I haven't been able to get the pop3 debug logging to work. Maybe one of the developers could try to add another account with a pop connection to verizon from a fully patched 18.04 machine? The verizon.net settings are:
Server: pop.verizon.net
Port: 995
Encryption method: TLS on a dedicated port
Authentication: password
The Evolution wiki has instructions on debugging the mail backends. I tried to follow the instructions for pop3 but the logfile created had a length of 0. I tried to cut and paste from the wiki into a terminal to make sure there aren't any typos but had the same result. I noticed later on that page there is an all option. That worked but the entries were mostly imapx or DB. I couldn't find any pop logs or anything with TLS. Here is the link to the directions: https://wiki.gnome.org/Apps/Evolution/Debugging
Wireshark shows a TLS connection made to pop.verizon.net (66.218.85.35). I can see the server cert chain. Towards the end of the connection there is a small amount of data returned by the server to which the client responds with a reset.
Let me know if there are any other logs I can collect, anything else to try on my end or if there is any other information you need to duplicate the issue.
I haven't been able to get the pop3 debug logging to work. Maybe one of the developers could try to add another account with a pop connection to verizon from a fully patched 18.04 machine? The verizon.net settings are:
Server: pop.verizon.net
Port: 995
Encryption method: TLS on a dedicated port
Authentication: password
The Evolution wiki has instructions on debugging the mail backends. I tried to follow the instructions for pop3 but the logfile created had a length of 0. I tried to cut and paste from the wiki into a terminal to make sure there aren't any typos but had the same result. I noticed later on that page there is an all option. That worked but the entries were mostly imapx or DB. I couldn't find any pop logs or anything with TLS. Here is the link to the directions: /wiki.gnome. org/Apps/ Evolution/ Debugging
https:/
Wireshark shows a TLS connection made to pop.verizon.net (66.218.85.35). I can see the server cert chain. Towards the end of the connection there is a small amount of data returned by the server to which the client responds with a reset.
Let me know if there are any other logs I can collect, anything else to try on my end or if there is any other information you need to duplicate the issue.