X-Git-Url: http://pileus.org/git/?a=blobdiff_plain;f=fetchmail.man;h=f5355b1213514e30fd0d37d3873daccc310dd139;hb=02be6da2edcc84826cc3c535f5182992916fbf85;hp=903c8d4b210f85d8137d482e5106dd598812b645;hpb=4df2797a850897e8c78b1efcabc37f3a29faafad;p=~andy%2Ffetchmail diff --git a/fetchmail.man b/fetchmail.man index 903c8d4b..f5355b12 100644 --- a/fetchmail.man +++ b/fetchmail.man @@ -10,7 +10,7 @@ .\" Load www macros to process .URL requests, this requires groff: .mso www.tmac .\" -.TH fetchmail 1 "fetchmail 6.3.19" "fetchmail" "fetchmail reference manual" +.TH fetchmail 1 "fetchmail 6.3.25" "fetchmail" "fetchmail reference manual" .SH NAME fetchmail \- fetch mail from a POP, IMAP, ETRN, or ODMR-capable server @@ -203,9 +203,9 @@ deleted from the upstream server, see "no softbounce" below. (since v6.3.10, Keyword: set softbounce, since v6.3.10) .br Soft bounce mode. All permanent delivery errors cause messages to be -left on the upstream server if the protocol supports that. Default to -match historic fetchmail documentation, to be changed to hard bounce -mode in the next fetchmail release. +left on the upstream server if the protocol supports that. +.B This option is on by default to match historic fetchmail documentation, +and will be changed to hard bounce mode in the next fetchmail release. .SS Disposal Options .TP .B \-a | \-\-all | (since v6.3.3) \-\-fetchall @@ -474,9 +474,9 @@ Also see \-\-sslcert above. (Keyword: sslproto) .br Forces an SSL/TLS protocol. Possible values are \fB''\fP, -\&'\fBSSL23\fP' (note however that fetchmail, since v6.3.20, prohibits -negotiation of SSLv2 -- it has been deprecated for 15 years and is -insecure), \&'\fBSSL3\fP', and +\&'\fBSSL2\fP' (not supported on all systems), +\&'\fBSSL23\fP', (use of these two values is discouraged +and should only be used as a last resort) \&'\fBSSL3\fP', and \&'\fBTLS1\fP'. The default behaviour if this option is unset is: for connections without \-\-ssl, use \&'\fBTLS1\fP' so that fetchmail will opportunistically try STARTTLS negotiation with TLS1. You can configure @@ -562,11 +562,11 @@ the upstream server can't be made to use proper certificates. .br Specify the fingerprint of the server key (an MD5 hash of the key) in hexadecimal notation with colons separating groups of two digits. The letter -hex digits must be in upper case. This is the default format OpenSSL uses, -and the one fetchmail uses to report the fingerprint when an SSL connection +hex digits must be in upper case. This is the format +that fetchmail uses to report the fingerprint when an SSL connection is established. When this is specified, fetchmail will compare the server key fingerprint with the given one, and the connection will fail if they do not -match regardless of the \fBsslcertck\fP setting. The connection will +match, regardless of the \fBsslcertck\fP setting. The connection will also fail if fetchmail cannot obtain an SSL certificate from the server. This can be used to prevent man-in-the-middle attacks, but the finger print from the server needs to be obtained or verified over a secure @@ -1208,7 +1208,7 @@ severely underdocumented, so failures may occur just because the programmers are not aware of OpenSSL's requirement of the day. For instance, since v6.3.16, fetchmail calls OpenSSL_add_all_algorithms(), which is necessary to support certificates -with SHA256 on OpenSSL 0.9.8 -- this information is deeply hidden in the +using SHA256 on OpenSSL 0.9.8 -- this information is deeply hidden in the documentation and not at all obvious. Please do not hesitate to report subtle SSL failures. .PP @@ -1366,6 +1366,8 @@ The option turns off use of .BR syslog (3), assuming it's turned on in the \fI~/.fetchmailrc\fP file. +This option is overridden, in certain situations, by \fB\-\-logfile\fP (which +see). .PP The .B \-N @@ -1377,8 +1379,7 @@ fetchmail runs as the child of a supervisor process such as .BR init (8) or Gerrit Pape's .BR runit (8). -Note that this also causes the logfile option to be ignored (though -perhaps it shouldn't). +Note that this also causes the logfile option to be ignored. .PP Note that while running in daemon mode polling a POP2 or IMAP2bis server, transient errors (such as DNS failures or sendmail delivery refusals) @@ -1567,7 +1568,8 @@ we do not accept mail from it. See also BUGS. .SH SMTP/ESMTP ERROR HANDLING Besides the spam-blocking described above, fetchmail takes special -actions on the following SMTP/ESMTP error responses +actions \(em that may be modified by the \-\-softbounce option \(em on +the following SMTP/ESMTP error response codes .TP 5 452 (insufficient system storage) Leave the message in the server mailbox for later retrieval. @@ -1580,7 +1582,8 @@ originator. Delete the message from the server. Don't even try to send bounce-mail to the originator. .PP -Other errors trigger bounce mail back to the originator. See also BUGS. +Other errors greater or equal to 500 trigger bounce mail back to the +originator, unless suppressed by \-\-softbounce. See also BUGS. .SH THE RUN CONTROL FILE The preferred way to set up fetchmail is to write a @@ -1702,13 +1705,16 @@ Keep permanently undeliverable mail as though a temporary error had occurred (default). T} set logfile \-L \& T{ -Name of a file to append error and status messages to. +Name of a file to append error and status messages to. Only effective +in daemon mode and if fetchmail detaches. If effective, overrides \fBset +syslog\fP. T} set idfile \-i \& T{ Name of the file to store UID lists in. T} set syslog \& \& T{ -Do error logging through syslog(3). +Do error logging through syslog(3). May be overriden by \fBset +logfile\fP. T} set no syslog \& \& T{ Turn off error logging through syslog(3). (default) @@ -2781,6 +2787,16 @@ then that name is used as the default local name. Otherwise session ID (this elaborate logic is designed to handle the case of multiple names per userid gracefully). +.IP \fBFETCHMAIL_DISABLE_CBC_IV_COUNTERMEASURE\fP +(since v6.3.22): +If this environment variable is set and not empty, fetchmail will disable +a countermeasure against an SSL CBC IV attack (by setting +SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS). This is a security risk, but may be +necessary for connecting to certain non-standards-conforming servers. +See fetchmail's NEWS file and fetchmail-SA-2012-01.txt for details. +Earlier fetchmail versions (v6.3.21 and older) used to disable this +countermeasure, but v6.3.22 no longer does that as a safety precaution. + .IP \fBFETCHMAIL_INCLUDE_DEFAULT_X509_CA_CERTS\fP (since v6.3.17): If this environment variable is set and not empty, fetchmail will always load @@ -2813,7 +2829,7 @@ it). Running \fBfetchmail\fP in foreground while a background fetchmail is running will do whichever of these is appropriate to wake it up. -.SH BUGS AND KNOWN PROBLEMS +.SH BUGS, LIMITATIONS, AND KNOWN PROBLEMS .PP Please check the \fBNEWS\fP file that shipped with fetchmail for more known bugs than those listed here. @@ -2823,6 +2839,10 @@ character, for instance "demonstr@ti on". These are rather uncommon and only hurt when using UID-based \-\-keep setups, so the 6.3.X versions of fetchmail won't be fixed. .PP +Fetchmail cannot handle configurations where you have multiple accounts +that use the same server name and the same login. Any user@server +combination must be unique. +.PP The assumptions that the DNS and in particular the checkalias options make are not often sustainable. For instance, it has become uncommon for an MX server to be a POP3 or IMAP server at the same time. Therefore the