--On Tuesday, June 05, 2012 1:50 AM +0000 gahaverkamp(a)lbl.gov wrote:
> Full_Name: Greg Haverkamp
> Version: 2.4.31
> OS: RHEL 6.2/OS X 10.7
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (128.3.10.46)
>
>
> When a request to a massaged suffix is made of back-ldap/slapo-rwm with a
> malformed filter, slapd crashes on the two tested platforms (RHEL 6.2/OS X
> 10.7). The last bits of the debug log and the backtrace are below:
I would suggest putting slapd under gdb and providing a backtrace.
See <http://www.openldap.org/faq/data/cache/59.html>
--Quanah
--
Quanah Gibson-Mount
Sr. Member of Technical Staff
Zimbra, Inc
A Division of VMware, Inc.
--------------------
Zimbra :: the leader in open source messaging and collaboration
Full_Name: Tim Strobell
Version: HEAD
OS: RHEL6
URL: ftp://ftp.openldap.org/incoming/tim-strobell-2012060401.patch
Submission from: (NULL) (2001:480:20:112:210:18ff:fe19:b000)
When using NSS, the default cipher suite selection is used even when
TLSCipherSuite is explicitly specified. This behavior was introduced in the
patch provided in ITS#6790.
At tls_m.c:2221...
if ( lt->lt_ciphersuite &&
tlsm_parse_ciphers( ctx, lt->lt_ciphersuite )) {
[ error, return ]
} else if ( tlsm_parse_ciphers( ctx, "DEFAULT" ) ) {
[ error, return ]
}
tlsm_parse_ciphers returns 0 on success; the else path is always followed and
overrides the previous cipher suite selection.