services: dovecot: Rename auth-verbose-passwords?.

* gnu/services/mail.scm (dovecot-configuration)[auth-verbose-passwords?]:
Rename to auth-verbose-passwords, and change the type to a string, as this
parameter can take one of three string values.
* doc/guix.texi (Dovecot service): Update the corresponding documentation.
This commit is contained in:
Christopher Baines 2019-05-02 20:19:59 +01:00
parent 338defe0cb
commit 5b3d3cf71c
No known key found for this signature in database
GPG Key ID: 5E28A33B0B84F577
2 changed files with 4 additions and 4 deletions

View File

@ -15878,13 +15878,13 @@ failed.
Defaults to @samp{#f}. Defaults to @samp{#f}.
@end deftypevr @end deftypevr
@deftypevr {@code{dovecot-configuration} parameter} boolean auth-verbose-passwords? @deftypevr {@code{dovecot-configuration} parameter} string auth-verbose-passwords
In case of password mismatches, log the attempted password. Valid In case of password mismatches, log the attempted password. Valid
values are no, plain and sha1. sha1 can be useful for detecting brute values are no, plain and sha1. sha1 can be useful for detecting brute
force password attempts vs. user simply trying the same password over force password attempts vs. user simply trying the same password over
and over again. You can also truncate the value to n chars by appending and over again. You can also truncate the value to n chars by appending
":n" (e.g.@: sha1:6). ":n" (e.g.@: sha1:6).
Defaults to @samp{#f}. Defaults to @samp{"no"}.
@end deftypevr @end deftypevr
@deftypevr {@code{dovecot-configuration} parameter} boolean auth-debug? @deftypevr {@code{dovecot-configuration} parameter} boolean auth-debug?

View File

@ -806,8 +806,8 @@ standard facilities are supported.")
"Log unsuccessful authentication attempts and the reasons why they "Log unsuccessful authentication attempts and the reasons why they
failed.") failed.")
(auth-verbose-passwords? (auth-verbose-passwords
(boolean #f) (string "no")
"In case of password mismatches, log the attempted password. Valid "In case of password mismatches, log the attempted password. Valid
values are no, plain and sha1. sha1 can be useful for detecting brute values are no, plain and sha1. sha1 can be useful for detecting brute
force password attempts vs. user simply trying the same password over force password attempts vs. user simply trying the same password over