aboutsummaryrefslogtreecommitdiffstats
path: root/fetchmail.man
diff options
context:
space:
mode:
authorMatthias Andree <matthias.andree@gmx.de>2005-10-30 20:09:57 +0000
committerMatthias Andree <matthias.andree@gmx.de>2005-10-30 20:09:57 +0000
commit6c48e52f16a0f0e4a23deeb9e4033fb731bc4521 (patch)
tree4879f1ba678223467ec25908c059c2789834eefa /fetchmail.man
parentd7d53f439806e684c893cbe977a121b81cc8ad28 (diff)
downloadfetchmail-6c48e52f16a0f0e4a23deeb9e4033fb731bc4521.tar.gz
fetchmail-6c48e52f16a0f0e4a23deeb9e4033fb731bc4521.tar.bz2
fetchmail-6c48e52f16a0f0e4a23deeb9e4033fb731bc4521.zip
Man page: --sslfingerprint points user to x509(1ssl) and gives an example
how to use it. Debian Bug#213484, Eduard Bloch. svn path=/trunk/; revision=4378
Diffstat (limited to 'fetchmail.man')
-rw-r--r--fetchmail.man10
1 files changed, 10 insertions, 0 deletions
diff --git a/fetchmail.man b/fetchmail.man
index 9343255f..0eec15ea 100644
--- a/fetchmail.man
+++ b/fetchmail.man
@@ -418,6 +418,16 @@ and the one fetchmail uses to report the fingerprint when an SSL connection
is established. When this is specified, fetchmail will compare the server key
fingerprint with the given one, and the connection will fail if they do not
match. This can be used to prevent man-in-the-middle attacks.
+.IP
+To obtain the fingerprint of a certificate stored in the file cert.pem,
+try:
+.sp
+.nf
+ openssl x509 -in cert.pem -noout -fingerprint
+.fi
+.sp
+For details, see
+.BR x509 (1ssl).
.SS Delivery Control Options
.TP
.B \-S <hosts> | \-\-smtphost <hosts>