I'm not an expert at this, I just read other sources that make
suggestions. I have no strong comparison of SHA2 and PBKDF2. So my "<<"
may be exaggerated. The most important points today seem to be
resilience against GPU and ASIC attacks. Those devices have only little
memory to work with. SHA2
In case you are interested,
https://wiki.dovecot.org/HowTo/ConvertPasswordSchemes
By the way, I am bit sceptical that CRYPT-SHA512 is less secure than PBKDF2.
CRYPT-SHA512 is not "just" SHA512(salt||password), it does at least 1000 rounds
of hashing in similar way as PBKDF2 does. So, what is yo
Thank you for your reply.
It's not that simple, though. Just because some core algorithms are
standardised and should be compatible doesn't mean their use in
different implementations leads to interoperable data. The key point
here seems to be that Dovecot just supports SHA-1 with PBKDF2, not
Hi,
not testet but for a fast solution I think this should work:
- stop dovecot/postfix
- mv "/var/vmail" to the "/newspace/".
- create a symlink which points from "/var/vmail" to "/newspace/vmail".
- start dovecot/postfix
Regards
Urban
Am 28.08.2020 um 16:35 schrieb Voytek Eymont:
I have a s
> On 29/08/2020 17:05 Marc Roos wrote:
>
>
> Is it possible to rsync some repo that has centos7 2.3.11?
>
> http://repo.dovecot.org/ce-2.3-latest/centos/7/RPMS/x86_64/2.3.11.3-3_ce/
You could try reposync instead?
Aki
> On 29/08/2020 23:49 Yves Goergen wrote:
>
>
> Hello,
>
> I'm setting up a new server and, again, seek for a decently secure (from
> a security specialist's POV) way to store and verify user passwords in a
> database. Additionally now, GDPR requires me to use a solid
> state-of-the-art s
I have had this imaptest[1] stall. I compared this command with what you
have on the website and I was a bit surprised that what is on the
website is working. What I have noticed is that if you remove this msgs
argument, the imaptest stalls. I am not sure if this is according to
design, but