eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

210
active users

#roundcube

0 posts0 participants0 posts today
flo<p><span class="h-card" translate="no"><a href="https://wandzeitung.xyz/@halbwach" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>halbwach</span></a></span><span> <br>Hab mir gerade kurz mal das Webmail von disroot angeschaut: <br>Sie nutzen Roundcube, was verschiedene Skins anbietet, und "Elastic" gefällt mir schon richtig gut :) <br><br>Mal schauen, ob ich mir da eine Mail einrichte. <br>Auch die weiteren Services, wie Cloud, Cryptpad, usw. finde ich interessant. <br><br></span><a href="https://iceshrimp.de/tags/disroot" rel="nofollow noopener" target="_blank">#disroot</a><span> </span><a href="https://iceshrimp.de/tags/roundcube" rel="nofollow noopener" target="_blank">#roundcube</a><span> </span><a href="https://iceshrimp.de/tags/Email" rel="nofollow noopener" target="_blank">#Email</a><span><br><br></span><span class="h-card" translate="no"><a href="https://bildung.social/@_DigitalWriter_" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>_DigitalWriter_</span></a></span><span> </span><span class="h-card" translate="no"><a href="https://nrw.social/@GLenk" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GLenk</span></a></span></p>
flo<p><span>Vorhin sah ich eine Nachricht, die disroot empfohlen hat. <br><br></span><a href="https://disroot.org/en" rel="nofollow noopener" target="_blank">disroot.org/en</a><span> <br><br>Disroot ist eine niederländeische non-profit-foundation, die OpenSource-Dienste anbietet, und die angebotenen Services lesen sich ziemlich interessant: <br>- Email <br>- Cloud <br>- Audio <br>- Cryptpad <br>- XMPP <br>- Pads <br>- Bin <br>- Upload <br>- Search <br>- Calls <br>- Forgejo <br>- Akkoma <br>- Translate <br>- Scribe <br><br>Hab mich erst mal mit Email beschäftigt, da nutzen sie das OpenSource-Tool Roundcube, das mir einen guten Eindruck macht. <br><br></span><a href="https://roundcube.net/" rel="nofollow noopener" target="_blank">roundcube.net/</a><span> <br><br>Hab mir mal die Hintergründe von disroot angeschaut und ihr Mission Statement, was ich beides sehr interessant finde: <br><br></span><a href="https://disroot.org/en/about" rel="nofollow noopener" target="_blank">disroot.org/en/about</a><span> <br><br>Wie sind denn so eure Meinungen und Erfahhrungen zu disroot? <br><br></span><a href="https://iceshrimp.de/tags/disroot" rel="nofollow noopener" target="_blank">#disroot</a><span> </span><a href="https://iceshrimp.de/tags/roundcube" rel="nofollow noopener" target="_blank">#roundcube</a><span> </span><a href="https://iceshrimp.de/tags/email" rel="nofollow noopener" target="_blank">#email</a><span> </span><a href="https://iceshrimp.de/tags/EuropeanAlternative" rel="nofollow noopener" target="_blank">#EuropeanAlternative</a><span> </span><a href="https://iceshrimp.de/tags/UnplugTrump" rel="nofollow noopener" target="_blank">#UnplugTrump</a><span> </span><a href="https://iceshrimp.de/tags/UnplugUSA" rel="nofollow noopener" target="_blank">#UnplugUSA</a></p>
Piggleston Pecanpants<p>I switched my email hosting to Tuta and really like it but there is a lot of spam. I am certain it is not Tuta's fault and it will get better as I report it but it goes to show how good the spam detection at RoundCube was because I rarely got spam there. <br>(The RoundCube account was attached to my web host which went out of business. They gave me no means to keep the email.) <br><a href="https://mastodon.social/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a> <a href="https://mastodon.social/tags/Tuta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tuta</span></a> <a href="https://mastodon.social/tags/RoundCube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RoundCube</span></a> <a href="https://mastodon.social/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p>
:mastodon: decio<p>⚠️ Si vous administrez un Roundcube Webmail (v ≤ 1.6.10), c'est le moment de vérifier et appliquer les mises à jour.<br>⬇️ <br>Une vulnérabilité critique (CVE-2025-49113) permet une exécution de code à distance après login via désérialisation PHP mal sécurisée.</p><p>-&gt;Déjà exploitée et revendue sur forums cybercriminels.<br>-&gt;Service omniprésent proposé par défaut entre autres chez cPanel, Plesk, etc.<br>-&gt; Très utilisé dans des universités et institutions publiques.</p><p>Détails + PoC ici <br>👇 <br><a href="https://fearsoff.org/research/roundcube" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">fearsoff.org/research/roundcube</span><span class="invisible"></span></a><br>🛡 Versions corrigées : 1.6.11 / 1.5.10</p> <p>Roundcube stocke les sessions utilisateurs avec un système maison basé sur la sérialisation PHP (une manière d’enregistrer des objets dans des chaînes de texte).<br>Or, une faille dans la fonction qui lit ces sessions permet, si on est connecté, d’y injecter du code malveillant déguisé en objet PHP<br>Particularité : cette faille était cachée depuis plus de 10 ans. Le code vulnérable était minuscule (1 caractère mal interprété !) mais suffisait pour ouvrir une porte...</p><p>✅ Nécessite un login / compte logué/authentifié (mais des chaînes CSRF sont possibles)</p><p><a href="https://infosec.exchange/tags/Cyberveille" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberveille</span></a> <a href="https://infosec.exchange/tags/RoundCube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RoundCube</span></a> CVE_2025_49113</p>
The New Oil<p>Over 84,000 <a href="https://mastodon.thenewoil.org/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> instances vulnerable to actively exploited flaw</p><p><a href="https://www.bleepingcomputer.com/news/security/over-84-000-roundcube-instances-vulnerable-to-actively-exploited-flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/over-84-000-roundcube-instances-vulnerable-to-actively-exploited-flaw/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/RoundCube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RoundCube</span></a> Webmail&nbsp;and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/178843/hacking/u-s-cisa-adds-roundcube-erlang-erlang-flaws-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/178843/hac</span><span class="invisible">king/u-s-cisa-adds-roundcube-erlang-erlang-flaws-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
The New Oil<p>Hacker selling critical <a href="https://mastodon.thenewoil.org/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> <a href="https://mastodon.thenewoil.org/tags/webmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webmail</span></a> exploit as tech info disclosed</p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-selling-critical-roundcube-webmail-exploit-as-tech-info-disclosed/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hacker-selling-critical-roundcube-webmail-exploit-as-tech-info-disclosed/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Arne D. S. Haldorsen<p>Jeg har brukt epost med <a href="https://tutoteket.no/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> på <a href="https://tutoteket.no/tags/Domeneshop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Domeneshop</span></a> en stund nå, men vurderer å gå over til <span class="h-card" translate="no"><a href="https://mastodon.social/@protonprivacy" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>protonprivacy</span></a></span>.<br>Det har visst vært litt kontrovers rundt en uttalelse fra lederen der (se feks <a href="https://medium.com/@ovenplayer/does-proton-really-support-trump-a-deeper-analysis-and-surprising-findings-aed4fee4305e" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@ovenplayer/does-pr</span><span class="invisible">oton-really-support-trump-a-deeper-analysis-and-surprising-findings-aed4fee4305e</span></a>), men organisasjonen virker ikke akkurat som en ihugga MAGA-gjeng. Og produktene ser veldig gode ut.</p><p>Noen tanker? Eller erfaringer med eget domene på <a href="https://tutoteket.no/tags/ProtonMail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProtonMail</span></a>?<br><a href="https://tutoteket.no/tags/epost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>epost</span></a> <a href="https://tutoteket.no/tags/mail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mail</span></a> <a href="https://tutoteket.no/tags/proton" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proton</span></a></p>
Tod Beardsley<p>Update: And there’s a PoC from our pals at Project Discovery as a PR to Nuclei.</p><p>Fix your <a href="https://infosec.exchange/tags/RoundCube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RoundCube</span></a> stuff at your earliest convenience, plz.</p><p><a href="https://github.com/projectdiscovery/nuclei-templates/pull/12258" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/projectdiscovery/nu</span><span class="invisible">clei-templates/pull/12258</span></a></p>
Marco Ivaldi<p><a href="https://infosec.exchange/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> &lt;= 1.6.10 Post-Auth RCE via <a href="https://infosec.exchange/tags/PHP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHP</span></a> Object Deserialization <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> </p><p><a href="https://fearsoff.org/research/roundcube" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">fearsoff.org/research/roundcube</span><span class="invisible"></span></a></p>
Marcel SIneM(S)US<p>Angreifer können <a href="https://social.tchncs.de/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> Webmail mit Schadcode attackieren | Security <a href="https://www.heise.de/news/Kritische-Schadcode-Luecke-bedroht-Roundcube-Webmail-10423965.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Kritische-Schadc</span><span class="invisible">ode-Luecke-bedroht-Roundcube-Webmail-10423965.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/RoundcubeWebmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RoundcubeWebmail</span></a></p>
Tod Beardsley<p><a href="https://infosec.exchange/tags/RoundCube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RoundCube</span></a> bugs are nearly always a big deal. Pay attention to this one, CVE-2025-49113. I’d be surprised if a <a href="https://infosec.exchange/tags/PoC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoC</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> takes longer than a day or two to surface. </p><p>It does require the attacker to have an account, but that’s sometimes a pretty low barrier to entry (depending on the site).<br><a href="https://infosec.exchange/@securityaffairs/114624890006086560" translate="no" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@securityaffa</span><span class="invisible">irs/114624890006086560</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> Webmail under fire: critical exploit found after a decade<br><a href="https://securityaffairs.com/178615/hacking/roundcube-webmail-under-fire-critical-exploit-found-after-a-decade.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/178615/hac</span><span class="invisible">king/roundcube-webmail-under-fire-critical-exploit-found-after-a-decade.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
nicolas<p>pour celles et ceux qui ont déployé des roundcube il va falloir faire la mise à jour rapidement</p><p><a href="https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/06/crit</span><span class="invisible">ical-10-year-old-roundcube-webmail.html</span></a></p><p><a href="https://mastodon.mim-libre.fr/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://mastodon.mim-libre.fr/tags/messagerie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>messagerie</span></a> <a href="https://mastodon.mim-libre.fr/tags/webmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webmail</span></a> <a href="https://mastodon.mim-libre.fr/tags/courriel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>courriel</span></a> <a href="https://mastodon.mim-libre.fr/tags/roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>roundcube</span></a></p>
Neustradamus :xmpp: :linux:<p><a href="https://mastodon.social/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> 1.5.10 (<a href="https://mastodon.social/tags/LTS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LTS</span></a>) has been released (<a href="https://mastodon.social/tags/Webmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Webmail</span></a> / <a href="https://mastodon.social/tags/Mail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mail</span></a> / <a href="https://mastodon.social/tags/IMAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMAP</span></a> / <a href="https://mastodon.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMTP</span></a> / <a href="https://mastodon.social/tags/LDAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LDAP</span></a> / <a href="https://mastodon.social/tags/Managesieve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Managesieve</span></a> / <a href="https://mastodon.social/tags/PHP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHP</span></a> / <a href="https://mastodon.social/tags/MariaDB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MariaDB</span></a> / <a href="https://mastodon.social/tags/MySQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MySQL</span></a> / <a href="https://mastodon.social/tags/PostgreSQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostgreSQL</span></a> / <a href="https://mastodon.social/tags/SQLite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLite</span></a> / <a href="https://mastodon.social/tags/OracleDB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OracleDB</span></a> / <a href="https://mastodon.social/tags/MSSQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSSQL</span></a> / <a href="https://mastodon.social/tags/LongTermSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LongTermSupport</span></a>) <a href="https://roundcube.net/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">roundcube.net/</span><span class="invisible"></span></a></p>
Neustradamus :xmpp: :linux:<p><a href="https://mastodon.social/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> 1.6.11 (stable) has been released (<a href="https://mastodon.social/tags/Webmail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Webmail</span></a> / <a href="https://mastodon.social/tags/Mail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mail</span></a> / <a href="https://mastodon.social/tags/IMAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IMAP</span></a> / <a href="https://mastodon.social/tags/SMTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMTP</span></a> / <a href="https://mastodon.social/tags/LDAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LDAP</span></a> / <a href="https://mastodon.social/tags/Managesieve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Managesieve</span></a> / <a href="https://mastodon.social/tags/PHP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHP</span></a> / <a href="https://mastodon.social/tags/MariaDB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MariaDB</span></a> / <a href="https://mastodon.social/tags/MySQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MySQL</span></a> / <a href="https://mastodon.social/tags/PostgreSQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostgreSQL</span></a> / <a href="https://mastodon.social/tags/SQLite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLite</span></a> / <a href="https://mastodon.social/tags/OracleDB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OracleDB</span></a> / <a href="https://mastodon.social/tags/MSSQL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSSQL</span></a>) <a href="https://roundcube.net/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">roundcube.net/</span><span class="invisible"></span></a></p>
The New Oil<p>Spies hack high-value mail servers using an exploit from yesteryear</p><p><a href="https://arstechnica.com/security/2025/05/spies-hack-high-value-mail-servers-using-an-exploit-from-yesteryear/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">05/spies-hack-high-value-mail-servers-using-an-exploit-from-yesteryear/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://mastodon.thenewoil.org/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> <a href="https://mastodon.thenewoil.org/tags/MDaemon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MDaemon</span></a> <a href="https://mastodon.thenewoil.org/tags/Horde" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Horde</span></a> <a href="https://mastodon.thenewoil.org/tags/Zimbra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zimbra</span></a></p>
FF255 🇫🇷 🇪🇺<p><span class="h-card" translate="no"><a href="https://social.vivaldi.net/@ueeu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ueeu</span></a></span> You might like to include <span class="h-card" translate="no"><a href="https://nixnet.social/users/disroot" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>disroot</span></a></span> in your 2 lists (<a href="https://mastodon.tetaneutral.net/tags/Akkoma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Akkoma</span></a> is a part of <a href="https://mastodon.tetaneutral.net/tags/Fediverse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fediverse</span></a> social network, like <a href="https://mastodon.tetaneutral.net/tags/Mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mastodon</span></a>). <a href="https://mastodon.tetaneutral.net/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> <a href="https://mastodon.tetaneutral.net/tags/SearxNG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SearxNG</span></a></p>
🍒🌳 Hartmut Goebel<p>Problem mit <a href="https://nerdculture.de/tags/kolab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kolab</span></a> und <a href="https://nerdculture.de/tags/roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>roundcube</span></a>: Bei <a href="https://nerdculture.de/tags/CardDAV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CardDAV</span></a> gehen die Kategorien verloren.</p><p>Wenn ich vCards 3.0 über Roundcube importiere mit "Gruppenzuordnungen importieren: Alle (erstellen wenn nötig)", dann werden die Kategorien als Gruppen fein angelegt. Und wenn ich sie über Roundcube exportiere sind die Kategorien da. <br>Aber wenn ich mit CardBook dann auf das Adressbuch zugreife, bekomme ich keine Kategorien. (Probiert mit vCard-Format 3.0 und 4.0.)</p><p>Hat jemand Ideen, wie man das lösen könnte?</p><p>Leider ist das System beim Provider, so dass ich nicht selbst an der Konfig spielen kann.</p>
Jean-Christophe Dichant<p>Dis Mastodon ... Une alternative plus ergonomique et agréable à <a href="https://mastodon.social/tags/Roundcube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Roundcube</span></a> pour ma messagerie hébergée sur mon serveur, tu as des idées ?</p><p>Merci !</p>