[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Bind failing with "critical extension is unavailable" error when used with pagedresultscontrol
- To: "openldap-technical@openldap.org" <openldap-technical@openldap.org>
- Subject: Bind failing with "critical extension is unavailable" error when used with pagedresultscontrol
- From: "Cannady, Mike" <mike.cannady@htcinc.net>
- Date: Tue, 18 Dec 2012 20:41:31 -0000
- Accept-language: en-US
- Content-language: en-US
- Thread-index: Ac3dXed2Ijoo2caHTcqVKyrdEhY/dw==
- Thread-topic: Bind failing with "critical extension is unavailable" error when used with pagedresultscontrol
I have a program that works with Microsoft LDAP that I'm trying to get to work with openldap. The program is from a third-party and I have NO access to the code. I was able to duplicate the behavior with Perl code (testPaged.pl) later in this email.
The bind is to a domain that uses the BDB backend. If my test code ignores the error from bind, it does the paged results just fine. The problem is the third-party program stops if it sees the error in bind. I've captured network traffic to the Microsoft LDAP server and see that it generates NO error.
The version I'm running is: [root@radius1 openldap]# slapd -V
@(#) $OpenLDAP: slapd 2.4.23 (Jul 31 2012 10:47:00) $
mockbuild@x86-001.build.bos.redhat.com:/builddir/build/BUILD/openldap-2.4.23/openldap-2.4.23/build-servers/servers/slapd
Is this a bug? I have the perl code, the debug run of the perl code, the slapd.d structure, dumps of the olcDatabase entries, and the results of "slapd -d -1" output.
##==============================================================testPaged.pl
[mcannady@vmHTCradius1 ldap]$ cat testPaged.pl
use Net::LDAP;
use Net::LDAP::Control::Paged;
use Net::LDAP::Constant qw( LDAP_CONTROL_PAGED );
##################################
sub ProcessSearch {
my ( $msg, $result ) = @_;
## Nothing to do
return if ( ! defined($result) );
if ( $result->isa("Net::LDAP::Reference") ) {
## a reference... just mention it.
} else {
$result->dump( );
print "\n";
}
}
#####################################
$ldap = Net::LDAP->new( "radius1.pbx.htc.internal" );
$page = Net::LDAP::Control::Paged->new( size => 10 , critical => true );
$mesg = $ldap->bind( "uid=NuPoint,dc=htc,dc=com",
password => "XXXXXXX[redacted]XXXXXXXXXXX" ,
control => [ $page ]
);
if ( $mesg->code ) {
## print error
print "error on bind: ", $mesg->error(), "\n";
return;
}
@args = ( base => "cn=Users,dc=htc,dc=com",
scope => "subtree",
filter => "(objectClass=user)",
callback => \&ProcessSearch, # Call this sub for each entry
control => [ $page ],
);
my $cookie;
while(1) {
# Perform search
my $mesg = $ldap->search( @args );
# Only continue on LDAP_SUCCESS
$mesg->code and last;
# Get cookie from paged control
my($resp) = $mesg->control( LDAP_CONTROL_PAGED ) or last;
$cookie = $resp->cookie or last;
# Set cookie in paged control
$page->cookie($cookie);
}
if ($cookie) {
# We had an abnormal exit, so let the server know we do not want any more
$page->cookie($cookie);
$page->size(0);
$ldap->search( @args );
}
[mcannady@vmHTCradius1 ldap]$
##================================================================ perl debug-mode test
[mcannady@vmHTCradius1 ldap]$ perl -d testPaged.pl
Loading DB routines from perl5db.pl version 1.32
Editor support available.
Enter h or `h h' for help, or `man perldebug' for more help.
main::(testPaged.pl:20): $ldap = Net::LDAP->new( "radius1.pbx.htc.internal" );
DB<1> n
main::(testPaged.pl:22): $page = Net::LDAP::Control::Paged->new( size => 10 , critical => true );
DB<1> n
main::(testPaged.pl:24): $mesg = $ldap->bind( "uid=NuPoint,dc=htc,dc=com",
main::(testPaged.pl:25): password => "XXXXXXXXX[redacted]XXXXXX" ,
main::(testPaged.pl:26): control => [ $page ]
main::(testPaged.pl:27): );
DB<1> n
main::(testPaged.pl:28): if ( $mesg->code ) {
DB<1> n
main::(testPaged.pl:30): print "error on bind: ", $mesg->error(), "\n";
DB<1> n
error on bind: critical extension is unavailable
main::(testPaged.pl:31): return;
##======================================================================================
[root@radius1 slapd.d]# find . -print
.
./cn=config.ldif
./cn=config
./cn=config/cn=include{1}.ldif
./cn=config/cn=schema
./cn=config/cn=schema/cn={1}cosine.ldif
./cn=config/cn=schema/cn={4}ad.ldif
./cn=config/cn=schema/cn={2}inetorgperson.ldif
./cn=config/cn=schema/cn={3}nis.ldif
./cn=config/cn=schema/cn={0}core.ldif
./cn=config/cn=include{3}.ldif
./cn=config/olcDatabase={1}bdb.ldif
./cn=config/olcDatabase={2}bdb.ldif
./cn=config/olcDatabase={0}config.ldif
./cn=config/cn=schema.ldif
./cn=config/cn=include{2}.ldif
./cn=config/cn=include{0}.ldif
./cn=config/olcDatabase={3}monitor.ldif
./cn=config/olcDatabase={-1}frontend.ldif
##=======================================================================================
======================================================== cat olcDatabase={0}config.ldif
dn: olcDatabase={0}config
objectClass: olcDatabaseConfig
olcDatabase: {0}config
olcLastMod: TRUE
olcMaxDerefDepth: 15
olcReadOnly: FALSE
olcRootDN: cn=admin,cn=config
olcRootPW:: XXXredactedXXX
structuralObjectClass: olcDatabaseConfig
entryUUID: ac0d8a60-c861-1031-9bd4-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
entryCSN: 20121121195915Z#000000#00#000000
modifiersName: cn=config
modifyTimestamp: 20121121195915Z
======================================================== cat olcDatabase={1}bdb.ldif
dn: olcDatabase={1}bdb
objectClass: olcDatabaseConfig
objectClass: olcBdbConfig
olcDatabase: {1}bdb
olcSuffix: dc=htc,dc=com
olcAccess: {0}to * by dn.base="uid=push-master,cn=nupointproxy,dc=internal" w
rite by * +0 break
olcAccess: {1}to dn.base="" by * read
olcAccess: {2}to dn.base="cn=subschema" by * read
olcAccess: {3}to dn.subtree="cn=monitor" by users read by * none
olcAccess: {4}to * by self write by * read
olcLastMod: TRUE
olcMaxDerefDepth: 15
olcReadOnly: FALSE
olcRootPW:: XXXXXXXXXXXXXXXXXXXXredactedXXXXXXXXXXXX
olcDbDirectory: /var/lib/ldap/htc.com
olcDbCacheSize: 150000
olcDbCheckpoint: 102400 1
olcDbConfig: {0}set_cachesize 0 268435465 1
olcDbConfig: {1}set_lg_bsize 2097152
olcDbConfig: {2}set_lg_regionmax 262144
olcDbConfig: {3}set_flags DB_LOG_AUTOREMOVE
olcDbNoSync: TRUE
olcDbDirtyRead: FALSE
olcDbIDLcacheSize: 150000
olcDbIndex: objectClass pres,eq
olcDbIndex: cn pres,eq,sub
olcDbIndex: ou pres,eq,sub
olcDbIndex: mail pres,eq,sub
olcDbIndex: sn pres,eq,sub
olcDbIndex: givenName pres,eq,sub
olcDbLinearIndex: FALSE
olcDbMode: 384
olcDbSearchStack: 16
olcDbShmKey: 12321
olcDbCacheFree: 1
structuralObjectClass: olcBdbConfig
entryUUID: ac0da28e-c861-1031-9bd5-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
olcRootDN: uid=Manager,dc=htc,dc=com
olcUpdateDN: uid=Push-Master,cn=NupointProxy,dc=internal
entryCSN: 20121212180425.846656Z#000000#000#000000
modifiersName: cn=admin,cn=config
modifyTimestamp: 20121212180425Z
======================================================== cat olcDatabase={-1}frontend.ldif
dn: olcDatabase={-1}frontend
objectClass: olcDatabaseConfig
objectClass: olcFrontendConfig
olcDatabase: {-1}frontend
olcLastMod: TRUE
olcMaxDerefDepth: 0
olcReadOnly: FALSE
olcSchemaDN: cn=Subschema
structuralObjectClass: olcDatabaseConfig
entryUUID: ac0d771e-c861-1031-9bd3-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
olcTimeLimit: unlimited
olcSizeLimit: unlimited
entryCSN: 20121214201101.233668Z#000000#000#000000
modifiersName: cn=admin,cn=config
modifyTimestamp: 20121214201101Z
======================================================== cat olcDatabase={2}bdb.ldif
dn: olcDatabase={2}bdb
objectClass: olcDatabaseConfig
objectClass: olcBdbConfig
olcDatabase: {2}bdb
olcSuffix: dc=internal
olcAddContentAcl: FALSE
olcLastMod: TRUE
olcMaxDerefDepth: 15
olcReadOnly: FALSE
olcRootDN: cn=admin,cn=config
olcSyncUseSubentry: FALSE
olcMonitoring: TRUE
olcDbDirectory: /var/lib/ldap/htc.internal
olcDbCacheSize: 1000
olcDbCheckpoint: 100 63
olcDbNoSync: FALSE
olcDbDirtyRead: FALSE
olcDbIDLcacheSize: 0
olcDbLinearIndex: FALSE
olcDbMode: 0600
olcDbSearchStack: 16
olcDbShmKey: 0
olcDbCacheFree: 1
olcDbDNcacheSize: 0
structuralObjectClass: olcBdbConfig
entryUUID: 92ff370e-dcc9-1031-8a59-533cee5baf07
creatorsName: cn=config
createTimestamp: 20121217191324Z
entryCSN: 20121217191324.652465Z#000000#000#000000
modifiersName: cn=config
modifyTimestamp: 20121217191324Z
======================================================== cat olcDatabase={3}monitor.ldif
dn: olcDatabase={3}monitor
objectClass: olcDatabaseConfig
olcDatabase: {3}monitor
olcAddContentAcl: FALSE
olcLastMod: TRUE
olcMaxDerefDepth: 15
olcReadOnly: FALSE
olcSyncUseSubentry: FALSE
olcMonitoring: FALSE
structuralObjectClass: olcDatabaseConfig
entryUUID: 54da1e50-d8df-1031-85bf-235d062b63b6
creatorsName: cn=config
createTimestamp: 20121212193904Z
entryCSN: 20121212193904.665758Z#000000#000#000000
modifiersName: cn=config
modifyTimestamp: 20121212193904Z
========================================================
Script started on Tue 18 Dec 2012 01:56:28 PM EST
[root@radius1 openldap]# slapd -u ldap -d -1
@(#) $OpenLDAP: slapd 2.4.23 (Jul 31 2012 10:47:00) $
mockbuild@x86-001.build.bos.redhat.com:/builddir/build/BUILD/openldap-2.4.23/openldap-2.4.23/build-servers/servers/slapd
ldap_pvt_gethostbyname_a: host=radius1.pbx.htc.internal, r=0
daemon_init: <null>
daemon_init: listen on ldap:///
daemon_init: 1 listeners to open...
ldap_url_parse_ext(ldap:///)
daemon: listener initialized ldap:///
daemon_init: 2 listeners opened
ldap_create
slapd init: initiated server.
slap_sasl_init: initialized!
bdb_back_initialize: initialize BDB backend
bdb_back_initialize: Berkeley DB 4.7.25: (March 5, 2012)
hdb_back_initialize: initialize HDB backend
hdb_back_initialize: Berkeley DB 4.7.25: (March 5, 2012)
null_back_initialize: initialize null backend
backend_startup_one: starting "cn=config"
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config.ldif"
=> str2entry: "dn: cn=config
objectClass: olcGlobal
cn: config
olcConfigFile: /etc/openldap/slapd.conf
olcConfigDir: /etc/openldap/slapd.d
olcAllows: bind_v2
olcArgsFile: /var/run/openldap/slapd.args
olcAttributeOptions: lang-
olcAuthzPolicy: none
olcConcurrency: 0
olcConnMaxPending: 100
olcConnMaxPendingAuth: 1000
olcGentleHUP: FALSE
olcIdleTimeout: 0
olcTLSCACertificateFile: /etc/pki/tls/certs/ca-bundle.crt
olcTLSCertificateFile: /etc/pki/tls/certs/slapd.pem
olcTLSCertificateKeyFile: /etc/pki/tls/certs/slapd.pem
olcIndexSubstrIfMaxLen: 4
olcIndexSubstrIfMinLen: 2
olcIndexSubstrAnyLen: 4
olcIndexSubstrAnyStep: 2
olcLocalSSF: 71
olcLogLevel: Stats
olcPidFile: /var/run/openldap/slapd.pid
olcReadOnly: FALSE
olcReplicationInterval: 0
olcReverseLookup: FALSE
olcSaslHost: htcRadius1.htc.internal
olcSaslSecProps: noplain,noanonymous
olcSockbufMaxIncoming: 262143
olcSockbufMaxIncomingAuth: 16777215
olcThreads: 16
olcTLSCRLCheck: none
olcTLSVerifyClient: never
olcToolThreads: 1
structuralObjectClass: olcGlobal
entryUUID: ac065c7c-c861-1031-9bc9-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
entryCSN: 20121121195915Z#000000#00#000000
modifiersName: cn=config
modifyTimestamp: 20121121195915Z
"
>>> dnPrettyNormal: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnPrettyNormal: <cn=config>, <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn=config) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
olcTLSCRLCheck: value #0: keyword <TLSCRLCheck> ignored
olcTLSCRLCheck: value #0: keyword <TLSCRLCheck> ignored
olcReplicationInterval: value #0: <olcReplicationInterval> keyword is obsolete (ignored)
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/cn=include{0}.ldif"
=> str2entry: "dn: cn=include{0}
objectClass: olcIncludeFile
cn: include{0}
olcInclude: /etc/openldap/schema/core.schema
structuralObjectClass: olcIncludeFile
entryUUID: ac0c28d2-c861-1031-9bca-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
entryCSN: 20121121195915Z#000000#00#000000
modifiersName: cn=config
modifyTimestamp: 20121121195915Z
"
>>> dnPrettyNormal: <cn=include{0}>
=> ldap_bv2dn(cn=include{0},0)
<= ldap_bv2dn(cn=include{0})=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=include{0})=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=include{0})=0
<<< dnPrettyNormal: <cn=include{0}>, <cn=include{0}>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn=include{0}) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn=include{0},cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/cn=include{1}.ldif"
=> str2entry: "dn: cn=include{1}
objectClass: olcIncludeFile
cn: include{1}
olcInclude: /etc/openldap/schema/cosine.schema
structuralObjectClass: olcIncludeFile
entryUUID: ac0c434e-c861-1031-9bcb-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
entryCSN: 20121121195915Z#000000#00#000000
modifiersName: cn=config
modifyTimestamp: 20121121195915Z
"
>>> dnPrettyNormal: <cn=include{1}>
=> ldap_bv2dn(cn=include{1},0)
<= ldap_bv2dn(cn=include{1})=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=include{1})=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=include{1})=0
<<< dnPrettyNormal: <cn=include{1}>, <cn=include{1}>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn=include{1}) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn=include{1},cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/cn=include{2}.ldif"
=> str2entry: "dn: cn=include{2}
objectClass: olcIncludeFile
cn: include{2}
olcInclude: /etc/openldap/schema/inetorgperson.schema
structuralObjectClass: olcIncludeFile
entryUUID: ac0c54f6-c861-1031-9bcc-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
entryCSN: 20121121195915Z#000000#00#000000
modifiersName: cn=config
modifyTimestamp: 20121121195915Z
"
>>> dnPrettyNormal: <cn=include{2}>
=> ldap_bv2dn(cn=include{2},0)
<= ldap_bv2dn(cn=include{2})=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=include{2})=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=include{2})=0
<<< dnPrettyNormal: <cn=include{2}>, <cn=include{2}>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn=include{2}) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn=include{2},cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/cn=include{3}.ldif"
=> str2entry: "dn: cn=include{3}
objectClass: olcIncludeFile
cn: include{3}
olcInclude: /etc/openldap/schema/nis.schema
structuralObjectClass: olcIncludeFile
entryUUID: ac0c6496-c861-1031-9bcd-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
entryCSN: 20121121195915Z#000000#00#000000
modifiersName: cn=config
modifyTimestamp: 20121121195915Z
"
>>> dnPrettyNormal: <cn=include{3}>
=> ldap_bv2dn(cn=include{3},0)
<= ldap_bv2dn(cn=include{3})=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=include{3})=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=include{3})=0
<<< dnPrettyNormal: <cn=include{3}>, <cn=include{3}>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn=include{3}) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn=include{3},cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/cn=schema.ldif"
=> str2entry: "dn: cn=schema
objectClass: olcSchemaConfig
cn: schema
olcObjectIdentifier: OLcfg 1.3.6.1.4.1.4203.666.11.1
olcObjectIdentifier: OLcfgAt OLcfg:3
olcObjectIdentifier: OLcfgGlAt OLcfgAt:0
olcObjectIdentifier: OLcfgBkAt OLcfgAt:1
olcObjectIdentifier: OLcfgDbAt OLcfgAt:2
olcObjectIdentifier: OLcfgOvAt OLcfgAt:3
olcObjectIdentifier: OLcfgOc OLcfg:4
olcObjectIdentifier: OLcfgGlOc OLcfgOc:0
olcObjectIdentifier: OLcfgBkOc OLcfgOc:1
olcObjectIdentifier: OLcfgDbOc OLcfgOc:2
olcObjectIdentifier: OLcfgOvOc OLcfgOc:3
olcObjectIdentifier: OMsyn 1.3.6.1.4.1.1466.115.121.1
olcObjectIdentifier: OMsInteger OMsyn:27
olcObjectIdentifier: OMsBoolean OMsyn:7
olcObjectIdentifier: OMsDN OMsyn:12
olcObjectIdentifier: OMsDirectoryString OMsyn:15
olcObjectIdentifier: OMsOctetString OMsyn:40
olcAttributeTypes: ( 2.5.4.0 NAME 'objectClass' DESC 'RFC2256: object classes
of the entity' EQUALITY objectIdentifierMatch SYNTAX 1.3.6.1.4.1.1466.115.121
.1.38 )
olcAttributeTypes: ( 2.5.21.9 NAME 'structuralObjectClass' DESC 'X.500(93): st
ructural object class of entry' EQUALITY objectIdentifierMatch SYNTAX 1.3.6.1
.4.1.1466.115.121.1.38 SINGLE-VALUE NO-USER-MODIFICATION USAGE directoryOpera
tion )
olcAttributeTypes: ( 2.5.18.1 NAME 'createTimestamp' DESC 'RFC2252: time which
object was created' EQUALITY generalizedTimeMatch ORDERING generalizedTimeOr
deringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE NO-USER-MODIFIC
ATION USAGE directoryOperation )
olcAttributeTypes: ( 2.5.18.2 NAME 'modifyTimestamp' DESC 'RFC2252: time which
object was last modified' EQUALITY generalizedTimeMatch ORDERING generalized
TimeOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE NO-USER-M
ODIFICATION USAGE directoryOperation )
olcAttributeTypes: ( 2.5.18.3 NAME 'creatorsName' DESC 'RFC2252: name of creat
or' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 SING
LE-VALUE NO-USER-MODIFICATION USAGE directoryOperation )
olcAttributeTypes: ( 2.5.18.4 NAME 'modifiersName' DESC 'RFC2252: name of last
modifier' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.
12 SINGLE-VALUE NO-USER-MODIFICATION USAGE directoryOperation )
olcAttributeTypes: ( 2.5.18.9 NAME 'hasSubordinates' DESC 'X.501: entry has ch
ildren' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.7 SINGLE-VALU
E NO-USER-MODIFICATION USAGE directoryOperation )
olcAttributeTypes: ( 2.5.18.10 NAME 'subschemaSubentry' DESC 'RFC2252: name of
controlling subschema entry' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.
4.1.1466.115.121.1.12 SINGLE-VALUE NO-USER-MODIFICATION USAGE directoryOperat
ion )
olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.33 NAME 'entryDN' DESC 'DN of the
entry' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 S
INGLE-VALUE NO-USER-MODIFICATION USAGE directoryOperation )
olcAttributeTypes: ( 1.3.6.1.1.16.4 NAME 'entryUUID' DESC 'UUID of the entry'
EQUALITY UUIDMatch ORDERING UUIDOrderingMatch SYNTAX 1.3.6.1.1.16.1 SINGLE-VA
LUE NO-USER-MODIFICATION USAGE directoryOperation )
olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.7 NAME 'entryCSN' DESC 'change seq
uence number of the entry content' EQUALITY CSNMatch ORDERING CSNOrderingMatc
h SYNTAX 1.3.6.1.4.1.4203.666.11.2.1{64} SINGLE-VALUE NO-USER-MODIFICATION US
AGE directoryOperation )
olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.13 NAME 'namingCSN' DESC 'change s
equence number of the entry naming (RDN)' EQUALITY CSNMatch ORDERING CSNOrder
ingMatch SYNTAX 1.3.6.1.4.1.4203.666.11.2.1{64} SINGLE-VALUE NO-USER-MODIFICA
TION USAGE directoryOperation )
olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.23 NAME 'syncreplCookie' DESC 'syn
crepl Cookie for shadow copy' EQUALITY octetStringMatch ORDERING octetStringO
rderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 SINGLE-VALUE NO-USER-MODIFI
CATION USAGE dSAOperation )
olcAttributeTypes: ( 1.3.6.1.4.1.4203.666.1.25 NAME 'contextCSN' DESC 'the lar
gest committed CSN of a context' EQUALITY CSNMatch ORDERING CSNOrderingMatch
SYNTAX 1.3.6.1.4.1.4203.666.11.2.1{64} SINGLE-VALUE NO-USER-MODIFI>>> dnPrettyNormal: <cn=schema>
=> ldap_bv2dn(cn=schema,0)
<= ldap_bv2dn(cn=schema)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=schema)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=schema)=0
<<< dnPrettyNormal: <cn=schema>, <cn=schema>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn=schema) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn=schema,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/cn=schema/cn={0}core.ldif"
=> str2entry: "dn: cn={0}core
objectClass: olcSchemaConfig
cn: {0}core
olcAttributeTypes: {0}( 2.5.4.2 NAME 'knowledgeInformation' DESC 'RFC2256: kno
wledge information' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.
1.15{32768} )
olcAttributeTypes: {1}( 2.5.4.4 NAME ( 'sn' 'surname' ) DESC 'RFC2256: last (f
amily) name(s) for which the entity is known by' SUP name )
olcAttributeTypes: {2}( 2.5.4.5 NAME 'serialNumber' DESC 'RFC2256: serial numb
er of the entity' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch S
YNTAX 1.3.6.1.4.1.1466.115.121.1.44{64} )
olcAttributeTypes: {3}( 2.5.4.6 NAME ( 'c' 'countryName' ) DESC 'RFC2256: ISO-
3166 country 2-letter code' SUP name SINGLE-VALUE )
olcAttributeTypes: {4}( 2.5.4.7 NAME ( 'l' 'localityName' ) DESC 'RFC2256: loc
ality which this object resides in' SUP name )
olcAttributeTypes: {5}( 2.5.4.8 NAME ( 'st' 'stateOrProvinceName' ) DESC 'RFC2
256: state or province which this object resides in' SUP name )
olcAttributeTypes: {6}( 2.5.4.9 NAME ( 'street' 'streetAddress' ) DESC 'RFC225
6: street address of this object' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreS
ubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
olcAttributeTypes: {7}( 2.5.4.10 NAME ( 'o' 'organizationName' ) DESC 'RFC2256
: organization this object belongs to' SUP name )
olcAttributeTypes: {8}( 2.5.4.11 NAME ( 'ou' 'organizationalUnitName' ) DESC '
RFC2256: organizational unit this object belongs to' SUP name )
olcAttributeTypes: {9}( 2.5.4.12 NAME 'title' DESC 'RFC2256: title associated
with the entity' SUP name )
olcAttributeTypes: {10}( 2.5.4.14 NAME 'searchGuide' DESC 'RFC2256: search gui
de, deprecated by enhancedSearchGuide' SYNTAX 1.3.6.1.4.1.1466.115.121.1.25 )
olcAttributeTypes: {11}( 2.5.4.15 NAME 'businessCategory' DESC 'RFC2256: busin
ess category' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTA
X 1.3.6.1.4.1.1466.115.121.1.15{128} )
olcAttributeTypes: {12}( 2.5.4.16 NAME 'postalAddress' DESC 'RFC2256: postal a
ddress' EQUALITY caseIgnoreListMatch SUBSTR caseIgnoreListSubstringsMatch SYN
TAX 1.3.6.1.4.1.1466.115.121.1.41 )
olcAttributeTypes: {13}( 2.5.4.17 NAME 'postalCode' DESC 'RFC2256: postal code
' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.
1.1466.115.121.1.15{40} )
olcAttributeTypes: {14}( 2.5.4.18 NAME 'postOfficeBox' DESC 'RFC2256: Post Off
ice Box' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3
.6.1.4.1.1466.115.121.1.15{40} )
olcAttributeTypes: {15}( 2.5.4.19 NAME 'physicalDeliveryOfficeName' DESC 'RFC2
256: Physical Delivery Office Name' EQUALITY caseIgnoreMatch SUBSTR caseIgnor
eSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} )
olcAttributeTypes: {16}( 2.5.4.20 NAME 'telephoneNumber' DESC 'RFC2256: Teleph
one Number' EQUALITY telephoneNumberMatch SUBSTR telephoneNumberSubstringsMat
ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.50{32} )
olcAttributeTypes: {17}( 2.5.4.21 NAME 'telexNumber' DESC 'RFC2256: Telex Numb
er' SYNTAX 1.3.6.1.4.1.1466.115.121.1.52 )
olcAttributeTypes: {18}( 2.5.4.22 NAME 'teletexTerminalIdentifier' DESC 'RFC22
56: Teletex Terminal Identifier' SYNTAX 1.3.6.1.4.1.1466.115.121.1.51 )
olcAttributeTypes: {19}( 2.5.4.23 NAME ( 'facsimileTelephoneNumber' 'fax' ) DE
SC 'RFC2256: Facsimile (Fax) Telephone Number' SYNTAX 1.3.6.1.4.1.1466.115.12
1.1.22 )
olcAttributeTypes: {20}( 2.5.4.24 NAME 'x121Address' DESC 'RFC2256: X.121 Addr
ess' EQUALITY numericStringMatch SUBSTR numericStringSubstringsMatch SYNTAX 1
.3.6.1.4.1.1466.115.121.1.36{15} )
olcAttributeTypes: {21}( 2.5.4.25 NAME 'internationaliSDNNumber' DESC 'RFC2256
: international ISDN number' EQUALITY numericStringMatch SUBSTR numericString
SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{16} )
olcAttributeTypes: {22}( 2.5.4.26 NAME 'registeredAddress' DESC 'RFC2256: regi
stered postal address' SUP postalAddress SYNTAX 1.3.6.1.4.1.1466.115.121.1.41
)
olcAttributeTypes: {23}( 2.5.4.27 NAME 'destinationIndicator' DESC 'RFC2256: d
estination indicator' EQUALITY caseIgnoreMatch SUBSTR cas>>> dnPrettyNormal: <cn={0}core>
=> ldap_bv2dn(cn={0}core,0)
<= ldap_bv2dn(cn={0}core)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn={0}core)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn={0}core)=0
<<< dnPrettyNormal: <cn={0}core>, <cn={0}core>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn={0}core) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn={0}core,cn=schema,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/cn=schema/cn={1}cosine.ldif"
=> str2entry: "dn: cn={1}cosine
objectClass: olcSchemaConfig
cn: {1}cosine
olcAttributeTypes: {0}( 0.9.2342.19200300.100.1.2 NAME 'textEncodedORAddress'
EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.
1466.115.121.1.15{256} )
olcAttributeTypes: {1}( 0.9.2342.19200300.100.1.4 NAME 'info' DESC 'RFC1274: g
eneral information' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{2048} )
olcAttributeTypes: {2}( 0.9.2342.19200300.100.1.5 NAME ( 'drink' 'favouriteDri
nk' ) DESC 'RFC1274: favorite drink' EQUALITY caseIgnoreMatch SUBSTR caseIgno
reSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {3}( 0.9.2342.19200300.100.1.6 NAME 'roomNumber' DESC 'RFC1
274: room number' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch S
YNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {4}( 0.9.2342.19200300.100.1.7 NAME 'photo' DESC 'RFC1274:
photo (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.23{25000} )
olcAttributeTypes: {5}( 0.9.2342.19200300.100.1.8 NAME 'userClass' DESC 'RFC12
74: category of user' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMat
ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {6}( 0.9.2342.19200300.100.1.9 NAME 'host' DESC 'RFC1274: h
ost computer' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTA
X 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {7}( 0.9.2342.19200300.100.1.10 NAME 'manager' DESC 'RFC127
4: DN of manager' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115
.121.1.12 )
olcAttributeTypes: {8}( 0.9.2342.19200300.100.1.11 NAME 'documentIdentifier' D
ESC 'RFC1274: unique identifier of document' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {9}( 0.9.2342.19200300.100.1.12 NAME 'documentTitle' DESC '
RFC1274: title of document' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstri
ngsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {10}( 0.9.2342.19200300.100.1.13 NAME 'documentVersion' DES
C 'RFC1274: version of document' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSu
bstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {11}( 0.9.2342.19200300.100.1.14 NAME 'documentAuthor' DESC
'RFC1274: DN of author of document' EQUALITY distinguishedNameMatch SYNTAX 1
.3.6.1.4.1.1466.115.121.1.12 )
olcAttributeTypes: {12}( 0.9.2342.19200300.100.1.15 NAME 'documentLocation' DE
SC 'RFC1274: location of document original' EQUALITY caseIgnoreMatch SUBSTR c
aseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {13}( 0.9.2342.19200300.100.1.20 NAME ( 'homePhone' 'homeTe
lephoneNumber' ) DESC 'RFC1274: home telephone number' EQUALITY telephoneNumb
erMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121
.1.50 )
olcAttributeTypes: {14}( 0.9.2342.19200300.100.1.21 NAME 'secretary' DESC 'RFC
1274: DN of secretary' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.146
6.115.121.1.12 )
olcAttributeTypes: {15}( 0.9.2342.19200300.100.1.22 NAME 'otherMailbox' SYNTAX
1.3.6.1.4.1.1466.115.121.1.39 )
olcAttributeTypes: {16}( 0.9.2342.19200300.100.1.26 NAME 'aRecord' EQUALITY ca
seIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {17}( 0.9.2342.19200300.100.1.27 NAME 'mDRecord' EQUALITY c
aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {18}( 0.9.2342.19200300.100.1.28 NAME 'mXRecord' EQUALITY c
aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {19}( 0.9.2342.19200300.100.1.29 NAME 'nSRecord' EQUALITY c
aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {20}( 0.9.2342.19200300.100.1.30 NAME 'sOARecord' EQUALITY
caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {21}( 0.9.2342.19200300.100.1.31 NAME 'cNAMERecord' EQUALIT
Y caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {22}( 0.9.2342.19200300.100.1.38 NAM>>> dnPrettyNormal: <cn={1}cosine>
=> ldap_bv2dn(cn={1}cosine,0)
<= ldap_bv2dn(cn={1}cosine)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn={1}cosine)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn={1}cosine)=0
<<< dnPrettyNormal: <cn={1}cosine>, <cn={1}cosine>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn={1}cosine) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn={1}cosine,cn=schema,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/cn=schema/cn={2}inetorgperson.ldif"
=> str2entry: "dn: cn={2}inetorgperson
objectClass: olcSchemaConfig
cn: {2}inetorgperson
olcAttributeTypes: {0}( 2.16.840.1.113730.3.1.1 NAME 'carLicense' DESC 'RFC279
8: vehicle license or registration plate' EQUALITY caseIgnoreMatch SUBSTR cas
eIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
olcAttributeTypes: {1}( 2.16.840.1.113730.3.1.2 NAME 'departmentNumber' DESC '
RFC2798: identifies a department within an organization' EQUALITY caseIgnoreM
atch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
olcAttributeTypes: {2}( 2.16.840.1.113730.3.1.241 NAME 'displayName' DESC 'RFC
2798: preferred name to be used when displaying entries' EQUALITY caseIgnoreM
atch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SI
NGLE-VALUE )
olcAttributeTypes: {3}( 2.16.840.1.113730.3.1.3 NAME 'employeeNumber' DESC 'RF
C2798: numerically identifies an employee within an organization' EQUALITY ca
seIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.12
1.1.15 SINGLE-VALUE )
olcAttributeTypes: {4}( 2.16.840.1.113730.3.1.4 NAME 'employeeType' DESC 'RFC2
798: type of employment for a person' EQUALITY caseIgnoreMatch SUBSTR caseIgn
oreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
olcAttributeTypes: {5}( 0.9.2342.19200300.100.1.60 NAME 'jpegPhoto' DESC 'RFC2
798: a JPEG image' SYNTAX 1.3.6.1.4.1.1466.115.121.1.28 )
olcAttributeTypes: {6}( 2.16.840.1.113730.3.1.39 NAME 'preferredLanguage' DESC
'RFC2798: preferred written or spoken language for a person' EQUALITY caseIg
noreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.
15 SINGLE-VALUE )
olcAttributeTypes: {7}( 2.16.840.1.113730.3.1.40 NAME 'userSMIMECertificate' D
ESC 'RFC2798: PKCS#7 SignedData used to support S/MIME' SYNTAX 1.3.6.1.4.1.14
66.115.121.1.5 )
olcAttributeTypes: {8}( 2.16.840.1.113730.3.1.216 NAME 'userPKCS12' DESC 'RFC2
798: personal identity information, a PKCS #12 PFX' SYNTAX 1.3.6.1.4.1.1466.1
15.121.1.5 )
olcObjectClasses: {0}( 2.16.840.1.113730.3.2.2 NAME 'inetOrgPerson' DESC 'RFC2
798: Internet Organizational Person' SUP organizationalPerson STRUCTURAL MAY
( audio $ businessCategory $ carLicense $ departmentNumber $ displayName $ em
ployeeNumber $ employeeType $ givenName $ homePhone $ homePostalAddress $ ini
tials $ jpegPhoto $ labeledURI $ mail $ manager $ mobile $ o $ pager $ photo
$ roomNumber $ secretary $ uid $ userCertificate $ x500uniqueIdentifier $ pre
ferredLanguage $ userSMIMECertificate $ userPKCS12 ) )
structuralObjectClass: olcSchemaConfig
entryUUID: ac0d4294-c861-1031-9bd1-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
entryCSN: 20121121195915Z#000000#00#000000
modifiersName: cn=config
modifyTimestamp: 20121121195915Z
"
>>> dnPrettyNormal: <cn={2}inetorgperson>
=> ldap_bv2dn(cn={2}inetorgperson,0)
<= ldap_bv2dn(cn={2}inetorgperson)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn={2}inetorgperson)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn={2}inetorgperson)=0
<<< dnPrettyNormal: <cn={2}inetorgperson>, <cn={2}inetorgperson>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn={2}inetorgperson) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn={2}inetorgperson,cn=schema,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/cn=schema/cn={3}nis.ldif"
=> str2entry: "dn: cn={3}nis
objectClass: olcSchemaConfig
cn: {3}nis
olcAttributeTypes: {0}( 1.3.6.1.1.1.1.2 NAME 'gecos' DESC 'The GECOS field; th
e common name' EQUALITY caseIgnoreIA5Match SUBSTR caseIgnoreIA5SubstringsMatc
h SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
olcAttributeTypes: {1}( 1.3.6.1.1.1.1.3 NAME 'homeDirectory' DESC 'The absolut
e path to the home directory' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1
466.115.121.1.26 SINGLE-VALUE )
olcAttributeTypes: {2}( 1.3.6.1.1.1.1.4 NAME 'loginShell' DESC 'The path to th
e login shell' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.2
6 SINGLE-VALUE )
olcAttributeTypes: {3}( 1.3.6.1.1.1.1.5 NAME 'shadowLastChange' EQUALITY integ
erMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {4}( 1.3.6.1.1.1.1.6 NAME 'shadowMin' EQUALITY integerMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {5}( 1.3.6.1.1.1.1.7 NAME 'shadowMax' EQUALITY integerMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {6}( 1.3.6.1.1.1.1.8 NAME 'shadowWarning' EQUALITY integerM
atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {7}( 1.3.6.1.1.1.1.9 NAME 'shadowInactive' EQUALITY integer
Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {8}( 1.3.6.1.1.1.1.10 NAME 'shadowExpire' EQUALITY integerM
atch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {9}( 1.3.6.1.1.1.1.11 NAME 'shadowFlag' EQUALITY integerMat
ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {10}( 1.3.6.1.1.1.1.12 NAME 'memberUid' EQUALITY caseExactI
A5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.
26 )
olcAttributeTypes: {11}( 1.3.6.1.1.1.1.13 NAME 'memberNisNetgroup' EQUALITY ca
seExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.11
5.121.1.26 )
olcAttributeTypes: {12}( 1.3.6.1.1.1.1.14 NAME 'nisNetgroupTriple' DESC 'Netgr
oup triple' SYNTAX 1.3.6.1.1.1.0.0 )
olcAttributeTypes: {13}( 1.3.6.1.1.1.1.15 NAME 'ipServicePort' EQUALITY intege
rMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {14}( 1.3.6.1.1.1.1.16 NAME 'ipServiceProtocol' SUP name )
olcAttributeTypes: {15}( 1.3.6.1.1.1.1.17 NAME 'ipProtocolNumber' EQUALITY int
egerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {16}( 1.3.6.1.1.1.1.18 NAME 'oncRpcNumber' EQUALITY integer
Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {17}( 1.3.6.1.1.1.1.19 NAME 'ipHostNumber' DESC 'IP address
' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
olcAttributeTypes: {18}( 1.3.6.1.1.1.1.20 NAME 'ipNetworkNumber' DESC 'IP netw
ork' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SI
NGLE-VALUE )
olcAttributeTypes: {19}( 1.3.6.1.1.1.1.21 NAME 'ipNetmaskNumber' DESC 'IP netm
ask' EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} SI
NGLE-VALUE )
olcAttributeTypes: {20}( 1.3.6.1.1.1.1.22 NAME 'macAddress' DESC 'MAC address'
EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{128} )
olcAttributeTypes: {21}( 1.3.6.1.1.1.1.23 NAME 'bootParameter' DESC 'rpc.bootp
aramd parameter' SYNTAX 1.3.6.1.1.1.0.1 )
olcAttributeTypes: {22}( 1.3.6.1.1.1.1.24 NAME 'bootFile' DESC 'Boot image nam
e' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {23}( 1.3.6.1.1.1.1.26 NAME 'nisMapName' SUP name )
olcAttributeTypes: {24}( 1.3.6.1.1.1.1.27 NAME 'nisMapEntry' EQUALITY caseExac
tIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.
1.26{1024} SINGLE-VALUE )
olcObjectClasses: {0}( 1.3.6.1.1.1.2.0 NAME 'posixAccount' DESC 'Abstraction o
f an account with POSIX attributes' SUP top AUXILIARY MUST ( cn $ uid $ uidNu
mber $ gidNumber $ homeDirectory ) MAY ( userPassword $ loginShell $ gecos $
description ) )
olcObjectClasses: {1}( 1.3.6.1.1.1.2.1 NAME 'shadowAccount' DESC 'Additional a
ttributes for shadow passwords'>>> dnPrettyNormal: <cn={3}nis>
=> ldap_bv2dn(cn={3}nis,0)
<= ldap_bv2dn(cn={3}nis)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn={3}nis)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn={3}nis)=0
<<< dnPrettyNormal: <cn={3}nis>, <cn={3}nis>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn={3}nis) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn={3}nis,cn=schema,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/cn=schema/cn={4}ad.ldif"
=> str2entry: "dn: cn={4}AD
objectClass: olcSchemaConfig
cn: {4}AD
olcAttributeTypes: {0}( 1.2.840.113556.1.2.447 NAME 'mailNickname' SYNTAX
1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
olcAttributeTypes: {1}( 1.2.840.113556.1.4.782 NAME 'objectCategory' SYNTA
X 1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE )
olcAttributeTypes: {2}( 1.2.840.113556.1.4.221 NAME 'sAMAccountName' SYNTA
X 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
olcObjectClasses: {0}( 1.2.840.113556.1.5.9 NAME 'user' SUP organizational
Person STRUCTURAL MAY ( objectCategory $ mailNickname $ sAMAccountName $ di
splayName $ mail ) )
olcObjectClasses: {1}( 1.2.840.113556.1.3.23 NAME 'container' SUP top STRU
CTURAL MUST cn )
structuralObjectClass: olcSchemaConfig
entryUUID: 6feaa26c-cf6d-1031-986d-79eaa697be5e
creatorsName: cn=config
createTimestamp: 20121130191106Z
entryCSN: 20121130191106Z#000000#00#000000
modifiersName: cn=config
modifyTimestamp: 20121130191106Z
"
>>> dnPrettyNormal: <cn={4}AD>
=> ldap_bv2dn(cn={4}AD,0)
<= ldap_bv2dn(cn={4}AD)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn={4}AD)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn={4}ad)=0
<<< dnPrettyNormal: <cn={4}AD>, <cn={4}ad>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(cn={4}AD) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "cn={4}AD,cn=schema,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/olcDatabase={-1}frontend.ldif"
=> str2entry: "dn: olcDatabase={-1}frontend
objectClass: olcDatabaseConfig
objectClass: olcFrontendConfig
olcDatabase: {-1}frontend
olcLastMod: TRUE
olcMaxDerefDepth: 0
olcReadOnly: FALSE
olcSchemaDN: cn=Subschema
structuralObjectClass: olcDatabaseConfig
entryUUID: ac0d771e-c861-1031-9bd3-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
olcTimeLimit: unlimited
olcSizeLimit: unlimited
entryCSN: 20121214201101.233668Z#000000#000#000000
modifiersName: cn=admin,cn=config
modifyTimestamp: 20121214201101Z
"
>>> dnPrettyNormal: <olcDatabase={-1}frontend>
=> ldap_bv2dn(olcDatabase={-1}frontend,0)
<= ldap_bv2dn(olcDatabase={-1}frontend)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(olcDatabase={-1}frontend)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(olcDatabase={-1}frontend)=0
<<< dnPrettyNormal: <olcDatabase={-1}frontend>, <olcDatabase={-1}frontend>
>>> dnNormalize: <cn=Subschema>
=> ldap_bv2dn(cn=Subschema,0)
<= ldap_bv2dn(cn=Subschema)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=subschema)=0
<<< dnNormalize: <cn=subschema>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=admin,cn=config>
=> ldap_bv2dn(cn=admin,cn=config,0)
<= ldap_bv2dn(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
<<< dnNormalize: <cn=admin,cn=config>
<= str2entry(olcDatabase={-1}frontend) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "olcDatabase={-1}frontend,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
>>> dnPrettyNormal: <cn=Subschema>
=> ldap_bv2dn(cn=Subschema,0)
<= ldap_bv2dn(cn=Subschema)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Subschema)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=subschema)=0
<<< dnPrettyNormal: <cn=Subschema>, <cn=subschema>
>>> dnPrettyNormal: <cn=Subschema>
=> ldap_bv2dn(cn=Subschema,0)
<= ldap_bv2dn(cn=Subschema)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Subschema)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=subschema)=0
<<< dnPrettyNormal: <cn=Subschema>, <cn=subschema>
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/olcDatabase={0}config.ldif"
=> str2entry: "dn: olcDatabase={0}config
objectClass: olcDatabaseConfig
olcDatabase: {0}config
olcLastMod: TRUE
olcMaxDerefDepth: 15
olcReadOnly: FALSE
olcRootDN: cn=admin,cn=config
olcRootPW:: Y29uZmln
structuralObjectClass: olcDatabaseConfig
entryUUID: ac0d8a60-c861-1031-9bd4-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
entryCSN: 20121121195915Z#000000#00#000000
modifiersName: cn=config
modifyTimestamp: 20121121195915Z
"
>>> dnPrettyNormal: <olcDatabase={0}config>
=> ldap_bv2dn(olcDatabase={0}config,0)
<= ldap_bv2dn(olcDatabase={0}config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(olcDatabase={0}config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(olcDatabase={0}config)=0
<<< dnPrettyNormal: <olcDatabase={0}config>, <olcDatabase={0}config>
>>> dnNormalize: <cn=admin,cn=config>
=> ldap_bv2dn(cn=admin,cn=config,0)
<= ldap_bv2dn(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
<<< dnNormalize: <cn=admin,cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(olcDatabase={0}config) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "olcDatabase={0}config,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
>>> dnPrettyNormal: <cn=admin,cn=config>
=> ldap_bv2dn(cn=admin,cn=config,0)
<= ldap_bv2dn(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
<<< dnPrettyNormal: <cn=admin,cn=config>, <cn=admin,cn=config>
>>> dnPrettyNormal: <cn=admin,cn=config>
=> ldap_bv2dn(cn=admin,cn=config,0)
<= ldap_bv2dn(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
<<< dnPrettyNormal: <cn=admin,cn=config>, <cn=admin,cn=config>
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/olcDatabase={1}bdb.ldif"
=> str2entry: "dn: olcDatabase={1}bdb
objectClass: olcDatabaseConfig
objectClass: olcBdbConfig
olcDatabase: {1}bdb
olcSuffix: dc=htc,dc=com
olcAccess: {0}to * by dn.base="uid=push-master,cn=nupointproxy,dc=internal" w
rite by * +0 break
olcAccess: {1}to dn.base="" by * read
olcAccess: {2}to dn.base="cn=subschema" by * read
olcAccess: {3}to dn.subtree="cn=monitor" by users read by * none
olcAccess: {4}to * by self write by * read
olcLastMod: TRUE
olcMaxDerefDepth: 15
olcReadOnly: FALSE
olcRootPW:: e1NIQX01ZW42RzZNZXpScm9UM1hLcWtkUE9tWS9CZlE9
olcDbDirectory: /var/lib/ldap/htc.com
olcDbCacheSize: 150000
olcDbCheckpoint: 102400 1
olcDbConfig: {0}set_cachesize 0 268435465 1
olcDbConfig: {1}set_lg_bsize 2097152
olcDbConfig: {2}set_lg_regionmax 262144
olcDbConfig: {3}set_flags DB_LOG_AUTOREMOVE
olcDbNoSync: TRUE
olcDbDirtyRead: FALSE
olcDbIDLcacheSize: 150000
olcDbIndex: objectClass pres,eq
olcDbIndex: cn pres,eq,sub
olcDbIndex: ou pres,eq,sub
olcDbIndex: mail pres,eq,sub
olcDbIndex: sn pres,eq,sub
olcDbIndex: givenName pres,eq,sub
olcDbLinearIndex: FALSE
olcDbMode: 384
olcDbSearchStack: 16
olcDbShmKey: 12321
olcDbCacheFree: 1
structuralObjectClass: olcBdbConfig
entryUUID: ac0da28e-c861-1031-9bd5-5591ba7dfe32
creatorsName: cn=config
createTimestamp: 20121121195915Z
olcRootDN: uid=Manager,dc=htc,dc=com
olcUpdateDN: uid=Push-Master,cn=NupointProxy,dc=internal
entryCSN: 20121212180425.846656Z#000000#000#000000
modifiersName: cn=admin,cn=config
modifyTimestamp: 20121212180425Z
"
>>> dnPrettyNormal: <olcDatabase={1}bdb>
=> ldap_bv2dn(olcDatabase={1}bdb,0)
<= ldap_bv2dn(olcDatabase={1}bdb)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(olcDatabase={1}bdb)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(olcDatabase={1}bdb)=0
<<< dnPrettyNormal: <olcDatabase={1}bdb>, <olcDatabase={1}bdb>
>>> dnNormalize: <dc=htc,dc=com>
=> ldap_bv2dn(dc=htc,dc=com,0)
<= ldap_bv2dn(dc=htc,dc=com)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=htc,dc=com)=0
<<< dnNormalize: <dc=htc,dc=com>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <uid=Manager,dc=htc,dc=com>
=> ldap_bv2dn(uid=Manager,dc=htc,dc=com,0)
<= ldap_bv2dn(uid=Manager,dc=htc,dc=com)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=manager,dc=htc,dc=com)=0
<<< dnNormalize: <uid=manager,dc=htc,dc=com>
>>> dnNormalize: <cn=admin,cn=config>
=> ldap_bv2dn(cn=admin,cn=config,0)
<= ldap_bv2dn(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
<<< dnNormalize: <cn=admin,cn=config>
<= str2entry(olcDatabase={1}bdb) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "olcDatabase={1}bdb,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
>>> dnPrettyNormal: <dc=htc,dc=com>
=> ldap_bv2dn(dc=htc,dc=com,0)
<= ldap_bv2dn(dc=htc,dc=com)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=htc,dc=com)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=htc,dc=com)=0
<<< dnPrettyNormal: <dc=htc,dc=com>, <dc=htc,dc=com>
>>> dnPrettyNormal: <uid=Manager,dc=htc,dc=com>
=> ldap_bv2dn(uid=Manager,dc=htc,dc=com,0)
<= ldap_bv2dn(uid=Manager,dc=htc,dc=com)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=Manager,dc=htc,dc=com)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=manager,dc=htc,dc=com)=0
<<< dnPrettyNormal: <uid=Manager,dc=htc,dc=com>, <uid=manager,dc=htc,dc=com>
>>> dnPrettyNormal: <uid=Push-Master,cn=NupointProxy,dc=internal>
=> ldap_bv2dn(uid=Push-Master,cn=NupointProxy,dc=internal,0)
<= ldap_bv2dn(uid=Push-Master,cn=NupointProxy,dc=internal)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=Push-Master,cn=NupointProxy,dc=internal)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=push-master,cn=nupointproxy,dc=internal)=0
<<< dnPrettyNormal: <uid=Push-Master,cn=NupointProxy,dc=internal>, <uid=push-master,cn=nupointproxy,dc=internal>
bdb_db_init: Initializing BDB database
>>> dnPrettyNormal: <dc=htc,dc=com>
=> ldap_bv2dn(dc=htc,dc=com,0)
<= ldap_bv2dn(dc=htc,dc=com)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=htc,dc=com)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=htc,dc=com)=0
<<< dnPrettyNormal: <dc=htc,dc=com>, <dc=htc,dc=com>
>>> dnNormalize: <uid=push-master,cn=nupointproxy,dc=internal>
=> ldap_bv2dn(uid=push-master,cn=nupointproxy,dc=internal,0)
<= ldap_bv2dn(uid=push-master,cn=nupointproxy,dc=internal)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=push-master,cn=nupointproxy,dc=internal)=0
<<< dnNormalize: <uid=push-master,cn=nupointproxy,dc=internal>
Backend ACL: access to *
by dn.base="uid=push-master,cn=nupointproxy,dc=internal" write
by * +0 break
/etc/openldap/slapd.d: line 1: warning: cannot assess the validity of the ACL scope within backend naming context
>>> dnNormalize: <>
<<< dnNormalize: <>
Backend ACL: access to dn.base=""
by * read
/etc/openldap/slapd.d: line 1: warning: ACL appears to be out of scope within backend naming context
>>> dnNormalize: <cn=subschema>
=> ldap_bv2dn(cn=subschema,0)
<= ldap_bv2dn(cn=subschema)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=subschema)=0
<<< dnNormalize: <cn=subschema>
Backend ACL: access to dn.base="cn=subschema"
by * read
/etc/openldap/slapd.d: line 1: warning: ACL appears to be out of scope within backend naming context
>>> dnNormalize: <cn=monitor>
=> ldap_bv2dn(cn=monitor,0)
<= ldap_bv2dn(cn=monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=monitor)=0
<<< dnNormalize: <cn=monitor>
Backend ACL: access to dn.subtree="cn=monitor"
by users read
by * none
/etc/openldap/slapd.d: line 1: warning: ACL appears to be out of scope within backend naming context
Backend ACL: access to *
by self write
by * read
/etc/openldap/slapd.d: line 1: warning: cannot assess the validity of the ACL scope within backend naming context
>>> dnPrettyNormal: <uid=Manager,dc=htc,dc=com>
=> ldap_bv2dn(uid=Manager,dc=htc,dc=com,0)
<= ldap_bv2dn(uid=Manager,dc=htc,dc=com)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=Manager,dc=htc,dc=com)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=manager,dc=htc,dc=com)=0
<<< dnPrettyNormal: <uid=Manager,dc=htc,dc=com>, <uid=manager,dc=htc,dc=com>
>>> dnPrettyNormal: <uid=Push-Master,cn=NupointProxy,dc=internal>
=> ldap_bv2dn(uid=Push-Master,cn=NupointProxy,dc=internal,0)
<= ldap_bv2dn(uid=Push-Master,cn=NupointProxy,dc=internal)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=Push-Master,cn=NupointProxy,dc=internal)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=push-master,cn=nupointproxy,dc=internal)=0
<<< dnPrettyNormal: <uid=Push-Master,cn=NupointProxy,dc=internal>, <uid=push-master,cn=nupointproxy,dc=internal>
index objectClass 0x0006
index cn 0x0716
index ou 0x0716
index mail 0x0716
index sn 0x0716
index givenName 0x0716
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/olcDatabase={2}bdb.ldif"
=> str2entry: "dn: olcDatabase={2}bdb
objectClass: olcDatabaseConfig
objectClass: olcBdbConfig
olcDatabase: {2}bdb
olcSuffix: dc=internal
olcAddContentAcl: FALSE
olcLastMod: TRUE
olcMaxDerefDepth: 15
olcReadOnly: FALSE
olcRootDN: cn=admin,cn=config
olcSyncUseSubentry: FALSE
olcMonitoring: TRUE
olcDbDirectory: /var/lib/ldap/htc.internal
olcDbCacheSize: 1000
olcDbCheckpoint: 100 63
olcDbNoSync: FALSE
olcDbDirtyRead: FALSE
olcDbIDLcacheSize: 0
olcDbLinearIndex: FALSE
olcDbMode: 0600
olcDbSearchStack: 16
olcDbShmKey: 0
olcDbCacheFree: 1
olcDbDNcacheSize: 0
structuralObjectClass: olcBdbConfig
entryUUID: 92ff370e-dcc9-1031-8a59-533cee5baf07
creatorsName: cn=config
createTimestamp: 20121217191324Z
entryCSN: 20121217191324.652465Z#000000#000#000000
modifiersName: cn=config
modifyTimestamp: 20121217191324Z
"
>>> dnPrettyNormal: <olcDatabase={2}bdb>
=> ldap_bv2dn(olcDatabase={2}bdb,0)
<= ldap_bv2dn(olcDatabase={2}bdb)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(olcDatabase={2}bdb)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(olcDatabase={2}bdb)=0
<<< dnPrettyNormal: <olcDatabase={2}bdb>, <olcDatabase={2}bdb>
>>> dnNormalize: <dc=internal>
=> ldap_bv2dn(dc=internal,0)
<= ldap_bv2dn(dc=internal)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=internal)=0
<<< dnNormalize: <dc=internal>
>>> dnNormalize: <cn=admin,cn=config>
=> ldap_bv2dn(cn=admin,cn=config,0)
<= ldap_bv2dn(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
<<< dnNormalize: <cn=admin,cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(olcDatabase={2}bdb) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "olcDatabase={2}bdb,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
>>> dnPrettyNormal: <dc=internal>
=> ldap_bv2dn(dc=internal,0)
<= ldap_bv2dn(dc=internal)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=internal)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=internal)=0
<<< dnPrettyNormal: <dc=internal>, <dc=internal>
>>> dnPrettyNormal: <cn=admin,cn=config>
=> ldap_bv2dn(cn=admin,cn=config,0)
<= ldap_bv2dn(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
<<< dnPrettyNormal: <cn=admin,cn=config>, <cn=admin,cn=config>
bdb_db_init: Initializing BDB database
>>> dnPrettyNormal: <dc=internal>
=> ldap_bv2dn(dc=internal,0)
<= ldap_bv2dn(dc=internal)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=internal)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=internal)=0
<<< dnPrettyNormal: <dc=internal>, <dc=internal>
>>> dnPrettyNormal: <cn=admin,cn=config>
=> ldap_bv2dn(cn=admin,cn=config,0)
<= ldap_bv2dn(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=admin,cn=config)=0
<<< dnPrettyNormal: <cn=admin,cn=config>, <cn=admin,cn=config>
ldif_read_file: read entry file: "/etc/openldap/slapd.d/cn=config/olcDatabase={3}monitor.ldif"
=> str2entry: "dn: olcDatabase={3}monitor
objectClass: olcDatabaseConfig
olcDatabase: {3}monitor
olcAddContentAcl: FALSE
olcLastMod: TRUE
olcMaxDerefDepth: 15
olcReadOnly: FALSE
olcSyncUseSubentry: FALSE
olcMonitoring: FALSE
structuralObjectClass: olcDatabaseConfig
entryUUID: 54da1e50-d8df-1031-85bf-235d062b63b6
creatorsName: cn=config
createTimestamp: 20121212193904Z
entryCSN: 20121212193904.665758Z#000000#000#000000
modifiersName: cn=config
modifyTimestamp: 20121212193904Z
"
>>> dnPrettyNormal: <olcDatabase={3}monitor>
=> ldap_bv2dn(olcDatabase={3}monitor,0)
<= ldap_bv2dn(olcDatabase={3}monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(olcDatabase={3}monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(olcDatabase={3}monitor)=0
<<< dnPrettyNormal: <olcDatabase={3}monitor>, <olcDatabase={3}monitor>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
>>> dnNormalize: <cn=config>
=> ldap_bv2dn(cn=config,0)
<= ldap_bv2dn(cn=config)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=config)=0
<<< dnNormalize: <cn=config>
<= str2entry(olcDatabase={3}monitor) -> 0x7fcb0f61d108
=> test_filter
PRESENT
=> access_allowed: search access to "olcDatabase={3}monitor,cn=config" "objectClass" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
>>> dnPrettyNormal: <cn=Monitor>
=> ldap_bv2dn(cn=Monitor,0)
<= ldap_bv2dn(cn=Monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=monitor)=0
<<< dnPrettyNormal: <cn=Monitor>, <cn=monitor>
send_ldap_result: conn=-1 op=0 p=0
send_ldap_result: err=0 matched="" text=""
matching_rule_use_init
1.2.840.113556.1.4.804 (integerBitOrMatch): matchingRuleUse: ( 1.2.840.113556.1.4.804 NAME 'integerBitOrMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ olcChainMaxReferralDepth $ olcDbProtocolVersion $ olcDbConnectionPoolMax $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpcNumber ) )
1.2.840.113556.1.4.803 (integerBitAndMatch): matchingRuleUse: ( 1.2.840.113556.1.4.803 NAME 'integerBitAndMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ olcChainMaxReferralDepth $ olcDbProtocolVersion $ olcDbConnectionPoolMax $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpcNumber ) )
1.3.6.1.4.1.1466.109.114.2 (caseIgnoreIA5Match): matchingRuleUse: ( 1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match' APPLIES ( altServer $ olcDbConfig $ mail $ dc $ associatedDomain $ email $ aRecord $ mDRecord $ mXRecord $ nSRecord $ sOARecord $ cNAMERecord $ janetMailbox $ gecos $ homeDirectory $ loginShell $ memberUid $ memberNisNetgroup $ ipHostNumber $ ipNetworkNumber $ ipNetmaskNumber $ macAddress $ bootFile $ nisMapEntry ) )
1.3.6.1.4.1.1466.109.114.1 (caseExactIA5Match): matchingRuleUse: ( 1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' APPLIES ( altServer $ olcDbConfig $ mail $ dc $ associatedDomain $ email $ aRecord $ mDRecord $ mXRecord $ nSRecord $ sOARecord $ cNAMERecord $ janetMailbox $ gecos $ homeDirectory $ loginShell $ memberUid $ memberNisNetgroup $ ipHostNumber $ ipNetworkNumber $ ipNetmaskNumber $ macAddress $ bootFile $ nisMapEntry ) )
2.5.13.39 (certificateListMatch): 2.5.13.38 (certificateListExactMatch): matchingRuleUse: ( 2.5.13.38 NAME 'certificateListExactMatch' APPLIES ( authorityRevocationList $ certificateRevocationList $ deltaRevocationList ) )
2.5.13.35 (certificateMatch): 2.5.13.34 (certificateExactMatch): matchingRuleUse: ( 2.5.13.34 NAME 'certificateExactMatch' APPLIES ( userCertificate $ cACertificate ) )
2.5.13.30 (objectIdentifierFirstComponentMatch): matchingRuleUse: ( 2.5.13.30 NAME 'objectIdentifierFirstComponentMatch' APPLIES ( supportedControl $ supportedExtension $ supportedFeatures $ ldapSyntaxes $ supportedApplicationContext ) )
2.5.13.29 (integerFirstComponentMatch): matchingRuleUse: ( 2.5.13.29 NAME 'integerFirstComponentMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ olcChainMaxReferralDepth $ olcDbProtocolVersion $ olcDbConnectionPoolMax $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpcNumber ) )
2.5.13.27 (generalizedTimeMatch): matchingRuleUse: ( 2.5.13.27 NAME 'generalizedTimeMatch' APPLIES ( createTimestamp $ modifyTimestamp ) )
2.5.13.24 (protocolInformationMatch): matchingRuleUse: ( 2.5.13.24 NAME 'protocolInformationMatch' APPLIES protocolInformation )
2.5.13.23 (uniqueMemberMatch): matchingRuleUse: ( 2.5.13.23 NAME 'uniqueMemberMatch' APPLIES uniqueMember )
2.5.13.22 (presentationAddressMatch): matchingRuleUse: ( 2.5.13.22 NAME 'presentationAddressMatch' APPLIES presentationAddress )
2.5.13.20 (telephoneNumberMatch): matchingRuleUse: ( 2.5.13.20 NAME 'telephoneNumberMatch' APPLIES ( telephoneNumber $ homePhone $ mobile $ pager ) )
2.5.13.17 (octetStringMatch): matchingRuleUse: ( 2.5.13.17 NAME 'octetStringMatch' APPLIES ( userPassword $ olcDbCryptKey ) )
2.5.13.16 (bitStringMatch): matchingRuleUse: ( 2.5.13.16 NAME 'bitStringMatch' APPLIES x500UniqueIdentifier )
2.5.13.14 (integerMatch): matchingRuleUse: ( 2.5.13.14 NAME 'integerMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ olcChainMaxReferralDepth $ olcDbProtocolVersion $ olcDbConnectionPoolMax $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpcNumber ) )
2.5.13.13 (booleanMatch): matchingRuleUse: ( 2.5.13.13 NAME 'booleanMatch' APPLIES ( hasSubordinates $ olcAddContentAcl $ olcGentleHUP $ olcHidden $ olcLastMod $ olcMirrorMode $ olcMonitoring $ olcReadOnly $ olcReverseLookup $ olcSyncUseSubentry $ olcDbChecksum $ olcDbNoSync $ olcDbDirtyRead $ olcDbLinearIndex $ olcChainCacheURI $ olcChainReturnError $ olcDbRebindAsUser $ olcDbChaseReferrals $ olcDbProxyWhoAmI $ olcDbSingleConn $ olcDbUseTemporaryConn $ olcDbNoRefs $ olcDbNoUndefFilter ) )
2.5.13.11 (caseIgnoreListMatch): matchingRuleUse: ( 2.5.13.11 NAME 'caseIgnoreListMatch' APPLIES ( postalAddress $ registeredAddress $ homePostalAddress ) )
2.5.13.8 (numericStringMatch): matchingRuleUse: ( 2.5.13.8 NAME 'numericStringMatch' APPLIES ( x121Address $ internationaliSDNNumber ) )
2.5.13.7 (caseExactSubstringsMatch): matchingRuleUse: ( 2.5.13.7 NAME 'caseExactSubstringsMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) )
2.5.13.6 (caseExactOrderingMatch): matchingRuleUse: ( 2.5.13.6 NAME 'caseExactOrderingMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) )
2.5.13.5 (caseExactMatch): matchingRuleUse: ( 2.5.13.5 NAME 'caseExactMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ cn $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olcTLSCACertificatePath $ olcTLSCertificateFile $ olcTLSCertificateKeyFile $ olcTLSCipherSuite $ olcTLSCRLCheck $ olcTLSCRLFile $ olcTLSRandFile $ olcTLSVerifyClient $ olcTLSDHParamFile $ olcTLSProtocolMin $ olcUpdateRef $ olcDbDirectory $ olcDbCheckpoint $ olcDbCryptFile $ olcDbPageSize $ olcDbIndex $ olcDbLockDetect $ olcDbMode $ olcChainingBehavior $ olcDbURI $ olcDbStartTLS $ olcDbNetworkTimeout $ olcDbQuarantine $ olcDbACLPasswd $ olcDbACLBind $ olcDbIDAssertPasswd $ olcDbIDAssertBind $ olcDbIDAssertMode $ olcDbIDAssertAuthzFrom $ olcDbTFSupport $ olcDbTimeout $ olcDbIdleTimeout $ olcDbConnTtl $ olcDbCancel $ olcDbIDAssertPassThru $ olcDbSocketPath $ olcDbSocketExtensions $ knowledgeInformation $ sn $ serialNumber $ c $ l $ st $ street $ o $ ou $ title $ businessCategory $ postalCode $ postOfficeBox $ physicalDeliveryOfficeName $ destinationIndicator $ givenName $ initials $ generationQualifier $ dnQualifier $ houseIdentifier $ dmdName $ pseudonym $ textEncodedORAddress $ info $ drink $ roomNumber $ userClass $ host $ documentIdentifier $ documentTitle $ documentVersion $ documentLocation $ personalTitle $ co $ uniqueIdentifier $ organizationalStatus $ buildingName $ documentPublisher $ carLicense $ departmentNumber $ displayName $ employeeNumber $ employeeType $ preferredLanguage $ ipServiceProtocol $ nisMapName $ mailNickname $ sAMAccountName ) )
2.5.13.4 (caseIgnoreSubstringsMatch): matchingRuleUse: ( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) )
2.5.13.3 (caseIgnoreOrderingMatch): matchingRuleUse: ( 2.5.13.3 NAME 'caseIgnoreOrderingMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) )
2.5.13.2 (caseIgnoreMatch): matchingRuleUse: ( 2.5.13.2 NAME 'caseIgnoreMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ cn $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olcTLSCACertificatePath $ olcTLSCertificateFile $ olcTLSCertificateKeyFile $ olcTLSCipherSuite $ olcTLSCRLCheck $ olcTLSCRLFile $ olcTLSRandFile $ olcTLSVerifyClient $ olcTLSDHParamFile $ olcTLSProtocolMin $ olcUpdateRef $ olcDbDirectory $ olcDbCheckpoint $ olcDbCryptFile $ olcDbPageSize $ olcDbIndex $ olcDbLockDetect $ olcDbMode $ olcChainingBehavior $ olcDbURI $ olcDbStartTLS $ olcDbNetworkTimeout $ olcDbQuarantine $ olcDbACLPasswd $ olcDbACLBind $ olcDbIDAssertPasswd $ olcDbIDAssertBind $ olcDbIDAssertMode $ olcDbIDAssertAuthzFrom $ olcDbTFSupport $ olcDbTimeout $ olcDbIdleTimeout $ olcDbConnTtl $ olcDbCancel $ olcDbIDAssertPassThru $ olcDbSocketPath $ olcDbSocketExtensions $ knowledgeInformation $ sn $ serialNumber $ c $ l $ st $ street $ o $ ou $ title $ businessCategory $ postalCode $ postOfficeBox $ physicalDeliveryOfficeName $ destinationIndicator $ givenName $ initials $ generationQualifier $ dnQualifier $ houseIdentifier $ dmdName $ pseudonym $ textEncodedORAddress $ info $ drink $ roomNumber $ userClass $ host $ documentIdentifier $ documentTitle $ documentVersion $ documentLocation $ personalTitle $ co $ uniqueIdentifier $ organizationalStatus $ buildingName $ documentPublisher $ carLicense $ departmentNumber $ displayName $ employeeNumber $ employeeType $ preferredLanguage $ ipServiceProtocol $ nisMapName $ mailNickname $ sAMAccountName ) )
1.2.36.79672281.1.13.3 (rdnMatch): 2.5.13.1 (distinguishedNameMatch): matchingRuleUse: ( 2.5.13.1 NAME 'distinguishedNameMatch' APPLIES ( creatorsName $ modifiersName $ subschemaSubentry $ entryDN $ namingContexts $ aliasedObjectName $ dynamicSubtrees $ distinguishedName $ seeAlso $ olcDefaultSearchBase $ olcRootDN $ olcSchemaDN $ olcSuffix $ olcUpdateDN $ olcDbACLAuthcDn $ olcDbIDAssertAuthcDn $ olcRelay $ member $ owner $ roleOccupant $ manager $ documentAuthor $ secretary $ associatedName $ dITRedirect $ objectCategory ) )
2.5.13.0 (objectIdentifierMatch): matchingRuleUse: ( 2.5.13.0 NAME 'objectIdentifierMatch' APPLIES ( supportedControl $ supportedExtension $ supportedFeatures $ supportedApplicationContext ) )
slapd startup: initiated.
backend_startup_one: starting "cn=config"
config_back_db_open
Backend ACL: access to *
by * none
config_back_db_open: line 0: warning: cannot assess the validity of the ACL scope within backend naming context
backend_startup_one: starting "dc=htc,dc=com"
bdb_db_open: "dc=htc,dc=com"
bdb_db_open: database "dc=htc,dc=com": dbenv_open(/var/lib/ldap/htc.com).
backend_startup_one: starting "dc=internal"
bdb_db_open: "dc=internal"
bdb_db_open: warning - no DB_CONFIG file found in directory /var/lib/ldap/htc.internal: (2).
Expect poor performance for suffix "dc=internal".
bdb_db_open: database "dc=internal": dbenv_open(/var/lib/ldap/htc.internal).
backend_startup_one: starting "cn=Monitor"
>>> dnNormalize: <cn=Monitor>
<<< dnNormalize: <cn=monitor>
>>> dnPretty: <cn=Backends>
=> ldap_bv2dn(cn=Backends,0)
<= ldap_bv2dn(cn=Backends)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Backends)=0
<<< dnPretty: <cn=Backends>
>>> dnNormalize: <cn=Backends>
<<< dnNormalize: <cn=backends>
>>> dnPretty: <cn=Connections>
=> ldap_bv2dn(cn=Connections,0)
<= ldap_bv2dn(cn=Connections)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Connections)=0
<<< dnPretty: <cn=Connections>
>>> dnNormalize: <cn=Connections>
<<< dnNormalize: <cn=connections>
>>> dnPretty: <cn=Databases>
=> ldap_bv2dn(cn=Databases,0)
<= ldap_bv2dn(cn=Databases)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Databases)=0
<<< dnPretty: <cn=Databases>
>>> dnNormalize: <cn=Databases>
<<< dnNormalize: <cn=databases>
>>> dnPretty: <cn=Listeners>
=> ldap_bv2dn(cn=Listeners,0)
<= ldap_bv2dn(cn=Listeners)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Listeners)=0
<<< dnPretty: <cn=Listeners>
>>> dnNormalize: <cn=Listeners>
<<< dnNormalize: <cn=listeners>
>>> dnPretty: <cn=Log>
=> ldap_bv2dn(cn=Log,0)
<= ldap_bv2dn(cn=Log)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Log)=0
<<< dnPretty: <cn=Log>
>>> dnNormalize: <cn=Log>
<<< dnNormalize: <cn=log>
>>> dnPretty: <cn=Operations>
=> ldap_bv2dn(cn=Operations,0)
<= ldap_bv2dn(cn=Operations)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Operations)=0
<<< dnPretty: <cn=Operations>
>>> dnNormalize: <cn=Operations>
<<< dnNormalize: <cn=operations>
>>> dnPretty: <cn=Overlays>
=> ldap_bv2dn(cn=Overlays,0)
<= ldap_bv2dn(cn=Overlays)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Overlays)=0
<<< dnPretty: <cn=Overlays>
>>> dnNormalize: <cn=Overlays>
<<< dnNormalize: <cn=overlays>
>>> dnPretty: <cn=SASL>
=> ldap_bv2dn(cn=SASL,0)
<= ldap_bv2dn(cn=SASL)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=SASL)=0
<<< dnPretty: <cn=SASL>
>>> dnNormalize: <cn=SASL>
<<< dnNormalize: <cn=sasl>
>>> dnPretty: <cn=Statistics>
=> ldap_bv2dn(cn=Statistics,0)
<= ldap_bv2dn(cn=Statistics)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Statistics)=0
<<< dnPretty: <cn=Statistics>
>>> dnNormalize: <cn=Statistics>
<<< dnNormalize: <cn=statistics>
>>> dnPretty: <cn=Threads>
=> ldap_bv2dn(cn=Threads,0)
<= ldap_bv2dn(cn=Threads)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Threads)=0
<<< dnPretty: <cn=Threads>
>>> dnNormalize: <cn=Threads>
<<< dnNormalize: <cn=threads>
>>> dnPretty: <cn=Time>
=> ldap_bv2dn(cn=Time,0)
<= ldap_bv2dn(cn=Time)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Time)=0
<<< dnPretty: <cn=Time>
>>> dnNormalize: <cn=Time>
<<< dnNormalize: <cn=time>
>>> dnPretty: <cn=TLS>
=> ldap_bv2dn(cn=TLS,0)
<= ldap_bv2dn(cn=TLS)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=TLS)=0
<<< dnPretty: <cn=TLS>
>>> dnNormalize: <cn=TLS>
<<< dnNormalize: <cn=tls>
>>> dnPretty: <cn=Waiters>
=> ldap_bv2dn(cn=Waiters,0)
<= ldap_bv2dn(cn=Waiters)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Waiters)=0
<<< dnPretty: <cn=Waiters>
>>> dnNormalize: <cn=Waiters>
<<< dnNormalize: <cn=waiters>
>>> dnNormalize: <cn=Backend 0>
<<< dnNormalize: <cn=backend 0>
>>> dnNormalize: <cn=Database 0,cn=Databases,cn=Monitor>
=> ldap_bv2dn(cn=Database 0,cn=Databases,cn=Monitor,0)
<= ldap_bv2dn(cn=Database 0,cn=Databases,cn=Monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=database 0,cn=databases,cn=monitor)=0
<<< dnNormalize: <cn=database 0,cn=databases,cn=monitor>
>>> dnNormalize: <cn=Backend 1>
<<< dnNormalize: <cn=backend 1>
>>> dnNormalize: <cn=Backend 2>
<<< dnNormalize: <cn=backend 2>
>>> dnNormalize: <cn=Database 3,cn=Databases,cn=Monitor>
=> ldap_bv2dn(cn=Database 3,cn=Databases,cn=Monitor,0)
<= ldap_bv2dn(cn=Database 3,cn=Databases,cn=Monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=database 3,cn=databases,cn=monitor)=0
<<< dnNormalize: <cn=database 3,cn=databases,cn=monitor>
>>> dnNormalize: <cn=Backend 3>
<<< dnNormalize: <cn=backend 3>
>>> dnNormalize: <cn=Database 1,cn=Databases,cn=Monitor>
=> ldap_bv2dn(cn=Database 1,cn=Databases,cn=Monitor,0)
<= ldap_bv2dn(cn=Database 1,cn=Databases,cn=Monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=database 1,cn=databases,cn=monitor)=0
<<< dnNormalize: <cn=database 1,cn=databases,cn=monitor>
>>> dnNormalize: <cn=Database 2,cn=Databases,cn=Monitor>
=> ldap_bv2dn(cn=Database 2,cn=Databases,cn=Monitor,0)
<= ldap_bv2dn(cn=Database 2,cn=Databases,cn=Monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=database 2,cn=databases,cn=monitor)=0
<<< dnNormalize: <cn=database 2,cn=databases,cn=monitor>
>>> dnNormalize: <cn=Backend 4>
<<< dnNormalize: <cn=backend 4>
>>> dnNormalize: <cn=Backend 5>
<<< dnNormalize: <cn=backend 5>
>>> dnNormalize: <cn=Backend 6>
<<< dnNormalize: <cn=backend 6>
>>> dnNormalize: <cn=Backend 7>
<<< dnNormalize: <cn=backend 7>
>>> dnNormalize: <cn=Backend 8>
<<< dnNormalize: <cn=backend 8>
>>> dnNormalize: <cn=Backend 9>
<<< dnNormalize: <cn=backend 9>
>>> dnNormalize: <cn=Backend 10>
<<< dnNormalize: <cn=backend 10>
>>> dnNormalize: <cn=Backend 11>
<<< dnNormalize: <cn=backend 11>
>>> dnNormalize: <cn=Max File Descriptors>
<<< dnNormalize: <cn=max file descriptors>
>>> dnNormalize: <cn=Total>
<<< dnNormalize: <cn=total>
>>> dnNormalize: <cn=Current>
<<< dnNormalize: <cn=current>
>>> dnNormalize: <cn=Frontend>
<<< dnNormalize: <cn=frontend>
>>> dnNormalize: <cn=Database 0>
<<< dnNormalize: <cn=database 0>
>>> dnNormalize: <cn=Backend 0,cn=Backends,cn=Monitor>
=> ldap_bv2dn(cn=Backend 0,cn=Backends,cn=Monitor,0)
<= ldap_bv2dn(cn=Backend 0,cn=Backends,cn=Monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=backend 0,cn=backends,cn=monitor)=0
<<< dnNormalize: <cn=backend 0,cn=backends,cn=monitor>
>>> dnNormalize: <cn=Database 1>
<<< dnNormalize: <cn=database 1>
>>> dnNormalize: <cn=Backend 3,cn=Backends,cn=Monitor>
=> ldap_bv2dn(cn=Backend 3,cn=Backends,cn=Monitor,0)
<= ldap_bv2dn(cn=Backend 3,cn=Backends,cn=Monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=backend 3,cn=backends,cn=monitor)=0
<<< dnNormalize: <cn=backend 3,cn=backends,cn=monitor>
>>> dnNormalize: <cn=Database 2>
<<< dnNormalize: <cn=database 2>
>>> dnNormalize: <cn=Backend 3,cn=Backends,cn=Monitor>
=> ldap_bv2dn(cn=Backend 3,cn=Backends,cn=Monitor,0)
<= ldap_bv2dn(cn=Backend 3,cn=Backends,cn=Monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=backend 3,cn=backends,cn=monitor)=0
<<< dnNormalize: <cn=backend 3,cn=backends,cn=monitor>
>>> dnNormalize: <cn=Database 3>
<<< dnNormalize: <cn=database 3>
>>> dnNormalize: <cn=Backend 2,cn=Backends,cn=Monitor>
=> ldap_bv2dn(cn=Backend 2,cn=Backends,cn=Monitor,0)
<= ldap_bv2dn(cn=Backend 2,cn=Backends,cn=Monitor)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=backend 2,cn=backends,cn=monitor)=0
<<< dnNormalize: <cn=backend 2,cn=backends,cn=monitor>
>>> dnNormalize: <cn=Listener 0>
<<< dnNormalize: <cn=listener 0>
>>> dnNormalize: <cn=Listener 1>
<<< dnNormalize: <cn=listener 1>
>>> dnNormalize: <cn=Bind>
<<< dnNormalize: <cn=bind>
>>> dnNormalize: <cn=Unbind>
<<< dnNormalize: <cn=unbind>
>>> dnNormalize: <cn=Search>
<<< dnNormalize: <cn=search>
>>> dnNormalize: <cn=Compare>
<<< dnNormalize: <cn=compare>
>>> dnNormalize: <cn=Modify>
<<< dnNormalize: <cn=modify>
>>> dnNormalize: <cn=Modrdn>
<<< dnNormalize: <cn=modrdn>
>>> dnNormalize: <cn=Add>
<<< dnNormalize: <cn=add>
>>> dnNormalize: <cn=Delete>
<<< dnNormalize: <cn=delete>
>>> dnNormalize: <cn=Abandon>
<<< dnNormalize: <cn=abandon>
>>> dnNormalize: <cn=Extended>
<<< dnNormalize: <cn=extended>
>>> dnNormalize: <cn=Overlay 0>
<<< dnNormalize: <cn=overlay 0>
>>> dnNormalize: <cn=Overlay 1>
<<< dnNormalize: <cn=overlay 1>
>>> dnNormalize: <cn=Overlay 2>
<<< dnNormalize: <cn=overlay 2>
>>> dnNormalize: <cn=Overlay 3>
<<< dnNormalize: <cn=overlay 3>
>>> dnNormalize: <cn=Bytes>
<<< dnNormalize: <cn=bytes>
>>> dnNormalize: <cn=PDU>
<<< dnNormalize: <cn=pdu>
>>> dnNormalize: <cn=Entries>
<<< dnNormalize: <cn=entries>
>>> dnNormalize: <cn=Referrals>
<<< dnNormalize: <cn=referrals>
>>> dnNormalize: <cn=Max>
<<< dnNormalize: <cn=max>
>>> dnNormalize: <cn=Max Pending>
<<< dnNormalize: <cn=max pending>
>>> dnNormalize: <cn=Open>
<<< dnNormalize: <cn=open>
>>> dnNormalize: <cn=Starting>
<<< dnNormalize: <cn=starting>
>>> dnNormalize: <cn=Active>
<<< dnNormalize: <cn=active>
>>> dnNormalize: <cn=Pending>
<<< dnNormalize: <cn=pending>
>>> dnNormalize: <cn=Backload>
<<< dnNormalize: <cn=backload>
>>> dnNormalize: <cn=State>
<<< dnNormalize: <cn=state>
>>> dnNormalize: <cn=Runqueue>
<<< dnNormalize: <cn=runqueue>
>>> dnNormalize: <cn=Tasklist>
<<< dnNormalize: <cn=tasklist>
>>> dnNormalize: <cn=Start>
<<< dnNormalize: <cn=start>
>>> dnNormalize: <cn=Current>
<<< dnNormalize: <cn=current>
>>> dnNormalize: <cn=Uptime>
<<< dnNormalize: <cn=uptime>
>>> dnNormalize: <cn=Read>
<<< dnNormalize: <cn=read>
>>> dnNormalize: <cn=Write>
<<< dnNormalize: <cn=write>
slapd starting
daemon: added 4r listener=(nil)
daemon: added 7r listener=0x7fcb0f5bc2d0
daemon: added 8r listener=0x7fcb0f5bc390
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: activity on 1 descriptor
daemon: activity on:
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: activity on 1 descriptor
daemon: activity on:
slap_listener_activate(7):
daemon: epoll: listen=7 busy
daemon: epoll: listen=8 active_threads=0 tvp=zero
>>> slap_listener(ldap:///)
daemon: activity on 1 descriptor
daemon: activity on:daemon: listen=7, new connection on 16
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: added 16r (active) listener=(nil)
conn=1000 fd=16 ACCEPT from IP=172.24.10.201:23867 (IP=0.0.0.0:389)
daemon: activity on 1 descriptor
daemon: activity on:
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: activity on 1 descriptor
daemon: activity on: 16r
daemon: read active on 16
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
connection_get(16)
connection_get(16): got connid=1000
connection_read(16): checking for input on id=1000
ber_get_next
ldap_read: want=8, got=8
0000: 30 60 02 01 01 60 33 02 0`...`3.
ldap_read: want=90, got=90
0000: 01 03 04 19 75 69 64 3d 4e 75 50 6f 69 6e 74 2c ....uid=NuPoint,
0010: 64 63 3d 68 74 63 2c 64 63 3d 63 6f 6d 80 13 64 dc=htc,dc=com..d
0020: 65 63 20 31 33 20 32 30 31 32 20 63 72 65 61 74 ec 13 2012 creat
0030: 65 64 a0 26 30 24 04 16 31 2e 32 2e 38 34 30 2e ed.&0$..1.2.840.
0040: 31 31 33 35 35 36 2e 31 2e 34 2e 33 31 39 01 01 113556.1.4.319..
0050: ff 04 07 30 05 02 01 0a 04 00 ...0......
ber_get_next: tag 0x30 len 96 contents:
ber_dump: buf=0x7fcad8000920 ptr=0x7fcad8000920 end=0x7fcad8000980 len=96
0000: 02 01 01 60 33 02 01 03 04 19 75 69 64 3d 4e 75 ...`3.....uid=Nu
0010: 50 6f 69 6e 74 2c 64 63 3d 68 74 63 2c 64 63 3d Point,dc=htc,dc=
0020: 63 6f 6d 80 13 64 65 63 20 31 33 20 32 30 31 32 com..dec 13 2012
0030: 20 63 72 65 61 74 65 64 a0 26 30 24 04 16 31 2e created.&0$..1.
0040: 32 2e 38 34 30 2e 31 31 33 35 35 36 2e 31 2e 34 2.840.113556.1.4
0050: 2e 33 31 39 01 01 ff 04 07 30 05 02 01 0a 04 00 .319.....0......
op tag 0x60, time 1355857467
ber_get_next
ldap_read: want=8 error=Resource temporarily unavailable
daemon: activity on 1 descriptor
daemon: activity on:
conn=1000 op=0 do_bind
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
ber_scanf fmt ({imt) ber:
ber_dump: buf=0x7fcad8000920 ptr=0x7fcad8000923 end=0x7fcad8000980 len=93
0000: 60 33 02 01 03 04 19 75 69 64 3d 4e 75 50 6f 69 `3.....uid=NuPoi
0010: 6e 74 2c 64 63 3d 68 74 63 2c 64 63 3d 63 6f 6d nt,dc=htc,dc=com
0020: 80 13 64 65 63 20 31 33 20 32 30 31 32 20 63 72 ..dec 13 2012 cr
0030: 65 61 74 65 64 a0 26 30 24 04 16 31 2e 32 2e 38 eated.&0$..1.2.8
0040: 34 30 2e 31 31 33 35 35 36 2e 31 2e 34 2e 33 31 40.113556.1.4.31
0050: 39 01 01 ff 04 07 30 05 02 01 0a 04 00 9.....0......
ber_scanf fmt (m}) ber:
ber_dump: buf=0x7fcad8000920 ptr=0x7fcad8000943 end=0x7fcad8000980 len=61
0000: 00 13 64 65 63 20 31 33 20 32 30 31 32 20 63 72 ..dec 13 2012 cr
0010: 65 61 74 65 64 a0 26 30 24 04 16 31 2e 32 2e 38 eated.&0$..1.2.8
0020: 34 30 2e 31 31 33 35 35 36 2e 31 2e 34 2e 33 31 40.113556.1.4.31
0030: 39 01 01 ff 04 07 30 05 02 01 0a 04 00 9.....0......
=> get_ctrls
ber_scanf fmt ({m) ber:
ber_dump: buf=0x7fcad8000920 ptr=0x7fcad800095a end=0x7fcad8000980 len=38
0000: 30 24 04 16 31 2e 32 2e 38 34 30 2e 31 31 33 35 0$..1.2.840.1135
0010: 35 36 2e 31 2e 34 2e 33 31 39 01 01 ff 04 07 30 56.1.4.319.....0
0020: 05 02 01 0a 04 00 ......
ber_scanf fmt (b) ber:
ber_dump: buf=0x7fcad8000920 ptr=0x7fcad8000974 end=0x7fcad8000980 len=12
0000: 00 01 ff 04 07 30 05 02 01 0a 04 00 .....0......
ber_scanf fmt (m) ber:
ber_dump: buf=0x7fcad8000920 ptr=0x7fcad8000977 end=0x7fcad8000980 len=9
0000: 04 07 30 05 02 01 0a 04 00 ..0......
=> get_ctrls: oid="1.2.840.113556.1.4.319" (critical)
<= get_ctrls: n=1 rc=12 err="critical extension is unavailable"
send_ldap_result: conn=1000 op=0 p=3
send_ldap_result: err=12 matched="" text="critical extension is unavailable"
send_ldap_response: msgid=1 tag=97 err=12
ber_flush2: 47 bytes to sd 16
0000: 30 2d 02 01 01 61 28 0a 01 0c 04 00 04 21 63 72 0-...a(......!cr
0010: 69 74 69 63 61 6c 20 65 78 74 65 6e 73 69 6f 6e itical extension
0020: 20 69 73 20 75 6e 61 76 61 69 6c 61 62 6c 65 is unavailable
ldap_write: want=47, written=47
0000: 30 2d 02 01 01 61 28 0a 01 0c 04 00 04 21 63 72 0-...a(......!cr
0010: 69 74 69 63 61 6c 20 65 78 74 65 6e 73 69 6f 6e itical extension
0020: 20 69 73 20 75 6e 61 76 61 69 6c 61 62 6c 65 is unavailable
conn=1000 op=0 RESULT tag=97 err=12 text=critical extension is unavailable
conn=1000 op=0 do_bind: get_ctrls failed
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: activity on 1 descriptor
daemon: activity on: 16r
daemon: read active on 16
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
connection_get(16)
connection_get(16): got connid=1000
connection_read(16): checking for input on id=1000
ber_get_next
ldap_read: want=8, got=0
ber_get_next on fd 16 failed errno=0 (Success)
connection_read(16): input error=-2 id=1000, closing.
connection_closing: readying conn=1000 sd=16 for close
connection_close: conn=1000 sd=16
daemon: activity on 1 descriptor
daemon: activity on:
daemon: removing 16
conn=1000 fd=16 closed (connection lost)
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
^Cdaemon: shutdown requested and initiated.
daemon: closing 7
daemon: closing 8
slapd shutdown: waiting for 0 operations/tasks to finish
slapd shutdown: initiated
====> bdb_cache_release_all
====> bdb_cache_release_all
slapd destroy: freeing system resources.
slapd stopped.
[root@radius1 openldap]# exit
exit
Script done on Tue 18 Dec 2012 03:06:10 PM EST
**********************************************************************
HTC Disclaimer: The information contained in this message may be privileged and confidential and protected from disclosure. If the reader of this message is not the intended recipient, or an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by replying to the message and deleting it from your computer. Thank you.
**********************************************************************