Installing and Setup
(windows) g_authent_process "c:\surgemail\nwauth.exe -path c:\surgemail"
(linux) g_authent_process "./nwauth"
Optional Command Line Options:
| -path | Tells NWAuth where to create it's logfile and where to find it's config file. |
| -debug | Sets the logging level to debug. |
| -log | turns on logging to nwauth.log. |
| -logpass | testing option, log full command as given (includes password!) |
| -readonly | Use on slaves that don't need to update files. |
| -encrypt user/all | |
| -generate n | Creates accounters test0..testn passwords test. |
| -size x | Sets max size of nwauth.add. |
| -sleep x y | Testing option, sleep for y seconds first and every xth response |
| drop_path <hash> <base> | Testing option, give drop path using DPOP hashing, hash=0,1,2, base is common drop path |
| -badchar <string> | Overrides default bad character list with the string |
| -badchar_localpart <string> | Overrides default localpart (before the @) bad character list with the string |
| -allowats | Disables check for more than one '@' symbol in username |
| -allowhighascii | Disables check for high and low ascii in username |
| -nocrypt | Store passwords as plain text (security risk) |
| -decrypt | Decrypt passwords as users login. (security risk) |
| -showpass | Show password on lookups (security risk!) |
Error recovery - recover lost users.
In the event of loosing some users from the database for any unknown reason (deleting a file manually etc) you can rebuild the user database like this using the journal entries it keeps.
# First copy nwauth.* files
mkdir backup
copy nwauth.* backup
# Then use this command to get a list of changes it will make:
nwauth -path . -test
# Then run it with -fix to actually add the missing users:
nwauth -path . -fix
Supported Commands
The commands below are the list of commands that this module supports.
| Command | Parameters |
|---|---|
| check | <user> <pass> |
| lookup | <user> |
| set | <user> <pass>|(NULL) [label="value"] |
| del | <user> |
| search | <string> [-from n] [-max m] |
| help | |
| quit | |
| exit |
To make passwords visible in admin
Obviously this is not recommended as it is a security risk, but on a small or home server this may be worth doing:
Use these two settings
g_authent_process "c:\surgemail\nwauth.exe -path c:\surgemail -nocrypt -decrypt -showpass"
g_authent_info name="Password" field="password" access="admin" default="" type=""
