X-Git-Url: https://diplodocus.org/git/nmh/blobdiff_plain/b347135ed8e4c15c6562d7b3d7924bd9ef7f1589..8374c3c:/man/send.man?ds=inline diff --git a/man/send.man b/man/send.man index f568d991..757eaced 100644 --- a/man/send.man +++ b/man/send.man @@ -1,13 +1,15 @@ .\" .\" %nmhwarning% .\" -.TH SEND %manext1% "July 8, 2016" "%nmhversion%" +.TH SEND %manext1% "October 10, 2016" "%nmhversion%" .SH NAME send \- send a message .SH SYNOPSIS .HP 5 .na .B send +.RB [ \-help ] +.RB [ \-version ] .RB [ \-alias .IR aliasfile ] .RB [ \-draft ] @@ -40,10 +42,10 @@ send \- send a message .IR port-name/number ] .RB [ \-sasl ] .RB [ \-nosasl ] -.RB [ \-saslmaxssf -.IR ssf ] .RB [ \-saslmech .IR mechanism ] +.RB [ \-authservice +.IR service ] .RB [ \-snoop ] .RB [ \-user .IR username ] @@ -54,8 +56,6 @@ send \- send a message .IR columns ] .RB [ file \&...] -.RB [ \-version ] -.RB [ \-help ] .ad .SH DESCRIPTION .B Send @@ -263,7 +263,7 @@ If a \*(lqDcc:\*(rq field is encountered and the mail transport method is not in use, its addresses will be used for delivery, and the \*(lqDcc:\*(rq field will be removed from the message. The blind recipients will receive the same message sent to the sighted -recipients. *WARNING* Recipients listed in the \*(lqDcc:\*(rq field receive no +recipients. *WARNING* Recipients listed in the \*(lqDcc:\*(rq field receive no explicit indication that they have received a \*(lqblind copy\*(rq. This can cause blind recipients to inadvertently reply to all of the sighted recipients of the @@ -388,7 +388,9 @@ entry). The .B \-snoop switch can be used to view the SMTP transaction. (Beware that the SMTP transaction may contain authentication information either in -plaintext or easily decoded base64.) +plaintext or easily decoded base64.) If +.B \-sasl \-saslmech xoauth2 +is used, the HTTP transaction is also shown. .PP If .B nmh @@ -418,11 +420,32 @@ will attempt to negotiate a security layer for session encryption. Encrypted data is labelled with `(encrypted)' and `(decrypted)' when viewing the SMTP transaction with the .B \-snoop -switch. The -.B \-saslmaxssf -switch can be used to select the maximum value of the Security Strength Factor. -This is an integer value and the exact meaning of this value depends on the -underlying SASL mechanism. A value of 0 disables encryption. +switch; see the +.B post +man page description of +.B \-snoop +for its other features. +.PP +If +.B nmh +has been compiled with OAuth support, the +.B \-sasl +and +.B \-saslmech xoauth2 +switches will enable OAuth authentication. The +.B \-user +switch must be used, and the +.I username +must be an email address the user has for the service, which must +be specified with the +.B \-authservice +.I service +switch. Before using OAuth authentication, the user must authorize nmh by +running +.B mhlogin +and grant authorization to that account. See the +.IR mhlogin (1) +man page for more details. .PP If .B nmh @@ -441,7 +464,11 @@ taken place, before any SMTP commands are sent or received. Encrypted data is labelled with `(tls-encrypted)' and `(tls-decrypted)' when viewing the SMTP transction with the .B \-snoop -switch. +switch; see the +.B post +man page description of +.B \-snoop +for its other features. The .B \-notls switch will disable all attempts to negotiate TLS. @@ -493,7 +520,7 @@ Here is an example profile entry using OAuth for an account hosted by gmail: .PP .nf .RS 5 -sendfrom-gmail_address@example.com: -saslmech xoauth2 +sendfrom-gmail_address@example.com: -sasl -saslmech xoauth2 .RS 5 -authservice gmail -tls -server smtp.gmail.com -user gmail_login@example.com @@ -581,6 +608,7 @@ man page for login credentials. .IR forw (1), .IR mhbuild (1), .IR mhparam (1), +.IR mhlogin (1), .IR repl (1), .IR whatnow (1), .IR mh\-alias (5),