??????? Original Message ??????? On Tuesday, July 2, 2019 6:21 PM, Aki Tuomi <aki.tuomi at open-xchange.com> wrote:> Hi, you need to escape % with %%. We are aware of a bug affecting when % comes in from some field via userdb, and we are looking into how to fix this.Hi Aki, Thank you very much for your very fast answer. I will then simply double the percent character as workaround for now as you suggest.
Aki Tuomi
2019-Jul-02 16:31 UTC
Percent character in mail_crypt_private_password not possible
> > > ??????? Original Message ??????? > On Tuesday, July 2, 2019 6:21 PM, Aki Tuomi <aki.tuomi at open-xchange.com> wrote: > > > Hi, you need to escape % with %%. We are aware of a bug affecting when % comes in from some field via userdb, and we are looking into how to fix this. > > Hi Aki, > > Thank you very much for your very fast answer. I will then simply double the percent character as workaround for now as you suggest.
Aki Tuomi
2019-Jul-02 16:32 UTC
Percent character in mail_crypt_private_password not possible
> > > ??????? Original Message ??????? > On Tuesday, July 2, 2019 6:21 PM, Aki Tuomi <aki.tuomi at open-xchange.com> wrote: > > > Hi, you need to escape % with %%. We are aware of a bug affecting when % comes in from some field via userdb, and we are looking into how to fix this. > > Hi Aki, > > Thank you very much for your very fast answer. I will then simply double the percent character as workaround for now as you suggest.butterfingers me, sending empty replies.. I don't actually recommend using password *directly* from user as password for private keys, I recommend running them thru some hash / pkcs5 before that. Aki
??????? Original Message ??????? On Tuesday, July 2, 2019 6:32 PM, Aki Tuomi via dovecot <dovecot at dovecot.org> wrote:> I don't actually recommend using password directly from user as password for private keys, I recommend running them thru some hash / pkcs5 before that.That's a great idea and makes things even safer. I don't know much about PKCS5 but would SHA512 also be safe enough for hashing the password? SHA512 would then generate a 128 characters hash which I would then pass to the parameter "-o plugin/mail_crypt_private_password=" of my "doveadm mailbox cryptokey generate ..." command.
Possibly Parallel Threads
- bash script hook lda_mailbox_autocreate for generate mail-crypt user encrypted private key with user password
- bash script hook lda_mailbox_autocreate for generate mail-crypt user encrypted private key with user password
- Percent character in mail_crypt_private_password not possible
- Percent character in mail_crypt_private_password not possible
- Percent character in mail_crypt_private_password not possible