Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr krb5MaxLife Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5MaxLife" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (shadowLastChange) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "shadowLastChange" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr shadowLastChange Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "shadowLastChange" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr shadowLastChange Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "shadowLastChange" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (cn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaMungedDial) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaMungedDial" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaMungedDial Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaMungedDial" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr sambaMungedDial Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaMungedDial" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5MaxRenew) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "krb5MaxRenew" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5MaxRenew Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5MaxRenew" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr krb5MaxRenew Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5MaxRenew" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (loginShell) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "loginShell" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr loginShell Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "loginShell" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr loginShell Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "loginShell" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr loginShell Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "loginShell" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionObjectType) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (displayName) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "displayName" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr displayName Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "displayName" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr displayName Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "displayName" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (mailPrimaryAddress) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "mailPrimaryAddress" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr mailPrimaryAddress Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "mailPrimaryAddress" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr mailPrimaryAddress Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "mailPrimaryAddress" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaSID) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaSID" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaSID Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaSID" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr sambaSID Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaSID" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (gecos) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "gecos" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr gecos Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gecos" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr gecos Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gecos" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr gecos Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gecos" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr sn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr sn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (homeDirectory) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "homeDirectory" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr homeDirectory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "homeDirectory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr homeDirectory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "homeDirectory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr homeDirectory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "homeDirectory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (gidNumber) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr gidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr gidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr gidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaPrimaryGroupSID) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaPrimaryGroupSID" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaPrimaryGroupSID Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPrimaryGroupSID" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr sambaPrimaryGroupSID Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPrimaryGroupSID" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (pwhistory) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "pwhistory" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr pwhistory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "pwhistory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr pwhistory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "pwhistory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (userPassword) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "userPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_get: [1] attr userPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "userPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: anonymous Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [2] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [2] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr userPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "userPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr userPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "userPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaNTPassword) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaNTPassword" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaNTPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaNTPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr sambaNTPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaNTPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaLMPassword) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaLMPassword" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaLMPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaLMPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr sambaLMPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaLMPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaPasswordHistory) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaPasswordHistory" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaPasswordHistory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPasswordHistory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr sambaPasswordHistory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPasswordHistory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "krb5Key" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5Key Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5Key" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr krb5Key Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5Key" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5KDCFlags) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "krb5KDCFlags" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5KDCFlags Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5KDCFlags" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr krb5KDCFlags Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5KDCFlags" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5KeyVersionNumber) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "krb5KeyVersionNumber" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5KeyVersionNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5KeyVersionNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr krb5KeyVersionNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5KeyVersionNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaPwdLastSet) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaPwdLastSet" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaPwdLastSet Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPwdLastSet" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr sambaPwdLastSet Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPwdLastSet" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionPolicyReference) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionPolicyReference Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionPolicyReference Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (uid) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "uid" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr uid Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "uid" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr uid Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "uid" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr uid Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "uid" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5PrincipalName) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "krb5PrincipalName" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5PrincipalName Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5PrincipalName" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr krb5PrincipalName Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5PrincipalName" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionMailHomeServer) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "univentionMailHomeServer" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionMailHomeServer Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionMailHomeServer" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionMailHomeServer Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionMailHomeServer" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (uidNumber) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "uidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr uidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "uidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr uidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "uidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr uidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "uidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaAcctFlags) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaAcctFlags" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaAcctFlags Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaAcctFlags" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr sambaAcctFlags Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaAcctFlags" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5MaxLife) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "krb5MaxLife" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5MaxLife Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5MaxLife" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr krb5MaxLife Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5MaxLife" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (shadowLastChange) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "shadowLastChange" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr shadowLastChange Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "shadowLastChange" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr shadowLastChange Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "shadowLastChange" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (cn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaMungedDial) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaMungedDial" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaMungedDial Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaMungedDial" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr sambaMungedDial Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaMungedDial" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5MaxRenew) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "krb5MaxRenew" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5MaxRenew Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5MaxRenew" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr krb5MaxRenew Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5MaxRenew" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (loginShell) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "loginShell" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr loginShell Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "loginShell" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr loginShell Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "loginShell" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr loginShell Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "loginShell" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionObjectType) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (displayName) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "displayName" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr displayName Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "displayName" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr displayName Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "displayName" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (mailPrimaryAddress) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "mailPrimaryAddress" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr mailPrimaryAddress Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "mailPrimaryAddress" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr mailPrimaryAddress Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "mailPrimaryAddress" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaSID) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaSID" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaSID Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaSID" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr sambaSID Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaSID" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (gecos) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "gecos" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr gecos Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gecos" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr gecos Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gecos" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr gecos Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gecos" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr sn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr sn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (homeDirectory) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "homeDirectory" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr homeDirectory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "homeDirectory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr homeDirectory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "homeDirectory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr homeDirectory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "homeDirectory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (gidNumber) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr gidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr gidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr gidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaPrimaryGroupSID) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaPrimaryGroupSID" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaPrimaryGroupSID Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPrimaryGroupSID" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr sambaPrimaryGroupSID Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPrimaryGroupSID" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (pwhistory) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "pwhistory" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr pwhistory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "pwhistory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr pwhistory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "pwhistory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (userPassword) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "userPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_get: [1] attr userPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "userPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: anonymous Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [2] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [2] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr userPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "userPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr userPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "userPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaNTPassword) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaNTPassword" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaNTPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaNTPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr sambaNTPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaNTPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaLMPassword) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaLMPassword" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaLMPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaLMPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr sambaLMPassword Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaLMPassword" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaPasswordHistory) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaPasswordHistory" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaPasswordHistory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPasswordHistory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr sambaPasswordHistory Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPasswordHistory" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "krb5Key" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5Key Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5Key" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr krb5Key Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5Key" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (krb5Key) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5KDCFlags) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "krb5KDCFlags" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5KDCFlags Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5KDCFlags" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr krb5KDCFlags Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5KDCFlags" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5KeyVersionNumber) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "krb5KeyVersionNumber" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5KeyVersionNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5KeyVersionNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr krb5KeyVersionNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "krb5KeyVersionNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (sambaPwdLastSet) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "sambaPwdLastSet" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr sambaPwdLastSet Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPwdLastSet" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [8] attr sambaPwdLastSet Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "sambaPwdLastSet" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: self Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] applying write(=wrscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [1] mask: write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by write(=wrscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionPolicyReference) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "uid=user1,cn=users,dc=lish,dc=qa" "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionPolicyReference Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionPolicyReference Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "uniqueMember" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr uniqueMember Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "uniqueMember" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr uniqueMember Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "uniqueMember" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr uniqueMember Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "uniqueMember" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr gidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr gidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr gidNumber Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "gidNumber" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=Domain Users,cn=groups,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=Domain Users,cn=groups,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=lish.qa,cn=domain,cn=mail,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: disclose access to "cn=univention,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: disclose access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: disclose access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: OVER: rs->sr_err != LDAP_SUCCESS on "cn=directory,cn=univention,dc=lish,dc=qa" ERR: 0x20 Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionObjectType) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (cn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionComputersObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionComputersObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionComputersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionComputersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionComputersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionComputersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionComputersObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionComputersObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionDnsObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionDnsObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionDnsObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionDnsObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionDnsObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionDnsObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionDhcpObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionDhcpObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionDhcpObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionDhcpObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionDhcpObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionDhcpObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionPolicyObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionPolicyObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionPolicyObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionPolicyObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionPolicyObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionLicenseObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionLicenseObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionLicenseObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionLicenseObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionLicenseObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionLicenseObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionUsersObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionUsersObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionUsersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionUsersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionUsersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionUsersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionGroupsObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionGroupsObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionGroupsObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionGroupsObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionGroupsObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionGroupsObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionNetworksObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionNetworksObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionNetworksObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionNetworksObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionNetworksObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionNetworksObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionSharesObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionSharesObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionSharesObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionSharesObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionSharesObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionSharesObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionPrintersObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionPrintersObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionPrintersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionPrintersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionPrintersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionPrintersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionMailObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionMailObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionMailObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionMailObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionMailObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionMailObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionMailObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionMailObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=users,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=users,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=users,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionPolicyReference) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "dc=lish,dc=qa" "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionPolicyReference Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionPolicyReference Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyReference) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyReference) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyReference) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyReference) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyReference) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionObjectType) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (cn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionPWHistoryLen) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "univentionPWHistoryLen" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionPWHistoryLen Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "univentionPWHistoryLen" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionPWHistoryLen Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "univentionPWHistoryLen" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionPWLength) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "univentionPWLength" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionPWLength Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "univentionPWLength" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionPWLength Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "univentionPWLength" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionObjectType) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (cn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=routing,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionObjectType) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (cn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionFileServer) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "univentionFileServer" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionFileServer Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "univentionFileServer" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionFileServer Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=thinclient,cn=policies,dc=lish,dc=qa", attr "univentionFileServer" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionObjectType) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (cn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=boot,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionObjectType) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (cn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (umcPolicyGrantedOperationSet) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "umcPolicyGrantedOperationSet" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr umcPolicyGrantedOperationSet Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "umcPolicyGrantedOperationSet" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr umcPolicyGrantedOperationSet Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-udm-self,cn=UMC,cn=policies,dc=lish,dc=qa", attr "umcPolicyGrantedOperationSet" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionObjectType) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (cn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionDhcpDomainNameServers) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "univentionDhcpDomainNameServers" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionDhcpDomainNameServers Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "univentionDhcpDomainNameServers" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionDhcpDomainNameServers Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "univentionDhcpDomainNameServers" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionDhcpDomainName) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "univentionDhcpDomainName" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionDhcpDomainName Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "univentionDhcpDomainName" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionDhcpDomainName Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default-settings,cn=dns,cn=dhcp,cn=policies,dc=lish,dc=qa", attr "univentionDhcpDomainName" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: disclose access to "cn=univention,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: disclose access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: disclose access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: OVER: rs->sr_err != LDAP_SUCCESS on "cn=directory,cn=univention,dc=lish,dc=qa" ERR: 0x20 Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionObjectType) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionObjectType Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionObjectType" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (cn) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "cn" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr cn Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "cn" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionComputersObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionComputersObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionComputersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionComputersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionComputersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionComputersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionComputersObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionComputersObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionDnsObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionDnsObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionDnsObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionDnsObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionDnsObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionDnsObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionDhcpObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionDhcpObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionDhcpObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionDhcpObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionDhcpObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionDhcpObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionPolicyObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionPolicyObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionPolicyObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionPolicyObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionPolicyObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionPolicyObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionLicenseObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionLicenseObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionLicenseObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionLicenseObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionLicenseObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionLicenseObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionUsersObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionUsersObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionUsersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionUsersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionUsersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionUsersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionGroupsObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionGroupsObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionGroupsObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionGroupsObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionGroupsObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionGroupsObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionNetworksObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionNetworksObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionNetworksObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionNetworksObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionNetworksObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionNetworksObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionSharesObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionSharesObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionSharesObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionSharesObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionSharesObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionSharesObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionPrintersObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionPrintersObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionPrintersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionPrintersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionPrintersObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionPrintersObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionMailObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=default containers,cn=univention,dc=lish,dc=qa" "univentionMailObject" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionMailObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionMailObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=default containers,cn=univention,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionMailObject Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=default containers,cn=univention,dc=lish,dc=qa", attr "univentionMailObject" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionMailObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (univentionMailObject) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "cn=pwhistory,cn=users,cn=policies,dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "dc=lish,dc=qa" "entry" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr entry Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "entry" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to all values by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [7] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_group_pat: cn=domain admins,cn=groups,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr objectClass Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (read(=rscxd)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result was in cache (objectClass) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (krb5RealmName) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access to "dc=lish,dc=qa" "krb5RealmName" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr krb5RealmName Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "krb5RealmName" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr krb5RealmName Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "dc=lish,dc=qa", attr "krb5RealmName" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: read access granted by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: result not in cache (univentionPolicyReference) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: delete access to "uid=user1,cn=users,dc=lish,dc=qa" "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => dn: [2] cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => acl_get: [3] attr univentionPolicyReference Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (=0) Sep 7 12:31:40 generic slapd[31485]: <= check a_sockname_path: PATH=/var/run/slapd/ldapi Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: * Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] applying none(=0) (break) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [4] mask: none(=0) Sep 7 12:31:40 generic slapd[31485]: => dn: [4] uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [5] uid=join-backup,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [6] uid=join-slave,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dn: [9] cn=admin-settings,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [10] uid=([^,]+),cn=admin-settings,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [11] ^univentionVirtualMachineUUID=([^,]+),cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [12] ^cn=Information,cn=Virtual Machine Manager,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [13] ^cn=([^,]+),cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 2 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [14] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [15] ^cn=([^,]+),cn=temporary,cn=univention,dc=lish,dc=qa nsub: 1 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [16] cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [17] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [17] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [18] .*,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [18] matched Sep 7 12:31:40 generic slapd[31485]: => access_allowed: search access to "uid=user1,cn=users,dc=lish,dc=qa" "objectClass" requested Sep 7 12:31:40 generic slapd[31485]: => dnpat: [19] cn=.*,cn=dc,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [20] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dnpat: [21] cn=.*,cn=memberserver,cn=computers,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => dn: [24] cn=idmap,cn=univention,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => dnpat: [25] .*,cn=idmap,cn=univention,dc=lish,dc=qa nsub: 0 Sep 7 12:31:40 generic slapd[31485]: => acl_get: [26] attr univentionPolicyReference Sep 7 12:31:40 generic slapd[31485]: => acl_mask: access to entry "uid=user1,cn=users,dc=lish,dc=qa", attr "univentionPolicyReference" requested Sep 7 12:31:40 generic slapd[31485]: => acl_mask: to value by "uid=user1,cn=users,dc=lish,dc=qa", (none(=0)) Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: cn=admin,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: <= check a_set_pat: user & [cn=Domain Admins,cn=groups,dc=lish,dc=qa]/uniqueMember* Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "cn=domain admins,cn=groups,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: ACL set[0]=uid=administrator,cn=users,dc=lish,dc=qa Sep 7 12:31:40 generic slapd[31485]: => bdb_entry_get: found entry: "uid=administrator,cn=users,dc=lish,dc=qa" Sep 7 12:31:40 generic slapd[31485]: <= bdb_entry_get: failed to find attribute uniqueMember Sep 7 12:31:40 generic slapd[31485]: ACL set: empty Sep 7 12:31:40 generic slapd[31485]: <= check a_dn_pat: users Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] applying read(=rscxd) (stop) Sep 7 12:31:40 generic slapd[31485]: <= acl_mask: [3] mask: read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => slap_access_allowed: delete access denied by read(=rscxd) Sep 7 12:31:40 generic slapd[31485]: => access_allowed: no more rules Sep 7 12:31:40 generic slapd[31485]: OVER: rs->sr_err != LDAP_SUCCESS on "uid=user1,cn=users,dc=lish,dc=qa" ERR: 0x32