Displaying 20 results from an estimated 20000 matches similar to: "help: Unknown password scheme SHA"
2012 Oct 02
2
[PATCH] Add SCRAM-SHA-1 password scheme
Hello,
attached is an hg export on top of the current dovecot-2.2 branch, which
adds support for a SCRAM-SHA-1 password scheme.
Ideally I'd want doveadm pw's rounds flag to apply to this, but that's
currently specific to the crypt password scheme, so I left it out for now.
Regards,
Florian Zeitz
-------------- next part --------------
# HG changeset patch
# User Florian Zeitz
2023 Feb 22
1
Auth-worker, unknown scheme ARGON2ID
On 21 Feb 2023, at 10:12 pm, James Brown <jlbrown at bordo.com.au> wrote:
>
> The new one has Dovecot compiled with same configure options, same configuration files, but fails to authenticate:
>
> Feb 21 21:51:03 master: Info: Dovecot v2.3.20 (80a5ac675d) starting up for imap, pop3 (core dumps disabled)
> Feb 21 21:51:33 auth-worker(11701): Error: conn unix:auth-worker
2019 Jan 20
1
SCRAM-SHA-256 and SCRAM-SHA-512 supports
Hello Stephan,
Thanks for the link about SCRAM-SHA-256, good news for this point, hope a merge soon :)
I am from this page: https://wiki.dovecot.org/Authentication/PasswordSchemes ^^
The -PLUS variant for all SCRAM is not possible too for have (with other SCRAM):
SCRAM-SHA-1(-PLUS), SCRAM-SHA-224(-PLUS), SCRAM-SHA-256(-PLUS), SCRAM-SHA-384(-PLUS), SCRAM-SHA-512(-PLUS)
Some softwares use
2023 Feb 22
1
Auth-worker, unknown scheme ARGON2ID
> On 22/02/2023 07:00 EET James Brown <jlbrown at bordo.com.au> wrote:
>
>
> On 21 Feb 2023, at 10:12 pm, James Brown <jlbrown at bordo.com.au> wrote:
>
> >
> >
> > The new one has Dovecot compiled with same configure options, same configuration files, but fails to authenticate:
> >
> > Feb 21 21:51:03 master: Info: Dovecot v2.3.20
2019 Jan 19
2
SCRAM-SHA-256 and SCRAM-SHA-512 supports
Hello all,
I would like to know if it is possible to add SCRAM-SHA-256 and SCRAM-SHA-512 supports?
RFC7677: SCRAM-SHA-256 and SCRAM-SHA-256-PLUS: Simple Authentication and Security Layer (SASL) Mechanisms
https://tools.ietf.org/html/rfc7677
Thanks in advance.
Regards,
Neustradamus
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2011 Jun 29
5
Enhance sftp protocol: get SHA hash of file
Hi,
it would be great, if the sftp protocol could be
enhanced: get sha (or other hash value) from a file or part of a file.
This would make it possible to run a rsync like file transfer
on sftp.
I would suggest a protocol like this
Client sends to Server:
get-supported hash-methods
returns whitespace seperated list like md5 sha1 sha256 ....
get-hash HASH-METHOD FILENAME STARTOFFSET
2010 Jan 30
1
sha-512 ... shadow blended with database
The cryptic subject is the outcome of my looking into how to do a
particular thing. I wonder if anyone else has solved this problem in a
way that hasn't occurred to me.
I'm using dovecot 1.1.11 on Ubuntu Server 9.10. I could consider
upgrading to my own install of a newer dovecot if it made a difference
to this problem.
I have two populations of dovecot users. Some users have Unix
2018 Dec 16
1
Feature request SCRAM-SHA-256
> On 16 December 2018 at 10:27 Tributh via dovecot <dovecot at dovecot.org> wrote:
>
>
> Hi,
> is that here the right place to make feature requests?
>
> dovecot supports as authentication mechanism
> SCRAM-SHA-1 from RFC 5802
> which was updated to
> SCRAM-SHA-256 in RFC 7677
>
> Can SCRAM-SHA-256 be added to the authentication mechanisms?
>
>
2019 Jan 07
2
Feature request SCRAM-SHA-256
Op 16/12/2018 om 10:06 schreef Tributh via dovecot:
>
> Am 16.12.18 um 09:42 schrieb Aki Tuomi:
>>> On 16 December 2018 at 10:27 Tributh via dovecot <dovecot at dovecot.org> wrote:
>>>
>>>
>>> Hi,
>>> is that here the right place to make feature requests?
>>>
>>> dovecot supports as authentication mechanism
>>>
2015 May 01
1
Fatal: Unknown scheme: SHA512-CRYPT. On a Mac-mini
Running postfix+dovecot+mysql on a mac-mini, and trying to solve this
puzzle. Is this a Mac issue?, a MySQL issue? or something I haven't
configured in?
You can see from the output of the samples shows in the first case, that
SHA512-CRYPT seems to be Unknown.
The code I used is from a Linux based tutorial on setting up
Postfix+Dovecot+MySQL on a site. Everything is generally going ok, apart
2013 Feb 25
1
Dovecot SASL: SCRAM-SHA-1 Authentication Fails
Dear all,
I use Dovecot SASL (2.1.15) on Ubuntu 12.04 for IMAP authentication and
Postfix SASL authentication. I tried to setup SCRAM-SHA-1 as SASL
mechanism. This works well on Dovecot's client side towards my OpenLDAP
server (with libsasl-2), but fails on the server side (IMAP and SMTP).
In the following, there's an extract from Dovecot's log, when using mutt
as SMTP client:
2019 Dec 08
1
v2.2.36 to v2.3.8 maildirlock bug
On 08 Dec 2019, at 05:58, @lbutlr <kremels at kreme.com> wrote:
> On 06 Dec 2019, at 16:28, Martynas Bendorius <martynas at martynas.it> wrote:
>> when zlib compression is enabled in dovecot, old emails remain untouched
>
> I?ve been considering doing this, or at least looking into how much space we?d save (answer so far, less than you might think), but I am hesitant to
2011 Sep 16
2
[PATCH] SCRAM-SHA-1 authentication
Hy,
over the last days I have implemented SCRAM-SHA-1 in Dovecot's 2.1
branch. It does not do SCRAM-SHA-1-PLUS, but should be extendable enough
to introduce it later.
There are some checks for the message format which (assuming the client
acts correclty) are not strictly necessary during parsing. This is
partially in the hope that it might aid client implementers, partially
because it (IMHO)
2015 Sep 08
1
[PATCH] customize: password: use SHA-512 on openSUSE >= 11.0
openSUSE 11.0 has glibc 2.8, which supports the SHA-512 method.
Fallback to an explicit MD5 for older versions.
---
customize/password.ml | 3 +++
1 file changed, 3 insertions(+)
diff --git a/customize/password.ml b/customize/password.ml
index 27ced67..258d726 100644
--- a/customize/password.ml
+++ b/customize/password.ml
@@ -162,6 +162,9 @@ and default_crypto g root =
| "ubuntu", v
2003 Oct 23
1
pam_smbpass on Solaris box
Hello
I decided to test password migration (on Solaris 8 box with SUNWspro C) and built samba with pam_smbpass module :
CC=cc ./configure --prefix=/opt/local/samba --with-acl-support --with-pam --with-pam_smbpass
Then installed bin/pam_smbpass.so in /usr/lib/security :
# ls -al /usr/lib/security/pam_smbpass.so
-rwxr-xr-x 1 root sys 2091380 Oct 23 11:01
2019 Apr 11
3
maildirlock fails
Hello,
Maildirlock seems to panic on locking:
[root at centos7 home]# /usr/libexec/dovecot/maildirlock "/home/user/imap/domain.com/email/Maildir" 10
Panic: BUG: No IOs or timeouts set. Not waiting for infinity.
Error: Raw backtrace: /usr/lib/dovecot/libdovecot.so.0(+0xd90ee) [0x7f5bf02f10ee] -> /usr/lib/dovecot/libdovecot.so.0(+0xd9131) [0x7f5bf02f1131] ->
2013 Mar 10
1
Asterisk authentication on LDAP (SSHA and SHA passwords)
hello guys,
I'm working on a federal university at Brasil, we already have an
openLdap with all users and this base is used to authenticate several
services like email, vpn, wireless (RADIUS), and we have also Shibboleth
providing SSO.
During my studies of Asterisk, i see a lot of people talking about the
incapacity of asterisk (more precisely because of SIP) to authenticate
against a
2017 Mar 04
2
CentOS 7 iso file SHA-256 hashes
I downloaded CentOS-7-x86_64-Everything.iso (8,233,418,752 bytes) by
clicking on the 'Everything' link in the 'Rolling' line on
https://wiki.centos.org/Download (supposedly the 1611 build).
But when I look in the sha256sum.txt file from
https://buildlogs.centos.org/rolling/7/isos/x86_64/ (where Chrome says that
iso came from), there is no SHA hash for a file of that name.
The
2016 Oct 10
1
Hierarchy separator and LAYOUT=FS change
Hello,
I stumbled across a 5-year-old post on the dovecot list about changing the dovecot hierarchy separator to enable shared mailboxes (http://www.dovecot.org/list/dovecot/2011-January/056201.html <http://www.dovecot.org/list/dovecot/2011-January/056201.html>).
At the moment I?m stuck in a pretty similar situation. Migrated from courier to dovecot 2 years ago and preserved the
2010 May 07
1
CRYPT scheme and 8 character limit
I've decided that having users supply cleartext passwords for me to encrypt
and encode is a bad idea, anyway. So maybe I won't need dovecotpw. The
idea is that users supply an already-encrypted password. Most of the users
can fetch their login password from /etc/shadow on their own computer.
Wiki page http://wiki.dovecot.org/Authentication/PasswordSchemes indicates
that scheme name