SlideShare a Scribd company logo
1 of 14
Protocolos de E-mail
Diogo Rodrigues Lopes
Paulo Vitor Bischof
Agenda
1.
2.
3.
4.
5.

Introdução;
História;
Funcionamento;
Protocolos Seguros;
Considerações finais;
SMTP
• Protocolo padrão de envio de E-mail
• Criado em 1982, na Universidade do Sul da
Califórnia por Jon Postel
• Envia o e-mail do client para o server
SMTP Syntax
COMMAND
HELO <domain>
MAIL FROM:<reversepath>
RCPT TO:<forwardpath>
DATA
RSET
VRFY <string>
EXPN <string>
HELP [<string>]
NOOP [<string>]
QUIT

DESCRIPTION
(Hello) Connect to the server as specified in <domain>
Tell the server the sender’s identity as specified in <reversepath> [Mail-parameters]
(Recipient) Tell the server the intended recipient’s identity as
specified in [Rcpt-parameters] <forward-path>
Convey the message body to the server
(Reset) Reset the server connection
(Verify) Ask the receiver to confirm that a user has been
identified
(Expand) Ask the receiver to confirm that a mailing list has
been identified
Obtain help information
(No operation) Indicate no operation, but signify the sender is
still connected (i.e.,“alive”)
Close the server connection
POP
•
•
•
•

Criado em 1984
Protocolo de leitura
Copia as mensagens do server para o client
Possui problemas de sincronização, pois foi
projetado para deletar as mensagens do
servidor
POP
COMMAND
BASIC COMMANDS FROM RFC 918
USER <name>
PASS <password>
STAT
LIST [msg]
RETR <msg>
DELE <msg>
QUIT
NOOP
RSET

DESCRIPTION
Set username
Set password
Check the status of the mailbox, typically retrieves
number of messages
List messages in the mailbox; Optional argument for
message [msg]
Retrieve message <msg>
Delete message <msg>
Quit
No operation
Reset
POP
COMMAND
OPTIONAL COMMANDS FROM RFC 1939
TOP <msg> <n>
UIDL [msg]
APOP <name> <digest>
EXTENSION COMMAND FROM RFC 2449
CAPA

DESCRIPTION
Retrieve the top <n> lines of message <msg>
Retrieve unique id for [msg]
A more robust form of authentication than
USER/PASS
Retrieve a list of capabilities supported by the
POP3 server
IMAP
• Criado em 1988, para solucionar problemas
conhecidos do protocolo POP.
• Possui mais recursos que o POP
• Solucionou a sincronização de E-mail entre
server e clients.
• Permite pesquisar e-mails no servidor
IMAP
COMMAND
NOOP
STARTTLS
AUTHENTICATE <type>
LOGIN <user> <passwd>
LOGOUT
SELECT <mailbox>
EXAMINE <mailbox>
CREATE <mailbox>
DELETE <mailbox>
RENAME <mailbox>
<newmailbox>
SUBSCRIBE <mailbox>
UNSUBSCRIBE <mailbox>

DESCRIPTION
Perform no operation
Establish confidentiality and integrity protection
Choose authentication method
Login with username and password
Logout the current user
Select the desired mailbox to access
Same as SELECT except opens mailbox for read-only
Create a mailbox with the name <mailbox>
Delete selected mailbox
Rename mailbox
Subscribe to selected mailbox
Unsubscribe from selected mailbox
IMAP
COMMAND
LIST <reference> [pattern]
LSUB <reference> [pattern]
STATUS <mailbox> <item>
APPEND <mailbox> [flags] <msg>
CHECK
CLOSE
EXPUNGE
SEARCH <criteria>
FETCH <message> <item>
STORE <message> <item>
<newvalue>
COPY <message> <mailbox>
UID <command> [args]
CAPABILITY

DESCRIPTION
List contents of current reference based on an optional
pattern
List a set of mailboxes matching the pattern
Show the status of specific items in the selected
mailbox
Append a message to the selected mailbox
Perform a checkpoint on the currently selected mailbox
Close the currently selected mailbox
Expunge deleted messages from the mailbox
Search the mailbox based on certain criteria
Fetch the specified item from the selected message
Update the selected item in a message
Copy a message to the provided mailbox
Perform an operation on a message based on its UID
Query the server for its capabilities
Protocolos Seguros
•
•
•
•

Surgiram na década de 90
PGP
SSL
TLS
Considerações finais
• Posso usar SSL ou TLS?
• PGP ainda existe?
• Qual protocolo devo configurar no meu
smartphone?
• Se usar SSL a NSA pode ler meu e-mail?
Referência bibliográfica
KUROSE, James F. Redes de Computadores e a
Internet – 5ª Edição.
TANENBAUM, Andrew S.; Redes de
Computadores - 5ª Edição. Pearson Education
do Brasil, 2011.
Obrigado

Diogo Rodrigues Lopes
Paulo Vitor Bischof

More Related Content

What's hot

Tipos de cabos
Tipos de cabosTipos de cabos
Tipos de cabos
Gonçalo
 
Sistemas Distribuídos - Comunicação Distribuída – RPC
Sistemas Distribuídos - Comunicação Distribuída – RPCSistemas Distribuídos - Comunicação Distribuída – RPC
Sistemas Distribuídos - Comunicação Distribuída – RPC
Adriano Teixeira de Souza
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)
Jasim Alam
 

What's hot (20)

Orientação a Objetos em Python
Orientação a Objetos em PythonOrientação a Objetos em Python
Orientação a Objetos em Python
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Política de Grupo - Active Directory
Política de Grupo - Active DirectoryPolítica de Grupo - Active Directory
Política de Grupo - Active Directory
 
Tipos de cabos
Tipos de cabosTipos de cabos
Tipos de cabos
 
Servidores de E-mail
Servidores de E-mailServidores de E-mail
Servidores de E-mail
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Sistemas Distribuídos - Comunicação Distribuída – RPC
Sistemas Distribuídos - Comunicação Distribuída – RPCSistemas Distribuídos - Comunicação Distribuída – RPC
Sistemas Distribuídos - Comunicação Distribuída – RPC
 
Administração de Redes Linux - II
Administração de Redes Linux - IIAdministração de Redes Linux - II
Administração de Redes Linux - II
 
Aula04 padrões ieee
Aula04 padrões ieeeAula04 padrões ieee
Aula04 padrões ieee
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
Aula 6 - Redes de Computadores A - Endereçamento IP
Aula 6 - Redes de Computadores A - Endereçamento IPAula 6 - Redes de Computadores A - Endereçamento IP
Aula 6 - Redes de Computadores A - Endereçamento IP
 
Endereçamento IP
Endereçamento IPEndereçamento IP
Endereçamento IP
 
Protocolo SNMP
Protocolo SNMPProtocolo SNMP
Protocolo SNMP
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)
 
Redes de-computadores-tipos-de-redes
Redes de-computadores-tipos-de-redesRedes de-computadores-tipos-de-redes
Redes de-computadores-tipos-de-redes
 
Modelo de camadas TCP/IP
Modelo de camadas TCP/IPModelo de camadas TCP/IP
Modelo de camadas TCP/IP
 
Routing table
Routing tableRouting table
Routing table
 
Chapter 30 - Cry
Chapter 30 - CryChapter 30 - Cry
Chapter 30 - Cry
 
Basic socket programming
Basic socket programmingBasic socket programming
Basic socket programming
 
Data link control
Data link controlData link control
Data link control
 

Viewers also liked

Travesías entre refugios
Travesías entre refugiosTravesías entre refugios
Travesías entre refugios
guiandosentidos
 
Un largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papelUn largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papel
Daniel Dagna
 
Del mito al logo
Del mito al logoDel mito al logo
Del mito al logo
naxo luz
 
Lesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the presentLesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the present
Rafael Alejandro
 

Viewers also liked (20)

Smtp (protocolo simple de
Smtp (protocolo simple deSmtp (protocolo simple de
Smtp (protocolo simple de
 
34 anni di e-mail: SMTP
34 anni di e-mail: SMTP34 anni di e-mail: SMTP
34 anni di e-mail: SMTP
 
Casa a venda Rio de Janeiro
Casa a venda Rio de JaneiroCasa a venda Rio de Janeiro
Casa a venda Rio de Janeiro
 
Curso SMTP
Curso SMTPCurso SMTP
Curso SMTP
 
Sesion7 enumeration smtp
Sesion7 enumeration smtpSesion7 enumeration smtp
Sesion7 enumeration smtp
 
Smtp
SmtpSmtp
Smtp
 
RTCP (RTP control protocol)
RTCP (RTP control protocol)RTCP (RTP control protocol)
RTCP (RTP control protocol)
 
Informe final metodología de la Investigación 2
Informe final metodología de la Investigación 2Informe final metodología de la Investigación 2
Informe final metodología de la Investigación 2
 
2015-Polyform Catalog
2015-Polyform Catalog2015-Polyform Catalog
2015-Polyform Catalog
 
Travesías entre refugios
Travesías entre refugiosTravesías entre refugios
Travesías entre refugios
 
Un largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papelUn largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papel
 
Minimum Vital - Alberto Masferrer
Minimum Vital - Alberto MasferrerMinimum Vital - Alberto Masferrer
Minimum Vital - Alberto Masferrer
 
Pediatric SPR Edition – Issue 57
Pediatric SPR Edition – Issue 57Pediatric SPR Edition – Issue 57
Pediatric SPR Edition – Issue 57
 
Cyber cafe
Cyber cafeCyber cafe
Cyber cafe
 
Diaposotivas proyecto futuro I Oscar David G.M
Diaposotivas proyecto futuro I Oscar David G.MDiaposotivas proyecto futuro I Oscar David G.M
Diaposotivas proyecto futuro I Oscar David G.M
 
IPAC Brochure
IPAC BrochureIPAC Brochure
IPAC Brochure
 
Del mito al logo
Del mito al logoDel mito al logo
Del mito al logo
 
Jakou učebnici fyziky pro 21. století?
Jakou učebnici fyziky pro 21. století?Jakou učebnici fyziky pro 21. století?
Jakou učebnici fyziky pro 21. století?
 
Lesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the presentLesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the present
 
Revenue architects blueleaf webinar 2013
Revenue architects blueleaf webinar 2013Revenue architects blueleaf webinar 2013
Revenue architects blueleaf webinar 2013
 

Similar to Protocolos de E-mail (SMTP, POP e IMAP) (7)

E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
 
SMTP(simple mail transfer protocol).ppsx
SMTP(simple mail transfer protocol).ppsxSMTP(simple mail transfer protocol).ppsx
SMTP(simple mail transfer protocol).ppsx
 
Mail services
Mail servicesMail services
Mail services
 
Smtp
SmtpSmtp
Smtp
 
XMPP Intro 1101 - 2008
XMPP Intro 1101 - 2008XMPP Intro 1101 - 2008
XMPP Intro 1101 - 2008
 
Sending Email
Sending EmailSending Email
Sending Email
 
Lec 9(Emails)
Lec 9(Emails)Lec 9(Emails)
Lec 9(Emails)
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Protocolos de E-mail (SMTP, POP e IMAP)

  • 1. Protocolos de E-mail Diogo Rodrigues Lopes Paulo Vitor Bischof
  • 3. SMTP • Protocolo padrão de envio de E-mail • Criado em 1982, na Universidade do Sul da Califórnia por Jon Postel • Envia o e-mail do client para o server
  • 4. SMTP Syntax COMMAND HELO <domain> MAIL FROM:<reversepath> RCPT TO:<forwardpath> DATA RSET VRFY <string> EXPN <string> HELP [<string>] NOOP [<string>] QUIT DESCRIPTION (Hello) Connect to the server as specified in <domain> Tell the server the sender’s identity as specified in <reversepath> [Mail-parameters] (Recipient) Tell the server the intended recipient’s identity as specified in [Rcpt-parameters] <forward-path> Convey the message body to the server (Reset) Reset the server connection (Verify) Ask the receiver to confirm that a user has been identified (Expand) Ask the receiver to confirm that a mailing list has been identified Obtain help information (No operation) Indicate no operation, but signify the sender is still connected (i.e.,“alive”) Close the server connection
  • 5. POP • • • • Criado em 1984 Protocolo de leitura Copia as mensagens do server para o client Possui problemas de sincronização, pois foi projetado para deletar as mensagens do servidor
  • 6. POP COMMAND BASIC COMMANDS FROM RFC 918 USER <name> PASS <password> STAT LIST [msg] RETR <msg> DELE <msg> QUIT NOOP RSET DESCRIPTION Set username Set password Check the status of the mailbox, typically retrieves number of messages List messages in the mailbox; Optional argument for message [msg] Retrieve message <msg> Delete message <msg> Quit No operation Reset
  • 7. POP COMMAND OPTIONAL COMMANDS FROM RFC 1939 TOP <msg> <n> UIDL [msg] APOP <name> <digest> EXTENSION COMMAND FROM RFC 2449 CAPA DESCRIPTION Retrieve the top <n> lines of message <msg> Retrieve unique id for [msg] A more robust form of authentication than USER/PASS Retrieve a list of capabilities supported by the POP3 server
  • 8. IMAP • Criado em 1988, para solucionar problemas conhecidos do protocolo POP. • Possui mais recursos que o POP • Solucionou a sincronização de E-mail entre server e clients. • Permite pesquisar e-mails no servidor
  • 9. IMAP COMMAND NOOP STARTTLS AUTHENTICATE <type> LOGIN <user> <passwd> LOGOUT SELECT <mailbox> EXAMINE <mailbox> CREATE <mailbox> DELETE <mailbox> RENAME <mailbox> <newmailbox> SUBSCRIBE <mailbox> UNSUBSCRIBE <mailbox> DESCRIPTION Perform no operation Establish confidentiality and integrity protection Choose authentication method Login with username and password Logout the current user Select the desired mailbox to access Same as SELECT except opens mailbox for read-only Create a mailbox with the name <mailbox> Delete selected mailbox Rename mailbox Subscribe to selected mailbox Unsubscribe from selected mailbox
  • 10. IMAP COMMAND LIST <reference> [pattern] LSUB <reference> [pattern] STATUS <mailbox> <item> APPEND <mailbox> [flags] <msg> CHECK CLOSE EXPUNGE SEARCH <criteria> FETCH <message> <item> STORE <message> <item> <newvalue> COPY <message> <mailbox> UID <command> [args] CAPABILITY DESCRIPTION List contents of current reference based on an optional pattern List a set of mailboxes matching the pattern Show the status of specific items in the selected mailbox Append a message to the selected mailbox Perform a checkpoint on the currently selected mailbox Close the currently selected mailbox Expunge deleted messages from the mailbox Search the mailbox based on certain criteria Fetch the specified item from the selected message Update the selected item in a message Copy a message to the provided mailbox Perform an operation on a message based on its UID Query the server for its capabilities
  • 12. Considerações finais • Posso usar SSL ou TLS? • PGP ainda existe? • Qual protocolo devo configurar no meu smartphone? • Se usar SSL a NSA pode ler meu e-mail?
  • 13. Referência bibliográfica KUROSE, James F. Redes de Computadores e a Internet – 5ª Edição. TANENBAUM, Andrew S.; Redes de Computadores - 5ª Edição. Pearson Education do Brasil, 2011.