Package: slapd
Version: 2.3.30-4
Severity: important

I test the latest egroupware trunk on Etch. When I apply the suggested 
acl_addressbook.conf
to slapd.conf slapd segfaults (as do slapadd and possibly other slapd-tools)

$ slapd -g openldap -u openldap  -d 16383
[...]

line 21 (access to 
dn.regex="cn=([^,]+),ou=personal,ou=contacts,o=([^,]+),dc=iww-test,dc=local$" 
attrs=entry,@inetOrgPerson,@mozillaAbPersonAlpha,@evolutionPerson by 
dn.regex="uid=$1,ou=accounts,o=$2,dc=iww-test,dc=local" write by users none)
Segmentation fault

I use Etch with linux-image-2.6.18-3-686   2.6.18-7 and libc6 2.3.6.ds1-11.

IMHO slapd shouldn't crash like this, no matter how ill-configured the ACL's 
maybe.

My slapd.conf:

allow bind_v2

include         /etc/ldap/schema/core.schema
include         /etc/ldap/schema/cosine.schema
include         /etc/ldap/schema/rfc2307bis.schema
include         /etc/ldap/schema/inetorgperson.schema

pidfile         /var/run/slapd/slapd.pid
argsfile        /var/run/slapd/slapd.args
loglevel         0

modulepath      /usr/lib/ldap
moduleload      back_bdb

sizelimit 500
tool-threads 1
backend         bdb
checkpoint 512 30

database        bdb
suffix          "dc=iww-test,dc=local"
rootdn          "cn=admin,dc=iww-test,dc=local"
rootpw {MD5}verysecrethash
directory       "/var/lib/ldap"
dbconfig set_cachesize 0 2097152 0
dbconfig set_lk_max_objects 1500
dbconfig set_lk_max_locks 1500
dbconfig set_lk_max_lockers 1500
password-hash {MD5}

index default eq
index objectClass eq
index uidNumber pres,eq
lastmod         on

access to attrs=userPassword,shadowLastChange
        by dn="cn=admin,dc=iww-test,dc=local" write
        by anonymous auth
        by self write
        by * none

include /etc/ldap/acl_addressbook.conf

access to dn.base="" by * read

access to *
        by dn="cn=admin,dc=iww-test,dc=local" write
        by * read



The content of acl_addressbook.conf is:

# Access to users personal addressbooks

# allow read of addressbook by owner and egwadmin account
access to 
dn.regex="^cn=([^,]+),ou=personal,ou=contacts,o=([^,]+),dc=iww-test,dc=local$"
        attrs=entry
        by dn.regex="uid=$1,ou=accounts,o=$2,dc=iww-test,dc=local" read
        by dn.regex="cn=egwadmin,o=$2,dc=iww-test,dc=local" write
        by users none

# allow user to create entries in own addressbook; no-one else can access it
# needs write access to the entries ENTRY attribute ...
access to 
dn.regex="cn=([^,]+),ou=personal,ou=contacts,o=([^,]+),dc=iww-test,dc=local$"
        attrs=children
        by dn.regex="uid=$1,ou=accounts,o=$2,dc=iww-test,dc=local" write
        by users none

# ... and the entries CHILDREN
access to 
dn.regex="cn=([^,]+),ou=personal,ou=contacts,o=([^,]+),dc=iww-test,dc=local$"
        attrs=entry,@inetOrgPerson,@mozillaAbPersonAlpha,@evolutionPerson
        by dn.regex="uid=$1,ou=accounts,o=$2,dc=iww-test,dc=local" write
        by users none

# Access to groups addressbooks

# allow read of addressbook by members and egwadmin account
access to 
dn.regex="^cn=([^,]+),ou=shared,ou=contacts,o=([^,]+),dc=iww-test,dc=local$"
        attrs=entry
        by group.expand="cn=$1,ou=groups,o=$2,dc=iww-test,dc=local" read
        by dn.regex="cn=egwadmin,o=$2,dc=iww-test,dc=local" write
        by users none

# allow members to create entries in there group addressbooks; no-one else can 
access it
# needs write access to the entries ENTRY attribute ...
access to 
dn.regex="cn=([^,]+),ou=shared,ou=contacts,o=([^,]+),dc=iww-test,dc=local$"
        attrs=children
        by group.expand="cn=$1,ou=groups,o=$2,dc=iww-test,dc=local" write
        by users none

# ... and the entries CHILDREN
access to 
dn.regex="cn=([^,]+),ou=shared,ou=contacts,o=([^,]+),dc=iww-test,dc=local$"
        attrs=entry,@inetOrgPerson,@mozillaAbPersonAlpha,@evolutionPerson
        by group.expand="cn=$1,ou=groups,o=$2,dc=iww-test,dc=local" write
        by users none



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to