Displaying 10 results from an estimated 10 matches for "passdb_result_user_disabled".
2012 Jun 24
3
Additional passdb result status
...ts the extra_field and returns some error
(authentication was not successful) so that the "real" passdb backend
can be invoked to "really" validate the authentication data.
However, in auth_request_handle_passdb_callback() the extra_fields are
reseted unless the return code is PASSDB_RESULT_USER_DISABLED. But if
that return code is used then any following passdb's aren't invoked any
more - which makes sense with respect to user authenticiation. I would
therefore like to propose that some IGNORE/CONTINUE-status to be
introduced in auth/passdb.h, that would be handled in that extra_fields
and...
2018 Oct 04
3
vpopmail
...)) {
auth_request_log_info(auth_request, AUTH_SUBSYS_DB,
"%s disabled in vpopmail for this user",
auth_request->service);
password = NULL; *result_r =
PASSDB_RESULT_USER_DISABLED; } else { if
(vpw->pw_clear_passwd != NULL &&
*vpw->pw_clear_passwd != '\0') { password =
t_strdup_noconst(vpw->pw_clear_passwd);
*cleartext = TRUE; } else if...
2018 Oct 04
2
vpopmail
Quoting Aki Tuomi <aki.tuomi at open-xchange.com>:
> On 03.10.2018 23:30, Eric Broch wrote:
>> Hello list,
>>
>> I run Dovecot with the vpopmail driver and have found that it
>> authenticates against the clear text password in the vpopmail
>> database. Is there a configuration option either at compile time, link
>> time, or a setting in one of the
2018 Oct 04
2
vpopmail
...og_info(auth_request, AUTH_SUBSYS_DB,
>> "%s disabled in vpopmail for
>> this user",
>> auth_request->service);
>> password = NULL;
>> *result_r = PASSDB_RESULT_USER_DISABLED;
>> } else {
>> if (vpw->pw_clear_passwd != NULL &&
>> *vpw->pw_clear_passwd != '\0') {
>> password = t_strdup_noconst(vpw->pw_clear_passwd);
>> *cleart...
2018 Oct 04
0
vpopmail
...st, vpw)) {
auth_request_log_info(auth_request, AUTH_SUBSYS_DB,
"%s disabled in vpopmail for this user",
auth_request->service);
password = NULL;
*result_r = PASSDB_RESULT_USER_DISABLED;
} else {
if (vpw->pw_clear_passwd != NULL &&
*vpw->pw_clear_passwd != '\0') {
password = t_strdup_noconst(vpw->pw_clear_passwd);
*cleartext = TRUE;
} else if (...
2008 Jun 13
0
"Disable non webmail IMAP access" in vpopmail and Dovecot
...;
? ? ? ? ? ? ?strcmp(auth_request->service, "POP3") == 0)) {
? ? ? ? ? ? ? ? auth_request_log_info(auth_request, "vpopmail",
? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? "%s disabled", auth_request->service);
? ? ? ? ? ? ? ? password = NULL;
? ? ? ? ? ? ? ? *result_r = PASSDB_RESULT_USER_DISABLED;
? ? ? ? } else ...............
this way you will preserve webmail access and cut imap from external in case
-i limit is defined in vpopmail
hope it helps
<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<-<
Can so...
2018 Oct 04
0
vpopmail
...auth_request_log_info(auth_request, AUTH_SUBSYS_DB,
> "%s disabled in vpopmail for this user",
> auth_request->service);
> password = NULL;
> *result_r = PASSDB_RESULT_USER_DISABLED;
> } else {
> if (vpw->pw_clear_passwd != NULL &&
> *vpw->pw_clear_passwd != '\0') {
> password = t_strdup_noconst(vpw->pw_clear_passwd);
> *cleartext = TRUE;
>...
2018 Oct 04
0
vpopmail
...uest, AUTH_SUBSYS_DB,
>>> ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?"%s disabled in vpopmail for
>>> this user",
>>> ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?auth_request->service);
>>> ? ? ? ? ? ? ? ?password = NULL;
>>> ? ? ? ? ? ? ? ?*result_r = PASSDB_RESULT_USER_DISABLED;
>>> ? ? ? ?} else {
>>> ? ? ? ? ? ? ? ?if (vpw->pw_clear_passwd != NULL &&
>>> ? ? ? ? ? ? ? ? ? ?*vpw->pw_clear_passwd != '\0') {
>>> ? ? ? ? ? ? ? ? ? ? ? ?password = t_strdup_noconst(vpw->pw_clear_passwd);
>>> ? ? ? ? ? ? ? ?...
2006 Oct 15
1
Authenticating dovecot against Active Directory using bsdauth and login_ldap
...sdauth.c
==== src/auth/passdb-bsdauth.c ========
29 if (!IS_VALID_PASSWD(pw->pw_passwd)) {
30 auth_request_log_info(request, "bsdauth",
31 "invalid password field");
32 callback(PASSDB_RESULT_USER_DISABLED, request);
33 return;
34 }
=======================================
These lines seem to require that the pw structure contains the
encrypted password in pw->pw_passwd. Where login_ldap is used against
Active Directory the encrypted password is not available to b...
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...0) {
+ auth_request_log_info(request, "passdb",
+ "Attempted submit user login for "
+ "non-imap service %s "
+ "(trying to log in as user: %s)",
+ request->service,
+ request->requested_login_user);
+ *result = PASSDB_RESULT_USER_DISABLED;
+ } else /* reduce code deltas */
+ if (!auth_request_master_lookup_finish(request,
+ request->passdb->submit)) /* APPLE - urlauth */
return FALSE;
} else {
if (request->passdb->pass) {
@@ -1310,7 +1347,8 @@
if (request->skip_password_check) {
/* current...