We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
This would reduce the impact of PLAIN-only authentication a bit.
PLAIN
Possible approach that I took in my toy server:
cert, err := tls.LoadX509KeyPair("/tmp/goimapd.crt", "/tmp/goimapd.key") if err != nil { fmt.Printf("loadkeys: %s\n", err) textconn.PrintfLine("%s BAD Sorry, server-side problem loading certs.", tag, cmd) return } tlsconfig := &tls.Config{ Certificates: []tls.Certificate{cert}, } textconn.PrintfLine("%s OK STARTTLS commencing.", tag) conn = tls.Server(conn, tlsconfig) textconn = textproto.NewConn(conn)
It looks like a similar approach could be implemented in imap-server, too: the STARTTLS command could replace c.Rwc with an instance of tls.Server.
STARTTLS
c.Rwc
tls.Server
The text was updated successfully, but these errors were encountered:
No branches or pull requests
This would reduce the impact of
PLAIN
-only authentication a bit.Possible approach that I took in my toy server:
It looks like a similar approach could be implemented in imap-server, too: the
STARTTLS
command could replacec.Rwc
with an instance oftls.Server
.The text was updated successfully, but these errors were encountered: