quanah@zimbra.com writes:
h.b.furuseth@usit.uio.no wrote:
A packet level log of both client and server of the same failed session would be useful, then we could compare what the peers think has been sent.
Right. I already have what the server thinks, he sent that yesterday. ;) Now I need to know what ldapmodify thinks, so I can compare.
Might not be possible to compare different sessions meaningfully, even if the LDAP part is the same - since the sessions are wrapped in TLS and SASL. The problem becomes visible at SASL level, not LDAP level.