[Date Prev][Date Next] [Chronological] [Thread] [Top]

bug when deleting alias to deleted object (ITS#2186)

Full_Name: Hallvard B. Furuseth
Version: 2.1.4
OS: Linux
Submission from: (NULL) (

We got this error when deleting an alias to a deleted object:

ldapmodify: delete failed:
ldap_delete: Internal (implementation specific) error (80)
        matched DN: uid=saagesor,ou=JF,ou=JF,ou=organization,dc=uio,dc=no
        additional info: bad referral object

We have no referrals in slapd.conf or in the database.

The object which the alias pointed to had just been deleted.  This
was the 6th delete operation after that.  It was at night, so there
were probably not many search operations in between.

Here is slapd.conf:

include         /ldap/usr/etc/openldap/schema/core.schema
include         /ldap/usr/etc/openldap/schema/cosine.schema
include         /ldap/usr/etc/openldap/schema/inetorgperson.schema
include         /ldap/etc/schema/eduperson.schema
include         /ldap/etc/schema/nor.schema
include         /ldap/usr/etc/openldap/schema/nis.schema

threads 256
sizelimit       50
idletimeout 900
timelimit 60

gentlehup on

pidfile         /ldap/var/slapd.pid
argsfile        /ldap/var/slapd.args


TLSCertificateFile /ldap/etc/ldap-cert/beeblebrox.uio.no.crt
TLSCertificateKeyFile /ldap/etc/ldap-cert/beeblebrox.uio.no.key
TLSCACertificateFile /ldap/etc/ldap-cert/w3_cacert.pem

database        ldbm
cachesize       10000000
dbcachesize     1000000000

suffix          "dc=uio,dc=no"
rootdn          "cn=root,dc=uio,dc=no"
rootpw          *********
directory       /ldap/usr/var/a/openldap-data
index default            pres,eq
index objectClass        eq
index cn                 pres,eq,sub
index uid                pres,eq,sub
index ou                 pres,eq,sub
index mail               eq
index telephoneNumber    eq
index eduPersonOrgUnitDN eq

security update_ssf=112

access to attr=userPassword
        by self ssf=112 auth
        by dn="cn=root" ssf=112 write
        by * ssf=112 auth

access to attr=norSSN,birthDate
        by self read
        by dn="cn=root" read
        by anonymous none

access to *
        by self write
        by dn="cn=root" write
        by anonymous read
        by users read