Hello all,

Good news, Cyrus SASL now supports:
- SCRAM-SHA-1
- SCRAM-SHA-1-PLUS
- SCRAM-SHA-224
- SCRAM-SHA-224-PLUS
- SCRAM-SHA-256
- SCRAM-SHA-256-PLUS
- SCRAM-SHA-384
- SCRAM-SHA-384-PLUS
- SCRAM-SHA-512
- SCRAM-SHA-512-PLUS
-> https://cyrusimap.org/sasl/sasl/authentication_mechanisms.html
-> https://github.com/cyrusimap/cyrus-sasl/commits/master

It is possible to add "compatibility" with?

I see on the github, a lot of informations about old unsecure passwords: 
CRAM-MD5 and DIGEST-MD5, please note that:
- CRAM-MD5: https://tools.ietf.org/html/draft-ietf-sasl-crammd5-to-historic-00 
CRAM-MD5 to Historic, 20 November 2008
- DIGEST-MD5: https://tools.ietf.org/html/rfc6331 Moving DIGEST-MD5 to 
Historic, July 2011

So why it is not sha1 minimum?

-> https://github.com/vdukhovni/postfix/search?p=1&q=md5&type=&utf8=%E2%9C%93

Can you add 
SCRAM-SHA-1(-PLUS)/SCRAM-SHA-224(-PLUS)/SCRAM-SHA-256(-PLUS)/SCRAM-SHA-384(-PLUS)/SCRAM-SHA-512(-PLUS)
 here:
- 
https://github.com/vdukhovni/postfix/blob/master/postfix/README_FILES/SASL_README
- 
https://github.com/vdukhovni/postfix/blob/master/postfix/proto/SASL_README.html
- https://github.com/vdukhovni/postfix/blob/master/postfix/html/SASL_README.html

In the same time, it does not work:
- http://postfix.org/
- https://postfix.org/
- https://www.postfix.org/

Thanks in advance.

Regards,

Neustradamus

Reply via email to