Dovecot mail-crypt webmail can't read encrypted messages

Serveria Support support at serveria.com
Thu Oct 13 14:05:59 UTC 2022


Hi,

Unfortunately, after running autogen.sh and ./configure the file is 
still not there. I understand that this is not a Dovecot issue, but 
perhaps someone can help me with this?

On 2022-10-12 08:54, Bernardo Reino wrote:
> On Tue, 11 Oct 2022, Serveria Support wrote:
> 
>> I'm sorry but I wasn't able to find src/config/all-settings.c file. 
>> all-settings.h is there but all-settings.c is missing. I checked on 
>> Github (thought maybe some files failed to extract) and it's missing 
>> there too.
> 
> When building from git, you need to run ./autogen.sh first.
> ^^
> This is from the instructions in git (INSTALL.md).
> 
> This generates, among others, the file I mentioned.
> 
>> On 2022-10-11 22:15, Bernardo Reino wrote:
>>>  Please please stop top-posting. Makes a mess of everything!
>>> 
>>>  On Tue, 11 Oct 2022, Serveria Support wrote:
>>> 
>>>>  Ok, this is something... let me check...
>>>> 
>>>>  If you're you referring to these pieces of code:
>>>> 
>>>>  [...]
>>>> 
>>>>  I'm not a programmer, let alone a C guru, but these extracts
>>>>  look like password failure logging. Are you sure they are
>>>>  recording successful authentications for the logs?
>>> 
>>>  OK. I thought the code would be the same. I *do* log failed
>>>  passwords,
>>>  so I sort of thought only about that string ("given password: ").
>>> 
>>>  I enabled debug passwords on my server, to test, so I could see
>>>  how it
>>>  looks like in the log.
>>> 
>>>  The "keyword" in the code seems to be "hide_pass", so if you
>>>  search
>>>  for that in the code, you find a few instances where passwords
>>>  are
>>>  (selectively) removed/replaced in a given line of text.
>>> 
>>>  But at this point I think the easiest in this absurd (IMHO) quest
>>>  of
>>>  yours is to patch src/config/all-settings.c, and, around line
>>>  4141:
>>> 
>>>  static bool login_settings_check(void *_set, pool_t pool,
>>>  				 const char **error_r ATTR_UNUSED)
>>>  {
>>>   struct login_settings *set = _set;
>>> 
>>>   set->log_format_elements_split =
>>>    p_strsplit(pool, set->login_log_format_elements, " ");
>>> 
>>>  /* >>> INSERT HERE */
>>>  	set->auth_debug_passwords = FALSE;
>>>  /* */
>>> 
>>>   if (set->auth_debug_passwords)
>>>   	set->auth_debug = TRUE;
>>>   if (set->auth_debug)
>>>   	set->auth_verbose = TRUE;
>>>  	return TRUE;
>>>  }
>>> 
>>>  If I'm right, this will just turn off the flag whenever dovecot
>>>  checks
>>>  the settings, i.e. regardless of what's in the actual
>>>  dovecot.conf, so
>>>  it should do the trick.
>>> 
>>>  But at this point this feels like a useless homework assignment,
>>>  so I
>>>  think I'll stop (I used to be good with C, now I'm read/only, and
>>>  my
>>>  time is very limited).
>>> 
>>>  (I do make a mental note of having a statically linked dovecot
>>>  binary
>>>  with forced password debugging. You never know when/where you
>>>  might
>>>  need it ;-)
>>> 
>>>  Cheers and good luck,
>>>  Bernardo
>>> 
>>>>  On 2022-10-11 17:07, Bernardo Reino wrote:
>>>>>   On Mon, 10 Oct 2022, Serveria Support wrote:
>>>>> 
>>>>>>   I checked the source code on Github and discussed this with a
>>>>>>   C
>>>>>>   developer. There seem to be too many files... perhaps
>>>>>>   somebody can
>>>>>>  guide
>>>>>>   me where should I look? Aki?
>>>>> 
>>>>>   You should search for "given password" in the source.
>>>>> 
>>>>>   Hint:
>>>>>   src/auth/passdb-pam.c, around lines 175-178.
>>>>>   src/auth/auth-request.c, around lines 2311-2312.
>>>>> 
>>>>>   This is with the latest source (2.3.19.1).
>>>>> 
>>>>>   Cheers.
>>>>> 
>>>>>   PS: But as I noted, nothing prevents $HACKER from bringing
>>>>>   their own
>>>>>   dovecot (BYOD :) with all debugging options enabled, etc. As
>>>>>   others
>>>>>   have noted, if the intruder owns your server, you have lost.
>>>>>   Period.
>>>> 
>> 


More information about the dovecot mailing list