[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
RE: (ITS#7434) idassert-bind fails after restarting slapd
--_e0f270ad-e1a3-48b6-986f-f9f11dfd57c0_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Quanah=2C=20
=20
I finally got back around to working on this over the last couple of days. =
Where I'm at with my project is: I have two servers (virtual machines)=2C =
named master and replica=2C with slapd configured with my directory inform=
ation and single-master replication between them. =20
I created a Kerberos realm and various principals in open ldap. =20
Replication access is authenticated using sasl/gssapi with the slapd princ=
ipal=2C ldap/replica.example.net. =20
k5start has been added to system startup to buid the credential cache for =
slapd.
=20
That brings me to configuring referrals and proxyAuth on replica. What ap=
pears to be happening is that at the initial configuration (before restarti=
ng the daemon) is the client binds to the replica and authenticates with it=
s kerberos ticket. The "magic" is performed on the sasl user
and the ldap directory entry is returned. It then proceeds into the modifi=
cation and notices the update referral. It then checks to determine if the=
binddn used in in the olcDbIDAssertBind
statems can authzTo the bound user. It can and the proxy of the modificati=
on proceeds. On the master=2C the proxy request is received=2C more "magic=
" is done on the user id to make sure it is in=20
the correct form=2C the authzTo attribute is again checked and allowed. Th=
e update is performed as the user=2C and success is returned back through t=
he chain to the user. This is how I would expect=20
the process to proceed. However=2C if I restart the server (or slapd daemo=
n)=2C this behavior changes. After restarting=2C the bind occurs at the re=
plica=2C does "magic"=2C and then sees the referral and attempts the proxy.=
What's notable here is that the check of authzTo is NOT performed.
The refereal is then chased=2C but the authzTo check was never made. Since=
there is no user to "authzTo"=2C does the referral get chased with perhaps=
a "null" or anonymous user?
Whatever the case=2C it appears the the original binding user is never sent=
over the proxy. Over at the master=2C I see the bind request come on from=
the replica which is treated as an anonymous bind request.
No magic=2C no authzTo check=2C no nothing. It then goes straight into the=
modification and tries to perform=2C but is blocked due to the bound user =
being anonymous and the stronger authentication error (8) is returned. =20
Given that the bind occured anonymously=2C I feel that error is expected an=
d wanted.
=20
I had been trying to use sasl binding here=2C but was not having the same s=
ucess that I had with syncrepl. In order to only fight one battle at a tim=
e=2C I changed by proxy config to use a simple bind instead of sasl/gssapi.=
=20
=20
Referrals and proxy authentication are configured on replica with the follo=
wing ldif. I tried setting the override flag because the man page makes it=
sound like it forces the authzTo check at bind time.
By doing that I was hoping I could force the check and see the authzTo proc=
ess in my logs. Is this what the ITS you mentions is referring to?=20
dn: olcDatabase=3D{1}hdb=2Ccn=3Dconfig
changetype: modify
add: olcUpdateref
olcUpdateref: "ldap://master.example.net:389/"
=20
dn: cn=3Dmodule{0}=2Ccn=3Dconfig
changetype: modify
add: olcModuleLoad
olcModuleLoad: {1}back_ldap
=20
dn: olcOverlay=3Dchain=2ColcDatabase=3D{-1}frontend=2Ccn=3Dconfig
changetype: add
objectClass: olcOverlayConfig
objectClass: olcChainConfig
olcOverlay: {0}chain
olcChainReturnError: TRUE
=20
dn: olcDatabase=3Dldap=2ColcOverlay=3D{0}chain=2ColcDatabase=3D{-1}fronten=
d=2Ccn=3Dconfig
changetype: add
objectClass: olcLDAPConfig
objectClass: olcChainDatabase
olcDatabase: {0}ldap
olcDbURI: "ldap://master.example.net:389/"
olcDbRebindAsUser: TRUE
olcDbIDAssertBind: bindmethod=3Dsimple
binddn=3D"cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet"
credentials=3Dshhh-secret
mode=3Dself
flags=3Doverride
starttls=3Dcritical
tls_reqcert=3Ddemand
tls_cacert=3D/etc/ssl/certs/cacert.pem =20
=20
After adding that information via ldapmodify=2C I attempt to perform an upd=
ate on the replica. For testing=2C i simply change the description attribu=
te for uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet. I'm us=
ing this simple ldif to test with:
dn: uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
changetype: modify
replace: description
description: Network Administrator
Initially after configuring the proxy and obtainng a kerberos ticket for th=
e account (administrator=2C self write)=2C this update succeeds. Looking a=
t syslog on replica=2C I see happiness. The ldap modify binds using gssapi=
=2C I see SASL name being correctly converted to uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet.
Dec 3 22:17:01 replica slapd[994]: SASL Canonicalize [conn=3D1005]: auth=
cid=3D"administrator"
Dec 3 22:17:01 replica slapd[994]: slap_sasl_getdn: conn 1005 id=3Dadmini=
strator [len=3D13]
Dec 3 22:17:01 replica slapd[994]: slap_sasl_getdn: u:id converted to uid=
=3Dadministrator=2Ccn=3DEXAMPLE.NET=2Ccn=3DGSSAPI=2Ccn=3Dauth
Dec 3 22:17:01 replica slapd[994]: >>> dnNormalize: <uid=3Dadministrator=
=2Ccn=3DEXAMPLE.NET=2Ccn=3DGSSAPI=2Ccn=3Dauth>
Dec 3 22:17:01 replica slapd[994]: <<< dnNormalize: <uid=3Dadministrator=
=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth>
Dec 3 22:17:01 replica slapd[994]: =3D=3D>slap_sasl2dn: converting SASL n=
ame uid=3Dadministrator=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth to a D=
N
Dec 3 22:17:01 replica slapd[994]: =3D=3D> rewrite_context_apply [depth=
=3D1] string=3D'uid=3Dadministrator=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=
=3Dauth'
Dec 3 22:17:01 replica slapd[994]: =3D=3D> rewrite_rule_apply rule=3D'uid=
=3Dldap/([^/\.]+).example.net=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth'=
string=3D'uid=3Dadministrator=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth=
' [1 pass(es)]
Dec 3 22:17:01 replica slapd[994]: =3D=3D> rewrite_rule_apply rule=3D'uid=
=3D([^=2C]+)=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth' string=3D'uid=3D=
administrator=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth' [1 pass(es)]
Dec 3 22:17:01 replica slapd[994]: =3D=3D> rewrite_context_apply [depth=
=3D1] res=3D{0=2C'uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dn=
et'}
Dec 3 22:17:01 replica slapd[994]: [rw] authid: "uid=3Dadministrator=2Ccn=
=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth" -> "uid=3Dadministrator=2Cou=3Dpe=
ople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 replica slapd[994]: slap_parseURI: parsing uid=3Dadministr=
ator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 replica slapd[994]: >>> dnNormalize: <uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 replica slapd[994]: <<< dnNormalize: <uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 replica slapd[994]: <=3D=3Dslap_sasl2dn: Converted SASL na=
me to uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 replica slapd[994]: slap_sasl_getdn: dn:id converted to ui=
d=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 replica slapd[994]: SASL Canonicalize [conn=3D1005]: slapA=
uthcDN=3D"uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 replica slapd[994]: SASL proxy authorize [conn=3D1005]: au=
thcid=3D"administrator@EXAMPLE.NET" authzid=3D"administrator@EXAMPLE.NET"
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D2 BIND authcid=3D"adm=
inistrator@EXAMPLE.NET" authzid=3D"administrator@EXAMPLE.NET"
Dec 3 22:17:01 replica slapd[994]: SASL Authorize [conn=3D1005]: proxy a=
uthorization allowed authzDN=3D""
Dec 3 22:17:01 replica slapd[994]: send_ldap_sasl: err=3D0 len=3D-1
Dec 3 22:17:01 replica slapd[994]: daemon: activity on 1 descriptor
Dec 3 22:17:01 replica slapd[994]: daemon: activity on:
Dec 3 22:17:01 replica slapd[994]:=20
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D2 BIND dn=3D"uid=3Dadm=
inistrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" mech=3DGSSAPI sasl_ssf=
=3D56 ssf=3D56
Dec 3 22:17:01 replica slapd[994]: do_bind: SASL/GSSAPI bind: dn=3D"uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" sasl_ssf=3D56
Dec 3 22:17:01 replica slapd[994]: send_ldap_response: msgid=3D3 tag=3D97=
err=3D0
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D2 RESULT tag=3D97 err=
=3D0 text=3D
Dec 3 22:17:01 replica slapd[994]: <=3D=3D slap_sasl_bind: rc=3D0
All good=2C so far on replica. I believe the sasl/gssapi authntication pr=
ocess is completed. Now to perform the modify.
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D3 do_modify
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D3 do_modify: dn (uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)
Dec 3 22:17:01 replica slapd[994]: >>> dnPrettyNormal: <uid=3Dadministrat=
or=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 replica slapd[994]: <<< dnPrettyNormal: <uid=3Dadministrat=
or=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=2C <uid=3Dadministrator=2Cou=3D=
people=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D3 modifications:
Dec 3 22:17:01 replica slapd[994]: #011replace: description
Dec 3 22:17:01 replica slapd[994]: #011#011one value=2C length 21
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D3 MOD dn=3D"uid=3Dadm=
inistrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D3 MOD attr=3Ddescript=
ion
Dec 3 22:17:01 replica slapd[994]: bdb_dn2entry("uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")
Dec 3 22:17:01 replica slapd[994]: send_ldap_result: conn=3D1005 op=3D3 p=
=3D3
Dec 3 22:17:01 replica slapd[994]: send_ldap_result: err=3D10 matched=3D"=
" text=3D""
Dec 3 22:17:01 replica slapd[994]: send_ldap_result: referral=3D"ldap://m=
aster.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=
=3Dnet"
Dec 3 22:17:01 replica slapd[994]: >>> dnPrettyNormal: <uid=3Dadministrat=
or=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 replica slapd[994]: daemon: activity on 1 descriptor
Dec 3 22:17:01 replica slapd[994]: daemon: activity on:
Dec 3 22:17:01 replica slapd[994]:=20
Dec 3 22:17:01 replica slapd[994]: <<< dnPrettyNormal: <uid=3Dadministrato=
r=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=2C <uid=3Dadministrator=2Cou=3Dp=
eople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D3 ldap_chain_op: ref=
=3D"ldap://master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3D=
example=2Cdc=3Dnet" -> "ldap://master.example.net:389"
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D3 ldap_chain_op: ref=
=3D"ldap://master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3D=
example=2Cdc=3Dnet": URI=3D"ldap://master.example.net:389" found in cache
=20
Okay=2C now it seems that the referral is returned and chased on behalf of=
the client. Finally=2C from the perspective of replica=2C success! Modif=
ied data comes back to replica via syncrepl.
Dec 3 22:17:01 replica slapd[994]: =3D>ldap_back_getconn: conn 0x7fe0b01=
47c30 fetched refcnt=3D1.
Dec 3 22:17:01 replica slapd[994]: send_ldap_result: conn=3D1005 op=3D3 p=
=3D3
Dec 3 22:17:01 replica slapd[994]: send_ldap_result: err=3D0 matched=3D""=
text=3D""
Dec 3 22:17:01 replica slapd[994]: send_ldap_response: msgid=3D4 tag=3D10=
3 err=3D0
Dec 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D3 RESULT tag=3D103 er=
r=3D0 text=3D
=20
Dec 3 22:17:01 replica slapd[994]: daemon: activity on 1 descriptor
Dec 3 22:17:01 replica slapd[994]: daemon: activity on:
Dec 3 22:17:01 replica slapd[994]: 15r
Dec 3 22:17:01 replica slapd[994]:=20
Dec 3 22:17:01 replica slapd[994]: daemon: read active on 15
Dec 3 22:17:01 replica slapd[994]: connection_get(15)
Dec 3 22:17:01 replica slapd[994]: connection_get(15): got connid=3D0
Dec 3 22:17:01 replica slapd[994]: =3D>do_syncrepl rid=3D123
Dec 3 22:17:01 replica slapd[994]: =3D>do_syncrep2 rid=3D123
Dec 3 22:17:01 replica slapd[994]: do_syncrep2: rid=3D123 cookie=3Drid=3D=
123=2Ccsn=3D20121204031701.560697Z#000000#000#000000
Dec 3 22:17:01 replica slapd[994]: >>> dnPrettyNormal: <uid=3Dadministrat=
or=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 replica slapd[994]: <<< dnPrettyNormal: <uid=3Dadministrat=
or=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=2C <uid=3Dadministrator=2Cou=3D=
people=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 replica slapd[994]: >>> dnPretty: <cn=3Dadmin=2Cdc=3Dexamp=
le=2Cdc=3Dnet>
Dec 3 22:17:01 replica slapd[994]: <<< dnPretty: <cn=3Dadmin=2Cdc=3Dexamp=
le=2Cdc=3Dnet>
Dec 3 22:17:01 replica slapd[994]: >>> dnNormalize: <cn=3Dadmin=2Cdc=3Dex=
ample=2Cdc=3Dnet>
Dec 3 22:17:01 replica rsyslogd-2177: imuxsock begins to drop messages fr=
om pid 994 due to rate-limiting
So everything looks good (correct?) on replica. Meanwhile=2C back at the =
master....=20
Dec 3 22:17:01 master slapd[947]: daemon: activity on 1 descriptor
Dec 3 22:17:01 master slapd[947]: daemon: activity on:
Dec 3 22:17:01 master slapd[947]: 51r
Dec 3 22:17:01 master slapd[947]:=20
Dec 3 22:17:01 master slapd[947]: daemon: read active on 51
Dec 3 22:17:01 master slapd[947]: connection_get(51)
Dec 3 22:17:01 master slapd[947]: connection_get(51): got connid=3D1054
Dec 3 22:17:01 master slapd[947]: connection_read(51): checking for input=
on id=3D1054
Dec 3 22:17:01 master slapd[947]: op tag 0x66=2C time 1354591021
Dec 3 22:17:01 master slapd[947]: daemon: activity on 1 descriptor
Dec 3 22:17:01 master slapd[947]: daemon: activity on:
Dec 3 22:17:01 master slapd[947]:=20
Dec 3 22:17:01 master slapd[947]: conn=3D1054 op=3D3 do_modify
Dec 3 22:17:01 master slapd[947]: conn=3D1054 op=3D3 do_modify: dn (uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)
Dec 3 22:17:01 master slapd[947]: =3D> get_ctrls
Dec 3 22:17:01 master slapd[947]: =3D> get_ctrls: oid=3D"2.16.840.1.11373=
0.3.4.18" (noncritical)
Dec 3 22:17:01 master slapd[947]: parseProxyAuthz: conn 1054 authzid=3D"d=
n:uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: slap_sasl_getdn: conn 1054 id=3Ddn:uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet [len=3D48]
Dec 3 22:17:01 master slapd[947]: >>> dnNormalize: <uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 master slapd[947]: <<< dnNormalize: <uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 master slapd[947]: =3D=3D>slap_sasl2dn: converting SASL na=
me uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet to a DN
Dec 3 22:17:01 master slapd[947]: =3D=3D> rewrite_context_apply [depth=3D=
1] string=3D'uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet'
Dec 3 22:17:01 master slapd[947]: =3D=3D> rewrite_rule_apply rule=3D'uid=
=3Dldap/([^/\.]+).example.net=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth'=
string=3D'uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet' [1 =
pass(es)]
Dec 3 22:17:01 master slapd[947]: =3D=3D> rewrite_rule_apply rule=3D'uid=
=3D([^=2C]+)=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth' string=3D'uid=3D=
administrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet' [1 pass(es)]
Dec 3 22:17:01 master slapd[947]: =3D=3D> rewrite_context_apply [depth=3D=
1] res=3D{0=2C'uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet'=
}
Dec 3 22:17:01 master slapd[947]: [rw] authid: "uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" -> "uid=3Dadministrator=2Cou=3Dpeople=
=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: slap_parseURI: parsing uid=3Dadministra=
tor=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: >>> dnNormalize: <uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 master slapd[947]: <<< dnNormalize: <uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 master slapd[947]: <=3D=3Dslap_sasl2dn: Converted SASL nam=
e to uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: slap_sasl_getdn: dn:id converted to uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: parseProxyAuthz: conn=3D1054 "uid=3Dadm=
inistrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: =3D=3D>slap_sasl_authorized: can cn=3Dr=
eplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet become uid=3Dadministrator=2C=
ou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet?
Dec 3 22:17:01 master slapd[947]: =3D=3D>slap_sasl_check_authz: does uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet match authzTo rule=
in cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet?
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: ndn: "cn=3Dreplica=
=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: oc: "(null)"=2C at:=
"authzTo"
Dec 3 22:17:01 master slapd[947]: bdb_dn2entry("cn=3Dreplica=2Cou=3Dhosts=
=2Cdc=3Dexample=2Cdc=3Dnet")
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: found entry: "cn=3D=
replica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: bdb_entry_get: rc=3D0
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: result not in cach=
e (authzTo)
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: auth access to "cn=
=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet" "authzTo" requested
Dec 3 22:17:01 master slapd[947]: =3D> acl_get: [2] attr authzTo
Dec 3 22:17:01 master slapd[947]: =3D> acl_mask: access to entry "cn=3Dre=
plica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet"=2C attr "authzTo" requested
Dec 3 22:17:01 master slapd[947]: =3D> acl_mask: to all values by "cn=3Dr=
eplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet"=2C (=3D0)=20
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: users
Dec 3 22:17:01 master slapd[947]: <=3D acl_mask: [1] applying read(=3Drsc=
xd) (stop)
Dec 3 22:17:01 master slapd[947]: <=3D acl_mask: [1] mask: read(=3Drscxd)
Dec 3 22:17:01 master slapd[947]: =3D> slap_access_allowed: auth access g=
ranted by read(=3Drscxd)
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: auth access grante=
d by read(=3Drscxd)
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: result was in cach=
e (authzTo)
Dec 3 22:17:01 master slapd[947]: =3D=3D=3D>slap_sasl_match: comparing DN=
uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet to rule dn:*
Dec 3 22:17:01 master slapd[947]: slap_parseURI: parsing dn:*
Dec 3 22:17:01 master slapd[947]: <=3D=3D=3Dslap_sasl_match: comparison r=
eturned 0
Dec 3 22:17:01 master slapd[947]: <=3D=3Dslap_sasl_check_authz: authzTo c=
heck returning 0
Dec 3 22:17:01 master slapd[947]: <=3D=3D slap_sasl_authorized: return 0
Dec 3 22:17:01 master slapd[947]: conn=3D1054 op=3D3 PROXYAUTHZ dn=3D"uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: <=3D get_ctrls: n=3D1 rc=3D0 err=3D""
Dec 3 22:17:01 master slapd[947]: >>> dnPrettyNormal: <uid=3Dadministrato=
r=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 master slapd[947]: <<< dnPrettyNormal: <uid=3Dadministrato=
r=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=2C <uid=3Dadministrator=2Cou=3Dp=
eople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:17:01 master slapd[947]: conn=3D1054 op=3D3 modifications:
Dec 3 22:17:01 master slapd[947]: #011replace: description
Dec 3 22:17:01 master slapd[947]: #011#011one value=2C length 21
Dec 3 22:17:01 master slapd[947]: conn=3D1054 op=3D3 MOD dn=3D"uid=3Dadmi=
nistrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: conn=3D1054 op=3D3 MOD attr=3Ddescripti=
on
Dec 3 22:17:01 master slapd[947]: bdb_dn2entry("uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: ndn: "uid=3Dadminis=
trator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: oc: "(null)"=2C at:=
"(null)"
Dec 3 22:17:01 master slapd[947]: bdb_dn2entry("uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: found entry: "uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: bdb_entry_get: rc=3D0
Dec 3 22:17:01 master slapd[947]: =3D> test_filter
Dec 3 22:17:01 master slapd[947]: PRESENT
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: search access to "=
uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" "objectClass" =
requested
Dec 3 22:17:01 master slapd[947]: =3D> dn: [4] ou=3Dkerberos=2Cdc=3Dexamp=
le=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: =3D> dn: [5]=20
Dec 3 22:17:01 master slapd[947]: =3D> acl_get: [6] attr objectClass
Dec 3 22:17:01 master slapd[947]: =3D> acl_mask: access to entry "uid=3Da=
dministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"=2C attr "objectClass"=
requested
Dec 3 22:17:01 master slapd[947]: =3D> acl_mask: to all values by "cn=3Dr=
eplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet"=2C (=3D0)=20
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: cn=3Dadm-srv=2Cou=
=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: self
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: users
Dec 3 22:17:01 master slapd[947]: <=3D acl_mask: [3] applying read(=3Drsc=
xd) (stop)
Dec 3 22:17:01 master slapd[947]: <=3D acl_mask: [3] mask: read(=3Drscxd)
Dec 3 22:17:01 master slapd[947]: =3D> slap_access_allowed: search access=
granted by read(=3Drscxd)
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: search access gran=
ted by read(=3Drscxd)
Dec 3 22:17:01 master slapd[947]: <=3D test_filter 6
Dec 3 22:17:01 master slapd[947]: syncprov_matchops: sid ffffffff fscope =
1 rc 6
Dec 3 22:17:01 master slapd[947]: hdb_modify: uid=3Dadministrator=2Cou=3D=
people=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: slap_queue_csn: queing 0x7fa90f0fe110 2=
0121204031701.560697Z#000000#000#000000
Dec 3 22:17:01 master slapd[947]: bdb_dn2entry("uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")
Dec 3 22:17:01 master slapd[947]: bdb_modify_internal: 0x0000000b: uid=3D=
administrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: result not in cach=
e (description)
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: delete access to "=
uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" "description" =
requested
Dec 3 22:17:01 master slapd[947]: =3D> dn: [4] ou=3Dkerberos=2Cdc=3Dexamp=
le=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: =3D> dn: [5]=20
Dec 3 22:17:01 master slapd[947]: =3D> acl_get: [6] attr description
Dec 3 22:17:01 master slapd[947]: =3D> acl_mask: access to entry "uid=3Da=
dministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"=2C attr "description"=
requested
Dec 3 22:17:01 master slapd[947]: =3D> acl_mask: to all values by "uid=3D=
administrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"=2C (=3D0)=20
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: cn=3Dadm-srv=2Cou=
=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: self
Dec 3 22:17:01 master slapd[947]: <=3D acl_mask: [2] applying write(=3Dwr=
scxd) (stop)
Dec 3 22:17:01 master slapd[947]: <=3D acl_mask: [2] mask: write(=3Dwrscx=
d)
Dec 3 22:17:01 master slapd[947]: =3D> slap_access_allowed: delete access=
granted by write(=3Dwrscxd)
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: delete access gran=
ted by write(=3Dwrscxd)
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: result not in cach=
e (description)
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: add access to "uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" "description" req=
uested
Dec 3 22:17:01 master slapd[947]: =3D> dn: [4] ou=3Dkerberos=2Cdc=3Dexamp=
le=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: =3D> dn: [5]=20
Dec 3 22:17:01 master slapd[947]: =3D> acl_get: [6] attr description
Dec 3 22:17:01 master slapd[947]: =3D> acl_mask: access to entry "uid=3Da=
dministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"=2C attr "description"=
requested
Dec 3 22:17:01 master slapd[947]: =3D> acl_mask: to value by "uid=3Dadmin=
istrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"=2C (=3D0)=20
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: cn=3Dadm-srv=2Cou=
=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: self
Dec 3 22:17:01 master slapd[947]: <=3D acl_mask: [2] applying write(=3Dwr=
scxd) (stop)
Dec 3 22:17:01 master slapd[947]: <=3D acl_mask: [2] mask: write(=3Dwrscx=
d)
Dec 3 22:17:01 master slapd[947]: =3D> slap_access_allowed: add access gr=
anted by write(=3Dwrscxd)
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: add access granted=
by write(=3Dwrscxd)
Dec 3 22:17:01 master slapd[947]: acl: internal mod entryCSN: modify acce=
ss granted
Dec 3 22:17:01 master slapd[947]: acl: internal mod modifiersName: modify=
access granted
Dec 3 22:17:01 master slapd[947]: acl: internal mod modifyTimestamp: modi=
fy access granted
Dec 3 22:17:01 master slapd[947]: bdb_modify_internal: replace descriptio=
n
Dec 3 22:17:01 master slapd[947]: bdb_modify_internal: replace entryCSN
Dec 3 22:17:01 master slapd[947]: bdb_modify_internal: replace modifiersN=
ame
Dec 3 22:17:01 master slapd[947]: bdb_modify_internal: replace modifyTime=
stamp
Dec 3 22:17:01 master slapd[947]: oc_check_required entry (uid=3Dadminist=
rator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)=2C objectClass "inetOrgPerso=
n"
Dec 3 22:17:01 master slapd[947]: oc_check_required entry (uid=3Dadminist=
rator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)=2C objectClass "posixAccount=
"
Dec 3 22:17:01 master slapd[947]: oc_check_required entry (uid=3Dadminist=
rator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)=2C objectClass "shadowAccoun=
t"
Dec 3 22:17:01 master slapd[947]: oc_check_required entry (uid=3Dadminist=
rator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)=2C objectClass "krbPrincipal=
Aux"
Dec 3 22:17:01 master slapd[947]: oc_check_required entry (uid=3Dadminist=
rator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)=2C objectClass "krbTicketPol=
icyAux"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "objectClass"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "cn"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "sn"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "uidNumber"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "gidNumber"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "userPassword"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "homeDirectory"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "structuralObject=
Class"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "uid"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "entryUUID"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "creatorsName"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "createTimestamp"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "krbPrincipalName=
"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "krbPrincipalKey"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "krbLastPwdChange=
"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "krbLastFailedAut=
h"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "krbLoginFailedCo=
unt"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "krbLastSuccessfu=
lAuth"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "krbExtraData"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "description"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "entryCSN"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "modifiersName"
Dec 3 22:17:01 master slapd[947]: oc_check_allowed type "modifyTimestamp"
Dec 3 22:17:01 master slapd[947]: =3D> key_change(DELETE=2Cb)
Dec 3 22:17:01 master slapd[947]: bdb_idl_delete_key: b=20
Dec 3 22:17:01 master slapd[947]: <=3D key_change 0
Dec 3 22:17:01 master slapd[947]: =3D> key_change(ADD=2Cb)
Dec 3 22:17:01 master slapd[947]: bdb_idl_insert_key: b=20
Dec 3 22:17:01 master slapd[947]: <=3D key_change 0
Dec 3 22:17:01 master slapd[947]: =3D> entry_encode(0x0000000b):=20
Dec 3 22:17:01 master slapd[947]: <=3D entry_encode(0x0000000b):=20
Dec 3 22:17:01 master slapd[947]: hdb_modify: updated id=3D0000000b dn=3D"=
uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: send_ldap_result: conn=3D1054 op=3D3 p=
=3D3
Dec 3 22:17:01 master slapd[947]: send_ldap_result: err=3D0 matched=3D"" =
text=3D""
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: ndn: "uid=3Dadminis=
trator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: oc: "(null)"=2C at:=
"(null)"
Dec 3 22:17:01 master slapd[947]: bdb_dn2entry("uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: found entry: "uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: bdb_entry_get: rc=3D0
Dec 3 22:17:01 master slapd[947]: =3D> test_filter
Dec 3 22:17:01 master slapd[947]: PRESENT
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: search access to "=
uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" "objectClass" =
requested
Dec 3 22:17:01 master slapd[947]: =3D> dn: [4] ou=3Dkerberos=2Cdc=3Dexamp=
le=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: =3D> dn: [5]=20
Dec 3 22:17:01 master slapd[947]: =3D> acl_get: [6] attr objectClass
Dec 3 22:17:01 master slapd[947]: =3D> acl_mask: access to entry "uid=3Da=
dministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"=2C attr "objectClass"=
requested
Dec 3 22:17:01 master slapd[947]: =3D> acl_mask: to all values by "cn=3Dr=
eplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet"=2C (=3D0)=20
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: cn=3Dadm-srv=2Cou=
=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: self
Dec 3 22:17:01 master slapd[947]: <=3D check a_dn_pat: users
Dec 3 22:17:01 master slapd[947]: <=3D acl_mask: [3] applying read(=3Drsc=
xd) (stop)
Dec 3 22:17:01 master slapd[947]: <=3D acl_mask: [3] mask: read(=3Drscxd)
Dec 3 22:17:01 master slapd[947]: =3D> slap_access_allowed: search access=
granted by read(=3Drscxd)
Dec 3 22:17:01 master slapd[947]: =3D> access_allowed: search access gran=
ted by read(=3Drscxd)
Dec 3 22:17:01 master slapd[947]: <=3D test_filter 6
Dec 3 22:17:01 master slapd[947]: syncprov_matchops: sid ffffffff fscope =
1 rc 6
Dec 3 22:17:01 master slapd[947]: syncprov_sendresp: cookie=3Drid=3D123=
=2Ccsn=3D20121204031701.560697Z#000000#000#000000
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: ndn: "uid=3Dadminis=
trator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: oc: "(null)"=2C at:=
"(null)"
Dec 3 22:17:01 master slapd[947]: bdb_dn2entry("uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")
Dec 3 22:17:01 master slapd[947]: =3D> bdb_entry_get: found entry: "uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Everything looks good on the master. I see uid=3Dadministrator gets sent =
over from the the proxy on replica and the update proceeds as expected. No=
w if I restart slapd on replica=2C things change. performing the same modi=
fucation=2C we again see sasl/gssapi authentication occuring on replica jus=
t as before
Dec 3 22:20:38 replica slapd[1412]: [rw] authid: "uid=3Dadministrator=2C=
cn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth" -> "uid=3Dadministrator=2Cou=3D=
people=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:20:38 replica slapd[1412]: slap_parseURI: parsing uid=3Dadminist=
rator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:20:38 replica slapd[1412]: >>> dnNormalize: <uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:20:38 replica slapd[1412]: <<< dnNormalize: <uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:20:38 replica slapd[1412]: <=3D=3Dslap_sasl2dn: Converted SASL n=
ame to uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:20:38 replica slapd[1412]: slap_sasl_getdn: dn:id converted to u=
id=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
Dec 3 22:20:38 replica slapd[1412]: SASL Canonicalize [conn=3D1000]: slap=
AuthcDN=3D"uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:20:38 replica slapd[1412]: SASL proxy authorize [conn=3D1000]: a=
uthcid=3D"administrator@EXAMPLE.NET" authzid=3D"administrator@EXAMPLE.NET"
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D2 BIND authcid=3D"ad=
ministrator@EXAMPLE.NET" authzid=3D"administrator@EXAMPLE.NET"
Dec 3 22:20:38 replica slapd[1412]: SASL Authorize [conn=3D1000]: proxy =
authorization allowed authzDN=3D""
Dec 3 22:20:38 replica slapd[1412]: send_ldap_sasl: err=3D0 len=3D-1
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D2 BIND dn=3D"uid=3Da=
dministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" mech=3DGSSAPI sasl_ss=
f=3D56 ssf=3D56
Dec 3 22:20:38 replica slapd[1412]: do_bind: SASL/GSSAPI bind: dn=3D"uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" sasl_ssf=3D56
Dec 3 22:20:38 replica slapd[1412]: send_ldap_response: msgid=3D3 tag=3D9=
7 err=3D0
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D2 RESULT tag=3D97 er=
r=3D0 text=3D
Dec 3 22:20:38 replica slapd[1412]: <=3D=3D slap_sasl_bind: rc=3D0
Again=2C we head into the modification:
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 do_modify
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 do_modify: dn (uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)
Dec 3 22:20:38 replica slapd[1412]: >>> dnPrettyNormal: <uid=3Dadministra=
tor=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:20:38 replica slapd[1412]: <<< dnPrettyNormal: <uid=3Dadministra=
tor=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=2C <uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 modifications:
Dec 3 22:20:38 replica slapd[1412]: #011replace: description
Dec 3 22:20:38 replica slapd[1412]: #011#011one value=2C length 21
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 MOD dn=3D"uid=3Dad=
ministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 MOD attr=3Ddescrip=
tion
Dec 3 22:20:38 replica slapd[1412]: bdb_dn2entry("uid=3Dadministrator=2Co=
u=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")
Dec 3 22:20:38 replica slapd[1412]: =3D> hdb_dn2id("ou=3Dpeople=2Cdc=3Dex=
ample=2Cdc=3Dnet")
Dec 3 22:20:38 replica slapd[1412]: <=3D hdb_dn2id: got id=3D0x3
Dec 3 22:20:38 replica slapd[1412]: daemon: activity on 1 descriptor
Dec 3 22:20:38 replica slapd[1412]: daemon: activity on:
Dec 3 22:20:38 replica slapd[1412]: =20
So far=2C so good (I think)=2C replica sees the need to refer the action a=
nd tries to chase it on behalf of the clent:
Dec 3 22:20:38 replica slapd[1412]: =3D> hdb_dn2id("uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")
Dec 3 22:20:38 replica slapd[1412]: <=3D hdb_dn2id: got id=3D0xb
Dec 3 22:20:38 replica slapd[1412]: entry_decode: ""
Dec 3 22:20:38 replica slapd[1412]: <=3D entry_decode()
Dec 3 22:20:38 replica slapd[1412]: send_ldap_result: conn=3D1000 op=3D3 =
p=3D3
Dec 3 22:20:38 replica slapd[1412]: send_ldap_result: err=3D10 matched=3D=
"" text=3D""
Dec 3 22:20:38 replica slapd[1412]: send_ldap_result: referral=3D"ldap://=
master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cd=
c=3Dnet"
Dec 3 22:20:38 replica slapd[1412]: >>> dnPrettyNormal: <uid=3Dadministra=
tor=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:20:38 replica slapd[1412]: <<< dnPrettyNormal: <uid=3Dadministra=
tor=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=2C <uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 ldap_chain_op: ref=
=3D"ldap://master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3D=
example=2Cdc=3Dnet" -> "ldap://master.example.net:389"
Dec 3 22:20:38 replica slapd[1412]: ldap_back_db_open: URI=3Dldap://maste=
r.example.net:389
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 ldap_chain_op: ref=
=3D"ldap://master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3D=
example=2Cdc=3Dnet" temporary
Dec 3 22:20:38 replica slapd[1412]: =3D>ldap_back_getconn: conn=3D1000 op=
=3D3: lc=3D0x7f213015a7d0 inserted refcnt=3D1 rc=3D0
Dec 3 22:20:38 replica slapd[1412]: send_ldap_result: conn=3D1000 op=3D3 =
p=3D3 =20
At this point=2C I "assume" the modification has been passed off to master.=
However=2C I notice that I never see the replica checking authzTo like be=
fore the restart. I think this is where it's falling apart for me and the e=
rr=3D8 back is returned from master.
=20
Dec 3 22:20:38 replica slapd[1412]: send_ldap_result: err=3D8 matched=3D"=
" text=3D"modifications require authentication"
Dec 3 22:20:38 replica slapd[1412]: send_ldap_result: conn=3D1000 op=3D3 =
p=3D3
Dec 3 22:20:38 replica slapd[1412]: send_ldap_result: err=3D8 matched=3D"=
" text=3D""
Dec 3 22:20:38 replica slapd[1412]: send_ldap_response: msgid=3D4 tag=3D1=
03 err=3D8
Dec 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 RESULT tag=3D103 e=
rr=3D8 text=3D
Dec 3 22:20:38 replica slapd[1412]: daemon: activity on 1 descriptor
Dec 3 22:20:38 replica slapd[1412]: daemon: activity on:
Dec 3 22:20:38 replica slapd[1412]: 18r =20
Over on the master we see the proxy connection occurs=2C but the client cr=
edentials never apper to arrive. I say that because=2C it looks to me like=
the proxy connection from replica appears to bind anonymously.
Dec 3 22:20:38 master slapd[947]: daemon: activity on 1 descriptor
Dec 3 22:20:38 master slapd[947]: daemon: activity on:
Dec 3 22:20:38 master slapd[947]:=20
Dec 3 22:20:38 master slapd[947]: slap_listener_activate(8):=20
Dec 3 22:20:38 master slapd[947]: >>> slap_listener(ldap:///)
Dec 3 22:20:38 master slapd[947]: daemon: listen=3D8=2C new connection on=
51
Dec 3 22:20:38 master slapd[947]: daemon: added 51r (active) listener=3D(=
nil)
Dec 3 22:20:38 master slapd[947]: conn=3D1056 fd=3D51 ACCEPT from IP=3D19=
2.168.1.2:34759 (IP=3D0.0.0.0:389)
Dec 3 22:20:38 master slapd[947]: daemon: activity on 2 descriptors
Dec 3 22:20:38 master slapd[947]: daemon: activity on:
Dec 3 22:20:38 master slapd[947]: 51r
Dec 3 22:20:38 master slapd[947]:=20
Dec 3 22:20:38 master slapd[947]: daemon: read active on 51
Dec 3 22:20:38 master slapd[947]: connection_get(51)
Dec 3 22:20:38 master slapd[947]: connection_get(51): got connid=3D1056
Dec 3 22:20:38 master slapd[947]: connection_read(51): checking for input=
on id=3D1056
Dec 3 22:20:38 master slapd[947]: op tag 0x60=2C time 1354591238
Dec 3 22:20:38 master slapd[947]: conn=3D1056 op=3D0 do_bind
Dec 3 22:20:38 master slapd[947]: >>> dnPrettyNormal: <>
Dec 3 22:20:38 master slapd[947]: <<< dnPrettyNormal: <>=2C <>
Dec 3 22:20:38 master slapd[947]: conn=3D1056 op=3D0 BIND dn=3D"" method=
=3D128
Dec 3 22:20:38 master slapd[947]: do_bind: version=3D3 dn=3D"" method=3D1=
28
Dec 3 22:20:38 master slapd[947]: send_ldap_result: conn=3D1056 op=3D0 p=
=3D3
Dec 3 22:20:38 master slapd[947]: send_ldap_result: err=3D0 matched=3D"" =
text=3D""
Dec 3 22:20:38 master slapd[947]: send_ldap_response: msgid=3D1 tag=3D97 =
err=3D0
Dec 3 22:20:38 master slapd[947]: conn=3D1056 op=3D0 RESULT tag=3D97 err=
=3D0 text=3D
Dec 3 22:20:38 master slapd[947]: do_bind: v3 anonymous bind
Dec 3 22:20:38 master slapd[947]: daemon: activity on 2 descriptors
Dec 3 22:20:38 master slapd[947]: daemon: activity on:
Dec 3 22:20:38 master slapd[947]: 51r
Dec 3 22:20:38 master slapd[947]:=20
After=2C the (anonymous) bind=2C the master never attempts to if the proxya=
uth request is allowed via authzTo or anything else (perhaps obviously). T=
he modification just proceeds anonymously and eventually fails.
=20
Not sure if I'm saying this in a way that makes any sense to you. Hopeful=
ly=2C it does. It appears=2C that the proxy on replica after restarting=2C=
never tries to determine if the olcDbIDAssertBind binddn is permitted to i=
mpersonate the client via the authzTo attribute and proceeds with the refer=
al chase anonymously.
=20
I'll copy paste configs below. Sorry this is so long=2C but I figure the=
more information=2C the better when trying to solve any problem.
=20
Thanks
=20
Barry
=20
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv master configuration vvvvvvvvvvvvvvvvv=
vvvvvvvvvvv
dn: cn=3Dconfig
objectClass: olcGlobal
cn: config
olcArgsFile: /var/run/slapd/slapd.args
olcPidFile: /var/run/slapd/slapd.pid
olcToolThreads: 1
structuralObjectClass: olcGlobal
entryUUID: ea6bf008-d108-1031-912d-8fbb37ee6dd9
creatorsName: cn=3Dconfig
createTimestamp: 20121202201635Z
olcTLSCACertificateFile: /etc/ssl/certs/cacert.pem
olcTLSCertificateFile: /etc/ssl/certs/master_slapd_cert.pem
olcTLSCertificateKeyFile: /etc/ldap/master_slapd_key.pem
olcAuthzPolicy: to
olcSaslHost: master.example.net
olcSaslRealm: EXAMPLE.NET
olcAuthzRegexp: {0}uid=3Dldap/([^/\.]+).example.net=2Ccn=3Dexample.net=2Cc=
n=3Dgssapi=2Ccn=3Dauth cn=3D$1=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
olcAuthzRegexp: {1}uid=3D([^=2C]+)=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=
=3Dauth uid=3D$1=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
olcLogLevel: -1
entryCSN: 20121204013949.466434Z#000000#000#000000
modifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
modifyTimestamp: 20121204013949Z
dn: cn=3Dmodule{0}=2Ccn=3Dconfig
objectClass: olcModuleList
cn: module{0}
olcModulePath: /usr/lib/ldap
olcModuleLoad: {0}back_hdb
olcModuleLoad: {1}syncprov
structuralObjectClass: olcModuleList
entryUUID: ea6dda08-d108-1031-9135-8fbb37ee6dd9
creatorsName: cn=3Dconfig
createTimestamp: 20121202201635Z
entryCSN: 20121203054749.860918Z#000000#000#000000
modifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
modifyTimestamp: 20121203054749Z
dn: cn=3Dschema=2Ccn=3Dconfig
objectClass: olcSchemaConfig
cn: schema
structuralObjectClass: olcSchemaConfig
entryUUID: ea6c3a0e-d108-1031-9130-8fbb37ee6dd9
creatorsName: cn=3Dconfig
createTimestamp: 20121202201635Z
entryCSN: 20121202201635.672699Z#000000#000#000000
modifiersName: cn=3Dconfig
modifyTimestamp: 20121202201635Z
<snip schemas >
dn: olcBackend=3D{0}hdb=2Ccn=3Dconfig
objectClass: olcBackendConfig
olcBackend: {0}hdb
structuralObjectClass: olcBackendConfig
entryUUID: ea6f949c-d108-1031-9136-8fbb37ee6dd9
creatorsName: cn=3Dconfig
createTimestamp: 20121202201635Z
entryCSN: 20121202201635.694663Z#000000#000#000000
modifiersName: cn=3Dconfig
modifyTimestamp: 20121202201635Z
dn: olcDatabase=3D{-1}frontend=2Ccn=3Dconfig
objectClass: olcDatabaseConfig
objectClass: olcFrontendConfig
olcDatabase: {-1}frontend
olcAccess: {0}to * by dn.exact=3DgidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercr=
ed=2Ccn=3Dexternal
=2Ccn=3Dauth manage by * break
olcAccess: {1}to dn.exact=3D"" by * read
olcAccess: {2}to dn.base=3D"cn=3DSubschema" by * read
olcSizeLimit: 500
structuralObjectClass: olcDatabaseConfig
entryUUID: ea6c0bf6-d108-1031-912e-8fbb37ee6dd9
creatorsName: cn=3Dconfig
createTimestamp: 20121202201635Z
entryCSN: 20121202201635.671512Z#000000#000#000000
modifiersName: cn=3Dconfig
modifyTimestamp: 20121202201635Z
dn: olcDatabase=3D{0}config=2Ccn=3Dconfig
objectClass: olcDatabaseConfig
olcDatabase: {0}config
olcAccess: {0}to * by dn.exact=3DgidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercr=
ed=2Ccn=3Dexternal=2Ccn=3Dauth manage by * break
structuralObjectClass: olcDatabaseConfig
entryUUID: ea6c325c-d108-1031-912f-8fbb37ee6dd9
creatorsName: cn=3Dconfig
createTimestamp: 20121202201635Z
entryCSN: 20121202201635.672495Z#000000#000#000000
modifiersName: cn=3Dconfig
modifyTimestamp: 20121202201635Z
dn: olcDatabase=3D{1}hdb=2Ccn=3Dconfig
objectClass: olcDatabaseConfig
objectClass: olcHdbConfig
olcDatabase: {1}hdb
olcDbDirectory: /var/lib/ldap
olcSuffix: dc=3Dexample=2Cdc=3Dnet
olcLastMod: TRUE
olcRootDN: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
olcRootPW:: e1NTSEF9cGhKNWtqME9rOGJnVXp0dy9hYzZEaWFmU1U1Z0FTZk0=3D
olcDbCheckpoint: 512 30
olcDbConfig: {0}set_cachesize 0 2097152 0
olcDbConfig: {1}set_lk_max_objects 1500
olcDbConfig: {2}set_lk_max_locks 1500
olcDbConfig: {3}set_lk_max_lockers 1500
olcDbIndex: objectClass eq
olcDbIndex: uid eq
olcDbIndex: cn eq
olcDbIndex: ou eq
olcDbIndex: dc eq
olcDbIndex: uidNumber eq
olcDbIndex: gidNumber eq
olcDbIndex: memberUid eq
olcDbIndex: uniqueMember eq
olcDbIndex: entryUUID eq
olcDbIndex: entryCSN eq
olcDbIndex: krbPrincipalName eq=2Cpres=2Csub
olcDbIndex: krbPwdPolicyReference eq
structuralObjectClass: olcHdbConfig
entryUUID: ea6fa3ce-d108-1031-9137-8fbb37ee6dd9
creatorsName: cn=3Dconfig
createTimestamp: 20121202201635Z
olcAccess: {0}to attrs=3DuserPassword=2CshadowLastChange by group.exact=3D=
"cn=3Dreplic
ators=2Cou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet" read by self write by anon=
ymous auth
olcAccess: {1}to attrs=3DauthzTo=2CauthzFrom=2Ccn=2CuidNumber=2CgidNumber=
=2Cuid by users r
ead by anonymous none
olcAccess: {2}to attrs=3DkrbLastSuccessfulAuth=2CkrbExtraData=2CkrbLastFai=
ledAuth=2Ckr
bLoginFailedCount by group.exact=3D"cn=3Dreplicators=2Cou=3Dgroups=2Cdc=
=3Dexample=2Cdc=3Dnet"
read by dn=3D"cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet" wr=
ite by dn=3D"cn=3Dadm-sr
v=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet" write by self read by * none
olcAccess: {3}to dn.subtree=3D"ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet" by=
group.exact=3D"cn
=3Dreplicators=2Cou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet" read by dn=3D"cn=
=3Dkdc-srv=2Cou=3Dkerberos=2C
dc=3Dexample=2Cdc=3Dnet" read by dn=3D"cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=
=3Dexample=2Cdc=3Dnet" writ
e by * none
olcAccess: {4}to dn.base=3D"" by * read
olcAccess: {5}to * by dn=3D"cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2C=
dc=3Dnet" write by s
elf write by users read
entryCSN: 20121203054749.804561Z#000000#000#000000
modifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
modifyTimestamp: 20121203054749Z
dn: olcOverlay=3D{0}syncprov=2ColcDatabase=3D{1}hdb=2Ccn=3Dconfig
objectClass: olcOverlayConfig
objectClass: olcSyncProvConfig
olcOverlay: {0}syncprov
olcSpCheckpoint: 100 10
olcSpSessionlog: 100
structuralObjectClass: olcSyncProvConfig
entryUUID: b77dc36a-d158-1031-9917-2f12ddec6588
creatorsName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
createTimestamp: 20121203054749Z
entryCSN: 20121203054749.962179Z#000000#000#000000
modifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
modifyTimestamp: 20121203054749Z vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv dc=3D=
example=2Cdc=3Dnet vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
dn: dc=3Dexample=2Cdc=3Dnet
objectClass: top
objectClass: dcObject
objectClass: organization
o: example.net
dc: example
structuralObjectClass: organization
entryUUID: eac01854-d108-1031-95b6-31806daa9e45
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121202201636Z
entryCSN: 20121202201636.222029Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121202201636Z
contextCSN: 20121204035116.890381Z#000000#000#000000
dn: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: simpleSecurityObject
objectClass: organizationalRole
cn: admin
description: LDAP administrator
userPassword:: <secret>
structuralObjectClass: organizationalRole
entryUUID: eac2e160-d108-1031-95b7-31806daa9e45
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121202201636Z
entryCSN: 20121202201636.240572Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121202201636Z
dn: ou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: organizationalUnit
ou: people
description: user account objects
structuralObjectClass: organizationalUnit
entryUUID: 1cee4810-d12b-1031-9787-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.299880Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: ou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: organizationalUnit
ou: groups
description: group objects
structuralObjectClass: organizationalUnit
entryUUID: 1cfcb788-d12b-1031-9788-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.394485Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: ou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: organizationalUnit
ou: hosts
description: host/computer objects
structuralObjectClass: organizationalUnit
entryUUID: 1cfdb37c-d12b-1031-9789-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.400935Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: organizationalUnit
ou: kerberos
description: kerberos realm container
structuralObjectClass: organizationalUnit
entryUUID: 1cfef412-d12b-1031-978a-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.409140Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
cn: replica
objectClass: simpleSecurityObject
objectClass: organizationalRole
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
authzTo: dn:*
description: LDAP server=2C replica
structuralObjectClass: organizationalRole
entryUUID: 1d02dae6-d12b-1031-978b-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
krbPrincipalName: host/replica.example.net@EXAMPLE.NET
krbLoginFailedCount: 0
krbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gADgZgDa20URzdHWQ1WObQespjD5JMlRSb3fbZN8fG+gFml3DZQzinhbRU=
RAxZ
oJVqBI/zPGh/FDf9m+5bDBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAz54uBWIC4AFa66jXa6=
Mn3k
f62uOX1YE6N3JlXl1EG2abEzZw1xWglReNN68wTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAKu=
6lb/
QQQHgCnrL6XaSAYoh3A5GHF0xa2/vTWwq+lX4zmCpbY2l2up3TBVKZrhlenNSkxswPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAGjfhZNlm0+a6MGvBgok7WxzB638xMCex7sQ1zfzZkLiViiKpw=3D=
=3D
krbPasswordExpiration: 19700101000000Z
krbLastPwdChange: 20121203065600Z
krbExtraData:: AAIATbxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D
krbExtraData:: AAgBAA=3D=3D
userPassword:: <secret>
entryCSN: 20121203233422.105322Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203233422Z
dn: cn=3Dmaster=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
cn: master
objectClass: simpleSecurityObject
objectClass: organizationalRole
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
authzTo: dn:*
description: LDAP server=2C replica
userPassword:: e0NSWVBUfSo=3D
structuralObjectClass: organizationalRole
entryUUID: 1d0514dc-d12b-1031-978c-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
krbPrincipalName: host/master.example.net@EXAMPLE.NET
krbLoginFailedCount: 0
krbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gACzEUo41sdOc4i+gbyFE/lai6sMdeygNYlf/SiWtzll+A7x/QBVoz7zFW=
+aWr
8/FMEBj49p4Bn0Goa371TBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAGW4+8wBum86XgWwWj5=
522A
i/CCoCVDIVBZHOI48rJZHrgu59tvH0fH7TDkcwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAH1=
5xNZ
VJSjkEKx2M7Ai17Og8lMWwXAsDB2h+LsGC+HsSWdbE0P4yCNkjMOdIwnwJJ3OA48wPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAGuLUyYlXYKdpNk9KEe7TuHulCL0Fzr4N8WXAv3DaIILvcKv0w=3D=
=3D
krbPasswordExpiration: 19700101000000Z
krbLastPwdChange: 20121203060855Z
krbExtraData:: AAL3QbxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D
krbExtraData:: AAgBAA=3D=3D
entryCSN: 20121203060855.932134Z#000000#000#000000
modifiersName: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203060855Z
dn: cn=3Dadministrator=2Cou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: posixGroup
cn: administrator
gidNumber: 50000
structuralObjectClass: posixGroup
entryUUID: 1d079216-d12b-1031-978d-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.465616Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: cn=3Dreplicators=2Cou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: top
objectClass: groupOfNames
cn: replicators
member: cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
member: cn=3Dmaster=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
structuralObjectClass: groupOfNames
entryUUID: 1d096db6-d12b-1031-978e-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.477792Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: top
objectClass: inetOrgPerson
objectClass: posixAccount
objectClass: shadowAccount
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
cn: administrator
sn: administrator
uidNumber: 50000
gidNumber: 50000
userPassword:: <secret>
homeDirectory: /home/administrator
structuralObjectClass: inetOrgPerson
uid: administrator
entryUUID: 1d0a9bf0-d12b-1031-978f-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
krbPrincipalName: administrator@EXAMPLE.NET
krbPrincipalKey:: MIICa6ADAgEBoQMCAQGiAwIBAaMDAgEBpIICUzCCAk8wVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gALWKtjcuVIPL0PLDhUQleHDwIp4PB4O0T3ays8putrnZEUxVC+Ecqcdxa=
iluD
o3oHvU0K11YiAyckIKjfzBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAQRTIM4QI0IPjmA1xg/=
Ot7l
cXQSCNuv7MRgBJl7N1QsxS7naYbgLlyybkbXkwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYADm=
Ozq8
96TliwJM9J3X0Dxb/Y+bcTz3e4/FarTIvzEMrMneaW57VGLWX1y162/LNz2jwAqIwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAMBGuqUqQw8nhnQ194wQICvc+Iu0yPUdSTzjGXtDhPSaAHj70DA8o=
AcwB
aADAgEBoTEwL6ADAgEDoSgEJggA0mkFMVjyT2Jn553z2fZNIOQ8fYR2jtUcGFbyUL4s4HaK+6=
yoME
2gGDAWoAMCAQKhDwQNYWRtaW5pc3RyYXRvcqExMC+gAwIBA6EoBCYIAHKR4PzhneCY8c8tLpo=
8yyO
mpk8FynWjl7rVe+Zqq9gIt4KXTTBLoBYwFKADAgEDoQ0EC0VYQU1QTEUuTkVUoTEwL6ADAgED=
oSgE
JggA4e6VizsvWUEKEqAt58PrPViScqavK7u2VuYDpNNuVwTv3zGmMEugFjAUoAMCAQWhDQQLR=
VhBT
VBMRS5ORVShMTAvoAMCAQOhKAQmCACA4sM1SoUcEEYGOMA8CDwINmmJXgnKPQr8jRDsxGToXG=
a5U+
g=3D
krbLastPwdChange: 20121203054848Z
krbLastFailedAuth: 20121204013714Z
krbLoginFailedCount: 0
description: Network Administrator
krbLastSuccessfulAuth: 20121204035116Z
krbExtraData:: AAJAPbxQcm9vdC9hZG1pbkBFWEFNUExFLk5FVAA=3D
krbExtraData:: AAgBAA=3D=3D
entryCSN: 20121204035116.890381Z#000000#000#000000
modifiersName: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121204035116Z
dn: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: simpleSecurityObject
objectClass: organizationalRole
cn: kdc-srv
description: Kerberos KDC
userPassword:: <secret>
structuralObjectClass: organizationalRole
entryUUID: 1d168924-d12b-1031-9790-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.563692Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: simpleSecurityObject
objectClass: organizationalRole
cn: adm-srv
description: Kerberos Admin Server
userPassword:: <secret>
structuralObjectClass: organizationalRole
entryUUID: 1d18610e-d12b-1031-9791-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.575773Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: cn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
cn: EXAMPLE.NET
objectClass: top
objectClass: krbRealmContainer
objectClass: krbTicketPolicyAux
krbSubTrees: dc=3Dexample=2Cdc=3Dnet
krbSearchScope: 2
krbMaxRenewableAge: 604800
krbMaxTicketLife: 36000
structuralObjectClass: krbRealmContainer
entryUUID: c03d58b8-d134-1031-83e7-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.757228Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3DK/M@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=
=2Cdc=3Dexample=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 36000
krbMaxRenewableAge: 604800
krbTicketFlags: 192
krbPrincipalName: K/M@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MGagAwIBAaEDAgEBogMCAQGjAwIBAKRQME4wTKAHMAWgAwIBAKFBMD+g=
AwIB
EKE4BDYYALvAYATOnUQCrTUO54HKuJKnttvmnxYyud5Fh6T22oTH0qAUzKRfDdxTuO7OIrbK/=
c4Ks
HI=3D
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAkBAAEArgC8UA=3D=3D
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAAAAAAAA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c04d9282-d134-1031-83e8-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.863568Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dkrbtgt/EXAMPLE.NET@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=
=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 36000
krbMaxRenewableAge: 604800
krbTicketFlags: 0
krbPrincipalName: krbtgt/EXAMPLE.NET@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gAOyPPy2RLdudifS8baeUvv3AxlGKKubyeRUcnwFc2CqS9kNvgpTNujaNn=
fmRR
GQI5lTHUdwGYqHfr+ayuTBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAe8n+vM9TXvNAG43Va7=
UKy1
93EQx3jtSTiD0aa2tNK9FbkomkYG0mWlz/xW4wTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAM9=
KwFT
B9MqvfMfba37K7zY6lqPhLpF8d0uucRA/Ewed1i9wfjiOuxQVR0PWLB2OM5q1llQwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAFObLZrmdRD8NEctxP0TySKwmGNnKiX7m+EMMvNj4xmNIa2yTTA8o=
AcwB
aADAgEAoTEwL6ADAgEDoSgEJggAXVm59rkWXluDnx/F0XOEDh4i3Nz9HckLfrcVL5goKRVOV8=
oR
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAAAAAAAA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c0518180-d134-1031-83e9-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.889347Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dkadmin/admin@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3D=
kerberos=2Cdc=3Dexample=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 10800
krbMaxRenewableAge: 604800
krbTicketFlags: 4
krbPrincipalName: kadmin/admin@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gAMjLoWHTDPL9j+ribbAohbY8+SM973mU5iIvxN7MItjbLtXBh/7CF2xtC=
kdsY
5WwobkGKFvGkZvTL+olZjBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAwMe5Vpq5Hd2Zy1E8M2=
8Ix6
SbAtMeUjzpEqwQM3P838foPwM9ZfRYhfZ0UfAwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAGZ=
M5wu
tIcsdKbsYTDZgUzqIADtNt4GYjBIJx13JO40Bto78eCybAvE4uqFivBmdH1kEy8cwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAHrJty4X1D5dPY/PW84Lgb0YYuazteCJMYvphJZr3LeKs7suBzA8o=
AcwB
aADAgEAoTEwL6ADAgEDoSgEJggAMDfJDyzgWa4vsKv6rs9IkXOq8eEePAQPB9s0UPbM+9bG3a=
Qz
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAAGlvbkA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c05346be-d134-1031-83ea-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.900950Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dkadmin/changepw@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=
=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 300
krbMaxRenewableAge: 604800
krbTicketFlags: 8196
krbPrincipalName: kadmin/changepw@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gAHNxSgJ9GwIH0UmFf5Ol8WWQ/2Wy6nQqmf+yX4dVzEQFsmaBp9l1hsceW=
qIB2
ic80wlAJW9Do0gSOaiYfjBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAt+ZrWZKAjKkUhSJt0w=
wSqU
ootXhNduXIRVjUJxWVtXdPTI7RcL/yjZK2M0MwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYACd=
423Z
epUHmGMVf2I5sRQZRuoypVddoREy1pTtTMIiGvqai7Z+PRHbpL0kTawz9zdg60IgwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAGGbQu5FJ0ewAsCALf9yDbvOIa7Abx0PmnGw+PSKWOt8Dsur9TA8o=
AcwB
aADAgEAoTEwL6ADAgEDoSgEJggAjG9iwd398xO7bFH+bAQDGv0Hh6Qr+QIpNAUB/w7dmvqU9z=
Pl
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAAGlvbkA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c054d88a-d134-1031-83eb-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.911237Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dkadmin/history@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=
=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 36000
krbMaxRenewableAge: 604800
krbTicketFlags: 0
krbPrincipalName: kadmin/history@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MGagAwIBAaEDAgEBogMCAQGjAwIBAKRQME4wTKAHMAWgAwIBAKFBMD+g=
AwIB
EKE4BDYYAOhayj3RDyyg78DGPFKNATBnpKKbf2qwLJbJ0nPXoUdjtbHpjECIfASUXjBoB+Pkd=
/N+Z
2g=3D
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAAGlvbkA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c0562d3e-d134-1031-83ec-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.919957Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dkadmin/master.example.net@EXAMPLE.NET=2Ccn=3DEXAMPL=
E.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 10800
krbMaxRenewableAge: 604800
krbTicketFlags: 4
krbPrincipalName: kadmin/master.example.net@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gABhOeGOuo9UBDjK7hTQ3Xfs8vsWB+Afl0JkPaSt3T3tRkZbWxAhTxXl+4=
Ta3z
Y4ZaEYItXr2awBW6QXSZzBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAUUoLikQRp1c+vGFRtG=
g1qY
oev8m55VO73g+xEqcx02MJa1x+esm5y9VTMLswTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYACj=
0sgn
ZOyWATgpst3N3pSom4smhxBWYgpTMghwaS5gFeKMZhccDSI8Ahm4nQPFmq3Jrf4UwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAL0gPnqCvdlb4//Xw5iE8Jvj2qYDwpK0Hycj+cwyCjFsVKTsjzA8o=
AcwB
aADAgEAoTEwL6ADAgEDoSgEJggAxTSMEh/7bfV2AYx4VoP8cIeunsqtrcvNIItmDxSqZ0ecZA=
Bm
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAANAD4gA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c0581144-d134-1031-83ed-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.932349Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dldap/master.example.net@EXAMPLE.NET=2Ccn=3DEXAMPLE.=
NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
krbPrincipalName: ldap/master.example.net@EXAMPLE.NET
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: 91a6199c-d15a-1031-9919-2f12ddec6588
creatorsName: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203060105Z
krbLoginFailedCount: 0
krbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gAA6GzVEXOsoNQbzbqFy0KZqXt04aRDje4Gxq4ZS4b/z+l6pKgmUyVdsPU=
S2wz
qeKY56slAvVlnRCQt+uZTBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAkzwNhAF14TYWZyLZem=
5kvD
yuLARt7Z3LLsduQ1j6s7P6EFMDNWPaHCJf09cwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAAb=
Nr3p
vkmNXkIZNgUtw2FJ3VtGEU9MmDmNHCFKSk4kHCR9naWPkbMzRmWA7s/yGkwIWxCMwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAPc+l15I9VR4tYjNfS6XRX09JRoioaavGokNvj0RJa1/h4j3hg=3D=
=3D
krbPasswordExpiration: 19700101000000Z
krbLastPwdChange: 20121203060153Z
krbLastSuccessfulAuth: 20121203061721Z
krbExtraData:: AAJRQLxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D
krbExtraData:: AAgBAA=3D=3D
entryCSN: 20121203061721.358939Z#000000#000#000000
modifiersName: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203061721Z
dn: krbPrincipalName=3Dldap/replica.example.net@EXAMPLE.NET=2Ccn=3DEXAMPLE=
.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
krbPrincipalName: ldap/replica.example.net@EXAMPLE.NET
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: 205686f2-d162-1031-9537-2fa18b539eb9
creatorsName: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203065511Z
krbLoginFailedCount: 0
krbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gABVJBbD8SWzRxzA92ncPp+x/Trd3GJY/P6w+ErH3wddcUmq3o092v7mUX=
FMNw
2R8oC1rwLD2B/deCyuHDTBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAApsEJiySukR8L5M3DKb=
ipUj
AITSVQQL2YSqY7xr/BY7Hm3huN/juvnC7u/ZQwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAOv=
mT4x
MDAmgH2qTgqXTSLwRcBvT7QMWYMH0oi7HW8DYC09HDAdD2/vqaBsgthQCj3BCDmkwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIALQe5Qa57ZwsYK2mxhbNOhrO0Yn/OVLez1VQiEmrpj2/GvJLXA=3D=
=3D
krbPasswordExpiration: 19700101000000Z
krbLastPwdChange: 20121203065628Z
krbLastSuccessfulAuth: 20121204032538Z
krbExtraData:: AAIcTbxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D
krbExtraData:: AAgBAA=3D=3D
entryCSN: 20121204032538.048010Z#000000#000#000000
modifiersName: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121204032538Z
=20
=20
=20
vvvvvvvvvvvvvvvvvvvv replica config vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
=20
dn: cn=3Dconfig
objectClass: olcGlobal
cn: config
olcArgsFile: /var/run/slapd/slapd.args
olcPidFile: /var/run/slapd/slapd.pid
olcToolThreads: 1
structuralObjectClass: olcGlobal
entryUUID: af9b0068-d108-1031-9417-cd3569532aaf
creatorsName: cn=3Dconfig
createTimestamp: 20121202201456Z
olcTLSCACertificateFile: /etc/ssl/certs/cacert.pem
olcTLSCertificateFile: /etc/ssl/certs/replica_slapd_cert.pem
olcTLSCertificateKeyFile: /etc/ldap/replica_slapd_key.pem
olcLogLevel: stats
olcAuthzRegexp: {0}uid=3Dldap/([^/\.]+).example.net=2Ccn=3Dexample.net=2Cc=
n=3Dgssapi=2Ccn=3Dauth cn=3D$1=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
olcAuthzRegexp: {1}uid=3D([^=2C]+)=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=
=3Dauth uid=3D$1=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
olcSaslHost: replica.example.net
olcSaslRealm: EXAMPLE.NET
entryCSN: 20121204023449.956406Z#000000#000#000000
modifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
modifyTimestamp: 20121204023449Z
dn: cn=3Dmodule{0}=2Ccn=3Dconfig
objectClass: olcModuleList
cn: module{0}
olcModulePath: /usr/lib/ldap
olcModuleLoad: {0}back_hdb
olcModuleLoad: {1}back_ldap
structuralObjectClass: olcModuleList
entryUUID: af9d1e34-d108-1031-941f-cd3569532aaf
creatorsName: cn=3Dconfig
createTimestamp: 20121202201457Z
entryCSN: 20121204041212.292184Z#000000#000#000000
modifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
modifyTimestamp: 20121204041212Z
dn: cn=3Dschema=2Ccn=3Dconfig
objectClass: olcSchemaConfig
cn: schema
structuralObjectClass: olcSchemaConfig
entryUUID: af9b564e-d108-1031-941a-cd3569532aaf
creatorsName: cn=3Dconfig
createTimestamp: 20121202201456Z
entryCSN: 20121202201456.995860Z#000000#000#000000
modifiersName: cn=3Dconfig
modifyTimestamp: 20121202201456Z < snip schemas > dn: olcBackend=3D{0}hdb=
=2Ccn=3Dconfig
objectClass: olcBackendConfig
olcBackend: {0}hdb
structuralObjectClass: olcBackendConfig
entryUUID: af9e498a-d108-1031-9420-cd3569532aaf
creatorsName: cn=3Dconfig
createTimestamp: 20121202201457Z
entryCSN: 20121202201457.015189Z#000000#000#000000
modifiersName: cn=3Dconfig
modifyTimestamp: 20121202201457Z
dn: olcDatabase=3D{-1}frontend=2Ccn=3Dconfig
objectClass: olcDatabaseConfig
objectClass: olcFrontendConfig
olcDatabase: {-1}frontend
olcAccess: {0}to * by dn.exact=3DgidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercr=
ed=2Ccn=3Dexternal
=2Ccn=3Dauth manage by * break
olcAccess: {1}to dn.exact=3D"" by * read
olcAccess: {2}to dn.base=3D"cn=3DSubschema" by * read
olcSizeLimit: 500
structuralObjectClass: olcDatabaseConfig
entryUUID: af9b211a-d108-1031-9418-cd3569532aaf
creatorsName: cn=3Dconfig
createTimestamp: 20121202201456Z
entryCSN: 20121202201456.994497Z#000000#000#000000
modifiersName: cn=3Dconfig
modifyTimestamp: 20121202201456Z
dn: olcOverlay=3D{0}chain=2ColcDatabase=3D{-1}frontend=2Ccn=3Dconfig
objectClass: olcOverlayConfig
objectClass: olcChainConfig
olcOverlay: {0}chain
olcChainReturnError: TRUE
structuralObjectClass: olcChainConfig
entryUUID: 8605cc76-d214-1031-93d2-613cc62fd42f
creatorsName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
createTimestamp: 20121204041212Z
entryCSN: 20121204041212.352767Z#000000#000#000000
modifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
modifyTimestamp: 20121204041212Z
dn: olcDatabase=3D{0}ldap=2ColcOverlay=3D{0}chain=2ColcDatabase=3D{-1}fron=
tend=2Ccn=3Dconfig
objectClass: olcLDAPConfig
objectClass: olcChainDatabase
olcDatabase: {0}ldap
olcDbURI: "ldap://master.example.net:389/"
olcDbIDAssertBind: bindmethod=3Dsimple binddn=3D"cn=3Dreplica=2Cou=3Dhosts=
=2Cdc=3Dexample=2Cdc
=3Dnet" credentials=3D<secret> mode=3Dself flags=3Doverride starttls=3Dcr=
itical tls_req
cert=3Ddemand tls_cacert=3D/etc/ssl/certs/cacert.pem
olcDbRebindAsUser: TRUE
structuralObjectClass: olcLDAPConfig
entryUUID: 8609b6f6-d214-1031-93d3-613cc62fd42f
creatorsName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
createTimestamp: 20121204041212Z
entryCSN: 20121204041212.378432Z#000000#000#000000
modifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
modifyTimestamp: 20121204041212Z
dn: olcDatabase=3D{0}config=2Ccn=3Dconfig
objectClass: olcDatabaseConfig
olcDatabase: {0}config
olcAccess: {0}to * by dn.exact=3DgidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercr=
ed=2Ccn=3Dexternal
=2Ccn=3Dauth manage by * break
structuralObjectClass: olcDatabaseConfig
entryUUID: af9b4528-d108-1031-9419-cd3569532aaf
creatorsName: cn=3Dconfig
createTimestamp: 20121202201456Z
entryCSN: 20121202201456.995421Z#000000#000#000000
modifiersName: cn=3Dconfig
modifyTimestamp: 20121202201456Z
dn: olcDatabase=3D{1}hdb=2Ccn=3Dconfig
objectClass: olcDatabaseConfig
objectClass: olcHdbConfig
olcDatabase: {1}hdb
olcDbDirectory: /var/lib/ldap
olcSuffix: dc=3Dexample=2Cdc=3Dnet
olcLastMod: TRUE
olcRootDN: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
olcRootPW:: e1NTSEF9eW1nS3JTR0VkMW5LQ0VaQ0Y4UjJBTDlPTlEveENDbzY=3D
olcDbCheckpoint: 512 30
olcDbConfig: {0}set_cachesize 0 2097152 0
olcDbConfig: {1}set_lk_max_objects 1500
olcDbConfig: {2}set_lk_max_locks 1500
olcDbConfig: {3}set_lk_max_lockers 1500
olcDbIndex: objectClass eq
olcDbIndex: uid eq
olcDbIndex: cn eq
olcDbIndex: ou eq
olcDbIndex: dc eq
olcDbIndex: uidNumber eq
olcDbIndex: gidNumber eq
olcDbIndex: memberUid eq
olcDbIndex: uniqueMember eq
olcDbIndex: entryUUID eq
olcDbIndex: entryCSN eq
olcDbIndex: krbPrincipalName eq=2Cpres=2Csub
olcDbIndex: krbPwdPolicyReference eq
structuralObjectClass: olcHdbConfig
entryUUID: af9e5d12-d108-1031-9421-cd3569532aaf
creatorsName: cn=3Dconfig
createTimestamp: 20121202201457Z
olcAccess: {0}to attrs=3DuserPassword=2CshadowLastChange by group.exact=3D=
"cn=3Dreplicators=2Cou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet" read by self wri=
te by anonymous auth
olcAccess: {1}to attrs=3DauthzTo=2CauthzFrom by group.exact=3D"cn=3Dreplic=
ators=2Cou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet" read by users read by anonym=
ous none
olcAccess: {2}to attrs=3DkrbLastSuccessfulAuth=2CkrbExtraData=2CkrbLastFai=
ledAuth=2CkrbLoginFailedCount by dn=3D"cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3D=
example=2Cdc=3Dnet" read by dn
=3D"cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet" read by self =
read by * none
olcAccess: {3}to dn.subtree=3D"ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet" by=
dn=3D"cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet" read by dn=
=3D"cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2C
dc=3Dnet" read by * none
olcAccess: {4}to dn.base=3D"" by * read
olcAccess: {5}to * by self write by users read
olcSyncrepl: {0}rid=3D123 provider=3D"ldap://master.example.net:389/" type=
=3DrefreshAndPersist retry=3D"60 30 300 +" searchbase=3D"dc=3Dexample=2Cdc=
=3Dnet" bindmethod=3Dsasl
saslmech=3Dgssapi starttls=3Dcritical tls_reqcert=3Ddemand tls_cacert=3D=
/etc/ssl/certs/cacert.pem
olcUpdateRef: "ldap://master.example.net:389/"
entryCSN: 20121204041212.283590Z#000000#000#000000
modifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=
=2Ccn=3Dauth
modifyTimestamp: 20121204041212Z
=20
=20
=20
dn: dc=3Dexample=2Cdc=3Dnet
objectClass: top
objectClass: dcObject
objectClass: organization
o: example.net
dc: example
structuralObjectClass: organization
entryUUID: eac01854-d108-1031-95b6-31806daa9e45
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121202201636Z
entryCSN: 20121202201636.222029Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121202201636Z
contextCSN: 20121204035116.890381Z#000000#000#000000
dn: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: simpleSecurityObject
objectClass: organizationalRole
cn: admin
description: LDAP administrator
userPassword:: <secret>
structuralObjectClass: organizationalRole
entryUUID: eac2e160-d108-1031-95b7-31806daa9e45
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121202201636Z
entryCSN: 20121202201636.240572Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121202201636Z
dn: ou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: organizationalUnit
ou: people
description: user account objects
structuralObjectClass: organizationalUnit
entryUUID: 1cee4810-d12b-1031-9787-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.299880Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: ou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: organizationalUnit
ou: groups
description: group objects
structuralObjectClass: organizationalUnit
entryUUID: 1cfcb788-d12b-1031-9788-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.394485Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: ou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: organizationalUnit
ou: hosts
description: host/computer objects
structuralObjectClass: organizationalUnit
entryUUID: 1cfdb37c-d12b-1031-9789-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.400935Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: organizationalUnit
ou: kerberos
description: kerberos realm container
structuralObjectClass: organizationalUnit
entryUUID: 1cfef412-d12b-1031-978a-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.409140Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
cn: replica
objectClass: simpleSecurityObject
objectClass: organizationalRole
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
authzTo: dn:*
description: LDAP server=2C replica
structuralObjectClass: organizationalRole
entryUUID: 1d02dae6-d12b-1031-978b-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
krbPrincipalName: host/replica.example.net@EXAMPLE.NET
krbLoginFailedCount: 0
krbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gADgZgDa20URzdHWQ1WObQespjD5JMlRSb3fbZN8fG+gFml3DZQzinhbRU=
RAxZ
oJVqBI/zPGh/FDf9m+5bDBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAz54uBWIC4AFa66jXa6=
Mn3k
f62uOX1YE6N3JlXl1EG2abEzZw1xWglReNN68wTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAKu=
6lb/
QQQHgCnrL6XaSAYoh3A5GHF0xa2/vTWwq+lX4zmCpbY2l2up3TBVKZrhlenNSkxswPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAGjfhZNlm0+a6MGvBgok7WxzB638xMCex7sQ1zfzZkLiViiKpw=3D=
=3D
krbPasswordExpiration: 19700101000000Z
krbLastPwdChange: 20121203065600Z
krbExtraData:: AAIATbxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D
krbExtraData:: AAgBAA=3D=3D
userPassword:: <secret>
entryCSN: 20121203233422.105322Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203233422Z
dn: cn=3Dmaster=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
cn: master
objectClass: simpleSecurityObject
objectClass: organizationalRole
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
authzTo: dn:*
description: LDAP server=2C replica
userPassword:: <secret>
structuralObjectClass: organizationalRole
entryUUID: 1d0514dc-d12b-1031-978c-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
krbPrincipalName: host/master.example.net@EXAMPLE.NET
krbLoginFailedCount: 0
krbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gACzEUo41sdOc4i+gbyFE/lai6sMdeygNYlf/SiWtzll+A7x/QBVoz7zFW=
+aWr
8/FMEBj49p4Bn0Goa371TBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAGW4+8wBum86XgWwWj5=
522A
i/CCoCVDIVBZHOI48rJZHrgu59tvH0fH7TDkcwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAH1=
5xNZ
VJSjkEKx2M7Ai17Og8lMWwXAsDB2h+LsGC+HsSWdbE0P4yCNkjMOdIwnwJJ3OA48wPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAGuLUyYlXYKdpNk9KEe7TuHulCL0Fzr4N8WXAv3DaIILvcKv0w=3D=
=3D
krbPasswordExpiration: 19700101000000Z
krbLastPwdChange: 20121203060855Z
krbExtraData:: AAL3QbxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D
krbExtraData:: AAgBAA=3D=3D
entryCSN: 20121203060855.932134Z#000000#000#000000
modifiersName: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203060855Z
dn: cn=3Dadministrator=2Cou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: posixGroup
cn: administrator
gidNumber: 50000
structuralObjectClass: posixGroup
entryUUID: 1d079216-d12b-1031-978d-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.465616Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: cn=3Dreplicators=2Cou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: top
objectClass: groupOfNames
cn: replicators
member: cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
member: cn=3Dmaster=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet
structuralObjectClass: groupOfNames
entryUUID: 1d096db6-d12b-1031-978e-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.477792Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: top
objectClass: inetOrgPerson
objectClass: posixAccount
objectClass: shadowAccount
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
cn: administrator
sn: administrator
uidNumber: 50000
gidNumber: 50000
userPassword:: <secret>
homeDirectory: /home/administrator
structuralObjectClass: inetOrgPerson
uid: administrator
entryUUID: 1d0a9bf0-d12b-1031-978f-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
krbPrincipalName: administrator@EXAMPLE.NET
krbPrincipalKey:: MIICa6ADAgEBoQMCAQGiAwIBAaMDAgEBpIICUzCCAk8wVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gALWKtjcuVIPL0PLDhUQleHDwIp4PB4O0T3ays8putrnZEUxVC+Ecqcdxa=
iluD
o3oHvU0K11YiAyckIKjfzBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAQRTIM4QI0IPjmA1xg/=
Ot7l
cXQSCNuv7MRgBJl7N1QsxS7naYbgLlyybkbXkwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYADm=
Ozq8
96TliwJM9J3X0Dxb/Y+bcTz3e4/FarTIvzEMrMneaW57VGLWX1y162/LNz2jwAqIwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAMBGuqUqQw8nhnQ194wQICvc+Iu0yPUdSTzjGXtDhPSaAHj70DA8o=
AcwB
aADAgEBoTEwL6ADAgEDoSgEJggA0mkFMVjyT2Jn553z2fZNIOQ8fYR2jtUcGFbyUL4s4HaK+6=
yoME
2gGDAWoAMCAQKhDwQNYWRtaW5pc3RyYXRvcqExMC+gAwIBA6EoBCYIAHKR4PzhneCY8c8tLpo=
8yyO
mpk8FynWjl7rVe+Zqq9gIt4KXTTBLoBYwFKADAgEDoQ0EC0VYQU1QTEUuTkVUoTEwL6ADAgED=
oSgE
JggA4e6VizsvWUEKEqAt58PrPViScqavK7u2VuYDpNNuVwTv3zGmMEugFjAUoAMCAQWhDQQLR=
VhBT
VBMRS5ORVShMTAvoAMCAQOhKAQmCACA4sM1SoUcEEYGOMA8CDwINmmJXgnKPQr8jRDsxGToXG=
a5U+
g=3D
krbLastPwdChange: 20121203054848Z
krbLastFailedAuth: 20121204013714Z
krbLoginFailedCount: 0
description: Network Administrator
krbLastSuccessfulAuth: 20121204035116Z
krbExtraData:: AAJAPbxQcm9vdC9hZG1pbkBFWEFNUExFLk5FVAA=3D
krbExtraData:: AAgBAA=3D=3D
entryCSN: 20121204035116.890381Z#000000#000#000000
modifiersName: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121204035116Z
dn: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: simpleSecurityObject
objectClass: organizationalRole
cn: kdc-srv
description: Kerberos KDC
userPassword:: <secret>
structuralObjectClass: organizationalRole
entryUUID: 1d168924-d12b-1031-9790-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.563692Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
objectClass: simpleSecurityObject
objectClass: organizationalRole
cn: adm-srv
description: Kerberos Admin Server
userPassword:: <secret>
structuralObjectClass: organizationalRole
entryUUID: 1d18610e-d12b-1031-9791-4f8d9abcea93
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203002123Z
entryCSN: 20121203002123.575773Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203002123Z
dn: cn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
cn: EXAMPLE.NET
objectClass: top
objectClass: krbRealmContainer
objectClass: krbTicketPolicyAux
krbSubTrees: dc=3Dexample=2Cdc=3Dnet
krbSearchScope: 2
krbMaxRenewableAge: 604800
krbMaxTicketLife: 36000
structuralObjectClass: krbRealmContainer
entryUUID: c03d58b8-d134-1031-83e7-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.757228Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3DK/M@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=
=2Cdc=3Dexample=2Cdc=3D
net
krbLoginFailedCount: 0
krbMaxTicketLife: 36000
krbMaxRenewableAge: 604800
krbTicketFlags: 192
krbPrincipalName: K/M@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MGagAwIBAaEDAgEBogMCAQGjAwIBAKRQME4wTKAHMAWgAwIBAKFBMD+g=
AwIB
EKE4BDYYALvAYATOnUQCrTUO54HKuJKnttvmnxYyud5Fh6T22oTH0qAUzKRfDdxTuO7OIrbK/=
c4Ks
HI=3D
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAkBAAEArgC8UA=3D=3D
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAAAAAAAA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c04d9282-d134-1031-83e8-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.863568Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dkrbtgt/EXAMPLE.NET@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=
=2Cou=3Dkerberos
=2Cdc=3Dexample=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 36000
krbMaxRenewableAge: 604800
krbTicketFlags: 0
krbPrincipalName: krbtgt/EXAMPLE.NET@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gAOyPPy2RLdudifS8baeUvv3AxlGKKubyeRUcnwFc2CqS9kNvgpTNujaNn=
fmRR
GQI5lTHUdwGYqHfr+ayuTBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAe8n+vM9TXvNAG43Va7=
UKy1
93EQx3jtSTiD0aa2tNK9FbkomkYG0mWlz/xW4wTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAM9=
KwFT
B9MqvfMfba37K7zY6lqPhLpF8d0uucRA/Ewed1i9wfjiOuxQVR0PWLB2OM5q1llQwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAFObLZrmdRD8NEctxP0TySKwmGNnKiX7m+EMMvNj4xmNIa2yTTA8o=
AcwB
aADAgEAoTEwL6ADAgEDoSgEJggAXVm59rkWXluDnx/F0XOEDh4i3Nz9HckLfrcVL5goKRVOV8=
oR
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAAAAAAAA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c0518180-d134-1031-83e9-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.889347Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dkadmin/admin@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3D=
kerberos=2Cdc=3Dex
ample=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 10800
krbMaxRenewableAge: 604800
krbTicketFlags: 4
krbPrincipalName: kadmin/admin@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gAMjLoWHTDPL9j+ribbAohbY8+SM973mU5iIvxN7MItjbLtXBh/7CF2xtC=
kdsY
5WwobkGKFvGkZvTL+olZjBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAwMe5Vpq5Hd2Zy1E8M2=
8Ix6
SbAtMeUjzpEqwQM3P838foPwM9ZfRYhfZ0UfAwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAGZ=
M5wu
tIcsdKbsYTDZgUzqIADtNt4GYjBIJx13JO40Bto78eCybAvE4uqFivBmdH1kEy8cwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAHrJty4X1D5dPY/PW84Lgb0YYuazteCJMYvphJZr3LeKs7suBzA8o=
AcwB
aADAgEAoTEwL6ADAgEDoSgEJggAMDfJDyzgWa4vsKv6rs9IkXOq8eEePAQPB9s0UPbM+9bG3a=
Qz
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAAGlvbkA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c05346be-d134-1031-83ea-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.900950Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dkadmin/changepw@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=
=3Dkerberos=2Cdc
=3Dexample=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 300
krbMaxRenewableAge: 604800
krbTicketFlags: 8196
krbPrincipalName: kadmin/changepw@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gAHNxSgJ9GwIH0UmFf5Ol8WWQ/2Wy6nQqmf+yX4dVzEQFsmaBp9l1hsceW=
qIB2
ic80wlAJW9Do0gSOaiYfjBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAt+ZrWZKAjKkUhSJt0w=
wSqU
ootXhNduXIRVjUJxWVtXdPTI7RcL/yjZK2M0MwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYACd=
423Z
epUHmGMVf2I5sRQZRuoypVddoREy1pTtTMIiGvqai7Z+PRHbpL0kTawz9zdg60IgwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAGGbQu5FJ0ewAsCALf9yDbvOIa7Abx0PmnGw+PSKWOt8Dsur9TA8o=
AcwB
aADAgEAoTEwL6ADAgEDoSgEJggAjG9iwd398xO7bFH+bAQDGv0Hh6Qr+QIpNAUB/w7dmvqU9z=
Pl
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAAGlvbkA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c054d88a-d134-1031-83eb-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.911237Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dkadmin/history@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=
=3Dkerberos=2Cdc=3D
example=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 36000
krbMaxRenewableAge: 604800
krbTicketFlags: 0
krbPrincipalName: kadmin/history@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MGagAwIBAaEDAgEBogMCAQGjAwIBAKRQME4wTKAHMAWgAwIBAKFBMD+g=
AwIB
EKE4BDYYAOhayj3RDyyg78DGPFKNATBnpKKbf2qwLJbJ0nPXoUdjtbHpjECIfASUXjBoB+Pkd=
/N+Z
2g=3D
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAAGlvbkA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c0562d3e-d134-1031-83ec-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.919957Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dkadmin/master.example.net@EXAMPLE.NET=2Ccn=3DEXAMPL=
E.NET=2Cou=3Dk
erberos=2Cdc=3Dexample=2Cdc=3Dnet
krbLoginFailedCount: 0
krbMaxTicketLife: 10800
krbMaxRenewableAge: 604800
krbTicketFlags: 4
krbPrincipalName: kadmin/master.example.net@EXAMPLE.NET
krbPrincipalExpiration: 19700101000000Z
krbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gABhOeGOuo9UBDjK7hTQ3Xfs8vsWB+Afl0JkPaSt3T3tRkZbWxAhTxXl+4=
Ta3z
Y4ZaEYItXr2awBW6QXSZzBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAUUoLikQRp1c+vGFRtG=
g1qY
oev8m55VO73g+xEqcx02MJa1x+esm5y9VTMLswTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYACj=
0sgn
ZOyWATgpst3N3pSom4smhxBWYgpTMghwaS5gFeKMZhccDSI8Ahm4nQPFmq3Jrf4UwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAL0gPnqCvdlb4//Xw5iE8Jvj2qYDwpK0Hycj+cwyCjFsVKTsjzA8o=
AcwB
aADAgEAoTEwL6ADAgEDoSgEJggAxTSMEh/7bfV2AYx4VoP8cIeunsqtrcvNIItmDxSqZ0ecZA=
Bm
krbLastPwdChange: 19700101000000Z
krbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA
krbExtraData:: AAcBAAIAAgAAANAD4gA=3D
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: c0581144-d134-1031-83ed-0707760cf534
creatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203013022Z
entryCSN: 20121203013022.932349Z#000000#000#000000
modifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203013022Z
dn: krbPrincipalName=3Dldap/master.example.net@EXAMPLE.NET=2Ccn=3DEXAMPLE.=
NET=2Cou=3Dker
beros=2Cdc=3Dexample=2Cdc=3Dnet
krbPrincipalName: ldap/master.example.net@EXAMPLE.NET
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: 91a6199c-d15a-1031-9919-2f12ddec6588
creatorsName: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203060105Z
krbLoginFailedCount: 0
krbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gAA6GzVEXOsoNQbzbqFy0KZqXt04aRDje4Gxq4ZS4b/z+l6pKgmUyVdsPU=
S2wz
qeKY56slAvVlnRCQt+uZTBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAkzwNhAF14TYWZyLZem=
5kvD
yuLARt7Z3LLsduQ1j6s7P6EFMDNWPaHCJf09cwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAAb=
Nr3p
vkmNXkIZNgUtw2FJ3VtGEU9MmDmNHCFKSk4kHCR9naWPkbMzRmWA7s/yGkwIWxCMwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIAPc+l15I9VR4tYjNfS6XRX09JRoioaavGokNvj0RJa1/h4j3hg=3D=
=3D
krbPasswordExpiration: 19700101000000Z
krbLastPwdChange: 20121203060153Z
krbLastSuccessfulAuth: 20121203061721Z
krbExtraData:: AAJRQLxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D
krbExtraData:: AAgBAA=3D=3D
entryCSN: 20121203061721.358939Z#000000#000#000000
modifiersName: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121203061721Z
dn: krbPrincipalName=3Dldap/replica.example.net@EXAMPLE.NET=2Ccn=3DEXAMPLE=
.NET=2Cou=3Dke
rberos=2Cdc=3Dexample=2Cdc=3Dnet
krbPrincipalName: ldap/replica.example.net@EXAMPLE.NET
objectClass: krbPrincipal
objectClass: krbPrincipalAux
objectClass: krbTicketPolicyAux
structuralObjectClass: krbPrincipal
entryUUID: 205686f2-d162-1031-9537-2fa18b539eb9
creatorsName: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
createTimestamp: 20121203065511Z
krbLoginFailedCount: 0
krbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIB=
AKFJ
MEegAwIBEqFABD4gABVJBbD8SWzRxzA92ncPp+x/Trd3GJY/P6w+ErH3wddcUmq3o092v7mUX=
FMNw
2R8oC1rwLD2B/deCyuHDTBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAApsEJiySukR8L5M3DKb=
ipUj
AITSVQQL2YSqY7xr/BY7Hm3huN/juvnC7u/ZQwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAOv=
mT4x
MDAmgH2qTgqXTSLwRcBvT7QMWYMH0oi7HW8DYC09HDAdD2/vqaBsgthQCj3BCDmkwPKAHMAWg=
AwIB
AKExMC+gAwIBAaEoBCYIALQe5Qa57ZwsYK2mxhbNOhrO0Yn/OVLez1VQiEmrpj2/GvJLXA=3D=
=3D
krbPasswordExpiration: 19700101000000Z
krbLastPwdChange: 20121203065628Z
krbExtraData:: AAIcTbxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D
krbExtraData:: AAgBAA=3D=3D
krbLastSuccessfulAuth: 20121204032538Z
entryCSN: 20121204032538.048010Z#000000#000#000000
modifiersName: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet
modifyTimestamp: 20121204032538Z
> Date: Fri=2C 9 Nov 2012 01:55:32 +0000
> From: openldap-its@OpenLDAP.org
> To: blance3459@hotmail.com
> Subject: Re: (ITS#7434) idassert-bind fails after restarting slapd
>=20
>=20
> *** THIS IS AN AUTOMATICALLY GENERATED REPLY ***
>=20
> Thanks for your report to the OpenLDAP Issue Tracking System. Your
> report has been assigned the tracking number ITS#7434.
>=20
> One of our support engineers will look at your report in due course.
> Note that this may take some time because our support engineers
> are volunteers. They only work on OpenLDAP when they have spare
> time.
>=20
> If you need to provide additional information in regards to your
> issue report=2C you may do so by replying to this message. Note that
> any mail sent to openldap-its@openldap.org with (ITS#7434)
> in the subject will automatically be attached to the issue report.
>=20
> mailto:openldap-its@openldap.org?subject=3D(ITS#7434)
>=20
> You may follow the progress of this report by loading the following
> URL in a web browser:
> http://www.OpenLDAP.org/its/index.cgi?findid=3D7434
>=20
> Please remember to retain your issue tracking number (ITS#7434)
> on any further messages you send to us regarding this report. If
> you don't then you'll just waste our time and yours because we
> won't be able to properly track the report.
>=20
> Please note that the Issue Tracking System is not intended to
> be used to seek help in the proper use of OpenLDAP Software.
> Such requests will be closed.
>=20
> OpenLDAP Software is user supported.
> http://www.OpenLDAP.org/support/
>=20
> --------------
> Copyright 1998-2007 The OpenLDAP Foundation=2C All Rights Reserved.
>=20
=
--_e0f270ad-e1a3-48b6-986f-f9f11dfd57c0_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<style><!--
.hmmessage P
{
margin:0px=3B
padding:0px
}
body.hmmessage
{
font-size: 12pt=3B
font-family:Calibri
}
--></style></head>
<body class=3D'hmmessage'><div dir=3D'ltr'>Quanah=2C <br> =3B<br>I fina=
lly got back around to working on this over the last couple of days. =
=3B Where I'm at with my project is:<BR><p style=3D"margin-right: 0px=3B" d=
ir=3D"ltr"> =3BI have two servers (virtual machines)=2C named master an=
d replica=2C =3B with slapd configured with my directory information an=
d single-master replication between them. =3B <br> =3BI created a K=
erberos realm and various principals in open ldap. =3B <br> =3BRepl=
ication access is authenticated using sasl/gssapi with the slapd principal=
=2C ldap/replica.example.net. =3B <br> =3Bk5start has been added to=
system startup to buid the credential cache for slapd.<br> =3B <br>&nb=
sp=3BThat brings me to configuring referrals and proxyAuth on replica. =
=3B </p>What appears to be happening is that at the initial configuration (=
before restarting the daemon) is the client binds to the replica and authen=
ticates with its kerberos ticket. =3B The "magic" is performed on the s=
asl user<br>and the ldap directory entry is returned. =3B It then proce=
eds into the modification and notices the update referral. =3B It then =
checks to determine if the binddn used in =3B in the olcDbIDAssertBind<=
br>statems can authzTo the bound user. =3B It can and the proxy of the =
modification proceeds. =3B On the master=2C the proxy request is receiv=
ed=2C more "magic" is done on the user id to make sure it is in <br>the cor=
rect form=2C the authzTo attribute is again checked and allowed. =3B Th=
e update is performed as the user=2C and success is returned back through t=
he chain to the user. =3B This is how I would expect <br>the process to=
proceed. =3B However=2C if I restart the server (or slapd daemon)=2C t=
his behavior changes. =3B <BR>After restarting=2C the bind occurs at th=
e replica=2C does "magic"=2C and then sees the referral and attempts the pr=
oxy. =3B What's notable here is that the check of authzTo is NOT perfor=
med.<br>The refereal is then chased=2C but the authzTo check was never made=
. =3B Since there is no user to "authzTo"=2C does the referral get chas=
ed with perhaps a "null" or anonymous user?<br>Whatever the case=2C it appe=
ars the the original binding user is never sent over the proxy. =3B Ove=
r at the master=2C I see the bind request come on from the replica which is=
treated as an anonymous bind request.<br>No magic=2C no authzTo check=2C n=
o nothing. =3B It then goes straight into the modification and tries to=
perform=2C but is blocked due to the bound user being anonymous and the st=
ronger authentication error (8) is returned. =3B <br>Given that the bin=
d occured anonymously=2C I feel that error is expected and wanted.<br> =
=3B<br>I had been trying to use sasl binding here=2C but was not having the=
same sucess that I had with syncrepl. =3B In order to only fight one b=
attle at a time=2C I changed by proxy config to use a simple bind instead o=
f sasl/gssapi. =3B <br> =3B<br>Referrals and proxy authentication a=
re configured on replica with the following ldif. =3B I tried setting t=
he override flag because the man page makes it sound like it forces the aut=
hzTo check at bind time.<br>By doing that I was hoping I could force the ch=
eck and see the authzTo process in my logs. =3B Is this what the ITS yo=
u mentions is referring to?<BR> =3B<br>dn: olcDatabase=3D{1}hdb=2Ccn=3D=
config<br> =3Bchangetype: modify<br> =3Badd: olcUpdateref<br> =
=3BolcUpdateref: "<a href=3D"ldap://master.example.net:389/">ldap://master.=
example.net:389/</a>"<br> =3B <br> =3Bdn: cn=3Dmodule{0}=2Ccn=3Dcon=
fig<br> =3Bchangetype: modify<br> =3Badd: olcModuleLoad<br> =3B=
olcModuleLoad: {1}back_ldap<br> =3B <br> =3Bdn: olcOverlay=3Dchain=
=2ColcDatabase=3D{-1}frontend=2Ccn=3Dconfig<br> =3Bchangetype: add<br>&=
nbsp=3BobjectClass: olcOverlayConfig<br> =3BobjectClass: olcChainConfig=
<br> =3BolcOverlay: {0}chain<br> =3BolcChainReturnError: TRUE<br>&n=
bsp=3B <br> =3Bdn: olcDatabase=3Dldap=2ColcOverlay=3D{0}chain=2ColcData=
base=3D{-1}frontend=2Ccn=3Dconfig<br> =3Bchangetype: add<br> =3Bobj=
ectClass: olcLDAPConfig<br> =3BobjectClass: olcChainDatabase<br> =
=3BolcDatabase: {0}ldap<br> =3BolcDbURI: "<a href=3D"ldap://master.exam=
ple.net:389/">ldap://master.example.net:389/</a>"<br> =3BolcDbRebindAsU=
ser: TRUE<br> =3BolcDbIDAssertBind: bindmethod=3Dsimple<br> =3B&nbs=
p=3B binddn=3D"cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet"<br>&nbs=
p=3B =3B credentials=3Dshhh-secret<br> =3B =3B mode=3Dself<br>&=
nbsp=3B =3B flags=3Doverride<br> =3B =3B starttls=3Dcritical<br=
> =3B =3B tls_reqcert=3Ddemand<br> =3B =3B tls_cacert=3D/et=
c/ssl/certs/cacert.pem<BR> =3B <br> =3B <br>After adding that infor=
mation via ldapmodify=2C I attempt to perform an update on the replica.&nbs=
p=3B For testing=2C i simply change the description attribute for uid=3Dadm=
inistrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet. =3B I'm using this =
simple ldif to test with:<br> =3B <BR>dn: uid=3Dadministrator=2Cou=3Dpe=
ople=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bchangetype: modify<br> =3Brep=
lace: description<br> =3Bdescription: Network Administrator<BR><br>Init=
ially after configuring the proxy and obtainng a kerberos ticket for the ac=
count (administrator=2C self write)=2C this update succeeds. =3B Lookin=
g at syslog on replica=2C I see happiness. =3B The ldap modify binds us=
ing gssapi=2C I see SASL name being correctly converted to uid=3Dadministra=
tor=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet.<br> =3B <BR>Dec =3B 3 =
22:17:01 replica slapd[994]: SASL Canonicalize [conn=3D1005]: authcid=3D"ad=
ministrator"<br> =3BDec =3B 3 22:17:01 replica slapd[994]: slap_sas=
l_getdn: conn 1005 id=3Dadministrator [len=3D13]<br> =3BDec =3B 3 2=
2:17:01 replica slapd[994]: slap_sasl_getdn: u:id converted to uid=3Dadmini=
strator=2Ccn=3DEXAMPLE.NET=2Ccn=3DGSSAPI=2Ccn=3Dauth<br> =3BDec =3B=
3 22:17:01 replica slapd[994]: >=3B>=3B>=3B dnNormalize: <=3Buid=
=3Dadministrator=2Ccn=3DEXAMPLE.NET=2Ccn=3DGSSAPI=2Ccn=3Dauth>=3B<br>&nbs=
p=3BDec =3B 3 22:17:01 replica slapd[994]: <=3B<=3B<=3B dnNormali=
ze: <=3Buid=3Dadministrator=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth&=
gt=3B<br> =3BDec =3B 3 22:17:01 replica slapd[994]: =3D=3D>=3Bsla=
p_sasl2dn: converting SASL name uid=3Dadministrator=2Ccn=3Dexample.net=2Ccn=
=3Dgssapi=2Ccn=3Dauth to a DN<br> =3BDec =3B 3 22:17:01 replica sla=
pd[994]: =3D=3D>=3B rewrite_context_apply [depth=3D1] string=3D'uid=3Dadm=
inistrator=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth'<br> =3BDec&nbs=
p=3B 3 22:17:01 replica slapd[994]: =3D=3D>=3B rewrite_rule_apply rule=3D=
'uid=3Dldap/([^/\.]+).example.net=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Da=
uth' string=3D'uid=3Dadministrator=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3D=
auth' [1 pass(es)]<br> =3BDec =3B 3 22:17:01 replica slapd[994]: =
=3D=3D>=3B rewrite_rule_apply rule=3D'uid=3D([^=2C]+)=2Ccn=3Dexample.net=
=2Ccn=3Dgssapi=2Ccn=3Dauth' string=3D'uid=3Dadministrator=2Ccn=3Dexample.ne=
t=2Ccn=3Dgssapi=2Ccn=3Dauth' [1 pass(es)]<br> =3BDec =3B 3 22:17:01=
replica slapd[994]: =3D=3D>=3B rewrite_context_apply [depth=3D1] res=3D{=
0=2C'uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet'}<br> =
=3BDec =3B 3 22:17:01 replica slapd[994]: [rw] authid: "uid=3Dadministr=
ator=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth" ->=3B "uid=3Dadministr=
ator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:1=
7:01 replica slapd[994]: slap_parseURI: parsing uid=3Dadministrator=2Cou=3D=
people=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BDec =3B 3 22:17:01 replica =
slapd[994]: >=3B>=3B>=3B dnNormalize: <=3Buid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:01=
replica slapd[994]: <=3B<=3B<=3B dnNormalize: <=3Buid=3Dadministra=
tor=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 =
22:17:01 replica slapd[994]: <=3B=3D=3Dslap_sasl2dn: Converted SASL name =
to uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BD=
ec =3B 3 22:17:01 replica slapd[994]: slap_sasl_getdn: dn:id converted =
to uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BD=
ec =3B 3 22:17:01 replica slapd[994]: SASL Canonicalize [conn=3D1005]: =
slapAuthcDN=3D"uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"=
<br> =3BDec =3B 3 22:17:01 replica slapd[994]: SASL proxy authorize=
[conn=3D1005]: authcid=3D"<a href=3D"mailto:administrator@EXAMPLE.NET">adm=
inistrator@EXAMPLE.NET</a>" authzid=3D"<a href=3D"mailto:administrator@EXAM=
PLE.NET">administrator@EXAMPLE.NET</a>"<br> =3BDec =3B 3 22:17:01 r=
eplica slapd[994]: conn=3D1005 op=3D2 BIND authcid=3D"<a href=3D"mailto:adm=
inistrator@EXAMPLE.NET">administrator@EXAMPLE.NET</a>" authzid=3D"<a href=
=3D"mailto:administrator@EXAMPLE.NET">administrator@EXAMPLE.NET</a>"<br>&nb=
sp=3BDec =3B 3 22:17:01 replica slapd[994]: SASL Authorize [conn=3D1005=
]: =3B proxy authorization allowed authzDN=3D""<br> =3BDec =3B =
3 22:17:01 replica slapd[994]: send_ldap_sasl: err=3D0 len=3D-1<br> =3B=
Dec =3B 3 22:17:01 replica slapd[994]: daemon: activity on 1 descriptor=
<br> =3BDec =3B 3 22:17:01 replica slapd[994]: daemon: activity on:=
<br> =3BDec =3B 3 22:17:01 replica slapd[994]: <br>Dec =3B 3 22=
:17:01 replica slapd[994]: conn=3D1005 op=3D2 BIND dn=3D"uid=3Dadministrato=
r=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" mech=3DGSSAPI sasl_ssf=3D56 ssf=
=3D56<br> =3BDec =3B 3 22:17:01 replica slapd[994]: do_bind: SASL/G=
SSAPI bind: dn=3D"uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dn=
et" sasl_ssf=3D56<br> =3BDec =3B 3 22:17:01 replica slapd[994]: sen=
d_ldap_response: msgid=3D3 tag=3D97 err=3D0<br> =3BDec =3B 3 22:17:=
01 replica slapd[994]: conn=3D1005 op=3D2 RESULT tag=3D97 err=3D0 text=3D<b=
r> =3BDec =3B 3 22:17:01 replica slapd[994]: <=3B=3D=3D slap_sasl=
_bind: rc=3D0<BR><br> =3BAll good=2C so far on replica. =3B I belie=
ve the sasl/gssapi authntication process is completed. =3B Now to perfo=
rm the modify.<BR><br>Dec =3B 3 22:17:01 replica slapd[994]: conn=3D100=
5 op=3D3 do_modify<br> =3BDec =3B 3 22:17:01 replica slapd[994]: co=
nn=3D1005 op=3D3 do_modify: dn (uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dex=
ample=2Cdc=3Dnet)<br> =3BDec =3B 3 22:17:01 replica slapd[994]: >=
=3B>=3B>=3B dnPrettyNormal: <=3Buid=3Dadministrator=2Cou=3Dpeople=2Cd=
c=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:01 replica slap=
d[994]: <=3B<=3B<=3B dnPrettyNormal: <=3Buid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B=2C <=3Buid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:01=
replica slapd[994]: conn=3D1005 op=3D3 modifications:<br> =3BDec =
=3B 3 22:17:01 replica slapd[994]: #011replace: description<br> =3BDec&=
nbsp=3B 3 22:17:01 replica slapd[994]: #011#011one value=2C length 21<br>&n=
bsp=3BDec =3B 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D3 MOD dn=
=3D"uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"<br> =
=3BDec =3B 3 22:17:01 replica slapd[994]: conn=3D1005 op=3D3 MOD attr=
=3Ddescription<br> =3BDec =3B 3 22:17:01 replica slapd[994]: bdb_dn=
2entry("uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")<br>&n=
bsp=3BDec =3B 3 22:17:01 replica slapd[994]: send_ldap_result: conn=3D1=
005 op=3D3 p=3D3<br> =3BDec =3B 3 22:17:01 replica slapd[994]: send=
_ldap_result: err=3D10 matched=3D"" text=3D""<br> =3BDec =3B 3 22:1=
7:01 replica slapd[994]: send_ldap_result: referral=3D"<a href=3D"ldap://ma=
ster.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=
=3Dnet">ldap://master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cd=
c=3Dexample=2Cdc=3Dnet</a>"<br> =3BDec =3B 3 22:17:01 replica slapd=
[994]: >=3B>=3B>=3B dnPrettyNormal: <=3Buid=3Dadministrator=2Cou=3D=
people=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:01 re=
plica slapd[994]: daemon: activity on 1 descriptor<br> =3BDec =3B 3=
22:17:01 replica slapd[994]: daemon: activity on:<br> =3BDec =3B 3=
22:17:01 replica slapd[994]: <br>Dec =3B 3 22:17:01 replica slapd[994]=
: <=3B<=3B<=3B dnPrettyNormal: <=3Buid=3Dadministrator=2Cou=3Dpeopl=
e=2Cdc=3Dexample=2Cdc=3Dnet>=3B=2C <=3Buid=3Dadministrator=2Cou=3Dpeopl=
e=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:01 replica=
slapd[994]: conn=3D1005 op=3D3 ldap_chain_op: ref=3D"<a href=3D"ldap://mas=
ter.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=
=3Dnet">ldap://master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cd=
c=3Dexample=2Cdc=3Dnet</a>" ->=3B "<a href=3D"ldap://master.example.net:3=
89">ldap://master.example.net:389</a>"<br> =3BDec =3B 3 22:17:01 re=
plica slapd[994]: conn=3D1005 op=3D3 ldap_chain_op: ref=3D"<a href=3D"ldap:=
//master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=
=2Cdc=3Dnet">ldap://master.example.net:389/uid=3Dadministrator=2Cou=3Dpeopl=
e=2Cdc=3Dexample=2Cdc=3Dnet</a>": URI=3D"<a href=3D"ldap://master.example.n=
et:389">ldap://master.example.net:389</a>" found in cache<BR><br> =3B <=
br> =3BOkay=2C now it seems that the referral is returned and chased on=
behalf of the client. =3B Finally=2C from the perspective of replica=
=2C success! =3B Modified data comes back to replica via syncrepl.<br>&=
nbsp=3B <BR>Dec =3B 3 22:17:01 replica slapd[994]: =3D>=3Bldap_back_g=
etconn: conn 0x7fe0b0147c30 fetched refcnt=3D1.<br> =3BDec =3B 3 22=
:17:01 replica slapd[994]: send_ldap_result: conn=3D1005 op=3D3 p=3D3<br>&n=
bsp=3BDec =3B 3 22:17:01 replica slapd[994]: send_ldap_result: err=3D0 =
matched=3D"" text=3D""<br> =3BDec =3B 3 22:17:01 replica slapd[994]=
: send_ldap_response: msgid=3D4 tag=3D103 err=3D0<br> =3BDec =3B 3 =
22:17:01 replica slapd[994]: conn=3D1005 op=3D3 RESULT tag=3D103 err=3D0 te=
xt=3D<BR><br> =3B<br>Dec =3B 3 22:17:01 replica slapd[994]: daemon:=
activity on 1 descriptor<br> =3BDec =3B 3 22:17:01 replica slapd[9=
94]: daemon: activity on:<br> =3BDec =3B 3 22:17:01 replica slapd[9=
94]: =3B 15r<br> =3BDec =3B 3 22:17:01 replica slapd[994]: <br>=
Dec =3B 3 22:17:01 replica slapd[994]: daemon: read active on 15<br>&nb=
sp=3BDec =3B 3 22:17:01 replica slapd[994]: connection_get(15)<br> =
=3BDec =3B 3 22:17:01 replica slapd[994]: connection_get(15): got conni=
d=3D0<br> =3BDec =3B 3 22:17:01 replica slapd[994]: =3D>=3Bdo_syn=
crepl rid=3D123<br> =3BDec =3B 3 22:17:01 replica slapd[994]: =3D&g=
t=3Bdo_syncrep2 rid=3D123<br> =3BDec =3B 3 22:17:01 replica slapd[9=
94]: do_syncrep2: rid=3D123 cookie=3Drid=3D123=2Ccsn=3D20121204031701.56069=
7Z#000000#000#000000<br> =3BDec =3B 3 22:17:01 replica slapd[994]: =
>=3B>=3B>=3B dnPrettyNormal: <=3Buid=3Dadministrator=2Cou=3Dpeople=
=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:01 replica =
slapd[994]: <=3B<=3B<=3B dnPrettyNormal: <=3Buid=3Dadministrator=2C=
ou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B=2C <=3Buid=3Dadministrator=2C=
ou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:=
01 replica slapd[994]: >=3B>=3B>=3B dnPretty: <=3Bcn=3Dadmin=2Cdc=
=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:01 replica slapd=
[994]: <=3B<=3B<=3B dnPretty: <=3Bcn=3Dadmin=2Cdc=3Dexample=2Cdc=3D=
net>=3B<br> =3BDec =3B 3 22:17:01 replica slapd[994]: >=3B>=
=3B>=3B dnNormalize: <=3Bcn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br>=
 =3BDec =3B 3 22:17:01 replica rsyslogd-2177: imuxsock begins to dr=
op messages from pid 994 due to rate-limiting<BR><br> =3BSo everything =
looks good (correct?) on replica. =3B Meanwhile=2C back at the master..=
.. <br> =3B<BR>Dec =3B 3 22:17:01 master slapd[947]: daemon: activi=
ty on 1 descriptor<br> =3BDec =3B 3 22:17:01 master slapd[947]: dae=
mon: activity on:<br> =3BDec =3B 3 22:17:01 master slapd[947]: =
=3B 51r<br> =3BDec =3B 3 22:17:01 master slapd[947]: <br>Dec =
=3B 3 22:17:01 master slapd[947]: daemon: read active on 51<br> =3BDec&=
nbsp=3B 3 22:17:01 master slapd[947]: connection_get(51)<br> =3BDec&nbs=
p=3B 3 22:17:01 master slapd[947]: connection_get(51): got connid=3D1054<br=
> =3BDec =3B 3 22:17:01 master slapd[947]: connection_read(51): che=
cking for input on id=3D1054<br> =3BDec =3B 3 22:17:01 master slapd=
[947]: op tag 0x66=2C time 1354591021<br> =3BDec =3B 3 22:17:01 mas=
ter slapd[947]: daemon: activity on 1 descriptor<br> =3BDec =3B 3 2=
2:17:01 master slapd[947]: daemon: activity on:<br> =3BDec =3B 3 22=
:17:01 master slapd[947]: <br>Dec =3B 3 22:17:01 master slapd[947]: con=
n=3D1054 op=3D3 do_modify<br> =3BDec =3B 3 22:17:01 master slapd[94=
7]: conn=3D1054 op=3D3 do_modify: dn (uid=3Dadministrator=2Cou=3Dpeople=2Cd=
c=3Dexample=2Cdc=3Dnet)<br> =3BDec =3B 3 22:17:01 master slapd[947]=
: =3D>=3B get_ctrls<br> =3BDec =3B 3 22:17:01 master slapd[947]: =
=3D>=3B get_ctrls: oid=3D"2.16.840.1.113730.3.4.18" (noncritical)<br>&nbs=
p=3BDec =3B 3 22:17:01 master slapd[947]: parseProxyAuthz: conn 1054 au=
thzid=3D"dn:uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"<br=
> =3BDec =3B 3 22:17:01 master slapd[947]: slap_sasl_getdn: conn 10=
54 id=3Ddn:uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet [len=
=3D48]<br> =3BDec =3B 3 22:17:01 master slapd[947]: >=3B>=3B>=
=3B dnNormalize: <=3Buid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cd=
c=3Dnet>=3B<br> =3BDec =3B 3 22:17:01 master slapd[947]: <=3B&l=
t=3B<=3B dnNormalize: <=3Buid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexam=
ple=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:01 master slapd[947]: =
=3D=3D>=3Bslap_sasl2dn: converting SASL name uid=3Dadministrator=2Cou=3Dp=
eople=2Cdc=3Dexample=2Cdc=3Dnet to a DN<br> =3BDec =3B 3 22:17:01 m=
aster slapd[947]: =3D=3D>=3B rewrite_context_apply [depth=3D1] string=3D'=
uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet'<br> =3BDec=
 =3B 3 22:17:01 master slapd[947]: =3D=3D>=3B rewrite_rule_apply rule=
=3D'uid=3Dldap/([^/\.]+).example.net=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=
=3Dauth' string=3D'uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3D=
net' [1 pass(es)]<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D=
=3D>=3B rewrite_rule_apply rule=3D'uid=3D([^=2C]+)=2Ccn=3Dexample.net=2Cc=
n=3Dgssapi=2Ccn=3Dauth' string=3D'uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3D=
example=2Cdc=3Dnet' [1 pass(es)]<br> =3BDec =3B 3 22:17:01 master s=
lapd[947]: =3D=3D>=3B rewrite_context_apply [depth=3D1] res=3D{0=2C'uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet'}<br> =3BDec&n=
bsp=3B 3 22:17:01 master slapd[947]: [rw] authid: "uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" ->=3B "uid=3Dadministrator=2Cou=3Dpe=
ople=2Cdc=3Dexample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:17:01 master sl=
apd[947]: slap_parseURI: parsing uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3De=
xample=2Cdc=3Dnet<br> =3BDec =3B 3 22:17:01 master slapd[947]: >=
=3B>=3B>=3B dnNormalize: <=3Buid=3Dadministrator=2Cou=3Dpeople=2Cdc=
=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:01 master slapd[=
947]: <=3B<=3B<=3B dnNormalize: <=3Buid=3Dadministrator=2Cou=3Dpeop=
le=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:17:01 master=
slapd[947]: <=3B=3D=3Dslap_sasl2dn: Converted SASL name to uid=3Dadminis=
trator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BDec =3B 3 22:=
17:01 master slapd[947]: slap_sasl_getdn: dn:id converted to uid=3Dadminist=
rator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BDec =3B 3 22:1=
7:01 master slapd[947]: parseProxyAuthz: conn=3D1054 "uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:17:01=
master slapd[947]: =3D=3D>=3Bslap_sasl_authorized: can cn=3Dreplica=2Cou=
=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet become uid=3Dadministrator=2Cou=3Dpeople=
=2Cdc=3Dexample=2Cdc=3Dnet?<br> =3BDec =3B 3 22:17:01 master slapd[=
947]: =3D=3D>=3Bslap_sasl_check_authz: does uid=3Dadministrator=2Cou=3Dpe=
ople=2Cdc=3Dexample=2Cdc=3Dnet match authzTo rule in cn=3Dreplica=2Cou=3Dho=
sts=2Cdc=3Dexample=2Cdc=3Dnet?<br> =3BDec =3B 3 22:17:01 master sla=
pd[947]: =3D>=3B bdb_entry_get: ndn: "cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dex=
ample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D&=
gt=3B bdb_entry_get: oc: "(null)"=2C at: "authzTo"<br> =3BDec =3B 3=
22:17:01 master slapd[947]: bdb_dn2entry("cn=3Dreplica=2Cou=3Dhosts=2Cdc=
=3Dexample=2Cdc=3Dnet")<br> =3BDec =3B 3 22:17:01 master slapd[947]=
: =3D>=3B bdb_entry_get: found entry: "cn=3Dreplica=2Cou=3Dhosts=2Cdc=3De=
xample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:17:01 master slapd[947]: bdb=
_entry_get: rc=3D0<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D=
>=3B access_allowed: result not in cache (authzTo)<br> =3BDec =3B=
3 22:17:01 master slapd[947]: =3D>=3B access_allowed: auth access to "cn=
=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet" "authzTo" requested<br>&=
nbsp=3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B acl_get: [2] att=
r authzTo<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B ac=
l_mask: access to entry "cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dne=
t"=2C attr "authzTo" requested<br> =3BDec =3B 3 22:17:01 master sla=
pd[947]: =3D>=3B acl_mask: to all values by "cn=3Dreplica=2Cou=3Dhosts=2C=
dc=3Dexample=2Cdc=3Dnet"=2C (=3D0) <br>Dec =3B 3 22:17:01 master slapd[=
947]: <=3B=3D check a_dn_pat: users<br> =3BDec =3B 3 22:17:01 mas=
ter slapd[947]: <=3B=3D acl_mask: [1] applying read(=3Drscxd) (stop)<br>&=
nbsp=3BDec =3B 3 22:17:01 master slapd[947]: <=3B=3D acl_mask: [1] ma=
sk: read(=3Drscxd)<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D=
>=3B slap_access_allowed: auth access granted by read(=3Drscxd)<br> =
=3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B access_allowed: auth=
access granted by read(=3Drscxd)<br> =3BDec =3B 3 22:17:01 master =
slapd[947]: =3D>=3B access_allowed: result was in cache (authzTo)<br>&nbs=
p=3BDec =3B 3 22:17:01 master slapd[947]: =3D=3D=3D>=3Bslap_sasl_matc=
h: comparing DN uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet=
to rule dn:*<br> =3BDec =3B 3 22:17:01 master slapd[947]: slap_par=
seURI: parsing dn:*<br> =3BDec =3B 3 22:17:01 master slapd[947]: &l=
t=3B=3D=3D=3Dslap_sasl_match: comparison returned 0<br> =3BDec =3B =
3 22:17:01 master slapd[947]: <=3B=3D=3Dslap_sasl_check_authz: authzTo ch=
eck returning 0<br> =3BDec =3B 3 22:17:01 master slapd[947]: <=3B=
=3D=3D slap_sasl_authorized: return 0<br> =3BDec =3B 3 22:17:01 mas=
ter slapd[947]: conn=3D1054 op=3D3 PROXYAUTHZ dn=3D"uid=3Dadministrator=2Co=
u=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:17:01 mas=
ter slapd[947]: <=3B=3D get_ctrls: n=3D1 rc=3D0 err=3D""<br> =3BDec&n=
bsp=3B 3 22:17:01 master slapd[947]: >=3B>=3B>=3B dnPrettyNormal: <=
=3Buid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br>&nb=
sp=3BDec =3B 3 22:17:01 master slapd[947]: <=3B<=3B<=3B dnPrettyN=
ormal: <=3Buid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=
=3B=2C <=3Buid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=
=3B<br> =3BDec =3B 3 22:17:01 master slapd[947]: conn=3D1054 op=3D3=
modifications:<br> =3BDec =3B 3 22:17:01 master slapd[947]: #011re=
place: description<br> =3BDec =3B 3 22:17:01 master slapd[947]: #01=
1#011one value=2C length 21<br> =3BDec =3B 3 22:17:01 master slapd[=
947]: conn=3D1054 op=3D3 MOD dn=3D"uid=3Dadministrator=2Cou=3Dpeople=2Cdc=
=3Dexample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:17:01 master slapd[947]:=
conn=3D1054 op=3D3 MOD attr=3Ddescription<br> =3BDec =3B 3 22:17:0=
1 master slapd[947]: bdb_dn2entry("uid=3Dadministrator=2Cou=3Dpeople=2Cdc=
=3Dexample=2Cdc=3Dnet")<br> =3BDec =3B 3 22:17:01 master slapd[947]=
: =3D>=3B bdb_entry_get: ndn: "uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3De=
xample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D=
>=3B bdb_entry_get: oc: "(null)"=2C at: "(null)"<br> =3BDec =3B 3=
22:17:01 master slapd[947]: bdb_dn2entry("uid=3Dadministrator=2Cou=3Dpeopl=
e=2Cdc=3Dexample=2Cdc=3Dnet")<br> =3BDec =3B 3 22:17:01 master slap=
d[947]: =3D>=3B bdb_entry_get: found entry: "uid=3Dadministrator=2Cou=3Dp=
eople=2Cdc=3Dexample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:17:01 master s=
lapd[947]: bdb_entry_get: rc=3D0<br> =3BDec =3B 3 22:17:01 master s=
lapd[947]: =3D>=3B test_filter<br> =3BDec =3B 3 22:17:01 master s=
lapd[947]: =3B =3B =3B =3B PRESENT<br> =3BDec =3B 3=
22:17:01 master slapd[947]: =3D>=3B access_allowed: search access to "ui=
d=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" "objectClass" re=
quested<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B dn: =
[4] ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BDec =3B 3 22:17:=
01 master slapd[947]: =3D>=3B dn: [5] <br>Dec =3B 3 22:17:01 master s=
lapd[947]: =3D>=3B acl_get: [6] attr objectClass<br> =3BDec =3B 3=
22:17:01 master slapd[947]: =3D>=3B acl_mask: access to entry "uid=3Dadm=
inistrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"=2C attr "objectClass" r=
equested<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B acl=
_mask: to all values by "cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dne=
t"=2C (=3D0) <br>Dec =3B 3 22:17:01 master slapd[947]: <=3B=3D check =
a_dn_pat: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =
=3BDec =3B 3 22:17:01 master slapd[947]: <=3B=3D check a_dn_pat: self=
<br> =3BDec =3B 3 22:17:01 master slapd[947]: <=3B=3D check a_dn_=
pat: users<br> =3BDec =3B 3 22:17:01 master slapd[947]: <=3B=3D a=
cl_mask: [3] applying read(=3Drscxd) (stop)<br> =3BDec =3B 3 22:17:=
01 master slapd[947]: <=3B=3D acl_mask: [3] mask: read(=3Drscxd)<br> =
=3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B slap_access_allowed:=
search access granted by read(=3Drscxd)<br> =3BDec =3B 3 22:17:01 =
master slapd[947]: =3D>=3B access_allowed: search access granted by read(=
=3Drscxd)<br> =3BDec =3B 3 22:17:01 master slapd[947]: <=3B=3D te=
st_filter 6<br> =3BDec =3B 3 22:17:01 master slapd[947]: syncprov_m=
atchops: sid ffffffff fscope 1 rc 6<br> =3BDec =3B 3 22:17:01 maste=
r slapd[947]: hdb_modify: uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=
=2Cdc=3Dnet<br> =3BDec =3B 3 22:17:01 master slapd[947]: slap_queue=
_csn: queing 0x7fa90f0fe110 20121204031701.560697Z#000000#000#000000<br>&nb=
sp=3BDec =3B 3 22:17:01 master slapd[947]: bdb_dn2entry("uid=3Dadminist=
rator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")<br> =3BDec =3B 3 22=
:17:01 master slapd[947]: bdb_modify_internal: 0x0000000b: uid=3Dadministra=
tor=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BDec =3B 3 22:17:=
01 master slapd[947]: =3D>=3B access_allowed: result not in cache (descri=
ption)<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B acces=
s_allowed: delete access to "uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexamp=
le=2Cdc=3Dnet" "description" requested<br> =3BDec =3B 3 22:17:01 ma=
ster slapd[947]: =3D>=3B dn: [4] ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<=
br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B dn: [5] <br>=
Dec =3B 3 22:17:01 master slapd[947]: =3D>=3B acl_get: [6] attr descr=
iption<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B acl_m=
ask: access to entry "uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=
=3Dnet"=2C attr "description" requested<br> =3BDec =3B 3 22:17:01 m=
aster slapd[947]: =3D>=3B acl_mask: to all values by "uid=3Dadministrator=
=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"=2C (=3D0) <br>Dec =3B 3 22:17=
:01 master slapd[947]: <=3B=3D check a_dn_pat: cn=3Dadm-srv=2Cou=3Dkerber=
os=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BDec =3B 3 22:17:01 master slapd=
[947]: <=3B=3D check a_dn_pat: self<br> =3BDec =3B 3 22:17:01 mas=
ter slapd[947]: <=3B=3D acl_mask: [2] applying write(=3Dwrscxd) (stop)<br=
> =3BDec =3B 3 22:17:01 master slapd[947]: <=3B=3D acl_mask: [2] =
mask: write(=3Dwrscxd)<br> =3BDec =3B 3 22:17:01 master slapd[947]:=
=3D>=3B slap_access_allowed: delete access granted by write(=3Dwrscxd)<b=
r> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B access_allowe=
d: delete access granted by write(=3Dwrscxd)<br> =3BDec =3B 3 22:17=
:01 master slapd[947]: =3D>=3B access_allowed: result not in cache (descr=
iption)<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B acce=
ss_allowed: add access to "uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=
=2Cdc=3Dnet" "description" requested<br> =3BDec =3B 3 22:17:01 mast=
er slapd[947]: =3D>=3B dn: [4] ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br=
> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B dn: [5] <br>De=
c =3B 3 22:17:01 master slapd[947]: =3D>=3B acl_get: [6] attr descrip=
tion<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B acl_mas=
k: access to entry "uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=
=3Dnet"=2C attr "description" requested<br> =3BDec =3B 3 22:17:01 m=
aster slapd[947]: =3D>=3B acl_mask: to value by "uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"=2C (=3D0) <br>Dec =3B 3 22:17:01 m=
aster slapd[947]: <=3B=3D check a_dn_pat: cn=3Dadm-srv=2Cou=3Dkerberos=2C=
dc=3Dexample=2Cdc=3Dnet<br> =3BDec =3B 3 22:17:01 master slapd[947]=
: <=3B=3D check a_dn_pat: self<br> =3BDec =3B 3 22:17:01 master s=
lapd[947]: <=3B=3D acl_mask: [2] applying write(=3Dwrscxd) (stop)<br>&nbs=
p=3BDec =3B 3 22:17:01 master slapd[947]: <=3B=3D acl_mask: [2] mask:=
write(=3Dwrscxd)<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D&=
gt=3B slap_access_allowed: add access granted by write(=3Dwrscxd)<br> =
=3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B access_allowed: add =
access granted by write(=3Dwrscxd)<br> =3BDec =3B 3 22:17:01 master=
slapd[947]: acl: internal mod entryCSN: modify access granted<br> =3BD=
ec =3B 3 22:17:01 master slapd[947]: acl: internal mod modifiersName: m=
odify access granted<br> =3BDec =3B 3 22:17:01 master slapd[947]: a=
cl: internal mod modifyTimestamp: modify access granted<br> =3BDec =
=3B 3 22:17:01 master slapd[947]: bdb_modify_internal: replace description<=
br> =3BDec =3B 3 22:17:01 master slapd[947]: bdb_modify_internal: r=
eplace entryCSN<br> =3BDec =3B 3 22:17:01 master slapd[947]: bdb_mo=
dify_internal: replace modifiersName<br> =3BDec =3B 3 22:17:01 mast=
er slapd[947]: bdb_modify_internal: replace modifyTimestamp<br> =3BDec&=
nbsp=3B 3 22:17:01 master slapd[947]: oc_check_required entry (uid=3Dadmini=
strator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)=2C objectClass "inetOrgPer=
son"<br> =3BDec =3B 3 22:17:01 master slapd[947]: oc_check_required=
entry (uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)=2C obj=
ectClass "posixAccount"<br> =3BDec =3B 3 22:17:01 master slapd[947]=
: oc_check_required entry (uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=
=2Cdc=3Dnet)=2C objectClass "shadowAccount"<br> =3BDec =3B 3 22:17:=
01 master slapd[947]: oc_check_required entry (uid=3Dadministrator=2Cou=3Dp=
eople=2Cdc=3Dexample=2Cdc=3Dnet)=2C objectClass "krbPrincipalAux"<br> =
=3BDec =3B 3 22:17:01 master slapd[947]: oc_check_required entry (uid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)=2C objectClass "k=
rbTicketPolicyAux"<br> =3BDec =3B 3 22:17:01 master slapd[947]: oc_=
check_allowed type "objectClass"<br> =3BDec =3B 3 22:17:01 master s=
lapd[947]: oc_check_allowed type "cn"<br> =3BDec =3B 3 22:17:01 mas=
ter slapd[947]: oc_check_allowed type "sn"<br> =3BDec =3B 3 22:17:0=
1 master slapd[947]: oc_check_allowed type "uidNumber"<br> =3BDec =
=3B 3 22:17:01 master slapd[947]: oc_check_allowed type "gidNumber"<br>&nbs=
p=3BDec =3B 3 22:17:01 master slapd[947]: oc_check_allowed type "userPa=
ssword"<br> =3BDec =3B 3 22:17:01 master slapd[947]: oc_check_allow=
ed type "homeDirectory"<br> =3BDec =3B 3 22:17:01 master slapd[947]=
: oc_check_allowed type "structuralObjectClass"<br> =3BDec =3B 3 22=
:17:01 master slapd[947]: oc_check_allowed type "uid"<br> =3BDec =
=3B 3 22:17:01 master slapd[947]: oc_check_allowed type "entryUUID"<br>&nbs=
p=3BDec =3B 3 22:17:01 master slapd[947]: oc_check_allowed type "creato=
rsName"<br> =3BDec =3B 3 22:17:01 master slapd[947]: oc_check_allow=
ed type "createTimestamp"<br> =3BDec =3B 3 22:17:01 master slapd[94=
7]: oc_check_allowed type "krbPrincipalName"<br> =3BDec =3B 3 22:17=
:01 master slapd[947]: oc_check_allowed type "krbPrincipalKey"<br> =3BD=
ec =3B 3 22:17:01 master slapd[947]: oc_check_allowed type "krbLastPwdC=
hange"<br> =3BDec =3B 3 22:17:01 master slapd[947]: oc_check_allowe=
d type "krbLastFailedAuth"<br> =3BDec =3B 3 22:17:01 master slapd[9=
47]: oc_check_allowed type "krbLoginFailedCount"<br> =3BDec =3B 3 2=
2:17:01 master slapd[947]: oc_check_allowed type "krbLastSuccessfulAuth"<br=
> =3BDec =3B 3 22:17:01 master slapd[947]: oc_check_allowed type "k=
rbExtraData"<br> =3BDec =3B 3 22:17:01 master slapd[947]: oc_check_=
allowed type "description"<br> =3BDec =3B 3 22:17:01 master slapd[9=
47]: oc_check_allowed type "entryCSN"<br> =3BDec =3B 3 22:17:01 mas=
ter slapd[947]: oc_check_allowed type "modifiersName"<br> =3BDec =
=3B 3 22:17:01 master slapd[947]: oc_check_allowed type "modifyTimestamp"<b=
r> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B key_change(DE=
LETE=2Cb)<br> =3BDec =3B 3 22:17:01 master slapd[947]: bdb_idl_dele=
te_key: b <br>Dec =3B 3 22:17:01 master slapd[947]: <=3B=3D key_chang=
e 0<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B key_chan=
ge(ADD=2Cb)<br> =3BDec =3B 3 22:17:01 master slapd[947]: bdb_idl_in=
sert_key: b <br>Dec =3B 3 22:17:01 master slapd[947]: <=3B=3D key_cha=
nge 0<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B entry_=
encode(0x0000000b): <br>Dec =3B 3 22:17:01 master slapd[947]: <=3B=3D=
entry_encode(0x0000000b): <br>Dec =3B 3 22:17:01 master slapd[947]: hd=
b_modify: updated id=3D0000000b dn=3D"uid=3Dadministrator=2Cou=3Dpeople=2Cd=
c=3Dexample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:17:01 master slapd[947]=
: send_ldap_result: conn=3D1054 op=3D3 p=3D3<br> =3BDec =3B 3 22:17=
:01 master slapd[947]: send_ldap_result: err=3D0 matched=3D"" text=3D""<br>=
 =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B bdb_entry_get: =
ndn: "uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"<br> =
=3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B bdb_entry_get: oc: "=
(null)"=2C at: "(null)"<br> =3BDec =3B 3 22:17:01 master slapd[947]=
: bdb_dn2entry("uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet=
")<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B bdb_entry=
_get: found entry: "uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=
=3Dnet"<br> =3BDec =3B 3 22:17:01 master slapd[947]: bdb_entry_get:=
rc=3D0<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B test=
_filter<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3B =
=3B =3B =3B PRESENT<br> =3BDec =3B 3 22:17:01 master slapd[=
947]: =3D>=3B access_allowed: search access to "uid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" "objectClass" requested<br> =3BDec=
 =3B 3 22:17:01 master slapd[947]: =3D>=3B dn: [4] ou=3Dkerberos=2Cdc=
=3Dexample=2Cdc=3Dnet<br> =3BDec =3B 3 22:17:01 master slapd[947]: =
=3D>=3B dn: [5] <br>Dec =3B 3 22:17:01 master slapd[947]: =3D>=3B a=
cl_get: [6] attr objectClass<br> =3BDec =3B 3 22:17:01 master slapd=
[947]: =3D>=3B acl_mask: access to entry "uid=3Dadministrator=2Cou=3Dpeop=
le=2Cdc=3Dexample=2Cdc=3Dnet"=2C attr "objectClass" requested<br> =3BDe=
c =3B 3 22:17:01 master slapd[947]: =3D>=3B acl_mask: to all values b=
y "cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet"=2C (=3D0) <br>Dec&n=
bsp=3B 3 22:17:01 master slapd[947]: <=3B=3D check a_dn_pat: cn=3Dadm-srv=
=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BDec =3B 3 22:17:0=
1 master slapd[947]: <=3B=3D check a_dn_pat: self<br> =3BDec =3B =
3 22:17:01 master slapd[947]: <=3B=3D check a_dn_pat: users<br> =3BDe=
c =3B 3 22:17:01 master slapd[947]: <=3B=3D acl_mask: [3] applying re=
ad(=3Drscxd) (stop)<br> =3BDec =3B 3 22:17:01 master slapd[947]: &l=
t=3B=3D acl_mask: [3] mask: read(=3Drscxd)<br> =3BDec =3B 3 22:17:0=
1 master slapd[947]: =3D>=3B slap_access_allowed: search access granted b=
y read(=3Drscxd)<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D&g=
t=3B access_allowed: search access granted by read(=3Drscxd)<br> =3BDec=
 =3B 3 22:17:01 master slapd[947]: <=3B=3D test_filter 6<br> =3BD=
ec =3B 3 22:17:01 master slapd[947]: syncprov_matchops: sid ffffffff fs=
cope 1 rc 6<br> =3BDec =3B 3 22:17:01 master slapd[947]: syncprov_s=
endresp: cookie=3Drid=3D123=2Ccsn=3D20121204031701.560697Z#000000#000#00000=
0<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B bdb_entry_=
get: ndn: "uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"<br>=
 =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B bdb_entry_get: =
oc: "(null)"=2C at: "(null)"<br> =3BDec =3B 3 22:17:01 master slapd=
[947]: bdb_dn2entry("uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=
=3Dnet")<br> =3BDec =3B 3 22:17:01 master slapd[947]: =3D>=3B bdb=
_entry_get: found entry: "uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=
=2Cdc=3Dnet"<BR><br> =3BEverything looks good on the master. =3B I =
see uid=3Dadministrator gets sent over from the the proxy on replica and th=
e update proceeds as expected. =3B Now if I restart slapd on replica=2C=
things change. =3B performing the same modifucation=2C we again see sa=
sl/gssapi authentication occuring on replica just as before<br> =3B <BR=
>Dec =3B 3 22:20:38 replica slapd[1412]: [rw] authid: "uid=3Dadministra=
tor=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth" ->=3B "uid=3Dadministra=
tor=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet"<br> =3BDec =3B 3 22:20=
:38 replica slapd[1412]: slap_parseURI: parsing uid=3Dadministrator=2Cou=3D=
people=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BDec =3B 3 22:20:38 replica =
slapd[1412]: >=3B>=3B>=3B dnNormalize: <=3Buid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:20:38=
replica slapd[1412]: <=3B<=3B<=3B dnNormalize: <=3Buid=3Dadministr=
ator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3=
22:20:38 replica slapd[1412]: <=3B=3D=3Dslap_sasl2dn: Converted SASL nam=
e to uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br> =
=3BDec =3B 3 22:20:38 replica slapd[1412]: slap_sasl_getdn: dn:id conve=
rted to uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br>&nbs=
p=3BDec =3B 3 22:20:38 replica slapd[1412]: SASL Canonicalize [conn=3D1=
000]: slapAuthcDN=3D"uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=
=3Dnet"<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: SASL proxy a=
uthorize [conn=3D1000]: authcid=3D"<a href=3D"mailto:administrator@EXAMPLE.=
NET">administrator@EXAMPLE.NET</a>" authzid=3D"<a href=3D"mailto:administra=
tor@EXAMPLE.NET">administrator@EXAMPLE.NET</a>"<br> =3BDec =3B 3 22=
:20:38 replica slapd[1412]: conn=3D1000 op=3D2 BIND authcid=3D"<a href=3D"m=
ailto:administrator@EXAMPLE.NET">administrator@EXAMPLE.NET</a>" authzid=3D"=
<a href=3D"mailto:administrator@EXAMPLE.NET">administrator@EXAMPLE.NET</a>"=
<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: SASL Authorize [con=
n=3D1000]: =3B proxy authorization allowed authzDN=3D""<br> =3BDec&=
nbsp=3B 3 22:20:38 replica slapd[1412]: send_ldap_sasl: err=3D0 len=3D-1<br=
> =3BDec =3B 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D2 BIN=
D dn=3D"uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet" mech=
=3DGSSAPI sasl_ssf=3D56 ssf=3D56<br> =3BDec =3B 3 22:20:38 replica =
slapd[1412]: do_bind: SASL/GSSAPI bind: dn=3D"uid=3Dadministrator=2Cou=3Dpe=
ople=2Cdc=3Dexample=2Cdc=3Dnet" sasl_ssf=3D56<br> =3BDec =3B 3 22:2=
0:38 replica slapd[1412]: send_ldap_response: msgid=3D3 tag=3D97 err=3D0<br=
> =3BDec =3B 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D2 RES=
ULT tag=3D97 err=3D0 text=3D<br> =3BDec =3B 3 22:20:38 replica slap=
d[1412]: <=3B=3D=3D slap_sasl_bind: rc=3D0<BR><br> =3BAgain=2C we hea=
d into the modification:<br> =3B <BR>Dec =3B 3 22:20:38 replica sla=
pd[1412]: conn=3D1000 op=3D3 do_modify<br> =3BDec =3B 3 22:20:38 re=
plica slapd[1412]: conn=3D1000 op=3D3 do_modify: dn (uid=3Dadministrator=2C=
ou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet)<br> =3BDec =3B 3 22:20:38 re=
plica slapd[1412]: >=3B>=3B>=3B dnPrettyNormal: <=3Buid=3Dadministr=
ator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3=
22:20:38 replica slapd[1412]: <=3B<=3B<=3B dnPrettyNormal: <=3Buid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B=2C <=3Buid=
=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BD=
ec =3B 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 modifications=
:<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: #011replace: descr=
iption<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: #011#011one v=
alue=2C length 21<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: co=
nn=3D1000 op=3D3 MOD dn=3D"uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=
=2Cdc=3Dnet"<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: conn=3D=
1000 op=3D3 MOD attr=3Ddescription<br> =3BDec =3B 3 22:20:38 replic=
a slapd[1412]: bdb_dn2entry("uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexamp=
le=2Cdc=3Dnet")<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: =3D&=
gt=3B hdb_dn2id("ou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")<br> =3BDec&nbs=
p=3B 3 22:20:38 replica slapd[1412]: <=3B=3D hdb_dn2id: got id=3D0x3<br>&=
nbsp=3BDec =3B 3 22:20:38 replica slapd[1412]: daemon: activity on 1 de=
scriptor<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: daemon: act=
ivity on:<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: <BR> =
=3B<br> =3BSo far=2C so good (I think)=2C replica sees the need to refe=
r the action and tries to chase it on behalf of the clent:<BR><br> =3BD=
ec =3B 3 22:20:38 replica slapd[1412]: =3D>=3B hdb_dn2id("uid=3Dadmin=
istrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet")<br> =3BDec =3B 3=
22:20:38 replica slapd[1412]: <=3B=3D hdb_dn2id: got id=3D0xb<br> =
=3BDec =3B 3 22:20:38 replica slapd[1412]: entry_decode: ""<br> =3B=
Dec =3B 3 22:20:38 replica slapd[1412]: <=3B=3D entry_decode()<br>&nb=
sp=3BDec =3B 3 22:20:38 replica slapd[1412]: send_ldap_result: conn=3D1=
000 op=3D3 p=3D3<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: sen=
d_ldap_result: err=3D10 matched=3D"" text=3D""<br> =3BDec =3B 3 22:=
20:38 replica slapd[1412]: send_ldap_result: referral=3D"<a href=3D"ldap://=
master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cd=
c=3Dnet">ldap://master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2C=
dc=3Dexample=2Cdc=3Dnet</a>"<br> =3BDec =3B 3 22:20:38 replica slap=
d[1412]: >=3B>=3B>=3B dnPrettyNormal: <=3Buid=3Dadministrator=2Cou=
=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =3B 3 22:20:38=
replica slapd[1412]: <=3B<=3B<=3B dnPrettyNormal: <=3Buid=3Dadmini=
strator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B=2C <=3Buid=3Dadmini=
strator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet>=3B<br> =3BDec =
=3B 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 ldap_chain_op: ref=
=3D"<a href=3D"ldap://master.example.net:389/uid=3Dadministrator=2Cou=3Dpeo=
ple=2Cdc=3Dexample=2Cdc=3Dnet">ldap://master.example.net:389/uid=3Dadminist=
rator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet</a>" ->=3B "<a href=3D"ldap=
://master.example.net:389">ldap://master.example.net:389</a>"<br> =3BDe=
c =3B 3 22:20:38 replica slapd[1412]: ldap_back_db_open: URI=3Dldap://m=
aster.example.net:389<br> =3BDec =3B 3 22:20:38 replica slapd[1412]=
: conn=3D1000 op=3D3 ldap_chain_op: ref=3D"<a href=3D"ldap://master.example=
.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet">ldap:=
//master.example.net:389/uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=
=2Cdc=3Dnet</a>" temporary<br> =3BDec =3B 3 22:20:38 replica slapd[=
1412]: =3D>=3Bldap_back_getconn: conn=3D1000 op=3D3: lc=3D0x7f213015a7d0 =
inserted refcnt=3D1 rc=3D0<br> =3BDec =3B 3 22:20:38 replica slapd[=
1412]: send_ldap_result: conn=3D1000 op=3D3 p=3D3<BR> =3B <BR> =3B<=
br>At this point=2C I "assume" the modification has been passed off to mast=
er. =3B However=2C I notice that I never see the replica checking authz=
To like before the restart. I think this is where it's falling apart for me=
and the err=3D8 back is returned from master.<br> =3B<br> =3B<BR>D=
ec =3B 3 22:20:38 replica slapd[1412]: send_ldap_result: err=3D8 matche=
d=3D"" text=3D"modifications require authentication"<br> =3BDec =3B=
3 22:20:38 replica slapd[1412]: send_ldap_result: conn=3D1000 op=3D3 p=3D3=
<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: send_ldap_result: e=
rr=3D8 matched=3D"" text=3D""<br> =3BDec =3B 3 22:20:38 replica sla=
pd[1412]: send_ldap_response: msgid=3D4 tag=3D103 err=3D8<br> =3BDec&nb=
sp=3B 3 22:20:38 replica slapd[1412]: conn=3D1000 op=3D3 RESULT tag=3D103 e=
rr=3D8 text=3D<br> =3BDec =3B 3 22:20:38 replica slapd[1412]: daemo=
n: activity on 1 descriptor<br> =3BDec =3B 3 22:20:38 replica slapd=
[1412]: daemon: activity on:<br> =3BDec =3B 3 22:20:38 replica slap=
d[1412]: =3B 18r<BR> =3B <br> =3BOver on the master we see the =
proxy connection occurs=2C but the client credentials never apper to arrive=
. =3B I say that because=2C it looks to me like the proxy connection fr=
om replica appears to bind anonymously.<br> =3B <BR>Dec =3B 3 22:20=
:38 master slapd[947]: daemon: activity on 1 descriptor<br> =3BDec =
=3B 3 22:20:38 master slapd[947]: daemon: activity on:<br> =3BDec =
=3B 3 22:20:38 master slapd[947]: <br>Dec =3B 3 22:20:38 master slapd[9=
47]: slap_listener_activate(8): <br>Dec =3B 3 22:20:38 master slapd[947=
]: >=3B>=3B>=3B slap_listener(<a href=3D"ldap:///">ldap:///</a>)<br>&=
nbsp=3BDec =3B 3 22:20:38 master slapd[947]: daemon: listen=3D8=2C new =
connection on 51<br> =3BDec =3B 3 22:20:38 master slapd[947]: daemo=
n: added 51r (active) listener=3D(nil)<br> =3BDec =3B 3 22:20:38 ma=
ster slapd[947]: conn=3D1056 fd=3D51 ACCEPT from IP=3D192.168.1.2:34759 (IP=
=3D0.0.0.0:389)<br> =3BDec =3B 3 22:20:38 master slapd[947]: daemon=
: activity on 2 descriptors<br> =3BDec =3B 3 22:20:38 master slapd[=
947]: daemon: activity on:<br> =3BDec =3B 3 22:20:38 master slapd[9=
47]: =3B 51r<br> =3BDec =3B 3 22:20:38 master slapd[947]: <br>D=
ec =3B 3 22:20:38 master slapd[947]: daemon: read active on 51<br> =
=3BDec =3B 3 22:20:38 master slapd[947]: connection_get(51)<br> =3B=
Dec =3B 3 22:20:38 master slapd[947]: connection_get(51): got connid=3D=
1056<br> =3BDec =3B 3 22:20:38 master slapd[947]: connection_read(5=
1): checking for input on id=3D1056<br> =3BDec =3B 3 22:20:38 maste=
r slapd[947]: op tag 0x60=2C time 1354591238<br> =3BDec =3B 3 22:20=
:38 master slapd[947]: conn=3D1056 op=3D0 do_bind<br> =3BDec =3B 3 =
22:20:38 master slapd[947]: >=3B>=3B>=3B dnPrettyNormal: <=3B>=3B=
<br> =3BDec =3B 3 22:20:38 master slapd[947]: <=3B<=3B<=3B dn=
PrettyNormal: <=3B>=3B=2C <=3B>=3B<br> =3BDec =3B 3 22:20:3=
8 master slapd[947]: conn=3D1056 op=3D0 BIND dn=3D"" method=3D128<br> =
=3BDec =3B 3 22:20:38 master slapd[947]: do_bind: version=3D3 dn=3D"" m=
ethod=3D128<br> =3BDec =3B 3 22:20:38 master slapd[947]: send_ldap_=
result: conn=3D1056 op=3D0 p=3D3<br> =3BDec =3B 3 22:20:38 master s=
lapd[947]: send_ldap_result: err=3D0 matched=3D"" text=3D""<br> =3BDec&=
nbsp=3B 3 22:20:38 master slapd[947]: send_ldap_response: msgid=3D1 tag=3D9=
7 err=3D0<br> =3BDec =3B 3 22:20:38 master slapd[947]: conn=3D1056 =
op=3D0 RESULT tag=3D97 err=3D0 text=3D<br> =3BDec =3B 3 22:20:38 ma=
ster slapd[947]: do_bind: v3 anonymous bind<br> =3BDec =3B 3 22:20:=
38 master slapd[947]: daemon: activity on 2 descriptors<br> =3BDec =
=3B 3 22:20:38 master slapd[947]: daemon: activity on:<br> =3BDec =
=3B 3 22:20:38 master slapd[947]: =3B 51r<br> =3BDec =3B 3 22:2=
0:38 master slapd[947]: <BR><br>After=2C the (anonymous) bind=2C the master=
never attempts to if the proxyauth request is allowed via authzTo or anyth=
ing else (perhaps obviously). =3B The modification just proceeds anonym=
ously and eventually fails.<br> =3B <br> =3BNot sure if I'm saying =
this in a way that makes any sense to you. =3B Hopefully=2C it does.&nb=
sp=3B It appears=2C that the proxy on replica after restarting=2C never tri=
es to determine if the olcDbIDAssertBind binddn is permitted to impersonate=
the client via the authzTo attribute and proceeds with the referal chase a=
nonymously.<br> =3B <br> =3BI'll copy paste configs below. =3B&=
nbsp=3B Sorry this is so long=2C but I figure the more information=2C the b=
etter when trying to solve any problem.<br> =3B <br> =3BThanks<br>&=
nbsp=3B <br> =3BBarry<br> =3B <br> =3Bvvvvvvvvvvvvvvvvvvvvvvvvv=
vvvvvvvvvv master configuration vvvvvvvvvvvvvvvvvvvvvvvvvvvv<br> =3Bdn:=
cn=3Dconfig<br> =3BobjectClass: olcGlobal<br> =3Bcn: config<br>&nb=
sp=3BolcArgsFile: /var/run/slapd/slapd.args<br> =3BolcPidFile: /var/run=
/slapd/slapd.pid<br> =3BolcToolThreads: 1<br> =3BstructuralObjectCl=
ass: olcGlobal<br> =3BentryUUID: ea6bf008-d108-1031-912d-8fbb37ee6dd9<b=
r> =3BcreatorsName: cn=3Dconfig<br> =3BcreateTimestamp: 20121202201=
635Z<br> =3BolcTLSCACertificateFile: /etc/ssl/certs/cacert.pem<br> =
=3BolcTLSCertificateFile: /etc/ssl/certs/master_slapd_cert.pem<br> =3Bo=
lcTLSCertificateKeyFile: /etc/ldap/master_slapd_key.pem<br> =3BolcAuthz=
Policy: to<br> =3BolcSaslHost: master.example.net<br> =3BolcSaslRea=
lm: EXAMPLE.NET<br> =3BolcAuthzRegexp: {0}uid=3Dldap/([^/\.]+).example.=
net=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth cn=3D$1=2Cou=3Dhosts=2Cdc=
=3Dexample=2Cdc=3Dnet<br> =3BolcAuthzRegexp: {1}uid=3D([^=2C]+)=2Ccn=3D=
example.net=2Ccn=3Dgssapi=2Ccn=3Dauth uid=3D$1=2Cou=3Dpeople=2Cdc=3Dexample=
=2Cdc=3Dnet<br> =3BolcLogLevel: -1<br> =3BentryCSN: 20121204013949.=
466434Z#000000#000#000000<br> =3BmodifiersName: gidNumber=3D0+uidNumber=
=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=2Ccn=3Dauth<br> =3BmodifyTimestamp=
: 20121204013949Z<br> =3Bdn: cn=3Dmodule{0}=2Ccn=3Dconfig<br> =3Bob=
jectClass: olcModuleList<br> =3Bcn: module{0}<br> =3BolcModulePath:=
/usr/lib/ldap<br> =3BolcModuleLoad: {0}back_hdb<br> =3BolcModuleLo=
ad: {1}syncprov<br> =3BstructuralObjectClass: olcModuleList<br> =3B=
entryUUID: ea6dda08-d108-1031-9135-8fbb37ee6dd9<br> =3BcreatorsName: cn=
=3Dconfig<br> =3BcreateTimestamp: 20121202201635Z<br> =3BentryCSN: =
20121203054749.860918Z#000000#000#000000<br> =3BmodifiersName: gidNumbe=
r=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=2Ccn=3Dauth<br> =3B=
modifyTimestamp: 20121203054749Z<br> =3Bdn: cn=3Dschema=2Ccn=3Dconfig<b=
r> =3BobjectClass: olcSchemaConfig<br> =3Bcn: schema<br> =3Bstr=
ucturalObjectClass: olcSchemaConfig<br> =3BentryUUID: ea6c3a0e-d108-103=
1-9130-8fbb37ee6dd9<br> =3BcreatorsName: cn=3Dconfig<br> =3BcreateT=
imestamp: 20121202201635Z<br> =3BentryCSN: 20121202201635.672699Z#00000=
0#000#000000<br> =3BmodifiersName: cn=3Dconfig<br> =3BmodifyTimesta=
mp: 20121202201635Z<br> =3B<=3Bsnip schemas >=3B<br> =3Bdn: olc=
Backend=3D{0}hdb=2Ccn=3Dconfig<br> =3BobjectClass: olcBackendConfig<br>=
 =3BolcBackend: {0}hdb<br> =3BstructuralObjectClass: olcBackendConf=
ig<br> =3BentryUUID: ea6f949c-d108-1031-9136-8fbb37ee6dd9<br> =3Bcr=
eatorsName: cn=3Dconfig<br> =3BcreateTimestamp: 20121202201635Z<br>&nbs=
p=3BentryCSN: 20121202201635.694663Z#000000#000#000000<br> =3Bmodifiers=
Name: cn=3Dconfig<br> =3BmodifyTimestamp: 20121202201635Z<br> =3Bdn=
: olcDatabase=3D{-1}frontend=2Ccn=3Dconfig<br> =3BobjectClass: olcDatab=
aseConfig<br> =3BobjectClass: olcFrontendConfig<br> =3BolcDatabase:=
{-1}frontend<br> =3BolcAccess: {0}to * by dn.exact=3DgidNumber=3D0+uid=
Number=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal<br> =3B =2Ccn=3Dauth manage =
by * break<br> =3BolcAccess: {1}to dn.exact=3D"" by * read<br> =3Bo=
lcAccess: {2}to dn.base=3D"cn=3DSubschema" by * read<br> =3BolcSizeLimi=
t: 500<br> =3BstructuralObjectClass: olcDatabaseConfig<br> =3Bentry=
UUID: ea6c0bf6-d108-1031-912e-8fbb37ee6dd9<br> =3BcreatorsName: cn=3Dco=
nfig<br> =3BcreateTimestamp: 20121202201635Z<br> =3BentryCSN: 20121=
202201635.671512Z#000000#000#000000<br> =3BmodifiersName: cn=3Dconfig<b=
r> =3BmodifyTimestamp: 20121202201635Z<br> =3Bdn: olcDatabase=3D{0}=
config=2Ccn=3Dconfig<br> =3BobjectClass: olcDatabaseConfig<br> =3Bo=
lcDatabase: {0}config<br> =3BolcAccess: {0}to * by dn.exact=3DgidNumber=
=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=2Ccn=3Dauth manage by * =
break<br> =3BstructuralObjectClass: olcDatabaseConfig<br> =3BentryU=
UID: ea6c325c-d108-1031-912f-8fbb37ee6dd9<br> =3BcreatorsName: cn=3Dcon=
fig<br> =3BcreateTimestamp: 20121202201635Z<br> =3BentryCSN: 201212=
02201635.672495Z#000000#000#000000<br> =3BmodifiersName: cn=3Dconfig<br=
> =3BmodifyTimestamp: 20121202201635Z<br> =3Bdn: olcDatabase=3D{1}h=
db=2Ccn=3Dconfig<br> =3BobjectClass: olcDatabaseConfig<br> =3Bobjec=
tClass: olcHdbConfig<br> =3BolcDatabase: {1}hdb<br> =3BolcDbDirecto=
ry: /var/lib/ldap<br> =3BolcSuffix: dc=3Dexample=2Cdc=3Dnet<br> =3B=
olcLastMod: TRUE<br> =3BolcRootDN: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet=
<br> =3BolcRootPW:: e1NTSEF9cGhKNWtqME9rOGJnVXp0dy9hYzZEaWFmU1U1Z0FTZk0=
=3D<br> =3BolcDbCheckpoint: 512 30<br> =3BolcDbConfig: {0}set_cache=
size 0 2097152 0<br> =3BolcDbConfig: {1}set_lk_max_objects 1500<br>&nbs=
p=3BolcDbConfig: {2}set_lk_max_locks 1500<br> =3BolcDbConfig: {3}set_lk=
_max_lockers 1500<br> =3BolcDbIndex: objectClass eq<br> =3BolcDbInd=
ex: uid eq<br> =3BolcDbIndex: cn eq<br> =3BolcDbIndex: ou eq<br>&nb=
sp=3BolcDbIndex: dc eq<br> =3BolcDbIndex: uidNumber eq<br> =3BolcDb=
Index: gidNumber eq<br> =3BolcDbIndex: memberUid eq<br> =3BolcDbInd=
ex: uniqueMember eq<br> =3BolcDbIndex: entryUUID eq<br> =3BolcDbInd=
ex: entryCSN eq<br> =3BolcDbIndex: krbPrincipalName eq=2Cpres=2Csub<br>=
 =3BolcDbIndex: krbPwdPolicyReference eq<br> =3BstructuralObjectCla=
ss: olcHdbConfig<br> =3BentryUUID: ea6fa3ce-d108-1031-9137-8fbb37ee6dd9=
<br> =3BcreatorsName: cn=3Dconfig<br> =3BcreateTimestamp: 201212022=
01635Z<br> =3BolcAccess: {0}to attrs=3DuserPassword=2CshadowLastChange =
by group.exact=3D"cn=3Dreplic<br> =3B ators=2Cou=3Dgroups=2Cdc=3Dexampl=
e=2Cdc=3Dnet" read by self write by anonymous auth<br> =3BolcAccess: {1=
}to attrs=3DauthzTo=2CauthzFrom=2Ccn=2CuidNumber=2CgidNumber=2Cuid by users=
r<br> =3B ead by anonymous none<br> =3BolcAccess: {2}to attrs=3Dkr=
bLastSuccessfulAuth=2CkrbExtraData=2CkrbLastFailedAuth=2Ckr<br> =3B bLo=
ginFailedCount by group.exact=3D"cn=3Dreplicators=2Cou=3Dgroups=2Cdc=3Dexam=
ple=2Cdc=3Dnet"<br> =3B =3B read by dn=3D"cn=3Dkdc-srv=2Cou=3Dkerbe=
ros=2Cdc=3Dexample=2Cdc=3Dnet" write by dn=3D"cn=3Dadm-sr<br> =3B v=2Co=
u=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet" write by self read by * none<br>&nb=
sp=3BolcAccess: {3}to dn.subtree=3D"ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet=
" by group.exact=3D"cn<br> =3B =3Dreplicators=2Cou=3Dgroups=2Cdc=3Dexam=
ple=2Cdc=3Dnet" read by dn=3D"cn=3Dkdc-srv=2Cou=3Dkerberos=2C<br> =3B d=
c=3Dexample=2Cdc=3Dnet" read by dn=3D"cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3De=
xample=2Cdc=3Dnet" writ<br> =3B e by * none<br> =3BolcAccess: {4}to=
dn.base=3D"" by * read<br> =3BolcAccess: {5}to * by dn=3D"cn=3Dadm-srv=
=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet" write by s<br> =3B elf writ=
e by users read<br> =3BentryCSN: 20121203054749.804561Z#000000#000#0000=
00<br> =3BmodifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2C=
cn=3Dexternal=2Ccn=3Dauth<br> =3BmodifyTimestamp: 20121203054749Z<br>&n=
bsp=3Bdn: olcOverlay=3D{0}syncprov=2ColcDatabase=3D{1}hdb=2Ccn=3Dconfig<br>=
 =3BobjectClass: olcOverlayConfig<br> =3BobjectClass: olcSyncProvCo=
nfig<br> =3BolcOverlay: {0}syncprov<br> =3BolcSpCheckpoint: 100 10<=
br> =3BolcSpSessionlog: 100<br> =3BstructuralObjectClass: olcSyncPr=
ovConfig<br> =3BentryUUID: b77dc36a-d158-1031-9917-2f12ddec6588<br>&nbs=
p=3BcreatorsName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dextern=
al=2Ccn=3Dauth<br> =3BcreateTimestamp: 20121203054749Z<br> =3Bentry=
CSN: 20121203054749.962179Z#000000#000#000000<br> =3BmodifiersName: gid=
Number=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=2Ccn=3Dauth<br>&nb=
sp=3BmodifyTimestamp: 20121203054749Z<BR> =3Bvvvvvvvvvvvvvvvvvvvvvvvvvv=
vvvvvvvv =3B dc=3Dexample=2Cdc=3Dnet =3B vvvvvvvvvvvvvvvvvvvvvvvvvv=
vvvvvvvvvvvvvvvvvvvvv<br> =3Bdn: dc=3Dexample=2Cdc=3Dnet<br> =3Bobj=
ectClass: top<br> =3BobjectClass: dcObject<br> =3BobjectClass: orga=
nization<br> =3Bo: example.net<br> =3Bdc: example<br> =3Bstruct=
uralObjectClass: organization<br> =3BentryUUID: eac01854-d108-1031-95b6=
-31806daa9e45<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet=
<br> =3BcreateTimestamp: 20121202201636Z<br> =3BentryCSN: 201212022=
01636.222029Z#000000#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=
=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121202201636Z<br> =
=3BcontextCSN: 20121204035116.890381Z#000000#000#000000<br> =3Bdn: cn=
=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BobjectClass: simpleSecurityOb=
ject<br> =3BobjectClass: organizationalRole<br> =3Bcn: admin<br>&nb=
sp=3Bdescription: LDAP administrator<br> =3BuserPassword:: <=3Bsecret=
>=3B<br> =3BstructuralObjectClass: organizationalRole<br> =3Bentr=
yUUID: eac2e160-d108-1031-95b7-31806daa9e45<br> =3BcreatorsName: cn=3Da=
dmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121202201636Z<=
br> =3BentryCSN: 20121202201636.240572Z#000000#000#000000<br> =3Bmo=
difiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestam=
p: 20121202201636Z<br> =3Bdn: ou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br>=
 =3BobjectClass: organizationalUnit<br> =3Bou: people<br> =3Bde=
scription: user account objects<br> =3BstructuralObjectClass: organizat=
ionalUnit<br> =3BentryUUID: 1cee4810-d12b-1031-9787-4f8d9abcea93<br>&nb=
sp=3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTi=
mestamp: 20121203002123Z<br> =3BentryCSN: 20121203002123.299880Z#000000=
#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<=
br> =3BmodifyTimestamp: 20121203002123Z<br> =3Bdn: ou=3Dgroups=2Cdc=
=3Dexample=2Cdc=3Dnet<br> =3BobjectClass: organizationalUnit<br> =
=3Bou: groups<br> =3Bdescription: group objects<br> =3BstructuralOb=
jectClass: organizationalUnit<br> =3BentryUUID: 1cfcb788-d12b-1031-9788=
-4f8d9abcea93<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet=
<br> =3BcreateTimestamp: 20121203002123Z<br> =3BentryCSN: 201212030=
02123.394485Z#000000#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=
=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121203002123Z<br> =
=3Bdn: ou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BobjectClass: organiz=
ationalUnit<br> =3Bou: hosts<br> =3Bdescription: host/computer obje=
cts<br> =3BstructuralObjectClass: organizationalUnit<br> =3BentryUU=
ID: 1cfdb37c-d12b-1031-9789-4f8d9abcea93<br> =3BcreatorsName: cn=3Dadmi=
n=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203002123Z<br>=
 =3BentryCSN: 20121203002123.400935Z#000000#000#000000<br> =3Bmodif=
iersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: =
20121203002123Z<br> =3Bdn: ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br>&=
nbsp=3BobjectClass: organizationalUnit<br> =3Bou: kerberos<br> =3Bd=
escription: kerberos realm container<br> =3BstructuralObjectClass: orga=
nizationalUnit<br> =3BentryUUID: 1cfef412-d12b-1031-978a-4f8d9abcea93<b=
r> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bcre=
ateTimestamp: 20121203002123Z<br> =3BentryCSN: 20121203002123.409140Z#0=
00000#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=
=3Dnet<br> =3BmodifyTimestamp: 20121203002123Z<br> =3Bdn: cn=3Drepl=
ica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bcn: replica<br> =
=3BobjectClass: simpleSecurityObject<br> =3BobjectClass: organizational=
Role<br> =3BobjectClass: krbPrincipalAux<br> =3BobjectClass: krbTic=
ketPolicyAux<br> =3BauthzTo: dn:*<br> =3Bdescription: LDAP server=
=2C replica<br> =3BstructuralObjectClass: organizationalRole<br> =
=3BentryUUID: 1d02dae6-d12b-1031-978b-4f8d9abcea93<br> =3BcreatorsName:=
cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 201212030=
02123Z<br> =3BkrbPrincipalName: <a href=3D"mailto:host/replica.example.=
net@EXAMPLE.NET">host/replica.example.net@EXAMPLE.NET</a><br> =3BkrbLog=
inFailedCount: 0<br> =3BkrbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDA=
gEBpIIBLDCCASgwVKAHMAWgAwIBAKFJ<br> =3B MEegAwIBEqFABD4gADgZgDa20URzdHW=
Q1WObQespjD5JMlRSb3fbZN8fG+gFml3DZQzinhbRURAxZ<br> =3B oJVqBI/zPGh/FDf9=
m+5bDBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAz54uBWIC4AFa66jXa6Mn3k<br> =3B f=
62uOX1YE6N3JlXl1EG2abEzZw1xWglReNN68wTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAKu6lb=
/<br> =3B QQQHgCnrL6XaSAYoh3A5GHF0xa2/vTWwq+lX4zmCpbY2l2up3TBVKZrhlenNS=
kxswPKAHMAWgAwIB<br> =3B AKExMC+gAwIBAaEoBCYIAGjfhZNlm0+a6MGvBgok7WxzB6=
38xMCex7sQ1zfzZkLiViiKpw=3D=3D<br> =3BkrbPasswordExpiration: 1970010100=
0000Z<br> =3BkrbLastPwdChange: 20121203065600Z<br> =3BkrbExtraData:=
: AAIATbxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D<br> =3BkrbExtraData:: =
AAgBAA=3D=3D<br> =3BuserPassword:: <=3Bsecret>=3B<br> =3BentryC=
SN: 20121203233422.105322Z#000000#000#000000<br> =3BmodifiersName: cn=
=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 201212032334=
22Z<br> =3Bdn: cn=3Dmaster=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet<br>&n=
bsp=3Bcn: master<br> =3BobjectClass: simpleSecurityObject<br> =3Bob=
jectClass: organizationalRole<br> =3BobjectClass: krbPrincipalAux<br>&n=
bsp=3BobjectClass: krbTicketPolicyAux<br> =3BauthzTo: dn:*<br> =3Bd=
escription: LDAP server=2C replica<br> =3BuserPassword:: e0NSWVBUfSo=3D=
<br> =3BstructuralObjectClass: organizationalRole<br> =3BentryUUID:=
1d0514dc-d12b-1031-978c-4f8d9abcea93<br> =3BcreatorsName: cn=3Dadmin=
=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203002123Z<br>&=
nbsp=3BkrbPrincipalName: <a href=3D"mailto:host/master.example.net@EXAMPLE.=
NET">host/master.example.net@EXAMPLE.NET</a><br> =3BkrbLoginFailedCount=
: 0<br> =3BkrbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCAS=
gwVKAHMAWgAwIBAKFJ<br> =3B MEegAwIBEqFABD4gACzEUo41sdOc4i+gbyFE/lai6sMd=
eygNYlf/SiWtzll+A7x/QBVoz7zFW+aWr<br> =3B 8/FMEBj49p4Bn0Goa371TBEoAcwBa=
ADAgEAoTkwN6ADAgEXoTAELhAAGW4+8wBum86XgWwWj5522A<br> =3B i/CCoCVDIVBZHO=
I48rJZHrgu59tvH0fH7TDkcwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAH15xNZ<br> =3B=
VJSjkEKx2M7Ai17Og8lMWwXAsDB2h+LsGC+HsSWdbE0P4yCNkjMOdIwnwJJ3OA48wPKAHMAWgA=
wIB<br> =3B AKExMC+gAwIBAaEoBCYIAGuLUyYlXYKdpNk9KEe7TuHulCL0Fzr4N8WXAv3=
DaIILvcKv0w=3D=3D<br> =3BkrbPasswordExpiration: 19700101000000Z<br>&nbs=
p=3BkrbLastPwdChange: 20121203060855Z<br> =3BkrbExtraData:: AAL3QbxQYWR=
taW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D<br> =3BkrbExtraData:: AAgBAA=3D=3D<=
br> =3BentryCSN: 20121203060855.932134Z#000000#000#000000<br> =3Bmo=
difiersName: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br>&nbs=
p=3BmodifyTimestamp: 20121203060855Z<br> =3Bdn: cn=3Dadministrator=2Cou=
=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BobjectClass: posixGroup<br>&=
nbsp=3Bcn: administrator<br> =3BgidNumber: 50000<br> =3BstructuralO=
bjectClass: posixGroup<br> =3BentryUUID: 1d079216-d12b-1031-978d-4f8d9a=
bcea93<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br>&nb=
sp=3BcreateTimestamp: 20121203002123Z<br> =3BentryCSN: 20121203002123.4=
65616Z#000000#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexampl=
e=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121203002123Z<br> =3Bdn: cn=
=3Dreplicators=2Cou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BobjectCla=
ss: top<br> =3BobjectClass: groupOfNames<br> =3Bcn: replicators<br>=
 =3Bmember: cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet<br>&nbs=
p=3Bmember: cn=3Dmaster=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bs=
tructuralObjectClass: groupOfNames<br> =3BentryUUID: 1d096db6-d12b-1031=
-978e-4f8d9abcea93<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=
=3Dnet<br> =3BcreateTimestamp: 20121203002123Z<br> =3BentryCSN: 201=
21203002123.477792Z#000000#000#000000<br> =3BmodifiersName: cn=3Dadmin=
=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121203002123Z<br>&=
nbsp=3Bdn: uid=3Dadministrator=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br>&=
nbsp=3BobjectClass: top<br> =3BobjectClass: inetOrgPerson<br> =3Bob=
jectClass: posixAccount<br> =3BobjectClass: shadowAccount<br> =3Bob=
jectClass: krbPrincipalAux<br> =3BobjectClass: krbTicketPolicyAux<br>&n=
bsp=3Bcn: administrator<br> =3Bsn: administrator<br> =3BuidNumber: =
50000<br> =3BgidNumber: 50000<br> =3BuserPassword:: <=3Bsecret>=
=3B<br> =3BhomeDirectory: /home/administrator<br> =3BstructuralObje=
ctClass: inetOrgPerson<br> =3Buid: administrator<br> =3BentryUUID: =
1d0a9bf0-d12b-1031-978f-4f8d9abcea93<br> =3BcreatorsName: cn=3Dadmin=2C=
dc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203002123Z<br>&nbs=
p=3BkrbPrincipalName: <a href=3D"mailto:administrator@EXAMPLE.NET">administ=
rator@EXAMPLE.NET</a><br> =3BkrbPrincipalKey:: MIICa6ADAgEBoQMCAQGiAwIB=
AaMDAgEBpIICUzCCAk8wVKAHMAWgAwIBAKFJ<br> =3B MEegAwIBEqFABD4gALWKtjcuVI=
PL0PLDhUQleHDwIp4PB4O0T3ays8putrnZEUxVC+EcqcdxailuD<br> =3B o3oHvU0K11Y=
iAyckIKjfzBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAQRTIM4QI0IPjmA1xg/Ot7l<br> =
=3B cXQSCNuv7MRgBJl7N1QsxS7naYbgLlyybkbXkwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYA=
DmOzq8<br> =3B 96TliwJM9J3X0Dxb/Y+bcTz3e4/FarTIvzEMrMneaW57VGLWX1y162/L=
Nz2jwAqIwPKAHMAWgAwIB<br> =3B AKExMC+gAwIBAaEoBCYIAMBGuqUqQw8nhnQ194wQI=
Cvc+Iu0yPUdSTzjGXtDhPSaAHj70DA8oAcwB<br> =3B aADAgEBoTEwL6ADAgEDoSgEJgg=
A0mkFMVjyT2Jn553z2fZNIOQ8fYR2jtUcGFbyUL4s4HaK+6yoME<br> =3B 2gGDAWoAMCA=
QKhDwQNYWRtaW5pc3RyYXRvcqExMC+gAwIBA6EoBCYIAHKR4PzhneCY8c8tLpo8yyO<br> =
=3B mpk8FynWjl7rVe+Zqq9gIt4KXTTBLoBYwFKADAgEDoQ0EC0VYQU1QTEUuTkVUoTEwL6ADAg=
EDoSgE<br> =3B JggA4e6VizsvWUEKEqAt58PrPViScqavK7u2VuYDpNNuVwTv3zGmMEug=
FjAUoAMCAQWhDQQLRVhBT<br> =3B VBMRS5ORVShMTAvoAMCAQOhKAQmCACA4sM1SoUcEE=
YGOMA8CDwINmmJXgnKPQr8jRDsxGToXGa5U+<br> =3B g=3D<br> =3BkrbLastPwd=
Change: 20121203054848Z<br> =3BkrbLastFailedAuth: 20121204013714Z<br>&n=
bsp=3BkrbLoginFailedCount: 0<br> =3Bdescription: Network Administrator<=
br> =3BkrbLastSuccessfulAuth: 20121204035116Z<br> =3BkrbExtraData::=
AAJAPbxQcm9vdC9hZG1pbkBFWEFNUExFLk5FVAA=3D<br> =3BkrbExtraData:: AAgBA=
A=3D=3D<br> =3BentryCSN: 20121204035116.890381Z#000000#000#000000<br>&n=
bsp=3BmodifiersName: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet=
<br> =3BmodifyTimestamp: 20121204035116Z<br> =3Bdn: cn=3Dkdc-srv=2C=
ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BobjectClass: simpleSecur=
ityObject<br> =3BobjectClass: organizationalRole<br> =3Bcn: kdc-srv=
<br> =3Bdescription: Kerberos KDC<br> =3BuserPassword:: <=3Bsecre=
t>=3B<br> =3BstructuralObjectClass: organizationalRole<br> =3Bent=
ryUUID: 1d168924-d12b-1031-9790-4f8d9abcea93<br> =3BcreatorsName: cn=3D=
admin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203002123Z=
<br> =3BentryCSN: 20121203002123.563692Z#000000#000#000000<br> =3Bm=
odifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimesta=
mp: 20121203002123Z<br> =3Bdn: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexam=
ple=2Cdc=3Dnet<br> =3BobjectClass: simpleSecurityObject<br> =3Bobje=
ctClass: organizationalRole<br> =3Bcn: adm-srv<br> =3Bdescription: =
Kerberos Admin Server<br> =3BuserPassword:: <=3Bsecret>=3B<br> =
=3BstructuralObjectClass: organizationalRole<br> =3BentryUUID: 1d18610e=
-d12b-1031-9791-4f8d9abcea93<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexa=
mple=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203002123Z<br> =3Bentr=
yCSN: 20121203002123.575773Z#000000#000#000000<br> =3BmodifiersName: cn=
=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 201212030021=
23Z<br> =3Bdn: cn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dn=
et<br> =3Bcn: EXAMPLE.NET<br> =3BobjectClass: top<br> =3Bobject=
Class: krbRealmContainer<br> =3BobjectClass: krbTicketPolicyAux<br>&nbs=
p=3BkrbSubTrees: dc=3Dexample=2Cdc=3Dnet<br> =3BkrbSearchScope: 2<br>&n=
bsp=3BkrbMaxRenewableAge: 604800<br> =3BkrbMaxTicketLife: 36000<br>&nbs=
p=3BstructuralObjectClass: krbRealmContainer<br> =3BentryUUID: c03d58b8=
-d134-1031-83e7-0707760cf534<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexa=
mple=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203013022Z<br> =3Bentr=
yCSN: 20121203013022.757228Z#000000#000#000000<br> =3BmodifiersName: cn=
=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 201212030130=
22Z<br> =3Bdn: <a href=3D"mailto:krbPrincipalName=3DK/M@EXAMPLE.NET=2Cc=
n=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet">krbPrincipalName=
=3DK/M@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=
=3Dnet</a><br> =3BkrbLoginFailedCount: 0<br> =3BkrbMaxTicketLife: 3=
6000<br> =3BkrbMaxRenewableAge: 604800<br> =3BkrbTicketFlags: 192<b=
r> =3BkrbPrincipalName: <a href=3D"mailto:K/M@EXAMPLE.NET">K/M@EXAMPLE.=
NET</a><br> =3BkrbPrincipalExpiration: 19700101000000Z<br> =3BkrbPr=
incipalKey:: MGagAwIBAaEDAgEBogMCAQGjAwIBAKRQME4wTKAHMAWgAwIBAKFBMD+gAwIB<b=
r> =3B EKE4BDYYALvAYATOnUQCrTUO54HKuJKnttvmnxYyud5Fh6T22oTH0qAUzKRfDdxT=
uO7OIrbK/c4Ks<br> =3B HI=3D<br> =3BkrbLastPwdChange: 19700101000000=
Z<br> =3BkrbExtraData:: AAkBAAEArgC8UA=3D=3D<br> =3BkrbExtraData:: =
AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA<br> =3BkrbExtraData:: AAcBAAIA=
AgAAAAAAAAA=3D<br> =3BobjectClass: krbPrincipal<br> =3BobjectClass:=
krbPrincipalAux<br> =3BobjectClass: krbTicketPolicyAux<br> =3Bstru=
cturalObjectClass: krbPrincipal<br> =3BentryUUID: c04d9282-d134-1031-83=
e8-0707760cf534<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dn=
et<br> =3BcreateTimestamp: 20121203013022Z<br> =3BentryCSN: 2012120=
3013022.863568Z#000000#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=
=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121203013022Z<br> =
=3Bdn: <a href=3D"mailto:krbPrincipalName=3Dkrbtgt/EXAMPLE.NET@EXAMPLE.NET=
=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet">krbPrincipal=
Name=3Dkrbtgt/EXAMPLE.NET@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2C=
dc=3Dexample=2Cdc=3Dnet</a><br> =3BkrbLoginFailedCount: 0<br> =3Bkr=
bMaxTicketLife: 36000<br> =3BkrbMaxRenewableAge: 604800<br> =3BkrbT=
icketFlags: 0<br> =3BkrbPrincipalName: <a href=3D"mailto:krbtgt/EXAMPLE=
.NET@EXAMPLE.NET">krbtgt/EXAMPLE.NET@EXAMPLE.NET</a><br> =3BkrbPrincipa=
lExpiration: 19700101000000Z<br> =3BkrbPrincipalKey:: MIIBgqADAgEBoQMCA=
QGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIBAKFJ<br> =3B MEegAwIBEqFABD4gAOy=
PPy2RLdudifS8baeUvv3AxlGKKubyeRUcnwFc2CqS9kNvgpTNujaNnfmRR<br> =3B GQI5=
lTHUdwGYqHfr+ayuTBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAe8n+vM9TXvNAG43Va7UKy1<b=
r> =3B 93EQx3jtSTiD0aa2tNK9FbkomkYG0mWlz/xW4wTKAHMAWgAwIBAKFBMD+gAwIBEK=
E4BDYYAM9KwFT<br> =3B B9MqvfMfba37K7zY6lqPhLpF8d0uucRA/Ewed1i9wfjiOuxQV=
R0PWLB2OM5q1llQwPKAHMAWgAwIB<br> =3B AKExMC+gAwIBAaEoBCYIAFObLZrmdRD8NE=
ctxP0TySKwmGNnKiX7m+EMMvNj4xmNIa2yTTA8oAcwB<br> =3B aADAgEAoTEwL6ADAgED=
oSgEJggAXVm59rkWXluDnx/F0XOEDh4i3Nz9HckLfrcVL5goKRVOV8oR<br> =3BkrbLast=
PwdChange: 19700101000000Z<br> =3BkrbExtraData:: AAKuALxQZGJfY3JlYXRpb2=
5ARVhBTVBMRS5ORVQA<br> =3BkrbExtraData:: AAcBAAIAAgAAAAAAAAA=3D<br>&nbs=
p=3BobjectClass: krbPrincipal<br> =3BobjectClass: krbPrincipalAux<br>&n=
bsp=3BobjectClass: krbTicketPolicyAux<br> =3BstructuralObjectClass: krb=
Principal<br> =3BentryUUID: c0518180-d134-1031-83e9-0707760cf534<br>&nb=
sp=3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTi=
mestamp: 20121203013022Z<br> =3BentryCSN: 20121203013022.889347Z#000000=
#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<=
br> =3BmodifyTimestamp: 20121203013022Z<br> =3Bdn: <a href=3D"mailt=
o:krbPrincipalName=3Dkadmin/admin@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dker=
beros=2Cdc=3Dexample=2Cdc=3Dnet">krbPrincipalName=3Dkadmin/admin@EXAMPLE.NE=
T=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet</a><br> =
=3BkrbLoginFailedCount: 0<br> =3BkrbMaxTicketLife: 10800<br> =3Bkrb=
MaxRenewableAge: 604800<br> =3BkrbTicketFlags: 4<br> =3BkrbPrincipa=
lName: <a href=3D"mailto:kadmin/admin@EXAMPLE.NET">kadmin/admin@EXAMPLE.NET=
</a><br> =3BkrbPrincipalExpiration: 19700101000000Z<br> =3BkrbPrinc=
ipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIBAKFJ<br>&=
nbsp=3B MEegAwIBEqFABD4gAMjLoWHTDPL9j+ribbAohbY8+SM973mU5iIvxN7MItjbLtXBh/7=
CF2xtCkdsY<br> =3B 5WwobkGKFvGkZvTL+olZjBEoAcwBaADAgEAoTkwN6ADAgEXoTAEL=
hAAwMe5Vpq5Hd2Zy1E8M28Ix6<br> =3B SbAtMeUjzpEqwQM3P838foPwM9ZfRYhfZ0UfA=
wTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAGZM5wu<br> =3B tIcsdKbsYTDZgUzqIADtNt=
4GYjBIJx13JO40Bto78eCybAvE4uqFivBmdH1kEy8cwPKAHMAWgAwIB<br> =3B AKExMC+=
gAwIBAaEoBCYIAHrJty4X1D5dPY/PW84Lgb0YYuazteCJMYvphJZr3LeKs7suBzA8oAcwB<br>&=
nbsp=3B aADAgEAoTEwL6ADAgEDoSgEJggAMDfJDyzgWa4vsKv6rs9IkXOq8eEePAQPB9s0UPbM=
+9bG3aQz<br> =3BkrbLastPwdChange: 19700101000000Z<br> =3BkrbExtraDa=
ta:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA<br> =3BkrbExtraData:: AAc=
BAAIAAgAAAGlvbkA=3D<br> =3BobjectClass: krbPrincipal<br> =3BobjectC=
lass: krbPrincipalAux<br> =3BobjectClass: krbTicketPolicyAux<br> =
=3BstructuralObjectClass: krbPrincipal<br> =3BentryUUID: c05346be-d134-=
1031-83ea-0707760cf534<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=
=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203013022Z<br> =3BentryCSN=
: 20121203013022.900950Z#000000#000#000000<br> =3BmodifiersName: cn=3Da=
dmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121203013022Z<=
br> =3Bdn: <a href=3D"mailto:krbPrincipalName=3Dkadmin/changepw@EXAMPLE=
.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet">krbPrinc=
ipalName=3Dkadmin/changepw@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=
=2Cdc=3Dexample=2Cdc=3Dnet</a><br> =3BkrbLoginFailedCount: 0<br> =
=3BkrbMaxTicketLife: 300<br> =3BkrbMaxRenewableAge: 604800<br> =3Bk=
rbTicketFlags: 8196<br> =3BkrbPrincipalName: <a href=3D"mailto:kadmin/c=
hangepw@EXAMPLE.NET">kadmin/changepw@EXAMPLE.NET</a><br> =3BkrbPrincipa=
lExpiration: 19700101000000Z<br> =3BkrbPrincipalKey:: MIIBgqADAgEBoQMCA=
QGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIBAKFJ<br> =3B MEegAwIBEqFABD4gAHN=
xSgJ9GwIH0UmFf5Ol8WWQ/2Wy6nQqmf+yX4dVzEQFsmaBp9l1hsceWqIB2<br> =3B ic80=
wlAJW9Do0gSOaiYfjBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAt+ZrWZKAjKkUhSJt0wwSqU<b=
r> =3B ootXhNduXIRVjUJxWVtXdPTI7RcL/yjZK2M0MwTKAHMAWgAwIBAKFBMD+gAwIBEK=
E4BDYYACd423Z<br> =3B epUHmGMVf2I5sRQZRuoypVddoREy1pTtTMIiGvqai7Z+PRHbp=
L0kTawz9zdg60IgwPKAHMAWgAwIB<br> =3B AKExMC+gAwIBAaEoBCYIAGGbQu5FJ0ewAs=
CALf9yDbvOIa7Abx0PmnGw+PSKWOt8Dsur9TA8oAcwB<br> =3B aADAgEAoTEwL6ADAgED=
oSgEJggAjG9iwd398xO7bFH+bAQDGv0Hh6Qr+QIpNAUB/w7dmvqU9zPl<br> =3BkrbLast=
PwdChange: 19700101000000Z<br> =3BkrbExtraData:: AAKuALxQZGJfY3JlYXRpb2=
5ARVhBTVBMRS5ORVQA<br> =3BkrbExtraData:: AAcBAAIAAgAAAGlvbkA=3D<br>&nbs=
p=3BobjectClass: krbPrincipal<br> =3BobjectClass: krbPrincipalAux<br>&n=
bsp=3BobjectClass: krbTicketPolicyAux<br> =3BstructuralObjectClass: krb=
Principal<br> =3BentryUUID: c054d88a-d134-1031-83eb-0707760cf534<br>&nb=
sp=3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTi=
mestamp: 20121203013022Z<br> =3BentryCSN: 20121203013022.911237Z#000000=
#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<=
br> =3BmodifyTimestamp: 20121203013022Z<br> =3Bdn: <a href=3D"mailt=
o:krbPrincipalName=3Dkadmin/history@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dk=
erberos=2Cdc=3Dexample=2Cdc=3Dnet">krbPrincipalName=3Dkadmin/history@EXAMPL=
E.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet</a><br>&=
nbsp=3BkrbLoginFailedCount: 0<br> =3BkrbMaxTicketLife: 36000<br> =
=3BkrbMaxRenewableAge: 604800<br> =3BkrbTicketFlags: 0<br> =3BkrbPr=
incipalName: <a href=3D"mailto:kadmin/history@EXAMPLE.NET">kadmin/history@E=
XAMPLE.NET</a><br> =3BkrbPrincipalExpiration: 19700101000000Z<br> =
=3BkrbPrincipalKey:: MGagAwIBAaEDAgEBogMCAQGjAwIBAKRQME4wTKAHMAWgAwIBAKFBMD=
+gAwIB<br> =3B EKE4BDYYAOhayj3RDyyg78DGPFKNATBnpKKbf2qwLJbJ0nPXoUdjtbHp=
jECIfASUXjBoB+Pkd/N+Z<br> =3B 2g=3D<br> =3BkrbLastPwdChange: 197001=
01000000Z<br> =3BkrbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQ=
A<br> =3BkrbExtraData:: AAcBAAIAAgAAAGlvbkA=3D<br> =3BobjectClass: =
krbPrincipal<br> =3BobjectClass: krbPrincipalAux<br> =3BobjectClass=
: krbTicketPolicyAux<br> =3BstructuralObjectClass: krbPrincipal<br>&nbs=
p=3BentryUUID: c0562d3e-d134-1031-83ec-0707760cf534<br> =3BcreatorsName=
: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203=
013022Z<br> =3BentryCSN: 20121203013022.919957Z#000000#000#000000<br>&n=
bsp=3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bmodify=
Timestamp: 20121203013022Z<br> =3Bdn: <a href=3D"mailto:krbPrincipalNam=
e=3Dkadmin/master.example.net@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerbero=
s=2Cdc=3Dexample=2Cdc=3Dnet">krbPrincipalName=3Dkadmin/master.example.net@E=
XAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet</a>=
<br> =3BkrbLoginFailedCount: 0<br> =3BkrbMaxTicketLife: 10800<br>&n=
bsp=3BkrbMaxRenewableAge: 604800<br> =3BkrbTicketFlags: 4<br> =3Bkr=
bPrincipalName: <a href=3D"mailto:kadmin/master.example.net@EXAMPLE.NET">ka=
dmin/master.example.net@EXAMPLE.NET</a><br> =3BkrbPrincipalExpiration: =
19700101000000Z<br> =3BkrbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAg=
EApIIBajCCAWYwVKAHMAWgAwIBAKFJ<br> =3B MEegAwIBEqFABD4gABhOeGOuo9UBDjK7=
hTQ3Xfs8vsWB+Afl0JkPaSt3T3tRkZbWxAhTxXl+4Ta3z<br> =3B Y4ZaEYItXr2awBW6Q=
XSZzBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAUUoLikQRp1c+vGFRtGg1qY<br> =3B oe=
v8m55VO73g+xEqcx02MJa1x+esm5y9VTMLswTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYACj0sgn=
<br> =3B ZOyWATgpst3N3pSom4smhxBWYgpTMghwaS5gFeKMZhccDSI8Ahm4nQPFmq3Jrf=
4UwPKAHMAWgAwIB<br> =3B AKExMC+gAwIBAaEoBCYIAL0gPnqCvdlb4//Xw5iE8Jvj2qY=
DwpK0Hycj+cwyCjFsVKTsjzA8oAcwB<br> =3B aADAgEAoTEwL6ADAgEDoSgEJggAxTSME=
h/7bfV2AYx4VoP8cIeunsqtrcvNIItmDxSqZ0ecZABm<br> =3BkrbLastPwdChange: 19=
700101000000Z<br> =3BkrbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5=
ORVQA<br> =3BkrbExtraData:: AAcBAAIAAgAAANAD4gA=3D<br> =3BobjectCla=
ss: krbPrincipal<br> =3BobjectClass: krbPrincipalAux<br> =3BobjectC=
lass: krbTicketPolicyAux<br> =3BstructuralObjectClass: krbPrincipal<br>=
 =3BentryUUID: c0581144-d134-1031-83ed-0707760cf534<br> =3Bcreators=
Name: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 2012=
1203013022Z<br> =3BentryCSN: 20121203013022.932349Z#000000#000#000000<b=
r> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bmo=
difyTimestamp: 20121203013022Z<br> =3Bdn: <a href=3D"mailto:krbPrincipa=
lName=3Dldap/master.example.net@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerbe=
ros=2Cdc=3Dexample=2Cdc=3Dnet">krbPrincipalName=3Dldap/master.example.net@E=
XAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet</a>=
<br> =3BkrbPrincipalName: <a href=3D"mailto:ldap/master.example.net@EXA=
MPLE.NET">ldap/master.example.net@EXAMPLE.NET</a><br> =3BobjectClass: k=
rbPrincipal<br> =3BobjectClass: krbPrincipalAux<br> =3BobjectClass:=
krbTicketPolicyAux<br> =3BstructuralObjectClass: krbPrincipal<br> =
=3BentryUUID: 91a6199c-d15a-1031-9919-2f12ddec6588<br> =3BcreatorsName:=
cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTi=
mestamp: 20121203060105Z<br> =3BkrbLoginFailedCount: 0<br> =3BkrbPr=
incipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIBAKFJ<b=
r> =3B MEegAwIBEqFABD4gAA6GzVEXOsoNQbzbqFy0KZqXt04aRDje4Gxq4ZS4b/z+l6pK=
gmUyVdsPUS2wz<br> =3B qeKY56slAvVlnRCQt+uZTBEoAcwBaADAgEAoTkwN6ADAgEXoT=
AELhAAkzwNhAF14TYWZyLZem5kvD<br> =3B yuLARt7Z3LLsduQ1j6s7P6EFMDNWPaHCJf=
09cwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAAbNr3p<br> =3B vkmNXkIZNgUtw2FJ3Vt=
GEU9MmDmNHCFKSk4kHCR9naWPkbMzRmWA7s/yGkwIWxCMwPKAHMAWgAwIB<br> =3B AKEx=
MC+gAwIBAaEoBCYIAPc+l15I9VR4tYjNfS6XRX09JRoioaavGokNvj0RJa1/h4j3hg=3D=3D<br=
> =3BkrbPasswordExpiration: 19700101000000Z<br> =3BkrbLastPwdChange=
: 20121203060153Z<br> =3BkrbLastSuccessfulAuth: 20121203061721Z<br>&nbs=
p=3BkrbExtraData:: AAJRQLxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D<br> =
=3BkrbExtraData:: AAgBAA=3D=3D<br> =3BentryCSN: 20121203061721.358939Z#=
000000#000#000000<br> =3BmodifiersName: cn=3Dkdc-srv=2Cou=3Dkerberos=2C=
dc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121203061721Z<br>&nbs=
p=3Bdn: <a href=3D"mailto:krbPrincipalName=3Dldap/replica.example.net@EXAMP=
LE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet">krbPri=
ncipalName=3Dldap/replica.example.net@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=
=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet</a><br> =3BkrbPrincipalName: <a h=
ref=3D"mailto:ldap/replica.example.net@EXAMPLE.NET">ldap/replica.example.ne=
t@EXAMPLE.NET</a><br> =3BobjectClass: krbPrincipal<br> =3BobjectCla=
ss: krbPrincipalAux<br> =3BobjectClass: krbTicketPolicyAux<br> =3Bs=
tructuralObjectClass: krbPrincipal<br> =3BentryUUID: 205686f2-d162-1031=
-9537-2fa18b539eb9<br> =3BcreatorsName: cn=3Dadm-srv=2Cou=3Dkerberos=2C=
dc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203065511Z<br>&nbs=
p=3BkrbLoginFailedCount: 0<br> =3BkrbPrincipalKey:: MIIBRKADAgEBoQMCAQG=
iAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIBAKFJ<br> =3B MEegAwIBEqFABD4gABVJB=
bD8SWzRxzA92ncPp+x/Trd3GJY/P6w+ErH3wddcUmq3o092v7mUXFMNw<br> =3B 2R8oC1=
rwLD2B/deCyuHDTBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAApsEJiySukR8L5M3DKbipUj<br>=
 =3B AITSVQQL2YSqY7xr/BY7Hm3huN/juvnC7u/ZQwTKAHMAWgAwIBAKFBMD+gAwIBEKE4=
BDYYAOvmT4x<br> =3B MDAmgH2qTgqXTSLwRcBvT7QMWYMH0oi7HW8DYC09HDAdD2/vqaB=
sgthQCj3BCDmkwPKAHMAWgAwIB<br> =3B AKExMC+gAwIBAaEoBCYIALQe5Qa57ZwsYK2m=
xhbNOhrO0Yn/OVLez1VQiEmrpj2/GvJLXA=3D=3D<br> =3BkrbPasswordExpiration: =
19700101000000Z<br> =3BkrbLastPwdChange: 20121203065628Z<br> =3Bkrb=
LastSuccessfulAuth: 20121204032538Z<br> =3BkrbExtraData:: AAIcTbxQYWRta=
W5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D<br> =3BkrbExtraData:: AAgBAA=3D=3D<br=
> =3BentryCSN: 20121204032538.048010Z#000000#000#000000<br> =3Bmodi=
fiersName: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =
=3BmodifyTimestamp: 20121204032538Z<br> =3B <br> =3B <br> =3B <=
br> =3Bvvvvvvvvvvvvvvvvvvvv replica config vvvvvvvvvvvvvvvvvvvvvvvvvvvv=
vvvvvvvv<br> =3B <br> =3Bdn: cn=3Dconfig<br> =3BobjectClass: ol=
cGlobal<br> =3Bcn: config<br> =3BolcArgsFile: /var/run/slapd/slapd.=
args<br> =3BolcPidFile: /var/run/slapd/slapd.pid<br> =3BolcToolThre=
ads: 1<br> =3BstructuralObjectClass: olcGlobal<br> =3BentryUUID: af=
9b0068-d108-1031-9417-cd3569532aaf<br> =3BcreatorsName: cn=3Dconfig<br>=
 =3BcreateTimestamp: 20121202201456Z<br> =3BolcTLSCACertificateFile=
: /etc/ssl/certs/cacert.pem<br> =3BolcTLSCertificateFile: /etc/ssl/cert=
s/replica_slapd_cert.pem<br> =3BolcTLSCertificateKeyFile: /etc/ldap/rep=
lica_slapd_key.pem<br> =3BolcLogLevel: stats<br> =3BolcAuthzRegexp:=
{0}uid=3Dldap/([^/\.]+).example.net=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=
=3Dauth cn=3D$1=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BolcAuthzR=
egexp: {1}uid=3D([^=2C]+)=2Ccn=3Dexample.net=2Ccn=3Dgssapi=2Ccn=3Dauth uid=
=3D$1=2Cou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BolcSaslHost: repli=
ca.example.net<br> =3BolcSaslRealm: EXAMPLE.NET<br> =3BentryCSN: 20=
121204023449.956406Z#000000#000#000000<br> =3BmodifiersName: gidNumber=
=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=2Ccn=3Dauth<br> =3Bm=
odifyTimestamp: 20121204023449Z<br> =3Bdn: cn=3Dmodule{0}=2Ccn=3Dconfig=
<br> =3BobjectClass: olcModuleList<br> =3Bcn: module{0}<br> =3B=
olcModulePath: /usr/lib/ldap<br> =3BolcModuleLoad: {0}back_hdb<br> =
=3BolcModuleLoad: {1}back_ldap<br> =3BstructuralObjectClass: olcModuleL=
ist<br> =3BentryUUID: af9d1e34-d108-1031-941f-cd3569532aaf<br> =3Bc=
reatorsName: cn=3Dconfig<br> =3BcreateTimestamp: 20121202201457Z<br>&nb=
sp=3BentryCSN: 20121204041212.292184Z#000000#000#000000<br> =3Bmodifier=
sName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=2Ccn=3Da=
uth<br> =3BmodifyTimestamp: 20121204041212Z<br> =3Bdn: cn=3Dschema=
=2Ccn=3Dconfig<br> =3BobjectClass: olcSchemaConfig<br> =3Bcn: schem=
a<br> =3BstructuralObjectClass: olcSchemaConfig<br> =3BentryUUID: a=
f9b564e-d108-1031-941a-cd3569532aaf<br> =3BcreatorsName: cn=3Dconfig<br=
> =3BcreateTimestamp: 20121202201456Z<br> =3BentryCSN: 201212022014=
56.995860Z#000000#000#000000<br> =3BmodifiersName: cn=3Dconfig<br> =
=3BmodifyTimestamp: 20121202201456Z<BR> =3B<=3B snip schemas >=3B<B=
R> =3Bdn: olcBackend=3D{0}hdb=2Ccn=3Dconfig<br> =3BobjectClass: olc=
BackendConfig<br> =3BolcBackend: {0}hdb<br> =3BstructuralObjectClas=
s: olcBackendConfig<br> =3BentryUUID: af9e498a-d108-1031-9420-cd3569532=
aaf<br> =3BcreatorsName: cn=3Dconfig<br> =3BcreateTimestamp: 201212=
02201457Z<br> =3BentryCSN: 20121202201457.015189Z#000000#000#000000<br>=
 =3BmodifiersName: cn=3Dconfig<br> =3BmodifyTimestamp: 201212022014=
57Z<br> =3Bdn: olcDatabase=3D{-1}frontend=2Ccn=3Dconfig<br> =3Bobje=
ctClass: olcDatabaseConfig<br> =3BobjectClass: olcFrontendConfig<br>&nb=
sp=3BolcDatabase: {-1}frontend<br> =3BolcAccess: {0}to * by dn.exact=3D=
gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal<br> =3B =2C=
cn=3Dauth manage by * break<br> =3BolcAccess: {1}to dn.exact=3D"" by * =
read<br> =3BolcAccess: {2}to dn.base=3D"cn=3DSubschema" by * read<br>&n=
bsp=3BolcSizeLimit: 500<br> =3BstructuralObjectClass: olcDatabaseConfig=
<br> =3BentryUUID: af9b211a-d108-1031-9418-cd3569532aaf<br> =3Bcrea=
torsName: cn=3Dconfig<br> =3BcreateTimestamp: 20121202201456Z<br> =
=3BentryCSN: 20121202201456.994497Z#000000#000#000000<br> =3BmodifiersN=
ame: cn=3Dconfig<br> =3BmodifyTimestamp: 20121202201456Z<br> =3Bdn:=
olcOverlay=3D{0}chain=2ColcDatabase=3D{-1}frontend=2Ccn=3Dconfig<br> =
=3BobjectClass: olcOverlayConfig<br> =3BobjectClass: olcChainConfig<br>=
 =3BolcOverlay: {0}chain<br> =3BolcChainReturnError: TRUE<br> =
=3BstructuralObjectClass: olcChainConfig<br> =3BentryUUID: 8605cc76-d21=
4-1031-93d2-613cc62fd42f<br> =3BcreatorsName: gidNumber=3D0+uidNumber=
=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=2Ccn=3Dauth<br> =3BcreateTimestamp=
: 20121204041212Z<br> =3BentryCSN: 20121204041212.352767Z#000000#000#00=
0000<br> =3BmodifiersName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=
=2Ccn=3Dexternal=2Ccn=3Dauth<br> =3BmodifyTimestamp: 20121204041212Z<br=
> =3Bdn: olcDatabase=3D{0}ldap=2ColcOverlay=3D{0}chain=2ColcDatabase=3D=
{-1}frontend=2Ccn=3Dconfig<br> =3BobjectClass: olcLDAPConfig<br> =
=3BobjectClass: olcChainDatabase<br> =3BolcDatabase: {0}ldap<br> =
=3BolcDbURI: "<a href=3D"ldap://master.example.net:389/">ldap://master.exam=
ple.net:389/</a>"<br> =3BolcDbIDAssertBind: bindmethod=3Dsimple binddn=
=3D"cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cdc<br> =3B =3Dnet" crede=
ntials=3D<=3Bsecret>=3B mode=3Dself flags=3Doverride starttls=3Dcritica=
l tls_req<br> =3B cert=3Ddemand tls_cacert=3D/etc/ssl/certs/cacert.pem<=
br> =3BolcDbRebindAsUser: TRUE<br> =3BstructuralObjectClass: olcLDA=
PConfig<br> =3BentryUUID: 8609b6f6-d214-1031-93d3-613cc62fd42f<br> =
=3BcreatorsName: gidNumber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexterna=
l=2Ccn=3Dauth<br> =3BcreateTimestamp: 20121204041212Z<br> =3BentryC=
SN: 20121204041212.378432Z#000000#000#000000<br> =3BmodifiersName: gidN=
umber=3D0+uidNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=2Ccn=3Dauth<br>&nbs=
p=3BmodifyTimestamp: 20121204041212Z<br> =3Bdn: olcDatabase=3D{0}config=
=2Ccn=3Dconfig<br> =3BobjectClass: olcDatabaseConfig<br> =3BolcData=
base: {0}config<br> =3BolcAccess: {0}to * by dn.exact=3DgidNumber=3D0+u=
idNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal<br> =3B =2Ccn=3Dauth manag=
e by * break<br> =3BstructuralObjectClass: olcDatabaseConfig<br> =
=3BentryUUID: af9b4528-d108-1031-9419-cd3569532aaf<br> =3BcreatorsName:=
cn=3Dconfig<br> =3BcreateTimestamp: 20121202201456Z<br> =3BentryCS=
N: 20121202201456.995421Z#000000#000#000000<br> =3BmodifiersName: cn=3D=
config<br> =3BmodifyTimestamp: 20121202201456Z<br> =3Bdn: olcDataba=
se=3D{1}hdb=2Ccn=3Dconfig<br> =3BobjectClass: olcDatabaseConfig<br>&nbs=
p=3BobjectClass: olcHdbConfig<br> =3BolcDatabase: {1}hdb<br> =3Bolc=
DbDirectory: /var/lib/ldap<br> =3BolcSuffix: dc=3Dexample=2Cdc=3Dnet<br=
> =3BolcLastMod: TRUE<br> =3BolcRootDN: cn=3Dadmin=2Cdc=3Dexample=
=2Cdc=3Dnet<br> =3BolcRootPW:: e1NTSEF9eW1nS3JTR0VkMW5LQ0VaQ0Y4UjJBTDlP=
TlEveENDbzY=3D<br> =3BolcDbCheckpoint: 512 30<br> =3BolcDbConfig: {=
0}set_cachesize 0 2097152 0<br> =3BolcDbConfig: {1}set_lk_max_objects 1=
500<br> =3BolcDbConfig: {2}set_lk_max_locks 1500<br> =3BolcDbConfig=
: {3}set_lk_max_lockers 1500<br> =3BolcDbIndex: objectClass eq<br> =
=3BolcDbIndex: uid eq<br> =3BolcDbIndex: cn eq<br> =3BolcDbIndex: o=
u eq<br> =3BolcDbIndex: dc eq<br> =3BolcDbIndex: uidNumber eq<br>&n=
bsp=3BolcDbIndex: gidNumber eq<br> =3BolcDbIndex: memberUid eq<br> =
=3BolcDbIndex: uniqueMember eq<br> =3BolcDbIndex: entryUUID eq<br> =
=3BolcDbIndex: entryCSN eq<br> =3BolcDbIndex: krbPrincipalName eq=2Cpre=
s=2Csub<br> =3BolcDbIndex: krbPwdPolicyReference eq<br> =3Bstructur=
alObjectClass: olcHdbConfig<br> =3BentryUUID: af9e5d12-d108-1031-9421-c=
d3569532aaf<br> =3BcreatorsName: cn=3Dconfig<br> =3BcreateTimestamp=
: 20121202201457Z<br> =3BolcAccess: {0}to attrs=3DuserPassword=2Cshadow=
LastChange by group.exact=3D"cn=3Dreplicators=2Cou=3Dgroups=2Cdc=3Dexample=
=2Cdc=3Dnet" read by self write by anonymous auth<br> =3BolcAccess: {1}=
to attrs=3DauthzTo=2CauthzFrom by group.exact=3D"cn=3Dreplicators=2Cou=3Dgr=
oups=2Cdc=3Dexample=2Cdc=3Dnet" read by users read by anonymous none<br>&nb=
sp=3BolcAccess: {2}to attrs=3DkrbLastSuccessfulAuth=2CkrbExtraData=2CkrbLas=
tFailedAuth=2CkrbLoginFailedCount by dn=3D"cn=3Dkdc-srv=2Cou=3Dkerberos=2Cd=
c=3Dexample=2Cdc=3Dnet" read by dn<br> =3B =3D"cn=3Dadm-srv=2Cou=3Dkerb=
eros=2Cdc=3Dexample=2Cdc=3Dnet" read by self read by * none<br> =3BolcA=
ccess: {3}to dn.subtree=3D"ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet" by dn=
=3D"cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet" read by dn=3D"c=
n=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2C<br> =3B dc=3Dnet" read by=
* none<br> =3BolcAccess: {4}to dn.base=3D"" by * read<br> =3BolcAc=
cess: {5}to * by self write by users read<br> =3BolcSyncrepl: {0}rid=3D=
123 provider=3D"<a href=3D"ldap://master.example.net:389/">ldap://master.ex=
ample.net:389/</a>" type=3DrefreshAndPersist retry=3D"60 30 300 +" searchba=
se=3D"dc=3Dexample=2Cdc=3Dnet" bindmethod=3Dsasl<br> =3B =3B saslme=
ch=3Dgssapi starttls=3Dcritical tls_reqcert=3Ddemand tls_cacert=3D/etc/ssl/=
certs/cacert.pem<br> =3BolcUpdateRef: "<a href=3D"ldap://master.example=
.net:389/">ldap://master.example.net:389/</a>"<br> =3BentryCSN: 2012120=
4041212.283590Z#000000#000#000000<br> =3BmodifiersName: gidNumber=3D0+u=
idNumber=3D0=2Ccn=3Dpeercred=2Ccn=3Dexternal=2Ccn=3Dauth<br> =3BmodifyT=
imestamp: 20121204041212Z<br> =3B <br> =3B <br> =3B <br> =
=3Bdn: dc=3Dexample=2Cdc=3Dnet<br> =3BobjectClass: top<br> =3Bobjec=
tClass: dcObject<br> =3BobjectClass: organization<br> =3Bo: example=
.net<br> =3Bdc: example<br> =3BstructuralObjectClass: organization<=
br> =3BentryUUID: eac01854-d108-1031-95b6-31806daa9e45<br> =3Bcreat=
orsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 2=
0121202201636Z<br> =3BentryCSN: 20121202201636.222029Z#000000#000#00000=
0<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =
=3BmodifyTimestamp: 20121202201636Z<br> =3BcontextCSN: 20121204035116.8=
90381Z#000000#000#000000<br> =3Bdn: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dne=
t<br> =3BobjectClass: simpleSecurityObject<br> =3BobjectClass: orga=
nizationalRole<br> =3Bcn: admin<br> =3Bdescription: LDAP administra=
tor<br> =3BuserPassword:: <=3Bsecret>=3B<br> =3BstructuralObjec=
tClass: organizationalRole<br> =3BentryUUID: eac2e160-d108-1031-95b7-31=
806daa9e45<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br=
> =3BcreateTimestamp: 20121202201636Z<br> =3BentryCSN: 201212022016=
36.240572Z#000000#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dex=
ample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121202201636Z<br> =3Bdn:=
ou=3Dpeople=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BobjectClass: organization=
alUnit<br> =3Bou: people<br> =3Bdescription: user account objects<b=
r> =3BstructuralObjectClass: organizationalUnit<br> =3BentryUUID: 1=
cee4810-d12b-1031-9787-4f8d9abcea93<br> =3BcreatorsName: cn=3Dadmin=2Cd=
c=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203002123Z<br> =
=3BentryCSN: 20121203002123.299880Z#000000#000#000000<br> =3BmodifiersN=
ame: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121=
203002123Z<br> =3Bdn: ou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet<br> =3B=
objectClass: organizationalUnit<br> =3Bou: groups<br> =3Bdescriptio=
n: group objects<br> =3BstructuralObjectClass: organizationalUnit<br>&n=
bsp=3BentryUUID: 1cfcb788-d12b-1031-9788-4f8d9abcea93<br> =3BcreatorsNa=
me: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 201212=
03002123Z<br> =3BentryCSN: 20121203002123.394485Z#000000#000#000000<br>=
 =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bmodi=
fyTimestamp: 20121203002123Z<br> =3Bdn: ou=3Dhosts=2Cdc=3Dexample=2Cdc=
=3Dnet<br> =3BobjectClass: organizationalUnit<br> =3Bou: hosts<br>&=
nbsp=3Bdescription: host/computer objects<br> =3BstructuralObjectClass:=
organizationalUnit<br> =3BentryUUID: 1cfdb37c-d12b-1031-9789-4f8d9abce=
a93<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =
=3BcreateTimestamp: 20121203002123Z<br> =3BentryCSN: 20121203002123.400=
935Z#000000#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=
=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121203002123Z<br> =3Bdn: ou=
=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BobjectClass: organizationa=
lUnit<br> =3Bou: kerberos<br> =3Bdescription: kerberos realm contai=
ner<br> =3BstructuralObjectClass: organizationalUnit<br> =3BentryUU=
ID: 1cfef412-d12b-1031-978a-4f8d9abcea93<br> =3BcreatorsName: cn=3Dadmi=
n=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203002123Z<br>=
 =3BentryCSN: 20121203002123.409140Z#000000#000#000000<br> =3Bmodif=
iersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: =
20121203002123Z<br> =3Bdn: cn=3Dreplica=2Cou=3Dhosts=2Cdc=3Dexample=2Cd=
c=3Dnet<br> =3Bcn: replica<br> =3BobjectClass: simpleSecurityObject=
<br> =3BobjectClass: organizationalRole<br> =3BobjectClass: krbPrin=
cipalAux<br> =3BobjectClass: krbTicketPolicyAux<br> =3BauthzTo: dn:=
*<br> =3Bdescription: LDAP server=2C replica<br> =3BstructuralObjec=
tClass: organizationalRole<br> =3BentryUUID: 1d02dae6-d12b-1031-978b-4f=
8d9abcea93<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br=
> =3BcreateTimestamp: 20121203002123Z<br> =3BkrbPrincipalName: <a h=
ref=3D"mailto:host/replica.example.net@EXAMPLE.NET">host/replica.example.ne=
t@EXAMPLE.NET</a><br> =3BkrbLoginFailedCount: 0<br> =3BkrbPrincipal=
Key:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIBAKFJ<br> =
=3B MEegAwIBEqFABD4gADgZgDa20URzdHWQ1WObQespjD5JMlRSb3fbZN8fG+gFml3DZQzinhb=
RURAxZ<br> =3B oJVqBI/zPGh/FDf9m+5bDBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAz=
54uBWIC4AFa66jXa6Mn3k<br> =3B f62uOX1YE6N3JlXl1EG2abEzZw1xWglReNN68wTKA=
HMAWgAwIBAKFBMD+gAwIBEKE4BDYYAKu6lb/<br> =3B QQQHgCnrL6XaSAYoh3A5GHF0xa=
2/vTWwq+lX4zmCpbY2l2up3TBVKZrhlenNSkxswPKAHMAWgAwIB<br> =3B AKExMC+gAwI=
BAaEoBCYIAGjfhZNlm0+a6MGvBgok7WxzB638xMCex7sQ1zfzZkLiViiKpw=3D=3D<br> =
=3BkrbPasswordExpiration: 19700101000000Z<br> =3BkrbLastPwdChange: 2012=
1203065600Z<br> =3BkrbExtraData:: AAIATbxQYWRtaW5pc3RyYXRvckBFWEFNUExFL=
k5FVAA=3D<br> =3BkrbExtraData:: AAgBAA=3D=3D<br> =3BuserPassword:: =
<=3Bsecret>=3B<br> =3BentryCSN: 20121203233422.105322Z#000000#000#0=
00000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br>&nb=
sp=3BmodifyTimestamp: 20121203233422Z<br> =3Bdn: cn=3Dmaster=2Cou=3Dhos=
ts=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bcn: master<br> =3BobjectClass: =
simpleSecurityObject<br> =3BobjectClass: organizationalRole<br> =3B=
objectClass: krbPrincipalAux<br> =3BobjectClass: krbTicketPolicyAux<br>=
 =3BauthzTo: dn:*<br> =3Bdescription: LDAP server=2C replica<br>&nb=
sp=3BuserPassword:: <=3Bsecret>=3B<br> =3BstructuralObjectClass: or=
ganizationalRole<br> =3BentryUUID: 1d0514dc-d12b-1031-978c-4f8d9abcea93=
<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bc=
reateTimestamp: 20121203002123Z<br> =3BkrbPrincipalName: <a href=3D"mai=
lto:host/master.example.net@EXAMPLE.NET">host/master.example.net@EXAMPLE.NE=
T</a><br> =3BkrbLoginFailedCount: 0<br> =3BkrbPrincipalKey:: MIIBRK=
ADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIBAKFJ<br> =3B MEegAwIB=
EqFABD4gACzEUo41sdOc4i+gbyFE/lai6sMdeygNYlf/SiWtzll+A7x/QBVoz7zFW+aWr<br>&n=
bsp=3B 8/FMEBj49p4Bn0Goa371TBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAGW4+8wBum86Xg=
WwWj5522A<br> =3B i/CCoCVDIVBZHOI48rJZHrgu59tvH0fH7TDkcwTKAHMAWgAwIBAKF=
BMD+gAwIBEKE4BDYYAH15xNZ<br> =3B VJSjkEKx2M7Ai17Og8lMWwXAsDB2h+LsGC+HsS=
WdbE0P4yCNkjMOdIwnwJJ3OA48wPKAHMAWgAwIB<br> =3B AKExMC+gAwIBAaEoBCYIAGu=
LUyYlXYKdpNk9KEe7TuHulCL0Fzr4N8WXAv3DaIILvcKv0w=3D=3D<br> =3BkrbPasswor=
dExpiration: 19700101000000Z<br> =3BkrbLastPwdChange: 20121203060855Z<b=
r> =3BkrbExtraData:: AAL3QbxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D<br>=
 =3BkrbExtraData:: AAgBAA=3D=3D<br> =3BentryCSN: 20121203060855.932=
134Z#000000#000#000000<br> =3BmodifiersName: cn=3Dadm-srv=2Cou=3Dkerber=
os=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121203060855Z<br=
> =3Bdn: cn=3Dadministrator=2Cou=3Dgroups=2Cdc=3Dexample=2Cdc=3Dnet<br>=
 =3BobjectClass: posixGroup<br> =3Bcn: administrator<br> =3Bgid=
Number: 50000<br> =3BstructuralObjectClass: posixGroup<br> =3Bentry=
UUID: 1d079216-d12b-1031-978d-4f8d9abcea93<br> =3BcreatorsName: cn=3Dad=
min=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203002123Z<b=
r> =3BentryCSN: 20121203002123.465616Z#000000#000#000000<br> =3Bmod=
ifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp=
: 20121203002123Z<br> =3Bdn: cn=3Dreplicators=2Cou=3Dgroups=2Cdc=3Dexam=
ple=2Cdc=3Dnet<br> =3BobjectClass: top<br> =3BobjectClass: groupOfN=
ames<br> =3Bcn: replicators<br> =3Bmember: cn=3Dreplica=2Cou=3Dhost=
s=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bmember: cn=3Dmaster=2Cou=3Dhosts=2Cd=
c=3Dexample=2Cdc=3Dnet<br> =3BstructuralObjectClass: groupOfNames<br>&n=
bsp=3BentryUUID: 1d096db6-d12b-1031-978e-4f8d9abcea93<br> =3BcreatorsNa=
me: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 201212=
03002123Z<br> =3BentryCSN: 20121203002123.477792Z#000000#000#000000<br>=
 =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bmodi=
fyTimestamp: 20121203002123Z<br> =3Bdn: uid=3Dadministrator=2Cou=3Dpeop=
le=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BobjectClass: top<br> =3BobjectC=
lass: inetOrgPerson<br> =3BobjectClass: posixAccount<br> =3BobjectC=
lass: shadowAccount<br> =3BobjectClass: krbPrincipalAux<br> =3Bobje=
ctClass: krbTicketPolicyAux<br> =3Bcn: administrator<br> =3Bsn: adm=
inistrator<br> =3BuidNumber: 50000<br> =3BgidNumber: 50000<br> =
=3BuserPassword:: <=3Bsecret>=3B<br> =3BhomeDirectory: /home/admini=
strator<br> =3BstructuralObjectClass: inetOrgPerson<br> =3Buid: adm=
inistrator<br> =3BentryUUID: 1d0a9bf0-d12b-1031-978f-4f8d9abcea93<br>&n=
bsp=3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateT=
imestamp: 20121203002123Z<br> =3BkrbPrincipalName: <a href=3D"mailto:ad=
ministrator@EXAMPLE.NET">administrator@EXAMPLE.NET</a><br> =3BkrbPrinci=
palKey:: MIICa6ADAgEBoQMCAQGiAwIBAaMDAgEBpIICUzCCAk8wVKAHMAWgAwIBAKFJ<br>&n=
bsp=3B MEegAwIBEqFABD4gALWKtjcuVIPL0PLDhUQleHDwIp4PB4O0T3ays8putrnZEUxVC+Ec=
qcdxailuD<br> =3B o3oHvU0K11YiAyckIKjfzBEoAcwBaADAgEAoTkwN6ADAgEXoTAELh=
AAQRTIM4QI0IPjmA1xg/Ot7l<br> =3B cXQSCNuv7MRgBJl7N1QsxS7naYbgLlyybkbXkw=
TKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYADmOzq8<br> =3B 96TliwJM9J3X0Dxb/Y+bcTz=
3e4/FarTIvzEMrMneaW57VGLWX1y162/LNz2jwAqIwPKAHMAWgAwIB<br> =3B AKExMC+g=
AwIBAaEoBCYIAMBGuqUqQw8nhnQ194wQICvc+Iu0yPUdSTzjGXtDhPSaAHj70DA8oAcwB<br>&n=
bsp=3B aADAgEBoTEwL6ADAgEDoSgEJggA0mkFMVjyT2Jn553z2fZNIOQ8fYR2jtUcGFbyUL4s4=
HaK+6yoME<br> =3B 2gGDAWoAMCAQKhDwQNYWRtaW5pc3RyYXRvcqExMC+gAwIBA6EoBCY=
IAHKR4PzhneCY8c8tLpo8yyO<br> =3B mpk8FynWjl7rVe+Zqq9gIt4KXTTBLoBYwFKADA=
gEDoQ0EC0VYQU1QTEUuTkVUoTEwL6ADAgEDoSgE<br> =3B JggA4e6VizsvWUEKEqAt58P=
rPViScqavK7u2VuYDpNNuVwTv3zGmMEugFjAUoAMCAQWhDQQLRVhBT<br> =3B VBMRS5OR=
VShMTAvoAMCAQOhKAQmCACA4sM1SoUcEEYGOMA8CDwINmmJXgnKPQr8jRDsxGToXGa5U+<br>&n=
bsp=3B g=3D<br> =3BkrbLastPwdChange: 20121203054848Z<br> =3BkrbLast=
FailedAuth: 20121204013714Z<br> =3BkrbLoginFailedCount: 0<br> =3Bde=
scription: Network Administrator<br> =3BkrbLastSuccessfulAuth: 20121204=
035116Z<br> =3BkrbExtraData:: AAJAPbxQcm9vdC9hZG1pbkBFWEFNUExFLk5FVAA=
=3D<br> =3BkrbExtraData:: AAgBAA=3D=3D<br> =3BentryCSN: 20121204035=
116.890381Z#000000#000#000000<br> =3BmodifiersName: cn=3Dkdc-srv=2Cou=
=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 201212040=
35116Z<br> =3Bdn: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dne=
t<br> =3BobjectClass: simpleSecurityObject<br> =3BobjectClass: orga=
nizationalRole<br> =3Bcn: kdc-srv<br> =3Bdescription: Kerberos KDC<=
br> =3BuserPassword:: <=3Bsecret>=3B<br> =3BstructuralObjectCla=
ss: organizationalRole<br> =3BentryUUID: 1d168924-d12b-1031-9790-4f8d9a=
bcea93<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br>&nb=
sp=3BcreateTimestamp: 20121203002123Z<br> =3BentryCSN: 20121203002123.5=
63692Z#000000#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexampl=
e=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121203002123Z<br> =3Bdn: cn=
=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BobjectClass=
: simpleSecurityObject<br> =3BobjectClass: organizationalRole<br> =
=3Bcn: adm-srv<br> =3Bdescription: Kerberos Admin Server<br> =3Buse=
rPassword:: <=3Bsecret>=3B<br> =3BstructuralObjectClass: organizati=
onalRole<br> =3BentryUUID: 1d18610e-d12b-1031-9791-4f8d9abcea93<br>&nbs=
p=3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTim=
estamp: 20121203002123Z<br> =3BentryCSN: 20121203002123.575773Z#000000#=
000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<b=
r> =3BmodifyTimestamp: 20121203002123Z<br> =3Bdn: cn=3DEXAMPLE.NET=
=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bcn: EXAMPLE.NET<br>&n=
bsp=3BobjectClass: top<br> =3BobjectClass: krbRealmContainer<br> =
=3BobjectClass: krbTicketPolicyAux<br> =3BkrbSubTrees: dc=3Dexample=2Cd=
c=3Dnet<br> =3BkrbSearchScope: 2<br> =3BkrbMaxRenewableAge: 604800<=
br> =3BkrbMaxTicketLife: 36000<br> =3BstructuralObjectClass: krbRea=
lmContainer<br> =3BentryUUID: c03d58b8-d134-1031-83e7-0707760cf534<br>&=
nbsp=3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bcreate=
Timestamp: 20121203013022Z<br> =3BentryCSN: 20121203013022.757228Z#0000=
00#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dne=
t<br> =3BmodifyTimestamp: 20121203013022Z<br> =3Bdn: <a href=3D"mai=
lto:krbPrincipalName=3DK/M@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=
=2Cdc=3Dexample=2Cdc">krbPrincipalName=3DK/M@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=
=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc</a>=3D<br> =3B net<br> =3BkrbL=
oginFailedCount: 0<br> =3BkrbMaxTicketLife: 36000<br> =3BkrbMaxRene=
wableAge: 604800<br> =3BkrbTicketFlags: 192<br> =3BkrbPrincipalName=
: <a href=3D"mailto:K/M@EXAMPLE.NET">K/M@EXAMPLE.NET</a><br> =3BkrbPrin=
cipalExpiration: 19700101000000Z<br> =3BkrbPrincipalKey:: MGagAwIBAaEDA=
gEBogMCAQGjAwIBAKRQME4wTKAHMAWgAwIBAKFBMD+gAwIB<br> =3B EKE4BDYYALvAYAT=
OnUQCrTUO54HKuJKnttvmnxYyud5Fh6T22oTH0qAUzKRfDdxTuO7OIrbK/c4Ks<br> =3B =
HI=3D<br> =3BkrbLastPwdChange: 19700101000000Z<br> =3BkrbExtraData:=
: AAkBAAEArgC8UA=3D=3D<br> =3BkrbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARV=
hBTVBMRS5ORVQA<br> =3BkrbExtraData:: AAcBAAIAAgAAAAAAAAA=3D<br> =3B=
objectClass: krbPrincipal<br> =3BobjectClass: krbPrincipalAux<br> =
=3BobjectClass: krbTicketPolicyAux<br> =3BstructuralObjectClass: krbPri=
ncipal<br> =3BentryUUID: c04d9282-d134-1031-83e8-0707760cf534<br> =
=3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTime=
stamp: 20121203013022Z<br> =3BentryCSN: 20121203013022.863568Z#000000#0=
00#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br=
> =3BmodifyTimestamp: 20121203013022Z<br> =3Bdn: <a href=3D"mailto:=
krbPrincipalName=3Dkrbtgt/EXAMPLE.NET@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=
=3Dkerberos">krbPrincipalName=3Dkrbtgt/EXAMPLE.NET@EXAMPLE.NET=2Ccn=3DEXAMP=
LE.NET=2Cou=3Dkerberos</a><br> =3B =2Cdc=3Dexample=2Cdc=3Dnet<br> =
=3BkrbLoginFailedCount: 0<br> =3BkrbMaxTicketLife: 36000<br> =3Bkrb=
MaxRenewableAge: 604800<br> =3BkrbTicketFlags: 0<br> =3BkrbPrincipa=
lName: <a href=3D"mailto:krbtgt/EXAMPLE.NET@EXAMPLE.NET">krbtgt/EXAMPLE.NET=
@EXAMPLE.NET</a><br> =3BkrbPrincipalExpiration: 19700101000000Z<br>&nbs=
p=3BkrbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgA=
wIBAKFJ<br> =3B MEegAwIBEqFABD4gAOyPPy2RLdudifS8baeUvv3AxlGKKubyeRUcnwF=
c2CqS9kNvgpTNujaNnfmRR<br> =3B GQI5lTHUdwGYqHfr+ayuTBEoAcwBaADAgEAoTkwN=
6ADAgEXoTAELhAAe8n+vM9TXvNAG43Va7UKy1<br> =3B 93EQx3jtSTiD0aa2tNK9Fbkom=
kYG0mWlz/xW4wTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAM9KwFT<br> =3B B9MqvfMfba=
37K7zY6lqPhLpF8d0uucRA/Ewed1i9wfjiOuxQVR0PWLB2OM5q1llQwPKAHMAWgAwIB<br>&nbs=
p=3B AKExMC+gAwIBAaEoBCYIAFObLZrmdRD8NEctxP0TySKwmGNnKiX7m+EMMvNj4xmNIa2yTT=
A8oAcwB<br> =3B aADAgEAoTEwL6ADAgEDoSgEJggAXVm59rkWXluDnx/F0XOEDh4i3Nz9=
HckLfrcVL5goKRVOV8oR<br> =3BkrbLastPwdChange: 19700101000000Z<br> =
=3BkrbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA<br> =3BkrbEx=
traData:: AAcBAAIAAgAAAAAAAAA=3D<br> =3BobjectClass: krbPrincipal<br>&n=
bsp=3BobjectClass: krbPrincipalAux<br> =3BobjectClass: krbTicketPolicyA=
ux<br> =3BstructuralObjectClass: krbPrincipal<br> =3BentryUUID: c05=
18180-d134-1031-83e9-0707760cf534<br> =3BcreatorsName: cn=3Dadmin=2Cdc=
=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203013022Z<br> =
=3BentryCSN: 20121203013022.889347Z#000000#000#000000<br> =3BmodifiersN=
ame: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121=
203013022Z<br> =3Bdn: <a href=3D"mailto:krbPrincipalName=3Dkadmin/admin=
@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dex">krbPrincipalName=
=3Dkadmin/admin@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc=3Dex</a=
><br> =3B ample=2Cdc=3Dnet<br> =3BkrbLoginFailedCount: 0<br> =
=3BkrbMaxTicketLife: 10800<br> =3BkrbMaxRenewableAge: 604800<br> =
=3BkrbTicketFlags: 4<br> =3BkrbPrincipalName: <a href=3D"mailto:kadmin/=
admin@EXAMPLE.NET">kadmin/admin@EXAMPLE.NET</a><br> =3BkrbPrincipalExpi=
ration: 19700101000000Z<br> =3BkrbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAw=
IBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIBAKFJ<br> =3B MEegAwIBEqFABD4gAMjLoWHT=
DPL9j+ribbAohbY8+SM973mU5iIvxN7MItjbLtXBh/7CF2xtCkdsY<br> =3B 5WwobkGKF=
vGkZvTL+olZjBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAwMe5Vpq5Hd2Zy1E8M28Ix6<br>&nb=
sp=3B SbAtMeUjzpEqwQM3P838foPwM9ZfRYhfZ0UfAwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDY=
YAGZM5wu<br> =3B tIcsdKbsYTDZgUzqIADtNt4GYjBIJx13JO40Bto78eCybAvE4uqFiv=
BmdH1kEy8cwPKAHMAWgAwIB<br> =3B AKExMC+gAwIBAaEoBCYIAHrJty4X1D5dPY/PW84=
Lgb0YYuazteCJMYvphJZr3LeKs7suBzA8oAcwB<br> =3B aADAgEAoTEwL6ADAgEDoSgEJ=
ggAMDfJDyzgWa4vsKv6rs9IkXOq8eEePAQPB9s0UPbM+9bG3aQz<br> =3BkrbLastPwdCh=
ange: 19700101000000Z<br> =3BkrbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVh=
BTVBMRS5ORVQA<br> =3BkrbExtraData:: AAcBAAIAAgAAAGlvbkA=3D<br> =3Bo=
bjectClass: krbPrincipal<br> =3BobjectClass: krbPrincipalAux<br> =
=3BobjectClass: krbTicketPolicyAux<br> =3BstructuralObjectClass: krbPri=
ncipal<br> =3BentryUUID: c05346be-d134-1031-83ea-0707760cf534<br> =
=3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTime=
stamp: 20121203013022Z<br> =3BentryCSN: 20121203013022.900950Z#000000#0=
00#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br=
> =3BmodifyTimestamp: 20121203013022Z<br> =3Bdn: <a href=3D"mailto:=
krbPrincipalName=3Dkadmin/changepw@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dke=
rberos=2Cdc">krbPrincipalName=3Dkadmin/changepw@EXAMPLE.NET=2Ccn=3DEXAMPLE.=
NET=2Cou=3Dkerberos=2Cdc</a><br> =3B =3Dexample=2Cdc=3Dnet<br> =3Bk=
rbLoginFailedCount: 0<br> =3BkrbMaxTicketLife: 300<br> =3BkrbMaxRen=
ewableAge: 604800<br> =3BkrbTicketFlags: 8196<br> =3BkrbPrincipalNa=
me: <a href=3D"mailto:kadmin/changepw@EXAMPLE.NET">kadmin/changepw@EXAMPLE.=
NET</a><br> =3BkrbPrincipalExpiration: 19700101000000Z<br> =3BkrbPr=
incipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAgEApIIBajCCAWYwVKAHMAWgAwIBAKFJ<b=
r> =3B MEegAwIBEqFABD4gAHNxSgJ9GwIH0UmFf5Ol8WWQ/2Wy6nQqmf+yX4dVzEQFsmaB=
p9l1hsceWqIB2<br> =3B ic80wlAJW9Do0gSOaiYfjBEoAcwBaADAgEAoTkwN6ADAgEXoT=
AELhAAt+ZrWZKAjKkUhSJt0wwSqU<br> =3B ootXhNduXIRVjUJxWVtXdPTI7RcL/yjZK2=
M0MwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYACd423Z<br> =3B epUHmGMVf2I5sRQZRuo=
ypVddoREy1pTtTMIiGvqai7Z+PRHbpL0kTawz9zdg60IgwPKAHMAWgAwIB<br> =3B AKEx=
MC+gAwIBAaEoBCYIAGGbQu5FJ0ewAsCALf9yDbvOIa7Abx0PmnGw+PSKWOt8Dsur9TA8oAcwB<b=
r> =3B aADAgEAoTEwL6ADAgEDoSgEJggAjG9iwd398xO7bFH+bAQDGv0Hh6Qr+QIpNAUB/=
w7dmvqU9zPl<br> =3BkrbLastPwdChange: 19700101000000Z<br> =3BkrbExtr=
aData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5ORVQA<br> =3BkrbExtraData:: =
AAcBAAIAAgAAAGlvbkA=3D<br> =3BobjectClass: krbPrincipal<br> =3Bobje=
ctClass: krbPrincipalAux<br> =3BobjectClass: krbTicketPolicyAux<br>&nbs=
p=3BstructuralObjectClass: krbPrincipal<br> =3BentryUUID: c054d88a-d134=
-1031-83eb-0707760cf534<br> =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=
=2Cdc=3Dnet<br> =3BcreateTimestamp: 20121203013022Z<br> =3BentryCSN=
: 20121203013022.911237Z#000000#000#000000<br> =3BmodifiersName: cn=3Da=
dmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121203013022Z<=
br> =3Bdn: <a href=3D"mailto:krbPrincipalName=3Dkadmin/history@EXAMPLE.=
NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc">krbPrincipalName=3Dkadmin/hist=
ory@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dkerberos=2Cdc</a>=3D<br> =3B =
example=2Cdc=3Dnet<br> =3BkrbLoginFailedCount: 0<br> =3BkrbMaxTicke=
tLife: 36000<br> =3BkrbMaxRenewableAge: 604800<br> =3BkrbTicketFlag=
s: 0<br> =3BkrbPrincipalName: <a href=3D"mailto:kadmin/history@EXAMPLE.=
NET">kadmin/history@EXAMPLE.NET</a><br> =3BkrbPrincipalExpiration: 1970=
0101000000Z<br> =3BkrbPrincipalKey:: MGagAwIBAaEDAgEBogMCAQGjAwIBAKRQME=
4wTKAHMAWgAwIBAKFBMD+gAwIB<br> =3B EKE4BDYYAOhayj3RDyyg78DGPFKNATBnpKKb=
f2qwLJbJ0nPXoUdjtbHpjECIfASUXjBoB+Pkd/N+Z<br> =3B 2g=3D<br> =3BkrbL=
astPwdChange: 19700101000000Z<br> =3BkrbExtraData:: AAKuALxQZGJfY3JlYXR=
pb25ARVhBTVBMRS5ORVQA<br> =3BkrbExtraData:: AAcBAAIAAgAAAGlvbkA=3D<br>&=
nbsp=3BobjectClass: krbPrincipal<br> =3BobjectClass: krbPrincipalAux<br=
> =3BobjectClass: krbTicketPolicyAux<br> =3BstructuralObjectClass: =
krbPrincipal<br> =3BentryUUID: c0562d3e-d134-1031-83ec-0707760cf534<br>=
 =3BcreatorsName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bcreat=
eTimestamp: 20121203013022Z<br> =3BentryCSN: 20121203013022.919957Z#000=
000#000#000000<br> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dn=
et<br> =3BmodifyTimestamp: 20121203013022Z<br> =3Bdn: <a href=3D"ma=
ilto:krbPrincipalName=3Dkadmin/master.example.net@EXAMPLE.NET=2Ccn=3DEXAMPL=
E.NET=2Cou=3Dk">krbPrincipalName=3Dkadmin/master.example.net@EXAMPLE.NET=2C=
cn=3DEXAMPLE.NET=2Cou=3Dk</a><br> =3B erberos=2Cdc=3Dexample=2Cdc=3Dnet=
<br> =3BkrbLoginFailedCount: 0<br> =3BkrbMaxTicketLife: 10800<br>&n=
bsp=3BkrbMaxRenewableAge: 604800<br> =3BkrbTicketFlags: 4<br> =3Bkr=
bPrincipalName: <a href=3D"mailto:kadmin/master.example.net@EXAMPLE.NET">ka=
dmin/master.example.net@EXAMPLE.NET</a><br> =3BkrbPrincipalExpiration: =
19700101000000Z<br> =3BkrbPrincipalKey:: MIIBgqADAgEBoQMCAQGiAwIBAaMDAg=
EApIIBajCCAWYwVKAHMAWgAwIBAKFJ<br> =3B MEegAwIBEqFABD4gABhOeGOuo9UBDjK7=
hTQ3Xfs8vsWB+Afl0JkPaSt3T3tRkZbWxAhTxXl+4Ta3z<br> =3B Y4ZaEYItXr2awBW6Q=
XSZzBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAUUoLikQRp1c+vGFRtGg1qY<br> =3B oe=
v8m55VO73g+xEqcx02MJa1x+esm5y9VTMLswTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYACj0sgn=
<br> =3B ZOyWATgpst3N3pSom4smhxBWYgpTMghwaS5gFeKMZhccDSI8Ahm4nQPFmq3Jrf=
4UwPKAHMAWgAwIB<br> =3B AKExMC+gAwIBAaEoBCYIAL0gPnqCvdlb4//Xw5iE8Jvj2qY=
DwpK0Hycj+cwyCjFsVKTsjzA8oAcwB<br> =3B aADAgEAoTEwL6ADAgEDoSgEJggAxTSME=
h/7bfV2AYx4VoP8cIeunsqtrcvNIItmDxSqZ0ecZABm<br> =3BkrbLastPwdChange: 19=
700101000000Z<br> =3BkrbExtraData:: AAKuALxQZGJfY3JlYXRpb25ARVhBTVBMRS5=
ORVQA<br> =3BkrbExtraData:: AAcBAAIAAgAAANAD4gA=3D<br> =3BobjectCla=
ss: krbPrincipal<br> =3BobjectClass: krbPrincipalAux<br> =3BobjectC=
lass: krbTicketPolicyAux<br> =3BstructuralObjectClass: krbPrincipal<br>=
 =3BentryUUID: c0581144-d134-1031-83ed-0707760cf534<br> =3Bcreators=
Name: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 2012=
1203013022Z<br> =3BentryCSN: 20121203013022.932349Z#000000#000#000000<b=
r> =3BmodifiersName: cn=3Dadmin=2Cdc=3Dexample=2Cdc=3Dnet<br> =3Bmo=
difyTimestamp: 20121203013022Z<br> =3Bdn: <a href=3D"mailto:krbPrincipa=
lName=3Dldap/master.example.net@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=2Cou=3Dker">=
krbPrincipalName=3Dldap/master.example.net@EXAMPLE.NET=2Ccn=3DEXAMPLE.NET=
=2Cou=3Dker</a><br> =3B beros=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BkrbP=
rincipalName: <a href=3D"mailto:ldap/master.example.net@EXAMPLE.NET">ldap/m=
aster.example.net@EXAMPLE.NET</a><br> =3BobjectClass: krbPrincipal<br>&=
nbsp=3BobjectClass: krbPrincipalAux<br> =3BobjectClass: krbTicketPolicy=
Aux<br> =3BstructuralObjectClass: krbPrincipal<br> =3BentryUUID: 91=
a6199c-d15a-1031-9919-2f12ddec6588<br> =3BcreatorsName: cn=3Dadm-srv=2C=
ou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BcreateTimestamp: 2012120=
3060105Z<br> =3BkrbLoginFailedCount: 0<br> =3BkrbPrincipalKey:: MII=
BRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAwIBAKFJ<br> =3B MEegA=
wIBEqFABD4gAA6GzVEXOsoNQbzbqFy0KZqXt04aRDje4Gxq4ZS4b/z+l6pKgmUyVdsPUS2wz<br=
> =3B qeKY56slAvVlnRCQt+uZTBEoAcwBaADAgEAoTkwN6ADAgEXoTAELhAAkzwNhAF14T=
YWZyLZem5kvD<br> =3B yuLARt7Z3LLsduQ1j6s7P6EFMDNWPaHCJf09cwTKAHMAWgAwIB=
AKFBMD+gAwIBEKE4BDYYAAbNr3p<br> =3B vkmNXkIZNgUtw2FJ3VtGEU9MmDmNHCFKSk4=
kHCR9naWPkbMzRmWA7s/yGkwIWxCMwPKAHMAWgAwIB<br> =3B AKExMC+gAwIBAaEoBCYI=
APc+l15I9VR4tYjNfS6XRX09JRoioaavGokNvj0RJa1/h4j3hg=3D=3D<br> =3BkrbPass=
wordExpiration: 19700101000000Z<br> =3BkrbLastPwdChange: 20121203060153=
Z<br> =3BkrbLastSuccessfulAuth: 20121203061721Z<br> =3BkrbExtraData=
:: AAJRQLxQYWRtaW5pc3RyYXRvckBFWEFNUExFLk5FVAA=3D<br> =3BkrbExtraData::=
AAgBAA=3D=3D<br> =3BentryCSN: 20121203061721.358939Z#000000#000#000000=
<br> =3BmodifiersName: cn=3Dkdc-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=
=3Dnet<br> =3BmodifyTimestamp: 20121203061721Z<br> =3Bdn: <a href=
=3D"mailto:krbPrincipalName=3Dldap/replica.example.net@EXAMPLE.NET=2Ccn=3DE=
XAMPLE.NET=2Cou=3Dke">krbPrincipalName=3Dldap/replica.example.net@EXAMPLE.N=
ET=2Ccn=3DEXAMPLE.NET=2Cou=3Dke</a><br> =3B rberos=2Cdc=3Dexample=2Cdc=
=3Dnet<br> =3BkrbPrincipalName: <a href=3D"mailto:ldap/replica.example.=
net@EXAMPLE.NET">ldap/replica.example.net@EXAMPLE.NET</a><br> =3Bobject=
Class: krbPrincipal<br> =3BobjectClass: krbPrincipalAux<br> =3Bobje=
ctClass: krbTicketPolicyAux<br> =3BstructuralObjectClass: krbPrincipal<=
br> =3BentryUUID: 205686f2-d162-1031-9537-2fa18b539eb9<br> =3Bcreat=
orsName: cn=3Dadm-srv=2Cou=3Dkerberos=2Cdc=3Dexample=2Cdc=3Dnet<br> =3B=
createTimestamp: 20121203065511Z<br> =3BkrbLoginFailedCount: 0<br> =
=3BkrbPrincipalKey:: MIIBRKADAgEBoQMCAQGiAwIBAqMDAgEBpIIBLDCCASgwVKAHMAWgAw=
IBAKFJ<br> =3B MEegAwIBEqFABD4gABVJBbD8SWzRxzA92ncPp+x/Trd3GJY/P6w+ErH3=
wddcUmq3o092v7mUXFMNw<br> =3B 2R8oC1rwLD2B/deCyuHDTBEoAcwBaADAgEAoTkwN6=
ADAgEXoTAELhAApsEJiySukR8L5M3DKbipUj<br> =3B AITSVQQL2YSqY7xr/BY7Hm3huN=
/juvnC7u/ZQwTKAHMAWgAwIBAKFBMD+gAwIBEKE4BDYYAOvmT4x<br> =3B MDAmgH2qTgq=
XTSLwRcBvT7QMWYMH0oi7HW8DYC09HDAdD2/vqaBsgthQCj3BCDmkwPKAHMAWgAwIB<br> =
=3B AKExMC+gAwIBAaEoBCYIALQe5Qa57ZwsYK2mxhbNOhrO0Yn/OVLez1VQiEmrpj2/GvJLXA=
=3D=3D<br> =3BkrbPasswordExpiration: 19700101000000Z<br> =3BkrbLast=
PwdChange: 20121203065628Z<br> =3BkrbExtraData:: AAIcTbxQYWRtaW5pc3RyYX=
RvckBFWEFNUExFLk5FVAA=3D<br> =3BkrbExtraData:: AAgBAA=3D=3D<br> =3B=
krbLastSuccessfulAuth: 20121204032538Z<br> =3BentryCSN: 20121204032538.=
048010Z#000000#000#000000<br> =3BmodifiersName: cn=3Dkdc-srv=2Cou=3Dker=
beros=2Cdc=3Dexample=2Cdc=3Dnet<br> =3BmodifyTimestamp: 20121204032538Z=
<br> =3B<BR><div><div id=3D"SkyDrivePlaceholder"></div>>=3B Date: Fri=
=2C 9 Nov 2012 01:55:32 +0000<br>>=3B From: openldap-its@OpenLDAP.org<br>=
>=3B To: blance3459@hotmail.com<br>>=3B Subject: Re: (ITS#7434) idasser=
t-bind fails after restarting slapd<br>>=3B <br>>=3B <br>>=3B *** THI=
S IS AN AUTOMATICALLY GENERATED REPLY ***<br>>=3B <br>>=3B Thanks for y=
our report to the OpenLDAP Issue Tracking System. Your<br>>=3B report ha=
s been assigned the tracking number ITS#7434.<br>>=3B <br>>=3B One of o=
ur support engineers will look at your report in due course.<br>>=3B Note=
that this may take some time because our support engineers<br>>=3B are v=
olunteers. They only work on OpenLDAP when they have spare<br>>=3B time.=
<br>>=3B <br>>=3B If you need to provide additional information in rega=
rds to your<br>>=3B issue report=2C you may do so by replying to this mes=
sage. Note that<br>>=3B any mail sent to openldap-its@openldap.org with =
(ITS#7434)<br>>=3B in the subject will automatically be attached to the i=
ssue report.<br>>=3B <br>>=3B mailto:openldap-its@openldap.org?subject=
=3D(ITS#7434)<br>>=3B <br>>=3B You may follow the progress of this repo=
rt by loading the following<br>>=3B URL in a web browser:<br>>=3B h=
ttp://www.OpenLDAP.org/its/index.cgi?findid=3D7434<br>>=3B <br>>=3B Ple=
ase remember to retain your issue tracking number (ITS#7434)<br>>=3B on a=
ny further messages you send to us regarding this report. If<br>>=3B you=
don't then you'll just waste our time and yours because we<br>>=3B won't=
be able to properly track the report.<br>>=3B <br>>=3B Please note tha=
t the Issue Tracking System is not intended to<br>>=3B be used to seek he=
lp in the proper use of OpenLDAP Software.<br>>=3B Such requests will be =
closed.<br>>=3B <br>>=3B OpenLDAP Software is user supported.<br>>=3B=
http://www.OpenLDAP.org/support/<br>>=3B <br>>=3B --------------<br>&=
gt=3B Copyright 1998-2007 The OpenLDAP Foundation=2C All Rights Reserved.<b=
r>>=3B <br></div> </div></body>
</html>=
--_e0f270ad-e1a3-48b6-986f-f9f11dfd57c0_--