Hi Sami

I followed this before, and it seemed the solution was to set

imapc_password = %w

However, dovecot will not start with this configuration.

In Sven's email, he places the imapc_password = %w as a default_field in the 
userdb on the primary instance.  If I remove the default field, I get the 
invalid credentials reported as above.  However, I still think this is correct 
way to pass %w, because if I remove 'imapc_user = authapps' from the global 
config *and*  'imapc_password = %w' from the default_fields in the userdb, the 
logs on the shared instance show that the user password is not being passed in 
the imapc login:


2017-09-28 12:57:10.409884500 Sep 28 12:57:10 auth: Debug: 
static(bob.test,192.168.120.70,<rvFSUEVaxLfAqHhG>): lookup
2017-09-28 12:57:10.409903500 Sep 28 12:57:10 auth: Debug: 
static(bob.test,192.168.120.70,<rvFSUEVaxLfAqHhG>): username changed bob.test 
-> authapps
2017-09-28 12:57:10.409905500 Sep 28 12:57:10 auth: Info: 
static(authapps,192.168.120.70,<rvFSUEVaxLfAqHhG>): No password returned (and 
no nopassword)
2017-09-28 12:57:12.412437500 Sep 28 12:57:12 auth: Debug: client passdb out: 
FAIL      11      user=authapps   original_user=bob.test

Now this starts to be a bit complex. Not sure if you can get this working by 
returning imapc_password = %w from the first passdb. Atleast if it works it 
will only work with PLAIN auth scheme.
What I would do here is to just trust that the user is already authenticated 
with the first ldap passdb in the primary server and then switch the imapc 
connection to both master user and master password.

So just put imapc_password=masterpassword in dovecot.conf of the primary server 
and on secondary server modify ldap config not to fetch the user password but 
always return password=masterpassword.

It took me a while to wrap my head around what you are saying here, but once I got it I find it a simple, elegant and absolutely brilliant solution.

In thinking about it, it occurred to me I could maybe do the same without even doing an ldap look up, so I changed the userdb/passdb stanzas on the shared instance like so:

userdb {
  args = uid=vmail gid=vmail home=/CTFN/SharedMailboxes/CTFN/
  driver = static
}
passdb {
  args = user=%u password=XXXXXXX
  driver = static
  master = yes
}
passdb {
  driver = static
}


Where the password is the value set for imapc_password on the primary instance.

The logs now show on the shared server that the user is authapps, and it has the correct effective uid/gid/home values, and the master user and the acl username is that of the user logging into the primary instance.

So looks like this will work!

Thank you, Sami, a bottle of Canada's finest is at your disposal...




and maybe protect the authentication scheme with allow_nets=127.0.0.1 from 
external abuse

Sami


Reply via email to