IMAP information storage security

As information technology spreads, the issue of security becomes important. Moreover, it is necessary to study various aspects of relatively different developments. For example, IMAP security - what is it? How reliable is the Internet Message Access Protocol? What advantages it has, why it was developed, what versions and mechanism of work exist - here is a brief retelling of the contents of the article that you are now familiarizing yourself with.

What is IMAP?

imap security




The safety of correspondence is important because it can contain valuable information. This protocol is used at the application level to provide access to e-mail data only to those who should receive it. It was developed on the basis of TCP and uses 143 ports for its needs. IMAP gives the user the opportunity to work with mail, which is located on some central server. A program using this protocol performs the necessary actions in such a way as to create the impression that all correspondence is on the user's computer. With a large volume of transfers, a special IMAP server can be used. Manipulation of letters does not require constant transfer to the recipient of files that contain content. But this is not the only protocol used inmail services. So, SMTP is used to send letters, since the sending command to IMAP cannot fully guarantee security. There are known vulnerabilities.





Why was IMAP developed?

imap protocol




It was developed as an alternative to POP3. It all started because of the shortcomings of the latter. So, in it there are no opportunities to manage, move and store messages on the server. That's because of this, the IMAP protocol was developed, which offers the ability to receive e-mail in different places thanks to the storage of data on a remote server.

Benefits over POP3

Why did this protocol come into use? The fact is that IMAP mail offers, in addition to the above, a number of advantages:

  1. The connection does not break while the user interface is active .
  2. .
  3. , .
  4. , , . , IMAP 4 Access Control List, .
  5. ( , , ). .
  6. .

imap port




IMAP security provides for working exclusively with messages, and they do not need any packages with special headers. Each of them has its own attributes. They can be determined individually or together with others. There are currently six versions of IMAP, but almost always only the last one is used.









UID

Each message receives its 32-bit code. A unique identifier is added to it. Together they form a 64-bit sequence, which is necessary to identify the message. Here is such IMAP security. The later it arrives, the more the UID matters. This parameter is used as a response code during mailbox selection. It does not change during one session or between them. If the technical conditions require editing this parameter, then the UID must be larger than before. For data transfer, the same IMAP port is used.

Message serial number

gmail imap settings




It starts with one. The number of each subsequent message is increased by 1, compared with the previous ones. An important difference from a mailbox is that it can change during one connection session: for example, when a message is completely deleted.

Message flags

imap server




This attribute looks like a list in which there are zero or more named tokens that are related to the main information. IMAP 4.1 introduced two types of flags. They can act temporarily (throughout the session), or be permanent. The system flag is the flag for which the name is defined in the protocol specification. All of them must begin with the character \. At the moment, the following system flags have been defined:

  1. \ seen - read the message;
  2. \ answered - send a response;
  3. \ recent - the message appeared during the current session;
  4. \ draft - was marked as a draft;
  5. \ flagged - the user marked this message as important;
  6. \ deleted - deleted.

Internal date and time of the message

, ? SMTP, . , . , – append.

imap mail




When using IMAP, a connection is established behind the client-server principle. So, the first sends all the received commands from itself, and the second sends the requested data, as well as information about the execution of the request. All messages have the form of lines, which ends with a special sequence. All procedures begin thanks to the client’s commands. They are recognized thanks to a special identifier prefix (which is a short alphanumeric string), which is called a label. Each team has its own unique number.

, , , . – , , . – . , +. , . , , . , . , , *. . . , .

, Gmail? IMAP , , . .

? / . , , . , . :

  1. .
  2. .
  3. IMAP ( , , , ).

, , . , , . Gmail. IMAP .

Imap error




This security protocol can significantly increase the reliability of data transfer, and it can provide substantial guarantees that a third party will not be able to access information. But this does not mean that someone else can not read the letter. The server remains potentially vulnerable, and the user can, due to low knowledge about the tricks of fraudsters, personally transfer to them all the data necessary to access the mail.




All Articles