Nico Golde schrieb:
> Hi,
> attached patch fixes Debian bug
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421446
> Kind regards
> Nico
Does it?
> --- fetchmail.man 2007-04-08 14:52:42.000000000 +0200
> +++ fetchmail.man.new 2007-04-29 16:59:30.000000000 +0200
> @@ -408,10 +408,10 @@
> .TP
> .B \-\-sslproto <name>
> (Keyword: sslproto)
> -Forces an SSL or TLS protocol. Possible values are '\fBSSL2\fR',
> -\&'\fBSSL3\fR', '\fBSSL23\fR', and '\fBTLS1\fR'. Try this if the default
> +Forces an SSL or TLS protocol. Possible values are '\fBssl2\fR',
> +\&'\fBssl3\fR', '\fBssl23\fR', and '\fBtls1\fR'. Try this if the default
> handshake does not work for your server. Use this option with
> -'\fBTLS1\fR' to enforce a TLS connection. To defeat opportunistic TLSv1
> +'\fBtls1\fR' to enforce a TLS connection. To defeat opportunistic TLSv1
> negotiation when the server advertises STARTTLS or STLS, use \fB''\fR.
> This option, even if the argument is the empty string, will also
> suppress the diagnostic 'SERVER: opportunistic upgrade to TLS.' message
The match is case insensitive, so no need to hack the manpage.
I can't reproduce this in 6.3.8 either, so no action required upstream.
--
Matthias Andree
|