📄 readme.ssl
字号:
IMAP/SSL in mutt ================Compilation-----------If you want to have SSL support in mutt, you need to install OpenSSL(http://www.openssl.org) libraries and headers before compiling.OpenSSL versions 0.9.3 through 0.9.6a have been tested.For SSL support to be enabled, you need to run the ``configure''script with ``--enable-imap --with-ssl[=PFX]'' parameters. If theOpenSSL headers and libraries are not in the default system searchpaths (usually /usr/include and /usr/lib) you can use the optional PFXargument to define the root directory of your installation. Thelibraries are then expected to be found in PFX/lib and headers inPFX/include/openssl.Usage-----IMAP/SSL folders can be accessed just like normal IMAP folders, but youwill also have to add '/ssl' before the closing curly brace. Or you canuse IMAP url notation, where the methods is called imaps.For example: mailboxes {localhost/ssl}inbox mailboxes {localhost:994/ssl}inboxor mailboxes imaps://localhost/inbox mailboxes imaps://localhost:994/inboxIf you get errors about lack of entropy, it means that Mutt was unableto find a source of random data to initialize SSL library with. Shouldthis happen, you need to generate the data yourself and save it in afile pointed by $entropy_file or $RANDFILE (environment) variables orin ~/.rnd.One way to generate random data would be to run a command whichgenerates unpredictable output, for example 'ps aluxww' in Linux, andcalculating the MD5-sum from the output and saving it in a file.** Note: The contents of the file pointed by $RANDFILE environment** variable (or ~/.rnd if unset) will be overwritten every time Mutt ** is run so don't put anything you can't afford to lose in that file.The files Mutt will try to use to initialize SSL library with are filespointed by $entropy_file and $RANDFILE (or ~/.rnd if unset.) If yourOpenSSL is version 0.9.5 or later, the previous files can also be EGDsockets (see http://www.lothar.com/tech/crypto/ for more informationabout Entropy Gathering Daemon) and in addition sockets in the followingplaces are tried: socket pointed by $EGDSOCKET environment variable,~/.entropy and /tmp/entropy.All the files and sockets mentioned above must be owned by the user andhave permissions of 600.Certificates------------Each time a server is contacted, its certificate is checked againstknown valid certificates. When an unknown certificate is encountered,you are asked to verify it. If you reject the certificate, theconnection will be terminated immediately. If you accept thecertificate, the connection will be established. Accepted certificatescan also be saved so that further connections to the server areautomatically accepted. If your organization has several equivalent IMAP-servers, each of themshould have a unique certificate which is signed with a commoncertificate. If you want to use all of those servers, you don't need tosave each server certificate on the first connect. Instead, you can getthe signer certificate and save it instead. That way, mutt willautomatically accept all certificates signed with the saved certificate.System-wide certificates are by default considered trusted when checkingcertificates by signer. This allows system administrators to setuptrusted certificates for all users. How to install certificatessystem-wide, depends on the OpenSSL installation. Use of system-widecertificates can be disabled by unsetting $ssl_usesystemcerts variable.Certificates will be saved in the file specified by $certificate_filevariable. It is empty as default, so if you don't want to verifycertificates each time you connect to a server, you have set thisvariable to some reasonable value.For example: set certificate_file=~/.mutt/certificatesTroubleshooting---------------If after doing the above, you are unable to successfully connect, itis likely that your IMAP server does not support one of the SSL protocols.There exist three different protocols, TLSv1, SSLv2, and SSLv3. To checkeach of these, you use the following: openssl s_client -host <imap server> -port <port> -verify -debug -no_tls1 openssl s_client -host <imap server> -port <port> -verify -debug -no_ssl2 openssl s_client -host <imap server> -port <port> -verify -debug -no_ssl3You can also combine the options until you get a successfull connect. Onceyou know which options do not work, you can set the variables for non-workingprotocols to know. The variables for the protocols are ssl_use_tlsv1, ssl_use_sslv2, and ssl_use_sslv3.-- Tommi KomulainenTommi.Komulainen@iki.fiUpdated by Jeremy Katzkatzj@linuxpower.org
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -