How to modify Roundcube Webmail login password for MD5 encryption in iRedMail

Posted on 2011-04-25
Last Modified: 2013-12-15
Dear All,

We have written code for MD5 encryption and we send the encrypted password for storing in LDAP. How do we modify or generate MD5 encryption for the user keyed in password in Roundcube webmail to authenticate the users

Your help in this regard is highly appreciated.
Question by:anilkumar_bks
    LVL 31

    Expert Comment

    Are you trying to manually generate the password on the shell or through your code/script.  If so what language are you using?  Do you know the file where you have to modify the password?

    Author Comment

    we have built a mobile application for registering the users. In the application we use MD5 encryption to encrypt the password and pass the encrypted data for registering the user in LDAP.

    Now the problem is when we open roundcube webmail for accessing email the users types in his password, since the stored password in LDAP is encrypted we are not able to login.

    We do not know the files to modify in Roundcube webmail.

    Request your help in this regard.

    Accepted Solution

    I found the solution.

    Answer is. Locate index.php file. it is located in the root folder /usr/share/apache2/roundcubemail/index.php

    open the file and write your own code here to modify the user password for MD5 encryption.

    Find the line // try to log in

    and this below line of code for md5 encryption
    if (!empty($_POST['_pass']))

    LVL 27

    Expert Comment

    This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Security Threats Are You Missing?

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
    It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
    Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
    Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now