Displaying 20 results from an estimated 900 matches similar to: "SCRAM-SHA-256 and SCRAM-SHA-512 supports"
2019 Jan 20
1
SCRAM-SHA-256 and SCRAM-SHA-512 supports
Hello Stephan,
Thanks for the link about SCRAM-SHA-256, good news for this point, hope a merge soon :)
I am from this page: https://wiki.dovecot.org/Authentication/PasswordSchemes ^^
The -PLUS variant for all SCRAM is not possible too for have (with other SCRAM):
SCRAM-SHA-1(-PLUS), SCRAM-SHA-224(-PLUS), SCRAM-SHA-256(-PLUS), SCRAM-SHA-384(-PLUS), SCRAM-SHA-512(-PLUS)
Some softwares use
2019 Jan 20
0
SCRAM-SHA-256 and SCRAM-SHA-512 supports
Op 20/01/2019 om 00:45 schreef - Neustradamus -:
> Hello all,
>
> I would like to know if it is possible to add SCRAM-SHA-256 and
> SCRAM-SHA-512 supports?
>
> RFC7677: SCRAM-SHA-256 and SCRAM-SHA-256-PLUS: Simple Authentication
> and Security Layer (SASL) Mechanisms
> https://tools.ietf.org/html/rfc7677
>
> Thanks in advance.
2019 Nov 15
0
SCRAM-SHA-1-PLUS / SCRAM-SHA-224(-PLUS) / SCRAM-SHA-256(-PLUS), SCRAM-SHA-384(-PLUS) and SCRAM-SHA-512(-PLUS) supports
Dear all,
I send you a new email to know what is the progress of SCRAM-SHA-***(-PLUS) supports?
Currently there is only SCRAM-SHA-1: https://doc.dovecot.org/configuration_manual/authentication/password_schemes/.
- RFC6331: Moving DIGEST-MD5 to Historic: https://tools.ietf.org/html/rfc6331
- RFC5802: Salted Challenge Response Authentication Mechanism (SCRAM) SASL and GSS-API Mechanisms:
2018 Dec 16
1
Feature request SCRAM-SHA-256
> On 16 December 2018 at 10:27 Tributh via dovecot <dovecot at dovecot.org> wrote:
>
>
> Hi,
> is that here the right place to make feature requests?
>
> dovecot supports as authentication mechanism
> SCRAM-SHA-1 from RFC 5802
> which was updated to
> SCRAM-SHA-256 in RFC 7677
>
> Can SCRAM-SHA-256 be added to the authentication mechanisms?
>
>
2019 Jan 07
2
Feature request SCRAM-SHA-256
Op 16/12/2018 om 10:06 schreef Tributh via dovecot:
>
> Am 16.12.18 um 09:42 schrieb Aki Tuomi:
>>> On 16 December 2018 at 10:27 Tributh via dovecot <dovecot at dovecot.org> wrote:
>>>
>>>
>>> Hi,
>>> is that here the right place to make feature requests?
>>>
>>> dovecot supports as authentication mechanism
>>>
2013 Feb 25
1
Dovecot SASL: SCRAM-SHA-1 Authentication Fails
Dear all,
I use Dovecot SASL (2.1.15) on Ubuntu 12.04 for IMAP authentication and
Postfix SASL authentication. I tried to setup SCRAM-SHA-1 as SASL
mechanism. This works well on Dovecot's client side towards my OpenLDAP
server (with libsasl-2), but fails on the server side (IMAP and SMTP).
In the following, there's an extract from Dovecot's log, when using mutt
as SMTP client:
2011 Sep 16
2
[PATCH] SCRAM-SHA-1 authentication
Hy,
over the last days I have implemented SCRAM-SHA-1 in Dovecot's 2.1
branch. It does not do SCRAM-SHA-1-PLUS, but should be extendable enough
to introduce it later.
There are some checks for the message format which (assuming the client
acts correclty) are not strictly necessary during parsing. This is
partially in the hope that it might aid client implementers, partially
because it (IMHO)
2012 Oct 02
2
[PATCH] Add SCRAM-SHA-1 password scheme
Hello,
attached is an hg export on top of the current dovecot-2.2 branch, which
adds support for a SCRAM-SHA-1 password scheme.
Ideally I'd want doveadm pw's rounds flag to apply to this, but that's
currently specific to the crypt password scheme, so I left it out for now.
Regards,
Florian Zeitz
-------------- next part --------------
# HG changeset patch
# User Florian Zeitz
2018 Dec 16
0
Feature request SCRAM-SHA-256
Hi,
is that here the right place to make feature requests?
dovecot supports as authentication mechanism
SCRAM-SHA-1 from RFC 5802
which was updated to
SCRAM-SHA-256 in RFC 7677
Can SCRAM-SHA-256 be added to the authentication mechanisms?
I would not like to request, that SCRAM-SHA-1 will be exchanged by
SCRAM-SHA-256, since several applications only support SCRAM-SHA-1
Regards
Torsten
2018 Dec 16
0
Feature request SCRAM-SHA-256
> On 16 December 2018 at 11:06 Tributh <dovecot-user at tributh.net> wrote:
>
>
>
>
> Am 16.12.18 um 09:42 schrieb Aki Tuomi:
> >
> >> On 16 December 2018 at 10:27 Tributh via dovecot <dovecot at dovecot.org> wrote:
> >>
> >>
> >> Hi,
> >> is that here the right place to make feature requests?
> >>
>
2019 Jan 19
0
Feature request SCRAM-SHA-256
Hi,
Op 13/01/2019 om 17:48 schreef Tributh via dovecot:
> Hi,
> sorry for my late reply. Was too busy during the week.
> Thank you for your patches. I hope I will be able with them to get now
> some client support for SCRAM-SHA-256. Will report how I succeed in the
> future.
I managed to test it successfully using MailKit:
https://github.com/jstedfast/MailKit
I used the IMAP
2013 Sep 07
0
which clients support SCRAM-SHA-1
Hi
running dovecot as IMAP/POP3-proxy with
auth_mechanisms = CRAM-MD5 DIGEST-MD5 SCRAM-SHA-1 APOP LOGIN PLAIN
which client supports currently "SCRAM-SHA-1" to test it?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 263 bytes
Desc: OpenPGP digital signature
URL:
2019 Feb 13
3
Using SHA256/512 for SQL based password
On 2/13/19 1:23 AM, Matthias Fechner via dovecot wrote:
>
>
> Am 13. Februar 2019 00:34:15 schrieb Robert Moskowitz
> <rgm at htt-consult.com>:
>
>> On 2/12/19 6:03 PM, Matthias Fechner via dovecot wrote:
>>> Am 12.02.2019 um 17:05 schrieb Robert Moskowitz via dovecot:
>>>> I have trying to find how to set the dovecot-sql.conf for using
2016 Jun 14
3
Double variable expansion / multiple password mechanisms
Hi,
Trying to solve the problem of supporting multiple auth mechanisms +
proxy and really don't want to store user passwords in plain test and
fine to do master user to backend.
I had the crazy thought I could do something like the following:
For each user Store supported password schemes as LDAP attributes:
userPasswordCRAM-MD5: {CRAM-MD5}xxx
userPasswordDIGEST-MD5: {DIGEST-MD5}xxxx
2023 Feb 22
1
Auth-worker, unknown scheme ARGON2ID
On 21 Feb 2023, at 10:12 pm, James Brown <jlbrown at bordo.com.au> wrote:
>
> The new one has Dovecot compiled with same configure options, same configuration files, but fails to authenticate:
>
> Feb 21 21:51:03 master: Info: Dovecot v2.3.20 (80a5ac675d) starting up for imap, pop3 (core dumps disabled)
> Feb 21 21:51:33 auth-worker(11701): Error: conn unix:auth-worker
2019 Jun 20
5
Help on CRAM-MD5
Hello,
The world is not black or white.
Yes CRAM-MD5 is old and his successor SCRAM-XXXXXX is not widely
available/implemented which is sad.
For your need, use TLS and forget about it.
Thunderbird is conservative. If you don't configure TLS or TLS is not
available, it try to use something that not expose the password.
There is plenty of context where TLS is not possible/desirable.
And
2019 Feb 13
3
Using SHA256/512 for SQL based password
On 2/13/19 8:30 AM, Aki Tuomi wrote:
> On 13.2.2019 15.18, Robert Moskowitz via dovecot wrote:
>>
>> On 2/13/19 1:23 AM, Matthias Fechner via dovecot wrote:
>>>
>>> Am 13. Februar 2019 00:34:15 schrieb Robert Moskowitz
>>> <rgm at htt-consult.com>:
>>>
>>>> On 2/12/19 6:03 PM, Matthias Fechner via dovecot wrote:
2019 Jun 19
2
Help on CRAM-MD5
On 19.6.2019 7.48, Alexander Dalloz via dovecot wrote:
> Am 19.06.2019 um 00:04 schrieb Jorge Bastos via dovecot:
>> Howdy,
>>
>> I'm using dovecot and mysql users, and i'm creating the password with:
>>
>> ENCRYPT('some-passwd',CONCAT('$6$', SUBSTRING(SHA(RAND()), -16)))
>>
>> So far so good, everything's fine.
>>
2023 Feb 22
1
Auth-worker, unknown scheme ARGON2ID
> On 22/02/2023 07:00 EET James Brown <jlbrown at bordo.com.au> wrote:
>
>
> On 21 Feb 2023, at 10:12 pm, James Brown <jlbrown at bordo.com.au> wrote:
>
> >
> >
> > The new one has Dovecot compiled with same configure options, same configuration files, but fails to authenticate:
> >
> > Feb 21 21:51:03 master: Info: Dovecot v2.3.20
2018 Dec 06
3
argonid and dovecote
on a FreeBSD 11.2 amd64 machine, I am trying to get Dovecot 2.3.4 to play
nice with "argonid" encryption.
In the "10-auth.conf" file, I tried:
auth_mechanisms = plain argon2id
Upon restarting dovecot, I received an error message when attempting to
actually it:
auth: FATAL: Unknown authentication mechanism "ARGON2ID"
Output from doveadm pw -l
doveadm pw -l
SHA1