Dňa 26. septembra 2022 18:05:32 UTC používateľ Eric Grammatico via Exim-users <exim-users@exim.org> napísal:
>2022-09-26 16:15:24 [10] 1ocotI-00000A-0g <= #xxxyyyy'uuss+...@grammatico.me >H=(localhost) [45.123.190.53] P=esmtpsa X=TLS1.2:AES256-GCM-SHA384:256 CV=no >A=login_server:#xxxyyyy'uuss+zzz S=736 ... >login_server: > driver = plaintext > public_name = LOGIN > server_condition = ${run{/bin/sh -c "echo -e '$auth1\n$auth2' | >/usr/sbin/pwauth"}{1}{0}} > server_set_id = $auth1 > server_prompts = <| Username: | Password: >Looks like the user #xxxyyyy'uuss+zzz is authenticated, but for sure it >doesn't exist in my /etc/passwd, neither /etc/shadow Did you try to pass that user to your script with random password? Did you try to pass that server_condition expansion through exim -be with that user? Anyway, passing user input to script is not safe, notice that login name contains the aphostrophe char, which breaks your quotation, duno how it is interpreted... Why you do not use pam{} expansion? regards -- Slavko https://www.slavino.sk/ -- ## List details at https://lists.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://wiki.exim.org/