Make a list of mail address forms that your organization (feel free to make up an organization for this) and write a set of rules for parsing them.
POP3 separates message retrieval and deletion by allowing a user to retrieve and view a message without deleting it from the permanent mailbox. What are the advantages and disadvantages of such separation?
How does the TOP command operate and why is it useful?
How can a UNIX sendmail program be used to implement a mail gateway?
Many sites that use a bastion host arrange for software to scan all incoming files before admitting them to the organization. Why do organizations scan files?
Read the description of a packet filter for a commercially available router. What features does it offer?
Most users are not aware that SMTP transfers messages in ASCII, and that anyone watching network traffic can see the contents of an email message. How could you secure sensitive information when transmitting via SMTP so ASCII contents are not revealed?
Can a firewall be combined with a NAT? What are the consequences?
How the TOP command operate
Full Answer Section
Parsing Rules:
- Standardize: Convert all addresses to lowercase, remove extra spaces.
- Validate: Check for valid email format ([email protected]), disallow single dots, consecutive special characters, etc.
- Extract: Separate name (if present) from address using first at symbol.
- Geocode (optional): Use country information (if provided) for geographical analysis.
- Normalize: Handle typos, abbreviations, and common variations of domain names.
POP3 Separation: Advantages and Disadvantages
Advantages:
- Offline access: Read messages without internet connection.
- Selective deletion: Keep important messages while deleting others.
- Reduced server load: Less server processing for retrieval vs. deletion.
Disadvantages:
- Storage burden: Unnecessary messages accumulate on server.
- Synchronization issues: Multiple devices may have different deletion statuses.
- Potential security risk: Malicious code could hide in undeleted messages.
TOP Command: Operation and Usefulness
The TOP command retrieves the first n lines of a message. This is useful for:
- Previewing messages: Quickly see if an email is important without downloading the entire content.
- Troubleshooting: Check for specific information in message headers or content.
- Partial downloads: Download only relevant portions of large messages.
Implementing a Mail Gateway with sendmail
Steps:
- Configure sendmail to relay outgoing mail through a specific SMTP server.
- Define rules for incoming mail: filtering, forwarding, discarding.
- Implement security measures: spam filtering, authentication, encryption.
Advantages:
- Centralized mail handling for multiple domains.
- Custom filtering and routing options.
- Potential cost savings compared to third-party services.
File Scanning on Bastion Hosts
Reasons to scan files:
- Malware detection: Prevent viruses, worms, and other malicious software from entering the network.
- Data protection: Identify and block sensitive data leaks (e.g., financial information, personal details).
- Compliance: Adhere to data security regulations and industry standards.
Packet Filter Features
- Rules-based: Define criteria for allowing or blocking traffic based on IP addresses, ports, protocols, etc.
- Stateful inspection: Track connections and filter based on their state and history.
- Application-level filtering: Inspect specific applications and protocols for malicious activity.
- Logging and reporting: Monitor network activity and identify potential security threats.
Securing Sensitive Information in SMTP
Options:
- TLS/SSL encryption: Encrypt entire email content during transmission.
- PGP/MIME encryption: Encrypt specific parts of the message (e.g., body, attachments).
- Digital signatures: Verify sender authenticity and message integrity.
Note: These methods cannot prevent content viewing on the sender's or recipient's system.
Firewall and NAT Combination
Combination:
- Firewall filters incoming and outgoing traffic based on security rules.
- NAT translates internal IP addresses to a single external IP for internet access.
Consequences:
- Increased security: Firewall protects internal network from unauthorized access.
- Simplified administration: Easier to manage external IP addresses.
- Potential limitations: Some applications may not work correctly with NAT.
Sample Answer
GKN, a non-profit organization dedicated to promoting global knowledge exchange, collects email addresses for various purposes, including:
Forms:
- Subscription form: Name, email address, country (optional).
- Volunteer application: Name, email, phone number, address, skills, availability.
- Donation form: Name, email, address, amount, payment method.
- Event registration: Name, email, event details, dietary restrictions (optional).
- Contact form: Name, email, message.