Hi,
attached patch fixes Debian bug
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421446
Kind regards
Nico

-- 
Nico Golde - http://ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
--- fetchmail.man	2007-04-08 14:52:42.000000000 +0200
+++ fetchmail.man.new	2007-04-29 16:59:30.000000000 +0200
@@ -408,10 +408,10 @@
 .TP
 .B \-\-sslproto <name>
 (Keyword: sslproto)
-Forces an SSL or TLS protocol. Possible values are '\fBSSL2\fR',
-\&'\fBSSL3\fR', '\fBSSL23\fR', and '\fBTLS1\fR'. Try this if the default
+Forces an SSL or TLS protocol. Possible values are '\fBssl2\fR',
+\&'\fBssl3\fR', '\fBssl23\fR', and '\fBtls1\fR'. Try this if the default
 handshake does not work for your server. Use this option with
-'\fBTLS1\fR' to enforce a TLS connection. To defeat opportunistic TLSv1
+'\fBtls1\fR' to enforce a TLS connection. To defeat opportunistic TLSv1
 negotiation when the server advertises STARTTLS or STLS, use \fB''\fR.
 This option, even if the argument is the empty string, will also
 suppress the diagnostic 'SERVER: opportunistic upgrade to TLS.' message

Attachment: pgpUFbbuUNR7E.pgp
Description: PGP signature

Reply via email to