https://bugs.openldap.org/show_bug.cgi?id=8852
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|UNCONFIRMED |RESOLVED
Resolution|--- |FIXED
--- Comment #9 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
• 8986f99d
by OndÅ™ej KuznÃk at 2023-11-14T18:09:10+00:00
ITS#8852 Optimise attr_cmp for sortval attributes
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8180
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|IN_PROGRESS |RESOLVED
Resolution|--- |FIXED
--- Comment #3 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
• 64789dd2
by Howard Chu at 2023-11-14T17:02:18+00:00
ITS#8180 back-sock: return error when str2entry fails
• 66edd345
by Howard Chu at 2023-11-14T17:02:18+00:00
ITS#8677 back-sock: return error for CONTINUE
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9660
Issue ID: 9660
Summary: back-mdb Permission denied => Restore from backup
Product: OpenLDAP
Version: 2.5.7
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: backends
Assignee: bugs(a)openldap.org
Reporter: geert.hendrickx(a)telenetgroup.be
Target Milestone: ---
Cosmetic issue:
When an mdb database has incorrect ownership or permissions (typically after
slapadd as root), back-mdb fails with:
mdb_db_open: database "dc=my-domain,dc=com" cannot be opened: Permission denied
(13). Restore from backup!
"Permission denied" is correct, but "Restore from backup" is maybe not the most
appropriate advice. ;-)
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=10150
Issue ID: 10150
Summary: liblber/etest.c calls open with O_CREAT without
specifying file mode
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: libraries
Assignee: bugs(a)openldap.org
Reporter: alan.coopersmith(a)oracle.com
Target Milestone: ---
https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_6_6/li…
has this call to the open() function:
if (( fd = open( "lber-test", O_WRONLY|O_CREAT|O_TRUNC|O_BINARY ))
Since O_CREAT is specified, there should be a third argument specifying
the file permissions for the newly created file, but it is missing here,
which may cause the file to be created with permissions based on whatever
noise is in the register or stack position the call reads the third argument
from on a given platform.
Fortunately, it looks like this code may never be compiled, since it's
inside #ifdef HAVE_CONSOLE_H and I can't find anywhere that is set, since
it's not in any AC_CONFIG_HEADER checks in the configure.ac file.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=10125
Issue ID: 10125
Summary: mdb_load: fix loading in Append mode
Product: LMDB
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: tools
Assignee: bugs(a)openldap.org
Reporter: hyc(a)openldap.org
Target Milestone: ---
After committing/flushing a batch of writes, the cursor is not correctly
reinitialized in Append mode.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8498
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|TEST |FIXED
--- Comment #6 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
head:
• 2939df1a
by Howard Chu at 2023-11-02T16:53:26+00:00
ITS#8498 slapadd: silence warning for NULL entry
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=10148
Issue ID: 10148
Summary: About
Product: website
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: website
Assignee: bugs(a)openldap.org
Reporter: pinkilhagency(a)gmail.com
Target Milestone: ---
Welcome to LH Talent Agency, a leading provider of live hosting talent for
events and productions. In the fast-paced world of live hosting, finding the
perfect individual to engage and captivate your audience is crucial. That's
where LH Talent Agency comes in. With our extensive network of experienced and
dynamic hosts, we can match you with the perfect talent to ensure your event is
a success. Whether you need a skilled emcee, a charismatic presenter, or a
engaging host, LH Talent Agency has the expertise and resources to meet your
needs. Read on to learn more about how LH Talent Agency can elevate your live
hosting experience.
More Info - https://livehosting.xyz/
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=10146
Issue ID: 10146
Summary: Typo in doc/man/man3/lber-decode.3
Product: OpenLDAP
Version: 2.6.6
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: documentation
Assignee: bugs(a)openldap.org
Reporter: joshua(a)joshua.hu
Target Milestone: ---
In doc/man/man3/lber-decode.3 it states that the fmt for null is:
n Null. No parameter is required. The element is simply
skipped if it is recognized.
Should it not be 'N'?
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=10131
Issue ID: 10131
Summary: wildcard search crash slapd with OU containing
parenthesis
Product: OpenLDAP
Version: 2.5.16
Hardware: x86_64
OS: Linux
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: bourguijl(a)gmail.com
Target Milestone: ---
Dears,
When I do following ldapsearch as following :
ldapsearch -x -H ldap://hostname:3891 -b "o=mobistar.be" -s subtree
"(&(objectClass=groupOfUniqueNames)(uniqueMember=uid=jlb,ou=*,o=mobistar.be))"
cn dn
and the DB is containing these entries :
dn: uid=jlb,ou=Test (aa),ou=Partners,o=mobistar.be
dn: ou=Test (aa),ou=Partners,o=mobistar.be
even if this "uid=jlb" isn't member of a group as uniqueMember, it makes slapd
crashing.
I did test it on versions 2.5.7 & 2.5.16, same result --> slapd crashed.
Seems to be related to parenthesis presence in OU attribut.
Is it a bug ?
Thx,
Jean-Luc.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9717
Issue ID: 9717
Summary: The RADIUSOV overlay can be incorporated into OpenLDAP
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: contrib
Assignee: bugs(a)openldap.org
Reporter: rdubner(a)symas.com
Target Milestone: ---
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=10132
Issue ID: 10132
Summary: manage syncrepl as a cn=config entry
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: ondra(a)mistotebe.net
Target Milestone: ---
Maybe it being exposed through both places (olcSyncrepl and the entry) could be
a way to manage the transition (unless we have a way to handle cn=config schema
upgrades internally). Uncertain as to how that affects cn=config replication.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8826
OndÅ™ej KuznÃk <ondra(a)mistotebe.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|UNCONFIRMED |IN_PROGRESS
Ever confirmed|0 |1
--- Comment #1 from OndÅ™ej KuznÃk <ondra(a)mistotebe.net> ---
https://git.openldap.org/openldap/openldap/-/merge_requests/661
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=6166
OndÅ™ej KuznÃk <ondra(a)mistotebe.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
See Also| |https://bugs.openldap.org/s
| |how_bug.cgi?id=10135
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=10134
Issue ID: 10134
Summary: OpenLDAP Docker Installation and Migration
Product: OpenLDAP
Version: 2.5.13
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: build
Assignee: bugs(a)openldap.org
Reporter: chilimili1(a)outlook.de
Target Milestone: ---
Created attachment 990
--> https://bugs.openldap.org/attachment.cgi?id=990&action=edit
Dockerfile.txt logs_importfile.txt logs_slaptest.txt
Hi,
I am currently experiencing issues while building a Docker container for
OpenLDAP. I hope that an expert from the community can help me solve my
problem.
Issue 1: Docker Setup
I'm in the process of setting up OpenLDAP within a Docker container on a RHEL 9
base OS. I've attached the Dockerfile I'm using for reference. My primary
concern is that when I run the command RUN slaptest -f /tmp/slapd.conf -F
/etc/openldap/slapd.d -d 1, it fails with mdb_db_open: database
"dc=my-domain,dc=com": dbenv_open(/usr/var/openldap-data).
mdb_db_open: database "dc=my-domain,dc=com" cannot be opened: No such file or
directory (2). Restore from backup!.
Interestingly, slaptest -u seems to work fine. I would greatly appreciate it if
you could review my Dockerfile or provide insights into what might be causing
this issue.
Issue 2: LDAP Migration
Additionally, I'm trying to migrate configuration data from a system using
OpenLDAP 2.4.50 to OpenLDAP 2.5.13. During this process, I encountered the
following error:
csharp
Copy code
olcAuthzRegexp: value #0: keyword <olcAuthzRegexp> missing <regexp> <DN>
argument
slapadd: could not add entry dn="cn=config" (line=1)
Dockerfile.txt
logs_importfile.txt
logs_slaptest.txt
I'm not sure if these issues are related, but I thought it would be best to ask
for your expertise on both matters.
Thank you in advance for your assistance. Your guidance would be greatly
appreciated.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=10133
Issue ID: 10133
Summary: We tried to use centralized authentication for the
root account, but it failed.
Product: OpenLDAP
Version: 2.6.0
Hardware: All
OS: Linux
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: liubo335(a)huawei.com
Target Milestone: ---
When sssd+ldap is used for centralized authentication of Linux users, it is
found that only non-root users can be authenticated, but the root user cannot
be authenticated. Therefore, I would like to ask whether the authentication of
the root user is not supported. If yes, what additional configuration items do
you need to pay attention to when authenticating the root user? Looking forward
to your answer, thank you very much.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8890
--- Comment #15 from tg(a)debian.org <tg(a)debian.org> ---
FWIW, Debian is going to switch 32-bit ARM (with 32-bit long)
to 64-bit time_t and off_t soon, and others, even m68k, will
follow.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=6097
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Target Milestone|2.7.0 |3.0.0
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=6942
--- Comment #4 from OndÅ™ej KuznÃk <ondra(a)mistotebe.net> ---
Maybe putting updateref on the syncrepl consumer configuration is a way to deal
with this.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=6198
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Severity|enhancement |blocker
Priority|--- |Highest
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9009
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Severity|normal |blocker
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8890
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Priority|Low |Normal
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9719
Issue ID: 9719
Summary: refreshOnly sends empty cookie when client up to date
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: overlays
Assignee: bugs(a)openldap.org
Reporter: ondra(a)mistotebe.net
Target Milestone: ---
Syncprov will send an empty cookie if the consumer has the same cookie as
provider. To the best of my knowledge this is not in line with RFC4533 and
consumers would effectively drop their cookie when the search finishes.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=10065
Issue ID: 10065
Summary: slapd needs a config option for the ssf of an external
security proxy using "proxy protocol v2"
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: sean(a)teletech.com.au
Target Milestone: ---
Commit 146889f introduced support for the haproxy "proxy protocol v2". A very
welcome addition that allows an external security layer to be implemented. This
implementation is however somewhat hobbled.
Cyrus SASL uses "Security Strength Factors" or "ssf" to determine what
Authentication mechanisms to offer. slapd conveys the implicit security of UNIX
domain sockets to the SASL layer by specifying a non-zero ssf for these
connections. This can be configured with the "olcLocalSSF" config setting.
For implicit/explicit TLS connections, the "olcSecurity: tls=<n>" provides the
cryptographic strength of the TLS layer to the SASL layer.
For an external TLS-terminating proxy, there does not appear to be any way to
inform Cyrus SASL of the presence of TLS security on these proxied connections.
The outcome of this is that PLAIN and EXTERNAL authentication mechanisms are
not offered to clients connecting through the secure proxy.
This can be overcome by weakening the security properties of the SASL layer
with the olcSaslSecProps configuration option, but this weakening will apply to
all clients, not just clients connecting via the secure proxy.
What is required is some way to tell slapd and it's integrated SASL layer about
the presence of TLS encryption on the proxy's input. As a precaution, this
might be restricted to slapd connections in the 127.0.0.0/8 [IPv6:::] address
ranges.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9902
Issue ID: 9902
Summary: Make max index DBs for back-mdb configurable
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: backends
Assignee: bugs(a)openldap.org
Reporter: quanah(a)openldap.org
Target Milestone: ---
From ITS#9895:
Currently there is a hardcoded limit of 128 index DBs in back-mdb. Some sites
want more than this (although there's no evidence they actually use more than
128 attributes in all of their applications' search filters).
For 2.5/2.6 we can simply double the constant. For 2.7 consider making it
configurable.
Note that increasing the number increases the size of an LMDB transaction
structure, and also increases the time needed to initialize it whenever
creating a transaction, so it's a bad idea to just set this to an arbitrarily
large number.
--
You are receiving this mail because:
You are on the CC list for the issue.