I've worked around this bug at this time by adding:
LDAPVerifyServerCert off
to the server config to get around the problem at this time.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
I'm also seeing intermittent LDAP failures to bind for users with this
version of the apache2 package. I think a regression in ssl support for
ldap has occured with this version of apache2. I've put one of my two
misbehaving servers back to 2.2.14-5ubuntu8.4 to see if the problems go
away. A
SSL regression appears to be when used for ldap communication to active
directory servers, not for serving http.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/839390
Title:
Lucid is still affected with this issue.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to net-snmp in Ubuntu.
https://bugs.launchpad.net/bugs/496922
Title:
Ubuntu snmpd package doesn't include all net-snmpd modules
To manage
Script essentially is giving me a counter to watch the rate of commits
on a subversion repository:
mheldebr@server:~$ /svn-hotcopy/svnyoungest
10386
I tried both exec (works on RHEL5 configured like this) and extend which
both fail:
Snippet of snmpd.conf file with exec style:
exec
It seems then that neither exec not extend let me anchor the oid where I
want like I could before. Either way will give
I just had to go digging for the numeric OID to poll with cacti with
snmpwalk.
mheldebr@server:/svn-hotcopy$ sudo grep extend /etc/snmp/snmpd.conf
extend svncommits /bin/sh
Public bug reported:
Not sure if this is a problem with openldap or cyrus-sasl2 at this
point.
Using sasl binding only works with ldapsearch when not using ssl or tls.
If either ssl or tls is used I see this ouput from -d 1 from ldapsearch:
sb_sasl_generic_pkt_length: received illegal packet
I can't use GSSAPI via sasl to receive data from the ldap server if SSL
or TLS is used as I get illegal packet length errors as reported. Non
encrypted ldap is working with no issues using GSSAPI authentication.
--
You received this bug notification because you are a member of Ubuntu
Server
snmp commands do work with:
mheldebr@server:/$ snmpwalk -v2c -c REDACTED localhost
'NET-SNMP-EXTEND-MIB::nsExtendOutLine.svncommits.1'
NET-SNMP-EXTEND-MIB::nsExtendOutLine.svncommits.1 = STRING: 11486
--
You received this bug notification because you are a member of Ubuntu
Server Team, which