Mercurial > docs > diploma
comparison thesis/tex/5-Improvements.tex @ 231:adb7ecbc92da
removed obsolete figure
author | meillo@marmaro.de |
---|---|
date | Sat, 10 Jan 2009 00:27:31 +0100 |
parents | 711f0d3f5dfd |
children | 5cfea0d05e7f |
comparison
equal
deleted
inserted
replaced
230:35b0dfefd2c4 | 231:adb7ecbc92da |
---|---|
57 | 57 |
58 \TLS\ allows to create secure tunnels through which arbitrary programs can communicate. Hence one can add secure communication afterwards to programs without changing them. \name{OpenSSL} for example---a free implementation---allows traffic to be piped into a command; a secure tunnel is created and the traffic is forwarded through it. Or a secure tunnel can be set up between a local and a remote port; this tunnel can then be used by any application. | 58 \TLS\ allows to create secure tunnels through which arbitrary programs can communicate. Hence one can add secure communication afterwards to programs without changing them. \name{OpenSSL} for example---a free implementation---allows traffic to be piped into a command; a secure tunnel is created and the traffic is forwarded through it. Or a secure tunnel can be set up between a local and a remote port; this tunnel can then be used by any application. |
59 | 59 |
60 The \NAME{POP} protocol, for example, is good suited for such tunneling, but \SMTP\ is is not generally. Outgoing \SMTP\ client connections can be tunneled without problem---\masqmail\ already provides a configure option called \texttt{wrapper} to do so. Tunneling incomming connections to a server leads to problems with \SMTP. As data comes encrypted through the tunnel to the receiving host and gets then decrypted and forwarded on local to the port the application listens on. From the \MTA's view, this makes all connections appear to come from localhost, unfortunately. Figure \ref{fig:stunnel} depicts the data flow. | 60 The \NAME{POP} protocol, for example, is good suited for such tunneling, but \SMTP\ is is not generally. Outgoing \SMTP\ client connections can be tunneled without problem---\masqmail\ already provides a configure option called \texttt{wrapper} to do so. Tunneling incomming connections to a server leads to problems with \SMTP. As data comes encrypted through the tunnel to the receiving host and gets then decrypted and forwarded on local to the port the application listens on. From the \MTA's view, this makes all connections appear to come from localhost, unfortunately. Figure \ref{fig:stunnel} depicts the data flow. |
61 | 61 |
62 \begin{figure} | |
63 \begin{center} | |
64 \input{input/stunnel.tex} | |
65 \end{center} | |
66 \caption{Data flow using \name{stunnel}} | |
67 \label{fig:stunnel} | |
68 \end{figure} | |
69 | |
70 For incoming connections, \NAME{STARTTLS}---defined in \RFC2487---is what \mta{}s implement. | 62 For incoming connections, \NAME{STARTTLS}---defined in \RFC2487---is what \mta{}s implement. |
71 | 63 |
72 \masqmail\ is already able to encrypt outgoing connections, but encryption of incoming connections, using \NAME{STARTTLS} should be implemented. This only affects the \SMTP\ server module. | 64 \masqmail\ is already able to encrypt outgoing connections, but encryption of incoming connections, using \NAME{STARTTLS} should be implemented. This only affects the \SMTP\ server module. |
73 | 65 |
74 %TLS/SSL prevents attackers to listen on the cable | 66 %TLS/SSL prevents attackers to listen on the cable |