https://bugs.openldap.org/show_bug.cgi?id=8912
--- Comment #8 from Cliff <cwheat(a)sterlingandzoe.info> ---
Thank you for the reply and my apologies for the lack of clarity. Upon
further testing, I was unable to reproduce the behavior using a command line
application, ldapsearch. I should have done that before submitting the bug.
If you have been assigned this issue then please close it.
I hope this is more clear: When attempting to display all of the
subordinate partitions in the root partition I was only able to see a portion.
Those displayed results were all of the same naming context, relative DN c=* or
o=*. There is some form of filtering done by the LDAPBrowser GUI. This does
not happen using ldapsearch. The problem is not in slapd as I initially
thought. Thanks again for your reply.
--Cliff
On Monday, September 12, 2022 at 12:44:54 PM EDT,
<openldap-its(a)openldap.org> wrote:
https://bugs.openldap.org/show_bug.cgi?id=8912
--- Comment #7 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
(In reply to Cliff from comment #6)
> On Fedora Core 36,
> @(#) $OpenLDAP: slapd 2.6.2 (Aug 15 2022 00:00:00) $
> openldap
> Included static backends:
> config
> ldif
> monitor
> mdb
> using LDAP Browser\Editor v2.8.1:
>
> While attempting to add subordinate naming contexts off of base DN ""
> (RootDSE), slapd will only show such subordinate naming contexts if they are
> of the same RDN attribute. For instance, using all of FC36's trusted CA
> certificates DN, which boil down to those based at c=?, or o=?, only those
> of the same attribute will display as subordinates to "". I either get all
> c= or o=, but not both. The subordinate naming context attribute that comes
> in the configuration file determines which attribute will be shown.
Hello,
I honestly have no idea what you're trying to say here, but it seems thoroughly
unrelated to this issue. If you feel that you've found an actual bug, then you
should file something new with complete reproduction steps. If you're having
issues understanding how to execute queries to OpenLDAP correctly please email
the openldap-technical list.
Regards,
Quanah
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9853
Issue ID: 9853
Summary: lastbind-precision conversion fails from slapd.conf to
cn=config
Product: OpenLDAP
Version: 2.6.2
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: quanah(a)openldap.org
Target Milestone: ---
When converting a slapd.conf file to cn=config, the "lastbind-precision" value
is not preserved.
slapd.conf:
lastbind-precision 300
cn=config value:
olcLastBindPrecision: 0
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9437
Issue ID: 9437
Summary: Add OTP module to core
Product: OpenLDAP
Version: 2.5
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: overlays
Assignee: bugs(a)openldap.org
Reporter: quanah(a)openldap.org
Target Milestone: ---
Symas will contribute its OTP module for OpenLDAP 2.5 as a core overlay
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=6035
--- Comment #13 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
head:
• f3ed13fa
by Ondřej Kuzník at 2022-09-01T10:09:27+01:00
ITS#6035 Plug olcAuthIDRewrite cn=config leak
RE26:
• d598f537
by Ondřej Kuzník at 2022-09-12T20:43:29+00:00
ITS#6035 Plug olcAuthIDRewrite cn=config leak
RE25:
• 1b80eb42
by Ondřej Kuzník at 2022-09-12T20:43:41+00:00
ITS#6035 Plug olcAuthIDRewrite cn=config leak
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9817
Issue ID: 9817
Summary: rwm overlay : Issue with DN containing special
characters
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: overlays
Assignee: bugs(a)openldap.org
Reporter: thierry.pubellier(a)paris.fr
Target Milestone: ---
Hi,
I'm using rwn to select the database useg for bind operations based on the
result of a rewriteMap requets.
Sample configuration in global section :
#Rewrite Map to request a remote server
rwm-rewriteMap ldap checkEntry
"ldap://10.1.2.3/ou=users,dc=paris,dc=local?dn?sub"
binddn="cn=myuser,ou=users,dc=paris,dc=local" credentials="XXX"
# Backing up original DN
rwm-rewriteRule ".+" "${&binddn($0)}$0" ":"
# Contructing LDAP Filter for remote search. Combined with a rewrite Map,
the requested DN is returned if there is a match.
rwm-rewriteRule ".+" "(&(!(description=TEST))(distinguishedName=$0))"
":"
# If filter matches, end of rewriting. Going to 'dc=paris,dc=local'
database
rwm-rewriteRule ".+" "${checkIfPasswordExpiredDN($0)}" ":@I"
# Otherwise, restoring the original DN.
rwm-rewriteRule ".+" "${*binddn}" ":"
# And final DN massaging from "dc=paris,dc=local" to "dc=paris,dc=local2"
database
rwm-rewriteRule "(.+,)?ou=users,dc=paris,dc=local$"
"$1ou=users,dc=paris,dc=local2" ":@"
Everything goes fine until I use DN with special characters, like ',' or '['.
For example : 'cn=Pubellier\, Thierry (TEST),ou=users,dc=paris,dc=local'
In this case, the rwm-rewriteRule contructs a LDAP filter with incorrect
syntax, as special caracters are not being escaped.
I have to use some ugly tricks to escape these caracters, as shown below :
#Rewrite Map to request a remote server
rwm-rewriteMap ldap checkEntry
"ldap://10.1.2.3/ou=users,dc=paris,dc=local?dn?sub"
binddn="cn=myuser,ou=users,dc=paris,dc=local" credentials="XXX"
# Backing up original DN
rwm-rewriteRule ".+" "${&binddn($0)}$0" ":"
# Rewriting for ','
rwm-rewriteRule "(.+).\2C(.+)" "$1\\,$2"
# Adding a special '#' (asserting it in none of my DNs) suffix for special
characters, in order to escape them without looping forever
rwm-rewriteRule "(.*)([)*(\\])([^#].*|$)" "$1$2#$3"
# Escaping of special characters with dedicated '#' suffix, avoiding
infinite loops
rwm-rewriteRule "(.*)([)*(\\])#(.*)" "$1\\$2$3"
# Contructing LDAP Filter for remote search. Combined with a rewrite Map,
the requested DN is returned if there is a match.
rwm-rewriteRule ".+" "(&(!(description=TEST))(distinguishedName=$0))"
":"
# If filter matches, end of rewriting. Going to 'dc=paris,dc=local'
database
rwm-rewriteRule ".+" "${checkIfPasswordExpiredDN($0)}" ":@I"
# Otherwise, restoring the original DN.
rwm-rewriteRule ".+" "${*binddn}" ":"
# And final DN massaging from "dc=paris,dc=local" to "dc=paris,dc=local2"
database
rwm-rewriteRule "(.+,)?ou=users,dc=paris,dc=local$"
"$1ou=users,dc=paris,dc=local2" ":@"
Could there be a way to integrate the ldap escape mechanism when making an
variable assignment (like using a '#' character in place of the usual '&') ?
Thanks by advance,
Best regards,
Thierry
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9438
Issue ID: 9438
Summary: Add remoteauth overlay to core
Product: OpenLDAP
Version: 2.5
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: overlays
Assignee: bugs(a)openldap.org
Reporter: quanah(a)openldap.org
Target Milestone: ---
Symas will contribute its remoteauth overlay for OpenLDAP 2.5 as a core overlay
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8912
--- Comment #7 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
(In reply to Cliff from comment #6)
> On Fedora Core 36,
> @(#) $OpenLDAP: slapd 2.6.2 (Aug 15 2022 00:00:00) $
> openldap
> Included static backends:
> config
> ldif
> monitor
> mdb
> using LDAP Browser\Editor v2.8.1:
>
> While attempting to add subordinate naming contexts off of base DN ""
> (RootDSE), slapd will only show such subordinate naming contexts if they are
> of the same RDN attribute. For instance, using all of FC36's trusted CA
> certificates DN, which boil down to those based at c=?, or o=?, only those
> of the same attribute will display as subordinates to "". I either get all
> c= or o=, but not both. The subordinate naming context attribute that comes
> in the configuration file determines which attribute will be shown.
Hello,
I honestly have no idea what you're trying to say here, but it seems thoroughly
unrelated to this issue. If you feel that you've found an actual bug, then you
should file something new with complete reproduction steps. If you're having
issues understanding how to execute queries to OpenLDAP correctly please email
the openldap-technical list.
Regards,
Quanah
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8912
--- Comment #6 from Cliff <cwheat(a)sterlingandzoe.info> ---
On Fedora Core 36,
@(#) $OpenLDAP: slapd 2.6.2 (Aug 15 2022 00:00:00) $
openldap
Included static backends:
config
ldif
monitor
mdb
using LDAP Browser\Editor v2.8.1:
While attempting to add subordinate naming contexts off of base DN ""
(RootDSE), slapd will only show such subordinate naming contexts if they are of
the same RDN attribute. For instance, using all of FC36's trusted CA
certificates DN, which boil down to those based at c=?, or o=?, only those of
the same attribute will display as subordinates to "". I either get all c= or
o=, but not both. The subordinate naming context attribute that comes in the
configuration file determines which attribute will be shown.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9905
Issue ID: 9905
Summary: The test case 043 execution failed
Product: OpenLDAP
Version: 2.6.0
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: build
Assignee: bugs(a)openldap.org
Reporter: 1010881517(a)qq.com
Target Milestone: ---
Test case 043 failed after I added #9823 pr to my openldap-2.6.0.
Some logs may be useful to you.
>>>>> Starting test043-delta-syncrepl for mdb...
running defines.sh
Starting provider slapd on TCP/IP port 9011...
Using ldapsearch to check that provider slapd is running...
Using ldapadd to create the context prefix entries in the provider...
Starting consumer slapd on TCP/IP port 9012...
Using ldapsearch to check that consumer slapd is running...
Using ldapadd to populate the provider directory...
Waiting 7 seconds for syncrepl to receive changes...
Stopping the provider, sleeping 10 seconds and restarting it...
Using ldapsearch to check that provider slapd is running...
Using ldapmodify to modify provider directory...
Waiting 7 seconds for syncrepl to receive changes...
Using ldapsearch to read all the entries from the provider...
Using ldapsearch to read all the entries from the consumer...
Filtering provider results...
Filtering consumer results...
Comparing retrieved entries from provider and consumer...
Stopping consumer to test recovery...
Modifying more entries on the provider...
Restarting consumer...
Waiting 7 seconds for syncrepl to receive changes...
Try updating the consumer slapd...
Waiting 7 seconds for syncrepl to receive changes...
Using ldapsearch to read all the entries from the provider...
Using ldapsearch to read all the entries from the consumer...
Filtering provider results...
Filtering consumer results...
Comparing retrieved entries from provider and consumer...
Stopping consumer to test recovery after logpurge expired...
Modifying even more entries on the provider...
Configuring logpurge of 1 second...
Waiting 4 seconds for accesslog to be purged...
Using ldapsearch to check if accesslog is empty...
Restarting consumer...
Waiting 7 seconds for syncrepl to receive changes...
Using ldapsearch to read all the entries from the provider...
Using ldapsearch to read all the entries from the consumer...
Filtering provider results...
Filtering consumer results...
Comparing retrieved entries from provider and consumer...
test failed - provider and consumer databases differ
>>>>> Failed test043-delta-syncrepl for mdb after 0 seconds
(exit 1)
--
You are receiving this mail because:
You are on the CC list for the issue.