docs/diploma

diff thesis/tex/3-MailTransferAgents.tex @ 155:0b17f6e5edae

new books; websites to books
author meillo@marmaro.de
date Tue, 16 Dec 2008 15:58:00 +0100
parents 5f7beb2142d6
children ee687abf386c
line diff
     1.1 --- a/thesis/tex/3-MailTransferAgents.tex	Tue Dec 16 15:16:41 2008 +0100
     1.2 +++ b/thesis/tex/3-MailTransferAgents.tex	Tue Dec 16 15:58:00 2008 +0100
     1.3 @@ -74,7 +74,7 @@
     1.4  
     1.5  \subsection{Market share analysis}
     1.6  
     1.7 -Table \ref{tab:mta-market-share} shows the most used \MTA{}s determined by three different statistics. The first was done by Daniel~J.\ \person{Bernstein} (the author of \qmail) in 2001 \citeweb{djb:mta-stats}. The second is by \person{Simpson} and \person{Bekman} in 2007 and was published by \name{O'ReillyNet} \citeweb{oreillynet:mta-stats}. And the third is from \name{MailRadar.com} with unknown date\footnote{The footer of the website shows ``Copyright 2007'' but more likely does this refer to the whole website.} \citeweb{mailradar:mta-stats}.
     1.8 +Table \ref{tab:mta-market-share} shows the most used \MTA{}s determined by three different statistics. The first was done by Daniel~J.\ \person{Bernstein} (the author of \qmail) in 2001 \cite{bernstein01}. The second is by \person{Simpson} and \person{Bekman} in 2007 and was published by \name{O'ReillyNet} \cite{simpson07}. And the third is from \name{MailRadar.com} with unknown date\footnote{The footer of the website shows ``Copyright 2007'' but more likely does this refer to the whole website.} \citeweb{mailradar:mta-stats}.
     1.9  
    1.10  \begin{table}
    1.11  	\begin{center}
    1.12 @@ -97,7 +97,7 @@
    1.13  
    1.14  \subsection{The four major Free Software MTAs}
    1.15  
    1.16 -Now follows a small introduction to the five programs chosen for comparison, except \masqmail\ which already was introduced in chapter \ref{chap:introduction}. Longer introductions, including analysis and comparison, were written by Jonathan de \person{Boyne Pollard} \citeweb{jdebp}.
    1.17 +Now follows a small introduction to the five programs chosen for comparison, except \masqmail\ which already was introduced in chapter \ref{chap:introduction}. Longer introductions, including analysis and comparison, were written by Jonathan de \person{Boyne Pollard} \cite{jdebp}.
    1.18  
    1.19  
    1.20  
    1.21 @@ -139,7 +139,7 @@
    1.22  
    1.23  Since November 2007, \qmail\ is released in the \name{public domain} which makes it \freesw. The latest release is 1.03 from July 1998.
    1.24  
    1.25 -The programs homepages are \citeweb{qmail:homepage1} and \citeweb{qmail:homepage2}. Further information about \qmail\ is available with Dave \person{Sill}'s ``Life with qmail'' \citeweb{lifewithqmail}.
    1.26 +The programs homepages are \citeweb{qmail:homepage1} and \citeweb{qmail:homepage2}. Further information about \qmail\ is available with Dave \person{Sill}'s ``Life with qmail'' \cite{lifewithqmail}.
    1.27  
    1.28  
    1.29  
    1.30 @@ -160,7 +160,7 @@
    1.31  
    1.32  \section{Comparison of MTAs}
    1.33  
    1.34 -This section does not try to provide an overall \MTA\ comparison, because this is already done by others. Remarkable comparisons are the one by Dan \person{Shearer} \cite{shearer06} and a discussion on the mailing list \name{plug@lists.q-linux.com} \citeweb{plug:mtas}. Tabulary overviews may be found at \citeweb{mailsoftware42}, \citeweb{wikipedia:comparison-of-mail-servers}, and \citeweb[section 1.9]{lifewithqmail}.
    1.35 +This section does not try to provide an overall \MTA\ comparison, because this is already done by others. Remarkable comparisons are the one by Dan \person{Shearer} \cite{shearer06} and a discussion on the mailing list \name{plug@lists.q-linux.com} \cite{plug:mtas}. Tabulary overviews may be found at \citeweb{mailsoftware42}, \citeweb{wikipedia:comparison-of-mail-servers}, and \cite[section 1.9]{lifewithqmail}.
    1.36  
    1.37  Here provided is an overview on a selection of important properties, covering the four previously introduced programs. The data comes from the above stated sources and is collected in table \ref{tab:mta-comparison}.
    1.38  
    1.39 @@ -176,7 +176,7 @@
    1.40  \subsection{Architecture}
    1.41  
    1.42  Architecture is most important when comparing \MTA{}s. Many other properties of a program depend on its architecture. %fixme: add ref?
    1.43 -Munawar \person{Hafiz} \cite{hafiz05} discusses in detail on \mta\ architecture, comparing \sendmail, \qmail, \postfix, and \name{sendmail X}. Jonathan de \person{Boyne Pollard}'s \MTA\ review \citeweb{jdebp} is a source too.
    1.44 +Munawar \person{Hafiz} \cite{hafiz05} discusses in detail on \mta\ architecture, comparing \sendmail, \qmail, \postfix, and \name{sendmail X}. Jonathan de \person{Boyne Pollard}'s \MTA\ review \cite{jdebp} is a source too.
    1.45  
    1.46  Two different architecture types show off: monolithic and modular \mta{}s.
    1.47  
    1.48 @@ -184,7 +184,7 @@
    1.49  
    1.50  Modular \MTA{}s are \NAME{MMDF}, \qmail, \postfix, and \name{MeTA1}. They consist of several programs, each doing a part of the overall job. The different programs run with the least permissions the need, and \emph{setuid root} needs not to be used.
    1.51  
    1.52 -The architecture does not directly define the program's security, but ``[t]he goal of making a software secure can be better achieved by making the design simple and easier to understand and verify''\cite[chapter 6]{hafiz05}. \exim, though being monolithic, has a fairly clean security record. But it is very hard to keep the security up, as the program growth. Wietse \person{Venema} (the author of \postfix) says, the architecture enabled \postfix\ to grow without running into security problems. \citeweb[page 13]{venema:postfix-growth}
    1.53 +The architecture does not directly define the program's security, but ``[t]he goal of making a software secure can be better achieved by making the design simple and easier to understand and verify''\cite[chapter 6]{hafiz05}. \exim, though being monolithic, has a fairly clean security record. But it is very hard to keep the security up, as the program growth. Wietse \person{Venema} (the author of \postfix) says, the architecture enabled \postfix\ to grow without running into security problems. \cite[page 13]{venema:postfix-growth}
    1.54  
    1.55  The modular design, with each sub-program doing one part of the overall job, is applied \name{Unix Philosophy}. The Unix Philosophy \cite{gancarz95} demands ``small is beautiful'' and ``make each program do one thing well''. Monolithic \MTA{}s fail here.
    1.56