[389-users] Re: A plugin to record modification timestamp and modifiers DN for specific attribute

2020-09-21 Thread William Brown
> On 22 Sep 2020, at 00:48, Jan Tomasek wrote: > > Hi William, > >> An interesting idea that could bring you a lot assurance, would be to >> integrate and test with Address Sanitiser. This would help you find >> and detect potential memory safety issues in the plugin. If you want >> some

[389-users] Re: How do I connect to 389-server via ldapsearch?

2020-09-21 Thread Mark Reynolds
On 9/21/20 5:14 AM, rai...@ultra-secure.de wrote: Am 2020-09-18 22:33, schrieb Mark Reynolds: This means you used the wrong password, you need to use whatever was set for "root_password" in the INF file.  But it wouldn't hurt to check the access log for "err=49" and it will give you the

[389-users] Re: How do I connect to 389-server via ldapsearch?

2020-09-21 Thread rainer
Am 2020-09-21 11:14, schrieb rai...@ultra-secure.de: Am 2020-09-18 22:33, schrieb Mark Reynolds: This means you used the wrong password, you need to use whatever was set for "root_password" in the INF file.  But it wouldn't hurt to check the access log for "err=49" and it will give you the

[389-users] Re: A plugin to record modification timestamp and modifiers DN for specific attribute

2020-09-21 Thread Jan Tomasek
Hi William, > An interesting idea that could bring you a lot assurance, would be to > integrate and test with Address Sanitiser. This would help you find > and detect potential memory safety issues in the plugin. If you want > some advice on how to do this, I'm happy to help. Using Address

[389-users] Re: LDAPS only plugin & how to disable LDAP protocol at all

2020-09-21 Thread Mark Reynolds
You can set nsslapd-port to 0 and that will disable the port. See also: https://www.port389.org/docs/389ds/howto/howto-listensslonly.html https://access.redhat.com/documentation/en-us/red_hat_directory_server/11/html/administration_guide/configuring-special-binds#requiring-secure-binds

[389-users] Re: How do I connect to 389-server via ldapsearch?

2020-09-21 Thread rainer
Am 2020-09-18 22:33, schrieb Mark Reynolds: This means you used the wrong password, you need to use whatever was set for "root_password" in the INF file.  But it wouldn't hurt to check the access log for "err=49" and it will give you the exact reason for the failure (most likely bad password,

[389-users] Re: Account Policy Plugin combined with user policy and "passwordexp: off" impossible?

2020-09-21 Thread Simon Pichugin
Hi Eugen, okay, another option will be to define Local Account Policy for the users you want to be locked after the expiration. Check out this setup for Local Account Policy (CoS configuration):