Displaying 6 results from an estimated 6 matches for "passdb_result_user_unknown".
2015 Aug 06
3
question on autch cache parameters
...tra fields
- it set */
- auth_fields_rollback(request->extra_fields);
- if (request->userdb_reply != NULL) {
- auth_fields_rollback(request->userdb_reply);
- request->userdb_prefetch_set =
- request->snapshot_have_userdb_prefetch_set;
- }
- }
-
if (*result == PASSDB_RESULT_USER_UNKNOWN) {
/* remember that we did at least one successful
passdb lookup */
On 08/05/2015 05:33 PM, matthias lay wrote:
> just tested against dovecot 2.2.15
>
> everythings works fine. so might be a bug introduced between 2.2.16 and
> 2.2.18
>
>
>
>
>...
2016 Jul 09
4
passdb {driver = shadow args = override_username=%variable}
...truct auth_request *request, struct spwd **spw_r)
{
auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup");
*spw_r = getspnam(request->user);
if (*spw_r == NULL) {
auth_request_log_unknown_user(request, AUTH_SUBSYS_DB);
return PASSDB_RESULT_USER_UNKNOWN;
}
when request->user contains 'user at domain.tld', I want the code to be
able to process "override_username", determine that the format is %Ln
so that request->user is lowercased, and everything after the "@" sign
is stripped. Therefore, if this user hap...
2015 Aug 27
0
question on autch cache parameters
...lds_rollback(request->extra_fields);
> - if (request->userdb_reply != NULL) {
> - auth_fields_rollback(request->userdb_reply);
> - request->userdb_prefetch_set =
> - request->snapshot_have_userdb_prefetch_set;
> - }
> - }
> -
> if (*result == PASSDB_RESULT_USER_UNKNOWN) {
> /* remember that we did at least one successful
> passdb lookup */
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> On 08/05/2015 05:33 PM, matthias lay wrote:
>> just tested against dovecot 2.2.15
>>
>> everythings wor...
2015 Aug 05
3
question on autch cache parameters
Hi list,
I have a question on auth caching in 2.2.18.
I am using acl_groups for a master user, appended in a static userdb file
# snip ###############################
master at uma:{SHA}XXXX=::::::userdb_acl_groups=umareadmaster
allow_nets=127.0.0.1
# snap ###############################
and use this group in a global ACL file.
I discovered this only works on first NOT-cached login
2020 Mar 30
2
Panic/Assert dns-lookup.c
...uth-request.c:1193
passdb = <optimized out>
__func__ = "auth_request_verify_plain_callback"
#16 0x00007f279faaa0dc in ldap_lookup_finish (res=<optimized out>, ldap_request=0x55c93287d250, auth_request=0x55c932881628) at passdb-ldap.c:112
passdb_result = PASSDB_RESULT_USER_UNKNOWN
ret = <optimized out>
password = 0x0
scheme = <optimized out>
#17 ldap_lookup_pass_callback (conn=<optimized out>, request=0x55c93287d250, res=<optimized out>) at passdb-ldap.c:126
ldap_request = 0x55c93287d250
auth_request = 0x55c9328...
2020 Mar 30
2
Panic/Assert dns-lookup.c
Hi,
currently we deploying Dovecot as imap/pop3 proxy. Every few minutes some panic/assert occurred (we connect roughly 7k - 8k user at one imap proxy with a connection rate of 200/s).
We activate core dumps. Concerning the sensitive information in the dump we would prefer to not share the dump (e.g. i found our ssl private key in the dump).
Log/Stack trace:
Mar 30 15:54:06 imap16 dovecot: