I was having a similar problem logging into my LDAP server. I then set LDAP_CRYPTPW instead of LDAP_CLEARPW and problem solved. You might try it.
On Tue, 2004-07-06 at 04:59, Gabriele Alberti wrote: > Mh, that's the field used to authenticate the pop/imap user via cram md5. My > problem is to authenticate authdaemon to postgresql. For this only matters > PGSQL_HOST,PGSQL_PORT,PGSQL_USERNAME and PGSQL_PASSWORD afaik.. > When I'll solve this, I can go to authenticate the pop/imap user... > > --- Tim Hunter <[EMAIL PROTECTED]> ha scritto: > > Gabriele Alberti wrote: > > > Well, > > > $ cat /etc/courier/authpgsqlrc |grep -v '^#\|^$' > > > PGSQL_HOST localhost > > > PGSQL_PORT 5432 > > > PGSQL_USERNAME myuser > > > PGSQL_PASSWORD mypass > > > PGSQL_DATABASE posta > > > PGSQL_USER_TABLE mxaliases > > > PGSQL_CLEAR_PWFIELD password > > > PGSQL_UID_FIELD uid > > > PGSQL_GID_FIELD gid > > > PGSQL_LOGIN_FIELD address > > > PGSQL_HOME_FIELD home > > > PGSQL_MAILDIR_FIELD directory > > > PGSQL_WHERE_CLAUSE enabled='true' > > > > > > > ##NAME: PGSQL_CRYPT_PWFIELD:0 > > # > > # Either PGSQL_CRYPT_PWFIELD or PGSQL_CLEAR_PWFIELD must be defined. Both > > # are OK too. crypted passwords go into PGSQL_CRYPT_PWFIELD, cleartext > > # passwords go into PGSQL_CLEAR_PWFIELD. Cleartext passwords allow > > # CRAM-MD5 authentication to be implemented. > > > > PGSQL_CRYPT_PWFIELD crypt > > > > > A row from my database at the moment is meaningless, as authdaemon is > > > not able to log in. > > > > > > Thanks again.. > > > > > > Gabriel > > > > > > > > > > > > > > > > > > > > > > > > ____________________________________________________________ > > > Yahoo! Companion - Scarica gratis la toolbar di Ricerca di Yahoo! > > > http://companion.yahoo.it > > > > > > > > > ------------------------------------------------------- > > > This SF.Net email sponsored by Black Hat Briefings & Training. > > > Attend Black Hat Briefings & Training, Las Vegas July 24-29 - > > > digital self defense, top technical experts, no vendor pitches, > > > unmatched networking opportunities. Visit www.blackhat.com > > > _______________________________________________ > > > courier-users mailing list > > > [EMAIL PROTECTED] > > > Unsubscribe: > > > https://lists.sourceforge.net/lists/listinfo/courier-users > > > > > > ------------------------------------------------------- > > This SF.Net email sponsored by Black Hat Briefings & Training. > > Attend Black Hat Briefings & Training, Las Vegas July 24-29 - > > digital self defense, top technical experts, no vendor pitches, > > unmatched networking opportunities. Visit www.blackhat.com > > _______________________________________________ > > courier-users mailing list > > [EMAIL PROTECTED] > > Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users > > > > > > > > > ____________________________________________________________ > Yahoo! Companion - Scarica gratis la toolbar di Ricerca di Yahoo! > http://companion.yahoo.it > > > ------------------------------------------------------- > This SF.Net email sponsored by Black Hat Briefings & Training. > Attend Black Hat Briefings & Training, Las Vegas July 24-29 - > digital self defense, top technical experts, no vendor pitches, > unmatched networking opportunities. Visit www.blackhat.com > _______________________________________________ > courier-users mailing list > [EMAIL PROTECTED] > Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users -- Eric N. Valor [EMAIL PROTECTED] PGP Key 2048/1024 227B04CB Key Fingerprint = 766C CA15 0FFF E54B 2FEE C7D7 0F87 3AFB 227B 04CB : This Space Intentionally Left Blank :
signature.asc
Description: This is a digitally signed message part
