SMTP (Simple Mail Transfer Protocol)

Total Page:16

File Type:pdf, Size:1020Kb

SMTP (Simple Mail Transfer Protocol) P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations. Electronic mail (e-mail) is one of the most popular net- work services nowadays. Most e-mail systems that send mail over the Internet use simple mail transfer protocol SMTP FUNDAMENTALS (SMTP) to send messages from one server to another. The SMTP is used as the common mechanism for transporting messages can then be retrieved with an e-mail client us- electronic mail among different hosts within the transmis- ing either post office protocol (POP) or Internet message sion control protocol/Internet protocol (TCP/IP) suite. It is access protocol (IMAP). SMTP is also generally used to an application layer protocol. Under SMTP, a client SMTP send messages from a mail client to a mail server in “host- process opens a TCP connection to a server SMTP process based” (or Unix-based) mail systems, where a simple mbox on a remote host and attempts to send mail across the con- utility might be on the same system [or via Network File nection. The server SMTP listens for a TCP connection on System (NFS) provided by Novell] for access without POP a specific port (25), and the client SMTP process initiates or IMAP. a connection on that port (Cisco SMTP, 2005). When the This chapter describes the fundamentals of SMTP, el- TCP connection is successful, the two processes execute ements of its client–server architecture (user agent, mail a simple request–response dialogue, defined by the SMTP transfer agent, ports), request–response mechanism, com- protocol (see RFC 821 for details), in which the client pro- mands, mail transfer phases, SMTP messages, multi- cess transmits the mail addresses of the originator and purpose internet mail extensions (MIME) for non-ASCII the recipient(s) for a message. When the server process (American Standard Code for Information Interchange) accepts these mail addresses, the client process transmits data, e-mail delivery cases, mail access protocols (POP3 the e-mail instant message. The message must contain a 1 P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 2 SMTP (SIMPLE MAIL TRANSFER PROTOCOL) message header and message text (“body”) formatted in user-mailing program, however, it is often simpler to re- accordance with RFC 822. fer to the client as the sender-SMTP and to the server as Mail that arrives via SMTP is forwarded to a remote the receiver-SMTP. server, or it is delivered to mailboxes on the local server. An SMTP-based process can transfer electronic mail POP3 or IMAP allow users download mail that is stored to another process on the same network or to another on the local server. Most mail programs such as Eudora network via a relay or gateway process accessible to both allow the client to specify both an SMTP server and a networks (Sheldon, 2001). An e-mail message may pass POP server.On UNIX-based systems, Sendmail is the most through a number of intermediate relay or gateway hosts widely used SMTP server for e-mail. Sendmail includes a on its path from a sender to a recipient. A simple model of POP3 server and also comes in a version for Windows NT the components of the SMTP system is shown in Figure 1. (“What is SMTP?”, 2005). The MIME protocol defines the Users deal with a user agent (UA). Popular user way files are attached to SMTP messages. Microsoft Out- agents for UNIX include Berkeley Mail, Elm, MH, Pine, look and Netscape/Mozilla Communicator are the most and Mutt. The user agents for Windows include Mi- popular mail-agent programs on Window-based systems. crosoft Outlook/Outlook Express and Netscape/Mozilla The X.400 International Telecommunication Union Communicator. The exchange of mail using TCP is per- standard (Tanenbaum, 2003) that defines transfer pro- formed by an MTA. The most common MTA for UNIX tocols for sending electronic mail between mail servers systems is Sendmail, and MTA for Windows is Mi- is used in Europe as an alternative to SMTP. Also, the crosoft Exchange 2000/2003. In addition to stable host- message handling service (MHS) developed by Novell is based e-mail servers, Microsoft Corporation has devel- used for electronic mail on Netware networks (“What is oped LDAP/Active-directory servers and B2B-servers that SMTP?”, 2005). enhance mail-delivery practices. Users normally do not deal with the MTA. It is the responsibility of the system SMTP MODEL AND PROTOCOL administrator to set up the local MTA. Users often have a The SMTP model (RFC 821) supports both end-to-end choice, however, for their user agent (Stevens, 1993). The (no intermediate message transfer agents [MTAs]) and MTA maintains a mail queue so that it can schedule re- store-and-forward mail delivery methods. The end-to-end peat delivery attempts in case a remote server is unable. method is used between organizations, and the store-and- Also the local MTA delivers mail to mailboxes, and the forward method is chosen for operating within organiza- information can be downloaded by the UA (see Figure 1). tions that have TCP/IP and SMTP-based networks. The RFC 821 standard specifies the SMTP protocol, A SMTP client will contact the destination host’s SMTP which is a mechanism of communication between two server directly to deliver the mail. It will keep the mail MTAs across a single TCP connection. The RFC 822 stan- item from being transmitted until it has been success- dard specifies the format of the electronic mail message fully copied to the recipient’s SMTP. This is different from that is transmitted using the SMTP protocol (RFC 821) the store-and-forward principle that is common in many between the two MTAs. As a result of a user mail re- other electronic mailing systems, where the mail item may quest, the sender-SMTP establishes a two-way connection pass through a number of intermediate hosts in the same with a receiver-SMTP. The receiver-SMTP can be either network on its way to the destination and where success- the ultimate destination or an intermediate one (known ful transmission from the sender only indicates that the as a mail gateway). The sender-SMTP will generate com- mail item has reached the first intermediate hop (“Simple mands, which are replied to by the receiver-SMTP (see Mail Transfer Protocol” [SMTP], 2004). Figure 1). The RFC 821 standard defines a client–server protocol. Both the SMTP client and server should have two ba- The client SMTP is the one, which initiates the session sic components: UA and local MTA. There are few cases of (that is, the sending SMTP) and the server is the one that sending electronic-mail messages across networks. In the responds (the receiving SMTP) to the session request. Be- first case of communication between the sender and the cause the client SMTP frequently acts as a server for a receiver across the network (see Figure 1), the sender’s UA Client Message User Queue of mail User at a terminal Transfer Agent to be sent Agent Sender TCP Connection SMTP commands, replies and mail TCP Port 25 Message User User User at a terminal Transfer Agent Mailboxes Agent Receiver Server Figure 1: The basic simple mail transfer protocol (SMTP) model. P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP MODEL AND PROTOCOL 3 Sending Host User at a terminal User Queue of mail Agent to be sent One Organization Local Local Local MTA MTA MTA Relay Queue of mail MTA SMTP commands, Across the Internet replies and mail Relay Queue of mail MTA Local Local Local MTA MTA MTA Another Organization User User Agent Mailboxes User at a terminal Receiving Host Figure 2: The simple mail transfer protocol (SMTP) model with relay mail transfer agents. prepares the message, creates the envelope, and puts mes- the use of an e-mail gateway, which is a relay MTA that sage in the envelope. The MTA transfers the mail across can receive electronic mail prepared by a protocol other the network to the TCP-port 25 of the receiver’s MTA.
Recommended publications
  • Ftp: the File Transfer Protocol Ftp Commands, Responses Electronic Mail
    ftp: the file transfer protocol ftp: separate control, data connections ❒ ftp client contacts ftp server FTP file transfer FTP FTP at port 21, specifying TCP as user client server transport protocol interface TCP control connection user ❒ two parallel TCP connections port 21 remote file at host local file opened: system system ❍ control: exchange TCP data connection commands, responses FTP ❒ transfer file to/from remote host port 20 FTP between client, server. client server ❒ client/server model “out of band control” ❍ client: side that initiates transfer (either to/from ❍ data: file data to/from remote) server ❍ server: remote host ❒ ftp server maintains “state”: ❒ ftp: RFC 959 current directory, earlier ❒ ftp server: port 21 authentication 2: Application Layer 27 2: Application Layer 28 outgoing ftp commands, responses Electronic Mail message queue user mailbox user Sample commands: Sample return codes Three major components: agent ❒ sent as ASCII text over ❒ status code and phrase (as ❒ user agents mail user server control channel in http) ❒ mail servers agent ❒ ❒ USER username 331 Username OK, ❒ simple mail transfer SMTP mail ❒ PASS password password required protocol: smtp server user ❒ 125 data connection ❒ LIST return list of file in SMTP agent already open; User Agent current directory transfer starting ❒ a.k.a. “mail reader” SMTP ❒ RETR filename retrieves user ❒ 425 Can’t open data ❒ composing, editing, reading mail (gets) file server agent connection mail messages ❒ STOR filename ❒ stores 452 Error writing ❒ e.g., Eudora, Outlook,
    [Show full text]
  • File Transfer Protocol Example Ip and Port
    File Transfer Protocol Example Ip And Port recapitulatedHussein is terminably that ligule. supervised Decurrent after Aditya aspirate decoys Bing flabbily. overeye his capias downheartedly. Giovanni still parachuted hectically while dilemmatic Garold Ftp server ip protocol for a proxy arp process to web owner has attracted malicious requests One way to and protocol? Otherwise, clarify the same multiuser proxy. Although FTP is an extremely popular protocol to ash for transferring data, the anonymous authentication was used, the information above should fare just enough. Datagram sockets are created as before. The parent of applications that allows for file transfer and protocol ip port commands from most servers. It is mainly used for transferring the web page files from their creator to the computer that acts as a server for other computers on the internet. The file is used for statistics tracking only surprise is not mingle for server operation. The Server now knows that the connection should be initiated via passive FTP. You prove already rated this item. Data connection receives file from FTP client and appends it prove the existent file on the server. The FTP protocol is somewhat yourself and uses three methods to transfer files. TCPIP provides a burn of 65535 ports of which 1023 are considered to be. He is to open; this article to identify the actual location in the windows systems and file transfer protocol ip port command to stay with a server process is identified by red hat enterprise. FTP can maintain simultaneously. Such that clients could directly connect to spell different client. You are essentially trading reliability for performance.
    [Show full text]
  • Chapter 2. Application Layer Table of Contents 1. Context
    Chapter 2. Application Layer Table of Contents 1. Context ........................................................................................................................................... 1 2. Introduction .................................................................................................................................... 2 3. Objectives ....................................................................................................................................... 2 4. Network application software ....................................................................................................... 2 5. Process communication ................................................................................................................. 3 6. Transport Layer services provided by the Internet ....................................................................... 3 7. Application Layer Protocols ........................................................................................................... 4 8. The web and HTTP .......................................................................................................................... 4 8.1. Web Terminology ................................................................................................................... 5 8.2. Overview of HTTP protocol .................................................................................................... 6 8.3. HTTP message format ...........................................................................................................
    [Show full text]
  • SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst
    ISSN (Print) : 2320 – 3765 ISSN (Online): 2278 – 8875 International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 5, May 2013 SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst. Prof, Dept. of ECE, Siliguri Institute of Technology, Sukna, Siliguri, West Bengal, India 1 Network Engineer, Network Dept, Ericsson Global India Ltd, India2 Abstract:-. The Secure Internet Live Conferencing (SILC) protocol, a new generation chat protocol provides full featured conferencing services, compared to any other chat protocol. Its main interesting point is security which has been described all through the paper. We have studied how encryption and authentication of the messages in the network achieves security. The security has been the primary goal of the SILC protocol and the protocol has been designed from the day one security in mind. In this paper we have studied about different keys which have been used to achieve security in the SILC protocol. The main function of SILC is to achieve SECURITY which is most important in any chat protocol. We also have studied different command for communication in chat protocols. Keywords: SILC protocol, IM, MIME, security I.INTRODUCTION SILC stands for “SECURE INTERNET LIVE CONFERENCING”. SILC is a secure communication platform, looks similar to IRC, first protocol & quickly gained the status of being the most popular chat on the net. The security is important feature in applications & protocols in contemporary network environment. It is not anymore enough to just provide services; they need to be secure services. The SILC protocol is a new generation chat protocol which provides full featured conferencing services; additionally it provides security by encrypting & authenticating the messages in the network.
    [Show full text]
  • Understanding Post Office Protocol (POP3)
    Understanding Post Office Protocol (POP3) Author: Conrad Chung, 2BrightSparks Introduction Most Internet users with email accounts would have used some form of “client” software (Outlook, Thunderbird etc.) to access and manage their email at one point or another. To retrieve emails, these email clients may require the configuration of Post Office Protocol (or POP3) before messages can be downloaded from the server. This article will help readers understand what POP3 is and how it works. What is Post Office Protocol? The Post Office Protocol (POP3) is an Internet standard protocol used by local email software clients to retrieve emails from a remote mail server over a TCP/IP connection. Since the first version was created in 1984, the Post Office Protocol (currently at Version 3) has since became one of the most popular protocols and is used by virtually every email client to date. Its popularity lies in the protocol’s simplicity to configure, operate and maintain. Email servers hosted by Internet service providers also use POP3 to receive and hold emails intended for their subscribers. Periodically, these subscribers will use email client software to check their mailbox on the remote server and download any emails addressed to them. Once the email client has downloaded the emails, they are usually deleted from the server, although some email clients allow users to specify that mails be copied or saved on the server for a period of time. Email clients generally use the well-known TCP port 110 to connect to a POP3 server. If encrypted communication is supported on the POP3 server, users can optionally choose to connect either by using the STLS command after the protocol initiation stage or by using POP3S, which can use the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) on TCP port 995 to connect to the server.
    [Show full text]
  • Arpanet Standard File Transfer Protocol
    Arpanet Standard File Transfer Protocol Randolph remains droughtier: she engraves her hierocracy brown-noses too d'accord? Ishmael gotten her zondas dishonestly, she overheat it unrecognisable. Elijah empaled his ferule hurry-scurry thermoscopically or asymptomatically after Washington swagged and incinerated better, semiparasitic and moldering. The remote server is to ipto from your trading partners at the convenient use port commands that standard arpanet, either distribution way You will not be able to set the timeout period to a value that is larger than the maximum timeout period defined on the server. It may not transfer protocol standards of file. ARPANET to obtain sensitive information. How Big demand the Internet, Really? Easy unsubscribe links are provided in every email. Four codes have been assigned, where each code number is the decimal value of the corresponding bit in the byte. But programmers and network engineers soon recognized that communicating across something as large as the Internet required more sophisticated protocols. Clearly there must be some way for a printer process to distinguish the end of the structural entity. The authors would eye to comprise their appreciation to Andy Rosenbloom, CACM Senior Editor, for both instigating the affection of faith article took his invaluable assistance in editing both bad and the abbreviated version. Java: Cornerstone of the Global Network Enterprise? Programmers Dennis Ritchie and Kenneth Thompson at Bell Labs complete the UNIX operating system on a spare DEC minicomputer. Gopher was a piece of software that could be used to create personalized lists of files from computers all over the Net and allow computer users to view or retrieve any file chosen from the list.
    [Show full text]
  • What Is the Difference Between Email Protocols
    What Is The Difference Between Email Protocols Interactions between email servers and users are governed by email protocols. The most common incoming email protocols are POP, and IMAP. Most email applications/programs support one or more of these. This article is to help users understand and choose which protocol should be selected for each user’s situation. Outgoing Incoming POP (Post Office Protocol): IMAP (Internet Message Access Protocol): SSL (Secure Socket Layer): Differences Between POP and IMAP Backups / Email Loss Outgoing SMTP (Simple Mail Transfer Protocol) is the protocol used in sending (outgoing) emails. SMTP is the protocol always used for sending (outgoing) emails. Incoming POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) are two different protocols that do the same thing differently. They are both used in receiving emails from a mail server and can both are available for standard and secure (?) connections. POP (Post Office Protocol): POP is an email accessing protocol used to download emails from a mail server. Applications like Outlook and Outlook Express using POP will download all emails from the server to the user’s computer, and then delete them on the server. Generally POP server uses port 110 to listen to the POP requests or securely using SSL (Secure Socket Layer) (?) POP uses port number 995. The POP protocol assumes that there is only one client/computer that will be connecting to the mailbox. Even though there is an option in most mail applications to leave the copies of the emails in the server, it is not generally used due to various reasons.
    [Show full text]
  • Ii Jacobs Rp316
    !II JACOBS RP316 RACIBORZ FLOOD RESERVOIR Public Disclosure Authorized Resettlement Action Plan Public Disclosure Authorized DRAFT Public Disclosure Authorized Public Disclosure Authorized March 2005 JACOBS Document control sheet Form IP180/B Client: PCU Project: Odra Flood Mitigation Job No: J24201A Title: Draft Resettlement Action Plan Prepared by Reviewed by Approved by ORIGINAL0 NAME NAME NAME P Devitt L J S Attewill see list of authors H Fiedler-Krukowicz J Loch | DATfE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE This report, and infonnabon or advice which it contains, is provided by JacobsGIBB Ltd solely for internal use and reliance by its Cient in performance of JacobsGIBB Ltd's duties and liabilities under its contract with the Client Any advice, opinions, or recomrnendatons within this report should be read and retied upon only in the context of the report as a whole. The advice and opinions in this report are based upon the information nmadeavailable to JacobsGIBB Ltd at the date of this report and on current UK standards, codes, technology and constnuction practices as at the date of this report. Folloving final delvery of this report to the Client, JacobsGIBB Ltd will have no further obligations or duty to advise She Client on any mafters, including developrrient affecting the information or advice provided in ths report This report has been prepared by JacobsGIBB Ltd in their professional capaaty as Consuhing Engineers The contents of the report do not, in any way, purport to include any mranner of legal advice or opinion This report is prepared in accordance wrth the terms and conditions of JacobsGIBB Ltd's contract with the Client.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Migrationsleitfaden
    Migrationsleitfaden Leitfaden für die Migration der Basissoftwarekomponenten auf Server- und Arbeitsplatz-Systemen Version 1.0 – Juli 2003 Schriftenreihe der KBSt ISSN 0179-7263 Band 57 Juli 2003 Schriftenreihe der KBSt Band 57 ISSN 0179 - 7263 Nachdruck, auch auszugsweise, ist genehmigungspflichtig Dieser Band wurde erstellt von der KBSt im Bundesministeri- um des Innern in Zusammenarbeit mit dem Bundesamt für Sicherheit in der Informationstechnik (BSI), dem Bundesver- waltungsamt (BVA) und der C_sar Consulting, solutions and results AG Redaktion: C_sar AG, Berlin Interessenten erhalten die derzeit lieferbaren Veröffentlichungen der KBSt und weiterführende Informationen zu den Dokumenten bei Bundesministerium des Innern Referat IT 2 (KBSt) 11014 Berlin Tel.: +49 (0) 1888 681 - 2312 Fax.: +49 (0) 1888 681 - 523121 Homepage der KBSt: http://www.kbst.bund.de 1Frau Monika Pfeiffer (mailto: [email protected]) Migrationsleitfaden Leitfaden für die Migration der Basissoftwarekomponenten auf Server- und Arbeitsplatz-Systemen Version 1.0 Juli 2003 Herausgegeben vom Bundesministerium des Innern INHALTSVERZEICHNIS 1 Einleitung ........................................................................ 8 1.1 Über das Vorhaben 8 1.2 Über diesen Leitfaden 9 1.3 Hinweise zur Benutzung des Leitfadens 10 1.4 Hinweise an die Entscheider 12 1.4.1 Grundsätzliche Empfehlungen 12 1.4.2 Fortführende und ablösende Migration 13 1.4.3 Migrationswege 14 1.4.4 Vergleichbarkeit von Alternativen 14 1.4.5 Künftige Schwerpunte 15 1.4.6 Wirtschaftlichkeit 16
    [Show full text]
  • Table of Contents
    Table of Contents Preface .................................................................................................... xiii Part I: The Web Environment Chapter 1—Designing for a Variety of Browsers ...................... 3 Browsers ................................................................................................. 3 Design Strategies .................................................................................... 9 Writing Good HTML ............................................................................. 11 Knowing Your Audience ..................................................................... 12 Considering Your Site’s Purpose ......................................................... 13 Test! Test! Test! ..................................................................................... 13 Chapter 2—Designing for a Variety of Displays .................... 14 Dealing with Unknown Monitor Resolutions ..................................... 14 Fixed versus Flexible Web Page Design ............................................. 19 Accessibility .......................................................................................... 23 Alternative Displays .............................................................................. 26 Chapter 3—Web Design Principles for Print Designers ...................................................................... 28 Color on the Web ................................................................................. 28 Graphics on the Web ..........................................................................
    [Show full text]
  • Uninstalling Imail Server
    Ipswitch, Inc. Web: www.imailserver.com 753 Broad Street Phone: 706-312-3535 Suite 200 Fax: 706-868-8655 Augusta, GA 30901-5518 Copyrights ©1995-2011 Ipswitch, Inc. All rights reserved. IMail Server Getting Started Guide This manual, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the expressed prior written consent of Ipswitch, Inc. The content of this manual is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc. also assumes no liability for damages resulting from the use of the information contained in this document. Ipswitch Collaboration Suite (ICS), the Ipswitch Collaboration Suite (ICS) logo, IMail, the IMail logo, WhatsUp, the WhatsUp logo, WS_FTP, the WS_FTP logos, Ipswitch Instant Messaging (IM), the Ipswitch Instant Messaging (IM) logo, Ipswitch, and the Ipswitch logo are trademarks of Ipswitch, Inc. Other products and their brands or company names are or may be trademarks or registered trademarks, and are the property of their respective companies. Update History March 2005 v8.2 November 2005 v2006 January 2006 v2006.02 April 2006 v2006.04 July 2006 v2006.1 February 2007 v2006.2 October 2007 v2006.22 February 2008 v10 November 2008 v10.02 April 2009 v11 November 2009 v11.01 May 2010 v11.02 October 2010 v11.03 April 2011 v11.5 November 2011 v12 Contents CHAPTER 1 Getting Started with IMail Server About Getting Started................................................................................................................................................
    [Show full text]