[Date Prev][Date Next] [Chronological] [Thread] [Top]

Newbie question on client Auth and SSL



When I compile OpenLDAP with OpenSSL libraries present, does it enforces SSL
utilization from then on?

I'm experiencing the following: I've setup my server and have it working
fine. I can search (anonymous binding) and add entries using Manager
credentials. However, I can't search with a different binding, nor can I
authenticate using pam_auth (from Squid) thats the "only" application I need
working with ldap right now.  I issue the following:
(sorry for level -1 log, but I don't know which level would suffice)

############ REMOTE HOST
	[root@andromeda local]# pam_auth -n squid_ldap
	adriela 123456
	ERR

############ SERVER - /var/log/slapd.log
	Oct 29 14:16:45 srvoracle slapd[21877]: daemon: added 6r 
	Oct 29 14:16:45 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: new connection on 9 
	Oct 29 14:16:56 srvoracle slapd[21877]: conn=0 fd=9 ACCEPT from
IP=10.10.0.253:1128 (IP=0.0.0.0:389) 
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: added 9r 
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on:
	Oct 29 14:16:56 srvoracle slapd[21877]:  
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on:
	Oct 29 14:16:56 srvoracle slapd[21877]:  9r
	Oct 29 14:16:56 srvoracle slapd[21877]:  
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: read activity on 9 
	Oct 29 14:16:56 srvoracle slapd[21877]: connection_get(9) 
	Oct 29 14:16:56 srvoracle slapd[21877]: connection_get(9): got
connid=0 
	Oct 29 14:16:56 srvoracle slapd[21877]: connection_read(9): checking
for input on id=0 
	Oct 29 14:16:56 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable) 
	Oct 29 14:16:56 srvoracle slapd[21877]: do_bind 
	Oct 29 14:16:56 srvoracle slapd[21877]: >>> dnPrettyNormal: <> 
	Oct 29 14:16:56 srvoracle slapd[21877]: <<< dnPrettyNormal: <>, <> 
	Oct 29 14:16:56 srvoracle slapd[21877]: do_bind: version=3 dn=""
method=128 
	Oct 29 14:16:56 srvoracle slapd[21877]: conn=0 op=0 BIND dn=""
method=128 
	Oct 29 14:16:56 srvoracle slapd[21877]: send_ldap_result: conn=0
op=0 p=3 
	Oct 29 14:16:56 srvoracle slapd[21877]: send_ldap_result: err=0
matched="" text="" 
	Oct 29 14:16:56 srvoracle slapd[21877]: send_ldap_response: msgid=1
tag=97 err=0 
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: activity on:
	Oct 29 14:16:56 srvoracle slapd[21877]:  9r
	Oct 29 14:16:56 srvoracle slapd[21877]:  
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: read activity on 9 
	Oct 29 14:16:56 srvoracle slapd[21877]: connection_get(9) 
	Oct 29 14:16:56 srvoracle slapd[21877]: connection_get(9): got
connid=0 
	Oct 29 14:16:56 srvoracle slapd[21877]: connection_read(9): checking
for input on id=0 
	Oct 29 14:16:56 srvoracle slapd[21877]: connection_input: conn=0
deferring operation: binding 
	Oct 29 14:16:56 srvoracle slapd[21877]: conn=0 op=0 RESULT tag=97
err=0 text= 
	Oct 29 14:16:56 srvoracle slapd[21877]: do_bind: v3 anonymous bind 
	Oct 29 14:16:56 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:16:56 srvoracle slapd[21877]: do_search 
	Oct 29 14:16:56 srvoracle slapd[21877]: >>> dnPrettyNormal:
<dc=calu,dc=com,dc=br> 
	Oct 29 14:16:56 srvoracle slapd[21877]: <<< dnPrettyNormal:
<dc=calu,dc=com,dc=br>, <dc=calu,dc=com,dc=br> 
	Oct 29 14:16:56 srvoracle slapd[21877]: SRCH "dc=calu,dc=com,dc=br"
2 0
	Oct 29 14:16:56 srvoracle slapd[21877]:     1 0 0 
	Oct 29 14:16:56 srvoracle slapd[21877]: begin get_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: end get_filter 0 
	Oct 29 14:16:56 srvoracle slapd[21877]:     filter: (uid=adriela) 
	Oct 29 14:16:56 srvoracle slapd[21877]:     attrs:
	Oct 29 14:16:56 srvoracle slapd[21877]:  
	Oct 29 14:16:56 srvoracle slapd[21877]: conn=0 op=1 SRCH
base="dc=calu,dc=com,dc=br" scope=2 deref=0 filter="(uid=adriela)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: ==> limits_get: conn=0 op=1
dn="[anonymous]" 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_search 
	Oct 29 14:16:56 srvoracle slapd[21877]:
bdb_dn2entry("dc=calu,dc=com,dc=br") 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000001 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: search_candidates:
base="dc=calu,dc=com,dc=br" (0x00000001) scope=2 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2idl(
"dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_filter_candidates 
	Oct 29 14:16:56 srvoracle slapd[21877]: ^IAND 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_list_candidates 0xa0 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_filter_candidates 
	Oct 29 14:16:56 srvoracle slapd[21877]: ^IOR 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_list_candidates 0xa1 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_filter_candidates 
	Oct 29 14:16:56 srvoracle slapd[21877]: ^IEQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_equality_candidates
(objectClass) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => key_read 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_idl_fetch_key:
[b49d1940] 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_index_read: failed
(-30990) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_equality_candidates:
id=0, first=0, last=0 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_filter_candidates:
id=0 first=0 last=0 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_filter_candidates 
	Oct 29 14:16:56 srvoracle slapd[21877]: ^IEQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_equality_candidates
(uid) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_equality_candidates:
(uid) index_param failed (18) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_filter_candidates:
id=-1 first=1 last=104 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_list_candidates:
id=-1 first=1 last=104 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_filter_candidates:
id=-1 first=1 last=104 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_list_candidates:
id=-1 first=1 last=104 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_filter_candidates:
id=-1 first=1 last=104 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search_candidates: id=-1
first=1 last=104 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 1 does not match
filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"cn=ldapsync,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(cn=ldapsync,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"cn=ldapsync,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000002 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"cn=Manager,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(cn=Manager,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"cn=manager,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000003 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "cn=Manager,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 3 does not match
filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000004 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 4 does not match
filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"ou=Geral,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(ou=Geral,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"ou=geral,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000005 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "ou=Geral,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 5 does not match
filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=root,ou=Geral,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=root,ou=Geral,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=root,ou=geral,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000006 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=root,ou=Geral,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 6 does not match
filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=bin,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=bin,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=bin,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000008 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=bin,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 8 does not match
filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=daemon,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=daemon,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=daemon,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000009 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=daemon,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 9 does not match
filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=adm,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=adm,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=adm,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000a 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=adm,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 10 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=lp,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=lp,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=lp,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000b 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=lp,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 11 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=sync,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=sync,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=sync,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000c 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=sync,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 12 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=shutdown,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=shutdown,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=shutdown,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000d 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=shutdown,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 13 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=halt,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=halt,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=halt,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000e 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=halt,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 14 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=mail,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=mail,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=mail,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000000f 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=mail,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 15 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=news,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=news,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=news,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000010 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=news,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 16 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=uucp,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=uucp,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=uucp,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000011 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=uucp,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 17 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=operator,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=operator,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=operator,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000012 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=operator,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 18 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=games,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=games,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=games,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000013 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=games,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 19 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=gopher,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=gopher,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=gopher,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000014 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=gopher,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 20 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=ftp,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=ftp,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=ftp,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000015 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=ftp,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 21 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=nobody,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=nobody,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=nobody,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000016 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=nobody,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 22 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=rpm,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=rpm,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=rpm,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000017 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=rpm,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 23 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=vcsa,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=vcsa,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=vcsa,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000018 
	Oct 29 14:16:56 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:56 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: search
access to "uid=vcsa,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:56 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:56 srvoracle slapd[21877]: bdb_search: 24 does not
match filter 
	Oct 29 14:16:56 srvoracle slapd[21877]: entry_decode:
"uid=nscd,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:56 srvoracle slapd[21877]: <=
entry_decode(uid=nscd,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:56 srvoracle slapd[21877]: => bdb_dn2id(
"uid=nscd,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000019 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=nscd,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 25 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=sshd,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=sshd,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=sshd,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001a 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=sshd,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 26 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=rpc,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=rpc,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=rpc,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001b 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=rpc,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 27 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=rpcuser,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=rpcuser,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=rpcuser,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001c 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=rpcuser,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 28 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=nfsnobody,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=nfsnobody,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=nfsnobody,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001d 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=nfsnobody,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 29 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=mailnull,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=mailnull,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=mailnull,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001e 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=mailnull,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 30 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=smmsp,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=smmsp,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=smmsp,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000001f 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=smmsp,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 31 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=pcap,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=pcap,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=pcap,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000020 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=pcap,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 32 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=apache,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=apache,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=apache,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000021 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=apache,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 33 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=xfs,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=xfs,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=xfs,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000022 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=xfs,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 34 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=named,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=named,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=named,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000023 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=named,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 35 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=ntp,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=ntp,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=ntp,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000024 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=ntp,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 36 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=gdm,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=gdm,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=gdm,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000025 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=gdm,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 37 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=desktop,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=desktop,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=desktop,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000026 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=desktop,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 38 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=netdump,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=netdump,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=netdump,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000027 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=netdump,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 39 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=oracle,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=oracle,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=oracle,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000028 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=oracle,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 40 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=marcor,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=marcor,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=marcor,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x00000029 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=marcor,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 41 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=eltonc,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=eltonc,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=eltonc,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000002a 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=eltonc,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 42 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000002b 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 6 
	Oct 29 14:16:57 srvoracle slapd[21877]: => send_search_entry:
dn="uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "entry" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "cn" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "objectClass"
requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "userPassword"
requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "shadowLastChange"
requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "shadowMax"
requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "shadowWarning"
requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "uidNumber"
requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "gidNumber"
requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "homeDirectory"
requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: read
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "gecos" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: conn=0 op=1 ENTRY
dn="uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= send_search_entry 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=anar,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=anar,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=anar,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000002c 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=anar,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 44 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=balanca,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=balanca,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=balanca,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000002d 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: search
access to "uid=balanca,ou=usuarios,dc=calu,dc=com,dc=br" "uid" requested 
	Oct 29 14:16:57 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= test_filter 5 
	Oct 29 14:16:57 srvoracle slapd[21877]: bdb_search: 45 does not
match filter 
	Oct 29 14:16:57 srvoracle slapd[21877]: entry_decode:
"uid=cassiov,ou=usuarios,dc=calu,dc=com,dc=br" 
	Oct 29 14:16:57 srvoracle slapd[21877]: <=
entry_decode(uid=cassiov,ou=usuarios,dc=calu,dc=com,dc=br) 
	Oct 29 14:16:57 srvoracle slapd[21877]: => bdb_dn2id(
"uid=cassiov,ou=usuarios,dc=calu,dc=com,dc=br" ) 
	Oct 29 14:16:57 srvoracle slapd[21877]: <= bdb_dn2id: got
id=0x0000002e 
	Oct 29 14:16:57 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:16:57 srvoracle slapd[21877]:     EQUALITY 


	...


	Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: conn=0
op=1 p=3 
	Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: err=0
matched="" text="" 
	Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_response: msgid=2
tag=101 err=0 
	Oct 29 14:16:58 srvoracle slapd[21877]: conn=0 op=1 SEARCH RESULT
tag=101 err=0 nentries=1 text= 
	Oct 29 14:16:58 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:16:58 srvoracle slapd[21877]: daemon: activity on:
	Oct 29 14:16:58 srvoracle slapd[21877]:  9r
	Oct 29 14:16:58 srvoracle slapd[21877]:  
	Oct 29 14:16:58 srvoracle slapd[21877]: daemon: read activity on 9 
	Oct 29 14:16:58 srvoracle slapd[21877]: connection_get(9) 
	Oct 29 14:16:58 srvoracle slapd[21877]: connection_get(9): got
connid=0 
	Oct 29 14:16:58 srvoracle slapd[21877]: connection_read(9): checking
for input on id=0 
	Oct 29 14:16:58 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable) 
	Oct 29 14:16:58 srvoracle slapd[21877]: do_bind 
	Oct 29 14:16:58 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:16:58 srvoracle slapd[21877]: >>> dnPrettyNormal:
<uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br> 
	Oct 29 14:16:58 srvoracle slapd[21877]: <<< dnPrettyNormal:
<uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br>,
<uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br> 
	Oct 29 14:16:58 srvoracle slapd[21877]: do_bind: version=3
dn="uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" method=128 
	Oct 29 14:16:58 srvoracle slapd[21877]: conn=0 op=2 BIND
dn="uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" method=128 
	Oct 29 14:16:58 srvoracle slapd[21877]: ==> bdb_bind: dn:
uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br 
	Oct 29 14:16:58 srvoracle slapd[21877]:
bdb_dn2entry("uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br") 
	Oct 29 14:16:58 srvoracle slapd[21877]: => access_allowed: auth
access to "uid=adriela,ou=usuarios,dc=calu,dc=com,dc=br" "userPassword"
requested 
	Oct 29 14:16:58 srvoracle slapd[21877]: => access_allowed: backend
default auth access granted to "(anonymous)" 
	Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: conn=0
op=2 p=3 
	Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: err=49
matched="" text="" 
	Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_response: msgid=3
tag=97 err=49 
	Oct 29 14:16:58 srvoracle slapd[21877]: conn=0 op=2 RESULT tag=97
err=49 text= 
	Oct 29 14:16:58 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:16:58 srvoracle slapd[21877]: daemon: activity on:
	Oct 29 14:16:58 srvoracle slapd[21877]:  9r
	Oct 29 14:16:58 srvoracle slapd[21877]:  
	Oct 29 14:16:58 srvoracle slapd[21877]: daemon: read activity on 9 
	Oct 29 14:16:58 srvoracle slapd[21877]: connection_get(9) 
	Oct 29 14:16:58 srvoracle slapd[21877]: connection_get(9): got
connid=0 
	Oct 29 14:16:58 srvoracle slapd[21877]: connection_read(9): checking
for input on id=0 
	Oct 29 14:16:58 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable) 
	Oct 29 14:16:58 srvoracle slapd[21877]: do_bind 
	Oct 29 14:16:58 srvoracle slapd[21877]: >>> dnPrettyNormal: <> 
	Oct 29 14:16:58 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:16:58 srvoracle slapd[21877]: <<< dnPrettyNormal: <>, <> 
	Oct 29 14:16:58 srvoracle slapd[21877]: do_bind: version=3 dn=""
method=128 
	Oct 29 14:16:58 srvoracle slapd[21877]: conn=0 op=3 BIND dn=""
method=128 
	Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: conn=0
op=3 p=3 
	Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_result: err=0
matched="" text="" 
	Oct 29 14:16:58 srvoracle slapd[21877]: send_ldap_response: msgid=4
tag=97 err=0 
	Oct 29 14:16:58 srvoracle slapd[21877]: conn=0 op=3 RESULT tag=97
err=0 text= 
	Oct 29 14:16:58 srvoracle slapd[21877]: do_bind: v3 anonymous bind 
	Oct 29 14:17:05 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:17:05 srvoracle slapd[21877]: daemon: activity on:
	Oct 29 14:17:05 srvoracle slapd[21877]:  9r
	Oct 29 14:17:05 srvoracle slapd[21877]:  
	Oct 29 14:17:05 srvoracle slapd[21877]: daemon: read activity on 9 
	Oct 29 14:17:05 srvoracle slapd[21877]: connection_get(9) 
	Oct 29 14:17:05 srvoracle slapd[21877]: connection_get(9): got
connid=0 
	Oct 29 14:17:05 srvoracle slapd[21877]: connection_read(9): checking
for input on id=0 
	Oct 29 14:17:05 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=0 (Success) 
	Oct 29 14:17:05 srvoracle slapd[21877]: connection_read(9): input
error=-2 id=0, closing. 
	Oct 29 14:17:05 srvoracle slapd[21877]: connection_closing: readying
conn=0 sd=9 for close 
	Oct 29 14:17:05 srvoracle slapd[21877]: connection_close: conn=0
sd=9 
	Oct 29 14:17:05 srvoracle slapd[21877]: daemon: removing 9 
	Oct 29 14:17:05 srvoracle slapd[21877]: conn=0 fd=9 closed 
	Oct 29 14:17:05 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:17:05 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:17:05 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 





############ REMOTE HOST
	[root@andromeda local]# ldapsearch -Uadriela -b
"dc=calu,dc=com,dc=br" "(uid=adriela)"
	SASL/DIGEST-MD5 authentication started
	Please enter your password:
	ldap_sasl_interactive_bind_s: Can't contact LDAP server
	[root@andromeda local]#


############ SERVER - /var/log/slapd.log
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: new connection on 9 
	Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 fd=9 ACCEPT from
IP=10.10.0.253:1129 (IP=0.0.0.0:389) 
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: added 9r 
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on:
	Oct 29 14:42:16 srvoracle slapd[21877]:  
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on:
	Oct 29 14:42:16 srvoracle slapd[21877]:  9r
	Oct 29 14:42:16 srvoracle slapd[21877]:  
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: read activity on 9 
	Oct 29 14:42:16 srvoracle slapd[21877]: connection_get(9) 
	Oct 29 14:42:16 srvoracle slapd[21877]: connection_get(9): got
connid=1 
	Oct 29 14:42:16 srvoracle slapd[21877]: connection_read(9): checking
for input on id=1 
	Oct 29 14:42:16 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable) 
	Oct 29 14:42:16 srvoracle slapd[21877]: do_search 
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:42:16 srvoracle slapd[21877]: >>> dnPrettyNormal: <> 
	Oct 29 14:42:16 srvoracle slapd[21877]: <<< dnPrettyNormal: <>, <> 
	Oct 29 14:42:16 srvoracle slapd[21877]: SRCH "" 0 0
	Oct 29 14:42:16 srvoracle slapd[21877]:     0 0 0 
	Oct 29 14:42:16 srvoracle slapd[21877]: begin get_filter 
	Oct 29 14:42:16 srvoracle slapd[21877]: PRESENT 
	Oct 29 14:42:16 srvoracle slapd[21877]: end get_filter 0 
	Oct 29 14:42:16 srvoracle slapd[21877]:     filter: (objectClass=*) 
	Oct 29 14:42:16 srvoracle slapd[21877]:     attrs:
	Oct 29 14:42:16 srvoracle slapd[21877]:  supportedSASLMechanisms
	Oct 29 14:42:16 srvoracle slapd[21877]:  
	Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 op=0 SRCH base=""
scope=0 deref=0 filter="(objectClass=*)" 
	Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 op=0 SRCH
attr=supportedSASLMechanisms 
	Oct 29 14:42:16 srvoracle slapd[21877]: => test_filter 
	Oct 29 14:42:16 srvoracle slapd[21877]:     PRESENT 
	Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: search
access to "" "objectClass" requested 
	Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: backend
default search access granted to "(anonymous)" 
	Oct 29 14:42:16 srvoracle slapd[21877]: <= test_filter 6 
	Oct 29 14:42:16 srvoracle slapd[21877]: => send_search_entry: dn="" 
	Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: read
access to "" "entry" requested 
	Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: read
access to "" "supportedSASLMechanisms" requested 
	Oct 29 14:42:16 srvoracle slapd[21877]: => access_allowed: backend
default read access granted to "(anonymous)" 
	Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 op=0 ENTRY dn="" 
	Oct 29 14:42:16 srvoracle slapd[21877]: <= send_search_entry 
	Oct 29 14:42:16 srvoracle slapd[21877]: send_ldap_result: conn=1
op=0 p=3 
	Oct 29 14:42:16 srvoracle slapd[21877]: send_ldap_result: err=0
matched="" text="" 
	Oct 29 14:42:16 srvoracle slapd[21877]: send_ldap_response: msgid=1
tag=101 err=0 
	Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 op=0 SEARCH RESULT
tag=101 err=0 nentries=1 text= 
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: activity on:
	Oct 29 14:42:16 srvoracle slapd[21877]:  9r
	Oct 29 14:42:16 srvoracle slapd[21877]:  
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: read activity on 9 
	Oct 29 14:42:16 srvoracle slapd[21877]: connection_get(9) 
	Oct 29 14:42:16 srvoracle slapd[21877]: connection_get(9): got
connid=1 
	Oct 29 14:42:16 srvoracle slapd[21877]: connection_read(9): checking
for input on id=1 
	Oct 29 14:42:16 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable) 
	Oct 29 14:42:16 srvoracle slapd[21877]: do_bind 
	Oct 29 14:42:16 srvoracle slapd[21877]: >>> dnPrettyNormal: <> 
	Oct 29 14:42:16 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:42:16 srvoracle slapd[21877]: <<< dnPrettyNormal: <>, <> 
	Oct 29 14:42:16 srvoracle slapd[21877]: do_sasl_bind: dn () mech
DIGEST-MD5 
	Oct 29 14:42:16 srvoracle slapd[21877]: conn=1 op=1 BIND dn=""
method=163 
	Oct 29 14:42:16 srvoracle slapd[21877]: ==> sasl_bind: dn=""
mech=DIGEST-MD5 datalen=0 
	Oct 29 14:42:16 srvoracle slapd[21877]: SASL [conn=1] Debug:
DIGEST-MD5 server step 1 
	Oct 29 14:42:16 srvoracle slapd[21877]: send_ldap_sasl: err=14
len=182 
	Oct 29 14:42:16 srvoracle slapd[21877]: send_ldap_response: msgid=2
tag=97 err=14 
	Oct 29 14:42:16 srvoracle slapd[21877]: <== slap_sasl_bind: rc=14 
	Oct 29 14:42:19 srvoracle slapd[21877]: daemon: activity on 1
descriptors 
	Oct 29 14:42:19 srvoracle slapd[21877]: daemon: activity on:
	Oct 29 14:42:19 srvoracle slapd[21877]:  9r
	Oct 29 14:42:19 srvoracle slapd[21877]:  
	Oct 29 14:42:19 srvoracle slapd[21877]: daemon: read activity on 9 
	Oct 29 14:42:19 srvoracle slapd[21877]: connection_get(9) 
	Oct 29 14:42:19 srvoracle slapd[21877]: connection_get(9): got
connid=1 
	Oct 29 14:42:19 srvoracle slapd[21877]: connection_read(9): checking
for input on id=1 
	Oct 29 14:42:19 srvoracle slapd[21877]: ber_get_next on fd 9 failed
errno=11 (Resource temporarily unavailable) 
	Oct 29 14:42:19 srvoracle slapd[21877]: do_bind 
	Oct 29 14:42:19 srvoracle slapd[21877]: >>> dnPrettyNormal: <> 
	Oct 29 14:42:19 srvoracle slapd[21877]: daemon: select: listen=6
active_threads=0 tvp=NULL 
	Oct 29 14:42:19 srvoracle slapd[21877]: <<< dnPrettyNormal: <>, <> 
	Oct 29 14:42:19 srvoracle slapd[21877]: do_sasl_bind: dn () mech
DIGEST-MD5 
	Oct 29 14:42:19 srvoracle slapd[21877]: conn=1 op=2 BIND dn=""
method=163 
	Oct 29 14:42:19 srvoracle slapd[21877]: ==> sasl_bind: dn=""
mech=<continuing> datalen=277 
	Oct 29 14:42:19 srvoracle slapd[21877]: SASL [conn=1] Debug:
DIGEST-MD5 server step 2 
	Oct 29 14:42:19 srvoracle slapd[21877]: SASL Canonicalize [conn=1]:
authcid="adriela" 
	Oct 29 14:42:19 srvoracle slapd[21877]: slap_sasl_getdn: id=adriela
[len=7] 
	Oct 29 14:42:19 srvoracle slapd[21877]: slap_sasl_getdn: u:id
converted to uid=adriela,cn=DIGEST-MD5,cn=auth 
	Oct 29 14:42:19 srvoracle slapd[21877]: >>> dnNormalize:
<uid=adriela,cn=DIGEST-MD5,cn=auth> 
	Oct 29 14:42:19 srvoracle slapd[21877]: <<< dnNormalize:
<uid=adriela,cn=digest-md5,cn=auth> 
	Oct 29 14:42:19 srvoracle slapd[21877]: ==>slap_sasl2dn: converting
SASL name uid=adriela,cn=digest-md5,cn=auth to a DN 
	Oct 29 14:42:19 srvoracle slapd[21877]: slap_sasl_regexp: converting
SASL name uid=adriela,cn=digest-md5,cn=auth 
	Oct 29 14:42:19 srvoracle slapd[21877]: <==slap_sasl2dn: Converted
SASL name to <nothing> 
	Oct 29 14:42:19 srvoracle slapd[21877]: SASL Canonicalize [conn=1]:
slapAuthcDN="uid=adriela,cn=digest-md5,cn=auth" 




In fact, I don't know if I'm in front of two different problems or a single
one, because of the bolded message in the log file (ber_get_next on fd 9
failed errno=11 (Resource temporarily unavailable) ).

As the remote message was about connection error to server, I thought it
could be related to SSL. But I've compiled OpenLDAP with SSL support ***just
in case*** I'd need it in the future. So I didn't create or setup OpenSSL
server. Is it related to the problem? And other question: anybody knows
which log level I can use to debug those "authentication" problems?

Regards,

Bruno.

-- 
Internal Virus Database is out-of-date.
Checked by AVG Anti-Virus (http://www.grisoft.com).
Version: 7.0.279 / Virus Database: 264.10.2 - Release Date: 08/10/04