User:David MacQuigg/Sandbox/Email System 03: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>David MacQuigg
(Add reference to subtopic Email Agents)
imported>David MacQuigg
mNo edit summary
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
<!-- {{subpages}} -->
<!-- {{subpages}} -->
The '''Email System''' is the network of computers handling electronic mail on the Internet.  This system includes user machines that compose, send, retrieve, and view messages, and agent machines that are part of the mail handling system.  Like other complex systems involving computer networks, the email system is best explained by separating its functions into levels, and discussing one level at a time.
The '''Email System''' is the network of computers handling electronic mail on the Internet.  This system includes user machines that compose, send, retrieve, and view messages, and agent machines that are part of the mail handling system.  Like other complex systems involving computer networks, the email system is best explained by separating its functions into layers, and discussing one layer at a time.


At the [[machine level]], the mail handling system can be modeled as a sequence of [[SMTP relays]], each temporarily storing the message, performing some specialized function, and passing it on to the next relay using the [[SMTP protocol]]. You can tell how many relays handled a message by looking at the Received: lines in the [[message header]]. There should be one for each relay.  Relays are not the focus of this article, however.  They form a [[network layer]] supporting our email systems, just as routers and physical links form a layer supporting the SMTP relays.
At the '''machine level,''' the mail handling system can be modeled as a sequence of [[SMTP relays]], each temporarily storing the message, performing some specialized function, and passing it on to the next relay using the [[SMTP protocol]]. You can tell how many relays handled a message by looking at the lines labeled "Received:" in the [[message header]]. There should be one for each relay.  Relays are not the focus of this article, however.  They form a [[network layer]] supporting our email systems, just as routers and physical links form a layer supporting the SMTP relays.


This article provides a basic understanding of how email systems work at the administrative level.  The principle entities at this level are actors, their roles, and their relationships.  An actor may be a user or an agent.  Every role is played by one actor, but one actor may have multiple roles.
At the '''administrative level,''' the principle entities are actors, their roles, and their relationships.  Who are the actors in a typical email system?  What are their roles and responsibilities in handling the mail?  What are their relationships with each other?  What are their motivations?  How can we build better security systems?  A basic understanding of the administrative level should help answer these questions.  This article provides that understanding.
 
Who are the actors in a typical email system?  What are their roles and responsibilities in handling the mail?  What are their relationships with each other?  What are their motivations?  How can we build better security systems?  An understanding of the administrative level should help answer these questions.


=== System architecture ===
=== System architecture ===


Figure 1 shows an ideal system with the machines grouped into functional blocks. In this diagram, we have named the blocks by their role in processing a message.  The MSA role is played by a Mail Submission Agent, which performs all functions related to message submission.  To keep things simple, we have assigned each role to a different actor.  In real systems, however, an actor can have multiple blocks, a block can have multiple machines, and a machine can host multiple relays running as independent [[daemon processes]].
Figure 1 shows an ideal system with the machines grouped into functional blocks. In this diagram, we have named the blocks by their role in processing a message.  The MSA role is played by a Mail Submission Agent, which performs all functions related to message submission.  In this ideal system, we have assigned each role to a different actor.  In real systems, however, an actor can have multiple blocks, a block can have multiple machines, and a machine can host multiple relays running as independent [[daemon processes]].


<div style="display:inline;
{{Image|EmailSystem.png|left|700px|'''Figure 1  Actors (Users and Agents) and their roles in an ideal email system.'''}}
width:7000px; float:left;">
[[Image:EmailSystem.png|left|700px|{{#ifexist:Template:EmailSystem.png/credit|{{EmailSystem.png/credit}}<br/>|}}Add image caption here.]]
</div>
'''Figure 1  Actors and roles in a typical email system.'''


A small Internet Service Provider (ISP) might perform the roles of MSA/Transmitter using two relays running on one machine. An agent performing the role of [[Transmitter]] might have a dozen relays, operating in parallel to handle a large mailflow, or widely dispersed to serve users all over the world. A Mail Delivery Agent  might have a process dedicated to managing a large mailstore, another running a [[POP/IMAP]] server, and another providing [[webmail]] via HTTP to the Recipient's browser.
A small Internet Service Provider (ISP) might perform the roles of MSA/Transmitter using two relays running on one machine. An agent performing the role of [[Transmitter]] might have a dozen relays, operating in parallel to handle a large mailflow, or widely dispersed to serve users all over the world. A Mail Delivery Agent  might have a process dedicated to managing a large mailstore, another running a [[POP/IMAP]] server, and another providing [[webmail]] via HTTP to the Recipient's browser.
Line 28: Line 22:
                             Border
                             Border


To understand a mail handling system, including its security vulnerabilities, we need to focus on the roles and responsibilities of each actor and the relationships between them. The double arrow shows a direct relationship between actors (e.g. a contract between the Author and his ISP). The single arrow shows only the direction of mail flow. There is no relationship between agents across the Border to the open Internet. The / shows multiple roles being played by one actor. Using these diagrams, we can model almost any system, and include a lot of detail on relationships, but not lose the simplicity of Figure 1. The elements of the model (actors' roles) are the fundamental building blocks.  See [[Email Agents]] for more example systems.
To understand a mail handling system, including its security vulnerabilities, we need to focus on the roles and responsibilities of each actor and the relationships between them. The double arrow shows a direct relationship between actors (e.g. a contract between the Author and his ISP). The single arrow shows only the direction of mail flow. There is no relationship between agents across the Border to the open Internet. The / shows multiple roles being played by one actor. Using these diagrams, we can model almost any system, and include a lot of detail on relationships, but not lose the simplicity of Figure 1. The elements of the model (actors' roles) are the fundamental building blocks.  See [[Email agents]] for more example systems.


Here is an extension of the basic system, adding a Forwarder role, played by the same actor as the Receiver. Both the Receiver/Forwarder and the MDA have a direct relationship with the Recipient, so they have an indirect relationship (wavy arrow) with each other. These details are important in discussions of [[authentication protocols]].  
Here is an extension of the basic system, adding a Forwarder role, played by the same actor as the Receiver. Both the Receiver/Forwarder and the MDA have a direct relationship with the Recipient, so they have an indirect relationship (wavy arrow) with each other. These details are important in discussions of [[authentication protocols]].  

Latest revision as of 12:58, 19 August 2009

The Email System is the network of computers handling electronic mail on the Internet. This system includes user machines that compose, send, retrieve, and view messages, and agent machines that are part of the mail handling system. Like other complex systems involving computer networks, the email system is best explained by separating its functions into layers, and discussing one layer at a time.

At the machine level, the mail handling system can be modeled as a sequence of SMTP relays, each temporarily storing the message, performing some specialized function, and passing it on to the next relay using the SMTP protocol. You can tell how many relays handled a message by looking at the lines labeled "Received:" in the message header. There should be one for each relay. Relays are not the focus of this article, however. They form a network layer supporting our email systems, just as routers and physical links form a layer supporting the SMTP relays.

At the administrative level, the principle entities are actors, their roles, and their relationships. Who are the actors in a typical email system? What are their roles and responsibilities in handling the mail? What are their relationships with each other? What are their motivations? How can we build better security systems? A basic understanding of the administrative level should help answer these questions. This article provides that understanding.

System architecture

Figure 1 shows an ideal system with the machines grouped into functional blocks. In this diagram, we have named the blocks by their role in processing a message. The MSA role is played by a Mail Submission Agent, which performs all functions related to message submission. In this ideal system, we have assigned each role to a different actor. In real systems, however, an actor can have multiple blocks, a block can have multiple machines, and a machine can host multiple relays running as independent daemon processes.

(CC) Image: David MacQuigg
Figure 1 Actors (Users and Agents) and their roles in an ideal email system.

A small Internet Service Provider (ISP) might perform the roles of MSA/Transmitter using two relays running on one machine. An agent performing the role of Transmitter might have a dozen relays, operating in parallel to handle a large mailflow, or widely dispersed to serve users all over the world. A Mail Delivery Agent might have a process dedicated to managing a large mailstore, another running a POP/IMAP server, and another providing webmail via HTTP to the Recipient's browser.

There are many other possibilities. We might add a Forwarder between the Receiver and the MDA, or an Open Relay floating in the cloud. We might add another layer of organization, showing contractual relationships between the agents. A diagram like Figure 1 could get quite complex. A shorthand notation will allow us to show the relevant networks, actors, roles, and relationships. Here is a basic system with four actors (two users and two agents), organized as two networks:

|--- Sender's Network ---|           |-- Recipient's Network -|
                                /
Author ==> MSA/Transmitter --> / --> Receiver/MDA ==> Recipient
                              /
                           Border

To understand a mail handling system, including its security vulnerabilities, we need to focus on the roles and responsibilities of each actor and the relationships between them. The double arrow shows a direct relationship between actors (e.g. a contract between the Author and his ISP). The single arrow shows only the direction of mail flow. There is no relationship between agents across the Border to the open Internet. The / shows multiple roles being played by one actor. Using these diagrams, we can model almost any system, and include a lot of detail on relationships, but not lose the simplicity of Figure 1. The elements of the model (actors' roles) are the fundamental building blocks. See Email agents for more example systems.

Here is an extension of the basic system, adding a Forwarder role, played by the same actor as the Receiver. Both the Receiver/Forwarder and the MDA have a direct relationship with the Recipient, so they have an indirect relationship (wavy arrow) with each other. These details are important in discussions of authentication protocols.

         |-------- Recipient's Network ---------|
     /
--> / --> Receiver/Forwarder ~~> MDA ==> Recipient
   /
 Border

If we wonder why email continues to be such an insecure system, we can study this last example. Authentication protocols that try to correlate the Transmitter's domain name to the connecting IP address can fail when a Forwarder is involved. We cannot just dismiss Forwarding as an "edge case", however. It is important for a user who changes jobs or ISPs, and would like to continue receiving mail at his old address.

Message handling

Let's follow a message from start to finish. The scenario begins with an Author composing a message using a mail client on a home computer. There are numerous mail clients available, just like there are many web browsers to choose from. In fact, many web browsers now include a mail client, or at least a mechanism to invoke the user's preferred client when he clicks a mailto: link in a webpage.

When the Author clicks SEND, his mail client connects to an MSA machine at his ISP. A key responsibility of the MSA is to authenticate the Author. This can be done with a password, by assigning the client machine a static IP address, or by having the client connect through the MSA's local network, not through the Internet. After authentication, the message is transferred using SMTP.

Most large ISPs operate their own transmitter relays, but smaller companies, and organizations with a lot of bulk mail, often subcontract this specialized role to another agent. Such agents advertise their services under the name "SMTP Relay", but in this article we will use the more specific term Transmitter when we mean a role or agent, and transmitter relay when we mean the relay at the sender's side of the Border.

The Transmitter's responsibilities include prevention of outgoing spam, and providing some means to prove their identity to unrelated Receivers. It isn't enough to say "Hello, this is trustme.com". Any criminal can do that, and identity fraud has become a major problem on the Internet. The Transmitter must provide some "out-of-band" data using a service like DNS that is more secure than email. DNS records can be used to publish a public key, a list of IP addresses, or some other data that the Receiver can use to run one or more authentication methods.

The Receiver's responsibilities include a number of functions we might call "border defense" – blocking a DoS attack, authenticating the sender, and various spam-filtering strategies, including whitelisting, blacklisting, statistical analysis of message content, and use of heuristic rulesets that have proven effective in separating spam from legitimate mail. Border defense should be done at the Border. Loss of mail due to violations of this principle is common. A forwarded message can look like a forgery, and then the MDA has a tough choice – drop the message with no notice to the alleged sender, or send the notice and risk being reported for "bounce spam".

The problems with mis-configured mail systems can be avoided if all actors understand their roles and responsibilities. When a Recipient sets up forwarding from his old Receiver/Forwarder to his new MDA, he should make sure that the Forwarder is whitelisted by the MDA. Forwarders should make sure that Recipients (non-expert users) understand this. MDAs should understand that forwarding is a common need, and make it easy for Recipients to whitelist their Forwarders.