Hi,
I am trying to set up a syncrepl consumer. I have done this a number of
times without any problem.
The consumer seems to be connecting via TLS to the producer and
authenticating but the consumer directory never gets populated.
Here is the log from the producer:
Nov 22 19:19:57 anubis slapd[24088]: slap_listener_activate(7):
Nov 22 19:19:57 anubis slapd[24088]: >>> slap_listener(ldap://)
Nov 22 19:19:57 anubis slapd[24088]: conn=1026 fd=15 ACCEPT from
IP=172.20.150.141:38831 (IP=0.0.0.0:389)
Nov 22 19:19:57 anubis slapd[24088]: connection_get(15)
Nov 22 19:19:57 anubis slapd[24088]: connection_get(15): got connid=1026
Nov 22 19:19:57 anubis slapd[24088]: connection_read(15): checking for
input on id=1026
Nov 22 19:19:57 anubis slapd[24088]: op tag 0x77, time 1290471597
Nov 22 19:19:57 anubis slapd[24088]: conn=1026 op=0 do_extended
Nov 22 19:19:57 anubis slapd[24088]: conn=1026 op=0 EXT
oid=1.3.6.1.4.1.1466.20037
Nov 22 19:19:57 anubis slapd[24088]: do_extended: oid=1.3.6.1.4.1.1466.20037
Nov 22 19:19:57 anubis slapd[24088]: conn=1026 op=0 STARTTLS
Nov 22 19:19:57 anubis slapd[24088]: send_ldap_extended: err=0 oid= len=0
Nov 22 19:19:57 anubis slapd[24088]: send_ldap_response: msgid=1 tag=120
err=0
Nov 22 19:19:57 anubis slapd[24088]: conn=1026 op=0 RESULT oid= err=0 text=
Nov 22 19:19:58 anubis slapd[24088]: connection_get(15)
Nov 22 19:19:58 anubis slapd[24088]: connection_get(15): got connid=1026
Nov 22 19:19:58 anubis slapd[24088]: connection_read(15): checking for
input on id=1026
Nov 22 19:19:58 anubis slapd[24088]: connection_get(15)
Nov 22 19:19:58 anubis slapd[24088]: connection_get(15): got connid=1026
Nov 22 19:19:58 anubis slapd[24088]: connection_read(15): checking for
input on id=1026
Nov 22 19:19:58 anubis slapd[24088]: connection_read(15): unable to get
TLS client DN, error=49 id=1026
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 fd=15 TLS established
tls_ssf=256 ssf=256
Nov 22 19:19:58 anubis slapd[24088]: connection_get(15)
Nov 22 19:19:58 anubis slapd[24088]: connection_get(15): got connid=1026
Nov 22 19:19:58 anubis slapd[24088]: connection_read(15): checking for
input on id=1026
Nov 22 19:19:58 anubis slapd[24088]: op tag 0x60, time 1290471598
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 op=1 do_bind
Nov 22 19:19:58 anubis slapd[24088]: >>> dnPrettyNormal:
<uid=syncrepl,ou=system,dc=ls,dc=cbn>
Nov 22 19:19:58 anubis slapd[24088]: <<< dnPrettyNormal:
<uid=syncrepl,ou=system,dc=ls,dc=cbn>, <uid=syncrepl,ou=system,dc=ls,dc=cbn>
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 op=1 BIND
dn="uid=syncrepl,ou=system,dc=ls,dc=cbn" method=128
Nov 22 19:19:58 anubis slapd[24088]: do_bind: version=3
dn="uid=syncrepl,ou=system,dc=ls,dc=cbn" method=128
Nov 22 19:19:58 anubis slapd[24088]: ==> hdb_bind: dn:
uid=syncrepl,ou=system,dc=ls,dc=cbn
Nov 22 19:19:58 anubis slapd[24088]:
bdb_dn2entry("uid=syncrepl,ou=system,dc=ls,dc=cbn")
Nov 22 19:19:58 anubis slapd[24088]: => access_allowed: result not in
cache (userPassword)
Nov 22 19:19:58 anubis slapd[24088]: => access_allowed: auth access to
"uid=syncrepl,ou=system,dc=ls,dc=cbn" "userPassword" requested
Nov 22 19:19:58 anubis slapd[24088]: => acl_get: [2] attr userPassword
Nov 22 19:19:58 anubis slapd[24088]: => acl_mask: access to entry
"uid=syncrepl,ou=system,dc=ls,dc=cbn", attr "userPassword" requested
Nov 22 19:19:58 anubis slapd[24088]: => acl_mask: to value by "", (=0)
Nov 22 19:19:58 anubis slapd[24088]: <= check a_dn_pat:
uid=syncrepl,ou=system,dc=ls,dc=cbn
Nov 22 19:19:58 anubis slapd[24088]: <= check a_dn_pat: *
Nov 22 19:19:58 anubis slapd[24088]: <= acl_mask: [2] applying +0 (break)
Nov 22 19:19:58 anubis slapd[24088]: <= acl_mask: [2] mask: =0
Nov 22 19:19:58 anubis slapd[24088]: => acl_get: [3] attr userPassword
Nov 22 19:19:58 anubis slapd[24088]: => acl_mask: access to entry
"uid=syncrepl,ou=system,dc=ls,dc=cbn", attr "userPassword" requested
Nov 22 19:19:58 anubis slapd[24088]: => acl_mask: to value by "", (=0)
Nov 22 19:19:58 anubis slapd[24088]: <= check a_dn_pat: self
Nov 22 19:19:58 anubis slapd[24088]: <= check a_dn_pat: *
Nov 22 19:19:58 anubis slapd[24088]: <= acl_mask: [2] applying auth(=xd)
(stop)
Nov 22 19:19:58 anubis slapd[24088]: <= acl_mask: [2] mask: auth(=xd)
Nov 22 19:19:58 anubis slapd[24088]: => slap_access_allowed: auth access
granted by auth(=xd)
Nov 22 19:19:58 anubis slapd[24088]: => access_allowed: auth access
granted by auth(=xd)
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 op=1 BIND
dn="uid=syncrepl,ou=system,dc=ls,dc=cbn" mech=SIMPLE ssf=0
Nov 22 19:19:58 anubis slapd[24088]: do_bind: v3 bind:
"uid=syncrepl,ou=system,dc=ls,dc=cbn" to
"uid=syncrepl,ou=system,dc=ls,dc=cbn"
Nov 22 19:19:58 anubis slapd[24088]: send_ldap_result: conn=1026 op=1 p=3
Nov 22 19:19:58 anubis slapd[24088]: send_ldap_result: err=0 matched=""
text=""
Nov 22 19:19:58 anubis slapd[24088]: send_ldap_response: msgid=2 tag=97
err=0
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 op=1 RESULT tag=97 err=0
text=
Nov 22 19:19:58 anubis slapd[24088]: connection_get(15)
Nov 22 19:19:58 anubis slapd[24088]: connection_get(15): got connid=1026
Nov 22 19:19:58 anubis slapd[24088]: connection_read(15): checking for
input on id=1026
Nov 22 19:19:58 anubis slapd[24088]: op tag 0x63, time 1290471598
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 op=2 do_search
Nov 22 19:19:58 anubis slapd[24088]: >>> dnPrettyNormal: <dc=ls,dc=cbn>
Nov 22 19:19:58 anubis slapd[24088]: <<< dnPrettyNormal: <dc=ls,dc=cbn>,
<dc=ls,dc=cbn>
Nov 22 19:19:58 anubis slapd[24088]: SRCH "dc=ls,dc=cbn" 2 0
Nov 22 19:19:58 anubis slapd[24088]: 0 0 0
Nov 22 19:19:58 anubis slapd[24088]: filter: (objectClass=*)
Nov 22 19:19:58 anubis slapd[24088]: => get_ctrls
Nov 22 19:19:58 anubis slapd[24088]: => get_ctrls:
oid="1.3.6.1.4.1.4203.1.9.1.1" (noncritical)
Nov 22 19:19:58 anubis slapd[24088]: => get_ctrls:
oid="2.16.840.1.113730.3.4.2" (critical)
Nov 22 19:19:58 anubis slapd[24088]: <= get_ctrls: n=2 rc=0 err=""
Nov 22 19:19:58 anubis slapd[24088]: attrs:
Nov 22 19:19:58 anubis slapd[24088]: *
Nov 22 19:19:58 anubis slapd[24088]: +
Nov 22 19:19:58 anubis slapd[24088]:
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 op=2 SRCH
base="dc=ls,dc=cbn" scope=2 deref=0 filter="(objectClass=*)"
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 op=2 SRCH attr=* +
Nov 22 19:19:58 anubis slapd[24088]: ==> limits_get: conn=1026 op=2
self="uid=syncrepl,ou=system,dc=ls,dc=cbn" this="dc=ls,dc=cbn"
Nov 22 19:19:58 anubis slapd[24088]: <== limits_get: type=DN match=EXACT
dn="uid=syncrepl,ou=system,dc=ls,dc=cbn"
Nov 22 19:19:58 anubis slapd[24088]: send_ldap_result: conn=1026 op=2 p=3
Nov 22 19:19:58 anubis slapd[24088]: send_ldap_result: err=0 matched=""
text=""
Nov 22 19:19:58 anubis slapd[24088]: send_ldap_response: msgid=3 tag=101
err=0
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 op=2 SEARCH RESULT
tag=101 err=0 nentries=0 text=
Nov 22 19:19:58 anubis slapd[24088]: connection_get(15)
Nov 22 19:19:58 anubis slapd[24088]: connection_get(15): got connid=1026
Nov 22 19:19:58 anubis slapd[24088]: connection_read(15): checking for
input on id=1026
Nov 22 19:19:58 anubis slapd[24088]: op tag 0x42, time 1290471598
Nov 22 19:19:58 anubis slapd[24088]: ber_get_next on fd 15 failed
errno=0 (Success)
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 op=3 do_unbind
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 op=3 UNBIND
Nov 22 19:19:58 anubis slapd[24088]: connection_close: conn=1026 sd=15
Nov 22 19:19:58 anubis slapd[24088]: conn=1026 fd=15 closed
Here is the log from the consumer:
Nov 22 18:22:49 mgaauth1 slapd[12587]: daemon: shutdown requested and
initiated.
Nov 22 18:22:49 mgaauth1 slapd[12587]: slapd shutdown: waiting for 0
operations/tasks to finish
Nov 22 18:22:49 mgaauth1 slapd[12587]: slapd shutdown: initiated
Nov 22 18:22:49 mgaauth1 slapd[12587]: ====> bdb_cache_release_all
Nov 22 18:22:49 mgaauth1 slapd[12587]: slapd destroy: freeing system
resources.
Nov 22 18:22:49 mgaauth1 slapd[12587]: syncinfo_free: rid=001
Nov 22 18:22:49 mgaauth1 slapd[12587]: syncinfo_free: rid=002
Nov 22 18:22:49 mgaauth1 slapd[12587]: slapd stopped.
Nov 22 18:22:52 mgaauth1 slapd[12638]: @(#) $OpenLDAP: slapd 2.4.20 (Jun
16 2010 10:21:06) $
abuild@anonymi:/usr/src/packages/BUILD/openldap-2.4.20/servers/slapd
Nov 22 18:22:52 mgaauth1 slapd[12638]: daemon: IPv6 socket() failed
errno=97 (Address family not supported by protocol)
Nov 22 18:22:52 mgaauth1 slapd[12638]: daemon: IPv6 socket() failed
errno=97 (Address family not supported by protocol)
Nov 22 18:22:52 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/cn=schema.ldif"
Nov 22 18:22:52 mgaauth1 slapd[12638]: => str2entry: "dn: cn=schema
objectClass: olcSchemaConfig cn: schema structuralObjectClass:
olcSchemaConfig entryUUID: 1a05f3b8-8ade-102f-8d02-5da984889200
creatorsName: cn=config createTimestamp: 20101122234350Z entryCSN:
20101122234350.437126Z#000000#000#000000 modifiersName: cn=config
modifyTimestamp: 20101122234350Z "
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnPrettyNormal: <cn=schema>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnPrettyNormal: <cn=schema>,
<cn=schema>
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <= str2entry(cn=schema) ->
0x7ff49ab19758
Nov 22 18:22:52 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/cn=schema/cn={0}core.ldif"
Nov 22 18:22:52 mgaauth1 slapd[12638]: => str2entry: "dn: cn={0}core
objectClass: olcSchemaConfig cn: {0}core olcAttributeTypes: {0}( 2.5.4.2
NAME 'knowledgeInformation' DESC 'RFC2256: kno wledge information'
EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121. 1.15{32768} )
olcAttributeTypes: {1}( 2.5.4.4 NAME ( 'sn' 'surname' ) DESC 'RFC2256:
last (f amily) name(s) for which the entity is known by' SUP name )
olcAttributeTypes: {2}( 2.5.4.5 NAME 'serialNumber' DESC 'RFC2256:
serial numb er of the entity' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch S YNTAX 1.3.6.1.4.1.1466.115.121.1.44{64} )
olcAttributeTypes: {3}( 2.5.4.6 NAME ( 'c' 'countryName' ) DESC
'RFC4519: two- letter ISO-3166 country code' SUP name SYNTAX
1.3.6.1.4.1.1466.115.121.1.11 S INGLE-VALUE ) olcAttributeTypes: {4}(
2.5.4.7 NAME ( 'l' 'localityName' ) DESC 'RFC2256: loc ality which this
object resides in' SUP name ) olcAttributeTypes: {5}( 2.5.4.8 NAME (
'st' 'stateOrProvinceName' ) DESC 'RFC2 256: state or province which
this object resides in' SUP name ) olcAttributeTypes: {6}( 2.5.4.9 NAME
( 'street' 'streetAddress' ) DESC 'RFC225 6: street address of this
object' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreS ubstringsMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{128} ) olcAttributeTypes: {7}(
2.5.4.10 NAME ( 'o' 'organizationName' ) DESC 'RFC2256 : organization
this object belongs to' SUP name ) olcAttributeTypes: {8}( 2.5.4.11 NAME
( 'ou' 'organizationalUnitName' ) DESC ' RFC2256: organizational unit
this object belongs to' SUP name ) olcAttributeTypes: {9}( 2.5.4.12 NAME
'title' DESC 'RFC2256: title associated with the entity' SUP name )
olcAttributeTypes: {10}( 2.5.4.14 NAME 'searchGuide' DESC 'RFC2256:
search gui de, deprecated by enhancedSearchGuide' SYNTAX
1.3.6.1.4.1.1466.115.121.1.25 ) olcAttributeTypes: {11}( 2.5.4.15 NAME
'businessCategory' DESC 'RFC2256: busin ess category' EQUALITY
caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTA X
1.3.6.1.4.1.1466.115.121.1.15{128} ) olcAttributeTypes: {12}( 2.5.4.16
NAME 'postalAddress' DESC 'RFC2256: postal a ddress' EQUALITY
caseIgnoreListMatch SUBSTR caseIgnoreListSubstringsMatch SYN TAX
1.3.6.1.4.1.1466.115.121.1.41 ) olcAttributeTypes: {13}( 2.5.4.17 NAME
'postalCode' DESC 'RFC2256: postal code ' EQUALITY caseIgnoreMatch
SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.
1.1466.115.121.1.15{40} ) olcAttributeTypes: {14}( 2.5.4.18 NAME
'postOfficeBox' DESC 'RFC2256: Post Off ice Box' EQUALITY
caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3
.6.1.4.1.1466.115.121.1.15{40} ) olcAttributeTypes: {15}( 2.5.4.19 NAME
'physicalDeliveryOfficeName' DESC 'RFC2 256: Physical Delivery Office
Name' EQUALITY caseIgnoreMatch SUBSTR caseIgnor eSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15{128} ) olcAttributeTypes: {16}( 2.5.4.20
NAME 'telephoneNumber' DESC 'RFC2256: Teleph one Number' EQUALITY
telephoneNumberMatch SUBSTR telephoneNumberSubstringsMat ch SYNTAX
1.3.6.1.4.1.1466.115.121.1.50{32} ) olcAttributeTypes: {17}( 2.5.4.21
NAME 'telexNumber' DESC 'RFC2256: Telex Numb er' SYNTAX
1.3.6.1.4.1.1466.115.121.1.52 ) olcAttributeTypes: {18}( 2.5.4.22 NAME
'teletexTerminalIdentifier' DESC 'RFC22 56: Teletex Terminal
Identifier' SYNTAX 1.3.6.1.4.1.1466.115.121.1.51 ) olcAttributeTypes:
{19}( 2.5.4.23 NAME ( 'facsimileTelephoneNumber' 'fax' ) DE SC
'RFC2256: Facsimile (Fax) Telephone Number' SYNTAX
1.3.6.1.4.1.1466.115.12 1.1.22 ) olcAttributeTypes: {20}( 2.5.4.24 NAME
'x121Address' DESC 'RFC2256: X.121 Addr ess' EQUALITY
numericStringMatch SUBSTR numericStringSubstringsMatch SYNTAX 1
.3.6.1.4.1.1466.115.121.1.36{15} ) olcAttributeTypes: {21}( 2.5.4.25
NAME 'internationaliSDNNumber' DESC 'RFC2256 : international ISDN
number' EQUALITY numericStringMatch SUBSTR numericString
SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.36{16} )
olcAttributeTypes: {22}( 2.5.4.26 NAME 'registeredAddress' DESC
'RFC2256: regi stered postal address' SUP postalAddress SYNTAX
1.3.6.1.4.1.1466.115.121.1.41 ) olcAttributeTypes: {23}( 2.5.4.27 NAME
'destinationIndicator' DESC 'RFC2256: d estination indicator' EQUALITY
caseIgnoreMatch SUBSTR caseIgnoreSubstringsMat ch SYNTAX
1.3.6.1.4.1.1466.115.121.1.44{128} ) olcAttributeTypes: {24}( 2.5.4.28
NAME 'preferredDeliveryMethod' DESC 'RFC2256 : preferred delivery
method' SYNTAX 1.3.6.1.4.1.1466.115.121.1.14 SINGLE-VALU E )
olcAttributeTypes: {25}( 2.5.4.29 NAME 'presentationAddress' DESC
'RFC2256: pr esentation address' EQUALITY presentationAddressMatch
SYNTAX 1.3.6.1.4.1.1466 .115.121.1.43 SINGLE-VALUE ) olcAttributeTypes:
{26}( 2.5.4.30 NAME 'supportedApplicationContext' DESC 'RFC 2256:
supported application context' EQUALITY objectIdentifierMatch SYNTAX 1.
3.6.1.4.1.1466.115.121.1.38 ) olcAttributeTypes: {27}( 2.5.4.31 NAME
'member' DESC 'RFC2256: member of a gro up' SUP distinguishedName )
olcAttributeTypes: {28}( 2.5.4.32 NAME 'owner' DESC 'RFC2256: owner (of
the ob ject)' SUP distinguishedName ) olcAttributeTypes: {29}( 2.5.4.33
NAME 'roleOccupant' DESC 'RFC2256: occupant of role' SUP
distinguishedName ) olcAttributeTypes: {30}( 2.5.4.36 NAME
'userCertificate' DESC 'RFC2256: X.509 user certificate, use ;binary'
EQUALITY certificateExactMatch SYNTAX 1.3.6.1. 4.1.1466.115.121.1.8 )
olcAttributeTypes: {31}( 2.5.4.37 NAME 'cACertificate' DESC 'RFC2256:
X.509 CA certificate, use ;binary' EQUALITY certificateExactMatch
SYNTAX 1.3.6.1.4.1. 1466.115.121.1.8 ) olcAttributeTypes: {32}(
2.5.4.38 NAME 'authorityRevocationList' DESC 'RFC2256 : X.509 authority
revocation list, use ;binary' SYNTAX 1.3.6.1.4.1.1466.115.1 21.1.9 )
olcAttributeTypes: {33}( 2.5.4.39 NAME 'certificateRevocationList' DESC
'RFC22 56: X.509 certificate revocation list, use ;binary' SYNTAX
1.3.6.1.4.1.1466.1 15.121.1.9 ) olcAttributeTypes: {34}( 2.5.4.40 NAME
'crossCertificatePair' DESC 'RFC2256: X .509 cross certificate pair,
use ;binary' SYNTAX 1.3.6.1.4.1.1466.115.121.1.1 0 ) olcAttributeTypes:
{35}( 2.5.4.42 NAME ( 'givenName' 'gn' ) DESC 'RFC2256: fir st name(s)
for which the entity is known by' SUP name ) olcAttributeTypes: {36}(
2.5.4.43 NAME 'initials' DESC 'RFC2256: initials of s ome or all of
names, but not the surname(s).' SUP name ) olcAttributeTypes: {37}(
2.5.4.44 NAME 'generationQualifier' DESC 'RFC2256: na me qualifier
indicating a generation' SUP name ) olcAttributeTypes: {38}( 2.5.4.45
NAME 'x500UniqueIdentifier' DESC 'RFC2256: X .500 unique identifier'
EQUALITY bitStringMatch SYNTAX 1.3.6.1.4.1.1466.115.1 21.1.6 )
olcAttributeTypes: {39}( 2.5.4.46 NAME 'dnQualifier' DESC 'RFC2256: DN
qualifi er' EQUALITY caseIgnoreMatch ORDERING caseIgnoreOrderingMatch
SUBSTR caseIgno reSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.44
) olcAttributeTypes: {40}( 2.5.4.47 NAME 'enhancedSearchGuide' DESC
'RFC2256: en hanced search guide' SYNTAX 1.3.6.1.4.1.1466.115.121.1.21
) olcAttributeTypes: {41}( 2.5.4.48 NAME 'protocolInformation' DESC
'RFC2256: pr otocol information' EQUALITY protocolInformationMatch
SYNTAX 1.3.6.1.4.1.1466 .115.121.1.42 ) olcAttributeTypes: {42}(
2.5.4.50 NAME 'uniqueMember' DESC 'RFC2256: unique me mber of a group'
EQUALITY uniqueMemberMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1 .34 )
olcAttributeTypes: {43}( 2.5.4.51 NAME 'houseIdentifier' DESC 'RFC2256:
house identifier' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{32768}
) olcAttributeTypes: {44}( 2.5.4.52 NAME 'supportedAlgorithms' DESC
'RFC2256: su pported algorithms' SYNTAX 1.3.6.1.4.1.1466.115.121.1.49 )
olcAttributeTypes: {45}( 2.5.4.53 NAME 'deltaRevocationList' DESC
'RFC2256: de lta revocation list; use ;binary' SYNTAX
1.3.6.1.4.1.1466.115.121.1.9 ) olcAttributeTypes: {46}( 2.5.4.54 NAME
'dmdName' DESC 'RFC2256: name of DMD' S UP name ) olcAttributeTypes:
{47}( 2.5.4.65 NAME 'pseudonym' DESC 'X.520(4th): pseudonym for the
object' SUP name ) olcAttributeTypes: {48}( 0.9.2342.19200300.100.1.3
NAME ( 'mail' 'rfc822Mailbo x' ) DESC 'RFC1274: RFC822 Mailbox'
EQUALITY caseIgnoreIA5Match SUBSTR ca seIgnoreIA5SubstringsMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256} ) olcAttributeTypes: {49}( 0.9.234
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnPrettyNormal: <cn={0}core>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnPrettyNormal: <cn={0}core>,
<cn={0}core>
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <= str2entry(cn={0}core) ->
0x7ff49ab19758
Nov 22 18:22:52 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/cn=schema/cn={1}cosine.ldif"
Nov 22 18:22:52 mgaauth1 slapd[12638]: => str2entry: "dn: cn={1}cosine
objectClass: olcSchemaConfig cn: {1}cosine olcAttributeTypes: {0}(
0.9.2342.19200300.100.1.2 NAME 'textEncodedORAddress' EQUALITY
caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.
1466.115.121.1.15{256} ) olcAttributeTypes: {1}(
0.9.2342.19200300.100.1.4 NAME 'info' DESC 'RFC1274: g eneral
information' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstringsMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{2048} ) olcAttributeTypes: {2}(
0.9.2342.19200300.100.1.5 NAME ( 'drink' 'favouriteDri nk' ) DESC
'RFC1274: favorite drink' EQUALITY caseIgnoreMatch SUBSTR caseIgno
reSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {3}( 0.9.2342.19200300.100.1.6 NAME 'roomNumber' DESC
'RFC1 274: room number' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch S YNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {4}( 0.9.2342.19200300.100.1.7 NAME 'photo' DESC
'RFC1274: photo (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1.23{25000}
) olcAttributeTypes: {5}( 0.9.2342.19200300.100.1.8 NAME 'userClass'
DESC 'RFC12 74: category of user' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMat ch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {6}( 0.9.2342.19200300.100.1.9 NAME 'host' DESC
'RFC1274: h ost computer' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch SYNTA X 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {7}( 0.9.2342.19200300.100.1.10 NAME 'manager' DESC
'RFC127 4: DN of manager' EQUALITY distinguishedNameMatch SYNTAX
1.3.6.1.4.1.1466.115 .121.1.12 ) olcAttributeTypes: {8}(
0.9.2342.19200300.100.1.11 NAME 'documentIdentifier' D ESC 'RFC1274:
unique identifier of document' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {9}( 0.9.2342.19200300.100.1.12 NAME 'documentTitle'
DESC ' RFC1274: title of document' EQUALITY caseIgnoreMatch SUBSTR
caseIgnoreSubstri ngsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {10}( 0.9.2342.19200300.100.1.13 NAME
'documentVersion' DES C 'RFC1274: version of document' EQUALITY
caseIgnoreMatch SUBSTR caseIgnoreSu bstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15{256} ) olcAttributeTypes: {11}(
0.9.2342.19200300.100.1.14 NAME 'documentAuthor' DESC 'RFC1274: DN of
author of document' EQUALITY distinguishedNameMatch SYNTAX 1
.3.6.1.4.1.1466.115.121.1.12 ) olcAttributeTypes: {12}(
0.9.2342.19200300.100.1.15 NAME 'documentLocation' DE SC 'RFC1274:
location of document original' EQUALITY caseIgnoreMatch SUBSTR c
aseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {13}( 0.9.2342.19200300.100.1.20 NAME ( 'homePhone'
'homeTe lephoneNumber' ) DESC 'RFC1274: home telephone number' EQUALITY
telephoneNumb erMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121 .1.50 ) olcAttributeTypes: {14}(
0.9.2342.19200300.100.1.21 NAME 'secretary' DESC 'RFC 1274: DN of
secretary' EQUALITY distinguishedNameMatch SYNTAX 1.3.6.1.4.1.146
6.115.121.1.12 ) olcAttributeTypes: {15}( 0.9.2342.19200300.100.1.22
NAME 'otherMailbox' SYNTAX 1.3.6.1.4.1.1466.115.121.1.39 )
olcAttributeTypes: {16}( 0.9.2342.19200300.100.1.26 NAME 'aRecord'
EQUALITY ca seIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {17}( 0.9.2342.19200300.100.1.27 NAME 'mDRecord'
EQUALITY c aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {18}( 0.9.2342.19200300.100.1.28 NAME 'mXRecord'
EQUALITY c aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {19}( 0.9.2342.19200300.100.1.29 NAME 'nSRecord'
EQUALITY c aseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {20}( 0.9.2342.19200300.100.1.30 NAME 'sOARecord'
EQUALITY caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {21}( 0.9.2342.19200300.100.1.31 NAME 'cNAMERecord'
EQUALIT Y caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 )
olcAttributeTypes: {22}( 0.9.2342.19200300.100.1.38 NAME
'associatedName' DESC 'RFC1274: DN of entry associated with domain'
EQUALITY distinguishedNameMatc h SYNTAX 1.3.6.1.4.1.1466.115.121.1.12 )
olcAttributeTypes: {23}( 0.9.2342.19200300.100.1.39 NAME
'homePostalAddress' D ESC 'RFC1274: home postal address' EQUALITY
caseIgnoreListMatch SUBSTR caseIg noreListSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.41 ) olcAttributeTypes: {24}(
0.9.2342.19200300.100.1.40 NAME 'personalTitle' DESC 'RFC1274:
personal title' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstring
sMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} ) olcAttributeTypes:
{25}( 0.9.2342.19200300.100.1.41 NAME ( 'mobile' 'mobileTel
ephoneNumber' ) DESC 'RFC1274: mobile telephone number' EQUALITY
telephoneNum berMatch SUBSTR telephoneNumberSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.12 1.1.50 ) olcAttributeTypes: {26}(
0.9.2342.19200300.100.1.42 NAME ( 'pager' 'pagerTelep honeNumber' )
DESC 'RFC1274: pager telephone number' EQUALITY telephoneNumber Match
SUBSTR telephoneNumberSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1
.50 ) olcAttributeTypes: {27}( 0.9.2342.19200300.100.1.43 NAME ( 'co'
'friendlyCount ryName' ) DESC 'RFC1274: friendly country name' EQUALITY
caseIgnoreMatch SUBS TR caseIgnoreSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15 ) olcAttributeTypes: {28}(
0.9.2342.19200300.100.1.44 NAME 'uniqueIdentifier' DE SC 'RFC1274:
unique identifer' EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.14
66.115.121.1.15{256} ) olcAttributeTypes: {29}(
0.9.2342.19200300.100.1.45 NAME 'organizationalStatus ' DESC 'RFC1274:
organizational status' EQUALITY caseIgnoreMatch SUBSTR caseI
gnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} )
olcAttributeTypes: {30}( 0.9.2342.19200300.100.1.46 NAME 'janetMailbox'
DESC ' RFC1274: Janet mailbox' EQUALITY caseIgnoreIA5Match SUBSTR
caseIgnoreIA5Subst ringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.26{256}
) olcAttributeTypes: {31}( 0.9.2342.19200300.100.1.47 NAME
'mailPreferenceOption ' DESC 'RFC1274: mail preference option' SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 ) olcAttributeTypes: {32}(
0.9.2342.19200300.100.1.48 NAME 'buildingName' DESC ' RFC1274: name of
building' EQUALITY caseIgnoreMatch SUBSTR caseIgnoreSubstrin gsMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15{256} ) olcAttributeTypes: {33}(
0.9.2342.19200300.100.1.49 NAME 'dSAQuality' DESC 'RF C1274: DSA
Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1.19 SINGLE-VALUE )
olcAttributeTypes: {34}( 0.9.2342.19200300.100.1.50 NAME
'singleLevelQuality' DESC 'RFC1274: Single Level Quality' SYNTAX
1.3.6.1.4.1.1466.115.121.1.13 SIN GLE-VALUE ) olcAttributeTypes: {35}(
0.9.2342.19200300.100.1.51 NAME 'subtreeMinimumQualit y' DESC 'RFC1274:
Subtree Mininum Quality' SYNTAX 1.3.6.1.4.1.1466.115.121.1. 13
SINGLE-VALUE ) olcAttributeTypes: {36}( 0.9.2342.19200300.100.1.52 NAME
'subtreeMaximumQualit y' DESC 'RFC1274: Subtree Maximun Quality' SYNTAX
1.3.6.1.4.1.1466.115.121.1. 13 SINGLE-VALUE ) olcAttributeTypes: {37}(
0.9.2342.19200300.100.1.53 NAME 'personalSignature' D ESC 'RFC1274:
Personal Signature (G3 fax)' SYNTAX 1.3.6.1.4.1.1466.115.121.1. 23 )
olcAttributeTypes: {38}( 0.9.2342.19200300.100.1.54 NAME 'dITRedirect'
DESC 'R FC1274: DIT Redirect' EQUALITY distinguishedNameMatch SYNTAX
1.3.6.1.4.1.1466 .115.121.1.12 ) olcAttributeTypes: {39}(
0.9.2342.19200300.100.1.55 NAME 'audio' DESC 'RFC1274 : audio (u-law)'
SYNTAX 1.3.6.1.4.1.1466.115.121.1.4{25000} ) olcAttributeTypes: {40}(
0.9.2342.19200300.100.1.56 NAME 'documentPublisher' D ESC 'RFC1274:
publisher of document' EQUALITY caseIgnoreMatch SUBSTR caseIgno
reSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
olcObjectClasses: {0}( 0.9.2342.19200300.100.4.4 NAME ( 'pilotPerson'
'newPilo tPerson' ) SUP person STRUCTURAL MAY ( userid $
textEncodedORAddress $ rfc822 Mailbox $ favouriteDrink $ roomNumber $
userClass $ homeTelephoneNumber $ hom ePostalAddress $ secretary $
personalTitle $ preferredDeliveryMethod $ busine ssCategory $
janetMailbox $ otherMailbox $ mobileTelephoneNumber $ pagerTelep hone
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnPrettyNormal: <cn={1}cosine>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<cn={1}cosine>, <cn={1}cosine>
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <= str2entry(cn={1}cosine) ->
0x7ff49ab19758
Nov 22 18:22:52 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/cn=schema/cn={2}inetorgperson.ldif"
Nov 22 18:22:52 mgaauth1 slapd[12638]: => str2entry: "dn:
cn={2}inetorgperson objectClass: olcSchemaConfig cn: {2}inetorgperson
olcAttributeTypes: {0}( 2.16.840.1.113730.3.1.1 NAME 'carLicense' DESC
'RFC279 8: vehicle license or registration plate' EQUALITY
caseIgnoreMatch SUBSTR cas eIgnoreSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15 ) olcAttributeTypes: {1}(
2.16.840.1.113730.3.1.2 NAME 'departmentNumber' DESC ' RFC2798:
identifies a department within an organization' EQUALITY caseIgnoreM
atch SUBSTR caseIgnoreSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15 ) olcAttributeTypes: {2}(
2.16.840.1.113730.3.1.241 NAME 'displayName' DESC 'RFC 2798: preferred
name to be used when displaying entries' EQUALITY caseIgnoreM atch
SUBSTR caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
SI NGLE-VALUE ) olcAttributeTypes: {3}( 2.16.840.1.113730.3.1.3 NAME
'employeeNumber' DESC 'RF C2798: numerically identifies an employee
within an organization' EQUALITY ca seIgnoreMatch SUBSTR
caseIgnoreSubstringsMatch SYNTAX 1.3.6.1.4.1.1466.115.12 1.1.15
SINGLE-VALUE ) olcAttributeTypes: {4}( 2.16.840.1.113730.3.1.4 NAME
'employeeType' DESC 'RFC2 798: type of employment for a person'
EQUALITY caseIgnoreMatch SUBSTR caseIgn oreSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15 ) olcAttributeTypes: {5}(
0.9.2342.19200300.100.1.60 NAME 'jpegPhoto' DESC 'RFC2 798: a JPEG
image' SYNTAX 1.3.6.1.4.1.1466.115.121.1.28 ) olcAttributeTypes: {6}(
2.16.840.1.113730.3.1.39 NAME 'preferredLanguage' DESC 'RFC2798:
preferred written or spoken language for a person' EQUALITY caseIg
noreMatch SUBSTR caseIgnoreSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1. 15 SINGLE-VALUE ) olcAttributeTypes: {7}(
2.16.840.1.113730.3.1.40 NAME 'userSMIMECertificate' D ESC 'RFC2798:
PKCS#7 SignedData used to support S/MIME' SYNTAX 1.3.6.1.4.1.14
66.115.121.1.5 ) olcAttributeTypes: {8}( 2.16.840.1.113730.3.1.216 NAME
'userPKCS12' DESC 'RFC2 798: personal identity information, a PKCS #12
PFX' SYNTAX 1.3.6.1.4.1.1466.1 15.121.1.5 ) olcObjectClasses: {0}(
2.16.840.1.113730.3.2.2 NAME 'inetOrgPerson' DESC 'RFC2 798: Internet
Organizational Person' SUP organizationalPerson STRUCTURAL MAY ( audio
$ businessCategory $ carLicense $ departmentNumber $ displayName $ em
ployeeNumber $ employeeType $ givenName $ homePhone $ homePostalAddress
$ ini tials $ jpegPhoto $ labeledURI $ mail $ manager $ mobile $ o $
pager $ photo $ roomNumber $ secretary $ uid $ userCertificate $
x500uniqueIdentifier $ pre ferredLanguage $ userSMIMECertificate $
userPKCS12 ) ) structuralObjectClass: olcSchemaConfig entryUUID:
1a06766c-8ade-102f-8d05-5da984889200 creatorsName: cn=config
createTimestamp: 20101122234350Z entryCSN:
20101122234350.440473Z#000000#000#000000 modifiersName: cn=config
modifyTimestamp: 20101122234350Z "
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnPrettyNormal:
<cn={2}inetorgperson>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<cn={2}inetorgperson>, <cn={2}inetorgperson>
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:52 mgaauth1 slapd[12638]: <= str2entry(cn={2}inetorgperson)
-> 0x7ff49ab19758
Nov 22 18:22:53 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/cn=schema/cn={3}rfc2307bis.ldif"
Nov 22 18:22:53 mgaauth1 slapd[12638]: => str2entry: "dn:
cn={3}rfc2307bis objectClass: olcSchemaConfig cn: {3}rfc2307bis
olcAttributeTypes: {0}( 1.3.6.1.1.1.1.2 NAME 'gecos' DESC 'The GECOS
field; th e common name' EQUALITY caseIgnoreIA5Match SUBSTR
caseIgnoreIA5SubstringsMatc h SYNTAX 1.3.6.1.4.1.1466.115.121.1.26
SINGLE-VALUE ) olcAttributeTypes: {1}( 1.3.6.1.1.1.1.3 NAME
'homeDirectory' DESC 'The absolut e path to the home directory'
EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1 466.115.121.1.26
SINGLE-VALUE ) olcAttributeTypes: {2}( 1.3.6.1.1.1.1.4 NAME 'loginShell'
DESC 'The path to th e login shell' EQUALITY caseExactIA5Match SYNTAX
1.3.6.1.4.1.1466.115.121.1.2 6 SINGLE-VALUE ) olcAttributeTypes: {3}(
1.3.6.1.1.1.1.5 NAME 'shadowLastChange' EQUALITY integ erMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) olcAttributeTypes: {4}(
1.3.6.1.1.1.1.6 NAME 'shadowMin' EQUALITY integerMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) olcAttributeTypes: {5}(
1.3.6.1.1.1.1.7 NAME 'shadowMax' EQUALITY integerMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) olcAttributeTypes: {6}(
1.3.6.1.1.1.1.8 NAME 'shadowWarning' EQUALITY integerM atch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) olcAttributeTypes: {7}(
1.3.6.1.1.1.1.9 NAME 'shadowInactive' EQUALITY integer Match SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) olcAttributeTypes: {8}(
1.3.6.1.1.1.1.10 NAME 'shadowExpire' EQUALITY integerM atch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) olcAttributeTypes: {9}(
1.3.6.1.1.1.1.11 NAME 'shadowFlag' EQUALITY integerMat ch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) olcAttributeTypes: {10}(
1.3.6.1.1.1.1.12 NAME 'memberUid' EQUALITY caseExactI A5Match SYNTAX
1.3.6.1.4.1.1466.115.121.1.26 ) olcAttributeTypes: {11}(
1.3.6.1.1.1.1.13 NAME 'memberNisNetgroup' EQUALITY ca seExactIA5Match
SUBSTR caseExactIA5SubstringsMatch SYNTAX 1.3.6.1.4.1.1466.11
5.121.1.26 ) olcAttributeTypes: {12}( 1.3.6.1.1.1.1.14 NAME
'nisNetgroupTriple' DESC 'Netgr oup triple' EQUALITY caseIgnoreIA5Match
SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 ) olcAttributeTypes: {13}(
1.3.6.1.1.1.1.15 NAME 'ipServicePort' DESC 'Service p ort number'
EQUALITY integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE
-VALUE ) olcAttributeTypes: {14}( 1.3.6.1.1.1.1.16 NAME
'ipServiceProtocol' DESC 'Servi ce protocol name' SUP name )
olcAttributeTypes: {15}( 1.3.6.1.1.1.1.17 NAME 'ipProtocolNumber' DESC
'IP pro tocol number' EQUALITY integerMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SING LE-VALUE ) olcAttributeTypes: {16}(
1.3.6.1.1.1.1.18 NAME 'oncRpcNumber' DESC 'ONC RPC nu mber' EQUALITY
integerMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {17}( 1.3.6.1.1.1.1.19 NAME 'ipHostNumber' DESC 'IPv4
addre sses as a dotted decimal omitting leading zeros or IPv6
addresses as de fined in RFC2373' SUP name ) olcAttributeTypes: {18}(
1.3.6.1.1.1.1.20 NAME 'ipNetworkNumber' DESC 'IP netw ork as a dotted
decimal, eg. 192.168, omitting leading zeros' SUP name
SINGLE-VALUE ) olcAttributeTypes: {19}( 1.3.6.1.1.1.1.21 NAME
'ipNetmaskNumber' DESC 'IP netm ask as a dotted decimal, eg.
255.255.255.0, omitting leading zeros' EQU ALITY
caseIgnoreIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
olcAttributeTypes: {20}( 1.3.6.1.1.1.1.22 NAME 'macAddress' DESC 'MAC
address in maximal, colon separated hex notation, eg.
00:00:92:90:ee:e2' EQUALI TY caseIgnoreIA5Match SYNTAX
1.3.6.1.4.1.1466.115.121.1.26 ) olcAttributeTypes: {21}(
1.3.6.1.1.1.1.23 NAME 'bootParameter' DESC 'rpc.bootp aramd parameter'
EQUALITY caseExactIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1 .26 )
olcAttributeTypes: {22}( 1.3.6.1.1.1.1.24 NAME 'bootFile' DESC 'Boot
image nam e' EQUALITY caseExactIA5Match SYNTAX
1.3.6.1.4.1.1466.115.121.1.26 ) olcAttributeTypes: {23}(
1.3.6.1.1.1.1.26 NAME 'nisMapName' DESC 'Name of a A generic NIS map'
SUP name ) olcAttributeTypes: {24}( 1.3.6.1.1.1.1.27 NAME 'nisMapEntry'
DESC 'A generic N IS entry' EQUALITY caseExactIA5Match SUBSTR
caseExactIA5SubstringsMatch SYNTA X 1.3.6.1.4.1.1466.115.121.1.26
SINGLE-VALUE ) olcAttributeTypes: {25}( 1.3.6.1.1.1.1.28 NAME
'nisPublicKey' DESC 'NIS public key' EQUALITY octetStringMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.40 SINGLE-V ALUE ) olcAttributeTypes: {26}(
1.3.6.1.1.1.1.29 NAME 'nisSecretKey' DESC 'NIS secret key' EQUALITY
octetStringMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.40 SINGLE-V ALUE )
olcAttributeTypes: {27}( 1.3.6.1.1.1.1.30 NAME 'nisDomain' DESC 'NIS
domain' E QUALITY caseIgnoreIA5Match SYNTAX
1.3.6.1.4.1.1466.115.121.1.26) olcAttributeTypes: {28}( 1.3.6.1.1.1.1.31
NAME 'automountMapName' DESC 'automo unt Map Name' EQUALITY
caseExactIA5Match SUBSTR caseExactIA5SubstringsMatch S YNTAX
1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE ) olcAttributeTypes: {29}(
1.3.6.1.1.1.1.32 NAME 'automountKey' DESC 'Automount Key value'
EQUALITY caseExactIA5Match SUBSTR caseExactIA5SubstringsMatch SYNT AX
1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE ) olcAttributeTypes: {30}(
1.3.6.1.1.1.1.33 NAME 'automountInformation' DESC 'Au tomount
information' EQUALITY caseExactIA5Match SUBSTR caseExactIA5Substrings
Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
olcObjectClasses: {0}( 1.3.6.1.1.1.2.0 NAME 'posixAccount' SUP top
AUXILIARY D ESC 'Abstraction of an account with POSIX attributes' MUST
( cn $ uid $ uidNu mber $ gidNumber $ homeDirectory ) MAY (
userPassword $ loginShell $ gecos $ description ) )
olcObjectClasses: {1}( 1.3.6.1.1.1.2.1 NAME 'shadowAccount' SUP top
AUXILIARY DESC 'Additional attributes for shadow passwords' MUST uid
MAY ( userPassword $ description $ shadowLastChange $ shadowMin
$ shadowMax $ shado wWarning $ shadowInactive $
shadowExpire $ shadowFlag ) ) olcObjectClasses: {2}( 1.3.6.1.1.1.2.2
NAME 'posixGroup' SUP top AUXILIARY DES C 'Abstraction of a group of
accounts' MUST gidNumber MAY ( userPassword $ me mberUid $
description ) ) olcObjectClasses: {3}( 1.3.6.1.1.1.2.3 NAME 'ipService'
SUP top STRUCTURAL DES C 'Abstraction an Internet Protocol
service. Maps an IP port and protoc ol (such as tcp or udp)
to one or more names; the distinguished value o f the cn
attribute denotes the services canonical name' MUST ( cn $
ipServicePort $ ipServiceProtocol ) MAY description ) olcObjectClasses:
{4}( 1.3.6.1.1.1.2.4 NAME 'ipProtocol' SUP top STRUCTURAL DE SC
'Abstraction of an IP protocol. Maps a protocol number to one or
mor e names. The distinguished value of the cn attribute denotes
the protoc ols canonical name' MUST ( cn $ ipProtocolNumber ) MAY
description ) olcObjectClasses: {5}( 1.3.6.1.1.1.2.5 NAME 'oncRpc' SUP
top STRUCTURAL DESC ' Abstraction of an Open Network Computing
(ONC) [RFC1057] Remote Procedur e Call (RPC) binding. This
class maps an ONC RPC number to a name. The distinguished value
of the cn attribute denotes the RPC services can onical name' MUST
( cn $ oncRpcNumber ) MAY description ) olcObjectClasses: {6}(
1.3.6.1.1.1.2.6 NAME 'ipHost' SUP top AUXILIARY DESC 'A bstraction of a
host, an IP device. The distinguished value of the cn a ttribute
denotes the hosts canonical name. Device SHOULD be used as a s
tructural class' MUST ( cn $ ipHostNumber ) MAY ( userPassword $ l $
descript ion $ manager ) ) olcObjectClasses: {7}( 1.3.6.1.1.1.2.7 NAME
'ipNetwork' SUP top STRUCTURAL DES C 'Abstraction of a network. The
distinguished value of the cn attribut e denotes the networks
canonical name' MUST ipNetworkNumber MAY ( cn $ ipNetm askNumber $ l $
description $ manager ) ) olcObjectClasses: {8}( 1.3.6.1.1.1.2.8 NAME
'nisNetgroup' SUP top STRUCTURAL D ESC 'Abstraction of a netgroup. May
refer to other netgroups' MUST cn MAY ( n isNetgroupTriple $
memberNisNetgroup $ description ) ) olcObjectClasses: {9}(
1.3.6.1.1.1.2.9 NAME 'nisMap' SUP top STRUCTURAL DESC ' A generic
abstraction of a NIS map' MUST nisMapName MAY description )
olcObjectClasses: {10}( 1.3.6.1.1.1.2.10 NAME 'nisObject' SUP top
STRUCTURAL D ESC 'An entry in a NIS map' MUST ( cn $ nisMapE
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal:
<cn={3}rfc2307bis>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<cn={3}rfc2307bis>, <cn={3}rfc2307bis>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <= str2entry(cn={3}rfc2307bis) ->
0x7ff49ab19758
Nov 22 18:22:53 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/cn=schema/cn={4}yast.ldif"
Nov 22 18:22:53 mgaauth1 slapd[12638]: => str2entry: "dn: cn={4}yast
objectClass: olcSchemaConfig cn: {4}yast olcObjectIdentifier: {0}SUSE
1.3.6.1.4.1.7057 olcObjectIdentifier: {1}SUSE.YaST SUSE:10.1
olcObjectIdentifier: {2}SUSE.YaST.ModuleConfig SUSE:10.1.2
olcObjectIdentifier: {3}SUSE.YaST.ModuleConfig.OC
SUSE.YaST.ModuleConfig:1 olcObjectIdentifier:
{4}SUSE.YaST.ModuleConfig.Attr SUSE.YaST.ModuleConfig:2
olcAttributeTypes: {0}( SUSE.YaST.ModuleConfig.Attr:2 NAME (
'suseDefaultBase' ) DESC 'Base DN where new Objects should be created
by default' EQUALITY dis tinguishedNameMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE ) olcAttributeTypes:
{1}( SUSE.YaST.ModuleConfig.Attr:3 NAME ( 'suseNextUniqueId ' ) DESC
'Next unused unique ID, can be used to generate directory wide uniqe
IDs' EQUALITY integerMatch ORDERING integerOrderingMatch SYNTAX
1.3.6.1.4.1. 1466.115.121.1.27 SINGLE-VALUE ) olcAttributeTypes: {2}(
SUSE.YaST.ModuleConfig.Attr:4 NAME ( 'suseMinUniqueId' ) DESC 'lower
Border for Unique IDs' EQUALITY integerMatch ORDERING integerO
rderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE )
olcAttributeTypes: {3}( SUSE.YaST.ModuleConfig.Attr:5 NAME (
'suseMaxUniqueId' ) DESC 'upper Border for Unique IDs' EQUALITY
integerMatch ORDERING integerO rderingMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) olcAttributeTypes: {4}(
SUSE.YaST.ModuleConfig.Attr:6 NAME ( 'suseDefaultTempl ate' ) DESC 'The
DN of a template that should be used by default' EQUALITY di
stinguishedNameMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.12
SINGLE-VALUE ) olcAttributeTypes: {5}( SUSE.YaST.ModuleConfig.Attr:7
NAME ( 'suseSearchFilter ' ) DESC 'Search filter to localize Objects'
SYNTAX 1.3.6.1.4.1.1466.115.121. 1.15 SINGLE-VALUE )
olcAttributeTypes: {6}( SUSE.YaST.ModuleConfig.Attr:11 NAME (
'suseDefaultValu e' ) DESC 'an Attribute-Value-Assertions to define
defaults for specific Attr ibutes' EQUALITY caseIgnoreMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15 ) olcAttributeTypes: {7}(
SUSE.YaST.ModuleConfig.Attr:12 NAME ( 'suseNamingAttri bute' ) DESC
'AttributeType that should be used as the RDN' EQUALITY caseIgno
reIA5Match SYNTAX 1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE )
olcAttributeTypes: {8}( SUSE.YaST.ModuleConfig.Attr:15 NAME (
'suseSecondaryGr oup' ) DESC 'seconday group DN' EQUALITY
distinguishedNameMatch SYNTAX 1.3.6. 1.4.1.1466.115.121.1.12 )
olcAttributeTypes: {9}( SUSE.YaST.ModuleConfig.Attr:16 NAME (
'suseMinPassword Length' ) DESC 'minimum Password length for new users'
EQUALITY integerMatch ORDERING integerOrderingMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VAL UE ) olcAttributeTypes: {10}(
SUSE.YaST.ModuleConfig.Attr:17 NAME ( 'suseMaxPasswor dLength' ) DESC
'maximum Password length for new users' EQUALITY integerMatch ORDERING
integerOrderingMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VA LUE
) olcAttributeTypes: {11}( SUSE.YaST.ModuleConfig.Attr:18 NAME (
'susePasswordHa sh' ) DESC 'Hash method to use for new users' EQUALITY
caseIgnoreIA5Match SYN TAX 1.3.6.1.4.1.1466.115.121.1.26
SINGLE-VALUE ) olcAttributeTypes: {12}( SUSE.YaST.ModuleConfig.Attr:19
NAME ( 'suseSkelDir' ) DESC '' EQUALITY caseExactIA5Match SYNTAX
1.3.6.1.4.1.1466.115.121.1.26 ) olcAttributeTypes: {13}(
SUSE.YaST.ModuleConfig.Attr:20 NAME ( 'susePlugin' ) DESC 'plugin to
use upon user/ group creation' EQUALITY caseIgnoreMatch SYNTA X
1.3.6.1.4.1.1466.115.121.1.15 ) olcAttributeTypes: {14}(
SUSE.YaST.ModuleConfig.Attr:21 NAME ( 'suseMapAttribu te' ) DESC ''
EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 )
olcAttributeTypes: {15}( SUSE.YaST.ModuleConfig.Attr:22 NAME (
'suseImapServer ' ) DESC '' EQUALITY caseIgnoreMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE ) olcAttributeTypes:
{16}( SUSE.YaST.ModuleConfig.Attr:23 NAME ( 'suseImapAdmin' ) DESC ''
EQUALITY caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15
SINGLE-VALUE ) olcAttributeTypes: {17}( SUSE.YaST.ModuleConfig.Attr:24
NAME ( 'suseImapDefaul tQuota' ) DESC '' EQUALITY integerMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE ) olcAttributeTypes:
{18}( SUSE.YaST.ModuleConfig.Attr:25 NAME ( 'suseImapUseSsl ' ) DESC
'' EQUALITY booleanMatch SYNTAX 1.3.6.1.4.1.1466.115.121
.1.7 SINGLE-VALUE ) olcObjectClasses: {0}(
SUSE.YaST.ModuleConfig.OC:2 NAME 'suseModuleConfigurati on' SUP
top STRUCTURAL DESC 'Contains configuration of Management Modu les'
MUST ( cn ) MAY ( suseDefaultBase )) olcObjectClasses: {1}(
SUSE.YaST.ModuleConfig.OC:3 NAME 'suseUserConfiguration ' SUP
suseModuleConfiguration STRUCTURAL DESC 'Configuration of user m
anagement tools' MAY ( suseMinPasswordLength $ suseMaxPasswordLength
$ susePasswordHash $ suseSkelDir $ suseNextUniqueId $
suseMinUniqueId $ suseMaxUniqueId $ suseDefaultTemplate $
suseSearchFilter $ suseMapAttribute )) olcObjectClasses:
{2}( SUSE.YaST.ModuleConfig.OC:4 NAME 'suseObjectTemplate' SUP
top STRUCTURAL DESC 'Base Class for Object-Templates' MUST ( cn ) M AY
( susePlugin $ suseDefaultValue $ suseNamingAttribute ))
olcObjectClasses: {3}( SUSE.YaST.ModuleConfig.OC:5 NAME
'suseUserTemplate' SUP suseObjectTemplate STRUCTURAL DESC 'User
object template' MUST ( cn ) MAY ( suseSecondaryGroup ))
olcObjectClasses: {4}( SUSE.YaST.ModuleConfig.OC:6 NAME
'suseGroupTemplate' SUP suseObjectTemplate STRUCTURAL DESC
'Group object template' MUST ( cn )) olcObjectClasses: {5}(
SUSE.YaST.ModuleConfig.OC:7 NAME 'suseGroupConfiguratio n' SUP
suseModuleConfiguration STRUCTURAL DESC 'Configuration of user
management tools' MAY ( suseNextUniqueId $ suseMinUniqueId $
suseMaxUni queId $ suseDefaultTemplate $ suseSearchFilter
$ suseMapAttribut e )) olcObjectClasses: {6}(
SUSE.YaST.ModuleConfig.OC:8 NAME 'suseCaConfiguration' SUP
suseModuleConfiguration STRUCTURAL DESC 'Configuration of CA manage
ment tools') olcObjectClasses: {7}( SUSE.YaST.ModuleConfig.OC:9 NAME
'suseDnsConfiguration' SUP suseModuleConfiguration STRUCTURAL
DESC 'Configuration of mail se rver management tools')
olcObjectClasses: {8}( SUSE.YaST.ModuleConfig.OC:10 NAME
'suseDhcpConfiguratio n' SUP suseModuleConfiguration STRUCTURAL
DESC 'Configuration of DHCP server management tools')
olcObjectClasses: {9}( SUSE.YaST.ModuleConfig.OC:11 NAME
'suseMailConfiguratio n' SUP suseModuleConfiguration STRUCTURAL
DESC 'Configuration of IMAP user management tools' MUST (
suseImapServer $ suseImapAdmin $ suseImap DefaultQuota $
suseImapUseSsl )) structuralObjectClass: olcSchemaConfig entryUUID:
1a06ad4e-8ade-102f-8d07-5da984889200 creatorsName: cn=config
createTimestamp: 20101122234350Z entryCSN:
20101122234350.441878Z#000000#000#000000 modifiersName: cn=config
modifyTimestamp: 20101122234350Z "
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal: <cn={4}yast>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal: <cn={4}yast>,
<cn={4}yast>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <= str2entry(cn={4}yast) ->
0x7ff49ab19758
Nov 22 18:22:53 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/cn=schema/cn={5}kerberos.ldif"
Nov 22 18:22:53 mgaauth1 slapd[12638]: => str2entry: "dn: cn={5}kerberos
objectClass: olcSchemaConfig cn: {5}kerberos olcAttributeTypes::
ezB9KCAyLjE2Ljg0MC4xLjExMzcxOS4xLjMwMS40LjEuMSAgICAgICAgIC
AgICAgIE5BTUUgJ2tyYlByaW5jaXBhbE5hbWUnICAgICAgICAgICAgICAgRVFVQUxJVFkgY2FzZUV
4YWN0SUE1TWF0Y2ggCVNVQlNUUiBjYXNlRXhhY3RTdWJzdHJpbmdzTWF0Y2ggICAgICAgICAgICAg
ICBTWU5UQVggMS4zLjYuMS40LjEuMTQ2Ni4xMTUuMTIxLjEuMjYp olcAttributeTypes:
{1}( 1.2.840.113554.1.4.1.6.1 NAME 'krbCanoni
calName' EQUALITY caseExactIA5Match SUBSTR
caseEx actSubstringsMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.26 SINGLE-VALUE)
olcAttributeTypes: {2}( 2.16.840.1.113719.1.301.4.3.1 NAME
'krbP rincipalType' EQUALITY integerMatch
SYNTAX 1.3.6. 1.4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {3}( 2.16.840.1.113719.1.301.4.5.1 NAME
'krbU PEnabled' DESC 'Boolean' SYNTAX
1.3.6.1.4.1.1466. 115.121.1.7 SINGLE-VALUE)
olcAttributeTypes: {4}( 2.16.840.1.113719.1.301.4.6.1 NAME
'krbP rincipalExpiration' EQUALITY
generalizedTimeMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE)
olcAttributeTypes: {5}( 2.16.840.1.113719.1.301.4.8.1 NAME
'krbT icketFlags' EQUALITY integerMatch
SYNTAX 1.3.6.1. 4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {6}( 2.16.840.1.113719.1.301.4.9.1 NAME
'krbM axTicketLife' EQUALITY integerMatch
SYNTAX 1.3.6. 1.4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {7}( 2.16.840.1.113719.1.301.4.10.1
NAME 'krb MaxRenewableAge' EQUALITY
integerMatch SYNTAX 1.3
.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {8}( 2.16.840.1.113719.1.301.4.14.1
NAME 'krb RealmReferences' EQUALITY
distinguishedNameMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.12) olcAttributeTypes: {9}(
2.16.840.1.113719.1.301.4.15.1 NAME 'krb
LdapServers' EQUALITY caseIgnoreMatch SYNTAX
1.3. 6.1.4.1.1466.115.121.1.15) olcAttributeTypes: {10}(
2.16.840.1.113719.1.301.4.17.1 NAME 'kr
bKdcServers' EQUALITY distinguishedNameMatch
SYNT AX 1.3.6.1.4.1.1466.115.121.1.12) olcAttributeTypes: {11}(
2.16.840.1.113719.1.301.4.18.1 NAME 'kr
bPwdServers' EQUALITY distinguishedNameMatch
SYNT AX 1.3.6.1.4.1.1466.115.121.1.12) olcAttributeTypes: {12}(
2.16.840.1.113719.1.301.4.24.1 NAME 'kr
bHostServer' EQUALITY caseExactIA5Match
SYNTAX 1. 3.6.1.4.1.1466.115.121.1.26) olcAttributeTypes: {13}(
2.16.840.1.113719.1.301.4.25.1 NAME 'kr
bSearchScope' EQUALITY integerMatch SYNTAX
1.3.6. 1.4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {14}( 2.16.840.1.113719.1.301.4.26.1
NAME 'kr bPrincipalReferences' EQUALITY
distinguishedNameMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.12) olcAttributeTypes: {15}(
2.16.840.1.113719.1.301.4.28.1 NAME 'kr
bPrincNamingAttr' EQUALITY caseIgnoreMatch
SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE)
olcAttributeTypes: {16}( 2.16.840.1.113719.1.301.4.29.1
NAME 'kr bAdmServers' EQUALITY
distinguishedNameMatch SYNT AX
1.3.6.1.4.1.1466.115.121.1.12) olcAttributeTypes: {17}(
2.16.840.1.113719.1.301.4.30.1 NAME 'kr
bMaxPwdLife' EQUALITY integerMatch SYNTAX
1.3.6.1 .4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {18}( 2.16.840.1.113719.1.301.4.31.1
NAME 'kr bMinPwdLife' EQUALITY integerMatch
SYNTAX 1.3.6.1 .4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {19}( 2.16.840.1.113719.1.301.4.32.1
NAME 'kr bPwdMinDiffChars' EQUALITY
integerMatch SYNTAX 1
.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {20}( 2.16.840.1.113719.1.301.4.33.1
NAME 'kr bPwdMinLength' EQUALITY
integerMatch SYNTAX 1.3.
6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {21}( 2.16.840.1.113719.1.301.4.34.1
NAME 'kr bPwdHistoryLength' EQUALITY
integerMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {22}( 1.3.6.1.4.1.5322.21.2.1 NAME
'krbPwdMax Failure' EQUALITY integerMatch
SYNTAX 1.3.6.1.4. 1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {23}( 1.3.6.1.4.1.5322.21.2.2 NAME
'krbPwdFai lureCountInterval' EQUALITY
integerMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.27 SINGLE-VALUE)
olcAttributeTypes: {24}( 1.3.6.1.4.1.5322.21.2.3 NAME
'krbPwdLoc koutDuration' EQUALITY
integerMatch SYNTAX 1.3.6
.1.4.1.1466.115.121.1.27 SINGLE-VALUE) olcAttributeTypes:
{25}( 2.16.840.1.113719.1.301.4.36.1 NAME 'kr
bPwdPolicyReference' EQUALITY
distinguishedNameMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE)
olcAttributeTypes: {26}( 2.16.840.1.113719.1.301.4.37.1
NAME 'kr bPasswordExpiration' EQUALITY
generalizedTimeMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE)
olcAttributeTypes: {27}( 2.16.840.1.113719.1.301.4.39.1
NAME 'kr bPrincipalKey' EQUALITY
octetStringMatch SYNTAX 1 .3.6.1.4.1.1466.115.121.1.40)
olcAttributeTypes: {28}( 2.16.840.1.113719.1.301.4.40.1
NAME 'kr bTicketPolicyReference' EQUALITY
distinguishedNameMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.12 SINGLE-VALUE)
olcAttributeTypes: {29}( 2.16.840.1.113719.1.301.4.41.1
NAME 'kr bSubTrees' EQUALITY
distinguishedNameMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.12) olcAttributeTypes: {30}(
2.16.840.1.113719.1.301.4.42.1 NAME 'kr
bDefaultEncSaltTypes' EQUALITY
caseIgnoreMatch SY NTAX 1.3.6.1.4.1.1466.115.121.1.15)
olcAttributeTypes: {31}( 2.16.840.1.113719.1.301.4.43.1
NAME 'kr bSupportedEncSaltTypes' EQUALITY
caseIgnoreMatch SYNTAX 1.3.6.1.4.1.1466.115.121.1.15)
olcAttributeTypes: {32}( 2.16.840.1.113719.1.301.4.44.1
NAME 'kr bPwdHistory' EQUALITY
octetStringMatch SYNTAX 1.3 .6.1.4.1.1466.115.121.1.40)
olcAttributeTypes: {33}( 2.16.840.1.113719.1.301.4.45.1
NAME 'kr bLastPwdChange' EQUALITY
generalizedTimeMatch SYN TAX
1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE)
olcAttributeTypes: {34}( 2.16.840.1.113719.1.301.4.46.1
NAME 'kr bMKey' EQUALITY octetStringMatch
SYNTAX 1.3.6.1.4 .1.1466.115.121.1.40) olcAttributeTypes: {35}(
2.16.840.1.113719.1.301.4.47.1 NAME 'kr
bPrincipalAliases' EQUALITY
caseExactIA5Match SYN TAX 1.3.6.1.4.1.1466.115.121.1.26)
olcAttributeTypes: {36}( 2.16.840.1.113719.1.301.4.48.1
NAME 'kr bLastSuccessfulAuth' EQUALITY
generalizedTimeMatch SYNTAX
1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE)
olcAttributeTypes: {37}( 2.16.840.1.113719.1.301.4.49.1
NAME 'kr bLastFailedAuth' EQUALITY
generalizedTimeMatch SY NTAX
1.3.6.1.4.1.1466.115.121.1.24 SINGLE-VALUE)
olcAttributeTypes: {38}( 2.16.840.1.113719.1.301.4.50.1
NAME 'kr bLo
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal: <cn={5}kerberos>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<cn={5}kerberos>, <cn={5}kerberos>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <= str2entry(cn={5}kerberos) ->
0x7ff49ab19758
Nov 22 18:22:53 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/cn=schema/cn={6}uidnext.ldif"
Nov 22 18:22:53 mgaauth1 slapd[12638]: => str2entry: "dn: cn={6}uidnext
objectClass: olcSchemaConfig cn: {6}uidnext olcObjectClasses: {0}(
1.1.2.2.1.30 NAME 'uidnext' SUP top STRUCTURAL MUST ( cn $
uidNumber )) structuralObjectClass: olcSchemaConfig entryUUID:
189d1db6-8adf-102f-87a7-a13f60af0032 creatorsName: cn=config
createTimestamp: 20101122235057Z entryCSN:
20101122235057.569075Z#000000#000#000000 modifiersName: cn=config
modifyTimestamp: 20101122235057Z "
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal: <cn={6}uidnext>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<cn={6}uidnext>, <cn={6}uidnext>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <= str2entry(cn={6}uidnext) ->
0x7ff49ab19758
Nov 22 18:22:53 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/olcDatabase={-1}frontend.ldif"
Nov 22 18:22:53 mgaauth1 slapd[12638]: => str2entry: "dn:
olcDatabase={-1}frontend objectClass: olcDatabaseConfig olcDatabase:
{-1}frontend olcAccess: {0}to dn.base="" by * read olcAccess: {1}to
dn.base="cn=Subschema" by * read structuralObjectClass:
olcDatabaseConfig entryUUID: 1a06c66c-8ade-102f-8d08-5da984889200
creatorsName: cn=config createTimestamp: 20101122234350Z entryCSN:
20101122234350.442520Z#000000#000#000000 modifiersName: cn=config
modifyTimestamp: 20101122234350Z "
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal:
<olcDatabase={-1}frontend>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<olcDatabase={-1}frontend>, <olcDatabase={-1}frontend>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <=
str2entry(olcDatabase={-1}frontend) -> 0x7ff49ab19758
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=Subschema>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=subschema>
Nov 22 18:22:53 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/olcDatabase={0}config.ldif"
Nov 22 18:22:53 mgaauth1 slapd[12638]: => str2entry: "dn:
olcDatabase={0}config objectClass: olcDatabaseConfig olcDatabase:
{0}config olcAccess: {0}to * by
dn.base="uid=syncrepl,ou=system,dc=ls,dc=cbn" read by * break
olcLimits: {0}dn.exact="uid=syncrepl,ou=system,dc=ls,dc=cbn"
size.soft=unlimit ed olcRootDN: cn=config olcRootPW::
e1NTSEF9K3hqNDB5T2U1ZGtyTU45aWVrMGhpSlFMMFVGUlFVNWFXZz09 olcSecurity:
simple_bind=128 ssf=71 olcSyncrepl: {0}rid=1
provider="ldap://mgaauth1.ni.ls.cbn/" searchbase="cn=con fig"
type="refreshAndPersist" retry="120 +" starttls=critical
tls_reqcert=dem and bindmethod="simple"
binddn="uid=syncrepl,ou=system,dc=ls,dc=cbn" credenti
als="I9BpLVmLdOaL" olcUpdateRef: ldap://mgaauth1.ni.ls.cbn/
structuralObjectClass: olcDatabaseConfig entryUUID:
1a06cd10-8ade-102f-8d09-5da984889200 creatorsName: cn=config
createTimestamp: 20101122234350Z entryCSN:
20101122234350.442690Z#000000#000#000000 modifiersName: cn=config
modifyTimestamp: 20101122234350Z "
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal:
<olcDatabase={0}config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<olcDatabase={0}config>, <olcDatabase={0}config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <=
str2entry(olcDatabase={0}config) -> 0x7ff49ab19758
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal: <cn=config>,
<cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize:
<uid=syncrepl,ou=system,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize:
<uid=syncrepl,ou=system,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize:
<uid=syncrepl,ou=system,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize:
<uid=syncrepl,ou=system,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal: <cn=config>,
<cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize:
<uid=syncrepl,ou=system,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize:
<uid=syncrepl,ou=system,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/olcDatabase={0}config/olcOverlay={0}syncprov.ldif"
Nov 22 18:22:53 mgaauth1 slapd[12638]: => str2entry: "dn:
olcOverlay={0}syncprov objectClass: olcSyncProvConfig olcOverlay:
{0}syncprov olcSpCheckpoint: 100 10 structuralObjectClass:
olcSyncProvConfig entryUUID: 1a06d9fe-8ade-102f-8d0a-5da984889200
creatorsName: cn=config createTimestamp: 20101122234350Z entryCSN:
20101122234350.443021Z#000000#000#000000 modifiersName: cn=config
modifyTimestamp: 20101122234350Z "
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal:
<olcOverlay={0}syncprov>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<olcOverlay={0}syncprov>, <olcOverlay={0}syncprov>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <=
str2entry(olcOverlay={0}syncprov) -> 0x7ff49ab19758
Nov 22 18:22:53 mgaauth1 slapd[12638]: ldif_read_file: read entry file:
"/etc/openldap/slapd.d/cn=config/olcDatabase={1}hdb.ldif"
Nov 22 18:22:53 mgaauth1 slapd[12638]: => str2entry: "dn:
olcDatabase={1}hdb objectClass: olcDatabaseConfig objectClass:
olcHdbConfig olcDatabase: {1}hdb olcDbDirectory: /var/lib/ldap
olcSuffix: dc=ls,dc=cbn olcAccess: {0}to attrs=userPassword by self
write by * auth olcAccess: {1}to attrs=shadowLastChange by self write by
* read olcAccess: {2}to attrs=userPKCS12 by self read by * none
olcAccess: {3}to * by * read olcRootDN: cn=admin,dc=ls,dc=cbn
olcRootPW:: e1NTSEF9TkJSVVEyR0FGMlNQN1dsbFh3eS9GK2t5MFBST1UxaEpWQT09
olcUpdateRef: ldap://anubis.ls.cbn/ olcDbCacheSize: 10000
olcDbCheckpoint: 1024 5 olcDbConfig: {0}set_cachesize 0 15000000 1
olcDbConfig: {1}set_lg_regionmax 262144 olcDbConfig: {2}set_lg_bsize
2097152 olcDbConfig: {3}set_flags DB_LOG_AUTOREMOVE olcDbIDLcacheSize:
30000 olcDbIndex: objectclass eq olcDbIndex: uidNumber eq olcDbIndex:
gidNumber eq olcDbIndex: member eq olcDbIndex: memberUid eq olcDbIndex:
mail eq olcDbIndex: cn eq,sub olcDbIndex: displayName eq,sub olcDbIndex:
uid eq,sub olcDbIndex: sn eq,sub olcDbIndex: givenName eq,sub
olcDbIndex: entryUUID eq olcDbIndex: entryCSN eq structuralObjectClass:
olcHdbConfig entryUUID: 65b86196-8adf-102f-87a8-a13f60af0032
creatorsName: cn=config createTimestamp: 20101122235306Z olcSyncrepl:
{0}rid=2 provider="ldap://anubis.ls.cbn/" searchbase="dc=ls,dc=cb n"
type="refreshOnly" retry="120 +" interval="00:00:01:00"
starttls=critical tls_reqcert=demand bindmethod="simple"
binddn="uid=syncrepl,ou=system,dc=ls,d c=cbn" credentials="lieguYwHee"
entryCSN: 20101123001649.251496Z#000000#000#000000 modifiersName:
cn=config modifyTimestamp: 20101123001649Z "
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal:
<olcDatabase={1}hdb>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<olcDatabase={1}hdb>, <olcDatabase={1}hdb>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize:
<cn=admin,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize:
<cn=admin,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=config>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <= str2entry(olcDatabase={1}hdb)
-> 0x7ff49ab19758
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal: <dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<dc=ls,dc=cbn>, <dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal:
<cn=admin,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<cn=admin,dc=ls,dc=cbn>, <cn=admin,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: hdb_db_init: Initializing HDB
database
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal: <dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<dc=ls,dc=cbn>, <dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnPrettyNormal:
<cn=admin,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnPrettyNormal:
<cn=admin,dc=ls,dc=cbn>, <cn=admin,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize:
<uid=syncrepl,ou=system,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize:
<uid=syncrepl,ou=system,dc=ls,dc=cbn>
Nov 22 18:22:53 mgaauth1 slapd[12638]: send_ldap_result: conn=-1 op=0 p=0
Nov 22 18:22:53 mgaauth1 slapd[12638]: send_ldap_result: err=0
matched="" text=""
Nov 22 18:22:53 mgaauth1 slapd[12638]: >>> dnNormalize: <cn=Subschema>
Nov 22 18:22:53 mgaauth1 slapd[12638]: <<< dnNormalize: <cn=subschema>
Nov 22 18:22:53 mgaauth1 slapd[12638]: matching_rule_use_init
Nov 22 18:22:53 mgaauth1 slapd[12638]: 1.2.840.113556.1.4.804
(integerBitOrMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: (
1.2.840.113556.1.4.804 NAME 'integerBitOrMatch' APPLIES (
supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency
$ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $
olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $
olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth
$ olcReplicationInterval $ olcSockbufMaxIncoming $
olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $
olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $
olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $
olcChainMaxReferralDepth $ olcDbProtocolVersion $ olcDbConnectionPoolMax
$ olcDDSmaxDynamicObjects $ olcPcacheMaxQueries $ olcRetcodeSleep $
olcSssVlvMax $ olcSssVlvMaxKeys $ olcSpSessionlog $ mailPreferenceOption
$ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $
shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $
ipProtocolNumber $ oncRpcNumber $ suseNextUniqueId $ suseMinUniqueId $
suseMaxUniqueId $ suseMinPasswordLength $ suseMaxPasswordLength $
suseImapDefaultQuota $ krbPrincipalType $ krbTicketFlags $
krbMaxTicketLife $ krbMaxRenewableAge $ krbSearchScope $ krbMaxPwdLife $
krbMinPwdLife $ krbPwdMinDiffChars $ krbPwdMinLength $
krbPwdHistoryLength $ krbPwdMaxFailure $ krbPwdFailureCountInterval $
krbPwdLockoutDuration $ krbLoginFailedCount ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 1.2.840.113556.1.4.803
(integerBitAndMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: (
1.2.840.113556.1.4.803 NAME 'integerBitAndMatch' APPLIES (
supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency
$ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $
olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $
olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth
$ olcReplicationInterval $ olcSockbufMaxIncoming $
olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $
olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $
olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $
olcChainMaxReferralDepth $ olcDbProtocolVersion $ olcDbConnectionPoolMax
$ olcDDSmaxDynamicObjects $ olcPcacheMaxQueries $ olcRetcodeSleep $
olcSssVlvMax $ olcSssVlvMaxKeys $ olcSpSessionlog $ mailPreferenceOption
$ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $
shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $
ipProtocolNumber $ oncRpcNumber $ suseNextUniqueId $ suseMinUniqueId $
suseMaxUniqueId $ suseMinPasswordLength $ suseMaxPasswordLength $
suseImapDefaultQuota $ krbPrincipalType $ krbTicketFlags $
krbMaxTicketLife $ krbMaxRenewableAge $ krbSearchScope $ krbMaxPwdLife $
krbMinPwdLife $ krbPwdMinDiffChars $ krbPwdMinLength $
krbPwdHistoryLength $ krbPwdMaxFailure $ krbPwdFailureCountInterval $
krbPwdLockoutDuration $ krbLoginFailedCount ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 1.3.6.1.4.1.1466.109.114.2
(caseIgnoreIA5Match):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: (
1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match' APPLIES ( altServer
$ olcDbConfig $ c $ mail $ dc $ associatedDomain $ email $ aRecord $
mDRecord $ mXRecord $ nSRecord $ sOARecord $ cNAMERecord $ janetMailbox
$ gecos $ homeDirectory $ loginShell $ memberUid $ memberNisNetgroup $
nisNetgroupTriple $ ipNetmaskNumber $ macAddress $ bootParameter $
bootFile $ nisMapEntry $ nisDomain $ automountMapName $ automountKey $
automountInformation $ suseNamingAttribute $ susePasswordHash $
suseSkelDir $ krbPrincipalName $ krbCanonicalName $ krbHostServer $
krbPrincipalAliases $ krbAllowedToDelegateTo ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 1.3.6.1.4.1.1466.109.114.1
(caseExactIA5Match):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: (
1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' APPLIES ( altServer
$ olcDbConfig $ c $ mail $ dc $ associatedDomain $ email $ aRecord $
mDRecord $ mXRecord $ nSRecord $ sOARecord $ cNAMERecord $ janetMailbox
$ gecos $ homeDirectory $ loginShell $ memberUid $ memberNisNetgroup $
nisNetgroupTriple $ ipNetmaskNumber $ macAddress $ bootParameter $
bootFile $ nisMapEntry $ nisDomain $ automountMapName $ automountKey $
automountInformation $ suseNamingAttribute $ susePasswordHash $
suseSkelDir $ krbPrincipalName $ krbCanonicalName $ krbHostServer $
krbPrincipalAliases $ krbAllowedToDelegateTo ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.39
(certificateListMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.38
(certificateListExactMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.38 NAME
'certificateListExactMatch' APPLIES ( authorityRevocationList $
certificateRevocationList $ deltaRevocationList ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.35 (certificateMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.34
(certificateExactMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.34 NAME
'certificateExactMatch' APPLIES ( userCertificate $ cACertificate ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.30
(objectIdentifierFirstComponentMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.30 NAME
'objectIdentifierFirstComponentMatch' APPLIES ( supportedControl $
supportedExtension $ supportedFeatures $ ldapSyntaxes $
supportedApplicationContext ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.29
(integerFirstComponentMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.29 NAME
'integerFirstComponentMatch' APPLIES ( supportedLDAPVersion $ entryTtl $
uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $
olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $
olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $
olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval
$ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $
olcToolThreads $ olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $
olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $
olcChainMaxReferralDepth $ olcDbProtocolVersion $ olcDbConnectionPoolMax
$ olcDDSmaxDynamicObjects $ olcPcacheMaxQueries $ olcRetcodeSleep $
olcSssVlvMax $ olcSssVlvMaxKeys $ olcSpSessionlog $ mailPreferenceOption
$ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $
shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $
ipProtocolNumber $ oncRpcNumber $ suseNextUniqueId $ suseMinUniqueId $
suseMaxUniqueId $ suseMinPasswordLength $ suseMaxPasswordLength $
suseImapDefaultQuota $ krbPrincipalType $ krbTicketFlags $
krbMaxTicketLife $ krbMaxRenewableAge $ krbSearchScope $ krbMaxPwdLife $
krbMinPwdLife $ krbPwdMinDiffChars $ krbPwdMinLength $
krbPwdHistoryLength $ krbPwdMaxFailure $ krbPwdFailureCountInterval $
krbPwdLockoutDuration $ krbLoginFailedCount ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.27
(generalizedTimeMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.27 NAME
'generalizedTimeMatch' APPLIES ( createTimestamp $ modifyTimestamp $
pwdChangedTime $ pwdAccountLockedTime $ pwdFailureTime $ pwdGraceUseTime
$ krbPrincipalExpiration $ krbPasswordExpiration $ krbLastPwdChange $
krbLastSuccessfulAuth $ krbLastFailedAuth ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.24
(protocolInformationMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.24 NAME
'protocolInformationMatch' APPLIES protocolInformation )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.23 (uniqueMemberMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.23 NAME
'uniqueMemberMatch' APPLIES uniqueMember )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.22
(presentationAddressMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.22 NAME
'presentationAddressMatch' APPLIES presentationAddress )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.20
(telephoneNumberMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.20 NAME
'telephoneNumberMatch' APPLIES ( telephoneNumber $ homePhone $ mobile $
pager ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.17 (octetStringMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.17 NAME
'octetStringMatch' APPLIES ( userPassword $ olcDbCryptKey $ pwdHistory $
nisPublicKey $ nisSecretKey $ krbPrincipalKey $ krbPwdHistory $ krbMKey
$ krbExtraData ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.16 (bitStringMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.16 NAME
'bitStringMatch' APPLIES x500UniqueIdentifier )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.14 (integerMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.14 NAME
'integerMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $
gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $
olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $
olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $
olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $
olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $
olcToolThreads $ olcWriteTimeout $ olcDbCacheFree $ olcDbCacheSize $
olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $
olcChainMaxReferralDepth $ olcDbProtocolVersion $ olcDbConnectionPoolMax
$ olcDDSmaxDynamicObjects $ olcPcacheMaxQueries $ olcRetcodeSleep $
olcSssVlvMax $ olcSssVlvMaxKeys $ olcSpSessionlog $ mailPreferenceOption
$ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $
shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $
ipProtocolNumber $ oncRpcNumber $ suseNextUniqueId $ suseMinUniqueId $
suseMaxUniqueId $ suseMinPasswordLength $ suseMaxPasswordLength $
suseImapDefaultQuota $ krbPrincipalType $ krbTicketFlags $
krbMaxTicketLife $ krbMaxRenewableAge $ krbSearchScope $ krbMaxPwdLife $
krbMinPwdLife $ krbPwdMinDiffChars $ krbPwdMinLength $
krbPwdHistoryLength $ krbPwdMaxFailure $ krbPwdFailureCountInterval $
krbPwdLockoutDuration $ krbLoginFailedCount ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.13 (booleanMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.13 NAME
'booleanMatch' APPLIES ( hasSubordinates $ olcAddContentAcl $
olcGentleHUP $ olcHidden $ olcLastMod $ olcMirrorMode $ olcMonitoring $
olcReadOnly $ olcReverseLookup $ olcSyncUseSubentry $ olcDbChecksum $
olcDbNoSync $ olcDbDirtyRead $ olcDbLinearIndex $ olcChainCacheURI $
olcChainReturnError $ olcDbRebindAsUser $ olcDbChaseReferrals $
olcDbProxyWhoAmI $ olcDbSingleConn $ olcDbUseTemporaryConn $ olcDbNoRefs
$ olcDbNoUndefFilter $ olcAccessLogSuccess $ olcDDSstate $
olcMemberOfRefInt $ pwdReset $ olcPPolicyHashCleartext $
olcPPolicyForwardUpdates $ olcPPolicyUseLockout $ olcPcachePersist $
olcPcacheValidate $ olcPcacheOffline $ olcRetcodeInDir $
olcRwmNormalizeMapped $ olcRwmDropUnrequested $ olcSpNoPresent $
olcSpReloadHint $ olcTranslucentStrict $ olcTranslucentNoGlue $
olcTranslucentBindLocal $ olcTranslucentPwModLocal $ olcUniqueStrict $
suseImapUseSsl $ krbUPEnabled ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.11 (caseIgnoreListMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.11 NAME
'caseIgnoreListMatch' APPLIES ( postalAddress $ registeredAddress $
homePostalAddress ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.8 (numericStringMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.8 NAME
'numericStringMatch' APPLIES ( x121Address $ internationaliSDNNumber ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.7
(caseExactSubstringsMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.7 NAME
'caseExactSubstringsMatch' APPLIES ( serialNumber $ destinationIndicator
$ dnQualifier ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.6
(caseExactOrderingMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.6 NAME
'caseExactOrderingMatch' APPLIES ( serialNumber $ destinationIndicator $
dnQualifier ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.5 (caseExactMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.5 NAME
'caseExactMatch' APPLIES ( supportedSASLMechanisms $ vendorName $
vendorVersion $ ref $ name $ cn $ uid $ labeledURI $ description $
olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $
olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $
olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $
olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $
olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $
olcObjectClasses $ olcObjectIdentifier $ olcOverlay $
olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $
olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $
olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $
olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $
olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals
$ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $
olcTLSCACertificateFile $ olcTLSCACertificatePath $
olcTLSCertificateFile $ olcTLSCertificateKeyFile $ olcTLSCipherSuite $
olcTLSCRLCheck $ olcTLSCRLFile $ olcTLSRandFile $ olcTLSVerifyClient $
olcTLSDHParamFile $ olcTLSProtocolMin $ olcUpdateRef $ olcDbDirectory $
olcDbCheckpoint $ olcDbCryptFile $ olcDbPageSize $ olcDbIndex $
olcDbLockDetect $ olcDbMode $ olcChainingBehavior $ olcDbURI $
olcDbStartTLS $ olcDbACLPasswd $ olcDbACLBind $ olcDbIDAssertPasswd $
olcDbIDAssertBind $ olcDbIDAssertMode $ olcDbIDAssertAuthzFrom $
olcDbTFSupport $ olcDbTimeout $ olcDbIdleTimeout $ olcDbConnTtl $
olcDbNetworkTimeout $ olcDbCancel $ olcDbQuarantine $ olcAccessLogOps $
olcAccessLogPurge $ olcAccessLogOld $ olcAccessLogOldAttr $
olcAuditlogFile $ olcCollectInfo $ olcConstraintAttribute $ olcDDSmaxTtl
$ olcDDSminTtl $ olcDDSdefaultTtl $ olcDDSinterval $ olcDDStolerance $
olcDGAttrPair $ olcDlAttrSet $ olcMemberOfDangling $ olcMemberOfGroupOC
$ olcMemberOfMemberAD $ olcMemberOfMemberOfAD $ olcMemberOfDanglingError
$ olcPcache $ olcPcacheAttrset $ olcPcacheTemplate $ olcPcachePosition $
olcPcacheBind $ olcRefintAttribute $ olcRetcodeItem $ olcRwmRewrite $
olcRwmTFSupport $ olcRwmMap $ olcSpCheckpoint $ olcTranslucentLocal $
olcTranslucentRemote $ olcUniqueIgnore $ olcUniqueAttribute $
olcUniqueURI $ olcValSortAttr $ knowledgeInformation $ sn $ serialNumber
$ c $ l $ st $ street $ o $ ou $ title $ businessCategory $ postalCode $
postOfficeBox $ physicalDeliveryOfficeName $ destinationIndicator $
givenName $ initials $ generationQualifier $ dnQualifier $
houseIdentifier $ dmdName $ pseudonym $ textEncodedORAddress $ info $
drink $ roomNumber $ userClass $ host $ documentIdentifier $
documentTitle $ documentVersion $ documentLocation $ personalTitle $ co
$ uniqueIdentifier $ organizationalStatus $ buildingName $
documentPublisher $ carLicense $ departmentNumber $ displayName $
employeeNumber $ employeeType $ preferredLanguage $ ipServiceProtocol $
ipHostNumber $ ipNetworkNumber $ nisMapName $ suseSearchFilter $
suseDefaultValue $ susePlugin $ suseMapAttribute $ suseImapServer $
suseImapAdmin $ krbLdapServers $ krbPrincNamingAttr $
krbDefaultEncSaltTypes $ krbSupportedEncSaltTypes ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.4
(caseIgnoreSubstringsMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.4 NAME
'caseIgnoreSubstringsMatch' APPLIES ( serialNumber $
destinationIndicator $ dnQualifier ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.3
(caseIgnoreOrderingMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.3 NAME
'caseIgnoreOrderingMatch' APPLIES ( serialNumber $ destinationIndicator
$ dnQualifier ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.2 (caseIgnoreMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.2 NAME
'caseIgnoreMatch' APPLIES ( supportedSASLMechanisms $ vendorName $
vendorVersion $ ref $ name $ cn $ uid $ labeledURI $ description $
olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $
olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $
olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $
olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $
olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $
olcObjectClasses $ olcObjectIdentifier $ olcOverlay $
olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $
olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $
olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $
olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $
olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals
$ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $
olcTLSCACertificateFile $ olcTLSCACertificatePath $
olcTLSCertificateFile $ olcTLSCertificateKeyFile $ olcTLSCipherSuite $
olcTLSCRLCheck $ olcTLSCRLFile $ olcTLSRandFile $ olcTLSVerifyClient $
olcTLSDHParamFile $ olcTLSProtocolMin $ olcUpdateRef $ olcDbDirectory $
olcDbCheckpoint $ olcDbCryptFile $ olcDbPageSize $ olcDbIndex $
olcDbLockDetect $ olcDbMode $ olcChainingBehavior $ olcDbURI $
olcDbStartTLS $ olcDbACLPasswd $ olcDbACLBind $ olcDbIDAssertPasswd $
olcDbIDAssertBind $ olcDbIDAssertMode $ olcDbIDAssertAuthzFrom $
olcDbTFSupport $ olcDbTimeout $ olcDbIdleTimeout $ olcDbConnTtl $
olcDbNetworkTimeout $ olcDbCancel $ olcDbQuarantine $ olcAccessLogOps $
olcAccessLogPurge $ olcAccessLogOld $ olcAccessLogOldAttr $
olcAuditlogFile $ olcCollectInfo $ olcConstraintAttribute $ olcDDSmaxTtl
$ olcDDSminTtl $ olcDDSdefaultTtl $ olcDDSinterval $ olcDDStolerance $
olcDGAttrPair $ olcDlAttrSet $ olcMemberOfDangling $ olcMemberOfGroupOC
$ olcMemberOfMemberAD $ olcMemberOfMemberOfAD $ olcMemberOfDanglingError
$ olcPcache $ olcPcacheAttrset $ olcPcacheTemplate $ olcPcachePosition $
olcPcacheBind $ olcRefintAttribute $ olcRetcodeItem $ olcRwmRewrite $
olcRwmTFSupport $ olcRwmMap $ olcSpCheckpoint $ olcTranslucentLocal $
olcTranslucentRemote $ olcUniqueIgnore $ olcUniqueAttribute $
olcUniqueURI $ olcValSortAttr $ knowledgeInformation $ sn $ serialNumber
$ c $ l $ st $ street $ o $ ou $ title $ businessCategory $ postalCode $
postOfficeBox $ physicalDeliveryOfficeName $ destinationIndicator $
givenName $ initials $ generationQualifier $ dnQualifier $
houseIdentifier $ dmdName $ pseudonym $ textEncodedORAddress $ info $
drink $ roomNumber $ userClass $ host $ documentIdentifier $
documentTitle $ documentVersion $ documentLocation $ personalTitle $ co
$ uniqueIdentifier $ organizationalStatus $ buildingName $
documentPublisher $ carLicense $ departmentNumber $ displayName $
employeeNumber $ employeeType $ preferredLanguage $ ipServiceProtocol $
ipHostNumber $ ipNetworkNumber $ nisMapName $ suseSearchFilter $
suseDefaultValue $ susePlugin $ suseMapAttribute $ suseImapServer $
suseImapAdmin $ krbLdapServers $ krbPrincNamingAttr $
krbDefaultEncSaltTypes $ krbSupportedEncSaltTypes ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 1.2.36.79672281.1.13.3
(rdnMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.1
(distinguishedNameMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.1 NAME
'distinguishedNameMatch' APPLIES ( creatorsName $ modifiersName $
subschemaSubentry $ entryDN $ namingContexts $ aliasedObjectName $
dynamicSubtrees $ distinguishedName $ seeAlso $ olcDefaultSearchBase $
olcRootDN $ olcSchemaDN $ olcSuffix $ olcUpdateDN $ olcDbACLAuthcDn $
olcDbIDAssertAuthcDn $ olcRelay $ olcAccessLogDB $ memberOf $
olcMemberOfDN $ pwdPolicySubentry $ olcPPolicyDefault $ olcRefintNothing
$ olcRefintModifiersName $ olcRetcodeParent $ olcUniqueBase $ member $
owner $ roleOccupant $ manager $ documentAuthor $ secretary $
associatedName $ dITRedirect $ suseDefaultBase $ suseDefaultTemplate $
suseSecondaryGroup $ krbRealmReferences $ krbKdcServers $ krbPwdServers
$ krbPrincipalReferences $ krbAdmServers $ krbPwdPolicyReference $
krbTicketPolicyReference $ krbSubTrees $ krbObjectReferences $
krbPrincContainerRef ) )
Nov 22 18:22:53 mgaauth1 slapd[12638]: 2.5.13.0
(objectIdentifierMatch):
Nov 22 18:22:53 mgaauth1 slapd[12638]: matchingRuleUse: ( 2.5.13.0 NAME
'objectIdentifierMatch' APPLIES ( supportedControl $ supportedExtension
$ supportedFeatures $ supportedApplicationContext ) )
Nov 22 18:22:53 mgaauth1 slapd[12651]: slapd startup: initiated.
Nov 22 18:22:53 mgaauth1 slapd[12651]: backend_startup_one: starting
"cn=config"
Nov 22 18:22:53 mgaauth1 slapd[12651]: config_back_db_open
Nov 22 18:22:53 mgaauth1 slapd[12651]: send_ldap_result: conn=-1 op=0 p=0
Nov 22 18:22:53 mgaauth1 slapd[12651]: send_ldap_result: err=0
matched="" text=""
Nov 22 18:22:53 mgaauth1 slapd[12651]: backend_startup_one: starting
"dc=ls,dc=cbn"
Nov 22 18:22:53 mgaauth1 slapd[12651]: hdb_db_open: "dc=ls,dc=cbn"
Nov 22 18:22:53 mgaauth1 slapd[12651]: hdb_db_open: database
"dc=ls,dc=cbn": dbenv_open(/var/lib/ldap).
Nov 22 18:22:53 mgaauth1 slapd[12651]: hdb_monitor_db_open: monitoring
disabled; configure monitor database to enable
Nov 22 18:22:53 mgaauth1 slapd[12651]: slapd starting
Nov 22 18:22:53 mgaauth1 slapd[12651]: =>do_syncrepl rid=002
Nov 22 18:22:53 mgaauth1 slapd[12651]: => bdb_entry_get: ndn: "dc=ls,dc=cbn"
Nov 22 18:22:53 mgaauth1 slapd[12651]: => bdb_entry_get: oc: "(null)",
at: "contextCSN"
Nov 22 18:22:53 mgaauth1 slapd[12651]: bdb_dn2entry("dc=ls,dc=cbn")
Nov 22 18:22:53 mgaauth1 slapd[12651]: => hdb_dn2id("dc=ls,dc=cbn")
Nov 22 18:22:53 mgaauth1 slapd[12651]: <= hdb_dn2id: got id=0x1
Nov 22 18:22:53 mgaauth1 slapd[12651]: entry_decode: ""
Nov 22 18:22:53 mgaauth1 slapd[12651]: <= entry_decode()
Nov 22 18:22:53 mgaauth1 slapd[12651]: bdb_entry_get: rc=0
Nov 22 18:22:53 mgaauth1 slapd[12651]: =>do_syncrep2 rid=002
Nov 22 18:22:53 mgaauth1 slapd[12651]: do_syncrep2: rid=002
LDAP_RES_SEARCH_RESULT
Nov 22 18:22:54 mgaauth1 slapd[12651]: slap_listener_activate(7):
Nov 22 18:22:54 mgaauth1 slapd[12651]: >>> slap_listener(ldap://)
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 fd=13 ACCEPT from
IP=127.0.0.1:33205 (IP=0.0.0.0:389)
Nov 22 18:22:54 mgaauth1 slapd[12651]: connection_get(13)
Nov 22 18:22:54 mgaauth1 slapd[12651]: connection_get(13): got connid=1000
Nov 22 18:22:54 mgaauth1 slapd[12651]: connection_read(13): checking for
input on id=1000
Nov 22 18:22:54 mgaauth1 slapd[12651]: op tag 0x60, time 1290471774
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 op=0 do_bind
Nov 22 18:22:54 mgaauth1 slapd[12651]: >>> dnPrettyNormal: <>
Nov 22 18:22:54 mgaauth1 slapd[12651]: <<< dnPrettyNormal: <>, <>
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 op=0 BIND dn="" method=128
Nov 22 18:22:54 mgaauth1 slapd[12651]: do_bind: version=3 dn="" method=128
Nov 22 18:22:54 mgaauth1 slapd[12651]: send_ldap_result: conn=1000 op=0 p=3
Nov 22 18:22:54 mgaauth1 slapd[12651]: send_ldap_result: err=0
matched="" text=""
Nov 22 18:22:54 mgaauth1 slapd[12651]: send_ldap_response: msgid=1
tag=97 err=0
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 op=0 RESULT tag=97
err=0 text=
Nov 22 18:22:54 mgaauth1 slapd[12651]: do_bind: v3 anonymous bind
Nov 22 18:22:54 mgaauth1 slapd[12651]: connection_get(13)
Nov 22 18:22:54 mgaauth1 slapd[12651]: connection_get(13): got connid=1000
Nov 22 18:22:54 mgaauth1 slapd[12651]: connection_read(13): checking for
input on id=1000
Nov 22 18:22:54 mgaauth1 slapd[12651]: op tag 0x63, time 1290471774
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 op=1 do_search
Nov 22 18:22:54 mgaauth1 slapd[12651]: >>> dnPrettyNormal: <>
Nov 22 18:22:54 mgaauth1 slapd[12651]: <<< dnPrettyNormal: <>, <>
Nov 22 18:22:54 mgaauth1 slapd[12651]: SRCH "" 0 0
Nov 22 18:22:54 mgaauth1 slapd[12651]: 0 0 0
Nov 22 18:22:54 mgaauth1 slapd[12651]: filter: (objectClass=*)
Nov 22 18:22:54 mgaauth1 slapd[12651]: attrs:
Nov 22 18:22:54 mgaauth1 slapd[12651]:
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 op=1 SRCH base=""
scope=0 deref=0 filter="(objectClass=*)"
Nov 22 18:22:54 mgaauth1 slapd[12651]: => send_search_entry: conn 1000 dn=""
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 op=1 ENTRY dn=""
Nov 22 18:22:54 mgaauth1 slapd[12651]: <= send_search_entry: conn 1000 exit.
Nov 22 18:22:54 mgaauth1 slapd[12651]: send_ldap_result: conn=1000 op=1 p=3
Nov 22 18:22:54 mgaauth1 slapd[12651]: send_ldap_result: err=0
matched="" text=""
Nov 22 18:22:54 mgaauth1 slapd[12651]: send_ldap_response: msgid=2
tag=101 err=0
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 op=1 SEARCH RESULT
tag=101 err=0 nentries=1 text=
Nov 22 18:22:54 mgaauth1 slapd[12651]: connection_get(13)
Nov 22 18:22:54 mgaauth1 slapd[12651]: connection_get(13): got connid=1000
Nov 22 18:22:54 mgaauth1 slapd[12651]: connection_read(13): checking for
input on id=1000
Nov 22 18:22:54 mgaauth1 slapd[12651]: op tag 0x42, time 1290471774
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 op=2 do_unbind
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 op=2 UNBIND
Nov 22 18:22:54 mgaauth1 slapd[12651]: connection_close: conn=1000 sd=13
Nov 22 18:22:54 mgaauth1 slapd[12651]: conn=1000 fd=13 closed
Any idea what could be going on?
Thanks,
--
Bram Cymet
Software Developer
Canadian Bank Note Co. Ltd.
Cell: 613-608-9752