X-Git-Url: https://diplodocus.org/git/nmh/blobdiff_plain/23e9ccce9de7e5190c2ea7dda03e54ece5b5a3da..9f8418e870a70c264eda1598f2d470e5428c216d:/man/send.man?ds=sidebyside diff --git a/man/send.man b/man/send.man index 87c2cfd2..757eaced 100644 --- a/man/send.man +++ b/man/send.man @@ -1,13 +1,15 @@ .\" .\" %nmhwarning% .\" -.TH SEND %manext1% "August 14, 2016" "%nmhversion%" +.TH SEND %manext1% "October 10, 2016" "%nmhversion%" .SH NAME send \- send a message .SH SYNOPSIS .HP 5 .na .B send +.RB [ \-help ] +.RB [ \-version ] .RB [ \-alias .IR aliasfile ] .RB [ \-draft ] @@ -40,10 +42,10 @@ send \- send a message .IR port-name/number ] .RB [ \-sasl ] .RB [ \-nosasl ] -.RB [ \-saslmaxssf -.IR ssf ] .RB [ \-saslmech .IR mechanism ] +.RB [ \-authservice +.IR service ] .RB [ \-snoop ] .RB [ \-user .IR username ] @@ -54,8 +56,6 @@ send \- send a message .IR columns ] .RB [ file \&...] -.RB [ \-version ] -.RB [ \-help ] .ad .SH DESCRIPTION .B Send @@ -263,7 +263,7 @@ If a \*(lqDcc:\*(rq field is encountered and the mail transport method is not in use, its addresses will be used for delivery, and the \*(lqDcc:\*(rq field will be removed from the message. The blind recipients will receive the same message sent to the sighted -recipients. *WARNING* Recipients listed in the \*(lqDcc:\*(rq field receive no +recipients. *WARNING* Recipients listed in the \*(lqDcc:\*(rq field receive no explicit indication that they have received a \*(lqblind copy\*(rq. This can cause blind recipients to inadvertently reply to all of the sighted recipients of the @@ -388,7 +388,9 @@ entry). The .B \-snoop switch can be used to view the SMTP transaction. (Beware that the SMTP transaction may contain authentication information either in -plaintext or easily decoded base64.) +plaintext or easily decoded base64.) If +.B \-sasl \-saslmech xoauth2 +is used, the HTTP transaction is also shown. .PP If .B nmh @@ -423,11 +425,27 @@ switch; see the man page description of .B \-snoop for its other features. -The -.B \-saslmaxssf -switch can be used to select the maximum value of the Security Strength Factor. -This is an integer value and the exact meaning of this value depends on the -underlying SASL mechanism. A value of 0 disables encryption. +.PP +If +.B nmh +has been compiled with OAuth support, the +.B \-sasl +and +.B \-saslmech xoauth2 +switches will enable OAuth authentication. The +.B \-user +switch must be used, and the +.I username +must be an email address the user has for the service, which must +be specified with the +.B \-authservice +.I service +switch. Before using OAuth authentication, the user must authorize nmh by +running +.B mhlogin +and grant authorization to that account. See the +.IR mhlogin (1) +man page for more details. .PP If .B nmh @@ -502,7 +520,7 @@ Here is an example profile entry using OAuth for an account hosted by gmail: .PP .nf .RS 5 -sendfrom-gmail_address@example.com: -saslmech xoauth2 +sendfrom-gmail_address@example.com: -sasl -saslmech xoauth2 .RS 5 -authservice gmail -tls -server smtp.gmail.com -user gmail_login@example.com @@ -590,6 +608,7 @@ man page for login credentials. .IR forw (1), .IR mhbuild (1), .IR mhparam (1), +.IR mhlogin (1), .IR repl (1), .IR whatnow (1), .IR mh\-alias (5),