expand for answer

Mail relay server

An email server that relays messages where neither the sender nor the receiver is a local user. A risk exists that an unauthorized user could hijack these open relays and use them to spoof their own identity.


Similar items:
A method of accessing electronic mail or bulletin board messages that are kept on a (possibly shared) mail server. IMAP permits a “client” email program to access remote message stores as if they were local. For example, email stored on an IMAP server can be manipulated from a desktop computer at home, a workstation at the office, and a notebook computer while traveling, without the need to transfer messages of files back and forth between these computers. IMAP can be regarded as the nextgeneration POP. A protocol used to transfer email messages from an email server to an email client.
[view]
A security service by which evidence is maintained so that the sender and recipient of data cannot deny having participated in the communication. Referred to individually as nonrepudiation of origin and nonrepudiation of receipt. Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data.
[view]
An encryption algorithm that protects communications between two parties (in other words, a client and a server) and is performed independently of link encryption. An example of this would be the use of Privacy Enhanced Mail (PEM) to pass a message between a sender and a receiver. This protects against an intruder who might be monitoring traffic on the secure side of an encrypted link or traffic sent over an unencrypted link.
[view]
An SMTP server that is configured to accept email messages from any source and will forward them on to their destination. Open relay agents are commonly hijacked by spammers.
[view]
An attack in which a malicious user is positioned between a client and server and then interrupts the session and takes it over. Often, the malicious user impersonates the client so they can extract data from the server. The server is unaware that any change in the communication partner has occurred.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in