docs/diploma

changeset 231:adb7ecbc92da

removed obsolete figure
author meillo@marmaro.de
date Sat, 10 Jan 2009 00:27:31 +0100
parents 35b0dfefd2c4
children 1afdb3f85e69
files thesis/tex/5-Improvements.tex
diffstat 1 files changed, 0 insertions(+), 8 deletions(-) [+]
line diff
     1.1 --- a/thesis/tex/5-Improvements.tex	Sat Jan 10 00:27:06 2009 +0100
     1.2 +++ b/thesis/tex/5-Improvements.tex	Sat Jan 10 00:27:31 2009 +0100
     1.3 @@ -59,14 +59,6 @@
     1.4  
     1.5  The \NAME{POP} protocol, for example, is good suited for such tunneling, but \SMTP\ is is not generally. Outgoing \SMTP\ client connections can be tunneled without problem---\masqmail\ already provides a configure option called \texttt{wrapper} to do so. Tunneling incomming connections to a server leads to problems with \SMTP. As data comes encrypted through the tunnel to the receiving host and gets then decrypted and forwarded on local to the port the application listens on. From the \MTA's view, this makes all connections appear to come from localhost, unfortunately. Figure \ref{fig:stunnel} depicts the data flow.
     1.6  
     1.7 -\begin{figure}
     1.8 -	\begin{center}
     1.9 -		\input{input/stunnel.tex}
    1.10 -	\end{center}
    1.11 -	\caption{Data flow using \name{stunnel}}
    1.12 -	\label{fig:stunnel}
    1.13 -\end{figure}
    1.14 -
    1.15  For incoming connections, \NAME{STARTTLS}---defined in \RFC2487---is what \mta{}s implement.
    1.16  
    1.17  \masqmail\ is already able to encrypt outgoing connections, but encryption of incoming connections, using \NAME{STARTTLS} should be implemented. This only affects the \SMTP\ server module.