IT Questions and Answers :)

Thursday, November 23, 2017

To send an email via an SMTP server using the TELNET program, what commands should you use in which order?

To send an email via an SMTP server using the TELNET program, what commands should you use in which order?

  • EHLO, DATA, MAIL FROM then RCPT TO
  • EHLO, MAIL FROM, RCPT TO then DATA
  • DATA, EHLO, RCPT TO, then MAIL FROM
  • EHLO, RCPT TO, MAIL FROM then DATA 

 
To send an email via an SMTP server using the TELNET program, what commands should you use in which order?

EXPLANATION

Using telnet to test a mail server is a staple part of being able to diagnose e-mail faults. You must follow a specific protocol order for commands, EHLO first (to introduce your connection and view the available features of the server), MAIL FROM next to specify the sender, RCPT TO thirdly to specify the recipient, and finally DATA, which is followed by the message headers and body.

SOURCE

https://www.port25.com/how-to-check-an-smtp-connection-with-a-manual-telnet-session-2/
Share:

Wednesday, November 22, 2017

DomainKeys Identified Mail (DKIM) is a protocol allowing for email authentication utilizing PKI. Where does DKIM store its public certificate keys?

DomainKeys Identified Mail (DKIM) is a protocol allowing for email authentication utilizing PKI. Where does DKIM store its public certificate keys?

  • Certificate authority
  • MTA
  • Mail server
  • DNS
 
DomainKeys Identified Mail (DKIM) is a protocol allowing for email authentication utilizing PKI. Where does DKIM store its public certificate keys?

EXPLANATION

Somebody already did a very good summary of DKIM here:
https://blog.returnpath.com/how-to-explain-dkim-in-plain-english-2/
As a summary:

What it is: DomainKeys Identified Mail (DKIM) is a protocol that allows an organization to take responsibility for transmitting a message in a way that can be verified by mailbox providers. This verification is made possible through cryptographic authentication.
How it works: DKIM is pretty complicated. There are a lot of steps. Below, we’ll break them down as simply as possible.
Step 1: Identifying what message elements to sign with DKIM
Step 2: The encryption process
Step 3: Validating the DKIM signature with a public key

SOURCE

https://blog.returnpath.com/how-to-explain-dkim-in-plain-english-2/ 
Share:

Sender Policy Framework (SPF) is a system for validation of email. It relies on DNS to keep records of what sources are allowed to originate email from the respective domain. What is the type of DNS entry used to hold the list of allowed hosts?

Sender Policy Framework (SPF) is a system for validation of email. It relies on DNS to keep records of what sources are allowed to originate email from the respective domain. What is the type of DNS entry used to hold the list of allowed hosts?

  • NS - Name server record
  • TXT - Text record
  • NSEC - Next Secure record
  • APL - Address Prefix List 
Sender Policy Framework (SPF) is a system for validation of email. It relies on DNS to keep records of what sources are allowed to originate email from the respective domain. What is the type of DNS entry used to hold the list of allowed hosts?

 

EXPLANATION


The Sender Policy Framework (SPF) is an open standard specifying a technical method to prevent sender address forgery. More precisely, the current version of SPF — called SPFv1 or SPF Classic — protects the envelope sender address, which is used for the delivery of messages. See the box on the right for a quick explanation of the different types of sender addresses in e-mails.
(There are other solutions that protect the header sender address or that do not care at all about who sent the message, only who originally wrote it.)
Even more precisely, SPFv1 allows the owner of a domain to specify their mail sending policy, e.g. which mail servers they use to send mail from their domain. The technology requires two sides to play together: (1) the domain owner publishesthis information in an SPF record in the domain's DNS zone, and when someone else's mail server receives a message claiming to come from that domain, then (2) the receiving server can check whether the message complies with the domain's stated policy. If, e.g., the message comes from an unknown server, it can be considered a fake.
Once you are confident about the authenticity of the sender address, you can finally "take it for real" and attach reputation to it. While IP-address-based reputation systems like Spamhaus or SpamCop have prevailed so far, reputation will increasingly be based on domains and even individual e-mail addresses in the future, too. Furthermore, additional kinds of policies are planned for a future version of SPF, such as asserting that all of a domain's outgoing mail is S/MIME or PGP signed.

http://www.openspf.org/Introduction

SOURCE

http://www.openspf.org/Introduction
Share:

Tuesday, November 21, 2017

Which of the following is a MUA?

Which of the following is a MUA?

  • Outlook
  • Word
  • Postfix
  • Maildrop 
Which of the following is a MUA?

EXPLANATION


A Mail User Agent is the software which connects to a Mail Transfer Agent (which is the software on an email server) to get and send mails.
https://en.wikipedia.org/wiki/Email_client
https://en.wikipedia.org/wiki/Email_agent_(infrastructure)
Share:

Popular Posts