1 .TH MSGCHK %manext1% "March 23, 2016" "%nmhversion%"
6 msgchk \- check for messages
11 .RB [ \-date " | " \-nodate ]
34 program checks all known mail drops for mail waiting
35 for you. For those drops which have mail for you,
38 indicate if it believes that you have seen the mail in question before.
43 switch indicates under what circumstances
45 should produce a message. The default is
50 should always report the status of the
51 users maildrop. Other values for `type' include `mail' which says that
53 should report the status of waiting mail; and, `nomail'
56 should report the status of empty maildrops.
60 switch has the inverted sense, so
65 to never report the status of
66 maildrops. This is useful if the user wishes to check
68 exit status. A non\-zero exit status indicates that mail was
70 waiting for at least one of the indicated users.
74 produces output, then the
78 to print out the last date mail was read, if this can
82 will normally check all the local mail drops, but if
83 the option \*(lqpophost:\*(rq is set in the mts configuration file
84 \*(lqmts.conf\*(rq, or if the
89 will query this POP service host as to the status of
92 To specify a username for authentication with the POP server, use the
95 switch. The credentials profile entry in the mh\-profile(5) man page
96 describes the ways to supply a username and password.
98 For debugging purposes, there is also a switch
101 allow you to watch the POP transaction take place between you and the
103 .B \-saslmech xoauth2
104 is used, the HTTP transaction is also shown.
108 has been compiled with SASL support, the
111 the use of SASL authentication. Depending on the SASL mechanism used, this
112 may require an additional password prompt from the user (but the
114 file can be used to store this password, as described in the
115 mh-profile(5) man page). The
117 switch can be used to select a particular SASL mechanism.
119 If SASL authentication is successful,
121 will attempt to negotiate
122 a security layer for session encryption. Encrypted traffic is labelled
123 with `(encrypted)' and `(decrypted)' when viewing the POP transaction
130 has been compiled with OAuth support, the
131 .B \-saslmech xoauth2
132 switch will enable OAuth authentication. The
134 switch must be used, and the
136 must be an email address the user has for the service, which must
137 be specified with the
140 switch. Before using this, the user must authorize nmh by running
142 and grant authorization to that account. See the
144 man page for more details.
146 Gmail only supports POP3 over TLS, but
148 has no TLS support. To work around this, use something like
149 .B -proxy 'openssl s_client -connect %h:995 -CAfile /etc/ssl/certs/ca-certificates.crt -quiet'
153 .ta \w'%nmhetcdir%/ExtraBigFileName 'u
154 ^$HOME/\&.mh\(ruprofile~^The user profile
155 ^%nmhetcdir%/mts.conf~^nmh mts configuration file
156 ^%mailspool%/$USER~^Location of mail drop
158 .SH "PROFILE COMPONENTS"
162 .ta \w'ExtraBigProfileName 'u
170 .RB ` user "' defaults to the current user"
172 .RB ` "\-notify\ all" '