[ < ] [ > ]   [ << ] [ Up ] [ >> ]         [Top] [Contents] [Index] [ ? ]

A.

Jump to:   "   *   +   .   /   4   8   @  
A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Z  
Index Entry Section

"
"and" expansion condition11.8 Combining expansion conditions
"From" line5.2 Trusted and admin users
"From" line5.3 Command line options
"From" line5.3 Command line options
"From" line5.3 Command line options
"From" line14.23 Alphabetical list of main options
"From" line14.23 Alphabetical list of main options
"From" line26.2 Private options for appendfile
"From" line26.2 Private options for appendfile
"From" line26.4 Operational details for delivery to a new file
"From" line29.5 Private options for pipe
"From" line44.4 The UUCP From line
"gecos" field, parsing14.23 Alphabetical list of main options
"or" expansion condition11.8 Combining expansion conditions
"percent hack"14.23 Alphabetical list of main options
"percent hack"40.48 Using an ACL to control relaying
"spool file is locked"49.15 Reducing or increasing what is logged
"sticky" bit4.18 Testing
"sticky" bit26.2 Private options for appendfile

*
*@ with single-key lookup9.6 Default values in single-key lookups
*@ with single-key lookup10.19 Address lists

+
+caseful10.20 Case of letters in address lists
+caseful11.7 Expansion conditions
+defer_unknown40.24 Using DNS lists
+exclude_unknown40.24 Using DNS lists
+ignore_defer10.15 Temporary DNS errors when looking up host information
+ignore_unknown10.14 Behaviour when an IP address or name cannot be found
+include_defer10.15 Temporary DNS errors when looking up host information
+include_unknown10.14 Behaviour when an IP address or name cannot be found
+include_unknown40.24 Using DNS lists

.
.ifdef6.9 Conditional skips in the configuration file
.include’ in configuration file6.3 File inclusions in the configuration file
.include_if_exists’ in configuration file6.3 File inclusions in the configuration file

/
/dev/null22.6 Special items in redirection lists
/etc/aliases4.15 Installing Exim binaries and scripts
/etc/mail/mailer.conf4.19 Replacing another MTA with Exim
/etc/passwd9.4 Query-style lookup types
/etc/passwd14.23 Alphabetical list of main options
/etc/passwd15. Generic options for routers
/etc/userdbshadow.dat9.3 Single-key lookup types

4
4xx responses11.9 Expansion variables
4xx responses30.4 Private options for smtp
4xx responses30.4 Private options for smtp
4xx responses32.3 Choosing which retry rule to use for address errors

8
8-bit characters5.3 Command line options
8-bit characters14.23 Alphabetical list of main options
8-bit characters14.23 Alphabetical list of main options
8BITMIME14.23 Alphabetical list of main options

@
@ in a domain list7.1 Main configuration settings
@ in a domain list10.8 Domain lists
@ in a host list10.11 Host list patterns that match by IP address
@@ with single-key lookup10.19 Address lists
@[] in a domain list10.8 Domain lists
@[] in a host list10.11 Host list patterns that match by IP address
@mx_any10.8 Domain lists
@mx_primary10.8 Domain lists
@mx_secondary10.8 Domain lists

A
abandoning mail5.3 Command line options
abandoning mail22.6 Special items in redirection lists
accept ACL verb40.16 ACL verbs
accept router16. The accept router
access control lists (ACLs)3.2 Policy control
access control lists (ACLs)7.2 ACL configuration
access control lists (ACLs)14.23 Alphabetical list of main options
access control lists (ACLs)14.23 Alphabetical list of main options
access control lists (ACLs)14.23 Alphabetical list of main options
access control lists (ACLs)14.23 Alphabetical list of main options
access control lists (ACLs)14.23 Alphabetical list of main options
access control lists (ACLs)31.2 When does rewriting happen?
access control lists (ACLs)40. Access control lists
access control lists (ACLs)40.2 Specifying when ACLs are used
access control lists (ACLs)40.10 Finding an ACL to use
access control lists (ACLs)40.11 ACL return codes
access control lists (ACLs)40.12 Unset ACL options
access control lists (ACLs)40.13 Data for message ACLs
access control lists (ACLs)40.14 Data for non-message ACLs
access control lists (ACLs)40.15 Format of an ACL
access control lists (ACLs)40.15 Format of an ACL
access control lists (ACLs)40.17 ACL variables
access control lists (ACLs)40.18 Condition and modifier processing
access control lists (ACLs)40.18 Condition and modifier processing
access control lists (ACLs)40.19 ACL modifiers
access control lists (ACLs)40.20 Use of the control modifier
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.23 ACL conditions
access control lists (ACLs)40.24 Using DNS lists
access control lists (ACLs)40.48 Using an ACL to control relaying
acl ACL condition40.23 ACL conditions
adding drivers55. Adding new drivers or lookup types
additional groups15. Generic options for routers
additional groups24. Generic options for transports
address1. Introduction
address1.7 Limitations
address5.3 Command line options
address5.3 Command line options
address5.3 Command line options
address14.23 Alphabetical list of main options
address14.23 Alphabetical list of main options
address15. Generic options for routers
address17.2 Private options for dnslookup
address20.1 Private options for manualroute
address44.3 Unqualified addresses
address44.18 Constructed addresses
address duplicate, discarding3.11 Duplicate addresses
address duplicate, discarding22.7 Duplicate addresses
address expansion item11.6 Expansion operators
address list10.19 Address lists
address list10.19 Address lists
address list10.19 Address lists
address list10.19 Address lists
address list10.19 Address lists
address list10.19 Address lists
address list10.19 Address lists
address list10.20 Case of letters in address lists
address list11.7 Expansion conditions
address list31.5 Rewriting patterns
address qualification, suppressing5.3 Command line options
address redirection22. The redirect router
address redirection22.2 Forward files and address verification
address redirection22.4 Items in a non-filter redirection list
address redirection22.5 Redirecting to a local mailbox
address redirection22.5 Redirecting to a local mailbox
address redirection22.6 Special items in redirection lists
address redirection22.6 Special items in redirection lists
address redirection22.6 Special items in redirection lists
address redirection22.6 Special items in redirection lists
address redirection22.8 Repeated redirection expansion
address redirection22.9 Errors in redirection lists
address redirection22.10 Private options for the redirect router
address redirection22.10 Private options for the redirect router
address redirection22.10 Private options for the redirect router
address redirection22.10 Private options for the redirect router
address redirection40.45 Redirection while verifying
addresses expansion item11.6 Expansion operators
admin user5.2 Trusted and admin users
admin user14.23 Alphabetical list of main options
admin user51.1 Running the monitor
admin user52.7 Privileged users
alias file5.1 Setting options by program name
alias file5.3 Command line options
alias file9.6 Default values in single-key lookups
alias file22. The redirect router
alias file22.5 Redirecting to a local mailbox
alias file22.6 Special items in redirection lists
alias file22.10 Private options for the redirect router
alias file22.10 Private options for the redirect router
alias file22.10 Private options for the redirect router
alias for host10.13 Host list patterns that match by host name
alternate configuration file5.3 Command line options
angle brackets, excess14.23 Alphabetical list of main options
appendfile transport26. The appendfile transport
appending to a file26.3 Operational details for appending
asterisk9.7 Partial matching in single-key lookups
asterisk10.8 Domain lists
asterisk10.8 Domain lists
asterisk10.10 Special host list patterns
asterisk10.13 Host list patterns that match by host name
asterisk10.19 Address lists
asterisk45.1 Outgoing SMTP and LMTP over TCP/IP
asterisk49.7 Logging deliveries
Athena2. Incorporated code
AUTH6.2 Configuration file format
AUTH7.7 Authenticators configuration
AUTH11.7 Expansion conditions
AUTH11.9 Expansion variables
AUTH14.23 Alphabetical list of main options
AUTH14.23 Alphabetical list of main options
AUTH14.23 Alphabetical list of main options
AUTH14.23 Alphabetical list of main options
AUTH14.23 Alphabetical list of main options
AUTH33. SMTP authentication
AUTH33.2 The AUTH parameter on MAIL commands
AUTH33.4 Testing server authentication
AUTH33.5 Authentication by an Exim client
AUTH34.2 Using plaintext in a server
AUTH40.2 Specifying when ACLs are used
AUTH49.6 Logging message reception
authenticated ACL condition40.23 ACL conditions
authentication5.3 Command line options
authentication5.3 Command line options
authentication5.3 Command line options
authentication11.9 Expansion variables
authentication11.9 Expansion variables
authentication11.9 Expansion variables
authentication14.23 Alphabetical list of main options
authentication14.23 Alphabetical list of main options
authentication30.4 Private options for smtp
authentication30.4 Private options for smtp
authentication33. SMTP authentication
authentication33.1 Generic options for authenticators
authentication33.2 The AUTH parameter on MAIL commands
authentication33.3 Authentication on an Exim server
authentication33.4 Testing server authentication
authentication33.5 Authentication by an Exim client
authentication34.3 The PLAIN authentication mechanism
authentication34.4 The LOGIN authentication mechanism
authentication35. The cram_md5 authenticator
authentication38. The spa authenticator
authentication38. The spa authenticator
authentication40.23 ACL conditions
authentication49.6 Logging message reception
authenticators34. The plaintext authenticator
authenticators35. The cram_md5 authenticator
authenticators36. The cyrus_sasl authenticator
authenticators37. The dovecot authenticator
authenticators38. The spa authenticator
autoreply transport14.23 Alphabetical list of main options
autoreply transport27. The autoreply transport

Jump to:   "   *   +   .   /   4   8   @  
A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Z  

[ << ] [ >> ]           [Top] [Contents] [Index] [ ? ]

This document was generated on June, 7 2010 using texi2html 1.78.