[EMAIL PROTECTED] wrote:
> Hello
>
> My mail system contains:
> courier 0.45.6
> openldap 2.1.30
>
> Resiving mail works fine(smtp is postfix) but when i try to get mails
> through pop3 i get an errom msg: courierpop3login: LOGIN FAILED,
> ip=[::ffff:my.ip.addr]
>
is authdaemond running?
> Courier log doesn't talk to much but as i know password is ok(tested)
> my config:
>
> /etc/courier/authldap
> LDAP_SERVER loclhost
> LDAP_PORT 389
> LDAP_PROTOCOL_VERSION 3
> LDAP_BASEDN dc=lx, dc=pl
> LDAP_TIMEOUT 20
> LDAP_AUTHBIND 1
> LDAP_MAIL uid
> LDAP_FILTER (objectClass=CourierMailAccount)
> LDAP_GLOB_UID vmail
> LDAP_GLOB_GID vmail
> LDAP_HOMEDIR homeDirectory
> LDAP_MAILROOT /
> LDAP_MAILDIR mailMessageStore
> LDAP_DEFAULTDELIVERY defaultDelivery
> LDAP_FULLNAME cn
> LDAP_CRYPTPW userPassword
> LDAP_DEREF never
> LDAP_TLS 0
> ----
> /etc/ldap/slapd.conf
> modulepath /usr/lib/ldap
> moduleload back_ldbm
> include /etc/ldap/schema/core.schema
> include /etc/ldap/schema/cosine.schema
> include /etc/ldap/schema/nis.schema
> include /etc/ldap/schema/qmail.schema
> include /etc/ldap/schema/authldap.schema
> include /etc/ldap/schema/inetorgperson.schema
> pidfile /var/run/slapd.pid
> argsfile /var/run/slapd.args
> replogfile /var/lib/ldap/replog
> loglevel 65535
> database ldbm
> suffix "dc=lx,dc=pl"
> directory "/var/lib/ldap"
> index objectClass eq
> index mail eq
> rootdn "cn=root,dc=lx,dc=pl"
> rootpw *********
> access to *
> by dn="cn=root,dc=lx,dc=pl" write
> by * read
> -----
> my ldif file is:
>
> dn: uid=test,dc=lx,dc=pl
> cn: test
> uid: test
> sn: testcik
> uidNumber: 1072
> gidnumber: 101
> mail: [EMAIL PROTECTED]
> mailHost: myserver
> userPassword: ********
> homeDirectory: var/lib/courier/test/
> mailMessageStore: var/lib/courier/test/
> mailbox: test/Maildir/
> ObjectClass: CourierMailAccount
> objectClass: inetOrgPerson
> objectClass: qmailuser
> accountStatus: active
>
> and logs looks like that:
> Oct 5 12:57:43 courierpop3login: Connection, ip=[::ffff:my.ip.addr.]
> Oct 5 12:57:43 slapd[12042]: daemon: activity on 1 descriptors
> Oct 5 12:57:43 slapd[12042]: daemon: new connection on 9
> Oct 5 12:57:43 slapd[12042]: conn=2 fd=9 ACCEPT from
> IP=my.ip.addr.:58886 (IP=0.0.0.0:389)
> Oct 5 12:57:43 slapd[12042]: daemon: added 9r
> Oct 5 12:57:43 slapd[12042]: daemon: activity on:
> Oct 5 12:57:43 slapd[12042]:
> Oct 5 12:57:43 slapd[12042]: daemon: select: listen=6
> active_threads=0 tvp=NULL
> Oct 5 12:57:43 slapd[12042]: daemon: activity on 1 descriptors
> Oct 5 12:57:43 slapd[12042]: daemon: activity on:
> Oct 5 12:57:43 slapd[12042]: 9r
> Oct 5 12:57:43 slapd[12042]:
> Oct 5 12:57:43 slapd[12042]: daemon: read activity on 9
> Oct 5 12:57:43 slapd[12042]: connection_get(9)
> Oct 5 12:57:43 slapd[12042]: connection_get(9): got connid=2
> Oct 5 12:57:43 slapd[12042]: connection_read(9): checking for input
> on id=2
> Oct 5 12:57:43 slapd[12042]: ber_get_next on fd 9 failed errno=11
> (Resource temporarily unavailable)
> Oct 5 12:57:43 slapd[12093]: do_bind
> Oct 5 12:57:43 slapd[12042]: daemon: select: listen=6
> active_threads=1 tvp=NULL
> Oct 5 12:57:43 slapd[12093]: >>> dnPrettyNormal: <>
> Oct 5 12:57:43 slapd[12093]: <<< dnPrettyNormal: <>, <>
> Oct 5 12:57:43 slapd[12093]: do_bind: version=3 dn="" method=128
> Oct 5 12:57:43 slapd[12093]: conn=2 op=0 BIND dn="" method=128
> Oct 5 12:57:43 slapd[12093]: send_ldap_result: conn=2 op=0 p=3
> Oct 5 12:57:44 slapd[12093]: send_ldap_result: err=0 matched=""
> text=""
> Oct 5 12:57:44 slapd[12093]: send_ldap_response: msgid=1 tag=97
> err=0
> Oct 5 12:57:44 slapd[12093]: conn=2 op=0 RESULT tag=97 err=0 text=
> Oct 5 12:57:44 slapd[12042]: daemon: activity on 1 descriptors
> Oct 5 12:57:44 slapd[12093]: do_bind: v3 anonymous bind
> Oct 5 12:57:44 slapd[12042]: daemon: activity on:
> Oct 5 12:57:44 slapd[12042]: 9r
> Oct 5 12:57:44 slapd[12042]:
> Oct 5 12:57:44 slapd[12042]: daemon: read activity on 9
> Oct 5 12:57:44 slapd[12042]: connection_get(9)
> Oct 5 12:57:44 slapd[12042]: connection_get(9): got connid=2
> Oct 5 12:57:44 slapd[12042]: connection_read(9): checking for input
> on id=2
> Oct 5 12:57:44 slapd[12042]: ber_get_next on fd 9 failed errno=11
> (Resource temporarily unavailable)
> Oct 5 12:57:44 slapd[12088]: do_search
> Oct 5 12:57:44 slapd[12042]: daemon: select: listen=6
> active_threads=1 tvp=NULL
> Oct 5 12:57:44 slapd[12088]: >>> dnPrettyNormal: <dc=lx, dc=pl>
> Oct 5 12:57:44 slapd[12088]: <<< dnPrettyNormal: <dc=lx,dc=pl>,
> <dc=lx,dc=pl>
> Oct 5 12:57:44 slapd[12088]: SRCH "dc=lx, dc=pl" 2 0
> Oct 5 12:57:44 slapd[12088]: 0 0 0
> Oct 5 12:57:44 slapd[12088]: begin get_filter
> Oct 5 12:57:44 slapd[12088]: EQUALITY
> Oct 5 12:57:45 slapd[12088]: end get_filter 0
> Oct 5 12:57:45 slapd[12088]: filter: (uid=test)
> Oct 5 12:57:45 slapd[12088]: attrs:
> Oct 5 12:57:45 slapd[12088]: homeDirectory
> Oct 5 12:57:45 slapd[12088]: mailMessageStore
> Oct 5 12:57:45 slapd[12088]: cn
> Oct 5 12:57:45 slapd[12088]: userPassword
> Oct 5 12:57:45 slapd[12088]: uid
> Oct 5 12:57:45 slapd[12088]:
> Oct 5 12:57:45 slapd[12088]: conn=2 op=1 SRCH base="dc=lx,dc=pl"
> scope=2 filter="(uid=test)"
> Oct 5 12:57:45 slapd[12088]: conn=2 op=1 SRCH attr=homeDirectory
> mailMessageStore cn userPassword uid
> Oct 5 12:57:45 slapd[12088]: => ldbm_back_search
> Oct 5 12:57:45 slapd[12088]: dn2entry_r: dn: "dc=lx,dc=pl"
> Oct 5 12:57:45 slapd[12088]: => dn2id( "dc=lx,dc=pl" )
> Oct 5 12:57:45 slapd[12088]: ====>
> cache_find_entry_dn2id("dc=lx,dc=pl"): 1 (1 tries)
> Oct 5 12:57:45 slapd[12088]: <= dn2id 1 (in cache)
> Oct 5 12:57:46 slapd[12088]: => id2entry_r( 1 )
> Oct 5 12:57:46 slapd[12088]: ====> cache_find_entry_id( 1 )
> "dc=lx,dc=pl" (found) (1 tries)
> Oct 5 12:57:46 slapd[12088]: <= id2entry_r( 1 ) 0x811d7b8 (cache)
> Oct 5 12:57:46 slapd[12088]: search_candidates: base="dc=lx,dc=pl"
> s=2 d=0
> Oct 5 12:57:46 slapd[12088]: => filter_candidates
> Oct 5 12:57:46 slapd[12088]: ^IAND
> Oct 5 12:57:46 slapd[12088]: => list_candidates 0xa0
> Oct 5 12:57:46 slapd[12088]: => filter_candidates
> Oct 5 12:57:46 slapd[12088]: ^IDN SUBTREE
> Oct 5 12:57:46 slapd[12088]: => dn2idl( "@dc=lx,dc=pl" )
> Oct 5 12:57:46 slapd[12088]: <= filter_candidates 6
> Oct 5 12:57:46 slapd[12088]: => filter_candidates
> Oct 5 12:57:46 slapd[12088]: ^IOR
> Oct 5 12:57:46 slapd[12088]: => list_candidates 0xa1
> Oct 5 12:57:46 slapd[12088]: => filter_candidates
> Oct 5 12:57:46 slapd[12088]: ^IEQUALITY
> Oct 5 12:57:46 slapd[12088]: => equality_candidates
> Oct 5 12:57:46 slapd[12088]: => ldbm_cache_open( "objectClass.dbb",
> 73, 600 )
> Oct 5 12:57:46 slapd[12088]: <= ldbm_cache_open (cache 3)
> Oct 5 12:57:46 slapd[12088]: => key_read
> Oct 5 12:57:46 slapd[12088]: <= index_read 0 candidates
> Oct 5 12:57:47 slapd[12088]: <= equality_candidates NULL
> Oct 5 12:57:47 slapd[12088]: <= equality_candidates 0
> Oct 5 12:57:47 slapd[12088]: <= filter_candidates 0
> Oct 5 12:57:47 slapd[12088]: => filter_candidates
> Oct 5 12:57:47 slapd[12088]: ^IEQUALITY
> Oct 5 12:57:47 slapd[12088]: => equality_candidates
> Oct 5 12:57:47 slapd[12088]: <= equality_candidates: index_param
> returned=18
> Oct 5 12:57:47 slapd[12088]: <= filter_candidates 6
> Oct 5 12:57:47 slapd[12088]: <= list_candidates 6
> Oct 5 12:57:47 slapd[12088]: <= filter_candidates 6
> Oct 5 12:57:47 slapd[12088]: <= list_candidates 6
> Oct 5 12:57:47 slapd[12088]: <= filter_candidates 6
> Oct 5 12:57:47 slapd[12088]: ====> cache_return_entry_r( 1 ):
> returned (0)
> Oct 5 12:57:47 slapd[12088]: => id2entry_r( 1 )
> Oct 5 12:57:47 slapd[12088]: ====> cache_find_entry_id( 1 )
> "dc=lx,dc=pl" (found) (1 tries)
> Oct 5 12:57:47 slapd[12088]: <= id2entry_r( 1 ) 0x811d7b8 (cache)
> Oct 5 12:57:47 slapd[12088]: => test_filter
> Oct 5 12:57:47 slapd[12088]: EQUALITY
> Oct 5 12:57:47 slapd[12088]: => access_allowed: search access to
> "dc=lx,dc=pl" "uid" requested
> Oct 5 12:57:47 slapd[12088]: => acl_get: [1] check attr uid
> Oct 5 12:57:48 slapd[12088]: <= acl_get: [1] acl dc=lx,dc=pl attr:
> uid
> Oct 5 12:57:48 slapd[12088]: => acl_mask: access to entry
> "dc=lx,dc=pl", attr "uid" requested
> Oct 5 12:57:48 slapd[12088]: => acl_mask: to value by "", (=n)
> Oct 5 12:57:48 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:48 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:48 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:48 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:48 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:48 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:48 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:48 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:48 slapd[12088]: => access_allowed: search access
> granted by read(=rscx)
> Oct 5 12:57:48 slapd[12088]: <= test_filter 5
> Oct 5 12:57:48 slapd[12088]: ldbm_search: candidate entry 1 does
> not match filter
> Oct 5 12:57:48 slapd[12088]: ====> cache_return_entry_r( 1 ):
> returned (0)
> Oct 5 12:57:48 slapd[12088]: => id2entry_r( 2 )
> Oct 5 12:57:48 slapd[12088]: ====> cache_find_entry_id( 2 )
> "ou=Ludzie,dc=lx,dc=pl" (found) (1 tries)
> Oct 5 12:57:48 slapd[12088]: <= id2entry_r( 2 ) 0x811e830 (cache)
> Oct 5 12:57:48 slapd[12088]: => test_filter
> Oct 5 12:57:48 slapd[12088]: EQUALITY
> Oct 5 12:57:48 slapd[12088]: => access_allowed: search access to
> "ou=Ludzie,dc=lx,dc=pl" "uid" requested
> Oct 5 12:57:49 slapd[12088]: => acl_get: [1] check attr uid
> Oct 5 12:57:49 slapd[12088]: <= acl_get: [1] acl
> ou=Ludzie,dc=lx,dc=pl attr: uid
> Oct 5 12:57:49 slapd[12088]: => acl_mask: access to entry
> "ou=Ludzie,dc=lx,dc=pl", attr "uid" requested
> Oct 5 12:57:49 slapd[12088]: => acl_mask: to value by "", (=n)
> Oct 5 12:57:49 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:49 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:49 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:49 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:49 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:49 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:49 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:49 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:49 slapd[12088]: => access_allowed: search access
> granted by read(=rscx)
> Oct 5 12:57:49 slapd[12088]: <= test_filter 5
> Oct 5 12:57:49 slapd[12088]: ldbm_search: candidate entry 2 does
> not match filter
> Oct 5 12:57:49 slapd[12088]: ====> cache_return_entry_r( 2 ):
> returned (0)
> Oct 5 12:57:49 slapd[12088]: => id2entry_r( 3 )
> Oct 5 12:57:49 slapd[12088]: ====> cache_find_entry_id( 3 )
> "ou=Ksieg,dc=lx,dc=pl" (found) (1 tries)
> Oct 5 12:57:49 slapd[12088]: <= id2entry_r( 3 ) 0x811ec48 (cache)
> Oct 5 12:57:49 slapd[12088]: => test_filter
> Oct 5 12:57:50 slapd[12088]: EQUALITY
> Oct 5 12:57:50 slapd[12088]: => access_allowed: search access to
> "ou=Ksieg,dc=lx,dc=pl" "uid" requested
> Oct 5 12:57:50 slapd[12088]: => acl_get: [1] check attr uid
> Oct 5 12:57:50 slapd[12088]: <= acl_get: [1] acl
> ou=Ksieg,dc=lx,dc=pl attr: uid
> Oct 5 12:57:50 slapd[12088]: => acl_mask: access to entry
> "ou=Ksieg,dc=lx,dc=pl", attr "uid" requested
> Oct 5 12:57:50 slapd[12088]: => acl_mask: to value by "", (=n)
> Oct 5 12:57:50 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:50 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:50 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:50 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:50 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:50 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:50 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:50 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:50 slapd[12088]: => access_allowed: search access
> granted by read(=rscx)
> Oct 5 12:57:51 slapd[12088]: <= test_filter 5
> Oct 5 12:57:51 slapd[12088]: ldbm_search: candidate entry 3 does
> not match filter
> Oct 5 12:57:51 slapd[12088]: ====> cache_return_entry_r( 3 ):
> returned (0)
> Oct 5 12:57:51 slapd[12088]: => id2entry_r( 4 )
> Oct 5 12:57:51 slapd[12088]: ====> cache_find_entry_id( 4 )
> "uid=chuj2,dc=lx,dc=pl" (found) (1 tries)
> Oct 5 12:57:51 slapd[12088]: <= id2entry_r( 4 ) 0x811e6d0 (cache)
> Oct 5 12:57:51 slapd[12088]: => test_filter
> Oct 5 12:57:51 slapd[12088]: EQUALITY
> Oct 5 12:57:51 slapd[12088]: => access_allowed: search access to
> "uid=chuj2,dc=lx,dc=pl" "uid" requested
> Oct 5 12:57:51 slapd[12088]: => acl_get: [1] check attr uid
> Oct 5 12:57:51 slapd[12088]: <= acl_get: [1] acl
> uid=chuj2,dc=lx,dc=pl attr: uid
> Oct 5 12:57:51 slapd[12088]: => acl_mask: access to entry
> "uid=chuj2,dc=lx,dc=pl", attr "uid" requested
> Oct 5 12:57:51 slapd[12088]: => acl_mask: to value by "", (=n)
> Oct 5 12:57:51 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:51 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:51 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:51 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:51 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:51 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:51 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:51 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:52 slapd[12088]: => access_allowed: search access
> granted by read(=rscx)
> Oct 5 12:57:52 slapd[12088]: <= test_filter 5
> Oct 5 12:57:52 slapd[12088]: ldbm_search: candidate entry 4 does
> not match filter
> Oct 5 12:57:52 slapd[12088]: ====> cache_return_entry_r( 4 ):
> returned (0)
> Oct 5 12:57:52 slapd[12088]: => id2entry_r( 5 )
> Oct 5 12:57:52 slapd[12088]: ====> cache_find_entry_id( 5 )
> "uid=test,dc=lx,dc=pl" (found) (1 tries)
> Oct 5 12:57:52 slapd[12088]: <= id2entry_r( 5 ) 0x811eff0 (cache)
> Oct 5 12:57:52 slapd[12088]: => test_filter
> Oct 5 12:57:52 slapd[12088]: EQUALITY
> Oct 5 12:57:52 slapd[12088]: => access_allowed: search access to
> "uid=test,dc=lx,dc=pl" "uid" requested
> Oct 5 12:57:52 slapd[12088]: => acl_get: [1] check attr uid
> Oct 5 12:57:52 slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: uid
> Oct 5 12:57:52 slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "uid" requested
> Oct 5 12:57:52 slapd[12088]: => acl_mask: to value by "", (=n)
> Oct 5 12:57:52 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:52 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:52 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:52 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:52 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:52 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:52 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:53 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:53 slapd[12088]: => access_allowed: search access
> granted by read(=rscx)
> Oct 5 12:57:53 slapd[12088]: <= test_filter 6
> Oct 5 12:57:53 slapd[12088]: => send_search_entry:
> dn="uid=test,dc=lx,dc=pl"
> Oct 5 12:57:53 slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "entry" requested
> Oct 5 12:57:53 slapd[12088]: => acl_get: [1] check attr entry
> Oct 5 12:57:53 slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: entry
> Oct 5 12:57:53 slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "entry" requested
> Oct 5 12:57:53 slapd[12088]: => acl_mask: to all values by "", (=n)
> Oct 5 12:57:53 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:53 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:53 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:53 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:53 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:53 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:53 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:53 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:53 slapd[12088]: => access_allowed: read access granted
> by read(=rscx)
> Oct 5 12:57:53 slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "cn" requested
> Oct 5 12:57:53 slapd[12088]: => acl_get: [1] check attr cn
> Oct 5 12:57:53 slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: cn
> Oct 5 12:57:54 slapd[12088]: access_allowed: no res from state (cn)
> Oct 5 12:57:54 slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "cn" requested
> Oct 5 12:57:54 slapd[12088]: => acl_mask: to all values by "", (=n)
> Oct 5 12:57:54 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:54 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:54 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:54 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:54 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:54 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:54 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:54 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:54 slapd[12088]: => access_allowed: read access granted
> by read(=rscx)
> Oct 5 12:57:54 slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "uid" requested
> Oct 5 12:57:54 slapd[12088]: => acl_get: [1] check attr uid
> Oct 5 12:57:54 slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: uid
> Oct 5 12:57:54 slapd[12088]: access_allowed: no res from state (uid)
> Oct 5 12:57:54 slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "uid" requested
> Oct 5 12:57:54 slapd[12088]: => acl_mask: to all values by "", (=n)
> Oct 5 12:57:54 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:54 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:55 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:55 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:55 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:55 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:55 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:55 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:55 slapd[12088]: => access_allowed: read access granted
> by read(=rscx)
> Oct 5 12:57:55 slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "userPassword" requested
> Oct 5 12:57:55 slapd[12088]: => acl_get: [1] check attr userPassword
> Oct 5 12:57:55 slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: userPassword
> Oct 5 12:57:55 slapd[12088]: access_allowed: no res from state
> (userPassword)
> Oct 5 12:57:55 slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "userPassword" requested Oct 5 12:57:55
> slapd[12088]: => acl_mask: to all values by "", (=n)
> Oct 5 12:57:55 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:55 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:55 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:55 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:55 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:55 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:55 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:55 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:56 slapd[12088]: => access_allowed: read access granted
> by read(=rscx)
> Oct 5 12:57:56 slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "homeDirectory" requested Oct 5 12:57:56
> slapd[12088]: => acl_get: [1] check attr homeDirectory
> Oct 5 12:57:56 slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: homeDirectory
> Oct 5 12:57:56 slapd[12088]: access_allowed: no res from state
> (homeDirectory)
> Oct 5 12:57:56 slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "homeDirectory" requested Oct 5
> 12:57:56 slapd[12088]: => acl_mask: to all values by "", (=n)
> Oct 5 12:57:56 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:56 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:56 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:56 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:56 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:56 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:56 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:56 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:56 slapd[12088]: => access_allowed: read access granted
> by read(=rscx)
> Oct 5 12:57:56 slapd[12088]: => access_allowed: read access to
> "uid=test,dc=lx,dc=pl" "mailMessageStore" requested Oct 5 12:57:56
> slapd[12088]: => acl_get: [1] check attr mailMessageStore
> Oct 5 12:57:56 slapd[12088]: <= acl_get: [1] acl
> uid=test,dc=lx,dc=pl attr: mailMessageStore
> Oct 5 12:57:56 slapd[12088]: access_allowed: no res from state
> (mailMessageStore)
> Oct 5 12:57:57 slapd[12088]: => acl_mask: access to entry
> "uid=test,dc=lx,dc=pl", attr "mailMessageStore" requested Oct 5
> 12:57:57 slapd[12088]: => acl_mask: to all values by "", (=n)
> Oct 5 12:57:57 slapd[12088]: <= check a_dn_pat: cn=root,dc=lx,dc=pl
> Oct 5 12:57:57 slapd[12088]: => string_expand: pattern:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:57 slapd[12088]: => string_expand: expanded:
> cn=root,dc=lx,dc=pl
> Oct 5 12:57:57 slapd[12088]: => regex_matches: string:^I
> Oct 5 12:57:57 slapd[12088]: => regex_matches: rc: 1 no matches
> Oct 5 12:57:57 slapd[12088]: <= check a_dn_pat: *
> Oct 5 12:57:57 slapd[12088]: <= acl_mask: [2] applying read(=rscx)
> (stop)
> Oct 5 12:57:57 slapd[12088]: <= acl_mask: [2] mask: read(=rscx)
> Oct 5 12:57:57 slapd[12088]: => access_allowed: read access granted
> by read(=rscx)
> Oct 5 12:57:57 slapd[12042]: daemon: activity on 1 descriptors
> Oct 5 12:57:57 slapd[12088]: conn=2 op=1 ENTRY
> dn="uid=test,dc=lx,dc=pl"
> Oct 5 12:57:57 slapd[12042]: daemon: activity on:
> Oct 5 12:57:57 slapd[12088]: <= send_search_entry
> Oct 5 12:57:57 slapd[12042]: 9r
> Oct 5 12:57:57 slapd[12088]: ====> cache_return_entry_r( 5 ):
> returned (0)
> Oct 5 12:57:57 slapd[12042]:
> Oct 5 12:57:57 slapd[12088]: send_search_result: err=0 matched=""
> text=""
> Oct 5 12:57:57 slapd[12042]: daemon: read activity on 9
> Oct 5 12:57:57 slapd[12088]: send_ldap_response: msgid=2 tag=101
> err=0
> Oct 5 12:57:57 slapd[12042]: connection_get(9)
> Oct 5 12:57:57 slapd[12088]: conn=2 op=1 SEARCH RESULT tag=101
> err=0 nentries=1 text=
> Oct 5 12:57:58 slapd[12042]: connection_get(9): got connid=2
> Oct 5 12:57:58 slapd[12042]: connection_read(9): checking for input
> on id=2
> Oct 5 12:57:58 slapd[12042]: ber_get_next on fd 9 failed errno=0
> (Success)
> Oct 5 12:57:58 slapd[12093]: do_abandon
> Oct 5 12:57:58 slapd[12042]: connection_read(9): input error=-2
> id=2, closing.
> Oct 5 12:57:58 slapd[12093]: do_abandon: id=2
> Oct 5 12:57:58 slapd[12042]: connection_closing: readying conn=2
> sd=9 for close
> Oct 5 12:57:58 slapd[12042]: connection_close: deferring conn=2 sd=9
> Oct 5 12:57:58 slapd[12088]: connection_resched: attempting closing
> conn=2 sd=9
> Oct 5 12:57:58 slapd[12042]: daemon: select: listen=6
> active_threads=3 tvp=NULL
> Oct 5 12:57:58 slapd[12088]: connection_close: deferring conn=2 sd=9
> Oct 5 12:57:58 slapd[12042]: daemon: activity on 1 descriptors
> Oct 5 12:57:58 slapd[12093]: do_abandon: op=2 not found
> Oct 5 12:57:58 slapd[12088]: do_unbind
> Oct 5 12:57:58 slapd[12042]: daemon: select: listen=6
> active_threads=2 tvp=NULL
> Oct 5 12:57:58 slapd[12093]: connection_resched: attempting closing
> conn=2 sd=9
> Oct 5 12:57:58 slapd[12088]: conn=2 op=3 UNBIND
> Oct 5 12:57:58 slapd[12093]: connection_close: deferring conn=2 sd=9
> Oct 5 12:57:58 slapd[12088]: connection_resched: attempting closing
> conn=2 sd=9
> Oct 5 12:57:59 slapd[12088]: connection_close: conn=2 sd=9
> Oct 5 12:57:59 slapd[12088]: daemon: removing 9
> Oct 5 12:57:59 slapd[12088]: conn=2 fd=9 closed
> Oct 5 12:58:02 n37 courierpop3login: LOGIN FAILED,
> ip=[::ffff:my.ip.addr.]
> Oct 5 12:58:02 n37 courierpop3login: LOGOUT, ip=[::ffff:my.ip.addr.]
>
> In addition courierauthtest gives:
> # courierauthtest test
> Trying authdaemon...
> Temporary authentication failure from module authdaemon
> Authentication FAILED!
>
>
> Does anybody know what's wrong????
>
> thanks fo any help.
>
> pozdr
>
-------------------------------------------------------
This SF.net email is sponsored by: IT Product Guide on ITManagersJournal
Use IT products in your business? Tell us what you think of them. Give us
Your Opinions, Get Free ThinkGeek Gift Certificates! Click to find out more
http://productguide.itmanagersjournal.com/guidepromo.tmpl
_______________________________________________
courier-users mailing list
[EMAIL PROTECTED]
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users