aboutsummaryrefslogtreecommitdiffstats
path: root/fetchmail-FAQ.html
diff options
context:
space:
mode:
authorMatthias Andree <matthias.andree@gmx.de>2007-04-06 18:01:39 +0000
committerMatthias Andree <matthias.andree@gmx.de>2007-04-06 18:01:39 +0000
commit0e7ff9cb9b8483e188febe76ccffefb66d75c97e (patch)
tree2b6744d56b188713ad288930523338d4af6fb795 /fetchmail-FAQ.html
parentee6ff6b4d5cf72b6e62fef9cbf0fc643316efbed (diff)
downloadfetchmail-0e7ff9cb9b8483e188febe76ccffefb66d75c97e.tar.gz
fetchmail-0e7ff9cb9b8483e188febe76ccffefb66d75c97e.tar.bz2
fetchmail-0e7ff9cb9b8483e188febe76ccffefb66d75c97e.zip
Flank APOP by comments about it being insecure.
svn path=/branches/BRANCH_6-3/; revision=5084
Diffstat (limited to 'fetchmail-FAQ.html')
-rw-r--r--fetchmail-FAQ.html11
1 files changed, 6 insertions, 5 deletions
diff --git a/fetchmail-FAQ.html b/fetchmail-FAQ.html
index 034a4111..f6b26e93 100644
--- a/fetchmail-FAQ.html
+++ b/fetchmail-FAQ.html
@@ -627,11 +627,12 @@ autoprobe facility will detect it and tell you if you have it). If
you see something in the greeting line that looks like an
angle-bracket-enclosed Internet address with a numeric left-hand
part, that's an APOP challenge (it will vary each time you log in).
-You can register a secret on the host (using
-<code>popauth(8)</code> or some program like it). Specify the
+For some hosts, you need to register a secret on the host (using
+<code>popauth(8)</code> or some program like that). Specify the
secret as your password in your .fetchmailrc; it will be used to
encrypt the current challenge, and the encrypted form will be sent
-back the the server for verification.</p>
+back the the server for verification. Note that APOP is no longer
+considered secure since March 2007.</p>
<p>Alternatively, you may have Kerberos available. This may require
you to set up some magic files in your home directory on your
@@ -647,8 +648,8 @@ present by looking for AUTH=KERBEROS_V4 in the CAPABILITY
response.</p>
<p>If you are fetching mail from a CompuServe POP3 account, you can
-use their RPA authentication (which works much like APOP). See <a
-href="#I1">I1</a> for details. If you are fetching mail from
+use their RPA authentication. See <a href="#I1">I1</a> for details.
+If you are fetching mail from
Microsoft Exchange using IMAP, you will be able to use NTLM.</p>
<p>Your POP3 server may have the RFC1938 OTP capability to use