https://bugs.openldap.org/show_bug.cgi?id=9658
Issue ID: 9658
Summary: libldap fails to compile on Hurd: MAXPATHLEN
undeclared
Product: OpenLDAP
Version: 2.5.7
Hardware: All
OS: All
Status: UNCONFIRMED
Keywords: needs_review
Severity: normal
Priority: ---
Component: build
Assignee: bugs(a)openldap.org
Reporter: ryan(a)openldap.org
Target Milestone: ---
OpenLDAP 2.5 and later fails to compile on GNU/Hurd:
libtool: compile: cc -g -O2 -I../../include -I../../include -DLDAP_LIBRARY -c
request.c -fPIC -DPIC -o .libs/request.o
In file included from ldap-int.h:119,
from request.c:53:
request.c: In function 'ldap_dump_connection':
../../include/ldap_pvt.h:181:25: error: 'MAXPATHLEN' undeclared (first use in
this function)
181 | #define LDAP_IPADDRLEN (MAXPATHLEN + sizeof("PATH="))
| ^~~~~~~~~~
request.c:859:17: note: in expansion of macro 'LDAP_IPADDRLEN'
859 | char from[LDAP_IPADDRLEN];
| ^~~~~~~~~~~~~~
../../include/ldap_pvt.h:181:25: note: each undeclared identifier is reported
only once for each function it appears in
181 | #define LDAP_IPADDRLEN (MAXPATHLEN + sizeof("PATH="))
| ^~~~~~~~~~
request.c:859:17: note: in expansion of macro 'LDAP_IPADDRLEN'
859 | char from[LDAP_IPADDRLEN];
| ^~~~~~~~~~~~~~
Makefile:435: recipe for target 'request.lo' failed
make[2]: *** [request.lo] Error 1
This is not the same as ITS#9648. I have pulled latest master and the patch for
that one does not solve it.
GNU/Hurd actually does not have a MAXPATHLEN constant at all; paths are
expected to be dynamically allocated. See:
https://www.gnu.org/software/hurd/hurd/porting/guidelines.html#PATH_MAX_tt_…
This is a low priority issue for me personally. I'm just filing it for
tracking. I'm hoping someone from the GNU/Hurd community might be able to work
on a patch.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=6949
--- Comment #7 from Ondřej Kuzník <ondra(a)mistotebe.net> ---
It seems this is limited to slapd main.c so a standalone lloadd keeps the
original logging configuration/code/format. Maybe the logging code could move
to a separate file so it can be shared between the two.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9655
Issue ID: 9655
Summary: Expose the SNI hostname to olcAccess
Product: OpenLDAP
Version: 2.5.4
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: dpa-openldap(a)aegee.org
Target Milestone: ---
Since OpenLDAP now supports SNI, it apparently knows to which Host the client
has connected, when the server is reachable under many names.
• Expose the negotiated hostname to oclAccess and provide example how to limit
the namingContext on the root DSE based on the requested host
Rationale: HTTP servers offer the concept of virtual domains, where they serve
different content behind the same IP, based on the Host: header. I want to
offer public, anonymous LDAP access, but the returned results shall be
completely different, and depend on the contacted host. The statements in the
<WHO> field peername=<peername>, sockname=<sockname>, domain=<domain>, and
sockurl=<sockurl> are evaluated only based on the contacting system (do not
depend on the requested domain). (Maybe the “contacting sockurl” can do this,
but this is not very clear from the documentation). So they serve similar
purpose, but ignore SNI.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9654
Issue ID: 9654
Summary: Allow using both Elliptic curves and RSA certificate
Product: OpenLDAP
Version: 2.5.4
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: dpa-openldap(a)aegee.org
Target Milestone: ---
sendmail and Cyrus IMAP allow to set two TLS server certificates -one RSA and
EC. When the client supports Elliptic curves, the smaller EC certificate is
used. Likewise it accepts two private keys, in case the private key is not
included in the certificate file. In sendmail and Cyrus IMAP, two certificates
are set in the same directive, separated with comma:
define(`confSERVER_CERT', `/etc/zzz/fullchain.pem,/etc/zzz/fullchain_ec.pem')
define(`confSERVER_KEY', `/etc/zzz/privkey.pem,/etc/zzz/privkey_ec.pem')
In Cyrus IMAP the code dealing with this for OpenSSL is at
https://github.com/cyrusimap/cyrus-imapd/blob/master/imap/tls.c#L453 : cf1/kf1
is the fist public/private key, cf2/kf2 are the second.
In sendmail the code is in sendmail/tls.c:inittls() - it calls
SSL_CTX_use_PrivateKey_file twice - once with keyfile and once with kf2
(keyfile 2).
• Extend OpenLDAP to accept several certificates (RSA/EC) - either per
permitting several (comma separated) values in
olcTLSCertificateFile/olcTLSCertificateKeyFile , or by allowing several
occurrences of the property.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9587
Issue ID: 9587
Summary: Admin guide: Need example partial replication
configuration
Product: OpenLDAP
Version: 2.5.5
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: documentation
Assignee: bugs(a)openldap.org
Reporter: quanah(a)openldap.org
Target Milestone: ---
The admin guide states:
Syncrepl supports partial, sparse, and fractional replications
but there are no example configurations for partial replication to draw from.
This needs to be added to the guide.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9156
--- Comment #13 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
Commits:
• c4d399c2
by Quanah Gibson-Mount at 2021-08-26T15:43:24+00:00
ITS#9156 - Remove ppolicy.schema from README
Also remove nadf.schema, that got removed some time long ago
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8862
--- Comment #7 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
(In reply to Quanah Gibson-Mount from comment #6)
> (In reply to dpa-openldap(a)aegee.org from comment #5)
> > For me “as large a value as possible…” sounds without “a” better.
>
> Then it would no longer be grammatically correct.
>
> "as large a value as possible" is correct.
An alternative way to phrase it would be
"as large of a value as possible", but both are correct statements.
"as large value as possible" is not a correct statement in any form in this
context.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8862
--- Comment #6 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
(In reply to dpa-openldap(a)aegee.org from comment #5)
> For me “as large a value as possible…” sounds without “a” better.
Then it would no longer be grammatically correct.
"as large a value as possible" is correct.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8862
--- Comment #5 from dpa-openldap(a)aegee.org <dpa-openldap(a)aegee.org> ---
For me “as large a value as possible…” sounds without “a” better.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8862
--- Comment #4 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
(In reply to dpa-openldap(a)aegee.org from comment #3)
> How about this sentence:
>
> > It is important to set this to as large a value as possible…
What about it? It's a correct statement.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=8862
--- Comment #3 from dpa-openldap(a)aegee.org <dpa-openldap(a)aegee.org> ---
How about this sentence:
> It is important to set this to as large a value as possible…
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=6949
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |mhardin(a)symas.com
--- Comment #6 from Quanah Gibson-Mount <quanah(a)openldap.org> ---
*** Issue 9492 has been marked as a duplicate of this issue. ***
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=6097
Quanah Gibson-Mount <quanah(a)openldap.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
See Also| |https://bugs.openldap.org/s
| |how_bug.cgi?id=9647
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=6097
--- Comment #4 from Ondřej Kuzník <ondra(a)mistotebe.net> ---
So testing confirms the systems converge right now, extremely noisily (the add
or delete fails, we go into refresh, etc.) but things settle in the right way
(the parent is removed (made into glue) and the child remains. There are
situation where is fails but those are bugs (to be) filed separately.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9628
Issue ID: 9628
Summary: Incorrect handling of c_n_ops_executing counter when
using an asynchronous backend (back-asyncmeta)
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: nivanova(a)symas.com
Target Milestone: ---
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9611
Issue ID: 9611
Summary: no structural objectclass in configuration table
Product: OpenLDAP
Version: 2.5.5
Hardware: x86_64
OS: Linux
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: jb00356987(a)techmahindra.com
Target Milestone: ---
Dears,
When I tried to start sldap 2.5.5 I get following error :
60eff599.06749e9d 0x7fb62750f740 <<< dnNormalize: <cn=manager,cn=config>
60eff599.0674bad5 0x7fb62750f740 <= str2entry(cn=module{0}) -> 0x1193828
60eff599.06752650 0x7fb62750f740 : config_add_internal:
DN="cn=module{0},cn=config" no structural objectClass in configuration table
60eff599.06753c3c 0x7fb62750f740 config error processing
cn=module{0},cn=config:
60eff599.0675a8bc 0x7fb62750f740 send_ldap_result: conn=-1 op=0 p=0
60eff599.067611e4 0x7fb62750f740 build-corp-M1 destroy: freeing system
resources.
60eff599.06767673 0x7fb62750f740 slapd stopped.
60eff599.06770970 0x7fb62750f740 connections_destroy: nothing to destroy.
I don't understand why I get it as I'm able to run slapd 2.4.59 with same
config/DB.
Can you advice ?
Thx,
J-L.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9569
Issue ID: 9569
Summary: objectClass Violation with lastbind and delta-syncrepl
Product: OpenLDAP
Version: 2.4.58
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: slapd
Assignee: bugs(a)openldap.org
Reporter: gnoe(a)symas.com
Target Milestone: ---
If olcLastBind is set to true in a delta-syncrepl environment, slapd fails to
add auditModify entries for lastbind to the accesslog due to an objectClass
violation. The auditModify object lacks the required reqMod attributes. The
lastbind module is not in use. The ppolicy overlay is also in use. It shows in
the slapd log as:
Jun 03 13:05:34 l-02992-d5a slapd[18715]:
Entry(reqStart=20210603170529.000262Z,cn=accesslog): object class 'auditModify'
requires attribute 'reqMod'
Jun 03 13:05:34 l-02992-d5a slapd[18715]: accesslog_response: got result 0x41
adding log entry reqStart=20210603170529.000262Z,cn=accesslog
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9625
Issue ID: 9625
Summary: ppolicy: spamming log
Product: OpenLDAP
Version: 2.5.6
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: overlays
Assignee: bugs(a)openldap.org
Reporter: quanah(a)openldap.org
Target Milestone: ---
Noticed on a few recent deployments that ppolicy is spamming the logs with:
ppolicy_bind: Setting warning for password expiry <DN> = 0 second
on every bind. Haven't noticed this in the past but the code has been like
this since 2004.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9624
Issue ID: 9624
Summary: Issues in client state tracking
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: lloadd
Assignee: bugs(a)openldap.org
Reporter: ondra(a)mistotebe.net
Target Milestone: ---
There are two places that don't track client state (BINDING/OPEN) correctly:
- handle_one_request() reads c_state/c_io_state without holding the appropriate
mutex
- operation_unlink_client() assumes that if state is BINDING, the operation
we're just unlinking is a bind request. However the client could have sent
another operation without waiting for the bind response, we shouldn't touch
state when disposing of those
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9549
Issue ID: 9549
Summary: ldapvc needs a man page
Product: OpenLDAP
Version: 2.5.4
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: documentation
Assignee: bugs(a)openldap.org
Reporter: ryan(a)openldap.org
Target Milestone: ---
The ldapvc tool was added in 2.5, but there is no man page for it yet.
I've opened this as a separate ITS, rather than append to ITS#9284, because
ldapvc is not in contrib and is always installed.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9443
Issue ID: 9443
Summary: Admin guide: Need section on lloadd and load balancer
as slapd module
Product: OpenLDAP
Version: 2.5
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: blocker
Priority: ---
Component: documentation
Assignee: bugs(a)openldap.org
Reporter: quanah(a)openldap.org
Target Milestone: ---
The admin guide currently has no documentation on the new lloadd daemon or the
ability to set up the load balancer as a module inside of slapd. This is a
release requirement.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9637
Issue ID: 9637
Summary: back-mdb idlexp max is 30, not 31
Product: OpenLDAP
Version: 2.5.6
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: backends
Assignee: bugs(a)openldap.org
Reporter: hyc(a)openldap.org
Target Milestone: ---
Even so, it's ridiculous to use 2 billion slot IDLs (16GB each) unless you have
hundreds of GB of RAM.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9630
Issue ID: 9630
Summary: back-sql leaves db transaction open after a bind or
search operation
Product: OpenLDAP
Version: 2.4.58
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: backends
Assignee: bugs(a)openldap.org
Reporter: aapo.romu(a)eficode.com
Target Milestone: ---
Created attachment 833
--> https://bugs.openldap.org/attachment.cgi?id=833&action=edit
Close transactions after bind or search operation
back-sql leaves db transaction open after a bind or search operation. This
prevents ie. PostgreSQL to perform VACUUM operations and seems also contribute
to decreased performance.
--
You are receiving this mail because:
You are on the CC list for the issue.
https://bugs.openldap.org/show_bug.cgi?id=9621
Issue ID: 9621
Summary: back-mdb multival NULL matchingrule crash
Product: OpenLDAP
Version: unspecified
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: normal
Priority: ---
Component: backends
Assignee: bugs(a)openldap.org
Reporter: hyc(a)openldap.org
Target Milestone: ---
When configured for multival, back-mdb may crash if the attribute schema has no
equality matching rule.
--
You are receiving this mail because:
You are on the CC list for the issue.