|[ << ]||[ < ]||[ Up ]||[ > ]||[ >> ]||[Top]||[Contents]||[Index]||[ ? ]|
When GNU Anubis accepts incoming connection, it first has to identify the remote party, i.e. to determine whether it is authorised to use Anubis resources and, if so, what configuration settings to use during the session. We call this process authentication. The exact method of authentication depends on Anubis operation mode. Currently there are three modes:
No authentication is performed. Anubis switches to the unprivileged user (see section user-unprivileged) and acts as an SMTP proxy.
Anubis relies on AUTH service (
identd) to authenticate users.
This is the default mode. It is compatible with versions of GNU Anubis
up to 3.6.2.
This mode uses SMTP AUTH mechanism to authenticate incoming connections. See section Pixie & Dixie, original description of this mode.
Both modes have their advantages and deficiencies, which you need to weigh carefully before choosing which one to use. They are discussed below:
identdinstalled on his machine.
identdon their machines.
|3.1 User Database|
|3.2 Database URL|
|3.3 Managing the Database|
|[ << ]||[ < ]||[ Up ]||[ > ]||[ >> ]|
This document was generated on March 25, 2021 using texi2html 5.0.