DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUGĀ· RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=41041>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED ANDĀ· INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=41041 Summary: mod_ldap segfaults when using TLS w/OpenLDAP libs Product: Apache httpd-2 Version: 2.2.3 Platform: Sun OS/Version: Solaris Status: NEW Severity: normal Priority: P3 Component: mod_ldap AssignedTo: [email protected] ReportedBy: [EMAIL PROTECTED] I'm using: - Apache 2.2.3 - Apr-1.2.7 - OpenLDAP 2.3.30 - build with Sun C 5.8 Patch 121015-02 2006/03/29 I'm trying to use OpenLDAP to do secure LDAP auth against an NDS server. Using the following configuation: <IfModule ldap_module> LDAPTrustedGlobalCert CA_BASE64 /www/my-cert.pem <Location /ldap-status> SetHandler ldap-status AuthType basic AuthName "NDS Username and Password" AuthBasicProvider ldap AuthUserFile /dev/null AuthLDAPURL ldap://my.lpap.server/o=myorg?cn?sub TLS AuthzLDAPAuthoritative off require valid-user </Location> </IfModule> I get the following: [debug] mod_authnz_ldap.c(373): [client x.x.x.x] [11431] auth_ldap authenticate: using URL ldap://my.lpap.server/o=myorg?cn?sub [notice] child pid 11431 exit signal Segmentation fault (11), possible coredump in /www Looking at the core file: [EMAIL PROTECTED] ([EMAIL PROTECTED]) program terminated by signal SEGV (Segmentation Fault) Current function is ber_sockbuf_ctrl (optimized) 89 assert( SOCKBUF_VALID( sb ) ); (dbx) where current thread: [EMAIL PROTECTED] =>[1] ber_sockbuf_ctrl(sb = ???, opt = ???, arg = ???) (optimized), at 0xfed5b000 (line ~89) in "sockbuf.c" [2] ldap_pvt_tls_inplace(sb = ???) (optimized), at 0xfef7410c (line ~892) in "tls.c" [3] ldap_tls_inplace(ld = ???) (optimized), at 0xfef74170 (line ~910) in "tls.c" [4] ldap_start_tls_s(ld = ???, serverctrls = ???, clientctrls = ???) (optimized), at 0xfef75b80 (line ~1891) in "tls.c" [5] option_set_tls(0xc7040, 0x1b9700, 0xc7224, 0xc72d0, 0xff2678d4, 0xc72e5), at 0xff2506fc [6] apr_ldap_set_option(0xc7040, 0x1b9700, 0x6fff, 0xc7224, 0xffbfd788, 0xc72d0), at 0xff2505a0 [7] uldap_connection_open(0x0, 0xc7200, 0x185510, 0x50, 0x185450, 0x0), at 0xfe2f1f48 [8] uldap_cache_checkuserid(0x19f600, 0xc7200, 0x0, 0xffffffff, 0xfdca1970, 0xfe309570), at 0xfe2f2fb8 [9] authn_ldap_check_password(0x19f600, 0x1b3f50, 0x1b3f37, 0x1b3f58, 0xfe2b5268, 0xfe2b577c), at 0xfe2a14ac [10] authenticate_basic_user(0x19f600, 0x10000, 0x186660, 0xfe2b56d0, 0xfe3f103c, 0xfe2a1240), at 0xfe3e0bd0 [11] ap_run_check_user_id(0x19f600, 0x187688, 0x187688, 0x6def0, 0x1876dc, 0x3), at 0x3686c [12] ap_process_request_internal(0x0, 0x185450, 0x19f600, 0x0, 0x0, 0x2), at 0x3728c [13] ap_process_request(0x19f600, 0x6bc00, 0x4, 0xc8, 0x1, 0xffffffff), at 0x4923c [14] ap_process_http_connection(0x193870, 0x19f600, 0x6bc00, 0x1, 0x1000, 0x6bf44), at 0x464e0 [15] ap_run_process_connection(0x193870, 0x1935d8, 0x187598, 0x6e73c, 0x1875b0, 0x0), at 0x42480 [16] child_main(0x0, 0xffbffbc0, 0x6c124, 0x2, 0x1975b0, 0x6e778), at 0x4d930 [17] make_child(0x6bc00, 0x0, 0x1, 0xffffffff, 0x6c000, 0x0), at 0x4dad8 [18] startup_children(0x1, 0x6e800, 0x0, 0x6bc00, 0x6c104, 0x0), at 0x4db64 [19] ap_mpm_run(0x1, 0x79fa0, 0x0, 0xffbffd20, 0x6e7a0, 0x6c10c), at 0x4e02c [20] main(0x27410, 0x6bc00, 0x6aef8, 0x7ddc0, 0x6af08, 0x51000), at 0x27e90 I believe this is bug somewhere in mod_ldap or apr-util, as I can perform the ldap query manually with OpenLDAP's ldapsearch using TLS and it works fine. The crash happens every time LDAP auth occurs with TLS, so I can get more info if needed. -- Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
