1 .\" Copyright (c) 2001 - 2003 Kungliga Tekniska Högskolan
2 .\" (Royal Institute of Technology, Stockholm, Sweden).
3 .\" All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
12 .\" 2. Redistributions in binary form must reproduce the above copyright
13 .\" notice, this list of conditions and the following disclaimer in the
14 .\" documentation and/or other materials provided with the distribution.
16 .\" 3. Neither the name of the Institute nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" $Id: popper.8,v 1.10 2003/04/16 20:49:54 lha Exp $
44 .Op Fl a Ar none Ns \*(Ba Ns otp
50 .Op Fl -address-log= Ns Pa file
53 serves mail via the Post Office Protocol. Supported options include:
56 .Fl a Ar none Ns \*(Ba Ns otp ,
57 .Fl -auth-mode= Ns Ar none Ns \*(Ba Ns otp
61 what authentication modes are acceptable, passing
63 disables clear text passwords. Otp doesn't disable Kerberos
64 authentication, only cleartext passwords.
66 .Fl -address-log= Ns Pa file
68 logs the addresses of all clients to the specified file
73 enables more verbose log messages
78 when not started by inetd, this flag tells
80 that it has to create a socket by itself
87 to use the Kerberos for authentication.
92 port to listen to, in combination with
96 .Fl -trace-file= Ns Ar file
98 trace all commands to file
101 .Fl -timeout= Ns Ar seconds
103 set timeout to something other than the default of 120 seconds
113 RFC1939 (Post Office Protocol - Version 3)
114 .\" RFC2449 (POP3 Extension Mechanism)
117 The server was initially developed at the University of California,
120 Many changes have been made as part of the KTH Kerberos distributions.