1 .TH MSGCHK %manext1% "August 14, 2016" "%nmhversion%"
6 msgchk \- check for messages
11 .RB [ \-date " | " \-nodate ]
34 program checks all known mail drops for mail waiting
35 for you. For those drops which have mail for you,
38 indicate if it believes that you have seen the mail in question before.
43 switch indicates under what circumstances
45 should produce a message. The default is
50 should always report the status of the
51 users maildrop. Other values for `type' include `mail' which says that
53 should report the status of waiting mail; and, `nomail'
56 should report the status of empty maildrops.
60 switch has the inverted sense, so
65 to never report the status of
66 maildrops. This is useful if the user wishes to check
68 exit status. A non\-zero exit status indicates that mail was
70 waiting for at least one of the indicated users.
74 produces output, then the
78 to print out the last date mail was read, if this can
82 will normally check all the local mail drops, but if
83 the option \*(lqpophost:\*(rq is set in the mts configuration file
84 \*(lqmts.conf\*(rq, or if the
89 will query this POP service host as to the status of
92 To specify a username for authentication with the POP server, use the
95 switch. The credentials profile entry in the mh\-profile(5) man page
96 describes the ways to supply a username and password.
98 For debugging purposes, there is also a switch
101 allow you to watch the POP transaction take place between you and the
103 .B \-saslmech xoauth2
104 is used, the HTTP transaction is also shown.
108 has been compiled with SASL support, the
111 the use of SASL authentication. Depending on the SASL mechanism used, this
112 may require an additional password prompt from the user (but the
114 file can be used to store this password, as described in the
115 mh-profile(5) man page). The
117 switch can be used to select a particular SASL mechanism.
119 If SASL authentication is successful,
121 will attempt to negotiate
122 a security layer for session encryption. Encrypted traffic is labelled
123 with `(encrypted)' and `(decrypted)' when viewing the POP transaction
128 man page description of
130 for its other features.
134 has been compiled with OAuth support, the
135 .B \-saslmech xoauth2
136 switch will enable OAuth authentication. The
138 switch must be used, and the
140 must be an email address the user has for the service, which must
141 be specified with the
144 switch. Before using this, the user must authorize nmh by running
146 and grant authorization to that account. See the
148 man page for more details.
150 Gmail only supports POP3 over TLS, but
152 has no TLS support. To work around this, use something like
153 .B -proxy 'openssl s_client -connect %h:995 -CAfile /etc/ssl/certs/ca-certificates.crt -quiet'
157 .ta \w'%nmhetcdir%/ExtraBigFileName 'u
158 ^$HOME/\&.mh\(ruprofile~^The user profile
159 ^%nmhetcdir%/mts.conf~^nmh mts configuration file
160 ^%mailspool%/$USER~^Location of mail drop
162 .SH "PROFILE COMPONENTS"
166 .ta \w'ExtraBigProfileName 'u
175 .RB ` user "' defaults to the current user"
177 .RB ` "\-notify\ all" '