On my system the problem has stopped. Actually I do not know since when. But for the last couple of weeks I did not have any crashes anymore. Currently I am running kolab-saslauthd-0.9.0.8-2.85.el9.kolab_16.noarch.
Therefore I change the priority to low.
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
All Stories
Today
- Use stable Crypt_GPG release
Yesterday
Moved findConnectionsCollection after the netID check again
An test for the new route in tests/Feature/Controller/PolicyTest.php would be nice.
Tue, May 19
typo
I ran into this in testing
Mon, May 18
Fri, May 15
Thu, May 14
Roundcube 1.7 has it built-in https://github.com/roundcube/roundcubemail/blob/2e66510e2c4cf734a016befb02d96cef6bac12d4/program/include/rcmail_oauth.php#L1236. It also has support for "logout in cockpit should destroy OAuth tokens and client sessions" action (backchannel) https://github.com/roundcube/roundcubemail/blob/master/program/actions/login/oauth_backchannel.php.
Wed, May 13
I have a test available.
Use fast mode with otp mode and some cleanup
Tue, May 12
This is what prevents external clients from bypassing 2fa now, without attempting to make 2fa work for username+password. We still allow "config" scope tokens to bypass 2fa, which is operationally easier than a separate shared secret.
Cleanup
- Use x-client-ip
Having a single secret token that identifies Roundcube client and allows for user impersonation on config/webmail request only would probably be better. It would allow to skip /api/auth/login and directly call /api/v4/config/webmail, e.g. with Bearer <email>:<secret>. It would also eliminate any token refresh issues, as it would not have to be refreshed.
Fixup
Cleanup
Cleanup
Mon, May 11
- Remove TODO line