Byl vydán PostgreSQL 18. Přehled novinek v poznámkách k vydání.
NFS (Network File System) má letos 40 let. Jeho tvůrci zavzpomínali na MSST Conference. Sun Microsystems vydal v prosinci 1985 zdrojové kódy NFS vývojářům mimo Sun.
Po Canonicalu oznámilo také SUSE, že bude podporovat a distribuovat toolkit NVIDIA CUDA (Wikipedie).
Laboratoře CZ.NIC vydaly novou verzi 4.27.0 aplikace Datovka, tj. svobodné multiplatformní desktopové aplikace pro přístup k datovým schránkám a k trvalému uchovávání datových zpráv v lokální databázi. Přidány byly funkce pro přerazítkování datových zpráv systémem ISDS. Uživatel muže zvolit zprávy, jejichž časová razítka má aplikace sledovat. Aplikace jej upozorní na časová razítka, která lze přerazítkovat. Uživatel pak může
… více »Bylo představeno all-in-one PC aneb mechanická podsvícená klávesnice s Raspberry Pi 5 uvnitř Raspberry Pi 500+. S 256 GB Raspberry Pi SSD a 16 GB RAM za 200 dolarů.
Google, potažmo YouTube umožní návrat tvůrcům, kteří byli zablokováni kvůli údajnému šíření dezinformací souvisejících s COVID-19 a volbami. Tvůrci teď mohou požádat o navrácení přístupu. Společnost Alphabet v této souvislosti uvedla, že zákazy byly uděleny kvůli tlaku tehdejší Bidenovy administrativy.
Vývojári z distribúcie Artix, ktorá je postavená na Arch Linuxe, alebo skôr jeho forkom, už skôr prešli na Open-RC init systém, stále však niektoré projekty ako GNOME boli závislé na systemd. Teraz pretiekol pohár trpezlivosti a počnúc GNOME 49, kvôli ktorému komponenta gnome-session je úplne závislá na systemd-init, padlo rozhodnutie na odstránenie GNOME z repozitárov Artixu. Táto zmena sa podľa všetkého týka viac než 90 distribúcií, ktoré tiež nepoužívajú systemd. Viac v príspevku na DistroWatch.
Magazín IEEE Spectrum opět po roce publikoval svůj žebříček programovacích jazyků. Vedou Python, Java, C++, SQL a C#.
Repozitáře pro spolupráci v rámci projektu Fedora se přesunou z Pagure na nově vzniklý Fedora Forge. Ten stejně jako třeba Codeberg běží na softwaru Forgejo, které bylo už před časem vybráno jako náhrada za Pagure. Pagure pochází z dílny Fedory, ale mimo ni se příliš neuchytil. Jeho vývoj a údržba byly náročné a Fedora se rozhodla jít cestou úspěšnějšího projektu, který má větší základnu přispěvatelů.
Byla vydána (𝕏) nová verze 2025.3 linuxové distribuce navržené pro digitální forenzní analýzu a penetrační testování Kali Linux (Wikipedie). Přehled novinek se seznamem nových nástrojů v oficiálním oznámení na blogu.
cat /usr/local/etc/openldap/ldap.conf # # LDAP Defaults # # See ldap.conf(5) for details # This file should be world readable but not world writable. BASE dc=test, dc=cz URI ldap://127.0.0.1/ #ldap://ldap-master.example.com:666 #SIZELIMIT 12 #TIMELIMIT 15 #DEREF never #
cat /usr/local/etc/openldap/slapd.conf # # See slapd.conf(5) for details on configuration options. # This file should NOT be world readable. # include /usr/local/etc/openldap/schema/core.schema include /usr/local/etc/openldap/schema/cosine.schema include /usr/local/etc/openldap/schema/inetorgperson.schema include /usr/local/etc/openldap/schema/nis.schema # Define global ACLs to disable default read access. # Do not enable referrals until AFTER you have a working directory # service AND an understanding of referrals. #referral ldap://root.openldap.org #loglevel 255 # pro debugging, do logu se dostane takka ve. Pozdji snite. pidfile /var/run/openldap/slapd.pid argsfile /var/run/openldap/slapd.args # Load dynamic backend modules: modulepath /usr/local/libexec/openldap moduleload back_bdb # moduleload back_ldap # moduleload back_ldbm # moduleload back_passwd # moduleload back_shell # Sample security restrictions # Require integrity protection (prevent hijacking) # Require 112-bit (3DES or better) encryption for updates # Require 63-bit encryption for simple bind # security ssf=1 update_ssf=112 simple_bind=64 # Sample access control policy: # Root DSE: allow anyone to read it # Subschema (sub)entry DSE: allow anyone to read it # Other DSEs: # Allow self write access # Allow authenticated users read access # Allow anonymous users to authenticate # Directives needed to implement policy: # access to dn.base="" by * read # access to dn.base="cn=Subschema" by * read # access to * # by self write # by users read # by anonymous auth # # if no access controls are present, the default policy # allows anyone and everyone to read anything but restricts # updates to rootdn. (e.g., "access to * by * read") # # rootdn can always read and write EVERYTHING! #allow bind_v2 # abyste mohli pouvat LDAP funkce PHP password-hash {SSHA} # nebo njakou jinou; vyberte si z SMD5, SHA, SSHA, CRYPT ####################################################################### # BDB database definitions ####################################################################### database bdb suffix "dc=test,dc=cz" rootdn "cn=root,dc=test,dc=cz" # Cleartext passwords, especially for the rootdn, should # be avoid. See slappasswd(8) and slapd.conf(5) for details. # Use of strong authentication encouraged. rootpw {SSHA}GPtyCSYW9X9+Qsx8FKGNehYjFjjQePdt # The database directory MUST exist prior to running slapd AND # should only be accessible by the slapd and slap tools. # Mode 700 recommended. directory /var/db/openldap-data # Indices to maintain index objectClass eq #
cat /usr/local/etc/ldap.conf suffix "dc=test, dc=cz" host 127.0.0.1 #uri ldaps://ldap.test.cz/ pam_password md5 ldap_version 3 bind_policy soft pam_filter objectclass=posixAccount pam_login_attribute uid pam_member_attribute memberuid nss_base_passwd ou=People,dc=test,dc=cz nss_base_shadow ou=People,dc=test,dc=cz nss_base_group ou=Group,dc=test,dc=cz #nss_reconnect_sleeptime #nss_reconnect_maxsleeptime #nss_reconnect_maxconntries directives scope one
cat /etc/pam.d/system #%PAM-1.0 auth required pam_env.so auth sufficient pam_unix.so likeauth nullok auth sufficient /usr/local/lib/pam_ldap.so use_first_pass auth required pam_deny.so account required pam_unix.so account sufficient /usr/local/lib/pam_ldap.so password required pam_cracklib.so difok=2 minlen=8 dcredit=2 ocredit=2 retry=3 password sufficient pam_unix.so nullok md5 shadow use_authtok password sufficient /usr/local/lib/pam_ldap.so use_authtok password required pam_deny.so session required pam_limits.so session required pam_unix.so session optional /usr/local/lib/pam_ldap.so
cat /etc/pam.d/sshd # # $FreeBSD: src/etc/pam.d/sshd,v 1.16.10.1.2.1 2009/10/25 01:10:29 kensmith Exp $ # # PAM configuration for the "sshd" service # # auth auth sufficient pam_opie.so no_warn no_fake_prompts auth requisite pam_opieaccess.so no_warn allow_local #auth sufficient pam_krb5.so no_warn try_first_pass #auth sufficient pam_ssh.so no_warn try_first_pass auth sufficient /usr/local/lib/pam_ldap.so no_warn try_first_pass auth required pam_unix.so no_warn try_first_pass # account account required pam_nologin.so #account required pam_krb5.so account required pam_login_access.so account sufficient /usr/local/lib/pam_ldap.so account required pam_unix.so # session #session optional pam_ssh.so session sufficient /usr/local/lib/pam_ldap.so session required pam_permit.so # password #password sufficient pam_krb5.so no_warn try_first_pass password sufficient /usr/local/lib/pam_ldap.so password required pam_unix.so no_warn try_first_pass
cat /etc/nsswitch.conf # # nsswitch.conf(5) - name service switch configuration file # $FreeBSD: src/etc/nsswitch.conf,v 1.1.10.1.2.1 2009/10/25 01:10:29 kensmith Exp $ # group: files ldap group_compat: nis hosts: files dns networks: files passwd: files ldap passwd_compat: nis shells: files services: compat services_compat: nis protocols: files rpc: filesPo nastartování OpenLDAP mi vyhodí do logu:
Jun 14 12:11:49 freebsd sshd[5132]: pam_ldap: ldap_simple_bind Can't contact LDAP server Jun 14 12:11:49 freebsd sshd[5132]: pam_ldap: reconnecting to LDAP server... Jun 14 12:11:49 freebsd sshd[5132]: pam_ldap: ldap_simple_bind Can't contact LDAP serverpokud se snažím připojit pomocí ssh tak:
sshd[5132]: in _openpam_check_error_code(): pam_sm_acct_mgmt(): unexpected return value 12a pokud pomocí su z konzole tak:
su root su: pam_start: system errorMohl by mi někdo poradit co dělám špatně? Uživatele mám převedené pomocí scriptů. A pokud zadám ldapsearch -x -D "cn=root,dc=test,dc=cz" -W tak to taky správně vše vypíše.
auth.log Jun 14 19:28:54 freebsd sshd[5261]: pam_ldap: error trying to bind as user "uid=root,ou=People,dc=test,dc=cz" (Invalid credentials) Jun 14 19:28:54 freebsd sshd[5259]: Accepted keyboard-interactive/pam for root from 192.168.56.1 port 40699 ssh2
debug.log Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=sshd,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=sshd,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=sshd,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=smmsp,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=smmsp,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=smmsp,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=smmsp,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=smmsp,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=smmsp,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=mailnull,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=mailnull,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=mailnull,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=mailnull,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=mailnull,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=mailnull,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=guest,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=guest,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=guest,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=guest,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=guest,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=guest,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=bind,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=bind,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=bind,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=bind,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=bind,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=bind,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=proxy,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=proxy,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=proxy,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=proxy,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=proxy,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=proxy,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=authpf,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=authpf,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=authpf,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=authpf,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=authpf,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=authpf,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=_pflogd,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=_pflogd,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_pflogd,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_pflogd,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_pflogd,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_pflogd,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=_dhcp,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=_dhcp,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_dhcp,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_dhcp,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_dhcp,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=_dhcp,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=uucp,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=uucp,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=uucp,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=uucp,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=uucp,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=uucp,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=dialer,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=dialer,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=dialer,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=dialer,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=dialer,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=dialer,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=network,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=network,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=network,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=network,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=network,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=network,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=audit,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=audit,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=audit,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=audit,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=audit,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=audit,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=www,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=www,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=www,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=www,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=www,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=www,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=nogroup,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=nogroup,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nogroup,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nogroup,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nogroup,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nogroup,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=nobody,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=nobody,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nobody,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nobody,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nobody,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=nobody,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=ldap,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=ldap,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=ldap,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=ldap,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=ldap,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=ldap,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=freeradius,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=freeradius,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=freeradius,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=freeradius,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=freeradius,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=freeradius,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=pheek,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=pheek,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=pheek,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=pheek,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=pheek,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=pheek,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: AND Jun 14 19:30:07 freebsd slapd[5211]: => test_filter_and Jun 14 19:30:07 freebsd slapd[5211]: => test_filter Jun 14 19:30:07 freebsd slapd[5211]: EQUALITY Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access to "cn=test,ou=Group,dc=test,dc=cz" "objectClass" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default search access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: search access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter_and 6 Jun 14 19:30:07 freebsd slapd[5211]: <= test_filter 6 Jun 14 19:30:07 freebsd slapd[5211]: => send_search_entry: conn 10 dn="cn=test,ou=Group,dc=test,dc=cz" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=test,ou=Group,dc=test,dc=cz" "entry" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=test,ou=Group,dc=test,dc=cz" "cn" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=test,ou=Group,dc=test,dc=cz" "userPassword" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access to "cn=test,ou=Group,dc=test,dc=cz" "gidNumber" requested Jun 14 19:30:07 freebsd slapd[5211]: => slap_access_allowed: backend default read access granted to "(anonymous)" Jun 14 19:30:07 freebsd slapd[5211]: => access_allowed: read access granted by read(=rscxd) Jun 14 19:30:07 freebsd slapd[5211]: <= send_search_entry: conn 10 exit. Jun 14 19:30:07 freebsd slapd[5211]: send_paged_response: lastid=0x00000000 nentries=33 Jun 14 19:30:07 freebsd slapd[5211]: send_ldap_result: conn=10 op=1 p=3 Jun 14 19:30:07 freebsd slapd[5211]: send_ldap_result: err=0 matched="" text="" Jun 14 19:30:07 freebsd slapd[5211]: send_ldap_response: msgid=2 tag=101 err=0 Jun 14 19:30:07 freebsd slapd[5211]: daemon: activity on 1 descriptor Jun 14 19:30:07 freebsd slapd[5211]: daemon: activity on: Jun 14 19:30:07 freebsd slapd[5211]: 11r Jun 14 19:30:07 freebsd slapd[5211]: Jun 14 19:30:07 freebsd slapd[5211]: daemon: read activity on 11 Jun 14 19:30:07 freebsd slapd[5211]: daemon: select: listen=6 active_threads=0 tvp=NULL Jun 14 19:30:07 freebsd slapd[5211]: daemon: select: listen=7 active_threads=0 tvp=NULL Jun 14 19:30:07 freebsd slapd[5211]: connection_get(11) Jun 14 19:30:07 freebsd slapd[5211]: connection_get(11): got connid=10 Jun 14 19:30:07 freebsd slapd[5211]: connection_read(11): checking for input on id=10 Jun 14 19:30:07 freebsd slapd[5211]: ber_get_next on fd 11 failed errno=0 (Undefined error: 0) Jun 14 19:30:07 freebsd slapd[5211]: connection_read(11): input error=-2 id=10, closing. Jun 14 19:30:07 freebsd slapd[5211]: connection_closing: readying conn=10 sd=11 for close Jun 14 19:30:07 freebsd slapd[5211]: daemon: activity on 1 descriptor Jun 14 19:30:07 freebsd slapd[5211]: daemon: waked Jun 14 19:30:07 freebsd slapd[5211]: daemon: select: listen=6 active_threads=0 tvp=NULL Jun 14 19:30:07 freebsd slapd[5211]: daemon: select: listen=7 active_threads=0 tvp=NULL Jun 14 19:30:07 freebsd slapd[5211]: connection_close: conn=10 sd=11 Jun 14 19:30:07 freebsd slapd[5211]: daemon: removing 11
messages Jun 14 19:28:54 freebsd sshd[5261]: pam_ldap: error trying to bind as user "uid=root,ou=People,dc=test,dc=cz" (Invalid credentials)
Jun 14 19:28:54 freebsd slapd[5211]: >>> dnPrettyNormal: uid=root,ou=People,dc=test,dc=cz
Jun 14 19:28:54 freebsd slapd[5211]: <<< dnPrettyNormal: uid=root,ou=People,dc=test,dc=cz, uid=root,ou=people,dc=test,dc=cz
Jun 14 19:28:54 freebsd slapd[5211]: do_bind: version=3 dn="uid=root,ou=People,dc=test,dc=cz" method=128
Jun 14 19:28:54 freebsd slapd[5211]: ==> bdb_bind: dn: uid=root,ou=People,dc=test,dc=cz
Jun 14 19:28:54 freebsd slapd[5211]: bdb_dn2entry("uid=root,ou=people,dc=test,dc=cz")
Jun 14 19:28:54 freebsd slapd[5211]: => access_allowed: auth access to "uid=root,ou=People,dc=test,dc=cz" "userPassword" requested
Jun 14 19:28:54 freebsd slapd[5211]: => slap_access_allowed: backend default auth access granted to "(anonymous)"
Jun 14 19:28:54 freebsd slapd[5211]: => access_allowed: auth access granted by read(=rscxd)
Jun 14 19:28:54 freebsd slapd[5211]: send_ldap_result: conn=8 op=3 p=3
Jun 14 19:28:54 freebsd slapd[5211]: send_ldap_result: err=49 matched="" text=""
Jun 14 19:28:54 freebsd slapd[5211]: send_ldap_response: msgid=4 tag=97 err=49
cat ldap.conf host 127.0.0.1 suffix "dc=test, dc=cz" uri ldap://127.0.0.1 pam_password md5 ldap_version 3 bind_policy soft pam_filter objectclass=posixAccount pam_login_attribute uid pam_member_attribute memberuid nss_base_passwd ou=People,dc=test,dc=cz nss_base_shadow ou=People,dc=test,dc=cz nss_base_group ou=Group,dc=test,dc=cz scope one
binddn "cn=root,dc=test,dc=cz"
bindpw {SSHA}GPtyCSYW9X9+Qsx8FKGNehYjFjjQePdt
debug.log Jun 14 20:18:37 freebsd slapd[5685]: matchingRuleUse: ( 2.5.13.5 NAME 'caseExactMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ cn $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olcT Jun 14 20:18:37 freebsd slapd[5685]: matchingRuleUse: ( 2.5.13.2 NAME 'caseIgnoreMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ cn $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olc Jun 14 20:20:10 freebsd slapd[5686]: send_ldap_result: err=34 matched="" text="invalid DN" Jun 14 20:20:10 freebsd slapd[5686]: send_ldap_response: msgid=1 tag=97 err=34 Jun 14 20:20:10 freebsd slapd[5686]: ber_get_next on fd 11 failed errno=0 (Undefined error: 0) Jun 14 20:20:10 freebsd slapd[5686]: connection_read(11): input error=-2 id=0, closing. Jun 14 20:20:10 freebsd slapd[5686]: connection_close: deferring conn=0 sd=11Nevím jak v freebsd restartovat pam, ostatní logy mlčí. Při pokus se přihlásit:
debug.log Jun 14 20:20:39 freebsd slapd[5686]: send_ldap_result: err=34 matched="" text="invalid DN" Jun 14 20:20:39 freebsd slapd[5686]: send_ldap_response: msgid=1 tag=97 err=34 Jun 14 20:20:41 freebsd slapd[5686]: send_ldap_result: err=34 matched="" text="invalid DN" Jun 14 20:20:41 freebsd slapd[5686]: send_ldap_response: msgid=2 tag=97 err=34 Jun 14 20:20:41 freebsd slapd[5686]: ber_get_next on fd 11 failed errno=0 (Undefined error: 0) Jun 14 20:20:41 freebsd slapd[5686]: connection_read(11): input error=-2 id=1, closing. Jun 14 20:20:41 freebsd slapd[5686]: send_ldap_result: err=34 matched="" text="invalid DN" Jun 14 20:20:41 freebsd slapd[5686]: send_ldap_response: msgid=1 tag=97 err=34
auth.log Jun 14 20:20:39 freebsd sshd[5691]: pam_ldap: error trying to bind (Invalid DN syntax) Jun 14 20:20:41 freebsd sshd[5691]: pam_ldap: error trying to bind (Invalid DN syntax) Jun 14 20:20:41 freebsd sshd[5689]: Accepted keyboard-interactive/pam for root from 192.168.56.1 port 60097 ssh2 Jun 14 20:20:41 freebsd sshd[5692]: nss_ldap: failed to bind to LDAP server ldap://127.0.0.1: Invalid DN syntax
message Jun 14 20:18:37 freebsd slapd[5685]: nss_ldap: could not search LDAP server - Server is unavailable Jun 14 20:20:39 freebsd sshd[5691]: pam_ldap: error trying to bind (Invalid DN syntax) Jun 14 20:20:41 freebsd sshd[5691]: pam_ldap: error trying to bind (Invalid DN syntax)
debug.log Jun 14 20:31:29 freebsd slapd[5754]: daemon: shutdown requested and initiated. Jun 14 20:31:29 freebsd slapd[5754]: daemon: closing 6 Jun 14 20:31:29 freebsd slapd[5754]: daemon: closing 7 Jun 14 20:31:29 freebsd slapd[5754]: slapd shutdown: waiting for 0 operations/tasks to finish Jun 14 20:31:29 freebsd slapd[5754]: slapd shutdown: initiated Jun 14 20:31:29 freebsd slapd[5754]: ====> bdb_cache_release_all Jun 14 20:31:29 freebsd slapd[5754]: slapd destroy: freeing system resources. Jun 14 20:31:29 freebsd slapd[5754]: slapd stopped. Jun 14 20:31:29 freebsd slapd[5797]: @(#) $OpenLDAP: slapd 2.4.18 (Sep 9 2009 07:45:36) $ root@freebsd.org:/work/a/ports/net/openldap24-server/work/openldap-2.4.18/servers/slapd Jun 14 20:31:29 freebsd slapd[5797]: line 18 (pidfile /var/run/openldap/slapd.pid) Jun 14 20:31:29 freebsd slapd[5797]: line 19 (argsfile /var/run/openldap/slapd.args) Jun 14 20:31:29 freebsd slapd[5797]: line 22 (modulepath /usr/local/libexec/openldap) Jun 14 20:31:29 freebsd slapd[5797]: line 23 (moduleload back_bdb) Jun 14 20:31:29 freebsd slapd[5797]: loaded module back_bdb Jun 14 20:31:29 freebsd slapd[5797]: bdb_back_initialize: initialize BDB backend Jun 14 20:31:29 freebsd slapd[5797]: bdb_back_initialize: Berkeley DB 4.6.21: (September 27, 2007) Jun 14 20:31:29 freebsd slapd[5797]: module back_bdb: null module registered Jun 14 20:31:29 freebsd slapd[5797]: line 53 (password-hash {SSHA}) Jun 14 20:31:29 freebsd slapd[5797]: line 59 (database bdb) Jun 14 20:31:29 freebsd slapd[5797]: bdb_db_init: Initializing BDB database Jun 14 20:31:29 freebsd slapd[5797]: line 60 (suffix "=test,=cz") Jun 14 20:31:29 freebsd slapd[5797]: >>> dnPrettyNormal: <=test,=cz> Jun 14 20:31:29 freebsd slapd[5797]: <<< dnPrettyNormal: <=test,=cz>, <=test,=cz> Jun 14 20:31:29 freebsd slapd[5797]: line 61 (rootdn "=root,=test,=cz") Jun 14 20:31:29 freebsd slapd[5797]: >>> dnPrettyNormal: <=root,=test,=cz> Jun 14 20:31:29 freebsd slapd[5797]: <<< dnPrettyNormal: <=root,=test,=cz>, <=root,=test,=cz> Jun 14 20:31:29 freebsd slapd[5797]: line 65 (rootpw ***) Jun 14 20:31:29 freebsd slapd[5797]: line 69 (directory /var/db/openldap-data) Jun 14 20:31:29 freebsd slapd[5797]: line 71 (index objectClass eq) Jun 14 20:31:29 freebsd slapd[5797]: index objectClass 0x0004 Jun 14 20:31:29 freebsd slapd[5797]: >>> dnNormalize: <=Subschema> Jun 14 20:31:29 freebsd slapd[5797]: <<< dnNormalize: <=subschema> Jun 14 20:31:29 freebsd slapd[5797]: matching_rule_use_init Jun 14 20:31:29 freebsd slapd[5797]: 1.2.840.113556.1.4.804 (integerBitOrMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 1.2.840.113556.1.4.804 NAME 'integerBitOrMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcSpSessionlog $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpumber ) ) Jun 14 20:31:29 freebsd slapd[5797]: 1.2.840.113556.1.4.803 (integerBitAndMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 1.2.840.113556.1.4.803 NAME 'integerBitAndMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcSpSessionlog $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpumber ) ) Jun 14 20:31:29 freebsd slapd[5797]: 1.3.6.1.4.1.1466.109.114.2 (caseIgnoreIA5Match): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 1.3.6.1.4.1.1466.109.114.2 NAME 'caseIgnoreIA5Match' APPLIES ( altServer $ olcDbConfig $ c $ mail $ $ associatedDomain $ email $ aRecord $ mDRecord $ mXRecord $ nSRecord $ sOARecord $ AMERecord $ janetMailbox $ gecos $ homeDirectory $ loginShell $ memberUid $ memberNisNetgroup $ ipHostNumber $ ipNetworkNumber $ ipNetmaskNumber $ macAddress $ bootFile $ nisMapEntry ) ) Jun 14 20:31:29 freebsd slapd[5797]: 1.3.6.1.4.1.1466.109.114.1 (caseExactIA5Match): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 1.3.6.1.4.1.1466.109.114.1 NAME 'caseExactIA5Match' APPLIES ( altServer $ olcDbConfig $ c $ mail $ $ associatedDomain $ email $ aRecord $ mDRecord $ mXRecord $ nSRecord $ sOARecord $ AMERecord $ janetMailbox $ gecos $ homeDirectory $ loginShell $ memberUid $ memberNisNetgroup $ ipHostNumber $ ipNetworkNumber $ ipNetmaskNumber $ macAddress $ bootFile $ nisMapEntry ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.39 (certificateListMatch): Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.38 (certificateListExactMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.38 NAME 'certificateListExactMatch' APPLIES ( authorityRevocationList $ certificateRevocationList $ deltaRevocationList ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.35 (certificateMatch): Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.34 (certificateExactMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.34 NAME 'certificateExactMatch' APPLIES ( userCertificate $ cACertificate ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.30 (objectIdentifierFirstComponentMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.30 NAME 'objectIdentifierFirstComponentMatch' APPLIES ( supportedControl $ supportedExtension $ supportedFeatures $ ldapSyntaxes $ supportedApplicationContext ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.29 (integerFirstComponentMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.29 NAME 'integerFirstComponentMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcSpSessionlog $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpumber ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.27 (generalizedTimeMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.27 NAME 'generalizedTimeMatch' APPLIES ( createTimestamp $ modifyTimestamp ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.24 (protocolInformationMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.24 NAME 'protocolInformationMatch' APPLIES protocolInformation ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.23 (uniqueMemberMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.23 NAME 'uniqueMemberMatch' APPLIES uniqueMember ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.22 (presentationAddressMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.22 NAME 'presentationAddressMatch' APPLIES presentationAddress ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.20 (telephoneNumberMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.20 NAME 'telephoneNumberMatch' APPLIES ( telephoneNumber $ homePhone $ mobile $ pager ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.17 (octetStringMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.17 NAME 'octetStringMatch' APPLIES ( userPassword $ olcDbCryptKey ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.16 (bitStringMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.16 NAME 'bitStringMatch' APPLIES x500UniqueIdentifier ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.14 (integerMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.14 NAME 'integerMatch' APPLIES ( supportedLDAPVersion $ entryTtl $ uidNumber $ gidNumber $ olcConcurrency $ olcConnMaxPending $ olcConnMaxPendingAuth $ olcIdleTimeout $ olcIndexSubstrIfMinLen $ olcIndexSubstrIfMaxLen $ olcIndexSubstrAnyLen $ olcIndexSubstrAnyStep $ olcIndexIntLen $ olcLocalSSF $ olcMaxDerefDepth $ olcReplicationInterval $ olcSockbufMaxIncoming $ olcSockbufMaxIncomingAuth $ olcThreads $ olcToolThreads $ olcWriteTimeout $ olcSpSessionlog $ olcDbCacheFree $ olcDbCacheSize $ olcDbDNcacheSize $ olcDbIDLcacheSize $ olcDbSearchStack $ olcDbShmKey $ mailPreferenceOption $ shadowLastChange $ shadowMin $ shadowMax $ shadowWarning $ shadowInactive $ shadowExpire $ shadowFlag $ ipServicePort $ ipProtocolNumber $ oncRpumber ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.13 (booleanMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.13 NAME 'booleanMatch' APPLIES ( hasSubordinates $ olcAddContentAcl $ olcGentleHUP $ olcHidden $ olcLastMod $ olcMirrorMode $ olcMonitoring $ olcReadOnly $ olcReverseLookup $ olcSpNoPresent $ olcSpReloadHint $ olcDbChecksum $ olcDbNoSync $ olcDbDirtyRead $ olcDbLinearIndex ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.11 (caseIgnoreListMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.11 NAME 'caseIgnoreListMatch' APPLIES ( postalAddress $ registeredAddress $ homePostalAddress ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.8 (numericStringMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.8 NAME 'numericStringMatch' APPLIES ( x121Address $ internationaliSDNNumber ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.7 (caseExactSubstringsMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.7 NAME 'caseExactSubstringsMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.6 (caseExactOrderingMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.6 NAME 'caseExactOrderingMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.5 (caseExactMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.5 NAME 'caseExactMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olcT Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.4 (caseIgnoreSubstringsMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.4 NAME 'caseIgnoreSubstringsMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.3 (caseIgnoreOrderingMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.3 NAME 'caseIgnoreOrderingMatch' APPLIES ( serialNumber $ destinationIndicator $ dnQualifier ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.2 (caseIgnoreMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.2 NAME 'caseIgnoreMatch' APPLIES ( supportedSASLMechanisms $ vendorName $ vendorVersion $ ref $ name $ $ uid $ labeledURI $ description $ olcConfigFile $ olcConfigDir $ olcAccess $ olcAllows $ olcArgsFile $ olcAttributeOptions $ olcAttributeTypes $ olcAuthIDRewrite $ olcAuthzPolicy $ olcAuthzRegexp $ olcBackend $ olcDatabase $ olcDisallows $ olcDitContentRules $ olcInclude $ olcLdapSyntaxes $ olcLimits $ olcLogFile $ olcLogLevel $ olcModuleLoad $ olcModulePath $ olcObjectClasses $ olcObjectIdentifier $ olcOverlay $ olcPasswordCryptSaltFormat $ olcPasswordHash $ olcPidFile $ olcPlugin $ olcPluginLogFile $ olcReferral $ olcReplica $ olcReplicaArgsFile $ olcReplicaPidFile $ olcReplogFile $ olcRequires $ olcRestrict $ olcRootDSE $ olcRootPW $ olcSaslAuxprops $ olcSaslHost $ olcSaslRealm $ olcSaslSecProps $ olcSecurity $ olcServerID $ olcSizeLimit $ olcSortVals $ olcSubordinate $ olcSyncrepl $ olcTCPBuffer $ olcTimeLimit $ olcTLSCACertificateFile $ olc Jun 14 20:31:29 freebsd slapd[5797]: 1.2.36.79672281.1.13.3 (rdnMatch): Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.1 (distinguishedNameMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.1 NAME 'distinguishedNameMatch' APPLIES ( creatorsName $ modifiersName $ subschemaSubentry $ entryDN $ namingContexts $ aliasedObjectName $ dynamicSubtrees $ distinguishedName $ seeAlso $ olcDefaultSearchBase $ olcRootDN $ olcSchemaDN $ olcSuffix $ olcUpdateDN $ olcRelay $ member $ owner $ roleOccupant $ manager $ documentAuthor $ secretary $ associatedName $ dITRedirect ) ) Jun 14 20:31:29 freebsd slapd[5797]: 2.5.13.0 (objectIdentifierMatch): Jun 14 20:31:29 freebsd slapd[5797]: matchingRuleUse: ( 2.5.13.0 NAME 'objectIdentifierMatch' APPLIES ( supportedControl $ supportedExtension $ supportedFeatures $ supportedApplicationContext ) ) Jun 14 20:31:29 freebsd slapd[5798]: slapd startup: initiated. Jun 14 20:31:29 freebsd slapd[5798]: backend_startup_one: starting "=config" Jun 14 20:31:29 freebsd slapd[5798]: config_back_db_open Jun 14 20:31:29 freebsd slapd[5798]: config_back_db_open: line 0: warning: cannot assess the validity of the ACL scope within backend naming context Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "=config" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "=module{0}" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "=schema" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "={0}core" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "={1}cosine" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "={2}inetorgperson" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "={3}nis" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "olcDatabase={-1}frontend" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "olcDatabase={0}config" Jun 14 20:31:29 freebsd slapd[5798]: config_build_entry: "olcDatabase={1}bdb" Jun 14 20:31:29 freebsd slapd[5798]: backend_startup_one: starting "=test,=cz" Jun 14 20:31:29 freebsd slapd[5798]: bdb_db_open: "=test,=cz" Jun 14 20:31:29 freebsd slapd[5798]: bdb_db_open: database "=test,=cz": dbenv_open(/var/db/openldap-data). Jun 14 20:31:29 freebsd slapd[5798]: slapd starting Jun 14 20:31:29 freebsd slapd[5798]: daemon: added 4r listener=0x0 Jun 14 20:31:29 freebsd slapd[5798]: daemon: added 6r listener=0x8019450c0 Jun 14 20:31:29 freebsd slapd[5798]: daemon: added 7r listener=0x801945180 Jun 14 20:31:29 freebsd slapd[5798]: daemon: select: listen=6 active_threads=0 tvp=NULL Jun 14 20:31:29 freebsd slapd[5798]: daemon: select: listen=7 active_threads=0 tvp=NULL Jun 14 20:31:29 freebsd slapd[5798]: daemon: activity on 1 descriptor Jun 14 20:31:29 freebsd slapd[5798]: daemon: waked Jun 14 20:31:29 freebsd slapd[5798]: daemon: select: listen=6 active_threads=0 tvp=NULL Jun 14 20:31:29 freebsd slapd[5798]: daemon: select: listen=7 active_threads=0 tvp=NULLLog debug je zase přílohou a je to už při pokusu o přihlášení.
auth.log Jun 14 20:34:03 freebsd sshd[5813]: pam_ldap: error trying to bind as user "uid=root,ou=People,=test,=cz" (Invalid credentials) Jun 14 20:34:03 freebsd sshd[5811]: Accepted keyboard-interactive/pam for root from 192.168.56.1 port 41477 ssh2
message Jun 14 20:34:03 freebsd sshd[5813]: pam_ldap: error trying to bind as user "uid=root,ou=People,=test,=cz" (Invalid credentials)
access to attrs=userPassword
by dn="cn=root,dc=test,dc=cz" write
by anonymous auth
by self write
by * none
access to attrs=uidNumber,gidNumber,uid,homeDirectory
by dn="cn=root,dc=test,dc=cz" write
by self read
by * read
access to *
by dn="cn=root,dc=test,dc=cz" write
by self write
by * read
debug.log Jun 14 21:21:33 freebsd slapd[1562]: @(#) $OpenLDAP: slapd 2.4.18 (Sep 9 2009 07:45:36) $ root@freebsd.org:/work/a/ports/net/openldap24-server/work/openldap-2.4.18/servers/slapd Jun 14 21:21:33 freebsd slapd[1563]: config_back_db_open: line 0: warning: cannot assess the validity of the ACL scope within backend naming context Jun 14 21:21:33 freebsd slapd[1563]: slapd starting
Jun 14 21:22:08 freebsd slapd[1563]: conn=0 fd=11 ACCEPT from IP=127.0.0.1:36857 (IP=127.0.0.1:389) Jun 14 21:22:08 freebsd slapd[1563]: conn=0 op=0 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:22:08 freebsd slapd[1563]: conn=0 op=0 RESULT tag=97 err=49 text= Jun 14 21:22:08 freebsd slapd[1563]: conn=0 op=1 UNBIND Jun 14 21:22:08 freebsd slapd[1563]: conn=0 fd=11 closed Jun 14 21:22:08 freebsd slapd[1563]: conn=1 op=0 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:22:08 freebsd slapd[1563]: conn=1 op=0 RESULT tag=97 err=49 text= Jun 14 21:22:08 freebsd slapd[1563]: conn=1 fd=12 ACCEPT from IP=127.0.0.1:23152 (IP=127.0.0.1:389) Jun 14 21:22:08 freebsd slapd[1563]: conn=1 op=1 UNBIND Jun 14 21:22:08 freebsd slapd[1563]: conn=1 fd=12 closed
debug.log Jun 14 21:32:11 freebsd slapd[1723]: conn=0 fd=11 ACCEPT from IP=127.0.0.1:56043 (IP=127.0.0.1:389) Jun 14 21:32:11 freebsd slapd[1723]: conn=0 op=0 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:32:11 freebsd slapd[1723]: conn=0 op=0 RESULT tag=97 err=49 text= Jun 14 21:32:13 freebsd slapd[1723]: conn=0 op=1 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:32:13 freebsd slapd[1723]: conn=0 op=1 RESULT tag=97 err=49 text= Jun 14 21:32:13 freebsd slapd[1723]: conn=0 fd=11 closed (connection lost) Jun 14 21:32:13 freebsd slapd[1723]: conn=1 fd=11 ACCEPT from IP=127.0.0.1:25834 (IP=127.0.0.1:389) Jun 14 21:32:13 freebsd slapd[1723]: conn=1 op=0 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:32:13 freebsd slapd[1723]: conn=1 op=0 RESULT tag=97 err=49 text= Jun 14 21:32:13 freebsd slapd[1723]: conn=1 op=1 UNBIND Jun 14 21:32:13 freebsd slapd[1723]: conn=1 fd=11 closed Jun 14 21:32:13 freebsd slapd[1723]: conn=2 fd=11 ACCEPT from IP=127.0.0.1:40514 (IP=127.0.0.1:389) Jun 14 21:32:13 freebsd slapd[1723]: conn=2 op=0 BIND dn="cn=root,dc=test,dc=cz" method=128 Jun 14 21:32:13 freebsd slapd[1723]: conn=2 op=0 RESULT tag=97 err=49 text= Jun 14 21:32:13 freebsd slapd[1723]: conn=2 op=1 UNBIND Jun 14 21:32:13 freebsd slapd[1723]: conn=2 fd=11 closed
auth.log Jun 14 21:32:11 freebsd sshd[1726]: pam_ldap: error trying to bind (Invalid credentials) Jun 14 21:32:13 freebsd sshd[1726]: pam_ldap: error trying to bind (Invalid credentials) Jun 14 21:32:13 freebsd sshd[1724]: Accepted keyboard-interactive/pam for test from 192.168.56.1 port 48165 ssh2 Jun 14 21:32:13 freebsd sshd[1727]: nss_ldap: failed to bind to LDAP server ldap://127.0.0.1: Invalid credentials Jun 14 21:32:13 freebsd sshd[1727]: nss_ldap: failed to bind to LDAP server ldap://127.0.0.1: Invalid credentials Jun 14 21:32:13 freebsd sshd[1727]: nss_ldap: could not search LDAP server - Server is unavailable
message Jun 14 21:32:11 freebsd sshd[1726]: pam_ldap: error trying to bind (Invalid credentials) Jun 14 21:32:13 freebsd sshd[1726]: pam_ldap: error trying to bind (Invalid credentials) Jun 14 21:32:13 freebsd sshd[1727]: nss_ldap: could not search LDAP server - Server is unavailable
# extended LDIF # # LDAPv3 # base <=test,=cz> (default) with scope subtree # filter: =root,=test,=cz # requesting: -W # # search result search: 2 result: 0 Success # numResponses: 1nevím zda je ten příkaz správně abych se připojil k LDAP na 127.0.0.1 musel jsem odstranit z výpisu DC a CN znaky tak aby mi tato konference výpis logu vzala-
ldappasswd -D "cn=root,dc=test,dc=cz" -S -W "uid=UŽIVATEL,ou=SKUPINA,dc=test,dc=cz"
Tiskni
Sdílej: