On 27 Dec 2014, at 16:42, Kee Hinckley wrote:

On 26 Dec 2014, at 14:01, Benny Kjær Nielsen wrote:
I've had this reported once before and I added a quick workaround:

defaults write com.freron.MailMate MmExchangeAuthPlainWorkaround -bool YES

I cannot promise I'll keep on supporting this, but if I remove it then it'll probably be because I've found some other way to handle it.


That doesn't appear to change anything, it's still trying PLAIN. I'm waiting to hear back from IT to see if there's something else going on. A co-worker claimed that they were able to authenticate just fine via telnet, and SMTP is working fine for me, so it could be some other issue.

2 things to try:

1. If you are using just a bare username for IMAP auth, try switching to [email protected]. Or vice versa.

2. Instead of STARTTLS on port 143, try port 993 (i.e. "SSL wrapped" IMAP). If the server supports the use of that port, that may change how the server sees your connection and so allow PLAIN or LOGIN auth.

Unfortunately the company is on skeleton staff this week. Is there a reason you don't start with a more secure option and then work your way back? Or does MailMate not support GSSAPI and NTLM?

Nothing new should implement NTLM. Nothing that doesn't run on Windows should implement it unless supporting obsolete Windows tools is critical. It survives as a concession to older Windows tools that can't do GSSAPI/Kerberos. It is marginally more secure than plain text over unencrypted transport but only because replay is more obscure. GSSAPI support would be a nice feature, but it is a major addition to any client and wouldn't help you any if you are talking to the Exchange server from someplace where you can't reach your Kerberos infrastructure (which is common).


_______________________________________________
mailmate mailing list
[email protected]
http://lists.freron.com/listinfo/mailmate

Reply via email to