Bug 165172
Summary: | slapd aborts on startup when /etc/openldap/ldap.conf contains an invalid TLS_CACERT entry | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 4 | Reporter: | Jay Fenlason <fenlason> | ||||
Component: | openldap | Assignee: | Jan Zeleny <jzeleny> | ||||
Status: | CLOSED WONTFIX | QA Contact: | Jay Turner <jturner> | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | 4.0 | CC: | jfeeney, jhrozek, joshkel, psklenar, srevivo | ||||
Target Milestone: | --- | ||||||
Target Release: | --- | ||||||
Hardware: | i386 | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2010-03-05 16:45:32 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 356401 | ||||||
Attachments: |
|
Description
Jay Fenlason
2005-08-04 21:13:25 UTC
Created attachment 241821 [details]
initscript patch
The readability of the CACERT file can be checked in init script, in the same
way as TLS files from slapd.conf.
User will see during startup:
/mnt/testarea/ca.crt is not readable by "ldap" [WARNING]
Starting slapd: [FAILED]
This should be enough for the user to trace down his/her error.
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. This request was evaluated by Red Hat Product Management for inclusion, but this component is not scheduled to be updated in the current Red Hat Enterprise Linux release. If you would like this request to be reviewed for the next minor release, ask your support representative to set the next rhel-x.y flag to "?". Since there will be only one more release of RHEL4 and it will be focused on performance and security, I'm closing this bug. If anyone experiences problems with this bug, I recommend switching to RHEL5, where this has already been fixed. |