[Top] [Contents] [Index] [ ? ]

Footnotes

(1)

It is not a serious restriction, however. Users may install Anubis on their machines for the sole purpose of SMTP authentication, as Pixie-Dixie suggests.

(2)

See https://github.com/ptrrkssn/pidentd.

(3)

See http://www.mysql.com.

(4)

See http://www.postgres.org.

(5)

Make sure to run anubisusr in background, so it does not slow down your normal login sequence.

(6)

Unless given the ‘--foreground’ command line option.

(7)

At the time of writing this document — Anubis versions up to 3.6.2.

(8)

The scheme implemented currently is a bit different. First, the config-sender program issues an EXAMINE command that fetches the contents of the user configuration file from the server. Then, it compares it with the local copy kept on the client machine. If the copies differ, config-sender issues UPLOAD and thus updates the configuration on the server.

(9)

This is already possible, See section Call Action.

(10)

Note that the code section could have modified the Content-Type header and, particularly, its encoding part, therefore it is not necessary that the resulting part is encoded using the same method as the original one

(11)

Byte-for-byte comparison


[Top] [Contents] [Index] [ ? ]

This document was generated on January 6, 2024 using texi2html 5.0.