Hello all, Good news, Cyrus SASL now supports: - SCRAM-SHA-1 - SCRAM-SHA-1-PLUS - SCRAM-SHA-224 - SCRAM-SHA-224-PLUS - SCRAM-SHA-256 - SCRAM-SHA-256-PLUS - SCRAM-SHA-384 - SCRAM-SHA-384-PLUS - SCRAM-SHA-512 - SCRAM-SHA-512-PLUS -> https://cyrusimap.org/sasl/sasl/authentication_mechanisms.html -> https://github.com/cyrusimap/cyrus-sasl/commits/master
It is possible to add "compatibility" with? I see on the github, a lot of informations about old unsecure passwords: CRAM-MD5 and DIGEST-MD5, please note that: - CRAM-MD5: https://tools.ietf.org/html/draft-ietf-sasl-crammd5-to-historic-00 CRAM-MD5 to Historic, 20 November 2008 - DIGEST-MD5: https://tools.ietf.org/html/rfc6331 Moving DIGEST-MD5 to Historic, July 2011 So why it is not sha1 minimum? -> https://github.com/vdukhovni/postfix/search?p=1&q=md5&type=&utf8=%E2%9C%93 Can you add SCRAM-SHA-1(-PLUS)/SCRAM-SHA-224(-PLUS)/SCRAM-SHA-256(-PLUS)/SCRAM-SHA-384(-PLUS)/SCRAM-SHA-512(-PLUS) here: - https://github.com/vdukhovni/postfix/blob/master/postfix/README_FILES/SASL_README - https://github.com/vdukhovni/postfix/blob/master/postfix/proto/SASL_README.html - https://github.com/vdukhovni/postfix/blob/master/postfix/html/SASL_README.html In the same time, it does not work: - http://postfix.org/ - https://postfix.org/ - https://www.postfix.org/ Thanks in advance. Regards, Neustradamus