SlideShare a Scribd company logo
Overview
• Introduction to SMTP
• History of Smtp
• General features of SMTP
• Sendmail
• Relays And Gate ways
• How SMTP works
• Limitations in SMTP
• Example of SMTP
3
4
Composes, reads,
replies to
,forwards and
handles mailboxes
Transfers mails
from one host to
another
Collects mail
and delivers to
user agent
Transfers mails
from one host to
another
Collects mail
and delivers to
user agentIntroduction…
Introduction to SMTP
• SMTP is an Internet standard for electronic mail.
• SMTP is the protocol in widespread use today.
• It is the actual protocol used to transfer mail from MTA to
MTA.
• MTA: Mail Transfer Agent .... A program that actually
routes and delivers mail.
• MUA: Mail User Agen t ... A program that is used to
access mail after delivery.
• The objective of SMTP is to transfer mail reliably and
efficiently.
History of SMTP
• The SMTP specification originally started with the Mail
Transfer Protocol in 1980
• It evolved into Simple Mail Transfer Protocol (SMTP) in 1981
• Specified in RFC 821
• Most recent RFC is 2821
• First and most important implementation is sendmail
General Features
• Independent of underlying transmission subsystem.
• Just needs a reliable ordered data stream channel.
• Operates over TCP port 25.
• Uses an request-response protocol that is useful to human
readers (SMTP commands).
• SMTP sessions are stateful, with both parties carefully
maintaining a common view of the current state.
8
Sendmail
Mail Transfer Agent [MTA] : is a computer program or software agent
that transfers electronic mail messages from one computer to another.
• Sendmail is a MTA
• Supports several mail transfers including SMTP
• Pro’s
• Can perform header rewriting, mail routing
• Extensive support available
• Con’s
• Not secure
• Code is bulky [compared to other MTA’s such as qmail]
9
Message transfer…
SMTP is a push
protocol
10
• SMTP server can also
assume the role of a
“relay”
• SMTP mail gateways
are used to transport
mail prepared by a
protocol other than
SMTP
Relays and Gateways
SMTP supported
Non-SMTP
supported
11
Link Layer PCI IP-PCI
Keyword: argument(s)
Command format:
Response format:
3-digit status code [textual information]
How SMTP works?
Link Layer PCI IP-PCI TCP-PCI SMTP command/responseTCP-PCI SMTP command/responseTCP-PCI SMTP command/response
12
How SMTP works : Status Codes
The Server responds with a 3 digit code that may be followed
by text info
– 2## - Success
– 3## - Command can be accepted with
more information
– 4## - Command was rejected, but error
condition is temporary
– 5## - Command rejected, Bad User!
13
Limitations in SMTP
• Only uses NVT 7 bit ASCII format
– How to represent other data types?
• Susceptible to misuse (Spamming,
faking sender address)
SMTP transport example
Simple mail transfer protocol

More Related Content

What's hot

Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Ujjayanta Bhaumik
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
Vidhu Arora
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
RochakSrivastava3
 
What is Ping
What is PingWhat is Ping
What is Ping
Disha Dudhal
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
Trace route
Trace routeTrace route
Trace route
NetProtocol Xpert
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
Ram Dutt Shukla
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
Gunasekara Reddy
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
Tharindu Kumara
 
ICMP
ICMPICMP
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
Peter R. Egli
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
Alok Tripathi
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
Dawood Faheem Abbasi
 
It 3-icmp-igmp
It 3-icmp-igmpIt 3-icmp-igmp
It 3-icmp-igmp
MD SHADAB ALAM
 
IPv4
IPv4IPv4

What's hot (20)

Mail server
Mail serverMail server
Mail server
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
 
What is Ping
What is PingWhat is Ping
What is Ping
 
Mail server
Mail serverMail server
Mail server
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Tcp
TcpTcp
Tcp
 
Trace route
Trace routeTrace route
Trace route
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
ICMP
ICMPICMP
ICMP
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
It 3-icmp-igmp
It 3-icmp-igmpIt 3-icmp-igmp
It 3-icmp-igmp
 
IPv4
IPv4IPv4
IPv4
 
5. icmp
5. icmp5. icmp
5. icmp
 

Similar to Simple mail transfer protocol

how email works
how email workshow email works
how email works
harikaveeravalli
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
Shantanu Hinge
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
JAIGANESH SEKAR
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
Deepraj Bhujel
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
anwarkade1
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
Online
 
E mail flow
E mail flowE mail flow
E mail flow
Harish Kumar
 
Electronic mail
Electronic mailElectronic mail
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
tumetr1
 
Application layer
Application layerApplication layer
Application layer
AnithaRaj31
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical OverviewVenkatesh Iyer
 
How Email Works
How Email WorksHow Email Works
How Email Works
Sahil Babbar
 
Computer networks
Computer networksComputer networks
Computer networks
sonukumar142
 
Email
EmailEmail
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
YouTubeCONTRA
 
SMTP and TCP protocol
SMTP and TCP protocolSMTP and TCP protocol
SMTP and TCP protocol
DivyaKS18
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
Mohammed Ilyas
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxGracia Marcom
 

Similar to Simple mail transfer protocol (20)

how email works
how email workshow email works
how email works
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
E mail flow
E mail flowE mail flow
E mail flow
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Application layer
Application layerApplication layer
Application layer
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
 
How Email Works
How Email WorksHow Email Works
How Email Works
 
Computer networks
Computer networksComputer networks
Computer networks
 
Email
EmailEmail
Email
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
SMTP and TCP protocol
SMTP and TCP protocolSMTP and TCP protocol
SMTP and TCP protocol
 
Ch22 system administration
Ch22 system administration Ch22 system administration
Ch22 system administration
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linux
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Simple mail transfer protocol

  • 1.
  • 2. Overview • Introduction to SMTP • History of Smtp • General features of SMTP • Sendmail • Relays And Gate ways • How SMTP works • Limitations in SMTP • Example of SMTP
  • 3. 3
  • 4. 4 Composes, reads, replies to ,forwards and handles mailboxes Transfers mails from one host to another Collects mail and delivers to user agent Transfers mails from one host to another Collects mail and delivers to user agentIntroduction…
  • 5. Introduction to SMTP • SMTP is an Internet standard for electronic mail. • SMTP is the protocol in widespread use today. • It is the actual protocol used to transfer mail from MTA to MTA. • MTA: Mail Transfer Agent .... A program that actually routes and delivers mail. • MUA: Mail User Agen t ... A program that is used to access mail after delivery. • The objective of SMTP is to transfer mail reliably and efficiently.
  • 6. History of SMTP • The SMTP specification originally started with the Mail Transfer Protocol in 1980 • It evolved into Simple Mail Transfer Protocol (SMTP) in 1981 • Specified in RFC 821 • Most recent RFC is 2821 • First and most important implementation is sendmail
  • 7. General Features • Independent of underlying transmission subsystem. • Just needs a reliable ordered data stream channel. • Operates over TCP port 25. • Uses an request-response protocol that is useful to human readers (SMTP commands). • SMTP sessions are stateful, with both parties carefully maintaining a common view of the current state.
  • 8. 8 Sendmail Mail Transfer Agent [MTA] : is a computer program or software agent that transfers electronic mail messages from one computer to another. • Sendmail is a MTA • Supports several mail transfers including SMTP • Pro’s • Can perform header rewriting, mail routing • Extensive support available • Con’s • Not secure • Code is bulky [compared to other MTA’s such as qmail]
  • 10. 10 • SMTP server can also assume the role of a “relay” • SMTP mail gateways are used to transport mail prepared by a protocol other than SMTP Relays and Gateways SMTP supported Non-SMTP supported
  • 11. 11 Link Layer PCI IP-PCI Keyword: argument(s) Command format: Response format: 3-digit status code [textual information] How SMTP works? Link Layer PCI IP-PCI TCP-PCI SMTP command/responseTCP-PCI SMTP command/responseTCP-PCI SMTP command/response
  • 12. 12 How SMTP works : Status Codes The Server responds with a 3 digit code that may be followed by text info – 2## - Success – 3## - Command can be accepted with more information – 4## - Command was rejected, but error condition is temporary – 5## - Command rejected, Bad User!
  • 13. 13 Limitations in SMTP • Only uses NVT 7 bit ASCII format – How to represent other data types? • Susceptible to misuse (Spamming, faking sender address)