From: xyon <xy...@in...> - 2007-04-03 21:06:07
|
Good day to everyone, I am having a hard time getting pam_mysql to work with a custom database. Here is some information: Code: =20 # grep -v ^# /var/opt/scalix/sx/s/sys/pam.d/ual.remote=20 =20 auth sufficient /lib/security/pam_mysql.so \=20 user=3Dscalix passwd=3Dmypass \=20 host=3D127.0.0.1 db=3Dstaging table=3Dusers \=20 usercolumn=3Dscalix passwdcolumn=3Dpwd \=20 crypt=3D0 verbose=3D1=20 auth required pam_deny=20 =20 account required om_auth=20 password required om_auth nullok=20 /var/log/secure:=20 Code: =20 Apr 2 17:24:45 scalix in.imap41d: pam_mysql - SELECT pwd FROM users WHERE scalix =3D 'UserTestscalixTest User'=20 Apr 2 17:24:45 scalix in.imap41d: pam_mysql - SELECT returned no result.=20 Apr 2 17:24:45 scalix in.imap41d: pam_mysql - pam_mysql_check_passwd() returning 1.=20 Apr 2 17:24:45 scalix in.imap41d: pam_mysql - pam_sm_authenticate() returning 10.=20 =20 Code: =20 mysql> SELECT pwd FROM users WHERE scalix =3D 'UserTestscalixTest User';=20 +------+=20 | pwd |=20 +------+=20 | test |=20 +------+=20 1 row in set (0.00 sec)=20 =20 mysql>=20 =20 As you can see running the query manually brings back results, but it appears it doesn't when run from pam_mysql. Perhaps I have a misconfiguration in the ual.remote file? The ual.remote file is used by Scalix to login web/imap/pop users. Is there a way to test pam_mysql without scalix being involved so I can narrow down the culprits? Thanks, --=20 xyon ------------------------------------------------------------------------- "They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." --Benjamin Franklin ------------------------------------------------------------------------- |