equal
deleted
inserted
replaced
|
1 ----------- |
|
2 exim-checks |
|
3 ----------- |
|
4 |
1 The checks should ensure that configuration changes to exim didn't break |
5 The checks should ensure that configuration changes to exim didn't break |
2 anything. |
6 anything. |
3 |
7 |
4 Several types of checks should be performed: |
8 Several types of checks should be performed: |
5 |
9 |
6 * ROUTING |
10 * ROUTING |
7 * ACCESS |
11 * ACCESS |
8 * AUTHENTICATION |
12 * AUTHENTICATION |
9 |
13 |
10 |
14 |
11 Which parameters do we need to set for checking? |
15 Which parameters do we need to set for checking? |
12 Which parameters influence Routing, Access Control and Authentication? |
16 Which parameters influence Routing, Access Control and Authentication? |
13 |
17 |
14 First we could focus on simple -bt or -bv checks. But this does not |
18 First we could focus on simple -bt or -bv checks. But this does not |
15 suffice, since even routing could depend on source IP, sender address |
19 suffice, since even routing could depend on source IP, sender address |
16 and so on. |
20 and so on. |
17 |
21 |
|
22 .. comment |
|
23 vim:ft=rst: |