<div dir="ltr"><div>If you don't store cleartext passwords in your backend, how will an intruder get them??</div><div><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Tue, Oct 11, 2022 at 3:45 PM Serveria Support <<a href="mailto:support@serveria.com">support@serveria.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Yes, I realize that. But I can't think of a reason this password is <br>
necessary in the logs. It's kind of a backdoor and has to be removed <br>
from code. Why make intruder's life easier?<br>
<br>
On 2022-10-11 13:39, Arjen de Korte wrote:<br>
> Citeren Serveria Support <<a href="mailto:support@serveria.com" target="_blank">support@serveria.com</a>>:<br>
> <br>
>> Yes, there is a tiny problem letting the attacker change this value <br>
>> back to yes and instantly get access to users' passwords in plain <br>
>> text. Apart from that - no problems at all. :)<br>
> <br>
> If an attacker is able to modify your Dovecot configuration, you have<br>
> bigger problems than leaking your users' password. Much bigger...<br>
</blockquote></div><br clear="all"><div><br></div>-- <br><div dir="ltr" class="gmail_signature"><div dir="ltr"><div dir="ltr"><div>Best regards,<br>Odhiambo WASHINGTON,<br>Nairobi,KE<br>+254 7 3200 0004/+254 7 2274 3223<br>"<span style="font-size:12.8px">Oh, the cruft.</span><span style="font-size:12.8px">", </span><span style="font-size:12.8px">egrep -v '^$|^.*#' </span><span style="background-color:rgb(34,34,34);color:rgb(238,238,238);font-family:"Lucida Console",Consolas,"Courier New",monospace;font-size:13.6px">¯\_(ツ)_/¯</span><span style="font-size:12.8px"> :-)</span></div></div></div></div></div>