On Wed, Nov 01, 2017 at 08:22:15PM +0000, henson(a)acm.org wrote:
> On Fri, Oct 06, 2017 at 06:45:41PM -0700, Paul B. Henson wrote:
>> but it looks like the same issue to me. I'm going to go ahead and
>> recompile 2.4.45 with the ignore-invalid-accesslog-ops.patch and run
>> that for a while and see what happens.
>
> Sadness :(, not one but two of my boxes crashed today, both running the
> patch, with what appears to be the same issue:
Hi Paul,
I've updated the patch slightly to make sure invalid operations get
logged and rejected so some action can be taken. Based on the backtrace,
I can't see how an add modification could have ended up without values
even with the previous version, however.
A patch against master is available here:
https://github.com/mistotebe/openldap/tree/its8609
And you can get one that applies on RE24 here:
ftp://ftp.openldap.org/incoming/ndrej-Kuznik-20170327-ITS8609-ignore-invali…
If you still see crashes with the above, I might need you to explore the
core file and accesslog a bit further.
Regards,
--
Ondřej Kuzník
Senior Software Engineer
Symas Corporation http://www.symas.com
Packaged, certified, and supported LDAP solutions powered by OpenLDAP
--On Monday, March 25, 2019 7:00 PM +0000 michael(a)stroeder.com wrote:
> Full_Name: Michael Str.der
> Version: 2.4.47
> OS: openSUSE Tumbleweed
> URL:
> Submission from: (NULL) (213.240.182.56)
>
>
> Adding line
>
> SASL_NOCANON on
Hi Michael,
Does the patch referenced in ITS#7585 fix this for you? Been waiting for
years for RedHat to update with the IPR. ;)
--Quanah
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>
--On Friday, April 14, 2017 10:20 PM +0000 quanah(a)symas.com wrote:
> Hello,
>
> Thanks for the report. Unfortunately, your submission does not follow
> the ITS guidelines, meaning we can't really move forward with it at this
> time. Please read over
> <http://www.openldap.org/devel/contributing.html>, particularly the IPR
> notice requirements as well as patch submission requirements. If you
> can correct these issues, then the project can move forward with
> including your work in the project.
Note: Requested again today that RedHat follow the correct submission
guidelines for this patch, this time in their bugzilla instance.
--Quanah
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>
--On Monday, February 25, 2019 7:23 PM +0000 gandhali.atre(a)plantronics.com
wrote:
> Full_Name: Gandhali Atre
> Version: 2.4.44
> OS: Android
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (140.242.26.200)
>
>
> Hi,
> I have a product that allows to configure LDAP servers. Looks like when
> changing the configurations or doing some search 1/10 times there is a
> crash and below are the crash details.
Hello,
OpenLDAP 2.4.44 is quite old. Please update to a current release and let
us know if the issue persists. Thanks!
--Quanah
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>
--On Thursday, April 11, 2019 5:14 AM +0000 aditya1606(a)gmail.com wrote:
> Full_Name: Aditya
> Version: 2.4.43
> OS:
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (131.228.66.13)
>
>
> I am not able to load the module due to this undefined symbol.
>
> $ nm pw-sha2.so | grep -i "lutil_passwd_add"
> U lutil_passwd_add
Hello,
The SHA2 module gets loaded directly into slapd which has the necessary
symbols. This ITS will be closed. I would also strongly advise upgrading
to a current release.
--Quanah
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>
--On Wednesday, April 17, 2019 11:33 PM +0000 quanah(a)symas.com wrote:
Hello,
Sending this to your @suse.com email bounced. Please see below and update
with an IPR as requested. Thanks!
Regards,
Quanah
> --On Thursday, November 30, 2017 2:02 PM +0000 hguo(a)suse.com wrote:
>
>> Full_Name: Houzuo Guo
>> Version: master
>> OS:
>> URL: ftp://ftp.openldap.org/incoming/houzuo-guo-171130.patch
>> Submission from: (NULL) (195.135.221.2)
>>
>>
>> In case that ldap connection is attempted on failed URLs prior to
>> establishing a successful connection, the failed connection sockets are
>> never freed. This patch plugs the socket descriptor leak.
>
> Hello,
>
> Thank you for the report! Please reply with an IPR statement as
> documented at
>
> <https://www.openldap.org/devel/contributing.html#notice>
>
> if you wish your patch to be reviewed for inclusion in the OpenLDAP
> software.
>
> Regards,
> Quanah
>
>
> --
>
> Quanah Gibson-Mount
> Product Architect
> Symas Corporation
> Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
> <http://www.symas.com>
>
>
>
>
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>
--On Thursday, November 30, 2017 10:11 PM +0000 mramitsingh85(a)gmail.com
wrote:
> Full_Name: Amit kumar singh
> Version: 2.4.44
> OS: CentOS release 6.9 (Final)
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (14.141.104.38)
>
>
> Issue on replication and get below error.
>
> Nov 30 17:03:55 host slapd[709]: connection_read(346): no connection!
> Nov 30 17:03:55 host slapd[709]: connection_read(346): no connection!
> Nov 30 17:03:55 host[709]: connection_read(362): no connection!
>
> I was searching issue and found that fixed ref: ITS#6548 on 2.4.27. But
> strange thing is that it comes up again in 2.4.44. Not sure If I am
> correct but need your help to look into it.
Hello,
This is not a bug. This commonly occurs when a client ends the connection
without properly ending an unbind request first. The solution would be to
fix the client involved. This ITS will be closed.
--Quanah
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>
--On Thursday, November 30, 2017 2:02 PM +0000 hguo(a)suse.com wrote:
> Full_Name: Houzuo Guo
> Version: master
> OS:
> URL: ftp://ftp.openldap.org/incoming/houzuo-guo-171130.patch
> Submission from: (NULL) (195.135.221.2)
>
>
> In case that ldap connection is attempted on failed URLs prior to
> establishing a successful connection, the failed connection sockets are
> never freed. This patch plugs the socket descriptor leak.
Hello,
Thank you for the report! Please reply with an IPR statement as documented
at
<https://www.openldap.org/devel/contributing.html#notice>
if you wish your patch to be reviewed for inclusion in the OpenLDAP
software.
Regards,
Quanah
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>
--On Monday, October 30, 2017 4:36 AM +0000 believelinan(a)aliyun.com wrote:
> Full_Name: Nan Li
> Version: 2.4.45
> OS:
> URL:
> Submission from: (NULL) (137.69.117.201)
>
>
> I download source code of version 2.4.45, found a small typo in README at
> line 32:
>
> 32 detailed instructions can be found in the OpenLDAP
> Admnistrator's
>
> where "Admnistrator" should be "Administrator".
Thanks for the report! This has been fixed in RE24.
--Quanah
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>