Dan Cushing wrote:
> I'd defer to those with more expertise, but my vote is to avoid changing
> the modifyTimestamp attribute. That attribute should be updated only
> when an ldapmodify operation is performed.
>
> I'm not familiar with the specifications, and perhaps this isn't
> addressed there. My intuition suggests that it shouldn't be modified by
> operations that are not directly under the control of the user or
> administrator.
Already fixed in CVS HEAD and RE23, please test.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
I'd defer to those with more expertise, but my vote is to avoid changing
the modifyTimestamp attribute. That attribute should be updated only
when an ldapmodify operation is performed.
I'm not familiar with the specifications, and perhaps this isn't
addressed there. My intuition suggests that it shouldn't be modified by
operations that are not directly under the control of the user or
administrator.
Dan
Howard Chu wrote:
> dan.cushing(a)netideasinc.com wrote:
>> Full_Name: Dan Cushing
>> Version: 2.3.36
>> OS: Solaris 9
>> URL: ftp://ftp.openldap.org/incoming/
>> Submission from: (NULL) (71.76.187.82)
>>
>>
>> When running OpenLDAP with the ppolicy overlay, the modifyTimestamp
>> for a user
>> entry is updated if the user attempts to login (bind) with an incorrect
>> password. This is happening because the password lockout feature is
>> enabled and
>> the operational attribute 'pwdFailureTime' is being updated. It
>> seems like this
>> results in a misleading modifyTimestamp. Is it intended that the
>> modifyTimestamp attribute be updated when operational attributes are
>> updated?
>
> Hadn't really thought about it before. We can certainly avoid this
> though.
--
This electronic transmission is strictly confidential to NetIDEAS, Inc.
and intended solely for the addressee. It may contain information, which
is covered by legal, professional, or other privilege. If you are not
the intended addressee, or someone authorized by the intended addressee
to receive transmissions on the behalf of the addressee, you must not
retain, disclose in any form, copy or take any action in reliance on
this transmission. If you have received this transmission in error,
please notify us as soon as possible and destroy this message.
> From: Gavin Henry <openldap-its(a)OpenLDAP.org>
> Date: Fri Jul 13 18:19:25 2007
>
> The same sentance is in slapadd(8)/slapindex(8) too.
That is correct; slapadd/slapindex must never be run while slapd is running.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
As noted elsewhere, the "-C" option is intentionally undocumented. Since the
command line tools only support anonymous referral chasing, and referral
chasing through untrusted servers is inherently unsafe, it's best not to do it.
This ITS will be closed.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
dan.cushing(a)netideasinc.com wrote:
> Full_Name: Dan Cushing
> Version: 2.3.36
> OS: Solaris 9
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (71.76.187.82)
>
>
> When running OpenLDAP with the ppolicy overlay, the modifyTimestamp for a user
> entry is updated if the user attempts to login (bind) with an incorrect
> password. This is happening because the password lockout feature is enabled and
> the operational attribute 'pwdFailureTime' is being updated. It seems like this
> results in a misleading modifyTimestamp. Is it intended that the
> modifyTimestamp attribute be updated when operational attributes are updated?
Hadn't really thought about it before. We can certainly avoid this though.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
<quote who="hyc(a)symas.com">
> ando(a)sys-net.it wrote:
>> ghenry(a)suretecsystems.com wrote:
>>> <quote who="hyc(a)symas.com">
>>>> ghenry(a)OpenLDAP.org wrote:
>>>>> Full_Name: Gavin Henry
>>>>> Version: HEAD
>>>>> OS:
>>>>> URL: ftp://ftp.openldap.org/incoming/
>>>>> Submission from: (NULL) (80.229.93.1)
>>>>> Submitted by: ghenry
>>>>>
>>>>>
>>>>> Dear All,
>>>>>
>>>>> It's not clear or explained what AVA means in slapd-meta(5) and
>>>>> slapo-rwm(5)
>>>> Standard terminology in X.500/LDAP. "Attribute Value Assertion"
>>>>> A user was asking in #ldap
>>>>>
>>>>> I presume it means "Attribute Value"?
>>>>>
>>>>> If so, I will add an explaination in each man page.
>>>> OpenLDAP docs are not intended to explain the basics of LDAP. You're
>>>> expected
>>>> to already know LDAP or refer to the RFCs for basic terminology.
>>> Closing ITS.
>>
>> In any case, expanding acronyms when first used sounds "polite"; any
>> further reference to the most appropriate RFC should allow newbie
>> readers to learn more.
>
> Perhaps, in the Admin Guide.
We have it in preamble.sdf already, so I think this is covered.
> But in the man page? Where do you draw the line?
> Do we have to start every man page with e.g. "the meta backend to slapd
> (the
> Standalone LDAP (Lightweight Directory Access Protocol) Daemon) performs
> basic
> LDAP proxying..." ?
>
> In this case, what good would it do? Would someone who hasn't read any
> RFCs
> know what "Attribute Value Assertion" means? Anyone who doesn't understand
> the
> X.500 information model has no business administering slapd. They need to
> absorb that basic groundwork first, and IMO manpages are not the mechanism
> for
> teaching that.
> --
> -- Howard Chu
> Chief Architect, Symas Corp. http://www.symas.com
> Director, Highland Sun http://highlandsun.com/hyc/
> Chief Architect, OpenLDAP http://www.openldap.org/project/
>
>
>
ando(a)sys-net.it wrote:
> ghenry(a)suretecsystems.com wrote:
>> <quote who="hyc(a)symas.com">
>>> ghenry(a)OpenLDAP.org wrote:
>>>> Full_Name: Gavin Henry
>>>> Version: HEAD
>>>> OS:
>>>> URL: ftp://ftp.openldap.org/incoming/
>>>> Submission from: (NULL) (80.229.93.1)
>>>> Submitted by: ghenry
>>>>
>>>>
>>>> Dear All,
>>>>
>>>> It's not clear or explained what AVA means in slapd-meta(5) and
>>>> slapo-rwm(5)
>>> Standard terminology in X.500/LDAP. "Attribute Value Assertion"
>>>> A user was asking in #ldap
>>>>
>>>> I presume it means "Attribute Value"?
>>>>
>>>> If so, I will add an explaination in each man page.
>>> OpenLDAP docs are not intended to explain the basics of LDAP. You're
>>> expected
>>> to already know LDAP or refer to the RFCs for basic terminology.
>> Closing ITS.
>
> In any case, expanding acronyms when first used sounds "polite"; any
> further reference to the most appropriate RFC should allow newbie
> readers to learn more.
Perhaps, in the Admin Guide. But in the man page? Where do you draw the line?
Do we have to start every man page with e.g. "the meta backend to slapd (the
Standalone LDAP (Lightweight Directory Access Protocol) Daemon) performs basic
LDAP proxying..." ?
In this case, what good would it do? Would someone who hasn't read any RFCs
know what "Attribute Value Assertion" means? Anyone who doesn't understand the
X.500 information model has no business administering slapd. They need to
absorb that basic groundwork first, and IMO manpages are not the mechanism for
teaching that.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
ghenry(a)suretecsystems.com wrote:
> <quote who="hyc(a)symas.com">
>> ghenry(a)OpenLDAP.org wrote:
>>> Full_Name: Gavin Henry
>>> Version: HEAD
>>> OS:
>>> URL: ftp://ftp.openldap.org/incoming/
>>> Submission from: (NULL) (80.229.93.1)
>>> Submitted by: ghenry
>>>
>>>
>>> Dear All,
>>>
>>> It's not clear or explained what AVA means in slapd-meta(5) and
>>> slapo-rwm(5)
>> Standard terminology in X.500/LDAP. "Attribute Value Assertion"
>>> A user was asking in #ldap
>>>
>>> I presume it means "Attribute Value"?
>>>
>>> If so, I will add an explaination in each man page.
>> OpenLDAP docs are not intended to explain the basics of LDAP. You're
>> expected
>> to already know LDAP or refer to the RFCs for basic terminology.
>
> Closing ITS.
In any case, expanding acronyms when first used sounds "polite"; any
further reference to the most appropriate RFC should allow newbie
readers to learn more.
p.
Ing. Pierangelo Masarati
OpenLDAP Core Team
SysNet s.r.l.
via Dossi, 8 - 27100 Pavia - ITALIA
http://www.sys-net.it
---------------------------------------
Office: +39 02 23998309
Mobile: +39 333 4963172
Email: pierangelo.masarati(a)sys-net.it
---------------------------------------
igbed(a)wmin.ac.uk wrote:
> Full_Name: Damian Igbe
> Version: 2.3.6
> OS: SLES 10
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (161.74.11.24)
>
>
> I have a delta-syncrepl replication working with password policy in place.
> Authentication to the master works fine but when a client tries to authenticate
> to the replica server, the following bug is encountered and the system crashes.
There is not enough information in this bug report. Please include a copy of
your slapd.conf from the replica, and a copy of your password policy. Please
also show the LDAP request that was issued when the crash occurred.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
ali.pouya(a)free.fr wrote:
> h.b.furuseth(a)usit.uio.no wrote :
>
>> That's from ITS#4975: The code was broken for builds without TLS.
>> It's been fixed in HEAD. Does it work now?
>
> Hi Hallvard,
> Yes I confirm that the problem with TLS compilation is fixed now.
>
> But the main problem of this ITS still remains (replica seg faults if syncrepl
> searchbase ="").
>
> Sorry for this late answer.
> Best regards
> Ali
If the current HEAD still crashes for you, please attach your slapd.conf files
in a followup to this ITS, thanks.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/