pop3 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155
  1. .TH POP3 8
  2. .SH NAME
  3. pop3, imap4d \- mail servers
  4. .SH SYNOPSIS
  5. .PP
  6. .B upas/pop3
  7. [
  8. .B -d
  9. .I debugfile
  10. ][
  11. .B -a
  12. .I mailbox
  13. ][
  14. .B -r
  15. .I peeraddr
  16. ][
  17. .B -t
  18. .I tlscertfile
  19. ][
  20. .B -p
  21. ]
  22. .PP
  23. .B ip/imap4d
  24. .RB [ -acpv ]
  25. .RB [ -d
  26. .IR smtpdomain ]
  27. .RB [ -s
  28. .IR servername ]
  29. .SH DESCRIPTION
  30. .PP
  31. .I Pop3
  32. provides access to a user's mailboxes via the POP3 protocol.
  33. The options are:
  34. .TP
  35. .B -d
  36. create
  37. .I debugfile
  38. and write debugging output to it
  39. .TP
  40. .B -a
  41. causes pop3 to assume that it it already authenticated
  42. and to read
  43. .I mailbox
  44. immediately
  45. .TP
  46. .B -r
  47. causes
  48. .I pop3
  49. to create the file
  50. .B /mail/ratify/trusted/\fIpeeraddr\fP#32
  51. to allow subsequent SMTP sessions from that
  52. address. See
  53. .IR ratfs (4)
  54. for details.
  55. .TP
  56. .B -t
  57. get the local TLS certificate from the file
  58. .IR tlscertfile .
  59. .TP
  60. .B -p
  61. allow passwords in the clear for authenticating the connection
  62. .PP
  63. .I Imap4d
  64. provides access to a user's mailboxes via the IMAP4rev1 protocol.
  65. Only files rooted in
  66. .BI /mail/box/ username /
  67. are accessible.
  68. The list of subscribed mailboxes is contained in
  69. .BI /mail/box/ username /imap.subscribed ,
  70. and initially contains only
  71. .BR INBOX ,
  72. IMAP's name for the user's mailbox.
  73. A shadow file,
  74. .IB mailbox .imp ,
  75. is created for each mailbox examined.
  76. .PP
  77. The options are:
  78. .TP
  79. .B a
  80. Assume the user is already authenticated.
  81. By default, the user must authenticate using
  82. CRAM-MD5 or
  83. .IR securenet (8)
  84. challenge/response authentication.
  85. .TP
  86. .B c
  87. Allow plan 9 challenge response authentication.
  88. .TP
  89. .B p
  90. Allow login authentication. This option
  91. should only be enabled for servers using
  92. an encrypted connection, such as SSL,
  93. and when enabled, all non-encrypted connections should be disallowed.
  94. .I Imap4d
  95. does not enforce this policy.
  96. .TP
  97. .B v
  98. Turn on verbose output to the debug file.
  99. .TP
  100. .B s
  101. The server's name.
  102. If none is provided,
  103. .B cs
  104. (see
  105. .IR ndb (8))
  106. is queried or
  107. .B /env/sysname
  108. is used.
  109. .TP
  110. .B d
  111. The local mail domain.
  112. Defaults to the server
  113. .B /env/site
  114. in the mail server's domain.
  115. .PP
  116. For both
  117. .I imap4d
  118. and
  119. .IR pop3 ,
  120. the password used to authenticate the connection is the APOP
  121. secret held by
  122. .IR keyfs (4)
  123. running on the authentication server.
  124. .SH FILES
  125. .TP
  126. .B /sys/log/imap4d
  127. \- debugging output
  128. .SH SOURCE
  129. .TP
  130. .B /sys/src/cmd/upas/pop3
  131. .TP
  132. .B /sys/src/cmd/ip/imap4d
  133. .SH "SEE ALSO"
  134. .IR aliasmail (8),
  135. .IR faces (1),
  136. .IR filter (1),
  137. .IR mail (1),
  138. .IR marshal (1),
  139. .IR mlmgr (1),
  140. .IR nedmail (1),
  141. .IR qer (8),
  142. .IR rewrite (6),
  143. .IR send (8),
  144. .IR upasfs (4)
  145. .SH BUGS
  146. Usually messages flagged for deletion with
  147. .B DELE
  148. are not actually deleted until the client sends a
  149. .B QUIT
  150. command to end the conversation.
  151. .I Pop3
  152. implements a non-standard command
  153. .B SYNC
  154. that deletes messages flagged for deletion
  155. without ending the conversation.