docs/diploma
diff thesis/tex/5-Improvements.tex @ 231:adb7ecbc92da
removed obsolete figure
author | meillo@marmaro.de |
---|---|
date | Sat, 10 Jan 2009 00:27:31 +0100 |
parents | 711f0d3f5dfd |
children | 5cfea0d05e7f |
line diff
1.1 --- a/thesis/tex/5-Improvements.tex Sat Jan 10 00:27:06 2009 +0100 1.2 +++ b/thesis/tex/5-Improvements.tex Sat Jan 10 00:27:31 2009 +0100 1.3 @@ -59,14 +59,6 @@ 1.4 1.5 The \NAME{POP} protocol, for example, is good suited for such tunneling, but \SMTP\ is is not generally. Outgoing \SMTP\ client connections can be tunneled without problem---\masqmail\ already provides a configure option called \texttt{wrapper} to do so. Tunneling incomming connections to a server leads to problems with \SMTP. As data comes encrypted through the tunnel to the receiving host and gets then decrypted and forwarded on local to the port the application listens on. From the \MTA's view, this makes all connections appear to come from localhost, unfortunately. Figure \ref{fig:stunnel} depicts the data flow. 1.6 1.7 -\begin{figure} 1.8 - \begin{center} 1.9 - \input{input/stunnel.tex} 1.10 - \end{center} 1.11 - \caption{Data flow using \name{stunnel}} 1.12 - \label{fig:stunnel} 1.13 -\end{figure} 1.14 - 1.15 For incoming connections, \NAME{STARTTLS}---defined in \RFC2487---is what \mta{}s implement. 1.16 1.17 \masqmail\ is already able to encrypt outgoing connections, but encryption of incoming connections, using \NAME{STARTTLS} should be implemented. This only affects the \SMTP\ server module.