From 54428f7c1355129d7a9c3d592c4731a27b3baa93 Mon Sep 17 00:00:00 2001 From: "Eric S. Raymond" Date: Tue, 3 Aug 1999 08:20:31 +0000 Subject: RPA support works. svn path=/trunk/; revision=2538 --- fetchmail.man | 12 ++++-------- 1 file changed, 4 insertions(+), 8 deletions(-) (limited to 'fetchmail.man') diff --git a/fetchmail.man b/fetchmail.man index 8624b502..abf9c2d1 100644 --- a/fetchmail.man +++ b/fetchmail.man @@ -180,8 +180,6 @@ Use POP3 with MD5 authentication. Use POP3 with RPOP authentication. .IP KPOP Use POP3 with Kerberos V4 authentication on port 1109. -.IP RPA -Tries CompuServe's Remote Password Authentication. .IP SDPS Use POP3 with Demon Internet's SDPS extensions. .IP IMAP @@ -647,9 +645,10 @@ challenge conforming to RFC1938, \fIfetchmail\fR will use your password as a pass phrase to generate the required response. This avoids sending secrets over the net unencrypted. .PP -Compuserve's RPA authentication (similar to APOP) is supported. If -you specify it, \fIfetchmail\fR will try to perform an RPA pass-phrase -authentication instead of sending over the password en clair. +Compuserve's RPA authentication (similar to APOP) is supported. If you +compile in the support, \fIfetchmail\fR will try to perform an RPA pass-phrase +authentication instead of sending over the password en clair if it +detects "@compuserve.com" in the hostname. .PP If you are using IPsec, the -T (--netsec) option can be used to pass an IP security request to be used when outgoing IP connections are @@ -1823,9 +1822,6 @@ MDA. For maximum safety, however, don't use an mda command containing Fetchmail's method of sending bouncemail requires that port 25 of localhost be available for sending mail via SMTP. .PP -Due to an incompatible change in CompuServe's RPA on July 31 1999, -the RPA support is currently broken. -.PP Send comments, bug reports, gripes, and the like to the fetchmail-friends list . An HTML FAQ is available at the fetchmail home page; surf to -- cgit v1.2.3