Do you trust your isp? Do you trust your mail server's ISP? Do you trust your isp's
isp? Do you trust echelon's ability to trace every packet that is transmitted, even
between my local server and my local workstation?
This email does not contain the following words:
terrorism, attack, drugs, terrorist, antigovernment, revolution, manifesto, revolt..
On Wed, Apr 25, 2001 at 09:49:02AM -0700, Rob Hudson wrote:
> That works. :)
>
> Should it be a concern? Seems like Stallman thinks one shouldn't
> worry about it. Seems to me it is equivalent to telnetting, which is
> considered bad b/c everything is in the clear.
>
> -Rob
>
> > On 20010425.0936, jakob said ...
> >
> > On Wed, 25 Apr 2001, Rob Hudson wrote:
> > > I'm just polling for what options are available for using fetchmail
> > > w/o sending the password in the clear.
> > >
> > > I'm using fetchmail on a Linux machine, and asking for the mail via a
> > > POP protocol on a FreeBSD machine.
> >
> > Read the excellent Secure POP via SSH Mini-HOWTO, located at:
> > http://www.linuxdoc.org/HOWTO/mini/Secure-POP+SSH.html
> >
> > It includes information on doing it in several POP3 situations, including
> > fetchmail.
> >
> > In short, for general use run:
> > ssh -C -f popserver -L 31337:popserver:110 sleep 5
> >
> > -C enables compression
> > -f once established, fork to background
> > -L forward local port 31337 to port 110 on remote server (popserver). Use
> > a high local port, so any user can create a socket (>1024)
> >
> > sleep 5 - sleep 5 seconds, I usually like to bump this up to 8 hours or
> > so, so I can have my tunnel all day long
> >
> > hope this helps!
> > jakob
> >