I think you're making things difficult for yourself by not doing everything under Plan 9. I just tried following the hints in tlssrv(8), pop3(8) and rsa(8) -- here's the transcript: On the server (vt310): term% auth/rsagen -t 'service=tls' >key term% auth/rsa2x509 'C=UK CN=*.hamnavoe.com' key | auth/pemencode CERTIFICATE >cert term% cat key >/mnt/factotum/ctl term% cp cert /sys/lib/tls/imap.pem term% cat >/bin/service.auth/tcp993 <[2]/sys/log/imap4d EOF term% chmod +x /bin/service.auth/tcp993 term% passwd Plan 9 Password: ******** change Plan 9 Password? (y/n) n change Inferno/POP password? (y/n) y make it the same as your plan 9 password? (y/n) y term% Note that if vt310 was not already running as an auth server, I would also have had to start auth/keyfs and 'aux/listen -t /bin/service.auth tcp' (before changing my POP password). On the client: term% upas/fs -f/imaps/vt310/miller upas/fs: server certificate 2DE3574F53CB87FFDBF1068CFA27B8D48586B37B not recognized term% cat <>/sys/lib/tls/mail x509 sha1=2DE3574F53CB87FFDBF1068CFA27B8D48586B37B vt310 EOF term% upas/fs -f/imaps/vt310/miller !Adding key: proto=pass server=vt310 service=imap user=miller password: ******** ! term% mail 10 messages : term% So it seems to have found the mailbox. Then I tried setting up an IMAP account on my iMac mail.app to fetch from vt310, ticking the 'Use SSL' box in the Accounts>Advanced dialogue. That works too, except for giving a warning message "... The root certificate for this server could not be verified ... Would you like to continue anyway?" I don't know if there's a way to silence this message other than getting your certificate signed by a reputable CA. -- Richard