From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on dcvr.yhbt.net X-Spam-Level: X-Spam-ASN: X-Spam-Status: No, score=-4.2 required=3.0 tests=ALL_TRUSTED,AWL,BAYES_00, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF shortcircuit=no autolearn=ham autolearn_force=no version=3.4.6 Received: from localhost (dcvr.yhbt.net [127.0.0.1]) by dcvr.yhbt.net (Postfix) with ESMTP id 2B7E51F55F for ; Tue, 3 Oct 2023 07:11:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=80x24.org; s=selector1; t=1696317071; bh=U5LnUZuGLhbCNnBmwrANaiFBkgDnsSgcjKABOi6XqoA=; h=Date:From:To:Subject:References:In-Reply-To:From; b=45SnPhfutF49v5PwFGFX2Fl/lEdVbkxdUPGX91X77vguxQozaPhU/AEd5faQYD6R4 8C8i67zumXX5F7PZw6rJjdh3SMbNFIaQWIuSTgKJ7PnCwhleVTIjeUOc9uFHKZOZ8J Tgj7Y17i36UMaD+/FhxJ/SqdiF0sH/chZUaUR8eM= Date: Tue, 3 Oct 2023 07:11:11 +0000 From: Eric Wong To: meta@public-inbox.org Subject: "SSL" in option names is weird in 2023 Message-ID: <20231003071111.M70227@dcvr> References: <20231003064352.2902298-1-e@80x24.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20231003064352.2902298-1-e@80x24.org> List-Id: Eric Wong wrote: > net_reader: support imap.sslVerify + nntp.sslVerify It still feels awkward to name options with "SSL" in them since "Secure Sockets Layer" is long deprecated (in favor of "TLS", "Transport Layer Security"). But git already has imap.sslVerify, so it's not something I want to deviate from... git also has a lot of http.ssl* config options, too, which we might benefit from having NNTP/IMAP counterparts of... OpenSSL, IO::Socket::SSL and Net::SSLeay are still called what they are; and AFAIK nobody's worked on GnuTLS bindings for Perl, yet... So I guess we'll probably end up with a bunch of imap.ssl* and nntp.ssl* options to set ciphers, certs, keys and whatnot... Of course I don't trust myself to handle anything involving SSL/TLS properly :<