search for: passdb_result_user_unknown

Displaying 6 results from an estimated 6 matches for "passdb_result_user_unknown".

2015 Aug 06
3
question on autch cache parameters
...tra fields - it set */ - auth_fields_rollback(request->extra_fields); - if (request->userdb_reply != NULL) { - auth_fields_rollback(request->userdb_reply); - request->userdb_prefetch_set = - request->snapshot_have_userdb_prefetch_set; - } - } - if (*result == PASSDB_RESULT_USER_UNKNOWN) { /* remember that we did at least one successful passdb lookup */ On 08/05/2015 05:33 PM, matthias lay wrote: > just tested against dovecot 2.2.15 > > everythings works fine. so might be a bug introduced between 2.2.16 and > 2.2.18 > > > > &gt...
2016 Jul 09
4
passdb {driver = shadow args = override_username=%variable}
...truct auth_request *request, struct spwd **spw_r) { auth_request_log_debug(request, AUTH_SUBSYS_DB, "lookup"); *spw_r = getspnam(request->user); if (*spw_r == NULL) { auth_request_log_unknown_user(request, AUTH_SUBSYS_DB); return PASSDB_RESULT_USER_UNKNOWN; } when request->user contains 'user at domain.tld', I want the code to be able to process "override_username", determine that the format is %Ln so that request->user is lowercased, and everything after the "@" sign is stripped. Therefore, if this user hap...
2015 Aug 27
0
question on autch cache parameters
...lds_rollback(request->extra_fields); > - if (request->userdb_reply != NULL) { > - auth_fields_rollback(request->userdb_reply); > - request->userdb_prefetch_set = > - request->snapshot_have_userdb_prefetch_set; > - } > - } > - > if (*result == PASSDB_RESULT_USER_UNKNOWN) { > /* remember that we did at least one successful > passdb lookup */ > > > > > > > > > > > > > > > On 08/05/2015 05:33 PM, matthias lay wrote: >> just tested against dovecot 2.2.15 >> >> everythings wor...
2015 Aug 05
3
question on autch cache parameters
Hi list, I have a question on auth caching in 2.2.18. I am using acl_groups for a master user, appended in a static userdb file # snip ############################### master at uma:{SHA}XXXX=::::::userdb_acl_groups=umareadmaster allow_nets=127.0.0.1 # snap ############################### and use this group in a global ACL file. I discovered this only works on first NOT-cached login
2020 Mar 30
2
Panic/Assert dns-lookup.c
...uth-request.c:1193 passdb = <optimized out> __func__ = "auth_request_verify_plain_callback" #16 0x00007f279faaa0dc in ldap_lookup_finish (res=<optimized out>, ldap_request=0x55c93287d250, auth_request=0x55c932881628) at passdb-ldap.c:112 passdb_result = PASSDB_RESULT_USER_UNKNOWN ret = <optimized out> password = 0x0 scheme = <optimized out> #17 ldap_lookup_pass_callback (conn=<optimized out>, request=0x55c93287d250, res=<optimized out>) at passdb-ldap.c:126 ldap_request = 0x55c93287d250 auth_request = 0x55c9328...
2020 Mar 30
2
Panic/Assert dns-lookup.c
Hi, currently we deploying Dovecot as imap/pop3 proxy. Every few minutes some panic/assert occurred (we connect roughly 7k - 8k user at one imap proxy with a connection rate of 200/s). We activate core dumps. Concerning the sensitive information in the dump we would prefer to not share the dump (e.g. i found our ssl private key in the dump). Log/Stack trace: Mar 30 15:54:06 imap16 dovecot: