florian wrote:We're actually working on solutions here that would allow you do do this securely without special prerequisites, but they are not available yet.
In the meantime (and that's probably at least a couple months), your only choice is to use a VPN connection.
Florian.
Florian,
Indeed. I also threw together a solution using Stunnel just for kicks. This *could* be used if VPN was not an option (or you/your company doesn't have a VPN). It seems to be working although it's certainly a .. hack.
Here is how I did it:
I installed Stunnel on the client's PC as a service. I edited the stunnel.conf to run in client mode and to accept on 'localhost:5729' and connect to the 'scalixhost.com:443' (you can change 443 to whatever port you want, I did it for tunneling over HTTPS abilities).
One scalixhost.com (my Scalix server, but it could be any server really) I installed another Stunnel process in server mode that accepts on scalixhost.com:443 and connects to localhost:5729 (or whatever your Scalix server IP would be. I chose localhost for obvious reasons).
One thing to keep in mind is if you are running Apache on scalixhost.com and you are using mod_ssl, you'll have to edit your configuration file and change the 'Listen 443' to 'Listen xx.xx.xx.xx:443'. Then you will have to create an IP alias on your eth0 interface with a different IP (your stunnel configuration should accept on this IP). This doesn't matter if you use a different port that's not being used on the Scalix server.
Then I created two Outlook profiles. Outlook Secure and Outlook Insecure.
Outlook Secure's Scalix server would be 'localhost'. All traffic will be tunneled over SSL on port 443 to scalixhost.com, then redirected to the loopback interface to the scalixual port.
Outlook Insecure's Scalix server would be 'scalixhost.com'. All traffic is (as you pointed out) is unencrypted.
nb