X-Git-Url: http://git.marmaro.de/?p=mmh;a=blobdiff_plain;f=man%2Fpost.man;h=892215a2b9efea03d2746e1594a40a1eb20b03e8;hp=d3af2ccc789eba5b69140784d43dee6ff416be9b;hb=d8916ff5d389de5ab225cd6f40aeda1b285d0f28;hpb=3d7993e40a34f52e2b6394c2f64ef0111ab886f7 diff --git a/man/post.man b/man/post.man index d3af2cc..892215a 100644 --- a/man/post.man +++ b/man/post.man @@ -181,6 +181,16 @@ account, or when remote email robots give improper precedence to the envelope .BR sendmail 's \*(lqX\-Authentication\-Warning:\*(rq header). .PP +If nmh is using the SMTP MTA, the +.B \-server +and the +.B \-port +switches can be used to override the default mail server (defined by the +.RI servers +entry in +.I %etcdir%/mts.conf +). +.PP If .B nmh has been compiled with SASL support, the @@ -198,20 +208,18 @@ and the the switch can be used to select a authorization userid to provide to SASL other than the default. .PP -Currently SASL security layers are not supported for SMTP. -.BR nmh 's -SMTP SASL code -will always negotiate an unencrypted connection. This means that while the SMTP -authentication can be encrypted, the subsequent data stream can not. This is in -contrast to -.BR nmh 's -POP3 SASL support, where encryption is supported for both the -authentication and the data stream. +If SASL authentication is successful, +.BR nmh +will attempt to negotiate a security layer for session encryption. +Encrypted data is labelled with `(encrypted)' and `(decrypted)' when +viewing the SMTP transaction with the +.B \-snoop +switch. .SH FILES .fc ^ ~ .nf -.ta \w'/usr/local/nmh/etc/ExtraBigFileName 'u +.ta \w'%etcdir%/ExtraBigFileName 'u ^%etcdir%/mts.conf~^nmh mts configuration file ^%etcdir%/MailAliases~^global nmh alias file ^%bindir%/refile~^Program to process Fcc:s @@ -245,7 +253,7 @@ mhmail(1), send(1), mh\-mail(5), mh\-alias(5), mh\-tailor(5), .SH CONTEXT None -.Bu +.SH BUGS \*(lqReply\-To:\*(rq fields are allowed to have groups in them according to the 822 specification, but .B post