[Date Prev][Date Next]
Re: slapd breaks NSS, NSS breaks slapd
This thread has gone off-topic and is now closed. I suggest those
wanting to discuss NSS/LDAP and NSS/LDAPD take their discussions to
lists intended to support these software components, or take them to
the openldap-technical list which allows a broader range of topics
than this list. Thanks, your moderator.
On Aug 13, 2008, at 6:33 AM, Dan White wrote:
Emmanuel Dreyfus wrote:
On Wed, Aug 13, 2008 at 09:44:23AM +0200, Buchan Milne wrote:
Actually, if that were the case, I think a suitable timelimit in
nss_ldap's ldap.conf should prevent any problems, but it doesn't
due to nss_ldap's (IMHO) braindead defaults.
Such an approach leads to even worse problems with other
applications: sendmail performs NSS lookups for local delivery
(when looking for .forward),
and it does it with getpwnam().
getpwnam() does not set errno, the caller has no way of
distinguishing an inexesting entry or an unreachable NSS source. If
you use getpwnam_r(),
errno is set on failure and you can make the difference. But
sendmail uses getpwnam().
So if NSS returns no answer because of a bind or search tiemout,
will consider the recipient does not exit and will bounce the
This is off-topic, so if the reader is looking for a workaround in
sendmail config, (s)he should look for my post on comp.mail.sendmail
thi smorning. But that is not fully satisfying, and I am still
for a really reliable setup.
If you haven't already, you may want to give nss-ldapd a look: