search for: pass_

Displaying 5 results from an estimated 5 matches for "pass_".

Did you mean: pass
2020 Oct 22
2
Directors and LMTP: mailAlternateAddress of same user
Good evening everyone, I'd like to paste a problem i experience the last days with a mail cluster system based on three dovecot servers and two directors in front of them. The Directors are proxying the auth requests to the dovecot servers below (LDAP). The protocols i use are imap/managesieve/lmtp.? The setup works as intented, exept one detail. There are a lot of users that happen to
2020 Oct 26
0
Directors and LMTP: mailAlternateAddress of same user
...tation (https://doc.dovecot.org/configuration_manual/authentication/user_databases_userdb/) was updated to make it cleaner. The solution is to use passdb instead. Use basically the same configuration as the one you have for userdb but for passdb. For the ldap configuration itself replace user_* by pass_*. I hope that helps, Vincent -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 833 bytes Desc: OpenPGP digital signature URL: <https://dovecot.org/pipermail/dovecot/attachments/20201026/da512785/attachment.si...
2012 Apr 09
1
a small patch
hello all, A small patch that fixes Query get_description in testsute3.py. see the attachment. -- Best Regards, Xiaona Han -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.xapian.org/pipermail/xapian-devel/attachments/20120409/18a07efb/attachment-0001.html> -------------- next part -------------- A non-text attachment was scrubbed... Name:
2010 Aug 27
2
LDAP & static userdb
hi.. im just testing 2.0 before upgrading to v1.2 :) in auth-ldap.conf.ext i found # If you don't have any user-specific settings, you can avoid the userdb LDAP # lookup by using userdb static instead of userdb ldap, for example: # <doc/wiki/UserDatabase.Static.txt> #userdb { #driver = static #args = uid=vmail gid=vmail home=/var/vmail/%u #} On 1.2 im using LDAP lookup and
2008 Jan 29
5
Unknown rootkit causes compromised servers
Here is the applicable article: http://www.linux.com/feature/125548 There are links in the above article that explain tests for the system and what is currently known about the rootkit. Apparently initial access is NOT via any vulnerability but just guessed root passwords. There are currently 2 methods to see if you are infected: 1. In some cases, the root kit causes you to not be able to