Next: Implementation details
Up: Characteristics of a POP3
Previous: Commands implemented
  Contents
- RPOP will be denied, as it is based on the presence of the .rhosts
and hosts.equiv files, an obsolete and insecure authentication method
which often leads to security compromises.
- NOOP can safely be implemented in the wrapper and never reach the server.
The wrapper will send a positive answer to the client.
Gunnar Wolf
2001-03-12