equal
deleted
inserted
replaced
|
1 The checks should ensure that configuration changes to exim didn't break |
|
2 anything. |
|
3 |
|
4 Several types of checks should be performed: |
|
5 |
|
6 * ROUTING |
|
7 * ACCESS |
|
8 * AUTHENTICATION |
|
9 |
|
10 |
|
11 Which parameters do we need to set for checking? |
|
12 Which parameters influence Routing, Access Control and Authentication? |
|
13 |
|
14 First we could focus on simple -bt or -bv checks. But this does not |
|
15 suffice, since even routing could depend on source IP, sender address |
|
16 and so on. |
|
17 |