I've been working with current CVS OpenLDAP and the memberof plugin, for
Samba4 integration.
Following your suggestion, I'm trying to load multiple memberof
instances, but the syntax doesn't seem to work for me. Attached is how
I'm currently configuring the overlay. It causes this when loading:
overlay_config(): overlay "memberof" already in list
overlay_config(): overlay "memberof" already in list
...
It also only appears to work for the first entry (happily that is
member/memberof, and this seems to have worked).
Is the syntax I'm using correct, or does the module need to be reworked
for this operation?
Finally, I'm wondering if the error returns can be adjusted:
When I add invalid member to a group, OpenLDAP returns
LDAP_CONSTRAINT_VIOLATION <adding non-existing object as group member>,
but AD returns error 32, LDAP_NO_SUCH_OBJECT for this situation. Would
it be reasonable to change this, or could it be made configurable.
Having the LDAP server give me the error the client expects would avoid
the need for a translation layer. (it might be nobody ever looks at
this, but I don't like to make that assumption).
Thanks,
Andrew Bartlett
--
Andrew Bartlett http://samba.org/~abartlet/
Authentication Developer, Samba Team http://samba.org
Samba Developer, Red Hat Inc. http://redhat.com
Occasionally, I need to modify an already set value, which needs
de-allocation. This right now seems to require a call to
ldap_pvt_thread_pool_getkey() to get the old value first, followed by a
call to ldap_pvt_thread_pool_setkey(). This requires running twice
through the list of keys (not much a hassle, but not a clean interface
either). I see two options:
1) let ldap_pvt_thread_pool_setkey() call the free handler, if defined,
passing the old value if not null
2) change the API of ldap_pvt_thread_pool_setkey() so that it returns
the old value, if passed a non-null pointer to hold it.
Option 2 is more intrusive (requires multiple changes to existing code)
but possibly more versatile.
Comments?
p.
Ing. Pierangelo Masarati
OpenLDAP Core Team
SysNet s.r.l.
via Dossi, 8 - 27100 Pavia - ITALIA
http://www.sys-net.it
---------------------------------------
Office: +39 02 23998309
Mobile: +39 333 4963172
Email: pierangelo.masarati(a)sys-net.it
---------------------------------------
One of the things that often concerned me is that we have socket calls and
references to errno in liblber, which is built as non-threaded code, but
"errno" changes on many platforms in a threaded process. I was thinking that
we should move the actual network I/O drivers out of liblber and into libldap,
so that they'll be compiled correctly (with libldap_r) for their actual
runtime environment.
Not that I can point to any specific platform where this has been a problem.
Just thinking out loud.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
hyc(a)OpenLDAP.org wrote:
> Update of /repo/OpenLDAP/pkg/ldap/doc/man/man5
>
> Modified Files:
> slapd-bdb.5 1.38 -> 1.39
>
> Log Message:
> Support DB encryption
When this topic was first raised, I thought it was pretty useless:
http://www.openldap.org/lists/openldap-software/200202/msg00232.html
And in general, it's not even a necessary feature:
http://www.openldap.org/lists/openldap-devel/200211/msg00045.html
But it seems to be a checklist feature these days.
It may actually provide some value to sites that do regular backups of their
raw DB files. It may actually be useful in some cases where you provide an
encryption key on separate removable media (e.g. a USB flash drive). It might
actually prevent a news article down the road on how some organization lost
their 5 million record customer database and now all that unprotected data is
now being exploited by criminals.
I doubt it, of course. It exacts a performance penalty on every DB operation,
so I don't think anyone will be able to use this long-term. For the off-site
backup scenario, it makes more sense to just encrypt the backup images (tar
format or whatever backup utility is used). That way you only spend cycles on
encryption once, at backup time. Any site that's savvy enough to do automated
backups can certainly figure out how to protect those backups with encryption.
But the question comes up from time to time, why we don't offer this feature
in the DB itself, and sometimes it's easier to just say "ok" than try to
educate people. (In fact we did a custom build of OpenLDAP for a bank a few
years ago, that requested this feature from us. They didn't even care about
the key management, the key was just a 96 character string hardcoded into the
back-bdb patch. The current patch in CVS is obviously a little better than that.)
So anyway, if you're wondering, no, I still think it's a dumb solution. It's
here as a marketing gimmick, for feature list checkboxes, not for any
technical merit.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
hyc(a)OpenLDAP.org writes:
> url.c 1.104 -> 1.105
> Better fix to prev commit
Actually the code was OK with not calling hex_escape_len() when there is
a port number; it's only ldapi URLs which are escaped in desc2str().
Good call with IPv6 "[]" though. I guess it's time to walk through
desc2str_len() and check that it matches desc2str().
--
Hallvard
hallvard(a)OpenLDAP.org wrote:
> Update of /repo/OpenLDAP/pkg/ldap/libraries/libldap
>
> Modified Files:
> url.c 1.103 -> 1.104
>
> Log Message:
> Declare enough buffer space for out-of-range URL port numbers
It would have been better simply to never accept out-of-range port numbers.
lud_port should have been an unsigned short instead of int. Or just test for
the correct range on assignment and return an error as necessary.
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
ITS#4467 seems to have gone nowhere. Whether or not any patches have been
committed for it isn't obvious because it hasn't been updated since it was
submitted. There's no evidence that this ITS has any impact. Either it's been
fixed, or it's not a problem.
#4591 seems to have aged a bit too.
Can we close these?
--
-- Howard Chu
Chief Architect, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
Dear All,
I'm going to pull the ACL stuff out of the config sections and have a
dedicated chapter.
Any objections?
Thanks.
--
Kind Regards,
Gavin Henry.
Managing Director.
T +44 (0) 1224 279484
M +44 (0) 7930 323266
F +44 (0) 1224 824887
E ghenry(a)suretecsystems.com
Open Source. Open Solutions(tm).
http://www.suretecsystems.com/