[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Newbie question on client Auth and SSL
When I compile OpenLDAP with OpenSSL libraries present, does it enforces SSL
utilization from then on?
I'm experiencing the following: I've setup my server and have it working
fine. I can search (anonymous binding) and add entries using Manager
credentials. However, I can't search with a different binding, nor can I
authenticate using pam_auth (from Squid) thats the "only" application I need
working with ldap right now. I issue the following:
(sorry for level -1 log, but I don't know which level would suffice)
############ REMOTE HOST
[root@andromeda local]# pam_auth -n squid_ldap
adriela 123456
ERR
############ SERVER - /var/log/slapd.log
Oct 29 14:16:45 srvoracle slapd[21877]: daemon: added 6r
Oct 29 14:16:45 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: new connection on 9
Oct 29 14:16:56 srvoracle slapd[21877]: conn=0 fd=9 ACCEPT from
IP=10.10.0.253:1128 (IP=0.0.0.0:389)
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: added 9r
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on:
Oct 29 14:16:56 srvoracle slapd[21877]:
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on:
Oct 29 14:16:56 srvoracle slapd[21877]: 9r
Oct 29 14:16:56 srvoracle slapd[21877]:
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: read activity on 9
Oct 29 14:16:56 srvoracle slapd[21877]: connection_get(9)
Oct 29 14:16:56 srvoracle slapd[21877]: connection_get(9): got
connid=0
Oct 29 14:16:56 srvoracle slapd[21877]: connection_read(9): checking
for input on id=0
Oct 29 14:16:56 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable)
Oct 29 14:16:56 srvoracle slapd[21877]: do_bind
Oct 29 14:16:56 srvoracle slapd[21877]: >>> dnPrettyNormal: <>
Oct 29 14:16:56 srvoracle slapd[21877]: <<< dnPrettyNormal: <>, <>
Oct 29 14:16:56 srvoracle slapd[21877]: do_bind: version=3 dn=""
method=128
Oct 29 14:16:56 srvoracle slapd[21877]: conn=0 op=0 BIND dn=""
method=128
Oct 29 14:16:56 srvoracle slapd[21877]: send_ldap_result: conn=0
op=0 p=3
Oct 29 14:16:56 srvoracle slapd[21877]: send_ldap_result: err=0
matched="" text=""
Oct 29 14:16:56 srvoracle slapd[21877]: send_ldap_response: msgid=1
tag=97 err=0
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on:
Oct 29 14:16:56 srvoracle slapd[21877]: 9r
Oct 29 14:16:56 srvoracle slapd[21877]:
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: read activity on 9
Oct 29 14:16:56 srvoracle slapd[21877]: connection_get(9)
Oct 29 14:16:56 srvoracle slapd[21877]: connection_get(9): got
connid=0
Oct 29 14:16:56 srvoracle slapd[21877]: connection_read(9): checking
for input on id=0
Oct 29 14:16:56 srvoracle slapd[21877]: connection_input: conn=0
deferring operation: binding
Oct 29 14:16:56 srvoracle slapd[21877]: conn=0 op=0 RESULT tag=97
err=0 text=
Oct 29 14:16:56 srvoracle slapd[21877]: do_bind: v3 anonymous bind
Oct 29 14:16:56 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:16:56 srvoracle slapd[21877]: do_search
Oct 29 14:16:56 srvoracle slapd[21877]: >>> dnPrettyNormal:
<dc=calu,dc=com,dc=br>
Oct 29 14:16:56 srvoracle slapd[21877]: <<< dnPrettyNormal:
<dc=calu,dc=com,dc=br>, <dc=calu,dc=com,dc=br>
Oct 29 14:16:56 srvoracle slapd[21877]: SRCH "dc=calu,dc=com,dc=br"
2 0
Oct 29 14:16:56 srvoracle slapd[21877]: 1 0 0
Oct 29 14:16:56 srvoracle slapd[21877]: begin get_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: end get_filter 0
Oct 29 14:16:56 srvoracle slapd[21877]: filter: (uid=adriela)
Oct 29 14:16:56 srvoracle slapd[21877]: attrs:
Oct 29 14:16:56 srvoracle slapd[21877]:
Oct 29 14:16:56 srvoracle slapd[21877]: conn=0 op=1 SRCH
base="dc=calu,dc=com,dc=br" scope=2 deref=0 filter="(uid=adriela)"
Oct 29 14:16:56 srvoracle slapd[21877]: ==> limits_get: conn=0 op=1
dn="[anonymous]"
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_search
Oct 29 14:16:56 srvoracle slapd[21877]:
bdb_dn2entry("dc=calu,dc=com,dc=br")
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000001
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: search_candidates:
base="dc=calu,dc=com,dc=br" (0x00000001) scope=2
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2idl(
"dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_filter_candidates
Oct 29 14:16:56 srvoracle slapd[21877]: ^IAND
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_list_candidates 0xa0
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_filter_candidates
Oct 29 14:16:56 srvoracle slapd[21877]: ^IOR
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_list_candidates 0xa1
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_filter_candidates
Oct 29 14:16:56 srvoracle slapd[21877]: ^IEQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_equality_candidates
(objectClass)
Oct 29 14:16:56 srvoracle slapd[21877]: => key_read
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_idl_fetch_key:
[b49d1940]
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_index_read: failed
(-30990)
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_equality_candidates:
id=0, first=0, last=0
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_filter_candidates:
id=0 first=0 last=0
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_filter_candidates
Oct 29 14:16:56 srvoracle slapd[21877]: ^IEQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_equality_candidates
(uid)
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_equality_candidates:
(uid) index_param failed (18)
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_filter_candidates:
id=-1 first=1 last=104
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_list_candidates:
id=-1 first=1 last=104
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_filter_candidates:
id=-1 first=1 last=104
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_list_candidates:
id=-1 first=1 last=104
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_filter_candidates:
id=-1 first=1 last=104
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search_candidates: id=-1
first=1 last=104
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 1 does not match
filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"cn=ldapsync,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(cn=ldapsync,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"cn=ldapsync,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000002
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"cn=Manager,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(cn=Manager,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"cn=manager,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000003
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "cn=Manager,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 3 does not match
filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000004
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 4 does not match
filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"ou=Geral,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(ou=Geral,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"ou=geral,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000005
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "ou=Geral,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 5 does not match
filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=root,ou=Geral,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=root,ou=Geral,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=root,ou=geral,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000006
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=root,ou=Geral,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 6 does not match
filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=bin,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=bin,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=bin,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000008
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=bin,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 8 does not match
filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=daemon,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=daemon,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=daemon,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000009
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=daemon,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 9 does not match
filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=adm,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=adm,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=adm,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000a
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=adm,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 10 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=lp,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=lp,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=lp,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000b
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=lp,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 11 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=sync,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=sync,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=sync,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000c
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=sync,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 12 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=shutdown,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=shutdown,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=shutdown,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000d
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=shutdown,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 13 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=halt,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=halt,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=halt,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000e
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=halt,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 14 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=mail,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=mail,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=mail,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000f
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=mail,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 15 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=news,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=news,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=news,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000010
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=news,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 16 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=uucp,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=uucp,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=uucp,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000011
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=uucp,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 17 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=operator,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=operator,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=operator,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000012
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=operator,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 18 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=games,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=games,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=games,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000013
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=games,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 19 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=gopher,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=gopher,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=gopher,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000014
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=gopher,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 20 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=ftp,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=ftp,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=ftp,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000015
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=ftp,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 21 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=nobody,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=nobody,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=nobody,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000016
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=nobody,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 22 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=rpm,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=rpm,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=rpm,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000017
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=rpm,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 23 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=vcsa,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=vcsa,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=vcsa,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000018
Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=vcsa,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 24 does not
match filter
Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=nscd,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=nscd,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=nscd,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000019
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=nscd,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 25 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=sshd,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=sshd,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=sshd,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001a
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=sshd,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 26 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=rpc,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=rpc,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=rpc,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001b
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=rpc,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 27 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=rpcuser,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=rpcuser,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=rpcuser,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001c
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=rpcuser,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 28 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=nfsnobody,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=nfsnobody,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=nfsnobody,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001d
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=nfsnobody,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 29 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=mailnull,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=mailnull,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=mailnull,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001e
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=mailnull,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 30 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=smmsp,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=smmsp,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=smmsp,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001f
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=smmsp,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 31 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=pcap,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=pcap,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=pcap,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000020
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=pcap,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 32 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=apache,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=apache,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=apache,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000021
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=apache,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 33 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=xfs,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=xfs,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=xfs,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000022
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=xfs,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 34 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=named,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=named,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=named,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000023
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=named,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 35 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=ntp,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=ntp,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=ntp,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000024
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=ntp,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 36 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=gdm,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=gdm,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=gdm,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000025
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=gdm,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 37 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=desktop,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=desktop,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=desktop,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000026
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=desktop,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 38 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=netdump,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=netdump,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=netdump,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000027
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=netdump,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 39 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=oracle,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=oracle,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=oracle,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000028
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=oracle,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 40 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=marcor,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=marcor,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=marcor,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000029
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=marcor,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 41 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=eltonc,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=eltonc,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=eltonc,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000002a
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=eltonc,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 42 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000002b
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 6
Oct 29 14:16:57 srvoracle slapd[21877]: => send_search_entry:
dn="uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "entry" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "cn" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "objectClass"
requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "userPassword"
requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "shadowLastChange"
requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "shadowMax"
requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "shadowWarning"
requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "uidNumber"
requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "gidNumber"
requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "homeDirectory"
requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "gecos" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: conn=0 op=1 ENTRY
dn="uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <= send_search_entry
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=anar,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=anar,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=anar,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000002c
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=anar,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 44 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=balanca,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=balanca,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=balanca,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000002d
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=balanca,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested
Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5
Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 45 does not
match filter
Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=cassiov,ou=usuarios,dc=calu,dc=com,dc=br"
Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=cassiov,ou=usuarios,dc=calu,dc=com,dc=br)
Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=cassiov,ou=usuarios,dc=calu,dc=com,dc=br" )
Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000002e
Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter
Oct 29 14:16:57 srvoracle slapd[21877]: EQUALITY
...
Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: conn=0
op=1 p=3
Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: err=0
matched="" text=""
Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_response: msgid=2
tag=101 err=0
Oct 29 14:16:58 srvoracle slapd[21877]: conn=0 op=1 SEARCH RESULT
tag=101 err=0 nentries=1 text=
Oct 29 14:16:58 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:16:58 srvoracle slapd[21877]: daemon: activity on:
Oct 29 14:16:58 srvoracle slapd[21877]: 9r
Oct 29 14:16:58 srvoracle slapd[21877]:
Oct 29 14:16:58 srvoracle slapd[21877]: daemon: read activity on 9
Oct 29 14:16:58 srvoracle slapd[21877]: connection_get(9)
Oct 29 14:16:58 srvoracle slapd[21877]: connection_get(9): got
connid=0
Oct 29 14:16:58 srvoracle slapd[21877]: connection_read(9): checking
for input on id=0
Oct 29 14:16:58 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable)
Oct 29 14:16:58 srvoracle slapd[21877]: do_bind
Oct 29 14:16:58 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:16:58 srvoracle slapd[21877]: >>> dnPrettyNormal:
<uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br>
Oct 29 14:16:58 srvoracle slapd[21877]: <<< dnPrettyNormal:
<uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br>,
<uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br>
Oct 29 14:16:58 srvoracle slapd[21877]: do_bind: version=3
dn="uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" method=128
Oct 29 14:16:58 srvoracle slapd[21877]: conn=0 op=2 BIND
dn="uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" method=128
Oct 29 14:16:58 srvoracle slapd[21877]: ==> bdb_bind: dn:
uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br
Oct 29 14:16:58 srvoracle slapd[21877]:
bdb_dn2entry("uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br")
Oct 29 14:16:58 srvoracle slapd[21877]: => access_allowed: auth
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "userPassword"
requested
Oct 29 14:16:58 srvoracle slapd[21877]: => access_allowed: backend
default auth access granted to "(anonymous)"
Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: conn=0
op=2 p=3
Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: err=49
matched="" text=""
Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_response: msgid=3
tag=97 err=49
Oct 29 14:16:58 srvoracle slapd[21877]: conn=0 op=2 RESULT tag=97
err=49 text=
Oct 29 14:16:58 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:16:58 srvoracle slapd[21877]: daemon: activity on:
Oct 29 14:16:58 srvoracle slapd[21877]: 9r
Oct 29 14:16:58 srvoracle slapd[21877]:
Oct 29 14:16:58 srvoracle slapd[21877]: daemon: read activity on 9
Oct 29 14:16:58 srvoracle slapd[21877]: connection_get(9)
Oct 29 14:16:58 srvoracle slapd[21877]: connection_get(9): got
connid=0
Oct 29 14:16:58 srvoracle slapd[21877]: connection_read(9): checking
for input on id=0
Oct 29 14:16:58 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable)
Oct 29 14:16:58 srvoracle slapd[21877]: do_bind
Oct 29 14:16:58 srvoracle slapd[21877]: >>> dnPrettyNormal: <>
Oct 29 14:16:58 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:16:58 srvoracle slapd[21877]: <<< dnPrettyNormal: <>, <>
Oct 29 14:16:58 srvoracle slapd[21877]: do_bind: version=3 dn=""
method=128
Oct 29 14:16:58 srvoracle slapd[21877]: conn=0 op=3 BIND dn=""
method=128
Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: conn=0
op=3 p=3
Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: err=0
matched="" text=""
Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_response: msgid=4
tag=97 err=0
Oct 29 14:16:58 srvoracle slapd[21877]: conn=0 op=3 RESULT tag=97
err=0 text=
Oct 29 14:16:58 srvoracle slapd[21877]: do_bind: v3 anonymous bind
Oct 29 14:17:05 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:17:05 srvoracle slapd[21877]: daemon: activity on:
Oct 29 14:17:05 srvoracle slapd[21877]: 9r
Oct 29 14:17:05 srvoracle slapd[21877]:
Oct 29 14:17:05 srvoracle slapd[21877]: daemon: read activity on 9
Oct 29 14:17:05 srvoracle slapd[21877]: connection_get(9)
Oct 29 14:17:05 srvoracle slapd[21877]: connection_get(9): got
connid=0
Oct 29 14:17:05 srvoracle slapd[21877]: connection_read(9): checking
for input on id=0
Oct 29 14:17:05 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=0 (Success)
Oct 29 14:17:05 srvoracle slapd[21877]: connection_read(9): input
error=-2 id=0, closing.
Oct 29 14:17:05 srvoracle slapd[21877]: connection_closing: readying
conn=0 sd=9 for close
Oct 29 14:17:05 srvoracle slapd[21877]: connection_close: conn=0
sd=9
Oct 29 14:17:05 srvoracle slapd[21877]: daemon: removing 9
Oct 29 14:17:05 srvoracle slapd[21877]: conn=0 fd=9 closed
Oct 29 14:17:05 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:17:05 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:17:05 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
############ REMOTE HOST
[root@andromeda local]# ldapsearch -Uadriela -b
"dc=calu,dc=com,dc=br" "(uid=adriela)"
SASL/DIGEST-MD5 authentication started
Please enter your password:
ldap_sasl_interactive_bind_s: Can't contact LDAP server
[root@andromeda local]#
############ SERVER - /var/log/slapd.log
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: new connection on 9
Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 fd=9 ACCEPT from
IP=10.10.0.253:1129 (IP=0.0.0.0:389)
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: added 9r
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on:
Oct 29 14:42:16 srvoracle slapd[21877]:
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on:
Oct 29 14:42:16 srvoracle slapd[21877]: 9r
Oct 29 14:42:16 srvoracle slapd[21877]:
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: read activity on 9
Oct 29 14:42:16 srvoracle slapd[21877]: connection_get(9)
Oct 29 14:42:16 srvoracle slapd[21877]: connection_get(9): got
connid=1
Oct 29 14:42:16 srvoracle slapd[21877]: connection_read(9): checking
for input on id=1
Oct 29 14:42:16 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable)
Oct 29 14:42:16 srvoracle slapd[21877]: do_search
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:42:16 srvoracle slapd[21877]: >>> dnPrettyNormal: <>
Oct 29 14:42:16 srvoracle slapd[21877]: <<< dnPrettyNormal: <>, <>
Oct 29 14:42:16 srvoracle slapd[21877]: SRCH "" 0 0
Oct 29 14:42:16 srvoracle slapd[21877]: 0 0 0
Oct 29 14:42:16 srvoracle slapd[21877]: begin get_filter
Oct 29 14:42:16 srvoracle slapd[21877]: PRESENT
Oct 29 14:42:16 srvoracle slapd[21877]: end get_filter 0
Oct 29 14:42:16 srvoracle slapd[21877]: filter: (objectClass=*)
Oct 29 14:42:16 srvoracle slapd[21877]: attrs:
Oct 29 14:42:16 srvoracle slapd[21877]: supportedSASLMechanisms
Oct 29 14:42:16 srvoracle slapd[21877]:
Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 op=0 SRCH base=""
scope=0 deref=0 filter="(objectClass=*)"
Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 op=0 SRCH
attr=supportedSASLMechanisms
Oct 29 14:42:16 srvoracle slapd[21877]: => test_filter
Oct 29 14:42:16 srvoracle slapd[21877]: PRESENT
Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: search
access to "" "objectClass" requested
Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)"
Oct 29 14:42:16 srvoracle slapd[21877]: <= test_filter 6
Oct 29 14:42:16 srvoracle slapd[21877]: => send_search_entry: dn=""
Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: read
access to "" "entry" requested
Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: read
access to "" "supportedSASLMechanisms" requested
Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)"
Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 op=0 ENTRY dn=""
Oct 29 14:42:16 srvoracle slapd[21877]: <= send_search_entry
Oct 29 14:42:16 srvoracle slapd[21877]: send_ldap_result: conn=1
op=0 p=3
Oct 29 14:42:16 srvoracle slapd[21877]: send_ldap_result: err=0
matched="" text=""
Oct 29 14:42:16 srvoracle slapd[21877]: send_ldap_response: msgid=1
tag=101 err=0
Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 op=0 SEARCH RESULT
tag=101 err=0 nentries=1 text=
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on:
Oct 29 14:42:16 srvoracle slapd[21877]: 9r
Oct 29 14:42:16 srvoracle slapd[21877]:
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: read activity on 9
Oct 29 14:42:16 srvoracle slapd[21877]: connection_get(9)
Oct 29 14:42:16 srvoracle slapd[21877]: connection_get(9): got
connid=1
Oct 29 14:42:16 srvoracle slapd[21877]: connection_read(9): checking
for input on id=1
Oct 29 14:42:16 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable)
Oct 29 14:42:16 srvoracle slapd[21877]: do_bind
Oct 29 14:42:16 srvoracle slapd[21877]: >>> dnPrettyNormal: <>
Oct 29 14:42:16 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:42:16 srvoracle slapd[21877]: <<< dnPrettyNormal: <>, <>
Oct 29 14:42:16 srvoracle slapd[21877]: do_sasl_bind: dn () mech
DIGEST-MD5
Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 op=1 BIND dn=""
method=163
Oct 29 14:42:16 srvoracle slapd[21877]: ==> sasl_bind: dn=""
mech=DIGEST-MD5 datalen=0
Oct 29 14:42:16 srvoracle slapd[21877]: SASL [conn=1] Debug:
DIGEST-MD5 server step 1
Oct 29 14:42:16 srvoracle slapd[21877]: send_ldap_sasl: err=14
len=182
Oct 29 14:42:16 srvoracle slapd[21877]: send_ldap_response: msgid=2
tag=97 err=14
Oct 29 14:42:16 srvoracle slapd[21877]: <== slap_sasl_bind: rc=14
Oct 29 14:42:19 srvoracle slapd[21877]: daemon: activity on 1
descriptors
Oct 29 14:42:19 srvoracle slapd[21877]: daemon: activity on:
Oct 29 14:42:19 srvoracle slapd[21877]: 9r
Oct 29 14:42:19 srvoracle slapd[21877]:
Oct 29 14:42:19 srvoracle slapd[21877]: daemon: read activity on 9
Oct 29 14:42:19 srvoracle slapd[21877]: connection_get(9)
Oct 29 14:42:19 srvoracle slapd[21877]: connection_get(9): got
connid=1
Oct 29 14:42:19 srvoracle slapd[21877]: connection_read(9): checking
for input on id=1
Oct 29 14:42:19 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable)
Oct 29 14:42:19 srvoracle slapd[21877]: do_bind
Oct 29 14:42:19 srvoracle slapd[21877]: >>> dnPrettyNormal: <>
Oct 29 14:42:19 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL
Oct 29 14:42:19 srvoracle slapd[21877]: <<< dnPrettyNormal: <>, <>
Oct 29 14:42:19 srvoracle slapd[21877]: do_sasl_bind: dn () mech
DIGEST-MD5
Oct 29 14:42:19 srvoracle slapd[21877]: conn=1 op=2 BIND dn=""
method=163
Oct 29 14:42:19 srvoracle slapd[21877]: ==> sasl_bind: dn=""
mech=<continuing> datalen=277
Oct 29 14:42:19 srvoracle slapd[21877]: SASL [conn=1] Debug:
DIGEST-MD5 server step 2
Oct 29 14:42:19 srvoracle slapd[21877]: SASL Canonicalize [conn=1]:
authcid="adriela"
Oct 29 14:42:19 srvoracle slapd[21877]: slap_sasl_getdn: id=adriela
[len=7]
Oct 29 14:42:19 srvoracle slapd[21877]: slap_sasl_getdn: u:id
converted to uid=adriela,cn=DIGEST-MD5,cn=auth
Oct 29 14:42:19 srvoracle slapd[21877]: >>> dnNormalize:
<uid=adriela,cn=DIGEST-MD5,cn=auth>
Oct 29 14:42:19 srvoracle slapd[21877]: <<< dnNormalize:
<uid=adriela,cn=digest-md5,cn=auth>
Oct 29 14:42:19 srvoracle slapd[21877]: ==>slap_sasl2dn: converting
SASL name uid=adriela,cn=digest-md5,cn=auth to a DN
Oct 29 14:42:19 srvoracle slapd[21877]: slap_sasl_regexp: converting
SASL name uid=adriela,cn=digest-md5,cn=auth
Oct 29 14:42:19 srvoracle slapd[21877]: <==slap_sasl2dn: Converted
SASL name to <nothing>
Oct 29 14:42:19 srvoracle slapd[21877]: SASL Canonicalize [conn=1]:
slapAuthcDN="uid=adriela,cn=digest-md5,cn=auth"
In fact, I don't know if I'm in front of two different problems or a single
one, because of the bolded message in the log file (ber_get_next on fd 9
failed errno=11 (Resource temporarily unavailable) ).
As the remote message was about connection error to server, I thought it
could be related to SSL. But I've compiled OpenLDAP with SSL support ***just
in case*** I'd need it in the future. So I didn't create or setup OpenSSL
server. Is it related to the problem? And other question: anybody knows
which log level I can use to debug those "authentication" problems?
Regards,
Bruno.
--
Internal Virus Database is out-of-date.
Checked by AVG Anti-Virus (http://www.grisoft.com).
Version: 7.0.279 / Virus Database: 264.10.2 - Release Date: 08/10/04