Hi, attached patch fixes Debian bug http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421446 Kind regards Nico
-- Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
--- fetchmail.man 2007-04-08 14:52:42.000000000 +0200 +++ fetchmail.man.new 2007-04-29 16:59:30.000000000 +0200 @@ -408,10 +408,10 @@ .TP .B \-\-sslproto <name> (Keyword: sslproto) -Forces an SSL or TLS protocol. Possible values are '\fBSSL2\fR', -\&'\fBSSL3\fR', '\fBSSL23\fR', and '\fBTLS1\fR'. Try this if the default +Forces an SSL or TLS protocol. Possible values are '\fBssl2\fR', +\&'\fBssl3\fR', '\fBssl23\fR', and '\fBtls1\fR'. Try this if the default handshake does not work for your server. Use this option with -'\fBTLS1\fR' to enforce a TLS connection. To defeat opportunistic TLSv1 +'\fBtls1\fR' to enforce a TLS connection. To defeat opportunistic TLSv1 negotiation when the server advertises STARTTLS or STLS, use \fB''\fR. This option, even if the argument is the empty string, will also suppress the diagnostic 'SERVER: opportunistic upgrade to TLS.' message
pgpUFbbuUNR7E.pgp
Description: PGP signature

