I was having a similar problem logging into my LDAP server.  I then set
LDAP_CRYPTPW instead of LDAP_CLEARPW and problem solved.  You might try
it.

On Tue, 2004-07-06 at 04:59, Gabriele Alberti wrote:
> Mh, that's the field used to authenticate the pop/imap user via cram md5. My
> problem is to authenticate authdaemon to postgresql. For this only matters
> PGSQL_HOST,PGSQL_PORT,PGSQL_USERNAME and PGSQL_PASSWORD afaik..
> When I'll solve this, I can go to authenticate the pop/imap user...
> 
> --- Tim Hunter <[EMAIL PROTECTED]> ha scritto: 
> > Gabriele Alberti wrote:
> > > Well,
> > > $ cat /etc/courier/authpgsqlrc |grep -v '^#\|^$'
> > > PGSQL_HOST              localhost
> > > PGSQL_PORT              5432
> > > PGSQL_USERNAME          myuser
> > > PGSQL_PASSWORD          mypass
> > > PGSQL_DATABASE          posta
> > > PGSQL_USER_TABLE        mxaliases
> > > PGSQL_CLEAR_PWFIELD     password
> > > PGSQL_UID_FIELD         uid
> > > PGSQL_GID_FIELD         gid
> > > PGSQL_LOGIN_FIELD       address
> > > PGSQL_HOME_FIELD        home
> > > PGSQL_MAILDIR_FIELD     directory
> > > PGSQL_WHERE_CLAUSE      enabled='true'
> > > 
> > 
> > ##NAME: PGSQL_CRYPT_PWFIELD:0
> > #
> > # Either PGSQL_CRYPT_PWFIELD or PGSQL_CLEAR_PWFIELD must be defined.  Both
> > # are OK too. crypted passwords go into PGSQL_CRYPT_PWFIELD, cleartext
> > # passwords go into PGSQL_CLEAR_PWFIELD.  Cleartext passwords allow
> > # CRAM-MD5 authentication to be implemented.
> > 
> > PGSQL_CRYPT_PWFIELD    crypt
> > 
> > > A row from my database at the moment is meaningless, as authdaemon is
> > > not able to log in.
> > > 
> > > Thanks again..
> > > 
> > > Gabriel
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > 
> > > ____________________________________________________________
> > > Yahoo! Companion - Scarica gratis la toolbar di Ricerca di Yahoo!
> > > http://companion.yahoo.it
> > > 
> > > 
> > > -------------------------------------------------------
> > > This SF.Net email sponsored by Black Hat Briefings & Training.
> > > Attend Black Hat Briefings & Training, Las Vegas July 24-29 -
> > > digital self defense, top technical experts, no vendor pitches,
> > > unmatched networking opportunities. Visit www.blackhat.com
> > > _______________________________________________
> > > courier-users mailing list
> > > [EMAIL PROTECTED]
> > > Unsubscribe:
> > > https://lists.sourceforge.net/lists/listinfo/courier-users
> > 
> > 
> > -------------------------------------------------------
> > This SF.Net email sponsored by Black Hat Briefings & Training.
> > Attend Black Hat Briefings & Training, Las Vegas July 24-29 - 
> > digital self defense, top technical experts, no vendor pitches, 
> > unmatched networking opportunities. Visit www.blackhat.com
> > _______________________________________________
> > courier-users mailing list
> > [EMAIL PROTECTED]
> > Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users
> >  
> 
> 
>       
> 
>       
>               
> ____________________________________________________________
> Yahoo! Companion - Scarica gratis la toolbar di Ricerca di Yahoo! 
> http://companion.yahoo.it
> 
> 
> -------------------------------------------------------
> This SF.Net email sponsored by Black Hat Briefings & Training.
> Attend Black Hat Briefings & Training, Las Vegas July 24-29 - 
> digital self defense, top technical experts, no vendor pitches, 
> unmatched networking opportunities. Visit www.blackhat.com
> _______________________________________________
> courier-users mailing list
> [EMAIL PROTECTED]
> Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users
-- 
Eric N. Valor
[EMAIL PROTECTED]
PGP Key 2048/1024 227B04CB
Key Fingerprint = 766C CA15 0FFF E54B 2FEE  C7D7 0F87 3AFB 227B 04CB

: This Space Intentionally Left Blank :

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to