Bug 113981

Summary: nss_ldap still broken in U1
Product: Red Hat Enterprise Linux 3 Reporter: Mark Leary <mleary>
Component: nss_ldapAssignee: Nalin Dahyabhai <nalin>
Status: CLOSED WONTFIX QA Contact: Jay Turner <jturner>
Severity: medium Docs Contact:
Priority: high    
Version: 3.0CC: mleary, srevivo
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-10-19 19:30:59 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Mark Leary 2004-01-20 21:54:14 UTC
From Bugzilla Helper:
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)

Description of problem:
nss_ldap is not pulling entries from ldap directory correctly.  
Prevents users in ldap directory from logging in.

Version-Release number of selected component (if applicable):
207-5

How reproducible:
Always

Steps to Reproduce:
1.  getent passwd (expected entries are pulled from ldap)
2.  getent passwd key (where key is a uid returned above)

    

Actual Results:  Nothing is returned.

Expected Results:  The database entry for key should be returned.

Additional info:

Comment 1 Damian Christey 2004-11-11 22:01:35 UTC
This sounds a lot like a bug I found in Fedora Core 3. ( bug #138911 )

Can you try disabling nscd and see if that fixes it? 

Comment 2 RHEL Program Management 2007-10-19 19:30:59 UTC
This bug is filed against RHEL 3, which is in maintenance phase.
During the maintenance phase, only security errata and select mission
critical bug fixes will be released for enterprise products. Since
this bug does not meet that criteria, it is now being closed.
 
For more information of the RHEL errata support policy, please visit:
http://www.redhat.com/security/updates/errata/
 
If you feel this bug is indeed mission critical, please contact your
support representative. You may be asked to provide detailed
information on how this bug is affecting you.