AbnormalHumanBeing

joined 4 days ago
[–] AbnormalHumanBeing@lemmy.abnormalbeings.space 6 points 1 hour ago (2 children)

When I was still smoking, I always forgot my little portable ashtray, so I did this a lot. My pants were abysmally smelly - but I can't stand cigarette littering.

 

cross-posted from: https://lemmy.abnormalbeings.space/post/62732

GodotSteam tutorials for Godot/Steamworks SDK interfacing

 

EDIT: Okay, after some more testing and such, I think something I did yesterday evening in a sleepy stupor must have borked things even more. Now, the mailserver seems to not accept any emails sent to it, but it can still send outbound mails. I will try more stuff today to find out what the hell I managed to mess up yesterday - you are still welcome to give some advice to the original problem, though.

So, this has been a headscratcher for me ever since I began setting up my own Fediverse stuff here. It's on a dedicated Server, running Debian 12. I followed a guide to install and set up a mailserver with dovecot - and it seems to work fine, generally. I can connect to it with Thunderbird, the PeerTube server can connect to it (I still have to update the Lemmy SMTP-config) - but if I try to mail one of my users, the address remains case-sensitive.

So:
Expected behaviour - mails are delivered to both AbnormalHumanDev@abnormalbeings.space, as well as abnormalhumandev@abnormalbeings.space

Actual behaviour - mails to the former result in a "Undelivered Mail returned to sender", with "User doesn't exist" as the server answer, while the latter address works fine.

Dovecot version:
# dovecot --version
2.3.19.1 (9b53102964)

My config file in /etc/dovecot/conf.d/10-auth.conf:

##
## Authentication processes
##

# Disable LOGIN command and all other plaintext authentications unless
# SSL/TLS is used (LOGINDISABLED capability). Note that if the remote IP
# matches the local IP (ie. you're connecting from the same computer), the
# connection is considered secure and plaintext authentication is allowed.
# See also ssl=required setting.
disable_plaintext_auth = yes

# Authentication cache size (e.g. 10M). 0 means it's disabled. Note that
# bsdauth and PAM require cache_key to be set for caching to be used.
#auth_cache_size = 0
# Time to live for cached data. After TTL expires the cached record is no
# longer used, *except* if the main database lookup returns internal failure.
# We also try to handle password changes automatically: If user's previous
# authentication was successful, but this one wasn't, the cache isn't used.
# For now this works only with plaintext authentication.
#auth_cache_ttl = 1 hour
# TTL for negative hits (user not found, password mismatch).
# 0 disables caching them completely.
#auth_cache_negative_ttl = 1 hour

# Space separated list of realms for SASL authentication mechanisms that need
# them. You can leave it empty if you don't want to support multiple realms.
# Many clients simply use the first one listed here, so keep the default realm
# first.
#auth_realms =

# Default realm/domain to use if none was specified. This is used for both
# SASL realms and appending @domain to username in plaintext logins.
#auth_default_realm = 

# List of allowed characters in username. If the user-given username contains
# a character not listed in here, the login automatically fails. This is just
# an extra check to make sure user can't exploit any potential quote escaping
# vulnerabilities with SQL/LDAP databases. If you want to allow all characters,
# set this value to empty.
auth_username_chars = abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ01234567890.-_@

# Username character translations before it's looked up from databases. The
# value contains series of from -> to characters. For example "#@/@" means
# that '#' and '/' characters are translated to '@'.
#auth_username_translation =

# Username formatting before it's looked up from databases. You can use
# the standard variables here, eg. %Lu would lowercase the username, %n would
# drop away the domain if it was given, or "%n-AT-%d" would change the '@' into
# "-AT-". This translation is done after auth_username_translation changes.
auth_username_format = %Lu

# If you want to allow master users to log in by specifying the master
# username within the normal username string (ie. not using SASL mechanism's
# support for it), you can specify the separator character here. The format
# is then <username><separator><master username>. UW-IMAP uses "*" as the
# separator, so that could be a good choice.
#auth_master_user_separator =

# Username to use for users logging in with ANONYMOUS SASL mechanism
#auth_anonymous_username = anonymous

# Maximum number of dovecot-auth worker processes. They're used to execute
# blocking passdb and userdb queries (eg. MySQL and PAM). They're
# automatically created and destroyed as needed.
#auth_worker_max_count = 30

# Host name to use in GSSAPI principal names. The default is to use the
# name returned by gethostname(). Use "$ALL" (with quotes) to allow all keytab
# entries.
#auth_gssapi_hostname =

# Kerberos keytab to use for the GSSAPI mechanism. Will use the system
# default (usually /etc/krb5.keytab) if not specified. You may need to change
# the auth service to run as root to be able to read this file.
#auth_krb5_keytab = 

# Do NTLM and GSS-SPNEGO authentication using Samba's winbind daemon and
# ntlm_auth helper. <doc/wiki/Authentication/Mechanisms/Winbind.txt>
#auth_use_winbind = no

# Path for Samba's ntlm_auth helper binary.
#auth_winbind_helper_path = /usr/bin/ntlm_auth

# Time to delay before replying to failed authentications.
#auth_failure_delay = 2 secs

# Require a valid SSL client certificate or the authentication fails.
#auth_ssl_require_client_cert = no

# Take the username from client's SSL certificate, using 
# X509_NAME_get_text_by_NID() which returns the subject's DN's
# CommonName. 
#auth_ssl_username_from_cert = no

# Space separated list of wanted authentication mechanisms:
#   plain login digest-md5 cram-md5 ntlm rpa apop anonymous gssapi otp
#   gss-spnego
# NOTE: See also disable_plaintext_auth setting.
auth_mechanisms = plain login

##
## Password and user databases
##

#
# Password database is used to verify user's password (and nothing more).
# You can have multiple passdbs and userdbs. This is useful if you want to
# allow both system users (/etc/passwd) and virtual users to login without
# duplicating the system users into virtual database.
#
# <doc/wiki/PasswordDatabase.txt>
#
# User database specifies where mails are located and what user/group IDs
# own them. For single-UID configuration use "static" userdb.
#
# <doc/wiki/UserDatabase.txt>

#!include auth-deny.conf.ext
#!include auth-master.conf.ext

!include auth-system.conf.ext
#!include auth-sql.conf.ext
#!include auth-ldap.conf.ext
#!include auth-passwdfile.conf.ext
#!include auth-checkpassword.conf.ext
#!include auth-static.conf.ext

If needed, I can of course also provide other config files. I haven't found much else as a solution, besides changing the auth_username_format value here, which also seemed intuitive to me.

I have also since tried restarting the service, restarting the server, searching more on Duck Duck Go and only finding the same solution.

Have I maybe accidentally edited a template config file instead of a live one? That was a guess I had, but then I couldn't find much about that when searching for it.

Thanks in advance for your time!

(Also, if anyone knows good guides to get my mailserver compliant with gmail and other big mail services, DKIM and such, that will be my next project)

Eine belegte Gurke mit Gurke... 🎶

[–] AbnormalHumanBeing@lemmy.abnormalbeings.space 1 points 1 day ago (3 children)

I understand concerns about fragmentation, but recently, I have been more and more in favour of "why not both" as an approach. Basically: One de-facto "central" community, and many local communities. Main reason being, that this will help the Fediverse grow without losing it's "soul" so to speak. Where - hopefully eventually - there will be those central communities with a reddit-like experience for the topic, and then also local ones, where smaller communities around the topic, without the traps of large, "mainstream" communites, can form.

[–] AbnormalHumanBeing@lemmy.abnormalbeings.space 26 points 1 day ago (2 children)

Basically: Resident enfranchisement. It's weird, when people born in our country and having lived here their whole life can't vote outside of local elections. My own father, for example, had a Dutch background, and was never allowed to vote in federal elections until his death. (Neither he nor I even spoke/speak a single phrase of Dutch)

Yes, things have gotten somewhat better and easier with applications for citizenship, but that there are hurdles like that to begin with, is a bit.... weird.

[–] AbnormalHumanBeing@lemmy.abnormalbeings.space 14 points 1 day ago (1 children)

archive.ph - link without registration wall

The investments are being placed through opaque structures known as special-purpose vehicles, which have the benefit of concealing the investors’ identities, to avoid the ire of US authorities and companies wary of Chinese capital during a nadir in relations between the two countries.

Asset managers behind the deals have told investors that the entities are specifically designed to avoid disclosure. The use of special-purpose vehicles in financing is commonplace and there is nothing illegal about the arrangements.

Still, it raises concerns about the potential for undue influence and conflicts of interest at a time when Musk has unprecedented involvement in US policy, politics and business.

Funnily enough, to me personally, there are more questions about what this means concerning Chinese politics and conflicts of interests in the future. The country is not without its own tensions, after all.

The inflow of Chinese capital into Musk’s business empire is primarily profit-driven and has little to do with technology transfer or influencing public policy, according to people involved in the transactions.

With a sluggish domestic economy, wealthy Chinese are looking abroad for investment opportunities.

To me, personally, it serves as a reminder that no amount of red flags waved or social-democratic laws saying "wealth is going to serve the interests of the working class" makes a country communist, only material realities can.

[–] AbnormalHumanBeing@lemmy.abnormalbeings.space 28 points 1 day ago (22 children)

Don't choose Germany, though, we (and a lot of nations, actually) still for some reason have citizenship-by-blood/heritage laws more or less straight out of the 19th century, not citizenship-by-birthplace laws.

[–] AbnormalHumanBeing@lemmy.abnormalbeings.space 24 points 1 day ago* (last edited 1 day ago) (9 children)

Funnily enough, I had never gotten one on my old account which was >4 years old on .ml - but after I made this one on my own instance, in less than a day, I finally got one.

Sadly, as I'm not from the US, it would not really help me (in fact, make it harder). Funnily enough, Iceland was actually occupied by the US during World War II - which they did pre-emptively, worrying the Nazis may pull off another stunt like with Norway and endanger shipping from there if they don't.

[–] AbnormalHumanBeing@lemmy.abnormalbeings.space 5 points 1 day ago (3 children)

God damn, if I had the money, I'd escape to Iceland. Has been a dream for a long time now, but it just gets more and more desirable.

It's a simple choice, really, considering how many hours I managed to invest as a kid:

[–] AbnormalHumanBeing@lemmy.abnormalbeings.space 3 points 1 day ago* (last edited 1 day ago)

Hmm, I wonder if that value for the UK ~2005 is just a statistical artefact, or if something culturally happened to temporarily create more homophobia in the late 90s/early2000s.

(Same but less pronounced US ~2010, but that looks more definitely like an artefact to me)

Literally viewing the world like a EU4 map painting player would

view more: next ›