Český statistický úřad rozšiřuje Statistický geoportál o Datový portál GIS s otevřenými geografickými daty. Ten umožňuje stahování datových sad podle potřeb uživatelů i jejich prohlížení v mapě a přináší nové možnosti v oblasti analýzy a využití statistických dat.
Kevin Lin zkouší využívat chytré brýle Mentra při hraní na piano. Vytváří aplikaci AugmentedChords, pomocí které si do brýlí posílá notový zápis (YouTube). Uvnitř brýlí běží AugmentOS (GitHub), tj. open source operační systém pro chytré brýle.
Jarní konference EurOpen.cz 2025 proběhne 26. až 28. května v Brandýse nad Labem. Věnována je programovacím jazykům, vývoji softwaru a programovacím technikám.
Na čem aktuálně pracují vývojáři GNOME a KDE Plasma? Pravidelný přehled novinek v Týden v GNOME a Týden v KDE Plasma.
Před 25 lety zaplavil celý svět virus ILOVEYOU. Virus se šířil e-mailem, jenž nesl přílohu s názvem I Love You. Příjemci, zvědavému, kdo se do něj zamiloval, pak program spuštěný otevřením přílohy načetl z adresáře e-mailové adresy a na ně pak „milostný vzkaz“ poslal dál. Škody vznikaly jak zahlcením e-mailových serverů, tak i druhou činností viru, kterou bylo přemazání souborů uložených v napadeném počítači.
Byla vydána nová major verze 5.0.0 svobodného multiplatformního nástroje BleachBit (GitHub, Wikipedie) určeného především k efektivnímu čištění disku od nepotřebných souborů.
Na čem pracují vývojáři webového prohlížeče Ladybird (GitHub)? Byl publikován přehled vývoje za duben (YouTube).
Provozovatel čínské sociální sítě TikTok dostal v Evropské unii pokutu 530 milionů eur (13,2 miliardy Kč) za nedostatky při ochraně osobních údajů. Ve svém oznámení to dnes uvedla irská Komise pro ochranu údajů (DPC), která jedná jménem EU. Zároveň TikToku nařídila, že pokud správu dat neuvede do šesti měsíců do souladu s požadavky, musí přestat posílat data o unijních uživatelích do Číny. TikTok uvedl, že se proti rozhodnutí odvolá.
Společnost JetBrains uvolnila Mellum, tj. svůj velký jazykový model (LLM) pro vývojáře, jako open source. Mellum podporuje programovací jazyky Java, Kotlin, Python, Go, PHP, C, C++, C#, JavaScript, TypeScript, CSS, HTML, Rust a Ruby.
Vývojáři Kali Linuxu upozorňují na nový klíč pro podepisování balíčků. K původnímu klíči ztratili přístup.
cat /usr/local/etc/openldap/ldap.conf # # LDAP Defaults # # See ldap.conf(5) for details # This file should be world readable but not world writable. BASE dc=test, dc=cz URI ldap://127.0.0.1/ #ldap://ldap-master.example.com:666 #SIZELIMIT 12 #TIMELIMIT 15 #DEREF never #
cat /usr/local/etc/openldap/slapd.conf # # See slapd.conf(5) for details on configuration options. # This file should NOT be world readable. # include /usr/local/etc/openldap/schema/core.schema include /usr/local/etc/openldap/schema/cosine.schema include /usr/local/etc/openldap/schema/inetorgperson.schema include /usr/local/etc/openldap/schema/nis.schema # Define global ACLs to disable default read access. # Do not enable referrals until AFTER you have a working directory # service AND an understanding of referrals. #referral ldap://root.openldap.org #loglevel 255 # pro debugging, do logu se dostane takka ve. Pozdji snite. pidfile /var/run/openldap/slapd.pid argsfile /var/run/openldap/slapd.args # Load dynamic backend modules: modulepath /usr/local/libexec/openldap moduleload back_bdb # moduleload back_ldap # moduleload back_ldbm # moduleload back_passwd # moduleload back_shell # Sample security restrictions # Require integrity protection (prevent hijacking) # Require 112-bit (3DES or better) encryption for updates # Require 63-bit encryption for simple bind # security ssf=1 update_ssf=112 simple_bind=64 # Sample access control policy: # Root DSE: allow anyone to read it # Subschema (sub)entry DSE: allow anyone to read it # Other DSEs: # Allow self write access # Allow authenticated users read access # Allow anonymous users to authenticate # Directives needed to implement policy: # access to dn.base="" by * read # access to dn.base="cn=Subschema" by * read # access to * # by self write # by users read # by anonymous auth # # if no access controls are present, the default policy # allows anyone and everyone to read anything but restricts # updates to rootdn. (e.g., "access to * by * read") # # rootdn can always read and write EVERYTHING! #allow bind_v2 # abyste mohli pouvat LDAP funkce PHP password-hash {SSHA} # nebo njakou jinou; vyberte si z SMD5, SHA, SSHA, CRYPT ####################################################################### # BDB database definitions ####################################################################### database bdb suffix "dc=test,dc=cz" rootdn "cn=root,dc=test,dc=cz" # Cleartext passwords, especially for the rootdn, should # be avoid. See slappasswd(8) and slapd.conf(5) for details. # Use of strong authentication encouraged. rootpw {SSHA}GPtyCSYW9X9+Qsx8FKGNehYjFjjQePdt # The database directory MUST exist prior to running slapd AND # should only be accessible by the slapd and slap tools. # Mode 700 recommended. directory /var/db/openldap-data # Indices to maintain index objectClass eq #
cat /usr/local/etc/ldap.conf suffix "dc=test, dc=cz" host 127.0.0.1 #uri ldaps://ldap.test.cz/ pam_password md5 ldap_version 3 bind_policy soft pam_filter objectclass=posixAccount pam_login_attribute uid pam_member_attribute memberuid nss_base_passwd ou=People,dc=test,dc=cz nss_base_shadow ou=People,dc=test,dc=cz nss_base_group ou=Group,dc=test,dc=cz #nss_reconnect_sleeptime #nss_reconnect_maxsleeptime #nss_reconnect_maxconntries directives scope one
cat /etc/pam.d/system #%PAM-1.0 auth required pam_env.so auth sufficient pam_unix.so likeauth nullok auth sufficient /usr/local/lib/pam_ldap.so use_first_pass auth required pam_deny.so account required pam_unix.so account sufficient /usr/local/lib/pam_ldap.so password required pam_cracklib.so difok=2 minlen=8 dcredit=2 ocredit=2 retry=3 password sufficient pam_unix.so nullok md5 shadow use_authtok password sufficient /usr/local/lib/pam_ldap.so use_authtok password required pam_deny.so session required pam_limits.so session required pam_unix.so session optional /usr/local/lib/pam_ldap.so
cat /etc/pam.d/sshd # # $FreeBSD: src/etc/pam.d/sshd,v 1.16.10.1.2.1 2009/10/25 01:10:29 kensmith Exp $ # # PAM configuration for the "sshd" service # # auth auth sufficient pam_opie.so no_warn no_fake_prompts auth requisite pam_opieaccess.so no_warn allow_local #auth sufficient pam_krb5.so no_warn try_first_pass #auth sufficient pam_ssh.so no_warn try_first_pass auth sufficient /usr/local/lib/pam_ldap.so no_warn try_first_pass auth required pam_unix.so no_warn try_first_pass # account account required pam_nologin.so #account required pam_krb5.so account required pam_login_access.so account sufficient /usr/local/lib/pam_ldap.so account required pam_unix.so # session #session optional pam_ssh.so session sufficient /usr/local/lib/pam_ldap.so session required pam_permit.so # password #password sufficient pam_krb5.so no_warn try_first_pass password sufficient /usr/local/lib/pam_ldap.so password required pam_unix.so no_warn try_first_pass
cat /etc/nsswitch.conf # # nsswitch.conf(5) - name service switch configuration file # $FreeBSD: src/etc/nsswitch.conf,v 1.1.10.1.2.1 2009/10/25 01:10:29 kensmith Exp $ # group: files ldap group_compat: nis hosts: files dns networks: files passwd: files ldap passwd_compat: nis shells: files services: compat services_compat: nis protocols: files rpc: filesPo nastartování OpenLDAP mi vyhodí do logu:
Jun 14 12:11:49 freebsd sshd[5132]: pam_ldap: ldap_simple_bind Can't contact LDAP server Jun 14 12:11:49 freebsd sshd[5132]: pam_ldap: reconnecting to LDAP server... Jun 14 12:11:49 freebsd sshd[5132]: pam_ldap: ldap_simple_bind Can't contact LDAP serverpokud se snažím připojit pomocí ssh tak:
sshd[5132]: in _openpam_check_error_code(): pam_sm_acct_mgmt(): unexpected return value 12a pokud pomocí su z konzole tak:
su root su: pam_start: system errorMohl by mi někdo poradit co dělám špatně? Uživatele mám převedené pomocí scriptů. A pokud zadám ldapsearch -x -D "cn=root,dc=test,dc=cz" -W tak to taky správně vše vypíše.
auth.log Jun 14 19:28:54 freebsd sshd[5261]: pam_ldap: error trying to bind as user "uid=root,ou=People,dc=test,dc=cz" (Invalid credentials) Jun 14 19:28:54 freebsd sshd[5259]: Accepted keyboard-interactive/pam for root from 192.168.56.1 port 40699 ssh2
debug.log Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=sshd,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=sshd,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=sshd,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=smmsp,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=smmsp,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=smmsp,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=smmsp,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=smmsp,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=smmsp,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=mailnull,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=mailnull,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=mailnull,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=mailnull,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=mailnull,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=mailnull,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=guest,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=guest,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=guest,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=guest,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=guest,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=guest,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=bind,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=bind,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=bind,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=bind,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=bind,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=bind,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=proxy,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=proxy,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=proxy,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=proxy,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=proxy,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=proxy,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=authpf,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=authpf,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=authpf,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=authpf,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=authpf,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=authpf,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=_pflogd,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=_pflogd,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_pflogd,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_pflogd,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_pflogd,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_pflogd,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=_dhcp,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=_dhcp,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_dhcp,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_dhcp,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_dhcp,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_dhcp,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=uucp,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=uucp,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=uucp,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=uucp,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=uucp,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=uucp,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=dialer,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=dialer,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=dialer,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=dialer,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=dialer,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=dialer,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=network,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=network,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=network,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=network,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=network,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=network,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=audit,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=audit,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=audit,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=audit,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=audit,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=audit,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=www,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=www,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=www,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=www,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=www,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=www,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=nogroup,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=nogroup,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nogroup,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nogroup,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nogroup,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nogroup,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=nobody,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=nobody,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nobody,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nobody,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nobody,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nobody,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=ldap,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=ldap,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=ldap,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=ldap,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=ldap,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=ldap,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=freeradius,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=freeradius,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=freeradius,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=freeradius,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=freeradius,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=freeradius,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=pheek,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=pheek,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=pheek,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=pheek,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=pheek,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=pheek,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=test,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=test,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=test,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=test,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=test,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=test,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: send_paged_response: lastid=0x00000000 nentries=33 Jun 14 19:30:07 freebsd slapd[5211]: send_ldap_result: conn=10 op=1 p=3 Jun 14 19:30:07 freebsd slapd[5211]: send_ldap_result: err=0 matched="" text="" Jun 14 19:30:07 freebsd slapd[5211]: send_ldap_response: msgid=2 tag=101 err=0 Jun 14 19:30:07 freebsd slapd[5211]: daemon: activity on 1 descriptor Jun 14 19:30:07 freebsd slapd[5211]: daemon: activity on: Jun 14 19:30:07 freebsd slapd[5211]: 11r Jun 14 19:30:07 freebsd slapd[5211]: Jun 14 19:30:07 freebsd slapd[5211]: daemon: read activity on 11 Jun 14 19:30:07 freebsd slapd[5211]: daemon: select: listen=6 active_threads=0 tvp=NULL Jun 14 19:30:07 freebsd slapd[5211]: daemon: select: listen=7 active_threads=0 tvp=NULL Jun 14 19:30:07 freebsd slapd[5211]: connection_get(11) Jun 14 19:30:07 freebsd slapd[5211]: connection_get(11): got connid=10 Jun 14 19:30:07 freebsd slapd[5211]: connection_read(11): checking for input on id=10 Jun 14 19:30:07 freebsd slapd[5211]: ber_get_next on fd 11 failed errno=0 (Undefined error: 0) Jun 14 19:30:07 freebsd slapd[5211]: connection_read(11): input error=-2 id=10, closing. Jun 14 19:30:07 freebsd slapd[5211]: connection_closing: readying conn=10 sd=11 for close Jun 14 19:30:07 freebsd slapd[5211]: daemon: activity on 1 descriptor Jun 14 19:30:07 freebsd slapd[5211]: daemon: waked Jun 14 19:30:07 freebsd slapd[5211]: daemon: select: listen=6 active_threads=0 tvp=NULL Jun 14 19:30:07 freebsd slapd[5211]: daemon: select: listen=7 active_threads=0 tvp=NULL Jun 14 19:30:07 freebsd slapd[5211]: connection_close: conn=10 sd=11 Jun 14 19:30:07 freebsd slapd[5211]: daemon: removing 11
messages Jun 14 19:28:54 freebsd sshd[5261]: pam_ldap: error trying to bind as user "uid=root,ou=People,dc=test,dc=cz" (Invalid credentials)
Jun 14 19:28:54 freebsd slapd[5211]: >>> dnPrettyNormal: uid=root,ou=People,dc=test,dc=cz
Jun 14 19:28:54 freebsd slapd[5211]: <<< dnPrettyNormal: uid=root,ou=People,dc=test,dc=cz, uid=root,ou=people,dc=test,dc=cz
Jun 14 19:28:54 freebsd slapd[5211]: do_bind: version=3 dn="uid=root,ou=People,dc=test,dc=cz" method=128
Jun 14 19:28:54 freebsd slapd[5211]: ==> bdb_bind: dn: uid=root,ou=People,dc=test,dc=cz
Jun 14 19:28:54 freebsd slapd[5211]: bdb_dn2entry("uid=root,ou=people,dc=test,dc=cz")
Jun 14 19:28:54 freebsd slapd[5211]: => access_allowed: auth access to "uid=root,ou=People,dc=test,dc=cz" "userPassword" requested
Jun 14 19:28:54 freebsd slapd[5211]: => slap_access_allowed: backend default auth access granted to "(anonymous)"
Jun 14 19:28:54 freebsd slapd[5211]: => access_allowed: auth access granted by read(=rscxd)
Jun 14 19:28:54 freebsd slapd[5211]: send_ldap_result: conn=8 op=3 p=3
Jun 14 19:28:54 freebsd slapd[5211]: send_ldap_result: err=49 matched="" text=""
Jun 14 19:28:54 freebsd slapd[5211]: send_ldap_response: msgid=4 tag=97 err=49
cat ldap.conf host 127.0.0.1 suffix "dc=test, dc=cz" uri ldap://127.0.0.1 pam_password md5 ldap_version 3 bind_policy soft pam_filter objectclass=posixAccount pam_login_attribute uid pam_member_attribute memberuid nss_base_passwd ou=People,dc=test,dc=cz nss_base_shadow ou=People,dc=test,dc=cz nss_base_group ou=Group,dc=test,dc=cz scope one
binddn "cn=root,dc=test,dc=cz"
bindpw {SSHA}GPtyCSYW9X9+Qsx8FKGNehYjFjjQePdt
debug.log Jun 14 20:18:37 freebsd slapd[5685]: matchingRuleUse: ( 2.5.13.5 NAME 'caseExactMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ cn $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olcT Jun 14 20:18:37 freebsd slapd[5685]: matchingRuleUse: ( 2.5.13.2 NAME 'caseIgnoreMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ cn $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olc Jun 14 20:20:10 freebsd slapd[5686]: send_ldap_result: err=34 matched="" text="invalid DN" Jun 14 20:20:10 freebsd slapd[5686]: send_ldap_response: msgid=1 tag=97 err=34 Jun 14 20:20:10 freebsd slapd[5686]: ber_get_next on fd 11 failed errno=0 (Undefined error: 0) Jun 14 20:20:10 freebsd slapd[5686]: connection_read(11): input error=-2 id=0, closing. Jun 14 20:20:10 freebsd slapd[5686]: connection_close: deferring conn=0 sd=11Nevím jak v freebsd restartovat pam, ostatní logy mlčí. Při pokus se přihlásit:
debug.log Jun 14 20:20:39 freebsd slapd[5686]: send_ldap_result: err=34 matched="" text="invalid DN" Jun 14 20:20:39 freebsd slapd[5686]: send_ldap_response: msgid=1 tag=97 err=34 Jun 14 20:20:41 freebsd slapd[5686]: send_ldap_result: err=34 matched="" text="invalid DN" Jun 14 20:20:41 freebsd slapd[5686]: send_ldap_response: msgid=2 tag=97 err=34 Jun 14 20:20:41 freebsd slapd[5686]: ber_get_next on fd 11 failed errno=0 (Undefined error: 0) Jun 14 20:20:41 freebsd slapd[5686]: connection_read(11): input error=-2 id=1, closing. Jun 14 20:20:41 freebsd slapd[5686]: send_ldap_result: err=34 matched="" text="invalid DN" Jun 14 20:20:41 freebsd slapd[5686]: send_ldap_response: msgid=1 tag=97 err=34
auth.log Jun 14 20:20:39 freebsd sshd[5691]: pam_ldap: error trying to bind (Invalid DN syntax) Jun 14 20:20:41 freebsd sshd[5691]: pam_ldap: error trying to bind (Invalid DN syntax) Jun 14 20:20:41 freebsd sshd[5689]: Accepted keyboard-interactive/pam for root from 192.168.56.1 port 60097 ssh2 Jun 14 20:20:41 freebsd sshd[5692]: nss_ldap: failed to bind to LDAP server ldap://127.0.0.1: Invalid DN syntax
message Jun 14 20:18:37 freebsd slapd[5685]: nss_ldap: could not search LDAP server - Server is unavailable Jun 14 20:20:39 freebsd sshd[5691]: pam_ldap: error trying to bind (Invalid DN syntax) Jun 14 20:20:41 freebsd sshd[5691]: pam_ldap: error trying to bind (Invalid DN syntax)
debug.log Jun 14 20:31:29 freebsd slapd[5754]: daemon: shutdown requested and initiated. Jun 14 20:31:29 freebsd slapd[5754]: daemon: closing 6 Jun 14 20:31:29 freebsd slapd[5754]: daemon: closing 7 Jun 14 20:31:29 freebsd slapd[5754]: slapd shutdown: waiting for 0 operations/tasks to finish Jun 14 20:31:29 freebsd slapd[5754]: slapd shutdown: initiated Jun 14 20:31:29 freebsd slapd[5754]: ====> bdb_cache_release_all Jun 14 20:31:29 freebsd slapd[5754]: slapd destroy: freeing system resources. Jun 14 20:31:29 freebsd slapd[5754]: slapd stopped. Jun 14 20:31:29 freebsd slapd[5797]: @(#) $OpenLDAP: slapd 2.4.18 (Sep 9 2009 07:45:36) $ root@freebsd.org:/work/a/ports/net/openldap24-server/work/openldap-2.4.18/servers/slapd Jun 14 20:31:29 freebsd slapd[5797]: line 18 (pidfile /var/run/openldap/slapd.pid) Jun 14 20:31:29 freebsd slapd[5797]: line 19 (argsfile /var/run/openldap/slapd.args) Jun 14 20:31:29 freebsd slapd[5797]: line 22 (modulepath /usr/local/libexec/openldap) Jun 14 20:31:29 freebsd slapd[5797]: line 23 (moduleload back_bdb) Jun 14 20:31:29 freebsd slapd[5797]: loaded module back_bdb Jun 14 20:31:29 freebsd slapd[5797]: bdb_back_initialize: initialize BDB backend Jun 14 20:31:29 freebsd slapd[5797]: bdb_back_initialize: Berkeley DB 4.6.21: (September 27, 2007) Jun 14 20:31:29 freebsd slapd[5797]: module back_bdb: null module registered Jun 14 20:31:29 freebsd slapd[5797]: line 53 (password-hash {SSHA}) Jun 14 20:31:29 freebsd slapd[5797]: line 59 (database bdb) Jun 14 20:31:29 freebsd slapd[5797]: bdb_db_init: Initializing BDB database Jun 14 20:31:29 freebsd slapd[5797]: line 60 (suffix "=test,=cz") Jun 14 20:31:29 freebsd slapd[5797]: >>> dnPrettyNormal: <=test,=cz> Jun 14 20:31:29 freebsd slapd[5797]: <<< dnPrettyNormal: <=test,=cz>, <=test,=cz> Jun 14 20:31:29 freebsd slapd[5797]: line 61 (rootdn "=root,=test,=cz") Jun 14 20:31:29 freebsd slapd[5797]: >>> dnPrettyNormal: <=root,=test,=cz> Jun 14 20:31:29 freebsd slapd[5797]: <<< dnPrettyNormal: <=root,=test,=cz>, <=root,=test,=cz> Jun 14 20:31:29 freebsd slapd[5797]: line 65 (rootpw ***) Jun 14 20:31:29 freebsd slapd[5797]: line 69 (directory /var/db/openldap-data) Jun 14 20:31:29 freebsd slapd[5797]: line 71 (index objectClass eq) Jun 14 20:31:29 freebsd slapd[5797]: index objectClass 0x0004 Jun 14 20:31:29 freebsd slapd[5797]: >>> dnNormalize: <=Subschema> Jun 14 20:31:29 freebsd slapd[5797]: <<< dnNormalize: <=subschema> Jun 14 20:31:29 freebsd slapd[5797]: matching_rule_use_init Jun 14 20:31:29 freebsd slapd[5797]: 1.2.840.113556.1.4.804 (integerBitOrMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 1.2.840.113556.1.4.804 NAME 'integerBitOrMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcSpSessionlog $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpumber ) ) Jun 14 20:31:29 freebsd slapd[5797]: 1.2.840.113556.1.4.803 (integerBitAndMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 1.2.840.113556.1.4.803 NAME 'integerBitAndMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcSpSessionlog $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpumber ) ) Jun 14 20:31:29 freebsd slapd[5797]: 1.3.6.1.4.1.1466.109.114.2 (caseIgnoreIA5Match): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match' APPLIES ( altServer $ olcDbConfig $ c $ mail $ $ associatedDomain $ email $ aRecord $ mDRecord $ mXRecord $ nSRecord $ sOARecord $ AMERecord $ janetMailbox $ gecos $ homeDirectory $ loginShell $ memberUid $ memberNisNetgroup $ ipHostNumber $ ipNetworkNumber $ ipNetmaskNumber $ macAddress $ bootFile $ nisMapEntry ) ) Jun 14 20:31:29 freebsd slapd[5797]: 1.3.6.1.4.1.1466.109.114.1 (caseExactIA5Match): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' APPLIES ( altServer $ olcDbConfig $ c $ mail $ $ associatedDomain $ email $ aRecord $ mDRecord $ mXRecord $ nSRecord $ sOARecord $ AMERecord $ janetMailbox $ gecos $ homeDirectory $ loginShell $ memberUid $ memberNisNetgroup $ ipHostNumber $ ipNetworkNumber $ ipNetmaskNumber $ macAddress $ bootFile $ nisMapEntry ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.39 (certificateListMatch): Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.38 (certificateListExactMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.38 NAME 'certificateListExactMatch' APPLIES ( authorityRevocationList $ certificateRevocationList $ deltaRevocationList ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.35 (certificateMatch): Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.34 (certificateExactMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.34 NAME 'certificateExactMatch' APPLIES ( userCertificate $ cACertificate ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.30 (objectIdentifierFirstComponentMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.30 NAME 'objectIdentifierFirstComponentMatch' APPLIES ( supportedControl $ supportedExtension $ supportedFeatures $ ldapSyntaxes $ supportedApplicationContext ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.29 (integerFirstComponentMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.29 NAME 'integerFirstComponentMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcSpSessionlog $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpumber ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.27 (generalizedTimeMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.27 NAME 'generalizedTimeMatch' APPLIES ( createTimestamp $ modifyTimestamp ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.24 (protocolInformationMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.24 NAME 'protocolInformationMatch' APPLIES protocolInformation ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.23 (uniqueMemberMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.23 NAME 'uniqueMemberMatch' APPLIES uniqueMember ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.22 (presentationAddressMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.22 NAME 'presentationAddressMatch' APPLIES presentationAddress ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.20 (telephoneNumberMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.20 NAME 'telephoneNumberMatch' APPLIES ( telephoneNumber $ homePhone $ mobile $ pager ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.17 (octetStringMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.17 NAME 'octetStringMatch' APPLIES ( userPassword $ olcDbCryptKey ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.16 (bitStringMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.16 NAME 'bitStringMatch' APPLIES x500UniqueIdentifier ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.14 (integerMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.14 NAME 'integerMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcSpSessionlog $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpumber ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.13 (booleanMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.13 NAME 'booleanMatch' APPLIES ( hasSubordinates $ olcAddContentAcl $ olcGentleHUP $ olcHidden $ olcLastMod $ olcMirrorMode $ olcMonitoring $ olcReadOnly $ olcReverseLookup $ olcSpNoPresent $ olcSpReloadHint $ olcDbChecksum $ olcDbNoSync $ olcDbDirtyRead $ olcDbLinearIndex ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.11 (caseIgnoreListMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.11 NAME 'caseIgnoreListMatch' APPLIES ( postalAddress $ registeredAddress $ homePostalAddress ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.8 (numericStringMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.8 NAME 'numericStringMatch' APPLIES ( x121Address $ internationaliSDNNumber ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.7 (caseExactSubstringsMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.7 NAME 'caseExactSubstringsMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.6 (caseExactOrderingMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.6 NAME 'caseExactOrderingMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.5 (caseExactMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.5 NAME 'caseExactMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olcT Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.4 (caseIgnoreSubstringsMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.3 (caseIgnoreOrderingMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.3 NAME 'caseIgnoreOrderingMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.2 (caseIgnoreMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.2 NAME 'caseIgnoreMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olc Jun 14 20:31:29 freebsd slapd[5797]: 1.2.36.79672281.1.13.3 (rdnMatch): Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.1 (distinguishedNameMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.1 NAME 'distinguishedNameMatch' APPLIES ( creatorsName $ modifiersName $ subschemaSubentry $ entryDN $ namingContexts $ aliasedObjectName $ dynamicSubtrees $ distinguishedName $ seeAlso $ olcDefaultSearchBase $ olcRootDN $ olcSchemaDN $ olcSuffix $ olcUpdateDN $ olcRelay $ member $ owner $ roleOccupant $ manager $ documentAuthor $ secretary $ associatedName $ dITRedirect ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.0 (objectIdentifierMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.0 NAME 'objectIdentifierMatch' APPLIES ( supportedControl $ supportedExtension $ supportedFeatures $ supportedApplicationContext ) ) Jun 14 20:31:29 freebsd slapd[5798]: slapd startup: initiated. Jun 14 20:31:29 freebsd slapd[5798]: backend_startup_one: starting "=config" Jun 14 20:31:29 freebsd slapd[5798]: config_back_db_open Jun 14 20:31:29 freebsd slapd[5798]: config_back_db_open: line 0: warning: cannot assess the validity of the ACL scope within backend naming context Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "=config" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "=module{0}" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "=schema" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "={0}core" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "={1}cosine" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "={2}inetorgperson" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "={3}nis" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "olcDatabase={-1}frontend" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "olcDatabase={0}config" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "olcDatabase={1}bdb" Jun 14 20:31:29 freebsd slapd[5798]: backend_startup_one: starting "=test,=cz" Jun 14 20:31:29 freebsd slapd[5798]: bdb_db_open: "=test,=cz" Jun 14 20:31:29 freebsd slapd[5798]: bdb_db_open: database "=test,=cz": dbenv_open(/var/db/openldap-data). Jun 14 20:31:29 freebsd slapd[5798]: slapd starting Jun 14 20:31:29 freebsd slapd[5798]: daemon: added 4r listener=0x0 Jun 14 20:31:29 freebsd slapd[5798]: daemon: added 6r listener=0x8019450c0 Jun 14 20:31:29 freebsd slapd[5798]: daemon: added 7r listener=0x801945180 Jun 14 20:31:29 freebsd slapd[5798]: daemon: select: listen=6 active_threads=0 tvp=NULL Jun 14 20:31:29 freebsd slapd[5798]: daemon: select: listen=7 active_threads=0 tvp=NULL Jun 14 20:31:29 freebsd slapd[5798]: daemon: activity on 1 descriptor Jun 14 20:31:29 freebsd slapd[5798]: daemon: waked Jun 14 20:31:29 freebsd slapd[5798]: daemon: select: listen=6 active_threads=0 tvp=NULL Jun 14 20:31:29 freebsd slapd[5798]: daemon: select: listen=7 active_threads=0 tvp=NULLLog debug je zase přílohou a je to už při pokusu o přihlášení.
auth.log Jun 14 20:34:03 freebsd sshd[5813]: pam_ldap: error trying to bind as user "uid=root,ou=People,=test,=cz" (Invalid credentials) Jun 14 20:34:03 freebsd sshd[5811]: Accepted keyboard-interactive/pam for root from 192.168.56.1 port 41477 ssh2
message Jun 14 20:34:03 freebsd sshd[5813]: pam_ldap: error trying to bind as user "uid=root,ou=People,=test,=cz" (Invalid credentials)
access to attrs=userPassword
by dn="cn=root,dc=test,dc=cz" write
by anonymous auth
by self write
by * none
access to attrs=uidNumber,gidNumber,uid,homeDirectory
by dn="cn=root,dc=test,dc=cz" write
by self read
by * read
access to *
by dn="cn=root,dc=test,dc=cz" write
by self write
by * read
debug.log Jun 14 21:21:33 freebsd slapd[1562]: @(#) $OpenLDAP: slapd 2.4.18 (Sep 9 2009 07:45:36) $ root@freebsd.org:/work/a/ports/net/openldap24-server/work/openldap-2.4.18/servers/slapd Jun 14 21:21:33 freebsd slapd[1563]: config_back_db_open: line 0: warning: cannot assess the validity of the ACL scope within backend naming context Jun 14 21:21:33 freebsd slapd[1563]: slapd starting
Jun 14 21:22:08 freebsd slapd[1563]: conn=0 fd=11 ACCEPT from IP=127.0.0.1:36857 (IP=127.0.0.1:389) Jun 14 21:22:08 freebsd slapd[1563]: conn=0 op=0 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:22:08 freebsd slapd[1563]: conn=0 op=0 RESULT tag=97 err=49 text= Jun 14 21:22:08 freebsd slapd[1563]: conn=0 op=1 UNBIND Jun 14 21:22:08 freebsd slapd[1563]: conn=0 fd=11 closed Jun 14 21:22:08 freebsd slapd[1563]: conn=1 op=0 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:22:08 freebsd slapd[1563]: conn=1 op=0 RESULT tag=97 err=49 text= Jun 14 21:22:08 freebsd slapd[1563]: conn=1 fd=12 ACCEPT from IP=127.0.0.1:23152 (IP=127.0.0.1:389) Jun 14 21:22:08 freebsd slapd[1563]: conn=1 op=1 UNBIND Jun 14 21:22:08 freebsd slapd[1563]: conn=1 fd=12 closed
debug.log Jun 14 21:32:11 freebsd slapd[1723]: conn=0 fd=11 ACCEPT from IP=127.0.0.1:56043 (IP=127.0.0.1:389) Jun 14 21:32:11 freebsd slapd[1723]: conn=0 op=0 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:32:11 freebsd slapd[1723]: conn=0 op=0 RESULT tag=97 err=49 text= Jun 14 21:32:13 freebsd slapd[1723]: conn=0 op=1 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:32:13 freebsd slapd[1723]: conn=0 op=1 RESULT tag=97 err=49 text= Jun 14 21:32:13 freebsd slapd[1723]: conn=0 fd=11 closed (connection lost) Jun 14 21:32:13 freebsd slapd[1723]: conn=1 fd=11 ACCEPT from IP=127.0.0.1:25834 (IP=127.0.0.1:389) Jun 14 21:32:13 freebsd slapd[1723]: conn=1 op=0 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:32:13 freebsd slapd[1723]: conn=1 op=0 RESULT tag=97 err=49 text= Jun 14 21:32:13 freebsd slapd[1723]: conn=1 op=1 UNBIND Jun 14 21:32:13 freebsd slapd[1723]: conn=1 fd=11 closed Jun 14 21:32:13 freebsd slapd[1723]: conn=2 fd=11 ACCEPT from IP=127.0.0.1:40514 (IP=127.0.0.1:389) Jun 14 21:32:13 freebsd slapd[1723]: conn=2 op=0 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:32:13 freebsd slapd[1723]: conn=2 op=0 RESULT tag=97 err=49 text= Jun 14 21:32:13 freebsd slapd[1723]: conn=2 op=1 UNBIND Jun 14 21:32:13 freebsd slapd[1723]: conn=2 fd=11 closed
auth.log Jun 14 21:32:11 freebsd sshd[1726]: pam_ldap: error trying to bind (Invalid credentials) Jun 14 21:32:13 freebsd sshd[1726]: pam_ldap: error trying to bind (Invalid credentials) Jun 14 21:32:13 freebsd sshd[1724]: Accepted keyboard-interactive/pam for test from 192.168.56.1 port 48165 ssh2 Jun 14 21:32:13 freebsd sshd[1727]: nss_ldap: failed to bind to LDAP server ldap://127.0.0.1: Invalid credentials Jun 14 21:32:13 freebsd sshd[1727]: nss_ldap: failed to bind to LDAP server ldap://127.0.0.1: Invalid credentials Jun 14 21:32:13 freebsd sshd[1727]: nss_ldap: could not search LDAP server - Server is unavailable
message Jun 14 21:32:11 freebsd sshd[1726]: pam_ldap: error trying to bind (Invalid credentials) Jun 14 21:32:13 freebsd sshd[1726]: pam_ldap: error trying to bind (Invalid credentials) Jun 14 21:32:13 freebsd sshd[1727]: nss_ldap: could not search LDAP server - Server is unavailable
# extended LDIF # # LDAPv3 # base <=test,=cz> (default) with scope subtree # filter: =root,=test,=cz # requesting: -W # # search result search: 2 result: 0 Success # numResponses: 1nevím zda je ten příkaz správně abych se připojil k LDAP na 127.0.0.1 musel jsem odstranit z výpisu DC a CN znaky tak aby mi tato konference výpis logu vzala-
ldappasswd -D "cn=root,dc=test,dc=cz" -S -W "uid=UŽIVATEL,ou=SKUPINA,dc=test,dc=cz"
Tiskni
Sdílej: