search for: ldap_next_entry

Displaying 6 results from an estimated 6 matches for "ldap_next_entry".

2008 Feb 27
2
Winbind+ldap = core dump
...uot;MCS+staff",@"MCS+teacher",@"MCS+sysadmin" path = /school/datadrive force directory mode = 0777 force create mode = 0666 comment = DataDrive create mode = 0666 directory mode = 777 browseable = yes log.winbindd-idmap: winbindd: ../../../libraries/libldap/getentry.c:48: ldap_next_entry: Assertion `entry != ((void *)0)' failed. [2008/02/27 14:54:20, 0] lib/fault.c:fault_report(41) =============================================================== [2008/02/27 14:54:20, 0] lib/fault.c:fault_report(42) INTERNAL ERROR: Signal 6 in pid 29940 (3.0.28-0.fc8) Please read the Trouble-Shoo...
2009 Aug 11
0
Winbind core dump issue
...Openldap idmap backend on our Redhat 4/5 servers. We managed to get this mostly working in that users can authenticate using their domain accounts (thank you Samba team!!!). We do however keep getting the same error in the log.winbindd-idmap log: winbindd: ../../../libraries/libldap/getentry.c:48: ldap_next_entry: Assertion `entry != ((void *)0)' failed. [2009/08/11 12:00:12, 0] lib/fault.c:fault_report(40) =============================================================== [2009/08/11 12:00:12, 0] lib/fault.c:fault_report(41) INTERNAL ERROR: Signal 6 in pid 25614 (3.2.13) Please read the Trouble-Sh...
2008 May 14
0
Samba Upgrade to 3.0.25b leads to core dumps with winbind and ldap idmap
...ck frames: #0 winbindd(log_stack_trace+0x2d) [0x3d67b9] #1 winbindd(smb_panic+0x56) [0x3d68c0] #2 winbindd [0x3c2db5] #3 /lib/tls/libc.so.6 [0x59b908] #4 /lib/tls/libc.so.6(abort+0xe9) [0x59d279] #5 /lib/tls/libc.so.6(__assert_fail+0x101) [0x594d91] #6 /usr/lib/libldap-2.2.so.7(ldap_next_entry+0x6b) [0xfb8c2b] #7 winbindd [0x4fab15] #8 winbindd(idmap_unixids_to_sids+0x5e4) [0x4f3c87] #9 winbindd(idmap_uid_to_sid+0x6e) [0x4f714e] #10 winbindd(winbindd_dual_uid2sid+0x50) [0x37a896] #11 winbindd [0x37535d] #12 winbindd [0x376509] #13 winbindd(winbindd_sid2gid_async+0xcc...
2014 Jan 23
0
php script to migrate other attributes after running classicupgrade
...echo ($i. ": ") . $s3_mail[$i]. ", "; $info["otherMailbox"][$i-1] = $s3_mail[$i]; } echo "<br />"; // put $info array in the AD ldap_mod_replace($samba4, $s4_dn, $info); // and proceed with the next samba3 record $uid = ldap_next_entry($samba3, $uid); } ldap_close($samba4); ldap_close($samba3); ?>
2008 Dec 08
3
"nopassword" extra field useless with LDAP passdb
Hi, We are trying to implement a highly secure mail server with user authentication restricted to SSL certificates only (not using passwords at all). Still, user information is stored in a LDAP directory. In this configuration LDAP is used to check whether the user is registered (and probably supply quota and other info), and actual authentication is done by SSL layer. According to wiki, a
2019 Apr 04
5
Migration to samba4 ad and sync to openldap.
I managed to do migration using "classicupgrade". Doing tests with debian buster 2:4.9.4+dfsg-4. For the moment using samba internal dns and sub-domain of ad.advocap.org. Had issue forwarding dns if I used main domain. When it comes to real production will use bind that I understand better but don't want to mess with my other dns servers now. Had a w10 box join samba4 ad