docs/diploma

changeset 394:7d85fd0da3df

remove further shortcuts
author meillo@marmaro.de
date Sat, 07 Feb 2009 12:06:30 +0100
parents 6494832a798c
children 0d78755132b7
files thesis/tex/3-MailTransferAgents.tex thesis/tex/4-MasqmailsFuture.tex thesis/thesis.sty
diffstat 3 files changed, 2 insertions(+), 5 deletions(-) [+]
line diff
     1.1 --- a/thesis/tex/3-MailTransferAgents.tex	Sat Feb 07 12:00:11 2009 +0100
     1.2 +++ b/thesis/tex/3-MailTransferAgents.tex	Sat Feb 07 12:06:30 2009 +0100
     1.3 @@ -206,7 +206,7 @@
     1.4  
     1.5  The \postfix\ project started in 1999 at \NAME{IBM} \name{research}, then called \name{VMailer} or \NAME{IBM} \name{Secure Mailer}. \person{Wietse Venema}'s program ``attempts to be fast, easy to administer, and secure. The outside has a definite Sendmail-ish flavor, but the inside is completely different.'' \citeweb{postfix:homepage}. In fact, \postfix\ was mainly designed after qmail's architecture to gain security. But in contrast to \qmail\ it aims much more on being fast and full-featured.
     1.6  
     1.7 -Today \postfix\ is taken by many Unix systems and \gnulinux\ distributions as default \MTA.
     1.8 +Today \postfix\ is taken by many Unix systems and \NAME{GNU}/Linux distributions as default \MTA.
     1.9  
    1.10  The latest stable version is numbered 2.5.6 from December 2008. \postfix\ is covered by the \NAME{IBM} \name{Public License 1.0} which is a Free Software license.
    1.11  
     2.1 --- a/thesis/tex/4-MasqmailsFuture.tex	Sat Feb 07 12:00:11 2009 +0100
     2.2 +++ b/thesis/tex/4-MasqmailsFuture.tex	Sat Feb 07 12:06:30 2009 +0100
     2.3 @@ -160,7 +160,7 @@
     2.4  Electronic mail is vulnerable to sniffing attacks, because in generic \SMTP\ all data transfer is unencrypted. The message's body, the header, and the envelope are all unencrypted. But also some authentication dialogs transfer plain text passwords (e.g.\ \NAME{PLAIN} and \NAME{LOGIN}). Hence encryption is throughout important.
     2.5  \index{auth}
     2.6  
     2.7 -The common way to encrypt \SMTP\ dialogs is using \name{Transport Layer Security} (short: \TLS, the successor of \NAME{SSL}). \TLS\ encrypts the datagrams of the \name{transport layer}. This means it works below the application protocols and can be used with any of them \citeweb{wikipedia:tls}.
     2.8 +The common way to encrypt \SMTP\ dialogs is using \name{Transport Layer Security} (short: \NAME{TLS}, the successor of \NAME{SSL}). \NAME{TLS} encrypts the datagrams of the \name{transport layer}. This means it works below the application protocols and can be used with any of them \citeweb{wikipedia:tls}.
     2.9  \index{tls}
    2.10  \index{ssl}
    2.11  
     3.1 --- a/thesis/thesis.sty	Sat Feb 07 12:00:11 2009 +0100
     3.2 +++ b/thesis/thesis.sty	Sat Feb 07 12:06:30 2009 +0100
     3.3 @@ -43,14 +43,11 @@
     3.4  \newcommand{\exim}{\name{exim}}
     3.5  \newcommand{\postfix}{\name{postfix}}
     3.6  
     3.7 -\newcommand{\gnulinux}{\NAME{GNU}/\name{Linux}}
     3.8  \newcommand{\MTA}{\NAME{MTA}}
     3.9  \newcommand{\MUA}{\NAME{MUA}}
    3.10  \newcommand{\MDA}{\NAME{MDA}}
    3.11  \newcommand{\RFC}{\NAME{RFC}}
    3.12 -\newcommand{\GNU}{\NAME{GNU}}
    3.13  \newcommand{\SMTP}{\NAME{SMTP}}
    3.14 -\newcommand{\TLS}{\NAME{TLS}}
    3.15  
    3.16  \newcommand{\TODO}{\NAME{TODO}}
    3.17  \newcommand{\RF}{\NAME{RF}}