docs/diploma

diff thesis/tex/5-Improvements.tex @ 298:0d88bf21e152

minor changes
author meillo@marmaro.de
date Sun, 18 Jan 2009 18:33:30 +0100
parents 8341092a7554
children 1b2f12da528a
line diff
     1.1 --- a/thesis/tex/5-Improvements.tex	Sun Jan 18 13:08:32 2009 +0100
     1.2 +++ b/thesis/tex/5-Improvements.tex	Sun Jan 18 18:33:30 2009 +0100
     1.3 @@ -15,7 +15,7 @@
     1.4  
     1.5  
     1.6  
     1.7 -\subsection{Encryption}
     1.8 +\subsubsection*{Encryption}
     1.9  
    1.10  Electronic mail is very weak to sniffing attacks, because all data transfer is unencrypted. This concerns the message's content, as well as the email addresses in header and envelope, but also authentication dialogs that may transfer plain text passwords (\NAME{PLAIN} and \NAME{LOGIN} are examples). Adding encryption is therefor wanted.
    1.11  
    1.12 @@ -57,7 +57,7 @@
    1.13  
    1.14  
    1.15  
    1.16 -\subsection{Authentication}
    1.17 +\subsubsection*{Authentication}
    1.18  
    1.19  Several ways to restrict access are available. The most simple one is restrictiction by the \NAME{IP} address. No extra complexity is added this way, but static \NAME{IP} addresses are mandatory. This kind of restriction may be enabled using the operating system's \path{hosts.allow} and \path{hosts.deny} files. To allow only connections to port 25 from localhost or the local network \texttt{192.168.100.0/24} insert the line ``\texttt{25: ALL}'' into \path{hosts.deny} and ``\texttt{25: 127.0.0.1, 192.168.100.}'' into \path{hosts.allow}.
    1.20  
    1.21 @@ -94,7 +94,7 @@
    1.22  
    1.23  
    1.24  
    1.25 -\subsection{Security}
    1.26 +\subsubsection*{Security}
    1.27  
    1.28  by using wrappers and interposition filters
    1.29  
    1.30 @@ -108,19 +108,19 @@
    1.31  \end{verbatim}
    1.32  
    1.33  
    1.34 -\subsection{Reliability}
    1.35 +\subsubsection*{Reliability}
    1.36  
    1.37  discuss persistence through using databases
    1.38  
    1.39  
    1.40  
    1.41 -\subsection{Spam and malware handling}
    1.42 +\subsubsection*{Spam and malware handling}
    1.43  
    1.44  discuss the MTA->scanner->MTA approach
    1.45  
    1.46  
    1.47  
    1.48 -\subsection{Bug fixes}
    1.49 +\subsubsection*{Bug fixes}
    1.50  
    1.51  already fixed bugs
    1.52  
    1.53 @@ -194,6 +194,8 @@
    1.54  %fixme: check, cite, and think about
    1.55  
    1.56  %fixme: discuss: filesystem vs. database
    1.57 +<< \masqmail\ uses the filesytem to store the queue, storing the queue in a databases might improve the reliability through better persistence. >> %fixme
    1.58 +
    1.59  
    1.60  %fixme: what about the ``rule of repair''?
    1.61