On 12/08/2010 02:50 AM, Simon Horman wrote:
On Wed, Dec 08, 2010 at 12:00:00AM +0100, Mike Korizek
wrote:
Hi
I checked the documentation of Perdition and I am not sure if the
following scenario can be implemented.
A Client (e.g. Outlook/TB) connects to a Perdition imap/pop proxy.
The proxy itself connects in turn to the real imap/pop server using the
credentials provided by client (possible switch of user_name).
Before an email gets delivered to the client, it will be processed by a
filter program which does some gpg processing (sig verification,
decryption), which is fully transparent for the client.
Can such a scenario be implemented with Perdition (ideally I would like
to write the filter program in perl :-) ).
Hi Mike,
in general IMAP and POP connections have two phases. The unauthenticated
phase where the user is verified. And the authenticated phase where
authenticated users access their messages.
Perdition currently only understands the unauthenticated phase. And once
the connection proceeds to the authenticated phase perdition just blindly
copies bytes between the end-user and the real-server.
The logic that you suggest would need to operate in the authenticated
phase. So in order to add the feature that you suggest to perdition it
would first be necessary to teach Perdition how commands and their replies
work in the authenticated phase. I suspect this would be trivial for POP
but more of a challenge for IMAP.
In summary, I think that what you suggest would be a useful addition to
perdition, but some infrastructure work would be need first.
Hi Simon
I see I have underestimated how complex this is to achieve.
Do you know the product gpgrelay (
http://sites.inka.de/tesla/gpgrelay.html)
It does what I meant but only on the client and on Win :-(
Are there already any plans to take this up in perdition? If so, what is
the timeline?
--
Thanks,
Mike