Gordon Messmer wrote:

For local clients, the return will be slightly greater. However, as far as I understand it, the logic would really need to be introduced into all of the processes that use authdaemon, rather than in authdaemon itself. If authdaemon begins blocking, the other processes will very quickly be unable to connect to it, and will have to inform the clients of failure. You won't have solved the problem.

You're right, unless one configures it to spawn enough processes to cover some temporary spikes in blocking time - so that new authdaemon processes temporarily hold incoming queries until the timeous occur or authentication service is restored.


With that in mind, I'm not personally concerned about Courier's behavior enough to modify it. If you are, the modifications required for each service are likely to be substantially similar. Give it a shot.

If I have time, I'll do it. Not likely in the nearest future, though :(


* a change to access permissions to the OpenLDAP directory requires restart of slapd (silly, but true :( ), which causes a 2-4 seconds LDAP downtime


Off topic, but you could consider using another directory server. The new Fedora DS is quite good, and stores ACIs as attributes in the directory. Among other advantages, this ensures that security settings are replicated like the rest of the data.

I would, if it worked under x86_64.

--
Best Regards,
   Aleksander Adamowski
       GG#: 274614
ICQ UIN: 19780575 http://olo.ab.altkom.pl



-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=103432&bid=230486&dat=121642
_______________________________________________
courier-users mailing list
[email protected]
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users

Reply via email to