Shane Chrisp wrote:
Ro Achterberg wrote:



You will need to enable plain text passwords in the database to be able to use cram-md5.

In dovecot-sql.conf, I tried setting default_pass_scheme to both PLAIN and PLAIN-MD5, but none of which seemed to work. I'm probably missing the point.

Did you perhaps mean to have vpopmail store the user passwords in plain text? I'm just checking, because to me it seems to lower security and it seems to defeat the purpose of working with hashed passwords. Could you please confirm this?

Yes, thats what I meant by my comment. You need the plain text passwords in the vpopmail database. Having plain text passwords in the database doesn't necessarily lower the security as your database can be on a host which is not accessable to anything by the authenticating machine.

Shane





cram-md5 is a bit outdated. It has two weaknesses, the first of which you've identified, which is that passwords need to be stored in plain text. This is unsuitable for some environments. The second weakness is md5 itself, which is vulnerable in a few different ways (see http://en.wikipedia.org/wiki/MD5).

I believe that currently the best approach to secure connections is to use TLS/SSL along with either plain or login authentication methods.

In dovecot.conf:
# Disable LOGIN command and all other plaintext authentications unless
# SSL/TLS is used (LOGINDISABLED capability). Note that if the remote IP
# matches the local IP (ie. you're connecting from the same computer), the
# connection is considered secure and plaintext authentication is allowed.
#disable_plaintext_auth = no
disable_plaintext_auth = yes

You'll also need to configure TLS/SSL.

--
-Eric 'shubes'


!DSPAM:4b22658132711495920358!

Reply via email to