svn path=/trunk/; revision=3542
.TP
.B \-f <pathname>, --fetchmailrc <pathname>
Specify a non-default name for the
.TP
.B \-f <pathname>, --fetchmailrc <pathname>
Specify a non-default name for the
run control file. The pathname argument must be either "-" (a single
dash, meaning to read the configuration from standard input) or a
filename. Unless the --version option is also on, a named file
run control file. The pathname argument must be either "-" (a single
dash, meaning to read the configuration from standard input) or a
filename. Unless the --version option is also on, a named file
If you do not specify a password, and
.I fetchmail
cannot extract one from your
If you do not specify a password, and
.I fetchmail
cannot extract one from your
file in your home directory before requesting one interactively; if an
entry matching the mailserver is found in that file, the password will
be used. Fetchmail first looks for a match on poll name; if it finds none,
it checks for a match on via name. See the
.IR ftp (1)
man page for details of the syntax of the
file in your home directory before requesting one interactively; if an
entry matching the mailserver is found in that file, the password will
be used. Fetchmail first looks for a match on poll name; if it finds none,
it checks for a match on via name. See the
.IR ftp (1)
man page for details of the syntax of the
file. (This feature may allow you to avoid duplicating password
information in more than one file.)
.PP
file. (This feature may allow you to avoid duplicating password
information in more than one file.)
.PP
you register an APOP password on your server host (the program
to do this with on the server is probably called \fIpopauth\fR(8)). You
put the same password in your
you register an APOP password on your server host (the program
to do this with on the server is probably called \fIpopauth\fR(8)). You
put the same password in your
file. Each time
.I fetchmail
logs in, it sends a cryptographically secure hash of your password and
file. Each time
.I fetchmail
logs in, it sends a cryptographically secure hash of your password and
option turns off use of
.IR syslog (3),
assuming it's turned on in the
option turns off use of
.IR syslog (3),
assuming it's turned on in the
file, or that the
.B -L
or
file, or that the
.B -L
or
they're delivered, so this problem does not arise.)
.PP
If you touch or change the
they're delivered, so this problem does not arise.)
.PP
If you touch or change the
file while fetchmail is running in daemon mode, this will be detected
at the beginning of the next poll cycle. When a changed
file while fetchmail is running in daemon mode, this will be detected
at the beginning of the next poll cycle. When a changed
is detected, fetchmail rereads it and restarts from scratch (using
exec(2); no state information is retained in the new instance). Note also
that if you break the
is detected, fetchmail rereads it and restarts from scratch (using
exec(2); no state information is retained in the new instance). Note also
that if you break the
file's syntax, the new instance will softly and silently vanish away
on startup.
file's syntax, the new instance will softly and silently vanish away
on startup.
port 25 of localhost be available for sending mail via SMTP.
.PP
If you modify a
port 25 of localhost be available for sending mail via SMTP.
.PP
If you modify a
while a background instance is running and break the syntax, the
background instance will die silently. Unfortunately, it can't
die noisily because we don't yet know whether syslog should be enabled.
while a background instance is running and break the syntax, the
background instance will die silently. Unfortunately, it can't
die noisily because we don't yet know whether syslog should be enabled.