks
Computer networksComputer networks
Computer networks
 
Email
EmailEmail
Email
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
SMTP and TCP protocol
SMTP and TCP protocolSMTP and TCP protocol
SMTP and TCP protocol
 
Ch22 system administration
Ch22 system administration Ch22 system administration
Ch22 system administration
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linux
 
SMTP.docx
SMTP.docxSMTP.docx
SMTP.docx
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Simple mail transfer protocol

  • 1.
  • 2. Overview • Introduction to SMTP • History of Smtp • General features of SMTP • Sendmail • Relays And Gate ways • How SMTP works • Limitations in SMTP • Example of SMTP
  • 3. 3
  • 4. 4 Composes, reads, replies to ,forwards and handles mailboxes Transfers mails from one host to another Collects mail and delivers to user agent Transfers mails from one host to another Collects mail and delivers to user agentIntroduction…
  • 5. Introduction to SMTP • SMTP is an Internet standard for electronic mail. • SMTP is the protocol in widespread use today. • It is the actual protocol used to transfer mail from MTA to MTA. • MTA: Mail Transfer Agent .... A program that actually routes and delivers mail. • MUA: Mail User Agen t ... A program that is used to access mail after delivery. • The objective of SMTP is to transfer mail reliably and efficiently.
  • 6. History of SMTP • The SMTP specification originally started with the Mail Transfer Protocol in 1980 • It evolved into Simple Mail Transfer Protocol (SMTP) in 1981 • Specified in RFC 821 • Most recent RFC is 2821 • First and most important implementation is sendmail
  • 7. General Features • Independent of underlying transmission subsystem. • Just needs a reliable ordered data stream channel. • Operates over TCP port 25. • Uses an request-response protocol that is useful to human readers (SMTP commands). • SMTP sessions are stateful, with both parties carefully maintaining a common view of the current state.
  • 8. 8 Sendmail Mail Transfer Agent [MTA] : is a computer program or software agent that transfers electronic mail messages from one computer to another. • Sendmail is a MTA • Supports several mail transfers including SMTP • Pro’s • Can perform header rewriting, mail routing • Extensive support available • Con’s • Not secure • Code is bulky [compared to other MTA’s such as qmail]
  • 10. 10 • SMTP server can also assume the role of a “relay” • SMTP mail gateways are used to transport mail prepared by a protocol other than SMTP Relays and Gateways SMTP supported Non-SMTP supported
  • 11. 11 Link Layer PCI IP-PCI Keyword: argument(s) Command format: Response format: 3-digit status code [textual information] How SMTP works? Link Layer PCI IP-PCI TCP-PCI SMTP command/responseTCP-PCI SMTP command/responseTCP-PCI SMTP command/response
  • 12. 12 How SMTP works : Status Codes The Server responds with a 3 digit code that may be followed by text info – 2## - Success – 3## - Command can be accepted with more information – 4## - Command was rejected, but error condition is temporary – 5## - Command rejected, Bad User!
  • 13. 13 Limitations in SMTP • Only uses NVT 7 bit ASCII format – How to represent other data types? • Susceptible to misuse (Spamming, faking sender address)