next up previous contents
Next: Approach followed for this Up: Using wrappers to protect Previous: RFC 1081 Commands   Contents


The ProtoWrap wrapper implementation

This chapter inspects the inner design of ProtoWrap. In section 3.1 the approach followed for this work is outlined. Section 3.3 details how the wrapper is called and which attributes does ProtoWrap provide. Section 3.4 explains the methods ProtoWrap objects have and how to start, stop and query a wrapper.

Sections 3.5 discusses in depth the SMTP protocol, whose many problems motivated this work, and the suggested implementation covering most of its shortcomings. This section, together with 3.6, shows how to extend ProtoWrap to cover additional protocols. In section 3.7 many other protocols are reviewed, explaining the reasons they are not fit for wrapping with ProtoWrapper. Section 3.8 makes a quick note on different ways to achieve SSL encryption for communications, and comments on wrapping SSL encrypted protocols.

Sections 3.9 and 3.10 formalize on the validity, originality and limitations of the data.

In section 3.11 the author presents a brief summary of this chapter.

The fully commented code relevant to this chapter is located in appendix A.



Subsections
next up previous contents
Next: Approach followed for this Up: Using wrappers to protect Previous: RFC 1081 Commands   Contents
Gunnar Wolf
2001-03-12