[EMAIL PROTECTED] wrote:
> Hello
> 
> My mail system contains:
> courier 0.45.6
> openldap 2.1.30
> 
> Resiving mail works fine(smtp is postfix) but when i try to get mails
> through pop3 i get an errom msg: courierpop3login: LOGIN FAILED,
> ip=[::ffff:my.ip.addr] 
> 

is authdaemond running?

> Courier log doesn't talk to much but as i know password is ok(tested)
> my config:
> 
> /etc/courier/authldap
> LDAP_SERVER             loclhost
> LDAP_PORT               389
> LDAP_PROTOCOL_VERSION   3
> LDAP_BASEDN             dc=lx, dc=pl
> LDAP_TIMEOUT            20
> LDAP_AUTHBIND           1
> LDAP_MAIL               uid
> LDAP_FILTER            (objectClass=CourierMailAccount)
> LDAP_GLOB_UID           vmail
> LDAP_GLOB_GID           vmail
> LDAP_HOMEDIR            homeDirectory
> LDAP_MAILROOT           /
> LDAP_MAILDIR            mailMessageStore
> LDAP_DEFAULTDELIVERY    defaultDelivery
> LDAP_FULLNAME           cn
> LDAP_CRYPTPW            userPassword
> LDAP_DEREF              never
> LDAP_TLS                0
> ----
> /etc/ldap/slapd.conf
> modulepath      /usr/lib/ldap
> moduleload      back_ldbm
> include         /etc/ldap/schema/core.schema
> include         /etc/ldap/schema/cosine.schema
> include         /etc/ldap/schema/nis.schema
> include         /etc/ldap/schema/qmail.schema
> include         /etc/ldap/schema/authldap.schema
> include         /etc/ldap/schema/inetorgperson.schema
> pidfile         /var/run/slapd.pid
> argsfile        /var/run/slapd.args
> replogfile      /var/lib/ldap/replog
> loglevel     65535
> database        ldbm
> suffix          "dc=lx,dc=pl"
> directory       "/var/lib/ldap"
> index objectClass eq
> index mail eq
> rootdn  "cn=root,dc=lx,dc=pl"
> rootpw   *********
> access to *
>         by dn="cn=root,dc=lx,dc=pl" write
>         by * read
> -----
> my ldif file is:
> 
> dn: uid=test,dc=lx,dc=pl
> cn: test
> uid: test
> sn: testcik
> uidNumber: 1072
> gidnumber: 101
> mail: [EMAIL PROTECTED]
> mailHost: myserver
> userPassword: ********
> homeDirectory: var/lib/courier/test/
> mailMessageStore: var/lib/courier/test/
> mailbox: test/Maildir/
> ObjectClass: CourierMailAccount
> objectClass: inetOrgPerson
> objectClass: qmailuser
> accountStatus: active
> 
> and logs looks like that:
> Oct  5 12:57:43  courierpop3login: Connection, ip=[::ffff:my.ip.addr.]
> Oct  5 12:57:43  slapd[12042]: daemon: activity on 1 descriptors
> Oct  5 12:57:43  slapd[12042]: daemon: new connection on 9
> Oct  5 12:57:43  slapd[12042]: conn=2 fd=9 ACCEPT from
> IP=my.ip.addr.:58886 (IP=0.0.0.0:389) 
> Oct  5 12:57:43  slapd[12042]: daemon: added 9r
> Oct  5 12:57:43  slapd[12042]: daemon: activity on:
> Oct  5 12:57:43  slapd[12042]:
> Oct  5 12:57:43  slapd[12042]: daemon: select: listen=6
> active_threads=0 tvp=NULL 
> Oct  5 12:57:43  slapd[12042]: daemon: activity on 1 descriptors
> Oct  5 12:57:43  slapd[12042]: daemon: activity on:
> Oct  5 12:57:43  slapd[12042]:  9r
> Oct  5 12:57:43  slapd[12042]:
> Oct  5 12:57:43  slapd[12042]: daemon: read activity on 9
> Oct  5 12:57:43  slapd[12042]: connection_get(9)
> Oct  5 12:57:43  slapd[12042]: connection_get(9): got connid=2
> Oct  5 12:57:43  slapd[12042]: connection_read(9): checking for input
> on id=2 
> Oct  5 12:57:43  slapd[12042]: ber_get_next on fd 9 failed errno=11
> (Resource temporarily unavailable) 
> Oct  5 12:57:43  slapd[12093]: do_bind
> Oct  5 12:57:43  slapd[12042]: daemon: select: listen=6
> active_threads=1 tvp=NULL 
> Oct  5 12:57:43  slapd[12093]: >>> dnPrettyNormal: <>
> Oct  5 12:57:43  slapd[12093]: <<< dnPrettyNormal: <>, <>
> Oct  5 12:57:43  slapd[12093]: do_bind: version=3 dn="" method=128
> Oct  5 12:57:43  slapd[12093]: conn=2 op=0 BIND dn="" method=128
> Oct  5 12:57:43  slapd[12093]: send_ldap_result: conn=2 op=0 p=3
> Oct  5 12:57:44  slapd[12093]: send_ldap_result: err=0 matched=""
> text="" 
> Oct  5 12:57:44  slapd[12093]: send_ldap_response: msgid=1 tag=97
> err=0 
> Oct  5 12:57:44  slapd[12093]: conn=2 op=0 RESULT tag=97 err=0 text=
> Oct  5 12:57:44  slapd[12042]: daemon: activity on 1 descriptors
> Oct  5 12:57:44  slapd[12093]: do_bind: v3 anonymous bind
> Oct  5 12:57:44  slapd[12042]: daemon: activity on:
> Oct  5 12:57:44  slapd[12042]:  9r
> Oct  5 12:57:44  slapd[12042]:
> Oct  5 12:57:44  slapd[12042]: daemon: read activity on 9
> Oct  5 12:57:44  slapd[12042]: connection_get(9)
> Oct  5 12:57:44  slapd[12042]: connection_get(9): got connid=2
> Oct  5 12:57:44  slapd[12042]: connection_read(9): checking for input
> on id=2 
> Oct  5 12:57:44  slapd[12042]: ber_get_next on fd 9 failed errno=11
> (Resource temporarily unavailable) 
> Oct  5 12:57:44  slapd[12088]: do_search
> Oct  5 12:57:44  slapd[12042]: daemon: select: listen=6
> active_threads=1 tvp=NULL 
> Oct  5 12:57:44  slapd[12088]: >>> dnPrettyNormal: <dc=lx, dc=pl>
> Oct  5 12:57:44  slapd[12088]: <<< dnPrettyNormal: <dc=lx,dc=pl>,
> <dc=lx,dc=pl> 
> Oct  5 12:57:44  slapd[12088]: SRCH "dc=lx, dc=pl" 2 0
> Oct  5 12:57:44  slapd[12088]:     0 0 0
> Oct  5 12:57:44  slapd[12088]: begin get_filter
> Oct  5 12:57:44  slapd[12088]: EQUALITY
> Oct  5 12:57:45  slapd[12088]: end get_filter 0
> Oct  5 12:57:45  slapd[12088]:     filter: (uid=test)
> Oct  5 12:57:45  slapd[12088]:     attrs:
> Oct  5 12:57:45  slapd[12088]:  homeDirectory
> Oct  5 12:57:45  slapd[12088]:  mailMessageStore
> Oct  5 12:57:45  slapd[12088]:  cn
> Oct  5 12:57:45  slapd[12088]:  userPassword
> Oct  5 12:57:45  slapd[12088]:  uid
> Oct  5 12:57:45  slapd[12088]:
> Oct  5 12:57:45  slapd[12088]: conn=2 op=1 SRCH base="dc=lx,dc=pl"
> scope=2 filter="(uid=test)" 
> Oct  5 12:57:45  slapd[12088]: conn=2 op=1 SRCH attr=homeDirectory
> mailMessageStore cn userPassword uid 
> Oct  5 12:57:45  slapd[12088]: => ldbm_back_search
> Oct  5 12:57:45  slapd[12088]: dn2entry_r: dn: "dc=lx,dc=pl"
> Oct  5 12:57:45  slapd[12088]: => dn2id( "dc=lx,dc=pl" )
> Oct  5 12:57:45  slapd[12088]: ====>
> cache_find_entry_dn2id("dc=lx,dc=pl"): 1 (1 tries) 
> Oct  5 12:57:45  slapd[12088]: <= dn2id 1 (in cache)
> Oct  5 12:57:46  slapd[12088]: => id2entry_r( 1 )
> Oct  5 12:57:46  slapd[12088]: ====> cache_find_entry_id( 1 )
> "dc=lx,dc=pl" (found) (1 tries) 
> Oct  5 12:57:46  slapd[12088]: <= id2entry_r( 1 ) 0x811d7b8 (cache)
> Oct  5 12:57:46  slapd[12088]: search_candidates: base="dc=lx,dc=pl"
> s=2 d=0 
> Oct  5 12:57:46  slapd[12088]: => filter_candidates
> Oct  5 12:57:46  slapd[12088]: ^IAND
> Oct  5 12:57:46  slapd[12088]: => list_candidates 0xa0
> Oct  5 12:57:46  slapd[12088]: => filter_candidates
> Oct  5 12:57:46  slapd[12088]: ^IDN SUBTREE
> Oct  5 12:57:46  slapd[12088]: => dn2idl( "@dc=lx,dc=pl" )
> Oct  5 12:57:46  slapd[12088]: <= filter_candidates 6
> Oct  5 12:57:46  slapd[12088]: => filter_candidates
> Oct  5 12:57:46  slapd[12088]: ^IOR
> Oct  5 12:57:46  slapd[12088]: => list_candidates 0xa1
> Oct  5 12:57:46  slapd[12088]: => filter_candidates
> Oct  5 12:57:46  slapd[12088]: ^IEQUALITY
> Oct  5 12:57:46  slapd[12088]: => equality_candidates
> Oct  5 12:57:46  slapd[12088]: => ldbm_cache_open( "objectClass.dbb",
> 73, 600 ) 
> Oct  5 12:57:46  slapd[12088]: <= ldbm_cache_open (cache 3)
> Oct  5 12:57:46  slapd[12088]: => key_read
> Oct  5 12:57:46  slapd[12088]: <= index_read 0 candidates
> Oct  5 12:57:47  slapd[12088]: <= equality_candidates NULL
> Oct  5 12:57:47  slapd[12088]: <= equality_candidates 0
> Oct  5 12:57:47  slapd[12088]: <= filter_candidates 0
> Oct  5 12:57:47  slapd[12088]: => filter_candidates
> Oct  5 12:57:47  slapd[12088]: ^IEQUALITY
> Oct  5 12:57:47  slapd[12088]: => equality_candidates
> Oct  5 12:57:47  slapd[12088]: <= equality_candidates: index_param
> returned=18 
> Oct  5 12:57:47  slapd[12088]: <= filter_candidates 6
> Oct  5 12:57:47  slapd[12088]: <= list_candidates 6
> Oct  5 12:57:47  slapd[12088]: <= filter_candidates 6
> Oct  5 12:57:47  slapd[12088]: <= list_candidates 6
> Oct  5 12:57:47  slapd[12088]: <= filter_candidates 6
> Oct  5 12:57:47  slapd[12088]: ====> cache_return_entry_r( 1 ):
> returned (0) 
> Oct  5 12:57:47  slapd[12088]: => id2entry_r( 1 )
> Oct  5 12:57:47  slapd[12088]: ====> cache_find_entry_id( 1 )
> "dc=lx,dc=pl" (found) (1 tries) 
> Oct  5 12:57:47  slapd[12088]: <= id2entry_r( 1 ) 0x811d7b8 (cache)
> Oct  5 12:57:47  slapd[12088]: => test_filter
> Oct  5 12:57:47  slapd[12088]:     EQUALITY
> Oct  5 12:57:47  slapd[12088]: => access_allowed: search access to
> "dc=lx,dc=pl" "uid" requested 
> Oct  5 12:57:47  slapd[12088]: => acl_get: [1] check attr uid
> Oct  5 12:57:48  slapd[12088]: <= acl_get: [1] acl dc=lx,dc=pl attr:
> uid 
> Oct  5 12:57:48  slapd[12088]: => acl_mask: access to entry
> "dc=lx,dc=pl", attr "uid" requested 
> Oct  5 12:57:48  slapd[12088]: => acl_mask: to value by "", (=n)
> Oct  5 12:57:48  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:48  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:48  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:48  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:48  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:48  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:48  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:48  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:48  slapd[12088]: => access_allowed: search access
> granted by read(=rscx) 
> Oct  5 12:57:48  slapd[12088]: <= test_filter 5
> Oct  5 12:57:48  slapd[12088]: ldbm_search: candidate entry 1 does
> not match filter 
> Oct  5 12:57:48  slapd[12088]: ====> cache_return_entry_r( 1 ):
> returned (0) 
> Oct  5 12:57:48  slapd[12088]: => id2entry_r( 2 )
> Oct  5 12:57:48  slapd[12088]: ====> cache_find_entry_id( 2 )
> "ou=Ludzie,dc=lx,dc=pl" (found) (1 tries) 
> Oct  5 12:57:48  slapd[12088]: <= id2entry_r( 2 ) 0x811e830 (cache)
> Oct  5 12:57:48  slapd[12088]: => test_filter
> Oct  5 12:57:48  slapd[12088]:     EQUALITY
> Oct  5 12:57:48  slapd[12088]: => access_allowed: search access to
> "ou=Ludzie,dc=lx,dc=pl" "uid" requested 
> Oct  5 12:57:49  slapd[12088]: => acl_get: [1] check attr uid
> Oct  5 12:57:49  slapd[12088]: <= acl_get: [1] acl
> ou=Ludzie,dc=lx,dc=pl attr: uid 
> Oct  5 12:57:49  slapd[12088]: => acl_mask: access to entry
> "ou=Ludzie,dc=lx,dc=pl", attr "uid" requested 
> Oct  5 12:57:49  slapd[12088]: => acl_mask: to value by "", (=n)
> Oct  5 12:57:49  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:49  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:49  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:49  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:49  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:49  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:49  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:49  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:49  slapd[12088]: => access_allowed: search access
> granted by read(=rscx) 
> Oct  5 12:57:49  slapd[12088]: <= test_filter 5
> Oct  5 12:57:49  slapd[12088]: ldbm_search: candidate entry 2 does
> not match filter 
> Oct  5 12:57:49  slapd[12088]: ====> cache_return_entry_r( 2 ):
> returned (0) 
> Oct  5 12:57:49  slapd[12088]: => id2entry_r( 3 )
> Oct  5 12:57:49  slapd[12088]: ====> cache_find_entry_id( 3 )
> "ou=Ksieg,dc=lx,dc=pl" (found) (1 tries) 
> Oct  5 12:57:49  slapd[12088]: <= id2entry_r( 3 ) 0x811ec48 (cache)
> Oct  5 12:57:49  slapd[12088]: => test_filter
> Oct  5 12:57:50  slapd[12088]:     EQUALITY
> Oct  5 12:57:50  slapd[12088]: => access_allowed: search access to
> "ou=Ksieg,dc=lx,dc=pl" "uid" requested 
> Oct  5 12:57:50  slapd[12088]: => acl_get: [1] check attr uid
> Oct  5 12:57:50  slapd[12088]: <= acl_get: [1] acl
> ou=Ksieg,dc=lx,dc=pl attr: uid 
> Oct  5 12:57:50  slapd[12088]: => acl_mask: access to entry
> "ou=Ksieg,dc=lx,dc=pl", attr "uid" requested 
> Oct  5 12:57:50  slapd[12088]: => acl_mask: to value by "", (=n)
> Oct  5 12:57:50  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:50  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:50  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:50  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:50  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:50  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:50  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:50  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:50  slapd[12088]: => access_allowed: search access
> granted by read(=rscx) 
> Oct  5 12:57:51  slapd[12088]: <= test_filter 5
> Oct  5 12:57:51  slapd[12088]: ldbm_search: candidate entry 3 does
> not match filter 
> Oct  5 12:57:51  slapd[12088]: ====> cache_return_entry_r( 3 ):
> returned (0) 
> Oct  5 12:57:51  slapd[12088]: => id2entry_r( 4 )
> Oct  5 12:57:51  slapd[12088]: ====> cache_find_entry_id( 4 )
> "uid=chuj2,dc=lx,dc=pl" (found) (1 tries) 
> Oct  5 12:57:51  slapd[12088]: <= id2entry_r( 4 ) 0x811e6d0 (cache)
> Oct  5 12:57:51  slapd[12088]: => test_filter
> Oct  5 12:57:51  slapd[12088]:     EQUALITY
> Oct  5 12:57:51  slapd[12088]: => access_allowed: search access to
> "uid=chuj2,dc=lx,dc=pl" "uid" requested 
> Oct  5 12:57:51  slapd[12088]: => acl_get: [1] check attr uid
> Oct  5 12:57:51  slapd[12088]: <= acl_get: [1] acl
> uid=chuj2,dc=lx,dc=pl attr: uid 
> Oct  5 12:57:51  slapd[12088]: => acl_mask: access to entry
> "uid=chuj2,dc=lx,dc=pl", attr "uid" requested 
> Oct  5 12:57:51  slapd[12088]: => acl_mask: to value by "", (=n)
> Oct  5 12:57:51  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:51  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:51  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:51  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:51  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:51  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:51  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:51  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:52  slapd[12088]: => access_allowed: search access
> granted by read(=rscx) 
> Oct  5 12:57:52  slapd[12088]: <= test_filter 5
> Oct  5 12:57:52  slapd[12088]: ldbm_search: candidate entry 4 does
> not match filter 
> Oct  5 12:57:52  slapd[12088]: ====> cache_return_entry_r( 4 ):
> returned (0) 
> Oct  5 12:57:52  slapd[12088]: => id2entry_r( 5 )
> Oct  5 12:57:52  slapd[12088]: ====> cache_find_entry_id( 5 )
> "uid=test,dc=lx,dc=pl" (found) (1 tries) 
> Oct  5 12:57:52  slapd[12088]: <= id2entry_r( 5 ) 0x811eff0 (cache)
> Oct  5 12:57:52  slapd[12088]: => test_filter
> Oct  5 12:57:52  slapd[12088]:     EQUALITY
> Oct  5 12:57:52  slapd[12088]: => access_allowed: search access to
> "uid=test,dc=lx,dc=pl" "uid" requested 
> Oct  5 12:57:52  slapd[12088]: => acl_get: [1] check attr uid
> Oct  5 12:57:52  slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: uid 
> Oct  5 12:57:52  slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "uid" requested 
> Oct  5 12:57:52  slapd[12088]: => acl_mask: to value by "", (=n)
> Oct  5 12:57:52  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:52  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:52  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:52  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:52  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:52  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:52  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:53  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:53  slapd[12088]: => access_allowed: search access
> granted by read(=rscx) 
> Oct  5 12:57:53  slapd[12088]: <= test_filter 6
> Oct  5 12:57:53  slapd[12088]: => send_search_entry:
> dn="uid=test,dc=lx,dc=pl" 
> Oct  5 12:57:53  slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "entry" requested 
> Oct  5 12:57:53  slapd[12088]: => acl_get: [1] check attr entry
> Oct  5 12:57:53  slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: entry 
> Oct  5 12:57:53  slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "entry" requested 
> Oct  5 12:57:53  slapd[12088]: => acl_mask: to all values by "", (=n)
> Oct  5 12:57:53  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:53  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:53  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:53  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:53  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:53  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:53  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:53  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:53  slapd[12088]: => access_allowed: read access granted
> by read(=rscx) 
> Oct  5 12:57:53  slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "cn" requested 
> Oct  5 12:57:53  slapd[12088]: => acl_get: [1] check attr cn
> Oct  5 12:57:53  slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: cn 
> Oct  5 12:57:54  slapd[12088]: access_allowed: no res from state (cn)
> Oct  5 12:57:54  slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "cn" requested 
> Oct  5 12:57:54  slapd[12088]: => acl_mask: to all values by "", (=n)
> Oct  5 12:57:54  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:54  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:54  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:54  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:54  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:54  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:54  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:54  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:54  slapd[12088]: => access_allowed: read access granted
> by read(=rscx) 
> Oct  5 12:57:54  slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "uid" requested 
> Oct  5 12:57:54  slapd[12088]: => acl_get: [1] check attr uid
> Oct  5 12:57:54  slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: uid 
> Oct  5 12:57:54  slapd[12088]: access_allowed: no res from state (uid)
> Oct  5 12:57:54  slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "uid" requested 
> Oct  5 12:57:54  slapd[12088]: => acl_mask: to all values by "", (=n)
> Oct  5 12:57:54  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:54  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:55  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:55  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:55  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:55  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:55  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:55  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:55  slapd[12088]: => access_allowed: read access granted
> by read(=rscx) 
> Oct  5 12:57:55  slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "userPassword" requested 
> Oct  5 12:57:55  slapd[12088]: => acl_get: [1] check attr userPassword
> Oct  5 12:57:55  slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: userPassword 
> Oct  5 12:57:55  slapd[12088]: access_allowed: no res from state
> (userPassword) 
> Oct  5 12:57:55  slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "userPassword" requested Oct  5 12:57:55
> slapd[12088]: => acl_mask: to all values by "", (=n) 
> Oct  5 12:57:55  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:55  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:55  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:55  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:55  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:55  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:55  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:55  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:56  slapd[12088]: => access_allowed: read access granted
> by read(=rscx) 
> Oct  5 12:57:56  slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "homeDirectory" requested Oct  5 12:57:56 
> slapd[12088]: => acl_get: [1] check attr homeDirectory 
> Oct  5 12:57:56  slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: homeDirectory 
> Oct  5 12:57:56  slapd[12088]: access_allowed: no res from state
> (homeDirectory) 
> Oct  5 12:57:56  slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "homeDirectory" requested Oct  5
> 12:57:56  slapd[12088]: => acl_mask: to all values by "", (=n) 
> Oct  5 12:57:56  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:56  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:56  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:56  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:56  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:56  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:56  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:56  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:56  slapd[12088]: => access_allowed: read access granted
> by read(=rscx) 
> Oct  5 12:57:56  slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "mailMessageStore" requested Oct  5 12:57:56 
> slapd[12088]: => acl_get: [1] check attr mailMessageStore 
> Oct  5 12:57:56  slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: mailMessageStore 
> Oct  5 12:57:56  slapd[12088]: access_allowed: no res from state
> (mailMessageStore) 
> Oct  5 12:57:57  slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "mailMessageStore" requested Oct  5
> 12:57:57  slapd[12088]: => acl_mask: to all values by "", (=n) 
> Oct  5 12:57:57  slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct  5 12:57:57  slapd[12088]: => string_expand: pattern: 
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:57  slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl 
> Oct  5 12:57:57  slapd[12088]: => regex_matches: string:^I
> Oct  5 12:57:57  slapd[12088]: => regex_matches: rc: 1 no matches
> Oct  5 12:57:57  slapd[12088]: <= check a_dn_pat: *
> Oct  5 12:57:57  slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop) 
> Oct  5 12:57:57  slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct  5 12:57:57  slapd[12088]: => access_allowed: read access granted
> by read(=rscx) 
> Oct  5 12:57:57  slapd[12042]: daemon: activity on 1 descriptors
> Oct  5 12:57:57  slapd[12088]: conn=2 op=1 ENTRY
> dn="uid=test,dc=lx,dc=pl" 
> Oct  5 12:57:57  slapd[12042]: daemon: activity on:
> Oct  5 12:57:57  slapd[12088]: <= send_search_entry
> Oct  5 12:57:57  slapd[12042]:  9r
> Oct  5 12:57:57  slapd[12088]: ====> cache_return_entry_r( 5 ):
> returned (0) 
> Oct  5 12:57:57  slapd[12042]:
> Oct  5 12:57:57  slapd[12088]: send_search_result: err=0 matched=""
> text="" 
> Oct  5 12:57:57  slapd[12042]: daemon: read activity on 9
> Oct  5 12:57:57  slapd[12088]: send_ldap_response: msgid=2 tag=101
> err=0 
> Oct  5 12:57:57  slapd[12042]: connection_get(9)
> Oct  5 12:57:57  slapd[12088]: conn=2 op=1 SEARCH RESULT tag=101
> err=0 nentries=1 text= 
> Oct  5 12:57:58  slapd[12042]: connection_get(9): got connid=2
> Oct  5 12:57:58  slapd[12042]: connection_read(9): checking for input
> on id=2 
> Oct  5 12:57:58  slapd[12042]: ber_get_next on fd 9 failed errno=0
> (Success) 
> Oct  5 12:57:58  slapd[12093]: do_abandon
> Oct  5 12:57:58  slapd[12042]: connection_read(9): input error=-2
> id=2, closing. 
> Oct  5 12:57:58  slapd[12093]: do_abandon: id=2
> Oct  5 12:57:58  slapd[12042]: connection_closing: readying conn=2
> sd=9 for close 
> Oct  5 12:57:58  slapd[12042]: connection_close: deferring conn=2 sd=9
> Oct  5 12:57:58  slapd[12088]: connection_resched: attempting closing
> conn=2 sd=9 
> Oct  5 12:57:58  slapd[12042]: daemon: select: listen=6
> active_threads=3 tvp=NULL 
> Oct  5 12:57:58  slapd[12088]: connection_close: deferring conn=2 sd=9
> Oct  5 12:57:58  slapd[12042]: daemon: activity on 1 descriptors
> Oct  5 12:57:58  slapd[12093]: do_abandon: op=2 not found
> Oct  5 12:57:58  slapd[12088]: do_unbind
> Oct  5 12:57:58  slapd[12042]: daemon: select: listen=6
> active_threads=2 tvp=NULL 
> Oct  5 12:57:58  slapd[12093]: connection_resched: attempting closing
> conn=2 sd=9 
> Oct  5 12:57:58  slapd[12088]: conn=2 op=3 UNBIND
> Oct  5 12:57:58  slapd[12093]: connection_close: deferring conn=2 sd=9
> Oct  5 12:57:58  slapd[12088]: connection_resched: attempting closing
> conn=2 sd=9 
> Oct  5 12:57:59  slapd[12088]: connection_close: conn=2 sd=9
> Oct  5 12:57:59  slapd[12088]: daemon: removing 9
> Oct  5 12:57:59  slapd[12088]: conn=2 fd=9 closed
> Oct  5 12:58:02 n37 courierpop3login: LOGIN FAILED,
> ip=[::ffff:my.ip.addr.] 
> Oct  5 12:58:02 n37 courierpop3login: LOGOUT, ip=[::ffff:my.ip.addr.]
> 
> In addition courierauthtest gives:
> # courierauthtest test
> Trying authdaemon...
> Temporary authentication failure from module authdaemon
> Authentication FAILED!
> 
> 
> Does anybody know what's wrong????
> 
> thanks fo any help.
> 
> pozdr
> 



-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
courier-users mailing list
[EMAIL PROTECTED]
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users

Reply via email to