From c72743cf6139d6906337ddeac964eb79f644097e Mon Sep 17 00:00:00 2001
From: Matthias Andree
Finally, you can use SSL for complete -end-to-end encryption if you have an SSL-enabled mailserver.
+Finally, you can use SSL or TLS for complete +end-to-end encryption if you have a TLS-enabled mailserver.
You'll need to have the OpenSSL libraries installed, and they -should at least be version 0.9.7. +should at least be version 0.9.8, with 1.0.1 preferred. Configure with --with-ssl. If you have the OpenSSL libraries installed in commonly-used default locations, this will suffice. If you have them installed in a non-default location, @@ -2130,7 +2130,7 @@ to --with-ssl after an equal sign.
Fetchmail binaries built this way support ssl
,
sslkey
, and sslcert
options that control
SSL encryption, and will automatically use tls
if the
-server offers it. You will need to have an SSL-enabled mailserver to
+server offers it. You will need to have an SSL/TLS-enabled mailserver to
use these options. See the manual page for details and some words
of care on the limited security provided.
You should note that SSL is only secure against a "man-in-the-middle" -attack if the client is able to verify that the peer's public key is the -correct one, and has not been substituted by an attacker. fetchmail can do -this in one of two ways: by verifying the SSL certificate, or by checking -the fingerprint of the peer's public key.
+You should note that SSL or TLS are only secure against a +"man-in-the-middle" attack if the client is able to verify that the +peer's public key is the correct one, and has not been substituted by an +attacker. fetchmail can do this in one of two ways: by verifying the SSL +certificate, or by checking the fingerprint of the peer's public +key.
-There are three parts to SSL certificate verification: checking that the +
There are three parts to TLS certificate verification: checking that the domain name in the certificate matches the hostname you asked to connect to; checking that the certificate expiry date has not passed; and checking that the certificate has been signed by a known Certificate Authority (CA). This @@ -2227,8 +2228,12 @@ will automatically attempt TLS negotiation if SSL was enabled at compile time. This can however cause problems if the upstream didn't configure his certificates properly.
-In order to prevent fetchmail from trying TLS (STLS, STARTTLS) -negotiation, add this option:
+In order to prevent fetchmail 6.4.0 and newer versions from trying +STLS or STARTTLS negotiation, add this option:
+sslproto ''+ +
In order to prevent older fetchmail versions from trying TLS (STLS, STARTTLS) +negotiation where the above does not work, try this option:
sslproto ssl23-- cgit v1.2.3