1 .TH MSGCHK %manext1% 2016-11-02 "%nmhversion%"
6 msgchk \- nmh's check for incoming email
13 .RB [ \-date " | " \-nodate ]
22 .RB [ \-sasl " | " \-nosasl ]
27 .RB [ \-certverify " | " \-nocertverify ]
37 program checks all known mail drops for mail waiting
38 for you. For those drops which have mail for you,
41 indicate if it believes that you have seen the mail in question before.
46 switch indicates under what circumstances
48 should produce a message. The default is
53 should always report the status of the
54 users mail drop. Other values for `type' include `mail' which says that
56 should report the status of waiting mail; and, `nomail'
59 should report the status of empty mail drops.
63 switch has the inverted sense, so
68 to never report the status of
69 mail drops. This is useful if the user wishes to check
71 exit status. A non-zero exit status indicates that mail was
73 waiting for at least one of the indicated users.
77 produces output, then the
81 to print out the last date mail was read, if this can
85 will normally check all the local mail drops, but if
86 the option \*(lqpophost:\*(rq is set in the mts configuration file
87 \*(lqmts.conf\*(rq, or if the
92 will query this POP service host as to the status of
95 To specify a username for authentication with the POP server, use the
98 switch. The credentials profile entry in
100 describes the ways to supply a username and password.
102 For debugging purposes, there is also a switch
105 allow you to watch the POP transaction take place between you and the
107 .B \-sasl \-saslmech xoauth2
108 is used, the HTTP transaction is also shown.
112 has been compiled with SASL support, the
115 the use of SASL authentication. Depending on the SASL mechanism used, this
116 may require an additional password prompt from the user (but the
118 file can be used to store this password, as described in
122 switch can be used to select a particular SASL mechanism.
124 If SASL authentication is successful,
126 will attempt to negotiate
127 a security layer for session encryption. Encrypted traffic is labelled
128 with `(encrypted)' and `(decrypted)' when viewing the POP transaction
135 for its other features.
139 has been compiled with OAuth support, the
140 .B \-sasl \-saslmech xoauth2
141 switch will enable OAuth authentication. The
143 switch must be used, and the
145 must be an email address the user has for the service, which must
146 be specified with the
149 switch. Before using this, the user must authorize nmh by running
151 and grant authorization to that account. See
157 has been compiled with TLS support, the
159 switch will require the negotiation of TLS when connecting
160 to the remote POP server. The
162 switch will negotiate TLS immediately after the connection has taken place,
163 before any POP commands are sent or received. Data encrypted by TLS is
164 labeled `(tls-encrypted)' and `(tls-decrypted)` with viewing the POP
169 switch will disable all attempts to negotiate TLS.
171 When using TLS the default is to verify the remote certificate and SubjectName
172 against the local trusted certificate store. This can be controlled by
177 switches. See your OpenSSL documentation for more information on certificate
182 .ta \w'%nmhetcdir%/ExtraBigFileName 'u
183 ^$HOME/.mh_profile~^The user profile
184 ^%nmhetcdir%/mts.conf~^nmh mts configuration file
185 ^%mailspool%/$USER~^Location of mail drop
187 .SH "PROFILE COMPONENTS"
191 .ta \w'ExtraBigProfileName 'u
200 .RB ` user "' defaults to the current user"
202 .RB ` "\-notify\ all" '