вот что-то вроде нащупал. ==> sasl_bind: dn="cn=admin,dc=firma,dc=lan" mech=SRP datalen=19 SASL Canonicalize [conn=2]: authcid="root" slap_sasl_getdn: conn 2 id=root [len=4] => ldap_dn2bv(16) <= ldap_dn2bv(uid=root,cn=SRP,cn=auth)=0 slap_sasl_getdn: u:id converted to uid=root,cn=SRP,cn=auth >>> dnNormalize: <uid=root,cn=SRP,cn=auth> => ldap_bv2dn(uid=root,cn=SRP,cn=auth,0) <= ldap_bv2dn(uid=root,cn=SRP,cn=auth)=0 => ldap_dn2bv(272) <= ldap_dn2bv(uid=root,cn=srp,cn=auth)=0 <<< dnNormalize: <uid=root,cn=srp,cn=auth> ==>slap_sasl2dn: converting SASL name uid=root,cn=srp,cn=auth to a DN slap_authz_regexp: converting SASL name uid=root,cn=srp,cn=auth <==slap_sasl2dn: Converted SASL name to <nothing> SASL Canonicalize [conn=2]: slapAuthcDN="uid=root,cn=srp,cn=auth" SASL Canonicalize [conn=2]: authzid="root" SASL [conn=2] Failure: no secret in database send_ldap_result: conn=2 op=1 p=3 send_ldap_result: err=49 matched="" text="SASL(-13): user not found: no secret in database" send_ldap_response: msgid=2 tag=97 err=49 ber_flush: 62 bytes to sd 14
кстати, если под рута входить просто с su, то тогда использует uid пользователя. откуда srp и что это такое? _______________________________________________ Sysadmins mailing list [email protected] https://lists.altlinux.org/mailman/listinfo/sysadmins
