Commit Graph

699 Commits

Author SHA1 Message Date
Julio Sánchez Fernández
ea8669c37d Clear c_needs_tls_acccept on ldap_pvt_tls_accept errors 1999-07-16 18:48:13 +00:00
Julio Sánchez Fernández
68b508d2f0 Move calls to ldap_pvt_tls_accept to connection_read instead of
connection_init so that we get into the select() logic.
Make use of new flags in the connection.
BTW, and before I forget, it sort of works.  I have connected with
a Netscape client using a secure connection and did a failed
search (my test database is empty), but the trace looked correct.
Make sure you have your CA certificate in your Netscape preinstalled.
Otherwise, the connection fails with error 0xFFFFFFFF that is rather
uninformative.
1999-07-16 15:52:17 +00:00
Julio Sánchez Fernández
a4a675f987 Two new flags in Connection. One to indicate that it is a raw TLS
section (that is, not SASL).  The second to indicate that we need to
do SSL_accept on this connection.
1999-07-16 15:43:47 +00:00
Julio Sánchez Fernández
8af470a543 Fix syntax oid for type 2.16.840.1.113730.3.1.34 (ref) 1999-07-16 10:51:31 +00:00
Julio Sánchez Fernández
ac49f25f75 Definitely, 'dn' and 'distinguishedName' are different things. The
former is a pseudo attribute type used internally by slapd to represent
the distinguished name of an entry and its existance should not be
visible.  The latter is an "abstract" attribute type that is not meant
to exist in practice except as supertype of other dn-valued types.
So, the definition of attribute type 2.5.4.49 has been changed to be
just distinguishedName.  Work on the OPENLDAP_DEVEL_SCHEMA branch will
treat pseudo attributes especially and will not be visible to the
clients.
1999-07-16 10:39:40 +00:00
Julio Sánchez Fernández
fd8b582aa9 We should stop using SSL to refer to TLS. This is a first step. 1999-07-16 10:28:51 +00:00
Kurt Zeilenga
73276e84ae Import experimental referral implementation from OPENLDAP_DEVEL_REFERRALS.
Includes support for update referral for each replicated backend.
	Reworked replication test to use update referral.
Includes major rewrite of response encoding codes (result.c).
Includes reworked alias support and eliminates old suffix alias codes
(can be emulated using named alias).
Includes (untested) support for the Manage DSA IT control.
Works in LDAPv2 world.  Still testing in LDAPv3 world.
Added default referral (test009) test.
1999-07-16 02:45:46 +00:00
Kurt Zeilenga
9568a013a8 Backend lock wasn't being released properly. 1999-07-16 00:16:54 +00:00
Julio Sánchez Fernández
edb1d671f8 Initialize the TLS environment *after* reading the config files. 1999-07-15 21:07:01 +00:00
Julio Sánchez Fernández
fd49eacc4b Parse more TLS options in slapd.conf 1999-07-15 21:05:08 +00:00
Julio Sánchez Fernández
d92c7c1c7d A couple of options for TLS configuration. Still a conflict here,
the default context is initialized before the config file is read,
so the locations are not know at context initialization.
1999-07-15 15:04:02 +00:00
Julio Sánchez Fernández
1df71e1814 Get rid of two compilation warnings. One is thought to be properly
taken care of.  The second, however, on remove_old_locks is unclear.
1999-07-14 19:51:35 +00:00
Julio Sánchez Fernández
e74ff638ba Parsing of flag -T was falling through to the default case.
Init the TLS environment if necessary.  Lots of things needed here,
in particular, preparing properly the default context.
1999-07-14 19:49:39 +00:00
Julio Sánchez Fernández
6d75d0f8fb connection_init now takes one more argument that indicates whether to
use TLS right away or not on that connection.
1999-07-14 19:44:18 +00:00
Julio Sánchez Fernández
c18d6e7ecf Only bind on TLS port if explicitly requested with -T, otherwise all
kind of conflicts happen when running tests.
1999-07-14 13:39:30 +00:00
Julio Sánchez Fernández
5b7babdee4 Bind and listen on TLS port too 1999-07-14 13:16:13 +00:00
Julio Sánchez Fernández
8542e45380 Extend slapd_args with TLS info 1999-07-14 13:14:54 +00:00
Julio Sánchez Fernández
0dac59ca26 Include $(TLS_LIBS) 1999-07-13 19:15:14 +00:00
Kurt Zeilenga
12b87ceebc Fix debug message. 1999-07-13 08:24:26 +00:00
Hallvard Furuseth
fb3b8e5ef1 Fix LDAP_CONNECTIONLESS code rot 1999-07-13 06:39:55 +00:00
Hallvard Furuseth
c4a13efbea Fix NULLxxx -> NULL 1999-07-13 06:37:19 +00:00
Hallvard Furuseth
4e80e9b9f2 Add opattrs=0 arg to send_search_entry() call 1999-07-13 05:05:59 +00:00
Hallvard Furuseth
b5455b8e47 Erase bad space from blank Makefile line 1999-07-13 04:13:21 +00:00
Hallvard Furuseth
55fa595f56 Add missing newline at EOF 1999-07-13 04:11:49 +00:00
Hallvard Furuseth
7e3ede2e01 Erase bad space from blank Makefile line 1999-07-13 04:01:25 +00:00
Kurt Zeilenga
5e14b911e6 Mirror <ac/time.h> inclusion made in re12 1999-07-09 21:10:19 +00:00
Kurt Zeilenga
469baeb3c0 Forgot the most important part of unsolicited notifications... exop! 1999-07-07 18:53:51 +00:00
Kurt Zeilenga
e9c2895472 Add support for unsolicited notifications. 1999-07-07 18:51:39 +00:00
Kurt Zeilenga
b8edef2b2c Copy LDBM bind "ACL_AUTH" and SASL framework to bdb2. 1999-07-07 18:47:51 +00:00
Kurt Zeilenga
7541ccbe10 Fix CRITICIAL typo. 1999-07-07 18:32:41 +00:00
Kurt Zeilenga
6c1758ae33 Add matching rule assertion structure to filter union. 1999-07-07 18:02:32 +00:00
Kurt Zeilenga
fb593fc5b9 Add controls.c to pick up get_ctrls(). 1999-07-05 23:08:43 +00:00
Kurt Zeilenga
32cefa43a0 Add controls.c: initial version of get_ctrls() 1999-07-05 23:04:35 +00:00
Kurt Zeilenga
00086db3f6 Add get_ctrls()... 1999-07-05 23:01:17 +00:00
Kurt Zeilenga
51d1c90887 unifdef -DSLAPD_ACLGROUPS -DSLAPD_ACLAUTH 1999-07-05 06:26:26 +00:00
Kurt Zeilenga
549c89f817 Regarding previous commit:
Fix broken ACL macros.
	Fix o_dn/o_ndn == NULL vs "".
1999-07-04 19:53:00 +00:00
Kurt Zeilenga
49f39bc4cf o_dn/o_ndn must not be NULL. Set to "" upon receiving bind request. 1999-07-04 19:37:25 +00:00
Kurt Zeilenga
106eef41d8 HEADS UP: connections are forced to "anonymous" status upon receiving
of a bind request and, upon failure, are left "anonymous."

Rework ACL code to hide access testing within macros to facilate additions
and eventual redesign.

Addition of #ifdef SLAPD_ACLAUTH to conditional include EXPERIMENTAL
"auth" access controls.  Adds ACL_AUTH "auth" access level (above none,
below "compare").  bind requires anonymous access at this level or above access
to "entry"/"userPassword"/"krbName".  This allows administrators to restrict
which entries can be bound to.  (This will likely become default behavior
after testing has completed).
1999-07-04 18:46:24 +00:00
Kurt Zeilenga
daf40a51c1 Abandon all operations upon receiving a BindRequest. 1999-07-02 21:42:53 +00:00
Kurt Zeilenga
b7bbc7504d More bind changes to support SASL/DIGEST.
Added configuration support for "digest-realm <realm>" configure directive.
Added connection state and bind_in_progress fields to cn=monitor connection
attribute.
1999-07-02 19:48:07 +00:00
Kurt Zeilenga
175ace59c8 Send LDAP_SASL_BIND_IN_PROGRESS if o_bind_in_progress is true. 1999-07-02 00:46:28 +00:00
Kurt Zeilenga
6f8fad20f2 Add conn/op bind_in_progress flags such that operations can detect
if multiple step SASL binds are in progress.
1999-07-02 00:04:47 +00:00
Kurt Zeilenga
97bc107537 Add macros to support testing of error categories to ldap.h
Modify ldap_result to assert returned error is not an one reserved
for API use.
Modify frontend LDAP operation routines to return an error code.
The returned value will be used to determine if an unsolicited notification
should be sent to the client.
Need to review returned error codes.  Namely some LDAP_PROTOCOL_ERROR
will like need to be changed (as they will cause unsolicited notifications).
1999-07-01 21:20:45 +00:00
Kurt Zeilenga
d7b311c6e1 s/LDAP_NOT_SUPPORTED/LDAP_UNWILLING_TO_PERFORM/ 1999-07-01 04:43:48 +00:00
Kurt Zeilenga
ddd0559284 Fairly complete slapd SASL bind parsing... and centralized cleanup code.
Update error strings and cldap misuse of server error.
1999-07-01 04:42:01 +00:00
Kurt Zeilenga
129ee42f37 NO-OP SASL parsing... DIGEST-MD5 coming soon. 1999-07-01 03:18:00 +00:00
Kurt Zeilenga
f9db1ea889 Rework BER decoding with lieu of LDAPv3 controls (coming soon).
Add place holder for handling LDAPv3 extended operations (coming soon).
1999-06-30 22:43:27 +00:00
Kurt Zeilenga
14820afdd9 Reimplement connection counters. Format of "connection" attribute
changed significantly.
1999-06-30 02:50:40 +00:00
Kurt Zeilenga
9225707a06 Modify lutil_passwd to accept a third argument char** methods to
specific which methods may be used.  This will facilate development
of a slapd config directive "passwordMethod ..." to specify which
methods should be allowed.
1999-06-29 22:24:53 +00:00
Kurt Zeilenga
fe00263875 expose oc_check_operational from schema.c
Use everywhere.
Apply search ACLs to operational attributes.
Only provide operational attributes when explicitly requested.
1999-06-29 04:52:55 +00:00