Hallo,
Am Donnerstag, 2. August 2007 11:35 schrieb Falk Sauer:
sieht für mich eher nach falschen werten im sysconfig
folder aus oder aber du hast ein problem mit nem chroot*,
ist mir in diesem Zusammenhang bisher noch nicht begegnet.
kannst du nicht einfach mal ein paar debug ausgaben in
deinem rcldap resp. /etc/init.d/ldap machen
Einen Auszug aus /var/log/messages bein Restart des Servers
habe ich unter angehängt,
Ein ldapsearch -d -1 ... liefert
TLS trace: SSL_connect:SSLv2/v3 write client hello A
tls_read: want=7, got=7
0000: 15 03 01 00 02 02
28 ......(
TLS trace: SSL3 alert read:fatal:handshake failure
TLS trace: SSL_connect:error in SSLv2/v3 read server hello A
TLS: can't connect.
ldap_perror
ldap_start_tls: Connect error (-11)
additional info: error:14077410:SSL
routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake
failure
vielleicht hast du auch sowas wie das hier in deinem
/etc/sysconfig/openldap
OPENLDAP_START_LDAPS="no"
Ja, habe ich, aber das bezieht sich (wenn ich das richtig
verstanden habe) nur auf das alte "ldap over ssl", das will
ich aber eigentlich nicht nutzen und würde das dann eher so
lassen wie es ist.
-------------------------------------------------------------------------------
Aug 2 11:55:17 ldap slapd[2814]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 11:55:17 ldap slapd[2814]: daemon: select: listen=8
active_threads=0 tvp=zero
Aug 2 12:01:30 ldap slapd[2814]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 12:01:30 ldap slapd[2814]: daemon: select: listen=8
active_threads=0 tvp=zero
Aug 2 12:09:14 ldap slapd[2814]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 12:09:14 ldap slapd[2814]: daemon: select: listen=8
active_threads=0 tvp=zero
Aug 2 12:15:44 ldap slapd[2814]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 12:15:44 ldap slapd[2814]: daemon: select: listen=8
active_threads=0 tvp=zero
Aug 2 12:23:02 ldap slapd[2814]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 12:23:02 ldap slapd[2814]: daemon: select: listen=8
active_threads=0 tvp=zero
Aug 2 12:27:37 ldap slapd[2814]: daemon: shutdown requested
and initiated.
Aug 2 12:27:37 ldap slapd[2814]: daemon: closing 7
Aug 2 12:27:37 ldap slapd[2814]: daemon: closing 8
Aug 2 12:27:37 ldap slapd[2814]: slapd shutdown: waiting
for 0 threads to terminate
Aug 2 12:27:37 ldap slapd[2814]: slapd shutdown: initiated
Aug 2 12:27:37 ldap slapd[2814]: ====>
bdb_cache_release_all
Aug 2 12:27:37 ldap slapd[2814]: slapd destroy: freeing
system resources.
Aug 2 12:27:37 ldap slapd[2814]: slapd stopped.
Aug 2 12:27:40 ldap slapd[3298]: @(#) $OpenLDAP: slapd
2.3.27 (Nov 25 2006 17:08:16) $
abuild@eisler:/usr/src/packages/BUILD/openldap-2.3.27/servers/slapd
Aug 2 12:27:40 ldap slapd[3298]: sql_select option missing
Aug 2 12:27:40 ldap slapd[3298]: auxpropfunc error no
mechanism available
Aug 2 12:27:40 ldap slapd[3298]: _sasl_plugin_load failed
on sasl_auxprop_plug_init for plugin: sql
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn=include{0} objectClass: olcIncludeFile cn: include{0}
olcInclude: /etc/openldap/schema/core.schema
structuralObjectClass: olcIncludeFile entryUUID:
3c703e00-c57e-102b-9fd2-15580297f29f creatorsName:
cn=config createTimestamp: 20070713111624Z entryCSN:
20070713111624Z#000000#00#000000 modifiersName: cn=config
modifyTimestamp: 20070713111624Z "
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(cn=include{0}) -> 0x801f6fb8
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "cn=include{0},cn=config" "objectClass" requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn=include{1} objectClass: olcIncludeFile cn: include{1}
olcInclude: /etc/openldap/schema/cosine.schema
structuralObjectClass: olcIncludeFile entryUUID:
3c7075be-c57e-102b-9fd3-15580297f29f creatorsName:
cn=config createTimestamp: 20070713111624Z entryCSN:
20070713111624Z#000000#00#000000 modifiersName: cn=config
modifyTimestamp: 20070713111624Z "
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(cn=include{1}) -> 0x801f7c58
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "cn=include{1},cn=config" "objectClass" requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn=include{2} objectClass: olcIncludeFile cn: include{2}
olcInclude: /etc/openldap/schema/inetorgperson.schema
structuralObjectClass: olcIncludeFile entryUUID:
3c70a732-c57e-102b-9fd4-15580297f29f creatorsName:
cn=config createTimestamp: 20070713111624Z entryCSN:
20070713111624Z#000000#00#000000 modifiersName: cn=config
modifyTimestamp: 20070713111624Z "
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(cn=include{2}) -> 0x801f7c58
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "cn=include{2},cn=config" "objectClass" requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn=include{3} objectClass: olcIncludeFile cn: include{3}
olcInclude: /etc/openldap/schema/rfc2307bis.schema
structuralObjectClass: olcIncludeFile entryUUID:
3c70dd38-c57e-102b-9fd5-15580297f29f creatorsName:
cn=config createTimestamp: 20070713111624Z entryCSN:
20070713111624Z#000000#00#000000 modifiersName: cn=config
modifyTimestamp: 20070713111624Z "
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(cn=include{3}) -> 0x801f7fc8
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "cn=include{3},cn=config" "objectClass" requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn=include{4} objectClass: olcIncludeFile cn: include{4}
olcInclude: /etc/openldap/schema/yast.schema
structuralObjectClass: olcIncludeFile entryUUID:
3c71d33c-c57e-102b-9fd6-15580297f29f creatorsName:
cn=config createTimestamp: 20070713111624Z entryCSN:
20070713111624Z#000000#00#000000 modifiersName: cn=config
modifyTimestamp: 20070713111624Z "
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(cn=include{4}) -> 0x801f8458
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "cn=include{4},cn=config" "objectClass" requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn=schema objectClass: olcSchemaConfig cn: schema
olcObjectIdentifier: OLcfg 1.3.6.1.4.1.4203.666.11.1
olcObjectIdentifier: OLcfgAt OLcfg:3 olcObjectIdentifier:
OLcfgGlAt OLcfgAt:0 olcObjectIdentifier: OLcfgBkAt
OLcfgAt:1 olcObjectIdentifier: OLcfgDbAt OLcfgAt:2
olcObjectIdentifier: OLcfgOvAt OLcfgAt:3
olcObjectIdentifier: OLcfgOc OLcfg:4 olcObjectIdentifier:
OLcfgGlOc OLcfgOc:0 olcObjectIdentifier: OLcfgBkOc
OLcfgOc:1 olcObjectIdentifier: OLcfgDbOc OLcfgOc:2
olcObjectIdentifier: OLcfgOvOc OLcfgOc:3
olcObjectIdentifier: OMsyn 1.3.6.1.4.1.1466.115.121.1
olcObjectIdentifier: OMsInteger OMsyn:27
olcObjectIdentifier: OMsBoolean OMsyn:7
olcObjectIdentifier: OMsDN OMsyn:12 olcObjectIdentifier:
OMsDirectoryString OMsyn:15 olcObjectIdentifier:
OMsOctetString OMsyn:40 olcAttributeTypes: ( 2.5.4.0
NAME 'objectClass' DESC 'RFC2256: object classes of the
entity' EQUALITY objectIdentifierMatch SYNTAX
1.3.6.1.4.1.1466.115.121 .1.38 ) olcAttributeTypes: (
2.5.21.9 NAME 'structuralObjectClass' DESC 'X.500(93): st
ructural object class of entry' EQUALITY
objectIdentifierMatch SYNTAX
1.3.6.1 .4.1.1466.115.121.1.38 SINGLE-VALUE
NO-USER-MODIFICATION USAGE directoryOpera tion )
olcAttributeTypes: ( 2.5.18.1 NAME 'createTimestamp'
DESC 'RFC2252: time which object was created' EQUALITY
generalizedTimeMatch ORDERING generalizedTimeOr
deringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.24
SINGLE-VALUE NO-USER-MODIFIC ATION USAGE
directoryOperation ) olcAttributeTypes: ( 2.5.18.2
NAME 'modifyTimestamp' DESC 'RFC2252: time which object
was last modified' EQUALITY generalizedTimeMatch ORDERING
generalized TimeOrderingMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE NO-USER-M
ODIFICATION USAGE directoryOperation ) olcAttributeTypes: (
2.5.18.3 NAME 'creatorsName' DESC 'RFC2252: name of creat
or' EQUALITY distinguishedNameMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.12 SING LE-VALUE
NO-USER-MODIFICATION USAGE directoryOperation )
olcAttributeTypes: ( 2.5.18.4 NAME 'modifiersName
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <= str2entry(cn=schema) ->
0x801f7c58
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "cn=schema,cn=config" "objectClass" requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn={0}core objectClass: olcSchemaConfig cn: {0}core
olcAttributeTypes: {0}( 2.5.4.2 NAME 'knowledgeInformation'
DESC 'RFC2256: kno wledge information' EQUALITY
caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121. 1.15
{32768} ) olcAttributeTypes: {1}( 2.5.4.4 NAME
( 'sn' 'surname' ) DESC 'RFC2256: last (f amily) name(s)
for which the entity is known by' SUP name )
olcAttributeTypes: {2}( 2.5.4.5 NAME 'serialNumber'
DESC 'RFC2256: serial numb er of the entity' EQUALITY
caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch S YNTAX
1.3.6.1.4.1.1466.115.121.1.44{64} ) olcAttributeTypes: {3}(
2.5.4.6 NAME ( 'c' 'countryName' ) DESC 'RFC2256: ISO-
3166 country 2-letter code' SUP name SINGLE-VALUE )
olcAttributeTypes: {4}( 2.5.4.7 NAME ( 'l' 'localityName' )
DESC 'RFC2256: loc ality which this object resides in' SUP
name ) olcAttributeTypes: {5}( 2.5.4.8 NAME
( 'st' 'stateOrProvinceName' ) DESC 'RFC2 256: state or
province which this object resides in' SUP name )
olcAttributeTypes: {6}( 2.5.4.9 NAME
( 'street' 'streetAddress' ) DESC 'RFC225 6: street
address of this object' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreS ubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15{128} ) olcAttributeTypes: {7}
( 2.5.4.10 NAME ( 'o' 'organizationName' ) DESC 'RFC2256 :
organization this object belongs to' SUP name )
olcAttributeTypes: {8}( 2.5.4.11 NAME
( 'ou' 'organizationalUnitName' ) DESC ' RFC2256:
organizational unit this object belongs to' SUP name )
olcAttributeTypes: {9}( 2.5.4.12 NAME 'title'
DESC 'RFC2256: title associated with the entity' SUP
name ) olcAttributeTypes: {10}( 2.5.4.14 NAME 'searchGuide'
DESC 'RFC2256: search gui de, deprecated by
enhancedSearchGuide' SYNTAX 1.3.6.1.4.1.1466.115.121.1.25 )
olcAttributeTypes: {11}( 2.5.4.15 NAME 'businessCategory'
DESC 'RFC2256: busin ess category' EQUALITY
caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTA X
1.3.6.1.4.1.1466.115.121.1.15{128} ) olcAttributeTypes:
{12}( 2.5.4.16 NAME 'postalAddress' DESC 'RFC2256:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(cn={0}core) -> 0x8022c768
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "cn={0}core,cn=schema,cn=config" "objectClass"
requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn={1}cosine objectClass: olcSchemaConfig cn: {1}cosine
olcAttributeTypes: {0}( 0.9.2342.19200300.100.1.2
NAME 'textEncodedORAddress' EQUALITY caseIgnoreMatch
SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.
1466.115.121.1.15{256} ) olcAttributeTypes: {1}(
0.9.2342.19200300.100.1.4 NAME 'info' DESC 'RFC1274: g
eneral information' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15{2048} ) olcAttributeTypes:
{2}( 0.9.2342.19200300.100.1.5 NAME ( 'drink' 'favouriteDri
nk' ) DESC 'RFC1274: favorite drink' EQUALITY
caseIgnoreMatch SUBSTR caseIgno reSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15{256} ) olcAttributeTypes: {3}
( 0.9.2342.19200300.100.1.6 NAME 'roomNumber' DESC 'RFC1
274: room number' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch S YNTAX
1.3.6.1.4.1.1466.115.121.1.15{256} ) olcAttributeTypes: {4}
( 0.9.2342.19200300.100.1.7 NAME 'photo' DESC 'RFC1274:
photo (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.23
{25000} ) olcAttributeTypes: {5}( 0.9.2342.19200300.100.1.8
NAME 'userClass' DESC 'RFC12 74: category of user'
EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMat ch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {6}( 0.9.2342.19200300.100.1.9
NAME 'host' DESC 'RFC1274: h ost computer' EQUALITY
caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTA X
1.3.6.1.4.1.1466.115.121.1.15{256} ) olcAttributeTypes: {7}
( 0.9.2342.19200300.100.1.10 NAME 'manager' DESC 'RFC127
4: DN of manager' EQUALITY distinguishedNameMatch SYNTAX
1.3.6.1.4.1.1466.115 .121.1.12 ) olcAttributeTypes: {8}(
0.9.2342.19200300.100.1.11 NAME 'documentIdentifier' D
ESC 'RFC1274: unique identifier of document' EQUALITY
caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15{256} ) olcAttributeTypes: {9}
( 0.9.2342.19200300.100.1.12 NAME 'documentTitle' DESC '
RFC1274: title of document' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstri ngsMatch SYNTAX 1.3.6.
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(cn={1}cosine) -> 0x8023cce8
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "cn={1}cosine,cn=schema,cn=config" "objectClass"
requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn={2}inetorgperson objectClass: olcSchemaConfig cn:
{2}inetorgperson olcAttributeTypes: {0}(
2.16.840.1.113730.3.1.1 NAME 'carLicense' DESC 'RFC279 8:
vehicle license or registration plate' EQUALITY
caseIgnoreMatch SUBSTR cas eIgnoreSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15 ) olcAttributeTypes: {1}(
2.16.840.1.113730.3.1.2 NAME 'departmentNumber' DESC '
RFC2798: identifies a department within an organization'
EQUALITY caseIgnoreM atch SUBSTR caseIgnoreSubstringsMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 ) olcAttributeTypes:
{2}( 2.16.840.1.113730.3.1.241 NAME 'displayName' DESC 'RFC
2798: preferred name to be used when displaying entries'
EQUALITY caseIgnoreM atch SUBSTR caseIgnoreSubstringsMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SI NGLE-VALUE )
olcAttributeTypes: {3}( 2.16.840.1.113730.3.1.3
NAME 'employeeNumber' DESC 'RF C2798: numerically
identifies an employee within an organization' EQUALITY ca
seIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.12 1.1.15 SINGLE-VALUE )
olcAttributeTypes: {4}( 2.16.840.1.113730.3.1.4
NAME 'employeeType' DESC 'RFC2 798: type of employment for
a person' EQUALITY caseIgnoreMatch SUBSTR caseIgn
oreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
olcAttributeTypes: {5}( 0.9.2342.19200300.100.1.60
NAME 'jpegPhoto' DESC 'RFC2 798: a JPEG image' SYNTAX
1.3.6.1.4.1.1466.115.121.1.28 ) olcAttributeTypes: {6}(
2.16.840.1.113730.3.1.39 NAME 'preferredLanguage'
DESC 'RFC2798: preferred written or spoken language for a
person' EQUALITY caseIg noreMatch SUBSTR
caseIgnoreSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1. 15 SINGLE-VALUE )
olcAttributeTypes: {7}( 2.16.840.1.113730.3.1.40
NAME 'userSMIMECertificate' D ESC 'RFC2798: PKCS#7
SignedData used to support S/MIME' SYNTAX 1.3.6.1.4.1.14
66.115.121.1.5 ) olcAttributeTypes: {8}(
2.16.840.1.113730.3.1.216 NAME 'userPKCS12' DESC 'RFC2
798: personal identity information, a PKCS #12 PFX' SYNTAX
1.3.6.1.4.1.1466.1 15.121.1.5
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(cn={2}inetorgperson) -> 0x802065b8
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access
to "cn={2}inetorgperson,cn=schema,cn=config" "objectClass"
requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn={3}rfc2307bis objectClass: olcSchemaConfig cn:
{3}rfc2307bis olcAttributeTypes: {0}( 1.3.6.1.1.1.1.2
NAME 'gecos' DESC 'The GECOS field; th e common name'
EQUALITY caseIgnoreIA5Match SUBSTR
caseIgnoreIA5SubstringsMatc h SYNTAX
1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
olcAttributeTypes: {1}( 1.3.6.1.1.1.1.3
NAME 'homeDirectory' DESC 'The absolut e path to the home
directory' EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1
466.115.121.1.26 SINGLE-VALUE ) olcAttributeTypes: {2}(
1.3.6.1.1.1.1.4 NAME 'loginShell' DESC 'The path to th e
login shell' EQUALITY caseExactIA5Match SYNTAX
1.3.6.1.4.1.1466.115.121.1.2 6 SINGLE-VALUE )
olcAttributeTypes: {3}( 1.3.6.1.1.1.1.5
NAME 'shadowLastChange' EQUALITY integ erMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {4}( 1.3.6.1.1.1.1.6 NAME 'shadowMin'
EQUALITY integerMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {5}( 1.3.6.1.1.1.1.7 NAME 'shadowMax'
EQUALITY integerMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {6}( 1.3.6.1.1.1.1.8
NAME 'shadowWarning' EQUALITY integerM atch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {7}( 1.3.6.1.1.1.1.9
NAME 'shadowInactive' EQUALITY integer Match SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {8}( 1.3.6.1.1.1.1.10
NAME 'shadowExpire' EQUALITY integerM atch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {9}( 1.3.6.1.1.1.1.11 NAME 'shadowFlag'
EQUALITY integerMat ch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {10}( 1.3.6.1.1.1.1.12 NAME 'memberUid'
EQUALITY caseExactI A5Match SYNTAX
1.3.6.1.4.1.1466.115.121.1.26 ) olcAttributeTypes: {11}(
1.3.6.1.1.1.1.13 NAME 'memberNisNetgroup' EQUALITY ca
seExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNTAX
1.3.6.1.4.1.1466.11 5.121.1.26 ) olcAttributeTypes: {12}(
1.3.6.1.1.1.1.14 NAME 'nisNetgroupTriple' DESC 'Netgr oup
triple' EQUALIT
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(cn={3}rfc2307bis) -> 0x8023cce8
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access
to "cn={3}rfc2307bis,cn=schema,cn=config" "objectClass"
requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
cn={4}yast objectClass: olcSchemaConfig cn: {4}yast
olcObjectIdentifier: {0}SUSE 1.3.6.1.4.1.7057
olcObjectIdentifier: {1}SUSE.YaST SUSE:10.1
olcObjectIdentifier: {2}SUSE.YaST.ModuleConfig SUSE:10.1.2
olcObjectIdentifier: {3}SUSE.YaST.ModuleConfig.OC
SUSE.YaST.ModuleConfig:1 olcObjectIdentifier:
{4}SUSE.YaST.ModuleConfig.Attr SUSE.YaST.ModuleConfig:2
olcAttributeTypes: {0}( SUSE.YaST.ModuleConfig.Attr:2
NAME 'suseDefaultBase' D ESC 'Base DN where new Objects
should be created by default' EQUALITY disting
uishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
SINGLE-VALUE ) olcAttributeTypes: {1}(
SUSE.YaST.ModuleConfig.Attr:3 NAME 'suseNextUniqueId'
DESC 'Next unused unique ID, can be used to generate
directory wide uniqe IDs ' EQUALITY integerMatch ORDERING
integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466 .115.121.1.27
SINGLE-VALUE ) olcAttributeTypes: {2}(
SUSE.YaST.ModuleConfig.Attr:4 NAME 'suseMinUniqueId' D
ESC 'lower Border for Unique IDs' EQUALITY integerMatch
ORDERING integerOrder ingMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {3}( SUSE.YaST.ModuleConfig.Attr:5
NAME 'suseMaxUniqueId' D ESC 'upper Border for Unique IDs'
EQUALITY integerMatch ORDERING integerOrder ingMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {4}( SUSE.YaST.ModuleConfig.Attr:6
NAME 'suseDefaultTemplat e' DESC 'The DN of a template
that should be used by default' EQUALITY distin
guishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
SINGLE-VALUE ) olcAttributeTypes: {5}(
SUSE.YaST.ModuleConfig.Attr:7 NAME 'suseSearchFilter'
DESC 'Search filter to localize Objects' SYNTAX
1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE )
olcAttributeTypes: {6}( SUSE.YaST.ModuleConfig.Attr:11
NAME 'suseDefaultValue' DESC 'an
Attribute-Value-Assertions to define defaults for specific
Attribut es' EQUALITY caseIgnoreMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15 ) olcAttributeTypes: {7}(
SUSE.YaST.ModuleConfig.Attr:12 NAME 'suseNamingAttribu
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(cn={4}yast) -> 0x80235870
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "cn={4}yast,cn=schema,cn=config" "objectClass"
requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
olcDatabase={-1}frontend objectClass: olcDatabaseConfig
objectClass: olcFrontendConfig olcDatabase: {-1}frontend
olcAccess: {0}to * by * read olcLastMod: TRUE
olcMaxDerefDepth: 0 olcReadOnly: FALSE olcSchemaDN:
cn=Subschema olcSizeLimit: unlimited structuralObjectClass:
olcDatabaseConfig entryUUID:
3c740ba2-c57e-102b-9fdd-15580297f29f creatorsName:
cn=config createTimestamp: 20070713111624Z entryCSN:
20070713111624Z#000000#00#000000 modifiersName: cn=config
modifyTimestamp: 20070713111624Z "
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(olcDatabase={-1}frontend) -> 0x801f8458
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access
to "olcDatabase={-1}frontend,cn=config" "objectClass"
requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
olcDatabase={0}config objectClass: olcDatabaseConfig
olcDatabase: {0}config olcAccess: {0}to * by * read
olcLastMod: TRUE olcMaxDerefDepth: 15 olcReadOnly: FALSE
olcRootDN: cn=config olcRootPW: {SSHA}xxx
structuralObjectClass: olcDatabaseConfig entryUUID:
3c7453b4-c57e-102b-9fde-15580297f29f creatorsName:
cn=config createTimestamp: 20070713111624Z entryCSN:
20070713111624Z#000000#00#000000 modifiersName: cn=config
modifyTimestamp: 20070713111624Z "
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(olcDatabase={0}config) -> 0x801f8918
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "olcDatabase={0}config,cn=config" "objectClass"
requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: /etc/openldap/slapd.d:
line 1: warning: cannot assess the validity of the ACL
scope within backend naming context
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
olcDatabase={1}bdb objectClass: olcDatabaseConfig
objectClass: olcBdbConfig olcDatabase: {1}bdb olcSuffix:
dc=thomas,dc=virtual olcLastMod: TRUE olcMaxDerefDepth: 15
olcReadOnly: FALSE olcRootDN:
cn=ldapadmin,dc=thomas,dc=virtual olcRootPW:: xxx
olcDbDirectory: /var/lib/ldap olcDbCacheSize: 10000
olcDbCheckpoint: 1024 5 olcDbConfig: {0}set_cachesize 0
15000000 1 olcDbConfig: {1}set_lg_regionmax 262144
olcDbConfig: {2}set_lg_bsize 2097152 olcDbConfig:
{3}set_flags DB_LOG_AUTOREMOVE olcDbConfig: {4}
olcDbNoSync: FALSE olcDbDirtyRead: FALSE olcDbIDLcacheSize:
0 olcDbIndex: objectClass eq olcDbLinearIndex: FALSE
olcDbMode: 384 olcDbSearchStack: 16 olcDbShmKey: 0
olcDbCacheFree: 1 structuralObjectClass: olcBdbConfig
entryUUID: 3c749d06-c57e-102b-9fdf-15580297f29f
creatorsName: cn=config createTimestamp: 20070713111624Z
entryCSN: 20070713111624Z#000000#00#000000 modifiersName:
cn=config modifyTimestamp: 20070713111624Z "
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(olcDatabase={1}bdb) -> 0x801f7c58
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access to "olcDatabase={1}bdb,cn=config" "objectClass"
requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: bdb_db_init: Initializing
BDB database
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: index objectClass 0x0004
Aug 2 12:27:40 ldap slapd[3298]: => str2entry: "dn:
olcOverlay={0}syncprov objectClass: olcOverlayConfig
objectClass: olcSyncProvConfig olcOverlay: {0}syncprov
olcSpCheckpoint: 10 60 olcSpSessionlog: 10000
structuralObjectClass: olcSyncProvConfig entryUUID:
639eaa22-ca22-102b-842e-335e468c43ab creatorsName:
cn=config createTimestamp: 20070719090132Z entryCSN:
20070719090132Z#000000#00#000000 modifiersName: cn=config
modifyTimestamp: 20070719090132Z "
Aug 2 12:27:40 ldap slapd[3298]: >>> dnPrettyNormal:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnPrettyNormal:
,
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: >>> dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <<< dnNormalize:
Aug 2 12:27:40 ldap slapd[3298]: <=
str2entry(olcOverlay={0}syncprov) -> 0x80231518
Aug 2 12:27:40 ldap slapd[3298]: => test_filter
Aug 2 12:27:40 ldap slapd[3298]: PRESENT
Aug 2 12:27:40 ldap slapd[3298]: => access_allowed: search
access
to "olcOverlay={0}syncprov,olcDatabase={1}bdb,cn=config" "objectClass"
requested
Aug 2 12:27:40 ldap slapd[3298]: <= root access granted
Aug 2 12:27:40 ldap slapd[3298]: <= test_filter 6
Aug 2 12:27:40 ldap slapd[3298]: send_ldap_result: conn=-1
op=0 p=0
Aug 2 12:27:40 ldap slapd[3298]: send_ldap_result: err=0
matched="" text=""
Aug 2 12:27:40 ldap slapd[3298]: matching_rule_use_init
Aug 2 12:27:40 ldap slapd[3298]: 1.2.840.113556.1.4.804
(integerBitOrMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
1.2.840.113556.1.4.804 NAME 'integerBitOrMatch' APPLIES (
supportedLDAPVersion $ uidNumber $ gidNumber $
olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth
$ olcIdleTimeout $ olcIndexSubstrIfMinLen $
olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $
olcIndexSubstrAnyStep $ olcLocalSSF $ olcMaxDerefDepth $
olcReplicationInterval $ olcSockbufMaxIncoming $
olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $
olcDbCacheFree $ olcDbCacheSize $ olcDbIDLcacheSize $
olcDbMode $ olcDbSearchStack $ olcDbShmKey $
olcDbProtocolVersion $ reqResult $ reqId $ reqVersion $
reqSizeLimit $ reqTimeLimit $ reqEntries $
olcProxyCacheQueries $ errCode $ errSleepTime $
olcSpSessionlog $ mailPreferenceOption $ shadowLastChange $
shadowMin $ shadowMax $ shadowWarning $ shadowInactive $
shadowExpire $ shadowFlag $ ipServicePort $
ipProtocolNumber $ oncRpcNumber $ suseNextUniqueId $
suseMinUniqueId $ suseMaxUniqueId $ suseMinPasswordLength $
suseMaxPasswordLength $ suseImapDefaultQuota ) )
Aug 2 12:27:40 ldap slapd[3298]: 1.2.840.113556.1.4.803
(integerBitAndMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
1.2.840.113556.1.4.803 NAME 'integerBitAndMatch' APPLIES (
supportedLDAPVersion $ uidNumber $ gidNumber $
olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth
$ olcIdleTimeout $ olcIndexSubstrIfMinLen $
olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $
olcIndexSubstrAnyStep $ olcLocalSSF $ olcMaxDerefDepth $
olcReplicationInterval $ olcSockbufMaxIncoming $
olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $
olcDbCacheFree $ olcDbCacheSize $ olcDbIDLcacheSize $
olcDbMode $ olcDbSearchStack $ olcDbShmKey $
olcDbProtocolVersion $ reqResult $ reqId $ reqVersion $
reqSizeLimit $ reqTimeLimit $ reqEntries $
olcProxyCacheQueries $ errCode $ errSleepTime $
olcSpSessionlog $ mailPreferenceOption $ shadowLastChange $
shadowMin $ shadowMax $ shadowWarning $ shadowInactive $
shadowExpire $ shadowFlag $ ipServicePort $
ipProtocolNumber $ oncRpcNumber $ suseNextUniqueId $
suseMinUniqueId $ suseMaxUniqueId $ suseMinPasswordLength $
suseMaxPasswordLength $ suseImapDefaultQuota ) )
Aug 2 12:27:40 ldap slapd[3298]:
1.3.6.1.4.1.1466.109.114.2 (caseIgnoreIA5Match):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match'
APPLIES ( altServer $ mail $ dc $ associatedDomain $ email
$ aRecord $ mDRecord $ mXRecord $ nSRecord $ sOARecord $
cNAMERecord $ janetMailbox $ gecos $ homeDirectory $
loginShell $ memberUid $ memberNisNetgroup $
nisNetgroupTriple $ ipNetmaskNumber $ macAddress $
bootParameter $ bootFile $ nisMapEntry $ nisDomain $
automountMapName $ automountKey $ automountInformation $
suseNamingAttribute $ susePasswordHash $ suseSkelDir ) )
Aug 2 12:27:40 ldap slapd[3298]:
1.3.6.1.4.1.1466.109.114.1 (caseExactIA5Match):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' APPLIES
( altServer $ mail $ dc $ associatedDomain $ email $
aRecord $ mDRecord $ mXRecord $ nSRecord $ sOARecord $
cNAMERecord $ janetMailbox $ gecos $ homeDirectory $
loginShell $ memberUid $ memberNisNetgroup $
nisNetgroupTriple $ ipNetmaskNumber $ macAddress $
bootParameter $ bootFile $ nisMapEntry $ nisDomain $
automountMapName $ automountKey $ automountInformation $
suseNamingAttribute $ susePasswordHash $ suseSkelDir ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.35
(certificateMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.35 NAME 'certificateMatch' APPLIES ( userCertificate
$ cACertificate ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.34
(certificateExactMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.34 NAME 'certificateExactMatch' APPLIES (
userCertificate $ cACertificate ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.30
(objectIdentifierFirstComponentMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.30 NAME 'objectIdentifierFirstComponentMatch'
APPLIES ( supportedControl $ supportedExtension $
supportedFeatures $ ldapSyntaxes $
supportedApplicationContext ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.29
(integerFirstComponentMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.29 NAME 'integerFirstComponentMatch' APPLIES (
supportedLDAPVersion $ uidNumber $ gidNumber $
olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth
$ olcIdleTimeout $ olcIndexSubstrIfMinLen $
olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $
olcIndexSubstrAnyStep $ olcLocalSSF $ olcMaxDerefDepth $
olcReplicationInterval $ olcSockbufMaxIncoming $
olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $
olcDbCacheFree $ olcDbCacheSize $ olcDbIDLcacheSize $
olcDbMode $ olcDbSearchStack $ olcDbShmKey $
olcDbProtocolVersion $ reqResult $ reqId $ reqVersion $
reqSizeLimit $ reqTimeLimit $ reqEntries $
olcProxyCacheQueries $ errCode $ errSleepTime $
olcSpSessionlog $ mailPreferenceOption $ shadowLastChange $
shadowMin $ shadowMax $ shadowWarning $ shadowInactive $
shadowExpire $ shadowFlag $ ipServicePort $
ipProtocolNumber $ oncRpcNumber $ suseNextUniqueId $
suseMinUniqueId $ suseMaxUniqueId $ suseMinPasswordLength $
suseMaxPasswordLength $ suseImapDefaultQuota ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.27
(generalizedTimeMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.27 NAME 'generalizedTimeMatch' APPLIES (
createTimestamp $ modifyTimestamp $ reqStart $ reqEnd $
pwdChangedTime $ pwdAccountLockedTime $ pwdFailureTime $
pwdGraceUseTime ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.24
(protocolInformationMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.24 NAME 'protocolInformationMatch' APPLIES
protocolInformation )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.23
(uniqueMemberMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.23 NAME 'uniqueMemberMatch' APPLIES uniqueMember )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.22
(presentationAddressMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.22 NAME 'presentationAddressMatch' APPLIES
presentationAddress )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.20
(telephoneNumberMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.20 NAME 'telephoneNumberMatch' APPLIES (
telephoneNumber $ homePhone $ mobile $ pager ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.17
(octetStringMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.17 NAME 'octetStringMatch' APPLIES ( userPassword $
reqControls $ reqRespControls $ reqMod $ reqOld $ reqData $
pwdHistory $ queryid $ nisPublicKey $ nisSecretKey ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.16
(bitStringMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.16 NAME 'bitStringMatch' APPLIES
x500UniqueIdentifier )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.14
(integerMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.14 NAME 'integerMatch' APPLIES (
supportedLDAPVersion $ uidNumber $ gidNumber $
olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth
$ olcIdleTimeout $ olcIndexSubstrIfMinLen $
olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $
olcIndexSubstrAnyStep $ olcLocalSSF $ olcMaxDerefDepth $
olcReplicationInterval $ olcSockbufMaxIncoming $
olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $
olcDbCacheFree $ olcDbCacheSize $ olcDbIDLcacheSize $
olcDbMode $ olcDbSearchStack $ olcDbShmKey $
olcDbProtocolVersion $ reqResult $ reqId $ reqVersion $
reqSizeLimit $ reqTimeLimit $ reqEntries $
olcProxyCacheQueries $ errCode $ errSleepTime $
olcSpSessionlog $ mailPreferenceOption $ shadowLastChange $
shadowMin $ shadowMax $ shadowWarning $ shadowInactive $
shadowExpire $ shadowFlag $ ipServicePort $
ipProtocolNumber $ oncRpcNumber $ suseNextUniqueId $
suseMinUniqueId $ suseMaxUniqueId $ suseMinPasswordLength $
suseMaxPasswordLength $ suseImapDefaultQuota ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.13
(booleanMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.13 NAME 'booleanMatch' APPLIES ( hasSubordinates $
olcGentleHUP $ olcLastMod $ olcReadOnly $ olcReverseLookup
$ olcDbNoSync $ olcDbDirtyRead $ olcDbLinearIndex $
olcCacheURI $ olcChainReturnError $ olcDbRebindAsUser $
olcDbChaseReferrals $ olcDbProxyWhoAmI $
olcAccessLogSuccess $ reqDeleteOldRDN $ reqAttrsOnly $
pwdReset $ olcSpNoPresent $ olcSpReloadHint $
suseImapUseSsl ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.11
(caseIgnoreListMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.11 NAME 'caseIgnoreListMatch' APPLIES (
postalAddress $ registeredAddress $ homePostalAddress ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.8
(numericStringMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.8 NAME 'numericStringMatch' APPLIES ( x121Address $
internationaliSDNNumber ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.7
(caseExactSubstringsMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.7 NAME 'caseExactSubstringsMatch' APPLIES (
serialNumber $ destinationIndicator $ dnQualifier ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.6
(caseExactOrderingMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.6 NAME 'caseExactOrderingMatch' APPLIES (
serialNumber $ destinationIndicator $ dnQualifier ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.5
(caseExactMatch):
Aug 2 12:27:40 ldap syslog-ng[2373]: Message length
overflow, line is split, log_msg_size=2048
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.5 NAME 'caseExactMatch' APPLIES (
supportedSASLMechanisms $ vendorName $ vendorVersion $ ref
$ name $ cn $ uid $ labeledURI $ description $
olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $
olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $
olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $
olcBackend $ olcDatabase $ olcDisallows $
olcDitContentRules $ olcInclude $ olcLimits $ olcLogFile $
olcLogLevel $ olcModuleLoad $ olcModulePath $
olcObjectClasses $ olcObjectIdentifier $ olcOverlay $
olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $
olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $
olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $
olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $
olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity
$ olcSizeLimit $ olcSrvtab $ olcSubordinate $ olcSyncrepl $
olcTimeLimit $ olcTLSCACertificateFile $
olcTLSCACertificatePath $ olcTLSCertificateFile $
olcTLSCertificateKeyFile $ olcTLSCipherSuite $
olcTLSCRLCheck $ olcTLSRandFile $ olcTLSVerifyClient $
olcTLSDHParamFile $ olcUpdateRef $ olcDbDirectory $
olcDbCheckpoint $ olcDbConfig $ olcDbIndex $
olcDbLockDetect $ olcDbURI $ olcDbStartTLS $ olcDbACLPasswd
$ olcDbACLBind $ olcDbIDAssertPasswd $ olcDbIDAssertBind $
olcDbIDAssertMode $ olcDbIDAssertAuthzFrom $ olcDbTFSupport
$ olcDbTimeout $ olcDbIdleTimeout $ olcDbConnTtl $
olcDbNetworkTimeout $ olcAccessLogOps $ olcAccessLogPurge $
olcAccessLogOld $ reqType $ reqSession $ reqMessage $
reqReferral $ reqMethod $ reqAssertion $ reqScope $
reqDerefAliases $ reqFilter $ reqAttr $ olcDLattrSet $
olcProxyCache $ olcProxyAttrset $ olcProxyTemplate $
olcProxyResponseCB $ errOp $ errText $ olcSpCheckpoint $
olcValSortAttr $ knowledgeInformation $ sn $ serialNumber $
c $ l $ st $ street $ o $ ou $ title $ businessCategory $
postalCode $ postOfficeBox $ physicalDeliveryOfficeName $
destinationIndicator $ givenName $ initials $
generationQualifier $ dnQualifier $ houseIdentifier $
dmdName $
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.4
(caseIgnoreSubstringsMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.4 NAME 'caseIgnoreSubstringsMatch' APPLIES (
serialNumber $ destinationIndicator $ dnQualifier ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.3
(caseIgnoreOrderingMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.3 NAME 'caseIgnoreOrderingMatch' APPLIES (
serialNumber $ destinationIndicator $ dnQualifier ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.2
(caseIgnoreMatch):
Aug 2 12:27:40 ldap syslog-ng[2373]: Message length
overflow, line is split, log_msg_size=2048
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.2 NAME 'caseIgnoreMatch' APPLIES (
supportedSASLMechanisms $ vendorName $ vendorVersion $ ref
$ name $ cn $ uid $ labeledURI $ description $
olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $
olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $
olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $
olcBackend $ olcDatabase $ olcDisallows $
olcDitContentRules $ olcInclude $ olcLimits $ olcLogFile $
olcLogLevel $ olcModuleLoad $ olcModulePath $
olcObjectClasses $ olcObjectIdentifier $ olcOverlay $
olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $
olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $
olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $
olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $
olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity
$ olcSizeLimit $ olcSrvtab $ olcSubordinate $ olcSyncrepl $
olcTimeLimit $ olcTLSCACertificateFile $
olcTLSCACertificatePath $ olcTLSCertificateFile $
olcTLSCertificateKeyFile $ olcTLSCipherSuite $
olcTLSCRLCheck $ olcTLSRandFile $ olcTLSVerifyClient $
olcTLSDHParamFile $ olcUpdateRef $ olcDbDirectory $
olcDbCheckpoint $ olcDbConfig $ olcDbIndex $
olcDbLockDetect $ olcDbURI $ olcDbStartTLS $ olcDbACLPasswd
$ olcDbACLBind $ olcDbIDAssertPasswd $ olcDbIDAssertBind $
olcDbIDAssertMode $ olcDbIDAssertAuthzFrom $ olcDbTFSupport
$ olcDbTimeout $ olcDbIdleTimeout $ olcDbConnTtl $
olcDbNetworkTimeout $ olcAccessLogOps $ olcAccessLogPurge $
olcAccessLogOld $ reqType $ reqSession $ reqMessage $
reqReferral $ reqMethod $ reqAssertion $ reqScope $
reqDerefAliases $ reqFilter $ reqAttr $ olcDLattrSet $
olcProxyCache $ olcProxyAttrset $ olcProxyTemplate $
olcProxyResponseCB $ errOp $ errText $ olcSpCheckpoint $
olcValSortAttr $ knowledgeInformation $ sn $ serialNumber $
c $ l $ st $ street $ o $ ou $ title $ businessCategory $
postalCode $ postOfficeBox $ physicalDeliveryOfficeName $
destinationIndicator $ givenName $ initials $
generationQualifier $ dnQualifier $ houseIdentifier $
dmdName
Aug 2 12:27:40 ldap slapd[3298]: 1.2.36.79672281.1.13.3
(rdnMatch):
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.1
(distinguishedNameMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.1 NAME 'distinguishedNameMatch' APPLIES (
creatorsName $ modifiersName $ subschemaSubentry $
namingContexts $ aliasedObjectName $ distinguishedName $
seeAlso $ olcDefaultSearchBase $ olcRootDN $ olcSchemaDN $
olcSuffix $ olcUpdateDN $ olcDbACLAuthcDn $
olcDbIDAssertAuthcDn $ olcAccessLogDB $ reqDN $ reqAuthzID
$ reqNewRDN $ reqNewSuperior $ pwdPolicySubentry $
errMatchedDN $ member $ owner $ roleOccupant $ manager $
documentAuthor $ secretary $ associatedName $ dITRedirect $
suseDefaultBase $ suseDefaultTemplate $
suseSecondaryGroup ) )
Aug 2 12:27:40 ldap slapd[3298]: 2.5.13.0
(objectIdentifierMatch):
Aug 2 12:27:40 ldap slapd[3298]: matchingRuleUse: (
2.5.13.0 NAME 'objectIdentifierMatch' APPLIES (
supportedControl $ supportedExtension $ supportedFeatures $
supportedApplicationContext ) )
Aug 2 12:27:40 ldap slapd[3299]: slapd startup: initiated.
Aug 2 12:27:40 ldap slapd[3299]: backend_startup_one:
starting "cn=config"
Aug 2 12:27:40 ldap slapd[3299]: config_back_db_open
Aug 2 12:27:40 ldap slapd[3299]: backend_startup_one:
starting "dc=thomas,dc=virtual"
Aug 2 12:27:40 ldap slapd[3299]: bdb_db_open:
dc=thomas,dc=virtual
Aug 2 12:27:40 ldap slapd[3299]: bdb_db_open:
dbenv_open(/var/lib/ldap)
Aug 2 12:27:41 ldap slapd[3299]: => bdb_entry_get:
ndn: "dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: => bdb_entry_get:
oc: "(null)", at: "contextCSN"
Aug 2 12:27:41 ldap slapd[3299]:
bdb_dn2entry("dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x00000001
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: => bdb_entry_get: found
entry: "dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: bdb_entry_get: rc=0
Aug 2 12:27:41 ldap slapd[3299]: => bdb_search
Aug 2 12:27:41 ldap slapd[3299]:
bdb_dn2entry("dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: search_candidates:
base="dc=thomas,dc=virtual" (0x00000001) scope=2
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2idl("dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: => bdb_filter_candidates
Aug 2 12:27:41 ldap slapd[3299]: AND
Aug 2 12:27:41 ldap slapd[3299]: => bdb_list_candidates
0xa0
Aug 2 12:27:41 ldap slapd[3299]: => bdb_filter_candidates
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_inequality_candidates (entryCSN)
Aug 2 12:27:41 ldap slapd[3299]: <=
bdb_inequality_candidates: (entryCSN) index_param failed
(18)
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_filter_candidates:
id=-1 first=1 last=15
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_list_candidates:
id=-1 first=1 last=15
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_filter_candidates:
id=-1 first=1 last=15
Aug 2 12:27:41 ldap slapd[3299]: bdb_search_candidates:
id=-1 first=1 last=15
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access to "dc=thomas,dc=virtual" "entryCSN" requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 1 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "cn=ldapadmin,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(cn=ldapadmin,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("cn=ldapadmin,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x00000002
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access to "cn=ldapadmin,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 2 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "cn=replicator,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(cn=replicator,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("cn=replicator,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x00000003
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access to "cn=replicator,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 3 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "ou=verkauf,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(ou=verkauf,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("ou=verkauf,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x00000004
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access to "ou=verkauf,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 4 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "ou=marketing,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(ou=marketing,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("ou=marketing,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x00000005
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access to "ou=marketing,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 5 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "ou=forschung,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(ou=forschung,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("ou=forschung,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x00000006
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access to "ou=forschung,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 6 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "ou=xeno,ou=forschung,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(ou=xeno,ou=forschung,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("ou=xeno,ou=forschung,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x00000007
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access
to "ou=xeno,ou=forschung,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 7 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "cn=superuser,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(cn=superuser,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("cn=superuser,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x00000008
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access to "cn=superuser,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 8 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "uid=ckent,ou=verkauf,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(uid=ckent,ou=verkauf,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("uid=ckent,ou=verkauf,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x00000009
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access
to "uid=ckent,ou=verkauf,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 9 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "uid=hcallahan,ou=verkauf,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(uid=hcallahan,ou=verkauf,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("uid=hcallahan,ou=verkauf,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x0000000a
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access
to "uid=hcallahan,ou=verkauf,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 10 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "uid=skiu,ou=forschung,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(uid=skiu,ou=forschung,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("uid=skiu,ou=forschung,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x0000000b
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access
to "uid=skiu,ou=forschung,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 11 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "uid=eripley,ou=forschung,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(uid=eripley,ou=forschung,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("uid=eripley,ou=forschung,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x0000000c
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access
to "uid=eripley,ou=forschung,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 12 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "uid=eripley,ou=xeno,ou=forschung,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(uid=eripley,ou=xeno,ou=forschung,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("uid=eripley,ou=xeno,ou=forschung,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x0000000d
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access
to "uid=eripley,ou=xeno,ou=forschung,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 13 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "uid=vcorleone,ou=marketing,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(uid=vcorleone,ou=marketing,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("uid=vcorleone,ou=marketing,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x0000000e
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access
to "uid=vcorleone,ou=marketing,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 5
Aug 2 12:27:41 ldap slapd[3299]: bdb_search: 14 does not
match filter
Aug 2 12:27:41 ldap slapd[3299]:
entry_decode: "uid=eripley,ou=marketing,dc=thomas,dc=virtual"
Aug 2 12:27:41 ldap slapd[3299]: <=
entry_decode(uid=eripley,ou=marketing,dc=thomas,dc=virtual)
Aug 2 12:27:41 ldap slapd[3299]: =>
bdb_dn2id("uid=eripley,ou=marketing,dc=thomas,dc=virtual")
Aug 2 12:27:41 ldap slapd[3299]: <= bdb_dn2id: got
id=0x0000000f
Aug 2 12:27:41 ldap slapd[3299]: => test_filter
Aug 2 12:27:41 ldap slapd[3299]: GE
Aug 2 12:27:41 ldap slapd[3299]: => access_allowed: search
access
to "uid=eripley,ou=marketing,dc=thomas,dc=virtual" "entryCSN"
requested
Aug 2 12:27:41 ldap slapd[3299]: <= root access granted
Aug 2 12:27:41 ldap slapd[3299]: <= test_filter 6
Aug 2 12:27:41 ldap slapd[3299]: send_ldap_result: conn=-1
op=0 p=0
Aug 2 12:27:41 ldap slapd[3299]: send_ldap_result: err=0
matched="" text=""
Aug 2 12:27:41 ldap slapd[3299]: slapd starting
Aug 2 12:27:41 ldap slapd[3299]: daemon: added 4r
Aug 2 12:27:41 ldap slapd[3299]: daemon: added 7r
Aug 2 12:27:41 ldap slapd[3299]: daemon: added 8r
Aug 2 12:27:41 ldap slapd[3299]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 12:27:41 ldap slapd[3299]: daemon: select: listen=8
active_threads=0 tvp=zero
Aug 2 12:27:42 ldap slapd[3299]: daemon: activity on 1
descriptor
Aug 2 12:27:42 ldap slapd[3299]: daemon: activity on:
Aug 2 12:27:42 ldap slapd[3299]:
Aug 2 12:27:42 ldap slapd[3299]: daemon: listen=8, new
connection on 12
Aug 2 12:27:42 ldap slapd[3299]: daemon: added 12r
Aug 2 12:27:42 ldap slapd[3299]: conn=0 fd=12 ACCEPT from
IP=127.0.0.1:47428 (IP=0.0.0.0:389)
Aug 2 12:27:42 ldap slapd[3299]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 12:27:42 ldap slapd[3299]: daemon: select: listen=8
active_threads=0 tvp=zero
Aug 2 12:27:42 ldap slapd[3299]: daemon: activity on 1
descriptor
Aug 2 12:27:42 ldap slapd[3299]: daemon: activity on:
Aug 2 12:27:42 ldap slapd[3299]: 12r
Aug 2 12:27:42 ldap slapd[3299]:
Aug 2 12:27:42 ldap slapd[3299]: daemon: read active on 12
Aug 2 12:27:42 ldap slapd[3299]: connection_get(12)
Aug 2 12:27:42 ldap slapd[3299]: connection_get(12): got
connid=0
Aug 2 12:27:42 ldap slapd[3299]: connection_read(12):
checking for input on id=0
Aug 2 12:27:42 ldap slapd[3299]: ber_get_next on fd 12
failed errno=11 (Resource temporarily unavailable)
Aug 2 12:27:42 ldap slapd[3299]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 12:27:42 ldap slapd[3299]: daemon: select: listen=8
active_threads=0 tvp=zero
Aug 2 12:27:42 ldap slapd[3299]: do_bind
Aug 2 12:27:42 ldap slapd[3299]: >>> dnPrettyNormal: <>
Aug 2 12:27:42 ldap slapd[3299]: <<< dnPrettyNormal: <>, <>
Aug 2 12:27:42 ldap slapd[3299]: do_bind: version=3 dn=""
method=128
Aug 2 12:27:42 ldap slapd[3299]: conn=0 op=0 BIND dn=""
method=128
Aug 2 12:27:42 ldap slapd[3299]: send_ldap_result: conn=0
op=0 p=3
Aug 2 12:27:42 ldap slapd[3299]: send_ldap_result: err=0
matched="" text=""
Aug 2 12:27:42 ldap slapd[3299]: send_ldap_response:
msgid=1 tag=97 err=0
Aug 2 12:27:42 ldap slapd[3299]: conn=0 op=0 RESULT tag=97
err=0 text=
Aug 2 12:27:42 ldap slapd[3299]: do_bind: v3 anonymous bind
Aug 2 12:27:42 ldap slapd[3299]: daemon: activity on 1
descriptor
Aug 2 12:27:42 ldap slapd[3299]: daemon: activity on:
Aug 2 12:27:42 ldap slapd[3299]: 12r
Aug 2 12:27:42 ldap slapd[3299]:
Aug 2 12:27:42 ldap slapd[3299]: daemon: read active on 12
Aug 2 12:27:42 ldap slapd[3299]: connection_get(12)
Aug 2 12:27:42 ldap slapd[3299]: connection_get(12): got
connid=0
Aug 2 12:27:42 ldap slapd[3299]: connection_read(12):
checking for input on id=0
Aug 2 12:27:42 ldap slapd[3299]: ber_get_next on fd 12
failed errno=11 (Resource temporarily unavailable)
Aug 2 12:27:42 ldap slapd[3299]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 12:27:42 ldap slapd[3299]: daemon: select: listen=8
active_threads=0 tvp=zero
Aug 2 12:27:42 ldap slapd[3299]: do_search
Aug 2 12:27:42 ldap slapd[3299]: >>> dnPrettyNormal: <>
Aug 2 12:27:42 ldap slapd[3299]: <<< dnPrettyNormal: <>, <>
Aug 2 12:27:42 ldap slapd[3299]: SRCH "" 0 0
Aug 2 12:27:42 ldap slapd[3299]: 0 0 0
Aug 2 12:27:42 ldap slapd[3299]: begin get_filter
Aug 2 12:27:42 ldap slapd[3299]: PRESENT
Aug 2 12:27:42 ldap slapd[3299]: end get_filter 0
Aug 2 12:27:42 ldap slapd[3299]: filter:
(objectClass=*)
Aug 2 12:27:42 ldap slapd[3299]: attrs:
Aug 2 12:27:42 ldap slapd[3299]:
Aug 2 12:27:42 ldap slapd[3299]: conn=0 op=1 SRCH base=""
scope=0 deref=0 filter="(objectClass=*)"
Aug 2 12:27:42 ldap slapd[3299]: => test_filter
Aug 2 12:27:42 ldap slapd[3299]: PRESENT
Aug 2 12:27:42 ldap slapd[3299]: => access_allowed: search
access to "" "objectClass" requested
Aug 2 12:27:42 ldap slapd[3299]: => acl_get: [1] attr
objectClass
Aug 2 12:27:42 ldap slapd[3299]: => acl_mask: access to
entry "", attr "objectClass" requested
Aug 2 12:27:42 ldap slapd[3299]: => acl_mask: to all values
by "", (=0)
Aug 2 12:27:42 ldap slapd[3299]: <= check a_dn_pat: *
Aug 2 12:27:42 ldap slapd[3299]: <= acl_mask: [1] applying
read(=rscxd) (stop)
Aug 2 12:27:42 ldap slapd[3299]: <= acl_mask: [1] mask:
read(=rscxd)
Aug 2 12:27:42 ldap slapd[3299]: => access_allowed: search
access granted by read(=rscxd)
Aug 2 12:27:42 ldap slapd[3299]: <= test_filter 6
Aug 2 12:27:42 ldap slapd[3299]: => send_search_entry: conn
0 dn=""
Aug 2 12:27:42 ldap slapd[3299]: => access_allowed: read
access to "" "entry" requested
Aug 2 12:27:42 ldap slapd[3299]: => acl_get: [1] attr entry
Aug 2 12:27:42 ldap slapd[3299]: => acl_mask: access to
entry "", attr "entry" requested
Aug 2 12:27:42 ldap slapd[3299]: => acl_mask: to all values
by "", (=0)
Aug 2 12:27:42 ldap slapd[3299]: <= check a_dn_pat: *
Aug 2 12:27:42 ldap slapd[3299]: <= acl_mask: [1] applying
read(=rscxd) (stop)
Aug 2 12:27:42 ldap slapd[3299]: <= acl_mask: [1] mask:
read(=rscxd)
Aug 2 12:27:42 ldap slapd[3299]: => access_allowed: read
access granted by read(=rscxd)
Aug 2 12:27:42 ldap slapd[3299]: => access_allowed: read
access to "" "objectClass" requested
Aug 2 12:27:42 ldap slapd[3299]: => acl_get: [1] attr
objectClass
Aug 2 12:27:42 ldap slapd[3299]: access_allowed: no res
from state (objectClass)
Aug 2 12:27:42 ldap slapd[3299]: => acl_mask: access to
entry "", attr "objectClass" requested
Aug 2 12:27:42 ldap slapd[3299]: => acl_mask: to value
by "", (=0)
Aug 2 12:27:42 ldap slapd[3299]: <= check a_dn_pat: *
Aug 2 12:27:42 ldap slapd[3299]: <= acl_mask: [1] applying
read(=rscxd) (stop)
Aug 2 12:27:42 ldap slapd[3299]: <= acl_mask: [1] mask:
read(=rscxd)
Aug 2 12:27:42 ldap slapd[3299]: => access_allowed: read
access granted by read(=rscxd)
Aug 2 12:27:42 ldap slapd[3299]: conn=0 op=1 ENTRY dn=""
Aug 2 12:27:42 ldap slapd[3299]: <= send_search_entry: conn
0 exit.
Aug 2 12:27:42 ldap slapd[3299]: send_ldap_result: conn=0
op=1 p=3
Aug 2 12:27:42 ldap slapd[3299]: send_ldap_result: err=0
matched="" text=""
Aug 2 12:27:42 ldap slapd[3299]: send_ldap_response:
msgid=2 tag=101 err=0
Aug 2 12:27:42 ldap slapd[3299]: conn=0 op=1 SEARCH RESULT
tag=101 err=0 nentries=1 text=
Aug 2 12:27:42 ldap slapd[3299]: daemon: activity on 1
descriptor
Aug 2 12:27:42 ldap slapd[3299]: daemon: activity on:
Aug 2 12:27:42 ldap slapd[3299]: 12r
Aug 2 12:27:42 ldap slapd[3299]:
Aug 2 12:27:42 ldap slapd[3299]: daemon: read active on 12
Aug 2 12:27:42 ldap slapd[3299]: connection_get(12)
Aug 2 12:27:42 ldap slapd[3299]: connection_get(12): got
connid=0
Aug 2 12:27:42 ldap slapd[3299]: connection_read(12):
checking for input on id=0
Aug 2 12:27:42 ldap slapd[3299]: ber_get_next on fd 12
failed errno=11 (Resource temporarily unavailable)
Aug 2 12:27:42 ldap slapd[3299]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 12:27:42 ldap slapd[3299]: daemon: select: listen=8
active_threads=0 tvp=zero
Aug 2 12:27:42 ldap slapd[3299]: do_unbind
Aug 2 12:27:42 ldap slapd[3299]: conn=0 op=2 UNBIND
Aug 2 12:27:42 ldap slapd[3299]: connection_closing:
readying conn=0 sd=12 for close
Aug 2 12:27:42 ldap slapd[3299]: connection_resched:
attempting closing conn=0 sd=12
Aug 2 12:27:42 ldap slapd[3299]: connection_close: conn=0
sd=12
Aug 2 12:27:42 ldap slapd[3299]: daemon: removing 12
Aug 2 12:27:42 ldap slapd[3299]: conn=0 fd=12 closed
Aug 2 12:27:42 ldap slapd[3299]: daemon: activity on 1
descriptor
Aug 2 12:27:42 ldap slapd[3299]: daemon: activity on:
Aug 2 12:27:42 ldap slapd[3299]:
Aug 2 12:27:42 ldap slapd[3299]: daemon: select: listen=7
active_threads=0 tvp=zero
Aug 2 12:27:42 ldap slapd[3299]: daemon: select: listen=8
active_threads=0 tvp=zero
--
Um die Liste abzubestellen, schicken Sie eine Mail an:
opensuse-de+unsubscribe@opensuse.org
Um eine Liste aller verfuegbaren Kommandos zu bekommen, schicken
Sie eine Mail an: opensuse-de+help@opensuse.org