View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0006151 | SOGo | Backend General | public | 2025-10-08 14:59 | 2025-10-08 14:59 |
Reporter | the2nd | Assigned To | |||
Priority | normal | Severity | feature | Reproducibility | always |
Status | new | Resolution | open | ||
Platform | amd64 | OS | Ubuntu | OS Version | 22.04 |
Product Version | nightly master | ||||
Summary | 0006151: Dont reject authentication if password_hash != cached_password_hash | ||||
Description | Hello, i encountered the following issue. When authenticating sogo against OTPme (https://github.com/the2nd/otpme) via ldap with different token types (static password and OTP), the authentication with the second token fails with the following error: <0x0x55b150d6a790[SOGoDAVAuthenticator]> tried wrong password for user 'username'! The problem seems to be the following:
As a workaround i set SOGoCacheCleanupInterval = 1; which fixes the issue but puts a lot more load on the ldap server. So i would like to ask, if it would be possible to add a configuration parameter to control the behavior of sogo in case the request password (hash) does not match the cached password hash. Failing with "tried wrong password " makes it impossible to use sogo with different token types. So adding an option to change the behavior to "try ldap auth if password_hash != cached_hash" would fix the issue. I think the same error should appear, if a user tries to login shortly after changing its password, while the old password is still cached. But i have not tested it. Regards | ||||
Tags | No tags attached. | ||||
Date Modified | Username | Field | Change |
---|---|---|---|
2025-10-08 14:59 | the2nd | New Issue |