https://bugs.openldap.org/show_bug.cgi?id=8528
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Keywords|OL_2_5_REQ |
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9415
Issue ID: 9415
Summary: Possible use of memory after free
Product: LMDB
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: liblmdb
Assignee: bugs(a)openldap.org
Reporter: cwe(a)skov.dk
Target Milestone: ---
In my code I have a construct like this:
err = mdb_txn_commit(txn);
if (err) {
mdb_txn_abort(txn);
}
I run codesonar on my code and include the lmdb source in the run. Codesonar
reports a possible double free for the case where mdb_midl_append_list in mdb.c
line 3586 returns ENOMEM. The code following line 3586 will free the txn and
return ENOMEM. This will cause my code to call mdb_txn_abort, which will access
the freed memory and call free again.
Please ask if more details are needed.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9401
Issue ID: 9401
Summary: Fix ldap_install_tls function name
Product: OpenLDAP
Version: 2.5
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: libraries
Assignee: bugs(a)openldap.org
Reporter: quanah(a)openldap.org
Target Milestone: ---
The ldap_install_tls function is really an internal only method for slapd. It
should be renamed accordingly to ldap_int_install_tls to reflect this fact, and
the documentation updated accordingly.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8528
Howard Chu <hyc(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|UNCONFIRMED |RESOLVED
Resolution|--- |INVALID
--- Comment #7 from Howard Chu <hyc(a)openldap.org> ---
(In reply to Quanah Gibson-Mount from comment #1)
> --On Friday, November 04, 2016 12:41 AM +0000 openldap-its(a)OpenLDAP.org
> wrote:
>
> Here's the full text, since the web form apparently ate it:
>
> When doing a full replace on all values for olcAccess, things work
> incorrectly if the values provided are not in numeric sorted order. This
> is problematic when using tools like ldapvi who do alphabetic sort. It is
> trivial to reproduce the problem using the following example LDIFs:
>
> cat > replace_ordered.ldif <<EOF
> dn: olcDatabase={1}mdb,cn=config
> changetype: modify
> replace: olcAccess
> olcAccess: {0}to dn.exact="cn=0" by * none
> olcAccess: {1}to dn.exact="cn=1" by * none
> olcAccess: {2}to dn.exact="cn=2" by * none
> olcAccess: {3}to dn.exact="cn=3" by * none
> olcAccess: {4}to dn.exact="cn=4" by * none
> olcAccess: {5}to dn.exact="cn=5" by * none
> olcAccess: {6}to dn.exact="cn=6" by * none
> olcAccess: {7}to dn.exact="cn=7" by * none
> -
> EOF
>
> cat > replace_ordered_mixup.ldif <<EOF
> dn: olcDatabase={1}mdb,cn=config
> changetype: modify
> replace: olcAccess
> olcAccess: {7}to dn.exact="cn=7" by * none
> olcAccess: {1}to dn.exact="cn=1" by * none
> olcAccess: {4}to dn.exact="cn=4" by * none
> olcAccess: {3}to dn.exact="cn=3" by * none
> olcAccess: {5}to dn.exact="cn=5" by * none
> olcAccess: {0}to dn.exact="cn=0" by * none
> olcAccess: {6}to dn.exact="cn=6" by * none
> olcAccess: {2}to dn.exact="cn=2" by * none
> -
> EOF
>
> With the initial config as:
>
> olcAccess: {0}to attrs=userPassword by self write by anonymous auth by *
> none
> olcAccess: {1}to attrs=shadowLastChange by self write by * read
> olcAccess: {2}to * by * read
>
> When the ordered version is done, the correct result occurs:
>
> olcAccess: {0}to dn.exact="cn=0" by * none
> olcAccess: {1}to dn.exact="cn=1" by * none
> olcAccess: {2}to dn.exact="cn=2" by * none
> olcAccess: {3}to dn.exact="cn=3" by * none
> olcAccess: {4}to dn.exact="cn=4" by * none
> olcAccess: {5}to dn.exact="cn=5" by * none
> olcAccess: {6}to dn.exact="cn=6" by * none
> olcAccess: {7}to dn.exact="cn=7" by * none
>
> However, when the unordered replaced is done, an incorrect result occurs:
>
> olcAccess: {0}to dn.exact="cn=0" by * none
> olcAccess: {1}to dn.exact="cn=7" by * none
> olcAccess: {2}to dn.exact="cn=2" by * none
> olcAccess: {3}to dn.exact="cn=1" by * none
> olcAccess: {4}to dn.exact="cn=4" by * none
> olcAccess: {5}to dn.exact="cn=3" by * none
> olcAccess: {6}to dn.exact="cn=5" by * none
> olcAccess: {7}to dn.exact="cn=6" by * none
>
> Since we are doing a replace of all values, it should not be trying to
> reweight the operation. Instead, the values should just be numeric sorted
> and then written out accordingly, so one ends up with the same result as in
> the ordered case.
This ITS is invalid. The frontend is not trying to reweight the operation,
but you're giving it invalid input.
It processes each value in the order it was given. You put {7} first but at
that point in time, there aren't 7 values in the attribute, so it goes "at the
end".
The 2nd input is {1}, which gets put into the 2nd slot, so you have {7}, {1}.
The 3rd input is {4} but there are only 2 values, so it goes at the end in the
3rd slot.
The 4th input is {3} so it gets inserted into the 3rd slot and pushes the
previous value in the 3rd slot into the 4th slot.
The 5th input is {5} so it goes at the end.
The 6th input is {0} so it gets inserted into the 1st slot and pushes
everything else out by 1.
The 7th input is {6} so it goes at the end.
The 8th input is {2} so it gets inserted in the 3rd slot and pushes everything
else out by 1.
Closing this ITS.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9405
Issue ID: 9405
Summary: Link to Administrator's Guide is 404
Product: website
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: website
Assignee: bugs(a)openldap.org
Reporter: p.boven(a)xs4all.nl
Target Milestone: ---
On the 'software' page (https://www.openldap.org/software/), the link to the
"Administrator's Guide" page currently gives a 404 error.
The admin page link points to https://www.openldap.org/doc/admin/, but this
should apparently be https://www.openldap.org/doc/admin24/
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9402
Issue ID: 9402
Summary: Add support for LDAP_MATCHING_RULE_IN_CHAIN
(1.2.840.113556.1.4.1941)
Product: OpenLDAP
Version: 2.4.56
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: overlays
Assignee: bugs(a)openldap.org
Reporter: vdanjean.ml(a)free.fr
Target Milestone: ---
Hi,
The memberof overlay add support for memberOf attributes. But, when using
nested groups, user group membership must be handled on each ldap client. The
current implementation allows one to only retrieve direct group ownership.
Nested group membership must be done by client recursive lookup.
Microsoft Active Directory provides a way to do the recursive lookup at
server side: https://ldapwiki.com/wiki/LDAP_MATCHING_RULE_IN_CHAIN
It would be really useful if openldap (slapd) was also able to do the same.
Regards,
Vincent
PS: I set the component to overlays in this bugs report, but I'm not sure it
should be implemented into the overlays memberof itself.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9399
Issue ID: 9399
Summary: OpenLDAP build fails due to lloadd
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: build
Assignee: bugs(a)openldap.org
Reporter: tero.saarni(a)est.tech
Target Milestone: ---
Cloning current git head and running build steps according to INSTALL fails:
./configure
make depends
The error is following:
Entering subdirectory lloadd
make[2]: Entering directory '/home/tsaarni/work/openldap/servers/lloadd'
make[2]: *** No rule to make target 'depend'. Stop.
make[2]: Leaving directory '/home/tsaarni/work/openldap/servers/lloadd'
make[1]: *** [Makefile:333: depend-common] Error 1
make[1]: Leaving directory '/home/tsaarni/work/openldap/servers'
make: *** [Makefile:354: depend-common] Error 1
The reason is that "autoreconf" results have not been committed to git.
Running autoreconf && ./configure && make depend && make works.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8839
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |VERIFIED
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8839
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |FIXED
Status|UNCONFIRMED |RESOLVED
--- Comment #3 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
generation of sha3-512 is now in for 2.5
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8747
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|TEST |FIXED
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8747
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |TEST
Status|UNCONFIRMED |RESOLVED
Keywords|OL_2_5_REQ |
--- Comment #2 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
Commits:
• 46ddb403
by OndÅ™ej KuznÃk at 2020-11-17T17:15:40+00:00
lloadd ahoy
• c596b797
by OndÅ™ej KuznÃk at 2020-11-17T17:15:40+00:00
Backend configuration
• 8e0a6119
by OndÅ™ej KuznÃk at 2020-11-17T17:15:40+00:00
Startup adjustment
• 1a452490
by OndÅ™ej KuznÃk at 2020-11-17T17:15:40+00:00
Update connection init
• bf66b48f
by OndÅ™ej KuznÃk at 2020-11-17T17:15:40+00:00
Upstream connection setup
• 79f7e79f
by OndÅ™ej KuznÃk at 2020-11-17T17:15:40+00:00
Set up connections in the worker threads
• b49932d6
by OndÅ™ej KuznÃk at 2020-11-17T17:42:43+00:00
Connection write support
• 93fe1d2b
by OndÅ™ej KuznÃk at 2020-11-17T17:42:44+00:00
Operation parsing
• fd5b9cdb
by OndÅ™ej KuznÃk at 2020-11-17T17:42:44+00:00
This is a proxy now
• 5bdb4e15
by OndÅ™ej KuznÃk at 2020-11-17T17:42:44+00:00
Update maximum number or parameters for backend
• 3d1ea469
by OndÅ™ej KuznÃk at 2020-11-17T17:42:44+00:00
Authenticate the upstream connection if configured
• 2fbc8ca4
by OndÅ™ej KuznÃk at 2020-11-17T17:42:44+00:00
Rename backend mutex
• f37e7757
by OndÅ™ej KuznÃk at 2020-11-17T17:55:45+00:00
Response handling, exploit optional bervals
• 4ad8ecd4
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Logging improvements
• e5f68bcf
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Option for response handling
• 639c5912
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Client authentication
• 9309bc94
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Make features global
• 59291ba4
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Proxyauthz support
• 94ee62a4
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Switch bindkey to use Backend instead of bindconf
• 798e215e
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Add connection number config
• 673513a0
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Maintain the configured amount of connections per backend
• dc5e2538
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Configuration part for retry timeouts
• 463bcdd2
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Update backend progress tracking
• 8b1703d2
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Implement backend retry timeouts
• b6b3f35a
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Fix proxyauthz handling
• 2e2c8666
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
There might be errors before we save the operation in c_ops
• 50f5c4be
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Report initial bind errors to client
• 54cd3a27
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Reject operations when binding
• e5fcf175
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Save connection ids on operation for logging purposes
• 8f5bae92
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Pending operation tracking and limiting
• 6c8b2acc
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Do not leak addrinfos
• c0d254a4
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Do not leak BerElements
• fba4bed6
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
connection reference counting
• cddc9632
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Do not clear c_pendingber on short write
• 028f2869
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
On a failed bind, stop the callback from firing again
Not a problem but causes a slew of calls to upstream_bind_cb that will
all fail in the same way.
• 837a6068
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Rework client_read_cb along the lines of upstream
• ea7e40b8
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Shutdown handling
• 9d66c26b
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Operation reference counting
• 7a29fabd
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Destroy the unbind operation when acted upon
• c5584fd3
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Do not leak responses to abandoned ops
• 07b5744c
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Retain a reference around for handle_responses
• 77f2c571
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Reset c_*ber after freeing and check c_pendingber race
• 6899d012
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Do not bother to write to a dying connection
• 8eb7f3fb
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Stop the read callback on a dead connection.
The connection might be ready to read (close) but if we can't destroy it
yet, we don't want the callback to trigger all the time or process new
data.
• 9ebe5acb
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Clean up events properly
• 643194e7
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Revert connection/operation mutex order.
There was still a race where the connection could be freed as the
operation was still being used.
• 58a880bc
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Convert backend and upstream management to use CIRCLEQ.
This alone doesn't make the server do a round robin.
• e65cd387
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Round-robin for upstream connections
• 53015aa4
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Round robin for backends.
Several threads calling backend_select might reset current_backend to a
different place, there are two options to deal with that:
- just let the last rotation win (the current approach)
- detect whether first == current_backend and only replace then
Not sure which one is more useful, going with the simpler.
• ee288cfc
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Fix refcounting for all code paths
• 37a474b5
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Fix error handling wrt. its callers
• d020897f
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Initialise listeners after all workers have been
• f4afc069
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Tweak connection error logging.
Do not log when receiving the last bytes on a connection. Log failed
writes.
• cf05722b
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Lookup operations by saved connid.
We reset the connection pointer on a destruction attempt, avoid the
spurious asserts.
• e0b8bd5f
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Free all pending operations on shutdown
• 3f5dee0b
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Keep a list of active clients for shutdown purposes.
Potentially for timeout detection purposes in the future.
• 26f72151
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Improve logging
• 1dfeca35
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Another attempt at operation/connection destroy interaction.
• 10824868
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Only enable verifycredentials if libldap does
• 8d85912a
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
lloadd documentation
• 015f8934
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
First test for load balancer
• 0a075905
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Second test
• 3fa8a0cd
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Rename listener-threads to reflect the option
• 495dfa69
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Split client/upstream PDU size limits
• a8a0fe26
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Documentation updates
• c228bd11
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Be consistent with bind responses on no upstream
• 5b1ad431
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Handle upstream connection shutdown properly
• 7eeb5bb8
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Forward controls correctly in the face of proxyauth
• 0e7792e8
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Borrow liblber code to get abandon processing to work
• 6ee21f11
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Split bind configuration from backends
• 961b600a
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Rework proxyauthz handling
• 9d3b998a
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Document new bind configuration
• 873d6fa3
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Handle backend unsolicited response properly
• 05f2ac25
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Unify logging output
• af7ce80c
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Remember and clear bind status correctly
• 37cff373
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Manage connection refcnt better
• 88390159
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
On connection shutdown, free op from the correct side
• 545198c7
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Simplify abandon processing
• 0ff462b6
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Fix issues in bind response handling
• 46fe0143
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Make sure operation stays alive when we process it
• 887c2661
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Update tests to match latest configuration layout
• baf1feab
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Handle asynchronous connect properly
• 95df8a1e
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Adjust backend operation counting
• 33a99355
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Unblock the client when we can't find an upstream
If we can't find an upstream, we keep the client around, so it needs to
be unblocked.
• 1dd0e513
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Only one bind at a time
• 30e538e8
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Realign logging levels.
Stats now logs all operations, stats2 additionally intermediate messages
(search entries).
• 1740f36b
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Fix emfile handling
• 65def943
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
More logging improvements
• 70464443
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Do not read on the last iteration.
When the pdu processing limit is hit, we still attempt to read another
PDU. If we succeed, the ber_get_next call in the read callback will
abort since a full PDU is already present.
• 7b413f9e
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Update docs and defaults
• 7b7f9724
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Avoid a deadlock with client
• 16010e5e
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
More logging improvements
• 622b87d5
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Make ready only when still alive
• 31074213
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
TENTATIVE: communicate more for op destroy race
• cda8411c
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Close up the race
• 0ad91e05
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Do not back off until we get a failure
• d4225924
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
CLOSING is another potential state we could be in
• 6140cdf6
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Handle a client connection disconnected from op
• f7cf34e6
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Reset connection state on abandon
• e03c9e6f
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Stop processing if we freed the client
• 532fc1bf
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Shorten time operation_mutex is locked
• 362d5503
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Do not crash when closing both client and upstream
• 96b7619a
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Do not unlock client unless we are destroying it
• 5fcef01d
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Switch from a global mutex
• cfeb4d82
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Set binding state after we have dropped all ops
• 96f49393
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Add a load test
• 8d93e0ba
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Unify connection locking and I/O
• d22db36c
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
lload_libevent_init can fail and wants to log
• 0b353106
by OndÅ™ej KuznÃk at 2020-11-17T17:55:46+00:00
Refactor operation_send_reject
• c60ef739
by OndÅ™ej KuznÃk at 2020-11-17T17:58:13+00:00
Rework upstream conn setup
• 7cd531c0
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Improve spec conformance, logging
• 11f47438
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Exop support
At the moment, no exops are processed internally, all are passed on
unchanged.
• b801ca17
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Rename macros and symbols to lloadd
• f27517af
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Rename bind handlers
• abab7e46
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Move client related functions to client.c
• 5ee4b676
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Move bind handling to bind.c
• ccf75c96
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Update write timeout to timeval
• 063981a0
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Respond to timeout events properly
• a0cd41ec
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Upstream TLS support
• 1b46f866
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Client TLS support
• f87127df
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Set up TLS context for backends
• b4d7e8af
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
We should just be able to call backend_retry
• 0cfd4fca
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Make timeouts common and redo connection read timeouts
• a0ec50b3
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Upstream queues ordered by c_connid
In preparation for operation timeout events.
• 17900184
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Record operation activity times
• 8ba44630
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Factor out abandon message preparation
• aecc62c0
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Introduce operation timeout machinery
• c386d527
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Protect currently impossible branch
• 5cbd30de
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Log timed out connections more clearly
• ea836279
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
request_abandon RFC4511 conformance
• c7e3437e
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Update test suite
• 8bc7650a
by Nadezhda Ivanova at 2020-11-17T17:58:14+00:00
Clean ups and renames to coexist with slapd
• 37cd5f21
by Nadezhda Ivanova at 2020-11-17T17:58:14+00:00
Enable compilation of the load balancer as a module
To compile the balancer as a slapd module, pass --enable-balancer=mod to
./configure
Use --enable-balancer(=yes) to compile as standalone server.
• c91d61cf
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Do not copy files from slapd, just link them
• 66f06f3f
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Initial extension to upstream selection
• 1fd7249f
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
RFC4511 says Binds do not abandon, send a "reset" bind instead
• ddd1acc3
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Passing the client directly will allow clearing it from op
• 21a22d1b
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Refactor request parsing and sending.
We have to do most of out processing before we send the request over to
the upstream. If we don't, we might be too late and the response might
have arrived already.
• 003a35c6
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
SASL bind support
Introduces pinned operations. When SASL bind finishes, we might still
have to maintain a link between the client an an upstream for future
bind operations if we got a SASL Bind in Progress result code. We zero
out the msgids and remember a server-unique identifer on the client and
the relevant operation that lets us retrieve that link again. This
operation is reclaimed just like anything else when connections drop.
Hopefully, this should work for LDAP TXN and VC Exop support with SASL
later as well since it allows for many-to-many links to exist.
• ee893ae1
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Handle EXTERNAL mechanism
Will only try to extract the TLS client certificate name if used during
the last handshake.
• 72ca7112
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Do not compare c_auth when NULL
• c52328f6
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Clear c_auth on every bind request
For a new bind request, this is obvious, for SASL bind requests, we do
not know the final identity until we have finished handling it, make
sure it stays empty until then.
• 5c1245de
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Manage c_sasl_bind_mech on upstream
• 2ba83368
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Operation abandon related fixes
• cbc0ec04
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Fix pinned operation forwarding
• 205db0bf
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Reset pin on simple bind
• c957bb91
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Add SASL documentation on SASL handling
• 7a69017f
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Resolve authzid after a successful auth
• 9baa56ad
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Update tests to support lloadd as a module
• 2d330325
by Nadezhda Ivanova at 2020-11-17T17:58:14+00:00
Lload cn=monitor initial implementation
• 77716069
by Nadezhda Ivanova at 2020-11-17T17:58:14+00:00
Use slapd's config.h
• 678fa100
by Nadezhda Ivanova at 2020-11-17T17:58:14+00:00
Convert the load balancer into a backend
• dab90547
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Rework monitor startup
Takes care of dealing with monitor not present/not configured and fix a
monitor startup issue.
• 22818e85
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Module shutdown
• db5966f6
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
More meaningful connection type reporting
• 485a1697
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Implement pause handlers
• 9bd90a74
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Fix a race on bind response processing.
During response processing, an upstream connection could be marked ready
after a different bind had already been allocated to it, thus allowing
two binds to be in progress on the same connection.
• 00116847
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Cleanup sasl_bind_mech resets
• bea9bfb3
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Move op counting to operation_init
• ca646cd0
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Fix operation counts
Trying to abandon an operation does not automatically make it completed,
it might have failed already but we're just racing to reach the client
to record that.
• 7f22bac4
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Introduce a new connection status - gentle shutdown
• bf9f99dd
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Split backend destruction from resetting it
• a7f8f58a
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
expose task functions for invalidation
• cfe90658
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Introduce infra to handle config changes
• edfb3d73
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Fix operation status tracking.
An operation is rejected iff it has to be dropped before we can find an
upstream for it (unless we handle it ourselves, that is). At that point
it is failed unless completed successfully.
This makes a difference for multi-stage binds which alternate between
'failed' (we are waiting on a server response) and 'completed' (server
did what we asked them to, waiting on client to continue).
• d954216f
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Change log level for unsolicited response
• 70ae4af6
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Fix interaction of graceful connection closing and SASL bind support
• bace7959
by Nadezhda Ivanova at 2020-11-17T17:58:14+00:00
Enable dynamic configuration
• 3a6b3995
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Reflect backend URI change in cn=monitor
• 4c355deb
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Record the backend name
• 362f1647
by OndÅ™ej KuznÃk at 2020-11-17T17:58:14+00:00
Deal with no backends being configured
• 05d6aae4
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Rework lloadd startup
• b1c098ad
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Module shutdown support
• 1ea5ee1f
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Do not unlock upstream without referencing its dying ops
• 07401e58
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Implement runtime monitor (un)registration
Unregistration is a hack and we shoould either make the subsystems into
an entry (if monitor allows subentry generation) or implement subsystem
unregistration in back-monitor.
• db939eeb
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Protect operation when abandoning
• 0314f95d
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Work around libevent base not waking up on shutdown
• b039e7c1
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Keep a reference around for the bind task
• 6b10c298
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Record pending DNS resolution to be able to cancel
• db3961f4
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Record connect task to allow canceling it
• 93d20459
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Make io-threads modification startup-only
• 757c8bed
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Switch to ldap_parse_url_ext
This simplifies port parsing in the end. Also pass the url to
ldap_open_listener in anticipation of incremental listener config.
• bd7a6f67
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Introduce lload_open_new_listener
• f1ea9da3
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Reorganise listener support in cn=config and module startup
• 513659c6
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Document config behaviour
• 00806dd3
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
libevent 2.0 support
• f4a2fdd4
by Nadezhda Ivanova at 2020-11-17T17:58:15+00:00
Fix a new backend not being operational if added via cn=config
• 241f65b9
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Fix a race in managing b_dns_req
• 2a813cb0
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Clean up backend_retry and its callers.
• 638f8a2c
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Tighten checks on retry management
• b4f43ed8
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Refactor backend reset
Reuse the connection walking facility in timeout management.
• 3bd2d748
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Reuse connection_walk for client matters
• 63efcd63
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Reuse connection walking in monitor for upstreams too
• ef0028e5
by Nadezhda Ivanova at 2020-11-17T17:58:15+00:00
Initial implementation of cn=config testing script
• 25a4d684
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Permit lloadd to share slapd TLS context
• 9444dfc9
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Simplify pause handling
Gets rid of a race where unpause+pause fired in a quick succession would
miss the event_base_loopbreak() call.
• 05e0906f
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Fix backend starttls= setting being ignored
• 50a021a3
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Do not enforce a valid ld in lutil_sasl_interact
• 4b3d2114
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Introduce SASL support for upstream connections
• 78f25a3c
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
A failed cn=config ADD needs to be handled
• 34ddaa5f
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Tests for monitoring support
• bd3da732
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Add TLS tests
• c0872442
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
SASL and proxyauthz tests
• 81ead4a5
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Fix races with backend_retry
• aab6af1c
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Switch to LDAP_OTHER when handling a lost upstream.
LDAP_UNAVAILABLE signals "the server is shutting down or a subsystem
necessary to complete the operation is offline", so intelligent clients
tend to infer the connection will not be usable any more, which is not
the case here.
• dc1961cb
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Epoch based memory reclamation
Similar to the algorithm presented in
https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-579.pdf
Not completely lock-free at the moment. Also the problems with epoch
based memory reclamation are still present - a thread actively observing
an epoch getting stuck will prevent LloadConnections and LloadOperations
being freed, potentially running out of memory.
• f832024e
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Straighten up client pending op tracking
• b49f5187
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Implement client pending operation limits
• b2e57148
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Shorten to one epoch per PDU
A full read cycle can take a very long time if the limits are set too
high.
• 959ff079
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Make sure read event is not enabled while upstream_bind is scheduled
• 58d66a39
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Fix race between unlinking a client and processing incoming data
• 1328777a
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Fix a SASL channel-binding leak
• 62a806b2
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Thread error checking
• 68b163fc
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Introduce mutex checks
Switched off unless thread debugging is on, but still useful for static
analysis.
• 1f6d8611
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Implement read throttling when writes backlog
Reject operations in such a case with LDAP_BUSY. If read_event feature
is on, just stop reading from the connection. However this could still
result in deadlocks in reasonable situations. Need to figure out better
ways to make it safe and still protect ourselves.
• 41a74b46
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Introduce the notion of experimental features
• 25fff30e
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Let the last thread dispose of pending references
If we're idle, there might be objects pending cleanup for the last two
epochs. Unless another thread comes in and checks into a new epoch or we
shut down, they will linger forever.
If one of the objects was a connection, it wouldn't get closed and be
stuck in CLOSE_WAIT state, potentially refusing another ligitimate
connection if its socket address were to match the one we're yet to
close.
• dfbf25d5
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Honour keepalive settings for upstreams
• dfbed44b
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Do not accept requests with msgid == 0
It is used internally to identify pinned operations and should not be
encountered over the wire.
• 0abf3f5b
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Flush cache before calling dispose()
This needs to be confirmed:
Location based atomics do not imply a full fence of the same level. So
to get the code in dispose() read the actual data, it seems we need to
initiate a fence.
• 323bb1d9
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Handle upstream rejecting a StartTLS exop
• 8557cc93
by OndÅ™ej KuznÃk at 2020-11-17T17:58:15+00:00
Add lloadd into our testing regime
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9392
Issue ID: 9392
Summary: Duplicate emails and uid's allowed
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: Linux
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: client tools
Assignee: bugs(a)openldap.org
Reporter: envykappa23(a)gmail.com
Target Milestone: ---
If i try to add a user through ldapmyadmin i will get an error that the
email/uid already exist.
If i use my java code , i can add users with existing emails or uid's just fine
.
The email and uid should both be unique as those are what most people log in in
external platforms that support SSO using LDAP.
Here is my code :
public void addUser(String user, String email, String pass) {
Attributes attributes = new BasicAttributes();
Attribute attribute = new BasicAttribute("objectClass");
attribute.add("inetOrgPerson");
attributes.put(attribute);
attributes.put("mail", email);
attributes.put("userPassword", pass);
attributes.put("sn", "tempUsername");
attributes.put("uid",user);
connection.createSubcontext("cn=user,ou=groups,dc=demo,dc=com",attributes);
}
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9395
Issue ID: 9395
Summary: contrib/slapd-modules/passwd/totp missing in 2.4.56
Release
Product: OpenLDAP
Version: 2.4.56
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: contrib
Assignee: bugs(a)openldap.org
Reporter: kaelan(a)fouwels.com
Target Milestone: ---
Hello,
contrib/slapd-modules/passwd/totp is missing from the 2.4.56 release, despite
being in master, and checked in prior to the release window.
Is this intended?
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9390
Issue ID: 9390
Summary: syncrepl: Fix debug message for size limit exceeded
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: fumiyas(a)osstech.co.jp
Target Milestone: ---
Created attachment 778
--> https://bugs.openldap.org/attachment.cgi?id=778&action=edit
Proposed patch for OPENLDAP_REL_ENG_2_4 branch
In server/slapd/syncrepl.c:dn_callback():
} else if ( rs->sr_type == REP_RESULT ) {
if ( rs->sr_err == LDAP_SIZELIMIT_EXCEEDED ) {
Debug( LDAP_DEBUG_ANY,
"dn_callback : consistency error - "
"entryUUID is not unique\n", 0, 0, 0 );
}
}
Is this wrong debug message?
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9384
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Group|OpenLDAP-devs |
Status|RESOLVED |VERIFIED
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9383
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Group|OpenLDAP-devs |
Status|RESOLVED |VERIFIED
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9379
Issue ID: 9379
Summary: slapd should reject invalid listener URLs
Product: OpenLDAP
Version: 2.4.53
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: trivial
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: hyc(a)openldap.org
Target Milestone: ---
Most common instance of invalid listener URLs is specifying an ldapi URL
without URLencoding the socket pathname. Then the slashes in the pathname are
treated as URL field separators, which yields a pathname quite different from
what was intended.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9387
Issue ID: 9387
Summary: Support C++ Linkage
Product: LMDB
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: liblmdb
Assignee: bugs(a)openldap.org
Reporter: kriszyp(a)gmail.com
Target Milestone: ---
Created attachment 777
--> https://bugs.openldap.org/attachment.cgi?id=777&action=edit
Add directive for supporting C++ linking
The chacha8.h and module.h header files won't link properly (at least for me)
with a C++ compiler/linker. I think they just need the linkage directives.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9156
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
See Also| |https://bugs.openldap.org/s
| |how_bug.cgi?id=9386
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8125
--- Comment #19 from OndÅ™ej KuznÃk <ondra(a)mistotebe.net> ---
(In reply to OndÅ™ej KuznÃk from comment #12)
> This is my understanding of the above discussion:
> - deltasync consumer has just switched to full refresh (but is ahead
> from this provider in some ways)
> - provider sends the present list
> - consumer deletes extra entries, builds a new cookie
> - problem is that the new cookie is built to reflect the union of both
> the local and received cookies even though we may have undone some of
> the changes which we then ignore
>
> If that's accurate, there are some approaches that could fix it:
>
> 1. Simple one is to remember the actual cookie we got from the server
> and refuse to delete entries with entryCSN ahead of the provided CSN
> set. Problem is that we get even further from being able to replicate
> from a generic RFC4533 provider.
This has actually been done in ITS#9282.
> 2. Instead, when present phase is initiated, we might terminate all
> other sessions, adopt the complete CSN set and restart them only once
> the new CSN set has been fully established.
>
> Also, whenever we fall back from deltasync into plain syncrepl, we
> should make sure that the accesslog entries we generate from this are
> never used for further replication which might be thought to be a
> separate issue. Maybe the ITS#8486 work might be useful for this if
> we have a way of signalling to accesslog to reset minCSN accordingly
> to the new CSN set.
>
> The former is simpler, but the latter feels like the only one that
> actually addresses these problems in full.
I have some code to do this, terminate only persist sessions when we detect
getting into a present refresh.
Need a way to reproduce this in current master since a lot of the issues would
have been fixed in ITS#9282 and might only be diverging in relayed deltasync,
possibly if we're refreshing from two other providers at the same time.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=5808
--- Comment #4 from klasen(a)gmx.net ---
The same problem can be observed, if a non-default SocketFactory (e.g. for
LDAPS connections) is used:
See https://bugs.openldap.org/show_bug.cgi?id=5808 (SocketFactory does not
support a connect timeout.)
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9370
--- Comment #4 from Howard Chu <hyc(a)openldap.org> ---
(In reply to Salvatore Bonaccorso from comment #3)
> CVE-2020-25692 was assigned for this issue.
Fyi, the official OpenLDAP Project policy is that only unintended information
disclosures count as security issues, and this item does not qualify.
--
You are receiving this mail because:
You are on the CC list for the issue.