docs/diploma
diff thesis/tex/4-MasqmailsFuture.tex @ 394:7d85fd0da3df
remove further shortcuts
author | meillo@marmaro.de |
---|---|
date | Sat, 07 Feb 2009 12:06:30 +0100 |
parents | 6494832a798c |
children | 0d78755132b7 |
line diff
1.1 --- a/thesis/tex/4-MasqmailsFuture.tex Sat Feb 07 12:00:11 2009 +0100 1.2 +++ b/thesis/tex/4-MasqmailsFuture.tex Sat Feb 07 12:06:30 2009 +0100 1.3 @@ -160,7 +160,7 @@ 1.4 Electronic mail is vulnerable to sniffing attacks, because in generic \SMTP\ all data transfer is unencrypted. The message's body, the header, and the envelope are all unencrypted. But also some authentication dialogs transfer plain text passwords (e.g.\ \NAME{PLAIN} and \NAME{LOGIN}). Hence encryption is throughout important. 1.5 \index{auth} 1.6 1.7 -The common way to encrypt \SMTP\ dialogs is using \name{Transport Layer Security} (short: \TLS, the successor of \NAME{SSL}). \TLS\ encrypts the datagrams of the \name{transport layer}. This means it works below the application protocols and can be used with any of them \citeweb{wikipedia:tls}. 1.8 +The common way to encrypt \SMTP\ dialogs is using \name{Transport Layer Security} (short: \NAME{TLS}, the successor of \NAME{SSL}). \NAME{TLS} encrypts the datagrams of the \name{transport layer}. This means it works below the application protocols and can be used with any of them \citeweb{wikipedia:tls}. 1.9 \index{tls} 1.10 \index{ssl} 1.11