Full_Name: Chad Richards
Version: 2.4.15
OS: CentOS 5.2
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (12.178.116.129)
overlay chain
chain-rebind-as-user FALSE
chain-uri "ldap://XXX"
chain-rebind-as-user TRUE
chain-idassert-bind
bindmethod="simple"
binddn="cn=Manager,dc=XXX,dc=com"
credentials="secret"
mode="self"
starttls=critical
tls_reqcert=never
tls_cacertdir=/etc/openldap/cacerts
chain-tls start
chain-return-error TRUE
slapo-chain and TLS work fine connecting to the slave with LUMA, I can do
password updates and everything is fine. At first TLS slapo-chain wouldn't work
in LUMA until I added starttls=critical inside chain-idassert-bind
Now the problem I'm having is that I cannot do a passwd as root or an ldap user
from the shell prompt.
ldap.conf
ssl start_tls
tls_reqcert never
tls_checkpeer no
tls_cacertdir /etc/openldap/cacerts
Master log file when slapo-chain runs
---------------
TLS trace: SSL_accept:before/accept initialization
TLS trace: SSL_accept:SSLv3 read client hello A
TLS trace: SSL_accept:SSLv3 write server hello A
TLS trace: SSL_accept:SSLv3 write certificate A
TLS trace: SSL_accept:SSLv3 write server done A
TLS trace: SSL_accept:SSLv3 flush data
TLS trace: SSL_accept:error in SSLv3 read client certificate A
TLS trace: SSL_accept:error in SSLv3 read client certificate A
connection_get(18): got connid=6
connection_read(18): checking for input on id=6
TLS trace: SSL3 alert read:fatal:unknown CA
TLS trace: SSL_accept:failed in SSLv3 read client certificate A
TLS: can't accept: error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert
unknown ca.
connection_read(18): TLS accept failure error=-1 id=6, closing
connection_close: conn=6 sd=18
Slave log file when slapo-chain runs
-----------------
TLS trace: SSL_connect:before/connect initialization
TLS trace: SSL_connect:SSLv2/v3 write client hello A
TLS trace: SSL_connect:SSLv3 read server hello A
TLS certificate verification: depth: 1, err: 19, subject:
/C=US/ST=XX/O=XX/OU=XX/CN=XX/emailAddress=XX, issuer:
/C=US/ST=XX/O=XX/OU=XX/CN=XX/emailAddress=XX
TLS certificate verification: Error, self signed certificate in certificate
chain
TLS trace: SSL3 alert write:fatal:unknown CA
TLS trace: SSL_connect:error in SSLv3 read server certificate B
TLS trace: SSL_connect:error in SSLv3 read server certificate B
TLS: can't connect: error:14090086:SSL
routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed.
I had the same problem with LUMA and that problem went away when I put the
starttls=critical in the chain-idassert-bind
my ldap.conf works fine for everything else but just dies on passwd with TLS
errors with slapo-chain.
Any ideas?
Thanks!
Full_Name: Chad Richards
Version: 2.4.15
OS: CentOS 5.2
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (12.178.116.129)
overlay chain
chain-rebind-as-user FALSE
chain-uri "ldap://XXX"
chain-rebind-as-user TRUE
chain-idassert-bind
bindmethod="simple"
binddn="cn=Manager,dc=XXX,dc=com"
credentials="secret"
mode="self"
starttls=critical
tls_reqcert=never
tls_cacertdir=/etc/openldap/cacerts
chain-tls start
chain-return-error TRUE
slapo-chain and TLS work fine connecting to the slave with LUMA, I can do
password updates and everything is fine. At first TLS slapo-chain wouldn't work
in LUMA until I added starttls=critical inside chain-idassert-bind
Now the problem I'm having is that I cannot do a passwd as root or an ldap user
from the shell prompt.
ldap.conf
ssl start_tls
tls_reqcert never
tls_checkpeer no
tls_cacertdir /etc/openldap/cacerts
Master log file when slapo-chain runs
---------------
TLS trace: SSL_accept:before/accept initialization
TLS trace: SSL_accept:SSLv3 read client hello A
TLS trace: SSL_accept:SSLv3 write server hello A
TLS trace: SSL_accept:SSLv3 write certificate A
TLS trace: SSL_accept:SSLv3 write server done A
TLS trace: SSL_accept:SSLv3 flush data
TLS trace: SSL_accept:error in SSLv3 read client certificate A
TLS trace: SSL_accept:error in SSLv3 read client certificate A
connection_get(18): got connid=6
connection_read(18): checking for input on id=6
TLS trace: SSL3 alert read:fatal:unknown CA
TLS trace: SSL_accept:failed in SSLv3 read client certificate A
TLS: can't accept: error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert
unknown ca.
connection_read(18): TLS accept failure error=-1 id=6, closing
connection_close: conn=6 sd=18
Slave log file when slapo-chain runs
-----------------
TLS trace: SSL_connect:before/connect initialization
TLS trace: SSL_connect:SSLv2/v3 write client hello A
TLS trace: SSL_connect:SSLv3 read server hello A
TLS certificate verification: depth: 1, err: 19, subject:
/C=US/ST=XX/O=XX/OU=XX/CN=XX/emailAddress=XX, issuer:
/C=US/ST=XX/O=XX/OU=XX/CN=XX/emailAddress=XX
TLS certificate verification: Error, self signed certificate in certificate
chain
TLS trace: SSL3 alert write:fatal:unknown CA
TLS trace: SSL_connect:error in SSLv3 read server certificate B
TLS trace: SSL_connect:error in SSLv3 read server certificate B
TLS: can't connect: error:14090086:SSL
routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed.
I had the same problem with LUMA and that problem went away when I put the
starttls=critical in the chain-idassert-bind
my ldap.conf works fine for everything else but just dies on passwd with TLS
errors with slapo-chain.
Any ideas?
Thanks!
Full_Name: Chad Richards
Version: 2.4.15
OS: CentOS 5.2
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (12.178.116.129)
overlay chain
chain-rebind-as-user FALSE
chain-uri "ldap://XXX"
chain-rebind-as-user TRUE
chain-idassert-bind
bindmethod="simple"
binddn="cn=Manager,dc=XXX,dc=com"
credentials="secret"
mode="self"
starttls=critical
tls_reqcert=never
tls_cacertdir=/etc/openldap/cacerts
chain-tls start
chain-return-error TRUE
slapo-chain and TLS work fine connecting to the slave with LUMA, I can do
password updates and everything is fine. At first TLS slapo-chain wouldn't work
in LUMA until I added starttls=critical inside chain-idassert-bind
Now the problem I'm having is that I cannot do a passwd as root or an ldap user
from the shell prompt.
ldap.conf
ssl start_tls
tls_reqcert never
tls_checkpeer no
tls_cacertdir /etc/openldap/cacerts
Master log file when slapo-chain runs
---------------
TLS trace: SSL_accept:before/accept initialization
TLS trace: SSL_accept:SSLv3 read client hello A
TLS trace: SSL_accept:SSLv3 write server hello A
TLS trace: SSL_accept:SSLv3 write certificate A
TLS trace: SSL_accept:SSLv3 write server done A
TLS trace: SSL_accept:SSLv3 flush data
TLS trace: SSL_accept:error in SSLv3 read client certificate A
TLS trace: SSL_accept:error in SSLv3 read client certificate A
connection_get(18): got connid=6
connection_read(18): checking for input on id=6
TLS trace: SSL3 alert read:fatal:unknown CA
TLS trace: SSL_accept:failed in SSLv3 read client certificate A
TLS: can't accept: error:14094418:SSL routines:SSL3_READ_BYTES:tlsv1 alert
unknown ca.
connection_read(18): TLS accept failure error=-1 id=6, closing
connection_close: conn=6 sd=18
Slave log file when slapo-chain runs
-----------------
TLS trace: SSL_connect:before/connect initialization
TLS trace: SSL_connect:SSLv2/v3 write client hello A
TLS trace: SSL_connect:SSLv3 read server hello A
TLS certificate verification: depth: 1, err: 19, subject:
/C=US/ST=XX/O=XX/OU=XX/CN=XX/emailAddress=XX, issuer:
/C=US/ST=XX/O=XX/OU=XX/CN=XX/emailAddress=XX
TLS certificate verification: Error, self signed certificate in certificate
chain
TLS trace: SSL3 alert write:fatal:unknown CA
TLS trace: SSL_connect:error in SSLv3 read server certificate B
TLS trace: SSL_connect:error in SSLv3 read server certificate B
TLS: can't connect: error:14090086:SSL
routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed.
I had the same problem with LUMA and that problem went away when I put the
starttls=critical in the chain-idassert-bind
my ldap.conf works fine for everything else but just dies on passwd with TLS
errors with slapo-chain.
Any ideas?
Thanks!
Full_Name: Mathias Gug
Version: 2.4.15
OS: Ubuntu Linux (Jaunty - 9.04)
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (64.56.226.136)
Starting with GnuTLS 2.6.3, V1 CA certs are no longer trusted by default when a
CA chain is checked. Thus libldap+gnutls breaks in existing environement when
one of the CA certs uses a V1 certificate. However libldap+openssl still
supports V1 certificates in the CA chain.
See https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/305264 for more
information.
Could libldap+gnutls be updated to also support V1 CA certificates to match
features provided by libldap+openssl?
To reproduce:
0. Need two versions of openldap : one compiled with gnutls, the other with
openssl.
1. Create a V1 CA.
2. Create a certificate to be used by slapd and sign it with the V1 CA.
3. Configure a slapd+openssl system with certificates issues above.
4. Try to connect to the slapd+openssl system with a libldap+gnutls client:
mathiaz@t-slapd-gnutls:~$ ldapsearch -b "dc=vmnet" -D "cn=admin,dc=vmnet" -x -w
mypwd -H ldaps://t-slapd-openssl./ -d 1
ldap_url_parse_ext(ldaps://t-slapd-openssl./)
ldap_create
ldap_url_parse_ext(ldaps://t-slapd-openssl.:636/??base)
ldap_sasl_bind
ldap_send_initial_request
ldap_new_connection 1 1 0
ldap_int_open_connection
ldap_connect_to_host: TCP t-slapd-openssl.:636
ldap_new_socket: 3
ldap_prepare_socket: 3
ldap_connect_to_host: Trying 172.19.42.220:636
ldap_pvt_connect: fd: 3 tm: -1 async: 0
TLS: peer cert untrusted or revoked (0x82)
TLS: can't connect: (unknown error code).
ldap_err2string
ldap_sasl_bind(SIMPLE): Can't contact LDAP server (-1)
On a system with libldap+openssl:
mathiaz@t-slapd-openssl:~$ ldapsearch -b "dc=vmnet" -D "cn=admin,dc=vmnet" -x -w
mypwd -H ldaps://t-slapd-openssl./
# extended LDIF
#
# LDAPv3
# base <dc=vmnet> with scope subtree
# filter: (objectclass=*)
# requesting: ALL
#
# vmnet
dn: dc=vmnet
objectClass: top
objectClass: dcObject
objectClass: organization
o: vmnet
dc: vmnet
# admin, vmnet
dn: cn=admin,dc=vmnet
objectClass: simpleSecurityObject
objectClass: organizationalRole
cn: admin
description: LDAP administrator
userPassword:: e2NyeXB0fWtlVHlnV1lleFBDWFU=
# search result
search: 2
result: 0 Success
# numResponses: 3
# numEntries: 2
$
ldapsearch is able to connect to the slapd+openssl server.
crispy(a)cluenet.org wrote:
> Full_Name: Chris Breneman
> Version: 2.4.15
> OS: Debian Lenny
> URL:
> Submission from: (NULL) (207.38.203.80)
>
>
> Using this configuration on a replication consumer, it segfaults almost
> immediately, and on startup.
> === ./slapd.d/cn=config/olcDatabase={0}config.ldif ===
> dn: olcDatabase={0}config
> objectClass: olcDatabaseConfig
> olcDatabase: {0}config
> olcAccess: {0}to * by * none
> olcAddContentAcl: TRUE
> olcLastMod: TRUE
> olcMaxDerefDepth: 15
> olcReadOnly: FALSE
> olcRootDN: cn=config
> olcRootPW:: XXXXXXXXXXX
> olcMonitoring: FALSE
> structuralObjectClass: olcDatabaseConfig
> entryUUID: 410b0970-9d47-102d-8854-57b95f7e164c
> creatorsName: cn=config
> createTimestamp: 20090304203158Z
> olcSyncrepl: {0}rid=3 provider=ldap://ldap.cluenet.org type=refreshAndPersist
> interval=00:00:01:00 retry="60 10 300 +" searchbase="cn=schema,cn=config" bin
> dmethod=simple binddn="cn=replicator,dc=cluenet,dc=org" credentials="xxxxxxxx
> xxxxxxxxx" starttls=critical tls_cacert=/etc/ssl/certs/Cluenet.pem tls_reqcer
> t=demand
> olcSyncrepl: {1}rid=4 provider=ldap://ldap.cluenet.org type=refreshAndPersist
> interval=00:00:01:00 retry="60 10 300 +" searchbase="olcDatabase={0}config,cn
> =config" attrs=olcAccess bindmethod=simple binddn="cn=replicator,dc=cluenet,d
> c=org" credentials="xxxxxxxxxxxxxxxxx" starttls=critical tls_cacert=/etc/ssl/
> certs/Cluenet.pem tls_reqcert=demand
> entryCSN: 20090304203402.651594Z#000000#000#000000
> modifiersName: cn=config
> modifyTimestamp: 20090304203402Z
This replication config is not currently supported. Fractional replication
means the consumer gets a subset of the provider's attributes. But it also
means that the consumer can *only* have that subset. Here, cn=config needs all
of its attributes in order to function, but the consumer code will attempt to
delete the non-replicated ones because they aren't part of the info received
from the provider.
--
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
quanah(a)OpenLDAP.org wrote:
> Full_Name: Quanah Gibson-Mount
> Version: RE24/HEAD
> OS: NA
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (75.111.29.239)
>
>
> In the slapd-ldap man page, the section on idassert-bind is missing the fact
> that you can configure:
>
> starttls=no|yes|critical
>
> while listing all the other tls related keywords you can configure.
tls_protocol_min is missing as well. Also, I note the values of
starttls should be changed from "no,yes,critical" to "no,try,yes" (with
"critical" synonym of "yes"), to remove the false security perception
given by the current semantics of "yes".
The change would create minor backward compatibility issues, but no
security concern, since the meaning of "yes" would be promoted from
optional to required. Incautious users that still use "yes" would just
need to change it to "try" to restore the previous unsafe behavior.
p.
Ing. Pierangelo Masarati
OpenLDAP Core Team
SysNet s.r.l.
via Dossi, 8 - 27100 Pavia - ITALIA
http://www.sys-net.it
-----------------------------------
Office: +39 02 23998309
Mobile: +39 333 4963172
Fax: +39 0382 476497
Email: ando(a)sys-net.it
-----------------------------------
Full_Name: Quanah Gibson-Mount
Version: RE24/HEAD
OS: NA
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (75.111.29.239)
In the slapd-ldap man page, the section on idassert-bind is missing the fact
that you can configure:
starttls=no|yes|critical
while listing all the other tls related keywords you can configure.
Thanks for your help.
Would you be able to email your Makefile that you generated for gcc
4.0.3 on Solaris/SPARC?
I am seriously missing something. I installed lated Sun Studio 12 and
compiled with it and it's the same problem.
/M.
On Tue, Mar 3, 2009 at 2:49 PM, <hyc(a)symas.com> wrote:
> mariusp44(a)gmail.com wrote:
>> as I have pointed out in earlier post not only it doesn't work when I
>> compile it myself but also the one that was downloaded form
>> sunfreeware.com. It is not possible to tell what version of gcc was
>> used to compile openldap that is distributed but explanation that it
>> doesn't work because of compiler bug seems to me highly unlikely.
>> Unless you can specifically point to which bug in gcc on SPARC
>> contributes to this erratic behaviour of openldap.
>
> It's not our responsibility to do your legwork for you. You can easily email
> the maintainers at sunfreeware.com and ask them. Since they currently host gcc
> 3.4.6 on their site it's a safe bet they're still using gcc 3.4.x overall.
>
> Fyi, I have just now built the 2.4.15 source using gcc 4.0.3 on SPARC/Solaris
> and all of the hash mechanisms work fine. I don't have a gcc 3.x build handy
> on my system, nor do I see any reason to install a known-bad compiler just to
> further demonstrate what has already been plainly documented by other folks.
>>
>> Either way, thanks for comments.
>>
>> /M.
>>
>> On Mon, Mar 2, 2009 at 5:56 PM,<hyc(a)symas.com> Â wrote:
>>> ando(a)sys-net.it wrote:
>>>> mariusp44(a)gmail.com wrote:
>>>>> I have just compiled and tested 2.4.15 and result is same: cleartext,
>>>>> md5 and sha works, smd5, ssha and crypt doesn't.
>>>>>
>>>>> Solaris 10 SPARC latest, gcc 3.4.3, Berkeley DB 4.7.25, opessl 0.9.8j.
>>>> I have no chance to test on that arch. Â You should figure our why those
>>>> hashes are not supported. Â Did you enable crypt (--enable-crypt)?
>>> gcc 3.4.3 was released November 4 2004 http://gcc.gnu.org/gcc-3.4/
>>>
>>> and is known to have many bugs. It's also already known that old gcc releases
>>> have other problems on Sparc. (E.g. ITS#5875.)
>>>
>>> Please use a working compiler.
>>>
>>> As a workaround, recompile the offending functions with optimization disabled.
>>> That usually helps in cases like this.
>>>
>>> There is no bug in OpenLDAP Software here, this ITS will be closed.
>>>
>>> --
>>> Â Â -- Howard Chu
>>> Â Â CTO, Symas Corp. Â Â Â Â Â http://www.symas.com
>>>   Director, Highland Sun   http://highlandsun.com/hyc/
>>> Â Â Chief Architect, OpenLDAP Â http://www.openldap.org/project/
>>>
>>>
>>>
>>
>>
>>
>
>
> --
> Â -- Howard Chu
> Â CTO, Symas Corp. Â Â Â Â Â http://www.symas.com
>  Director, Highland Sun   http://highlandsun.com/hyc/
> Â Chief Architect, OpenLDAP Â http://www.openldap.org/project/
>
>
>
mariusp44(a)gmail.com wrote:
> as I have pointed out in earlier post not only it doesn't work when I
> compile it myself but also the one that was downloaded form
> sunfreeware.com. It is not possible to tell what version of gcc was
> used to compile openldap that is distributed but explanation that it
> doesn't work because of compiler bug seems to me highly unlikely.
> Unless you can specifically point to which bug in gcc on SPARC
> contributes to this erratic behaviour of openldap.
It's not our responsibility to do your legwork for you. You can easily email
the maintainers at sunfreeware.com and ask them. Since they currently host gcc
3.4.6 on their site it's a safe bet they're still using gcc 3.4.x overall.
Fyi, I have just now built the 2.4.15 source using gcc 4.0.3 on SPARC/Solaris
and all of the hash mechanisms work fine. I don't have a gcc 3.x build handy
on my system, nor do I see any reason to install a known-bad compiler just to
further demonstrate what has already been plainly documented by other folks.
>
> Either way, thanks for comments.
>
> /M.
>
> On Mon, Mar 2, 2009 at 5:56 PM,<hyc(a)symas.com> wrote:
>> ando(a)sys-net.it wrote:
>>> mariusp44(a)gmail.com wrote:
>>>> I have just compiled and tested 2.4.15 and result is same: cleartext,
>>>> md5 and sha works, smd5, ssha and crypt doesn't.
>>>>
>>>> Solaris 10 SPARC latest, gcc 3.4.3, Berkeley DB 4.7.25, opessl 0.9.8j.
>>> I have no chance to test on that arch. You should figure our why those
>>> hashes are not supported. Did you enable crypt (--enable-crypt)?
>> gcc 3.4.3 was released November 4 2004 http://gcc.gnu.org/gcc-3.4/
>>
>> and is known to have many bugs. It's also already known that old gcc releases
>> have other problems on Sparc. (E.g. ITS#5875.)
>>
>> Please use a working compiler.
>>
>> As a workaround, recompile the offending functions with optimization disabled.
>> That usually helps in cases like this.
>>
>> There is no bug in OpenLDAP Software here, this ITS will be closed.
>>
>> --
>> -- Howard Chu
>> CTO, Symas Corp. http://www.symas.com
>> Director, Highland Sun http://highlandsun.com/hyc/
>> Chief Architect, OpenLDAP http://www.openldap.org/project/
>>
>>
>>
>
>
>
--
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
mhardin(a)symas.com wrote:
> Thank you for looking into this. The new configuration does not rely
> on loopbacks and instead uses back-glue. We are also running 2.4.14
> with additional patches.
Though it might quickly lead to unnecessary and excessive code
duplication, I wonder whether a proxy backend couldn't just detect it
would call self, and use an internal operation instead?
p.
Ing. Pierangelo Masarati
OpenLDAP Core Team
SysNet s.r.l.
via Dossi, 8 - 27100 Pavia - ITALIA
http://www.sys-net.it
-----------------------------------
Office: +39 02 23998309
Mobile: +39 333 4963172
Fax: +39 0382 476497
Email: ando(a)sys-net.it
-----------------------------------
Thank you for looking into this. The new configuration does not rely
on loopbacks and instead uses back-glue. We are also running 2.4.14
with additional patches.
Cheers,
-Matt
On Mar 3, 2009, at 10:46 AM, Howard Chu wrote:
> mhardin(a)symas.com wrote:
>> Full_Name: Matthew Hardin
>> Version: 2.4.12
>> OS: Red Hat Enterprise Linux 4 i686
>> URL: ftp://ftp.openldap.org/incoming/
>> Submission from: (NULL) (74.38.114.185)
>>
>>
>> Hi All,
>>
>> We are using a pair of OpenLDAP 2.4.12 servers with back-meta to
>> proxy an active
>> directory domain. The clients are all current versions of PADL's
>> nss_ldap
>> libraries.
>>
>> Every once in a while (sometimes twice a day, sometimes once every
>> two weeks)
>> one of the slapd servers will peg CPU use at 100% and stop
>> answering requests.
>> The only way to stop slapd is with a kill -9.
>>
>> There doesn't seem to be anything to explain the lockup or allow us
>> to reproduce
>> it. We are using redundant AD servers and they are not going
>> offline. A third
>> slapd server running as a test server using the same AD servers and
>> configured
>> identically but serving a much lighter nss_ldap load does not fail
>> at all. We
>> have ruled out hardware, OS, and connectivity as possible causes.
>>
>> We are unfortunately unable to attach gdb to the running processes,
>> as these are
>> production servers and need to be restarted immediately. Our
>> smaller test system
>> does not exhibit the same behavior, either. There is nothing
>> unusual in the
>> server logs, either. We do have core files generated from kill -6
>> commands, and
>> they are all eerily similar to the back-trace below in that they
>> have one or
>> more threads waiting for a search or a bind response from AD.
>>
>> I am also enclosing relevant portions of slapd.conf for these
>> systems. Please
>> let me know if any additional information would be useful.
>>
>> Thanks,
>>
>> -Matt
>>
>> -----
>>
>>
>> (gdb) thr apply all bt
>
>> Thread 1 (process 29769):
>> #0 0x005fa410 in __kernel_vsyscall ()
>> #1 0x004ddd10 in raise () from /lib/libc.so.6
>> #2 0x004df621 in abort () from /lib/libc.so.6
>> #3 0x004d715b in __assert_fail () from /lib/libc.so.6
>> #4 0x0806eec8 in slap_listener (sl=0x9583108)
>> at /home/build/sol-2_4_12-1-nonopt/sol24/ldap24/servers/slapd/
>> daemon.c:1803
>> #5 0x0806f643 in slap_listener_thread (ctx=0x4e92220, ptr=0x9583108)
>> at /home/build/sol-2_4_12-1-nonopt/sol24/ldap24/servers/slapd/
>> daemon.c:1997
>> #6 0x00a10783 in ldap_int_thread_pool_wrapper (xpool=0x959a010)
>> at /home/build/sol-2_4_12-1-nonopt/sol24/ldap24/libraries/
>> libldap_r/tpool.c:663
>> #7 0x0038a45b in start_thread () from /lib/libpthread.so.0
>> #8 0x00585c4e in clone () from /lib/libc.so.6
>> (gdb)
>
> It seems you sent the wrong backtrace; this one doesn't show any
> signs of looping or anything that would indicate heavy CPU usage. It
> shows an assert which would kill the process, leading to 0% CPU
> usage. This assert was most likely fixed in 2.4.14.
>
>> slapd.conf
>
>> #######################################################################
>> # bdb database definitions
>> #######################################################################
>> database bdb
>> suffix "ou=nisdata"
>
>> #######################################################################
>> # Definitions for proxy and cache to AD
>> #######################################################################
>> database meta
>> suffix "dc=my-customer,dc=com"
>
>> # The link to AD:
>> uri ldaps://ldap-prd-dc01.my-customer.com/dc=ad,dc=my-
>> customer,dc=com
>> ldaps://ldap-prd-dc02.my-customer.com/
>
>> # The link to the NIS data directory (yes, we could chain/glue,
>> that's
>> # for later)
>> uri ldapi://%2fvar%2fsymas%2frun%2fldapi/dc=nis,dc=my-
>> customer,dc=com
>
> Pointing back-meta at its own slapd will inevitably exhaust the
> thread pool since incoming operations will always use 2x the number
> of available threads.
>
> This ITS will be closed.
> --
> -- Howard Chu
> CTO, Symas Corp. http://www.symas.com
> Director, Highland Sun http://highlandsun.com/hyc/
> Chief Architect, OpenLDAP http://www.openldap.org/project/
as I have pointed out in earlier post not only it doesn't work when I
compile it myself but also the one that was downloaded form
sunfreeware.com. It is not possible to tell what version of gcc was
used to compile openldap that is distributed but explanation that it
doesn't work because of compiler bug seems to me highly unlikely.
Unless you can specifically point to which bug in gcc on SPARC
contributes to this erratic behaviour of openldap.
Either way, thanks for comments.
/M.
On Mon, Mar 2, 2009 at 5:56 PM, <hyc(a)symas.com> wrote:
> ando(a)sys-net.it wrote:
>> mariusp44(a)gmail.com wrote:
>>> I have just compiled and tested 2.4.15 and result is same: cleartext,
>>> md5 and sha works, smd5, ssha and crypt doesn't.
>>>
>>> Solaris 10 SPARC latest, gcc 3.4.3, Berkeley DB 4.7.25, opessl 0.9.8j.
>>
>> I have no chance to test on that arch. Â You should figure our why those
>> hashes are not supported. Â Did you enable crypt (--enable-crypt)?
>
> gcc 3.4.3 was released November 4 2004 http://gcc.gnu.org/gcc-3.4/
>
> and is known to have many bugs. It's also already known that old gcc releases
> have other problems on Sparc. (E.g. ITS#5875.)
>
> Please use a working compiler.
>
> As a workaround, recompile the offending functions with optimization disabled.
> That usually helps in cases like this.
>
> There is no bug in OpenLDAP Software here, this ITS will be closed.
>
> --
> Â -- Howard Chu
> Â CTO, Symas Corp. Â Â Â Â Â http://www.symas.com
>  Director, Highland Sun   http://highlandsun.com/hyc/
> Â Chief Architect, OpenLDAP Â http://www.openldap.org/project/
>
>
>
mhardin(a)symas.com wrote:
> Full_Name: Matthew Hardin
> Version: 2.4.12
> OS: Red Hat Enterprise Linux 4 i686
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (74.38.114.185)
>
>
> Hi All,
>
> We are using a pair of OpenLDAP 2.4.12 servers with back-meta to proxy an active
> directory domain. The clients are all current versions of PADL's nss_ldap
> libraries.
>
> Every once in a while (sometimes twice a day, sometimes once every two weeks)
> one of the slapd servers will peg CPU use at 100% and stop answering requests.
> The only way to stop slapd is with a kill -9.
>
> There doesn't seem to be anything to explain the lockup or allow us to reproduce
> it. We are using redundant AD servers and they are not going offline. A third
> slapd server running as a test server using the same AD servers and configured
> identically but serving a much lighter nss_ldap load does not fail at all. We
> have ruled out hardware, OS, and connectivity as possible causes.
>
> We are unfortunately unable to attach gdb to the running processes, as these are
> production servers and need to be restarted immediately. Our smaller test system
> does not exhibit the same behavior, either. There is nothing unusual in the
> server logs, either. We do have core files generated from kill -6 commands, and
> they are all eerily similar to the back-trace below in that they have one or
> more threads waiting for a search or a bind response from AD.
>
> I am also enclosing relevant portions of slapd.conf for these systems. Please
> let me know if any additional information would be useful.
>
> Thanks,
>
> -Matt
>
> -----
>
>
> (gdb) thr apply all bt
> Thread 1 (process 29769):
> #0 0x005fa410 in __kernel_vsyscall ()
> #1 0x004ddd10 in raise () from /lib/libc.so.6
> #2 0x004df621 in abort () from /lib/libc.so.6
> #3 0x004d715b in __assert_fail () from /lib/libc.so.6
> #4 0x0806eec8 in slap_listener (sl=0x9583108)
> at /home/build/sol-2_4_12-1-nonopt/sol24/ldap24/servers/slapd/daemon.c:1803
> #5 0x0806f643 in slap_listener_thread (ctx=0x4e92220, ptr=0x9583108)
> at /home/build/sol-2_4_12-1-nonopt/sol24/ldap24/servers/slapd/daemon.c:1997
> #6 0x00a10783 in ldap_int_thread_pool_wrapper (xpool=0x959a010)
> at /home/build/sol-2_4_12-1-nonopt/sol24/ldap24/libraries/libldap_r/tpool.c:663
> #7 0x0038a45b in start_thread () from /lib/libpthread.so.0
> #8 0x00585c4e in clone () from /lib/libc.so.6
> (gdb)
It seems you sent the wrong backtrace; this one doesn't show any signs of
looping or anything that would indicate heavy CPU usage. It shows an assert
which would kill the process, leading to 0% CPU usage. This assert was most
likely fixed in 2.4.14.
> slapd.conf
> #######################################################################
> # bdb database definitions
> #######################################################################
> database bdb
> suffix "ou=nisdata"
> #######################################################################
> # Definitions for proxy and cache to AD
> #######################################################################
> database meta
> suffix "dc=my-customer,dc=com"
> # The link to AD:
> uri ldaps://ldap-prd-dc01.my-customer.com/dc=ad,dc=my-customer,dc=com
> ldaps://ldap-prd-dc02.my-customer.com/
> # The link to the NIS data directory (yes, we could chain/glue, that's
> # for later)
> uri ldapi://%2fvar%2fsymas%2frun%2fldapi/dc=nis,dc=my-customer,dc=com
Pointing back-meta at its own slapd will inevitably exhaust the thread pool
since incoming operations will always use 2x the number of available threads.
This ITS will be closed.
--
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
hyc(a)symas.com wrote:
> ando(a)sys-net.it wrote:
>> ando(a)sys-net.it wrote:
>>
>>> Probably a side-effect of fixing ITS#5853:
>> This seems to be unrelated from ITS#5853, actually.
>
> Fixed now in HEAD
Thanks. I did not realize I was trying an exceptional configuration.
>> Another note: if a search reference is received, it is returned by
>> libldap and additionally it is chased, so one gets both the search
>> reference and the chased search reference results.
>
> 2.3 does this as well, seems to be intentional.
I tested the scenario I described in a previous mail, and nothing weird
showed up. I might have screwed up something?
p.
Ing. Pierangelo Masarati
OpenLDAP Core Team
SysNet s.r.l.
via Dossi, 8 - 27100 Pavia - ITALIA
http://www.sys-net.it
-----------------------------------
Office: +39 02 23998309
Mobile: +39 333 4963172
Fax: +39 0382 476497
Email: ando(a)sys-net.it
-----------------------------------
ando(a)sys-net.it wrote:
> ando(a)sys-net.it wrote:
>
>> Probably a side-effect of fixing ITS#5853:
>
> This seems to be unrelated from ITS#5853, actually.
Fixed now in HEAD
> Another note: if a search reference is received, it is returned by
> libldap and additionally it is chased, so one gets both the search
> reference and the chased search reference results.
2.3 does this as well, seems to be intentional.
--
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
Pierangelo Masarati wrote:
> hyc(a)symas.com wrote:
>> ando(a)sys-net.it wrote:
>>> Full_Name: Pierangelo Masarati
>>> Version: HEAD/re24
>>> OS: irrelevant
>>> URL: ftp://ftp.openldap.org/incoming/
>>> Submission from: (NULL) (82.63.140.131)
>>> Submitted by: ando
>>>
>>>
>>> Probably a side-effect of fixing ITS#5853: when setting LDAP_OPT_REFERRALS,
>>> libldap automatically chases any referrals, but at the end returns a response
>>> with ld_errno set to 10 and ld_matched set to the portion of DN that was matched
>>> in the initial request. This is because the corresponding fields in the parent
>>> request are not cleared when the referral is successfully chased. I'm trying to
>>> fix this, but it's not clear to me when success should be detected: at
>>> successful referral chasing request submission, I guess?
>> When does this behavior? It doesn't show up in e.g. test009...
>
> If you have a subordinate reference in server1 that points to server2
> and you search server1 using the DN of the subordinate reference. What
> I do is:
>
> - fire test003
>
> - create a slapd.2.conf with suffix "ou=Other,dc=example,dc=com"
>
> - populate server1 with
>
> dn: ou=Other,dc=example,dc=com
> objectClass: referral
> objectClass: extensibleObject
> ou: Other
> ref: ldap://:9012/ou=Other,dc=example,dc=com
>
> - populate server2 with
>
> dn: ou=Other,dc=example,dc=com
> objectClass: organizationalUnit
> ou: Other
>
> dn: cn=Foo Bar,ou=Other,dc=example,dc=com
> objectClass: device
> cn: Foo Bar
>
> - search server1 for "ou=Other,dc=example,dc=com"
According to libldap/request.c this test is invalid; find_connection will not
match URLs with empty hostname. That code has been like that for several
years. Perhaps the test for empty hostname should be dropped, but in real
deployments a referral to localhost doesn't make a lot of sense anyway.
>
> Apparently, test009 is only testing the superior reference. test016
> tests subordinate references, but without even trying -C. I think the
> test should be modified to be run once without and once with -C in order
> to test the library's behavior. I believe automatic referral chasing
> should be deprecated, but I fear there are tons of code out there that
> rely on it.
--
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
hyc(a)symas.com wrote:
> ando(a)sys-net.it wrote:
>> Full_Name: Pierangelo Masarati
>> Version: HEAD/re24
>> OS: irrelevant
>> URL: ftp://ftp.openldap.org/incoming/
>> Submission from: (NULL) (82.63.140.131)
>> Submitted by: ando
>>
>>
>> Probably a side-effect of fixing ITS#5853: when setting LDAP_OPT_REFERRALS,
>> libldap automatically chases any referrals, but at the end returns a response
>> with ld_errno set to 10 and ld_matched set to the portion of DN that was matched
>> in the initial request. This is because the corresponding fields in the parent
>> request are not cleared when the referral is successfully chased. I'm trying to
>> fix this, but it's not clear to me when success should be detected: at
>> successful referral chasing request submission, I guess?
>
> When does this behavior? It doesn't show up in e.g. test009...
If you have a subordinate reference in server1 that points to server2
and you search server1 using the DN of the subordinate reference. What
I do is:
- fire test003
- create a slapd.2.conf with suffix "ou=Other,dc=example,dc=com"
- populate server1 with
dn: ou=Other,dc=example,dc=com
objectClass: referral
objectClass: extensibleObject
ou: Other
ref: ldap://:9012/ou=Other,dc=example,dc=com
- populate server2 with
dn: ou=Other,dc=example,dc=com
objectClass: organizationalUnit
ou: Other
dn: cn=Foo Bar,ou=Other,dc=example,dc=com
objectClass: device
cn: Foo Bar
- search server1 for "ou=Other,dc=example,dc=com"
Apparently, test009 is only testing the superior reference. test016
tests subordinate references, but without even trying -C. I think the
test should be modified to be run once without and once with -C in order
to test the library's behavior. I believe automatic referral chasing
should be deprecated, but I fear there are tons of code out there that
rely on it.
p.
Ing. Pierangelo Masarati
OpenLDAP Core Team
SysNet s.r.l.
via Dossi, 8 - 27100 Pavia - ITALIA
http://www.sys-net.it
-----------------------------------
Office: +39 02 23998309
Mobile: +39 333 4963172
Fax: +39 0382 476497
Email: ando(a)sys-net.it
-----------------------------------
Full_Name: Adrien Futschik
Version: 2.4.15
OS: Linux RHEL 4-5 & Solaris 10
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (192.54.193.59)
Hello,
As suggested by Howard Chu, I am filling an ITS for a problem I encountered when
testing N-way multimaster with OpenLDAP 2.4.15.
Here is the situation :
I have been testing n-way multimaster replication with OpenLDAP for a while
now (from 2.4.11, to 2.4.15) and just when I though that everything was
working perfectly, I dicided to test N-way multimaster not only with 2 masters
on different servers, but with 4 ! (all 4 servers are time-synced using NTP)
2 OpenLDAP instances per server.
I have been configuring syncprov and syncrepl accordingly :
olcServerID: 1 ldap://163.106.38.90:9011/
olcServerID: 2 ldap://163.106.38.92:9012/
olcServerID: 3 ldap://163.106.38.90:9013/
olcServerID: 4 ldap://163.106.38.92:9014/
olcSyncrepl: {0}rid=011 provider=ldap://163.106.38.90:9011/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {1}rid=012 provider=ldap://163.106.38.92:9012/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {2}rid=013 provider=ldap://163.106.38.90:9013/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {3}rid=014 provider=ldap://163.106.38.92:9014/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
I am starting with all instances synced and I am trying to add entries en all
four instances (in //). If I do so, I have a few entries that are not
replicated on the others. I am getting this kind of messages :
do_syncrep2:
cookie=rid=011,sid=002,csn=20090227130003.849482Z#000000#004#000000
do_syncrep2: rid=011 CSN too old, ignoring
20090227130003.849482Z#000000#004#000000
do_syncrep2:
cookie=rid=013,sid=002,csn=20090227130003.849482Z#000000#004#000000
do_syncrep2: rid=013 CSN too old, ignoring
20090227130003.849482Z#000000#004#000000
do_syncrep2:
cookie=rid=014,sid=002,csn=20090227130003.946474Z#000000#004#000000
Did someone face the same issue ?
Here is my configuration : (I am using refreshAndPersist mode for both cn=config
and olcDatabase={1}bdb)
M1 on IP1 / PORT1 :
dn: cn=config
objectClass: olcGlobal
cn: config
structuralObjectClass: olcGlobal
creatorsName: cn=config
olcServerID: 1 ldap://163.106.38.90:9011/
olcServerID: 2 ldap://163.106.38.92:9012/
olcServerID: 3 ldap://163.106.38.90:9013/
olcServerID: 4 ldap://163.106.38.92:9014/
entryUUID: ef89c876-adb3-4dc7-aa7d-024bbc359c98
createTimestamp: 20090227085748Z
entryCSN: 20090227085749.920499Z#000000#004#000000
modifiersName: cn=config
modifyTimestamp: 20090227085749Z
contextCSN: 20090227085752.833630Z#000000#001#000000
dn: olcDatabase={1}bdb
objectClass: olcDatabaseConfig
objectClass: olcBdbConfig
olcDatabase: {1}bdb
olcDbDirectory: ./openldap-data
olcSuffix: c=fr
olcRootDN: cn=admin,c=fr
olcRootPW:: e1NTSEF9WVZNSHJtYTRvUGd4KzFoak9kYWhBcm5NVHJxU1Zmdno=
olcSizeLimit: 100
olcSyncrepl: {0}rid=011 provider=ldap://163.106.38.90:9011/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {1}rid=012 provider=ldap://163.106.38.92:9012/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {2}rid=013 provider=ldap://163.106.38.90:9013/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {3}rid=014 provider=ldap://163.106.38.92:9014/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcTimeLimit: 600
olcMirrorMode: TRUE
olcDbCacheSize: 2000
olcDbCheckpoint: 2000 10
olcDbIndex: default pres,eq
olcDbIndex: cn,sn pres,eq,sub
olcDbIndex: objectClass,entryCSN,entryUUID eq
structuralObjectClass: olcBdbConfig
entryUUID: 00c01e5d-69ee-4baa-8e5a-4ef609dfd958
creatorsName: cn=config
createTimestamp: 20090227085752Z
entryCSN: 20090227085752.729899Z#000000#001#000000
modifiersName: cn=config
modifyTimestamp: 20090227085752Z
M2 on IP2 / PORT2 :
dn: cn=config
objectClass: olcGlobal
cn: config
structuralObjectClass: olcGlobal
entryUUID: 8da75037-65e6-4375-8c21-7e5c0194a60b
creatorsName: cn=config
createTimestamp: 20090227085723Z
olcServerID: 1 ldap://163.106.38.90:9011/
olcServerID: 2 ldap://163.106.38.92:9012/
olcServerID: 3 ldap://163.106.38.90:9013/
olcServerID: 4 ldap://163.106.38.92:9014/
entryCSN: 20090227085725.003182Z#000000#002#000000
modifiersName: cn=config
modifyTimestamp: 20090227085725Z
contextCSN: 20090227085752.833630Z#000000#001#000000
dn: olcDatabase={1}bdb
objectClass: olcDatabaseConfig
objectClass: olcBdbConfig
olcDatabase: {1}bdb
olcDbDirectory: ./openldap-data
olcSuffix: c=fr
olcRootDN: cn=admin,c=fr
olcRootPW:: e1NTSEF9WVZNSHJtYTRvUGd4KzFoak9kYWhBcm5NVHJxU1Zmdno=
olcSizeLimit: 100
olcSyncrepl: {0}rid=011 provider=ldap://163.106.38.90:9011/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {1}rid=012 provider=ldap://163.106.38.92:9012/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {2}rid=013 provider=ldap://163.106.38.90:9013/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {3}rid=014 provider=ldap://163.106.38.92:9014/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcTimeLimit: 600
olcMirrorMode: TRUE
olcDbCacheSize: 2000
olcDbCheckpoint: 2000 10
olcDbIndex: default pres,eq
olcDbIndex: cn,sn pres,eq,sub
olcDbIndex: objectClass,entryCSN,entryUUID eq
structuralObjectClass: olcBdbConfig
entryUUID: 00c01e5d-69ee-4baa-8e5a-4ef609dfd958
creatorsName: cn=config
createTimestamp: 20090227085752Z
entryCSN: 20090227085752.729899Z#000000#001#000000
modifiersName: cn=config
modifyTimestamp: 20090227085752Z
M3 on IP1 / PORT3 :
dn: cn=config
objectClass: olcGlobal
cn: config
structuralObjectClass: olcGlobal
entryUUID: cf068647-318f-4848-9c72-9c7745a8a4b3
creatorsName: cn=config
createTimestamp: 20090227085742Z
olcServerID: 1 ldap://163.106.38.90:9011/
olcServerID: 2 ldap://163.106.38.92:9012/
olcServerID: 3 ldap://163.106.38.90:9013/
olcServerID: 4 ldap://163.106.38.92:9014/
entryCSN: 20090227085743.825685Z#000000#003#000000
modifiersName: cn=config
modifyTimestamp: 20090227085743Z
contextCSN: 20090227085752.833630Z#000000#001#000000
dn: olcDatabase={1}bdb
objectClass: olcDatabaseConfig
objectClass: olcBdbConfig
olcDatabase: {1}bdb
olcDbDirectory: ./openldap-data
olcSuffix: c=fr
olcRootDN: cn=admin,c=fr
olcRootPW:: e1NTSEF9WVZNSHJtYTRvUGd4KzFoak9kYWhBcm5NVHJxU1Zmdno=
olcSizeLimit: 100
olcSyncrepl: {0}rid=011 provider=ldap://163.106.38.90:9011/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {1}rid=012 provider=ldap://163.106.38.92:9012/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {2}rid=013 provider=ldap://163.106.38.90:9013/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {3}rid=014 provider=ldap://163.106.38.92:9014/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcTimeLimit: 600
olcMirrorMode: TRUE
olcDbCacheSize: 2000
olcDbCheckpoint: 2000 10
olcDbIndex: default pres,eq
olcDbIndex: cn,sn pres,eq,sub
olcDbIndex: objectClass,entryCSN,entryUUID eq
structuralObjectClass: olcBdbConfig
entryUUID: 00c01e5d-69ee-4baa-8e5a-4ef609dfd958
creatorsName: cn=config
createTimestamp: 20090227085752Z
entryCSN: 20090227085752.729899Z#000000#001#000000
modifiersName: cn=config
modifyTimestamp: 20090227085752Z
M4 on IP2 / PORT4 :
dn: cn=config
objectClass: olcGlobal
cn: config
structuralObjectClass: olcGlobal
entryUUID: ef89c876-adb3-4dc7-aa7d-024bbc359c98
creatorsName: cn=config
createTimestamp: 20090227085748Z
olcServerID: 1 ldap://163.106.38.90:9011/
olcServerID: 2 ldap://163.106.38.92:9012/
olcServerID: 3 ldap://163.106.38.90:9013/
olcServerID: 4 ldap://163.106.38.92:9014/
entryCSN: 20090227085749.920499Z#000000#004#000000
modifiersName: cn=config
modifyTimestamp: 20090227085749Z
contextCSN: 20090227085752.833630Z#000000#001#000000
dn: olcDatabase={1}bdb
objectClass: olcDatabaseConfig
objectClass: olcBdbConfig
olcDatabase: {1}bdb
olcDbDirectory: ./openldap-data
olcSuffix: c=fr
olcRootDN: cn=admin,c=fr
olcRootPW:: e1NTSEF9WVZNSHJtYTRvUGd4KzFoak9kYWhBcm5NVHJxU1Zmdno=
olcSizeLimit: 100
olcSyncrepl: {0}rid=011 provider=ldap://163.106.38.90:9011/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {1}rid=012 provider=ldap://163.106.38.92:9012/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {2}rid=013 provider=ldap://163.106.38.90:9013/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcSyncrepl: {3}rid=014 provider=ldap://163.106.38.92:9014/ binddn="cn=admin,c
 =fr" bindmethod=simple credentials=secret searchbase="c=fr" type=refreshAndPe
 rsist retry="5 5 300 12 3600 +" timeout=3
olcTimeLimit: 600
olcMirrorMode: TRUE
olcDbCacheSize: 2000
olcDbCheckpoint: 2000 10
olcDbIndex: default pres,eq
olcDbIndex: cn,sn pres,eq,sub
olcDbIndex: objectClass,entryCSN,entryUUID eq
structuralObjectClass: olcBdbConfig
entryUUID: 00c01e5d-69ee-4baa-8e5a-4ef609dfd958
creatorsName: cn=config
createTimestamp: 20090227085752Z
entryCSN: 20090227085752.729899Z#000000#001#000000
modifiersName: cn=config
modifyTimestamp: 20090227085752Z
Considering that M1 & M3 are on the same server and therefore have exactly the
same time, if this was a time related problem, I shouldn't get any "CSN too
old" messages between M1&M3 and M2&M4, should I ?
I have also noticed that when M1 gets a new entry and passes it to M2&M3&M4,
when M2&M3&M4 receive it, they also pass it to M2&M3&M4 ! I don't understand
why this appends but it look's very much like this is what's happening,
because sometimes, M2 would have passed-it to M4, before M4 has actually
received the add order from M1.
I therefore happen to notice that sometimes, entries send from M1 are
received in the wrong order by other masters and therefore some entries may
be skipped !!!
Here is a example :
I add cn=M1client1 & cn=M1client2 on M1,
M1client1 & M1client2 are successfully replicated on M2&M4 but on M3, only
M1client2 is inserted and I am getting an "CSN too old" message for M1client1
on M3.
I guess that M2 or M4 are not managing there queues in the right order. I don't
exactly understand why M2&M3&M4 should propagate en entry sent by M1, because
they will eventually receive the entry sent by M1.
Adrien Futschik
ando(a)sys-net.it wrote:
> Full_Name: Pierangelo Masarati
> Version: HEAD/re24
> OS: irrelevant
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (82.63.140.131)
> Submitted by: ando
>
>
> Probably a side-effect of fixing ITS#5853: when setting LDAP_OPT_REFERRALS,
> libldap automatically chases any referrals, but at the end returns a response
> with ld_errno set to 10 and ld_matched set to the portion of DN that was matched
> in the initial request. This is because the corresponding fields in the parent
> request are not cleared when the referral is successfully chased. I'm trying to
> fix this, but it's not clear to me when success should be detected: at
> successful referral chasing request submission, I guess?
When does this behavior? It doesn't show up in e.g. test009...
--
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
Pierangelo Masarati wrote:
> Howard Chu wrote:
>> ando(a)sys-net.it wrote:
>>> ando(a)sys-net.it wrote:
>>>
>>>> Probably a side-effect of fixing ITS#5853:
>>> This seems to be unrelated from ITS#5853, actually.
>> Have you found the same behavior in earlier releases?
>
> 2.3 is OK.
> 2.4.11,15 are affected.
No relevant diff in libldap from 2.4.7 to .11. But quite a lot of changes in
result.c from 2.4.1ALPHA to 2.4.7...
--
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
Full_Name:
Version: 2.4.15
OS: ubuntu
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (82.6.103.253)
I've had a number of issues getting replications working, I noticed that my
multi-homed server was trying to replicate to itself. however I was pointed to
http://www.openldap.org/its/index.cgi/?findid=5942
If the documentation could state when setting up replication that slap -H $URI
needs to match all other references, even to the point where it has to match
port, ie
ldap://ldap01 != ldap://ldap01:389
making everything match has fixed a lot of my problems.
ando(a)sys-net.it wrote:
> mariusp44(a)gmail.com wrote:
>> I have just compiled and tested 2.4.15 and result is same: cleartext,
>> md5 and sha works, smd5, ssha and crypt doesn't.
>>
>> Solaris 10 SPARC latest, gcc 3.4.3, Berkeley DB 4.7.25, opessl 0.9.8j.
>
> I have no chance to test on that arch. You should figure our why those
> hashes are not supported. Did you enable crypt (--enable-crypt)?
gcc 3.4.3 was released November 4 2004 http://gcc.gnu.org/gcc-3.4/
and is known to have many bugs. It's also already known that old gcc releases
have other problems on Sparc. (E.g. ITS#5875.)
Please use a working compiler.
As a workaround, recompile the offending functions with optimization disabled.
That usually helps in cases like this.
There is no bug in OpenLDAP Software here, this ITS will be closed.
--
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/