1 .TH MSGCHK %manext1% 2016-11-02 "%nmhversion%"
6 msgchk \- check for messages
13 .RB [ \-date " | " \-nodate ]
22 .RB [ \-sasl " | " \-nosasl ]
27 .RB [ \-certverify " | " \-nocertverify ]
37 program checks all known mail drops for mail waiting
38 for you. For those drops which have mail for you,
41 indicate if it believes that you have seen the mail in question before.
46 switch indicates under what circumstances
48 should produce a message. The default is
53 should always report the status of the
54 users mail drop. Other values for `type' include `mail' which says that
56 should report the status of waiting mail; and, `nomail'
59 should report the status of empty mail drops.
63 switch has the inverted sense, so
68 to never report the status of
69 mail drops. This is useful if the user wishes to check
71 exit status. A non-zero exit status indicates that mail was
73 waiting for at least one of the indicated users.
77 produces output, then the
81 to print out the last date mail was read, if this can
85 will normally check all the local mail drops, but if
86 the option \*(lqpophost:\*(rq is set in the mts configuration file
87 \*(lqmts.conf\*(rq, or if the
92 will query this POP service host as to the status of
95 To specify a username for authentication with the POP server, use the
98 switch. The credentials profile entry in the mh\-profile(5) man page
99 describes the ways to supply a username and password.
101 For debugging purposes, there is also a switch
104 allow you to watch the POP transaction take place between you and the
106 .B \-sasl \-saslmech xoauth2
107 is used, the HTTP transaction is also shown.
111 has been compiled with SASL support, the
114 the use of SASL authentication. Depending on the SASL mechanism used, this
115 may require an additional password prompt from the user (but the
117 file can be used to store this password, as described in the
118 mh-profile(5) man page). The
120 switch can be used to select a particular SASL mechanism.
122 If SASL authentication is successful,
124 will attempt to negotiate
125 a security layer for session encryption. Encrypted traffic is labelled
126 with `(encrypted)' and `(decrypted)' when viewing the POP transaction
131 man page description of
133 for its other features.
137 has been compiled with OAuth support, the
138 .B \-sasl \-saslmech xoauth2
139 switch will enable OAuth authentication. The
141 switch must be used, and the
143 must be an email address the user has for the service, which must
144 be specified with the
147 switch. Before using this, the user must authorize nmh by running
149 and grant authorization to that account. See the
151 man page for more details.
155 has been compiled with TLS support, the
157 switch will require the negotiation of TLS when connecting
158 to the remote POP server. The
160 switch will negotiate TLS immediately after the connection has taken place,
161 before any POP commands are sent or received. Data encrypted by TLS is
162 labeled `(tls-encrypted)' and `(tls-decrypted)` with viewing the POP
167 switch will disable all attempts to negotiate TLS.
169 When using TLS the default is to verify the remote certificate and SubjectName
170 against the local trusted certificate store. This can be controlled by
175 switches. See your OpenSSL documentation for more information on certificate
180 .ta \w'%nmhetcdir%/ExtraBigFileName 'u
181 ^$HOME/.mh_profile~^The user profile
182 ^%nmhetcdir%/mts.conf~^nmh mts configuration file
183 ^%mailspool%/$USER~^Location of mail drop
185 .SH "PROFILE COMPONENTS"
189 .ta \w'ExtraBigProfileName 'u
198 .RB ` user "' defaults to the current user"
200 .RB ` "\-notify\ all" '