[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: (ITS#6519) syncprov sends bogus cookie on accesslog purge



--On Tuesday, April 13, 2010 9:07 PM +0000 openldap-its@OpenLDAP.org wrote:

Here is the -d -1 output from the provider during this time period.  You 
can clearly see part way through where the empty cookie is sent after a 
delete operation is completed.

  01c0:  69 6c 31 24 04 22 75 73  65 72 2e 32 37 36 40 66   il1$."user.276@f
  01d0:  72 65 65 6c 61 6e 63 65  72 2e 6c 61 62 2e 7a 69   reelancer.lab.zi
  01e0:  6d 62 72 61 2e 63 6f 6d  30 11 04 03 75 69 64 31   mbra.com0...uid1
  01f0:  0a 04 08 75 73 65 72 2e  32 37 36 30 43 04 0b 6f   ...user.2760C..o
  0200:  62 6a 65 63 74 43 6c 61  73 73 31 34 04 14 6f 72   bjectClass14..or
  0210:  67 61 6e 69 7a 61 74 69  6f 6e 61 6c 50 65 72 73   ganizationalPers
  0220:  6f 6e 04 0d 7a 69 6d 62  72 61 41 63 63 6f 75 6e   on..zimbraAccoun
  0230:  74 04 0d 61 6d 61 76 69  73 41 63 63 6f 75 6e 74   t..amavisAccount
  0240:  30 2f 04 1a 7a 69 6d 62  72 61 50 61 73 73 77 6f   0/..zimbraPasswo
  0250:  72 64 4d 6f 64 69 66 69  65 64 54 69 6d 65 31 11   rdModifiedTime1.
  0260:  04 0f 32 30 31 30 30 34  31 33 32 30 34 35 35 34   ..20100413204554
  0270:  5a 30 10 04 02 63 6e 31  0a 04 08 75 73 65 72 2e   Z0...cn1...user.
  0280:  32 37 36 30 2d 04 0e 7a  69 6d 62 72 61 4d 61 69   2760-..zimbraMai
  0290:  6c 48 6f 73 74 31 1b 04  19 66 72 65 65 6c 61 6e   lHost1...freelan
  02a0:  63 65 72 2e 6c 61 62 2e  7a 69 6d 62 72 61 2e 63   cer.lab.zimbra.c
  02b0:  6f 6d                                              om
<= send_search_entry: conn 2605 exit.
send_ldap_result: conn=2605 op=3 p=3
send_ldap_result: err=0 matched="" text=""
send_ldap_response: msgid=4 tag=101 err=0
ber_flush2: 14 bytes to sd 20
  0000:  30 0c 02 01 04 65 07 0a  01 00 04 00 04 00         0....e........
tls_write: want=35, written=35
  0000:  17 03 01 00 1e 59 2c c6  87 d7 64 fe a5 b5 74 e9   .....Y,...d...t.
  0010:  ff cf e6 00 22 30 dc 8b  ed 0f c2 c9 aa d7 64 43   ...."0........dC
  0020:  9a d2 3a                                           ..:
ldap_write: want=14, written=14
  0000:  30 0c 02 01 04 65 07 0a  01 00 04 00 04 00         0....e........
conn=2605 op=3 SEARCH RESULT tag=101 err=0 nentries=1 text=
daemon: activity on 1 descriptor
daemon: activity on: 20r
daemon: read active on 20
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
connection_get(20)
connection_get(20): got connid=2605
connection_read(20): checking for input on id=2605
ber_get_next
tls_read: want=5, got=5
  0000:  15 03 01 00 12                                     .....
tls_read: want=18, got=18
  0000:  07 3e f1 34 3c 74 48 e4  2d 64 da bf 16 b2 f0 e3   .>.4<tH.-d......
  0010:  82 1f                                              ..
TLS trace: SSL3 alert read:warning:close notify
ldap_read: want=8, got=0

ber_get_next on fd 20 failed errno=0 (Success)
connection_read(20): input error=-2 id=2605, closing.
connection_closing: readying conn=2605 sd=20 for close
connection_close: conn=2605 sd=20
daemon: activity on 1 descriptor
daemon: activity on:
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: removing 20
tls_write: want=23, written=23
  0000:  15 03 01 00 12 d7 55 9d  59 8c 18 96 64 bf e7 f9   ......U.Y...d...
  0010:  9e 2c 0a 91 c4 9d ba                               .,.....
TLS trace: SSL3 alert write:warning:close notify
conn=2605 fd=20 closed (connection lost)
daemon: activity on 1 descriptor
daemon: activity on: 38r
daemon: read active on 38
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
connection_get(38)
connection_get(38): got connid=2603
connection_read(38): checking for input on id=2603
ber_get_next
tls_read: want=5, got=5
  0000:  15 03 01 00 12                                     .....
tls_read: want=18, got=18
  0000:  81 9f e4 91 64 6e bc c8  ba 53 be e0 5e 5e 75 f9   ....dn...S..^^u.
  0010:  ac e4                                              ..
TLS trace: SSL3 alert read:warning:close notify
ldap_read: want=8, got=0

ber_get_next on fd 38 failed errno=0 (Success)
connection_read(38): input error=-2 id=2603, closing.
connection_closing: readying conn=2603 sd=38 for close
connection_close: conn=2603 sd=38
daemon: removing 38
tls_write: want=23, written=23
  0000:  15 03 01 00 12 50 be 29  9e e3 e6 b8 88 55 46 64   .....P.).....UFd
  0010:  08 d4 83 45 e4 df b1                               ...E...
TLS trace: SSL3 alert write:warning:close notify
conn=2603 fd=38 closed (connection lost)
daemon: activity on 1 descriptor
daemon: activity on:
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: activity on 1 descriptor
daemon: activity on: 37r
daemon: read active on 37
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
connection_get(37)
connection_get(37): got connid=2602
connection_read(37): checking for input on id=2602
ber_get_next
tls_read: want=5, got=5
  0000:  15 03 01 00 12                                     .....
tls_read: want=18, got=18
  0000:  b8 e7 6e 24 27 de cc 33  fd 77 b9 29 8a a4 5e 79   ..n$'..3.w.)..^y
  0010:  53 7c                                              S|
TLS trace: SSL3 alert read:warning:close notify
ldap_read: want=8, got=0

ber_get_next on fd 37 failed errno=0 (Success)
connection_read(37): input error=-2 id=2602, closing.
connection_closing: readying conn=2602 sd=37 for close
connection_close: conn=2602 sd=37
daemon: removing 37
tls_write: want=23, written=23
  0000:  15 03 01 00 12 7c e4 28  fb 15 b4 f9 dc 69 44 4d   .....|.(.....iDM
  0010:  40 21 1b 78 7f 41 35                               @!.x.A5
TLS trace: SSL3 alert write:warning:close notify
conn=2602 fd=37 closed (connection lost)
daemon: activity on 1 descriptor
daemon: activity on:
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
=> hdb_search
bdb_dn2entry("cn=accesslog")
=> access_allowed: search access to "cn=accesslog" "entry" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
search_candidates: base="cn=accesslog" (0x00000001) scope=1
=> hdb_dn2idl("cn=accesslog")
=> bdb_filter_candidates
        AND
=> bdb_list_candidates 0xa0
=> bdb_filter_candidates
        OR
=> bdb_list_candidates 0xa1
=> bdb_filter_candidates
        EQUALITY
=> bdb_equality_candidates (objectClass)
=> key_read
bdb_idl_fetch_key: [b49d1940]
<= bdb_index_read: failed (-30988)
<= bdb_equality_candidates: id=0, first=0, last=0
<= bdb_filter_candidates: id=0 first=0 last=0
=> bdb_filter_candidates
        LE
=> bdb_inequality_candidates (reqStart)
=> key_read
bdb_idl_fetch_key:
<= bdb_index_read 2 candidates
=> key_read
bdb_idl_fetch_key:
<= bdb_index_read: failed (-30988)
<= bdb_inequality_candidates: id=2, first=9, last=10
<= bdb_filter_candidates: id=2 first=9 last=10
<= bdb_list_candidates: id=2 first=9 last=10
<= bdb_filter_candidates: id=2 first=9 last=10
<= bdb_list_candidates: id=2 first=9 last=10
<= bdb_filter_candidates: id=2 first=9 last=10
bdb_search_candidates: id=2 first=9 last=10
entry_decode: ""
<= entry_decode()
=> test_filter
    LE
=> access_allowed: search access to 
"reqStart=20100413191807.000004Z,cn=accesslog" "reqStart" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
entry_decode: ""
<= entry_decode()
=> test_filter
    LE
=> access_allowed: search access to 
"reqStart=20100413191807.000009Z,cn=accesslog" "reqStart" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
<= test_filter 6
send_ldap_result: conn=-1 op=0 p=0
send_ldap_result: err=0 matched="" text=""
=> bdb_entry_get: ndn: "reqStart=20100413191807.000004Z,cn=accesslog"
=> bdb_entry_get: oc: "(null)", at: "(null)"
bdb_dn2entry("reqStart=20100413191807.000004Z,cn=accesslog")
=> bdb_entry_get: found entry: 
"reqStart=20100413191807.000004Z,cn=accesslog"
bdb_entry_get: rc=0
=> test_filter
    AND
=> test_filter_and
=> test_filter
    EQUALITY
=> access_allowed: search access to 
"reqStart=20100413191807.000004Z,cn=accesslog" "objectClass" requested
=> dn: [1] cn=accesslog
=> acl_get: [1] matched
=> acl_get: [1] attr objectClass
=> acl_mask: access to entry 
"reqStart=20100413191807.000004Z,cn=accesslog", attr "objectClass" requested
=> acl_mask: to value by "uid=zmreplica,cn=admins,cn=zimbra", (=0)
<= check a_dn_pat: uid=zimbra,cn=admins,cn=zimbra
<= check a_dn_pat: cn=config
<= check a_dn_pat: uid=zmreplica,cn=admins,cn=zimbra
<= acl_mask: [3] applying read(=rscxd) (stop)
<= acl_mask: [3] mask: read(=rscxd)
=> slap_access_allowed: search access granted by read(=rscxd)
=> access_allowed: search access granted by read(=rscxd)
<= test_filter 6
=> test_filter
    EQUALITY
=> access_allowed: search access to 
"reqStart=20100413191807.000004Z,cn=accesslog" "reqResult" requested
=> dn: [1] cn=accesslog
=> acl_get: [1] matched
=> acl_get: [1] attr reqResult
=> acl_mask: access to entry 
"reqStart=20100413191807.000004Z,cn=accesslog", attr "reqResult" requested
=> acl_mask: to value by "uid=zmreplica,cn=admins,cn=zimbra", (=0)
<= check a_dn_pat: uid=zimbra,cn=admins,cn=zimbra
<= check a_dn_pat: cn=config
<= check a_dn_pat: uid=zmreplica,cn=admins,cn=zimbra
<= acl_mask: [3] applying read(=rscxd) (stop)
<= acl_mask: [3] mask: read(=rscxd)
=> slap_access_allowed: search access granted by read(=rscxd)
=> access_allowed: search access granted by read(=rscxd)
<= test_filter 6
<= test_filter_and 6
<= test_filter 6
syncprov_matchops: sid ffffffff fscope 1 rc 6
==> hdb_delete: reqStart=20100413191807.000004Z,cn=accesslog
bdb_dn2entry("reqStart=20100413191807.000004Z,cn=accesslog")
=> access_allowed: delete access to "cn=accesslog" "children" requested
<= root access granted
=> access_allowed: delete access granted by manage(=mwrscxd)
=> access_allowed: delete access to 
"reqStart=20100413191807.000004Z,cn=accesslog" "entry" requested
<= root access granted
=> access_allowed: delete access granted by manage(=mwrscxd)
=> hdb_dn2id_delete 0x9: "reqStart=20100413191807.000004Z,cn=accesslog"
<= hdb_dn2id_delete 0x9: 0
=> index_entry_del( 9, "reqStart=20100413191807.000004Z,cn=accesslog" )
=> key_change(DELETE,9)
bdb_idl_delete_key: 9 [66ec5701]
<= key_change 0
=> key_change(DELETE,9)
bdb_idl_delete_key: 9 [98599c51]
<= key_change 0
=> key_change(DELETE,9)
bdb_idl_delete_key: 9 [61e2b421]
<= key_change 0
=> key_change(DELETE,9)
bdb_idl_delete_key: 9 [0096defd]
<= key_change 0
=> key_change(DELETE,9)
bdb_idl_delete_key: 9
<= key_change 0
=> key_change(DELETE,9)
bdb_idl_delete_key: 9
<= key_change 0
=> key_change(DELETE,9)
bdb_idl_delete_key: 9 [80000000]
<= key_change 0
=> key_change(DELETE,9)
bdb_idl_delete_key: 9
<= key_change 0
<= index_entry_del( 9, "reqStart=20100413191807.000004Z,cn=accesslog" ) 
success
====> bdb_cache_delete( 9 )
hdb_delete: deleted id=00000009 
dn="reqStart=20100413191807.000004Z,cn=accesslog"
send_ldap_result: conn=-1 op=0 p=0
send_ldap_result: err=0 matched="" text=""
syncprov_sendresp: cookie=
=> send_search_entry: conn 1013 
dn="reqStart=20100413191807.000004Z,cn=accesslog"
=> access_allowed: read access to 
"reqStart=20100413191807.000004Z,cn=accesslog" "entry" requested
=> dn: [1] cn=accesslog
=> acl_get: [1] matched
=> acl_get: [1] attr entry
=> acl_mask: access to entry 
"reqStart=20100413191807.000004Z,cn=accesslog", attr "entry" requested
=> acl_mask: to all values by "uid=zmreplica,cn=admins,cn=zimbra", (=0)
<= check a_dn_pat: uid=zimbra,cn=admins,cn=zimbra
<= check a_dn_pat: cn=config
<= check a_dn_pat: uid=zmreplica,cn=admins,cn=zimbra
<= acl_mask: [3] applying read(=rscxd) (stop)
<= acl_mask: [3] mask: read(=rscxd)
=> slap_access_allowed: read access granted by read(=rscxd)
=> access_allowed: read access granted by read(=rscxd)
conn=1013 op=2 ENTRY dn="reqStart=20100413191807.000004Z,cn=accesslog"
ber_flush2: 112 bytes to sd 18
  0000:  30 6e 02 01 03 64 30 04  2c 72 65 71 53 74 61 72   0n...d0.,reqStar
  0010:  74 3d 32 30 31 30 30 34  31 33 31 39 31 38 30 37   t=20100413191807
  0020:  2e 30 30 30 30 30 34 5a  2c 63 6e 3d 61 63 63 65   .000004Z,cn=acce
  0030:  73 73 6c 6f 67 30 00 a0  37 30 35 04 18 31 2e 33   sslog0..705..1.3
  0040:  2e 36 2e 31 2e 34 2e 31  2e 34 32 30 33 2e 31 2e   .6.1.4.1.4203.1.
  0050:  39 2e 31 2e 32 04 19 30  17 0a 01 03 04 10 43 30   9.1.2..0......C0
  0060:  b3 35 9f 63 47 af b6 f3  66 1b e4 76 6c 54 04 00   .5.cG...f..vlT..
tls_write: want=186, written=186
  0000:  17 03 01 00 20 77 40 e5  e4 99 b3 f0 07 5a 3d c9   .... w@......Z=.
  0010:  11 4b 1d c2 97 45 d2 d1  d6 52 c9 89 74 37 b7 c9   .K...E...R..t7..
  0020:  fd 72 3d cf 8d 17 03 01  00 90 f3 dc 6b 91 cd f5   .r=.........k...
  0030:  6a 87 21 7c 61 fa 8e 69  ea f8 21 9e ec ea 85 a2   j.!|a..i..!.....
  0040:  9d f0 8a 32 82 66 62 9c  bf 15 00 02 ef c0 d0 34   ...2.fb........4
  0050:  16 4e 2d a6 25 e3 5f 0d  95 68 2d 7b 74 8f 41 a8   .N-.%._..h-{t.A.
  0060:  4b 51 93 78 46 d6 8e 44  33 12 44 05 6c 37 09 03   KQ.xF..D3.D.l7..
  0070:  b5 d3 13 58 c2 7a 82 9e  3e 0e 4d 6f f0 90 a7 3d   ...X.z..>.Mo...=
  0080:  4b 5f 44 5f 7d 3a cc 28  93 b6 3f 37 05 c8 c6 77   K_D_}:.(..?7...w
  0090:  f4 40 72 97 ea a9 0e a0  ab 98 09 5c b8 08 54 a7   .@r........\..T.
  00a0:  7d 2e 72 6f 5f 14 db e4  0b bc 0b ca 1f 3e ae 83   }.ro_........>..
  00b0:  37 51 c5 82 44 b7 b4 00  9a 35                     7Q..D....5
ldap_write: want=112, written=112
  0000:  30 6e 02 01 03 64 30 04  2c 72 65 71 53 74 61 72   0n...d0.,reqStar
  0010:  74 3d 32 30 31 30 30 34  31 33 31 39 31 38 30 37   t=20100413191807
  0020:  2e 30 30 30 30 30 34 5a  2c 63 6e 3d 61 63 63 65   .000004Z,cn=acce
  0030:  73 73 6c 6f 67 30 00 a0  37 30 35 04 18 31 2e 33   sslog0..705..1.3
  0040:  2e 36 2e 31 2e 34 2e 31  2e 34 32 30 33 2e 31 2e   .6.1.4.1.4203.1.
  0050:  39 2e 31 2e 32 04 19 30  17 0a 01 03 04 10 43 30   9.1.2..0......C0
  0060:  b3 35 9f 63 47 af b6 f3  66 1b e4 76 6c 54 04 00   .5.cG...f..vlT..
<= send_search_entry: conn 1013 exit.
=> bdb_entry_get: ndn: "reqStart=20100413191807.000009Z,cn=accesslog"
=> bdb_entry_get: oc: "(null)", at: "(null)"
bdb_dn2entry("reqStart=20100413191807.000009Z,cn=accesslog")
=> bdb_entry_get: found entry: 
"reqStart=20100413191807.000009Z,cn=accesslog"
bdb_entry_get: rc=0
=> test_filter
    AND
=> test_filter_and
=> test_filter
    EQUALITY
=> access_allowed: search access to 
"reqStart=20100413191807.000009Z,cn=accesslog" "objectClass" requested
=> dn: [1] cn=accesslog
=> acl_get: [1] matched
=> acl_get: [1] attr objectClass
=> acl_mask: access to entry 
"reqStart=20100413191807.000009Z,cn=accesslog", attr "objectClass" requested
=> acl_mask: to value by "uid=zmreplica,cn=admins,cn=zimbra", (=0)
<= check a_dn_pat: uid=zimbra,cn=admins,cn=zimbra
<= check a_dn_pat: cn=config
<= check a_dn_pat: uid=zmreplica,cn=admins,cn=zimbra
<= acl_mask: [3] applying read(=rscxd) (stop)
<= acl_mask: [3] mask: read(=rscxd)
=> slap_access_allowed: search access granted by read(=rscxd)
=> access_allowed: search access granted by read(=rscxd)
<= test_filter 6
=> test_filter
    EQUALITY
=> access_allowed: search access to 
"reqStart=20100413191807.000009Z,cn=accesslog" "reqResult" requested
=> dn: [1] cn=accesslog
=> acl_get: [1] matched
=> acl_get: [1] attr reqResult
=> acl_mask: access to entry 
"reqStart=20100413191807.000009Z,cn=accesslog", attr "reqResult" requested
=> acl_mask: to value by "uid=zmreplica,cn=admins,cn=zimbra", (=0)
<= check a_dn_pat: uid=zimbra,cn=admins,cn=zimbra
<= check a_dn_pat: cn=config
<= check a_dn_pat: uid=zmreplica,cn=admins,cn=zimbra
<= acl_mask: [3] applying read(=rscxd) (stop)
<= acl_mask: [3] mask: read(=rscxd)
=> slap_access_allowed: search access granted by read(=rscxd)
=> access_allowed: search access granted by read(=rscxd)
<= test_filter 6
<= test_filter_and 6
<= test_filter 6
syncprov_matchops: sid ffffffff fscope 1 rc 6
==> hdb_delete: reqStart=20100413191807.000009Z,cn=accesslog
bdb_dn2entry("reqStart=20100413191807.000009Z,cn=accesslog")
=> access_allowed: delete access to "cn=accesslog" "children" requested
<= root access granted
=> access_allowed: delete access granted by manage(=mwrscxd)
=> access_allowed: delete access to 
"reqStart=20100413191807.000009Z,cn=accesslog" "entry" requested
<= root access granted
=> access_allowed: delete access granted by manage(=mwrscxd)
=> hdb_dn2id_delete 0xa: "reqStart=20100413191807.000009Z,cn=accesslog"
<= hdb_dn2id_delete 0xa: 0
=> index_entry_del( 10, "reqStart=20100413191807.000009Z,cn=accesslog" )
=> key_change(DELETE,a)
bdb_idl_delete_key: a [66ec5701]
<= key_change 0
=> key_change(DELETE,a)
bdb_idl_delete_key: a [98599c51]
<= key_change 0
=> key_change(DELETE,a)
bdb_idl_delete_key: a [61e2b421]
<= key_change 0
=> key_change(DELETE,a)
bdb_idl_delete_key: a [0096defd]
<= key_change 0
=> key_change(DELETE,a)
bdb_idl_delete_key: a
<= key_change 0
=> key_change(DELETE,a)
bdb_idl_delete_key: a
<= key_change 0
=> key_change(DELETE,a)
bdb_idl_delete_key: a [80000000]
<= key_change 0
=> key_change(DELETE,a)
bdb_idl_delete_key: a
<= key_change 0
<= index_entry_del( 10, "reqStart=20100413191807.000009Z,cn=accesslog" ) 
success
====> bdb_cache_delete( 10 )
daemon: activity on 1 descriptor
daemon: activity on: 18r
daemon: read active on 18
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
connection_get(18)
connection_get(18): got connid=1013
connection_read(18): checking for input on id=1013
ber_get_next
tls_read: want=5, got=5
  0000:  17 03 01 00 20                                     ....
tls_read: want=32, got=32
  0000:  d7 e0 2b 7c 92 57 a1 11  a4 0b d8 76 81 f5 15 e7   ..+|.W.....v....
  0010:  b3 58 97 b6 10 65 aa 30  9d 38 e3 2c 90 63 a5 9d   .X...e.0.8.,.c..
tls_read: want=5, got=5
  0000:  17 03 01 00 20                                     ....
tls_read: want=32, got=32
  0000:  2a bd 8d 49 d2 58 87 51  8f b4 32 e7 70 07 8c 13   *..I.X.Q..2.p...
  0010:  1d d2 19 c8 43 a1 fb 28  89 4f cf df a8 58 6c 2a   ....C..(.O...Xl*
ldap_read: want=8, got=7
  0000:  30 05 02 01 04 42 00                               0....B.
ber_get_next: tag 0x30 len 5 contents:
ber_dump: buf=0x3f69170 ptr=0x3f69170 end=0x3f69175 len=5
  0000:  02 01 04 42 00                                     ...B.
op tag 0x42, time 1271191556
ber_get_next
tls_read: want=5, got=5
  0000:  15 03 01 00 20                                     ....
tls_read: want=32, got=32
  0000:  04 7f 9e 27 41 7e af b2  de ec b2 b5 e9 b5 15 d7   ...'A~..........
  0010:  5f 1a 9a 5f 64 8e cf d5  8e a6 d4 e2 8b 4e 27 6e   _.._d........N'n
TLS trace: SSL3 alert read:warning:close notify
ldap_read: want=8, got=0
ber_get_next on fd 18 failed errno=0 (Success)
connection_read(18): input error=-2 id=1013, closing.
connection_closing: readying conn=1013 sd=18 for close
hdb_delete: deleted id=0000000a 
dn="reqStart=20100413191807.000009Z,cn=accesslog"
daemon: activity on 1 descriptor
daemon: activity on:
send_ldap_result: conn=-1 op=0 p=0
connection_close: deferring conn=1013 sd=18
send_ldap_result: err=0 matched="" text=""
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: epoll: listen=8 active_threads=0 tvp=zero
conn=1013 op=3 do_unbind
conn=1013 op=3 UNBIND
hdb_modify: cn=accesslog
bdb_dn2entry("cn=accesslog")
bdb_modify_internal: 0x00000001: cn=accesslog
<= acl_access_allowed: granted to database root
bdb_modify_internal: replace entryCSN
connection_resched: attempting closing conn=1013 sd=18
connection_close: conn=1013 sd=18
=> key_change(DELETE,1)
bdb_idl_delete_key: 1
daemon: removing 18
<= key_change 0
tls_write: want=37, written=37
  0000:  15 03 01 00 20 32 b4 ef  e6 42 1b 72 80 46 e6 b5   .... 2...B.r.F..
  0010:  d5 f4 ad 44 4f 37 eb c5  03 75 69 29 17 f3 be ac   ...DO7...ui)....
  0020:  4e 60 80 e2 4e                                     N`..N
=> key_change(ADD,1)
bdb_idl_insert_key: 1
TLS trace: SSL3 alert write:warning:close notify
<= key_change 0
=> entry_encode(0x00000001):
<= entry_encode(0x00000001):
conn=1013 fd=18 closed


--Quanah

--

Quanah Gibson-Mount
Principal Software Engineer
Zimbra, Inc
--------------------
Zimbra ::  the leader in open source messaging and collaboration