Displaying 13 results from an estimated 13 matches for "bluerosetech".
2013 Feb 19
1
Dovecot auth works when tested with doveadm, but fails with Postfix
...and yoshi run Dovecot 2.1.12 servers with simple
passwd-file backends.
If I create a new password hash for chombo's user, houseloki, on either
rush or yoshi:
# doveadm pw -u houseloki -p <password>
{CRAM-MD5}...
Then I add that to rush and yoshi's passwd file:
houseloki at _auth.bluerosetech.com:{CRAM-MD5}...
Then `doveadm reload`, it works fine:
# doveadm auth houseloki <password>
passdb: houseloki auth succeeded
extra fields:
user=houseloki at _auth.bluerosetech.com
So I add that username and password to the smtp_sasl_password_maps hash
file on chombo, reload postfix,...
2013 Dec 04
3
BIND segway -> python -> first-class ports
On 12/4/13, 9:05 AM, Mark Felder said:
-----------------
> There was no alternative; we couldn't keep BIND in base. BIND 9 will
> certainly have a EoL before the EoL of FreeBSD 10.x, and we can't use
> BIND 10 because it requires importing Python to base.
I'm coming more and more to the conclusion that we should have a minimal Python in "base".
More and more people
2008 Nov 20
1
Sieve RFC5229 support?
I'd like to take advantage of RFC5229 match variables (it would reduce
the number of rules I have by an order of magnitude); however, the
required extension isn't supported yet. Am I mistaken? If not, are
there plans to support it?
2014 Dec 02
0
disabling certain ciphers
On 12/1/2014 4:43 PM, Will Yardley wrote:
> Can you use both ssl_protocols *and* ssl_cipher_list in the same config
> (in a way that's sane)?
> Is there a way to exclude these ciphers, while still keeping my config
> easy to parse and avoiding duplicative or deprecated configs?
Yes to both. If you need to support older clients:
ssl_cipher_list =
2014 Dec 02
0
disabling certain ciphers
On 12/1/2014 9:44 PM, Will Yardley wrote:
> On Mon, Dec 01, 2014 at 09:27:48PM -0800, Darren Pilgrim wrote:
>> On 12/1/2014 4:43 PM, Will Yardley wrote:
>>> Can you use both ssl_protocols *and* ssl_cipher_list in the same config
>>> (in a way that's sane)?
>>
>>> Is there a way to exclude these ciphers, while still keeping my config
>>> easy
2014 Dec 02
2
disabling certain ciphers
On 12/2/2014 10:05 AM, Will Yardley wrote:
> I had some problems the first few times I restarted with ssl-params
> seeming to hang, but it finally works.
That would have been dovecot generating the 4096-bit DH parameters. It
can take a bit, but Dovecot is quite fast at it. If Dovecot supported
it, you could use OpenSSL to generate tested-safe DH parameters and
supply them by file the
2015 Jan 10
0
Moving or "upgrading" from MD5 to SSHA512
On 1/9/2015 4:07 PM, Jyri Hovila [Turvamies.fi] wrote:
> Hello, world!
>
> I have a long-running Dovecot & Postfix installation using PostgreSQL
> back-end.
>
> Until now I've been using MD5 hashing but would like to "upgrade" to
> the salted SSHA512.
>
> Is there a way to configure Dovecot so that it would automatically
> detect the type of the hash
2008 Dec 23
1
SQL field format for digest-md5?
I'm enabling digest-md5 authentication with "user at example.com" username
and plain-text passwords stored in a MySQL database. What should the
password field contain in order to work with digest-md5? Would the
following:
SELECT CONCAT('{digest-md5}', MD5(CONCAT(username, '::', password))) AS
password ...
be correct?
2008 Dec 25
1
DIGEST-MD5 user/realm mismatch with Postfix
This is a follow-on to the "SQL field format for digest-md5?" thread.
After some additional debugging, I've found the problem is a mismatch in
what Dovecot expects and Postfix uses for the user and realm.
For a username "user at example.com" and password "sekret", Dovecot expects:
username = "user"
realm = "example.com"
but Postfix sends
2013 Mar 17
1
Dovecot not obeying disable_plaintext_auth = yes and how to force/disable encryption
I'm using Dovecot 2.1.15. I need to require encryption and only secure
auth on public addresses, but allow plaintext auth over an unencrypted
connection on localhost.
I have so far (excerpts from `doveconf -a`):
auth_mechanisms = cram-md5 plain
disable_plaintext_auth = yes
listen =
service imap-login {
inet_listener imap-local {
address = ::1
port = 143
ssl = no
}
2015 Jan 19
1
Outlook and TLSv.1
On 1/18/2015 12:45 AM, Robert Schetterer wrote:
> Am 16.01.2015 um 12:24 schrieb Oliver Welter:
>> Hi Folks,
>>
>> after adding TLSv1.2 to by TLS options a lot of Outlook users complaint
>> about connection errors, openssl s_client and Thunderbird works fine.
>>
>> I found some posts about this but none of them had a real solution on
>> this - I
2013 Sep 09
2
How to disable SSL and TLSv1.1?
I'm running Dovecot 2.2.5 and want to make it refuse SSLv2, SSLv3 and
TLSv1.0. Clients will opportunistically use TLS 1.1 and 1.2, but now I
want require they do so. Is it enough to set
ssl_cipher_list = HIGH:!SSLv2:!SSLv3:!TLSv1.0:!aNULL:!MD5
or are there additional settings I need to specify?
2014 Dec 02
2
disabling certain ciphers
On 12/2/2014 1:32 AM, Reindl Harald wrote:
>
> Am 02.12.2014 um 06:44 schrieb Will Yardley:
>> On Mon, Dec 01, 2014 at 09:27:48PM -0800, Darren Pilgrim wrote:
>>> On 12/1/2014 4:43 PM, Will Yardley wrote:
>>>> Can you use both ssl_protocols *and* ssl_cipher_list in the same config
>>>> (in a way that's sane)?
>>>
>>>> Is there a