From: Matthias A. <mat...@gm...> - 2007-04-29 22:11:47
|
Nico Golde schrieb: > Hi, > attached patch fixes Debian bug > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421446 > Kind regards > Nico Does it? > --- fetchmail.man 2007-04-08 14:52:42.000000000 +0200 > +++ fetchmail.man.new 2007-04-29 16:59:30.000000000 +0200 > @@ -408,10 +408,10 @@ > .TP > .B \-\-sslproto <name> > (Keyword: sslproto) > -Forces an SSL or TLS protocol. Possible values are '\fBSSL2\fR', > -\&'\fBSSL3\fR', '\fBSSL23\fR', and '\fBTLS1\fR'. Try this if the default > +Forces an SSL or TLS protocol. Possible values are '\fBssl2\fR', > +\&'\fBssl3\fR', '\fBssl23\fR', and '\fBtls1\fR'. Try this if the default > handshake does not work for your server. Use this option with > -'\fBTLS1\fR' to enforce a TLS connection. To defeat opportunistic TLSv1 > +'\fBtls1\fR' to enforce a TLS connection. To defeat opportunistic TLSv1 > negotiation when the server advertises STARTTLS or STLS, use \fB''\fR. > This option, even if the argument is the empty string, will also > suppress the diagnostic 'SERVER: opportunistic upgrade to TLS.' message The match is case insensitive, so no need to hack the manpage. I can't reproduce this in 6.3.8 either, so no action required upstream. -- Matthias Andree |