-2009-01-10 21:43 -0800 Brendan Cully <brendan@kublai.com> (aa069968e4d5)
+2009-01-10 22:09 -0800 Brendan Cully <brendan@kublai.com> (db3a61fcde35)
+
+ * imap/util.c: Assume INBOX for ""/NULL in imap_mxcmp
+
+ * imap/util.c: Use known connection delimiter in imap_expand_path
* imap/util.c: Guard against NULL pointers in imap_mxcmp
The keys used are:
!: modified feature, -: deleted feature, +: new feature
+hg tip:
+ + $ssl_verify_hostname controls whether mutt will accept certificates whose
+ host names do not match the host name in the folder URL.
+
1.5.19 (2009-01-05):
+ support for SSL certificate chains
** advertising the capability. When \fIunset\fP, mutt will not attempt to
** use \fCSTARTTLS\fP regardless of the server's capabilities.
*/
+ { "ssl_verify_host", DT_BOOL, R_NONE, OPTSSLVERIFYHOST, M_YES },
+ /*
+ ** .pp
+ ** If \fIset\fP (the default), mutt will not automatically accept a server
+ ** certificate whose host name does not match the host used in your folder
+ ** URL. You should only unset this for particular known hosts, using
+ ** the \fC$<account-hook>\fP function.
+ */
{ "certificate_file", DT_PATH, R_NONE, UL &SslCertFile, UL "~/.mutt_certificates" },
/*
** .pp
OPTSSLV3,
OPTTLSV1,
OPTSSLFORCETLS,
+ OPTSSLVERIFYHOST,
#endif /* defined(USE_SSL) */
OPTIMPLICITAUTOVIEW,
OPTINCLUDEONLYFIRST,
}
buf[0] = 0;
- if (!check_host (cert, conn->account.host, buf, sizeof (buf)))
+ if (option (OPTSSLVERIFYHOST) != M_NO)
{
- mutt_error (_("Certificate host check failed: %s"), buf);
- mutt_sleep (2);
- return -1;
+ if (!check_host (cert, conn->account.host, buf, sizeof (buf)))
+ {
+ mutt_error (_("Certificate host check failed: %s"), buf);
+ mutt_sleep (2);
+ return -1;
+ }
+ dprint (2, (debugfile, "ssl_check_preauth: hostname check passed\n"));
}
- dprint (2, (debugfile, "ssl_check_preauth: hostname check passed\n"));
if (check_certificate_by_signer (cert))
{
if (!idx)
{
if (!gnutls_x509_crt_check_hostname (cert, hostname) &&
- !tls_check_stored_hostname (certdata, hostname))
+ !tls_check_stored_hostname (certdata, hostname) &&
+ option (OPTSSLVERIFYHOST) != M_NO)
certerr_hostname = 1;
}