On Fri, 2005-04-01 at 09:39, Bart McFarling wrote: > RPM install on Fedora Core 3 > Trying to get Open-xchange up and running. > I get the following error message: > ldap_bind: Can't contact LDAP server (-1) > > slapd -d99 or -d whatever doesnt have error errno in it anywhere in it's > output. > any ldap* command gives this. Im sure its something small that im > missing. > Im not an openldap guru- this makes about the 5th time ive tried to get > an > openldap server up and running unsucessfully. > > Any help is appreciated. > > maybe my problem is is that im installing using spanish instructions > and i dont speak 3 words of spanish :) > > below are what i believe to be my relevant files ive messed with. > > [root@bartlap share]# ldapsearch -x -b 'dc=intermodalcartage,dc=com' > '(objectclass=*)' > ldap_bind: Can't contact LDAP server (-1) > > [root@bartlap share]# ps -eaf | egrep "slap|ldap" > ldap 16435 1 0 17:27 ? 00:00:00 /usr/sbin/slapd -u ldap > -h > ldap:/// > root 16441 3281 0 17:27 pts/1 00:00:00 egrep slap|ldap > -- > [root@bartlap share]# nmap localhost > > Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2005-03-31 17:28 > CST > Interesting ports on localhost.localdomain (127.0.0.1): > (The 1650 ports scanned but not shown below are in state: closed) > PORT STATE SERVICE > 22/tcp open ssh > 25/tcp open smtp > 80/tcp open http > 110/tcp open pop3 > 111/tcp open rpcbind > 143/tcp open imap > 389/tcp open ldap > -- > [root@bartlap share]# cat /etc/hosts.allow > # > # hosts.allow This file describes the names of the hosts which are > # allowed to use the local INET services, as decided > # by the '/usr/sbin/tcpd' server. > # > ALL:127.0.0.1 > slapd = 127.0.0.1 > -- > [root@bartlap share]# cat /etc/openldap/slapd.conf > # > # See slapd.conf(5) for details on configuration options. > # This file should NOT be world readable. > # > include /etc/openldap/schema/core.schema > include /etc/openldap/schema/cosine.schema > include /etc/openldap/schema/inetorgperson.schema > include /etc/openldap/schema/nis.schema > > # Allow LDAPv2 client connections. This is NOT the default. > allow bind_v2 > > # Do not enable referrals until AFTER you have a working directory > # service AND an understanding of referrals. > #referral ldap://root.openldap.org > > pidfile /var/run/slapd.pid > argsfile /var/run/slapd.args > > # Load dynamic backend modules: > # modulepath /usr/sbin/openldap > # moduleload back_bdb.la > # moduleload back_ldap.la > # moduleload back_ldbm.la > # moduleload back_passwd.la > # moduleload back_shell.la > > # The next three lines allow use of TLS for encrypting connections using > a > # dummy test certificate which you can generate by changing to > # /usr/share/ssl/certs, running "make slapd.pem", and fixing permissions > on > # slapd.pem so that the ldap user or group can read it. Your client > software > # may balk at self-signed certificates, however. > # TLSCACertificateFile /usr/share/ssl/certs/ca-bundle.crt > # TLSCertificateFile /usr/share/ssl/certs/slapd.pem > # TLSCertificateKeyFile /usr/share/ssl/certs/slapd.pem > > # Sample security restrictions > # Require integrity protection (prevent hijacking) > # Require 112-bit (3DES or better) encryption for updates > # Require 63-bit encryption for simple bind > # security ssf=1 update_ssf=112 simple_bind=64 > > # Sample access control policy: > # Root DSE: allow anyone to read it > # Subschema (sub)entry DSE: allow anyone to read it > # Other DSEs: > # Allow self write access > # Allow authenticated users read access > # Allow anonymous users to authenticate > # Directives needed to implement policy: > # access to dn.base="" by * read > # access to dn.base="cn=Subschema" by * read > # access to * > # by self write > # by users read > # by anonymous auth > # > # if no access controls are present, the default policy > # allows anyone and everyone to read anything but restricts > # updates to rootdn. (e.g., "access to * by * read") > # > # rootdn can always read and write EVERYTHING! > > ####################################################################### > # ldbm and/or bdb database definitions > ####################################################################### > > database ldbm > #suffix "dc=my-domain,dc=com" > #rootdn "cn=Manager,dc=my-domain,dc=com" > # Cleartext passwords, especially for the rootdn, should > # be avoided. See slappasswd(8) and slapd.conf(5) for details. > # Use of strong authentication encouraged. > # rootpw secret > # rootpw {crypt}ijFYNcSNctBYg > > # The database directory MUST exist prior to running slapd AND > # should only be accessible by the slapd and slap tools. > # Mode 700 recommended. > directory /var/lib/ldap > > # Indices to maintain for this database > #index objectClass eq,pres > #index ou,cn,mail,surname,givenname eq,pres,sub > #index uidNumber,gidNumber,loginShell eq,pres > #index uid,memberUid eq,pres,sub > #index nisMapName,nisMapEntry eq,pres,sub > > # Replicas of this database > #replogfile /var/lib/ldap/openldap-master-replog > #replica host=ldap-1.example.com:389 starttls=critical > # bindmethod=sasl saslmech=GSSAPI > # authcId=host/ldap-master.example.com@EXAMPLE.COM > include /usr/local/ox/share/openxchange.schema > > suffix "dc=intermodalcartage,dc=com" > rootdn "cn=Manager,dc=intermodalcartage,dc=com" > rootpw secret > > index > uid,mailEnabled,cn,sn,givenname,lnetMailAccess,alias,loginDestination > eq,sub > --- > [root@bartlap share]# cat /etc/openldap/ldap.conf > # > # LDAP Defaults > # > > # See ldap.conf(5) for details > # This file should be world readable but not world writable. > > #BASE dc=example, dc=com > #URI ldap://localhost > > #SIZELIMIT 12 > #TIMELIMIT 15 > #DEREF never > BASE dc=intermodalcartage,dc=com > HOST localhost > -- > [root@bartlap share]# ls -last /var/lib/ldap/ > total 156 > 8 drwx------ 2 ldap ldap 4096 Mar 31 16:49 . > 12 -rw------- 1 ldap ldap 8192 Mar 31 16:49 alias.dbb > 12 -rw------- 1 ldap ldap 8192 Mar 31 16:49 cn.dbb > 20 -rw------- 1 ldap ldap 16384 Mar 31 16:49 dn2id.dbb > 12 -rw------- 1 ldap ldap 8192 Mar 31 16:49 givenName.dbb > 36 -rw------- 1 ldap ldap 32768 Mar 31 16:49 id2entry.dbb > 12 -rw------- 1 ldap ldap 8192 Mar 31 16:49 mailEnabled.dbb > 12 -rw------- 1 ldap ldap 8192 Mar 31 16:49 nextid.dbb > 12 -rw------- 1 ldap ldap 8192 Mar 31 16:49 sn.dbb > 12 -rw------- 1 ldap ldap 8192 Mar 31 16:49 uid.dbb > 8 drwxr-xr-x 22 root root 4096 Mar 31 15:36 .. > -- Does a 'telnet localhost 389' give you a connection? Do you have iptables runing? Sam
Attachment:
signature.asc
Description: This is a digitally signed message part