Good afternoon
  I use a  mailcow: dockerized mail server with an integrated container
SOGO. After the update, sogo stopped allowing users whose password hash was
generated using the {MD5} algorithm. Users whose password is generated by
{BLF-CRYPT} are authenticated normally. I turned on the logs, in the logs I
can see access to the database and retrieval of the password hash, but the
password is not accepted.

Dec 12 10:26:01 260deb884b40 2023-12-12 10:26:01.627 sogod[69:69]
<MySQL4Channel[0x0x5562e2feb2e0] connection=0x0x5562e2b3b230> SQL: SELECT
c_password FROM _sogo_static_view WHERE c_uid = 'pp_pet...@xx.xx';
Dec 12 10:26:01 260deb884b40 2023-12-12 10:26:01.627 sogod[69:69]
<MySQL4Channel[0x0x5562e2feb2e0] connection=0x0x5562e2b3b230>   query has
results, entering fetch-mode.
...
 SOGoRootPage Login from 'MY.IP.AD.DR' for user 'pp_pet...@xx.xx' might not
have worked - password policy: 65535  grace: -1  expire: -1  bound: 0

"c_password" field on  _sogo_static_view contains hash like:
 {MD5}ZVN1hovmmV34NCxjRKIDVw==
Base64 encoded MD5 hash

userPasswordAlg setting:
<key>userPasswordAlgoritm</key>
<string>ldap-md5</string>
i also try md5

What could be the problem? Plz  help me fix it

Reply via email to