Wed, 08 Feb 2012 20:07:00 +0200
Update version, adapt patch, correct PID writing, correct build on newer
FreeBSD releases, and most importantly introduce new patch to try to
avoid segfault caused by multiple network interfaces with the same (or
no) address. This is common when configuring bridges and tunnels.
1 ##
2 ## saslauthd.conf -- SASL Authentication Daemon Configuration
3 ##
5 # white space separated list of LDAP servers
6 ldap_servers: ldap://127.0.0.1
8 # authentication for restricted LDAP servers
9 #ldap_bind_dn: cn=operator,ou=Profile,o=example.com
10 #ldap_bind_pw: secret
12 # LDAP version to use (2|3)
13 #ldap_version 3
15 # LDAP timeout
16 #ldap_timeout 5
18 # LDAP aliases (search|find|always|never)
19 ldap_deref: never
21 # follow LDAP referrals ?
22 ldap_referrals: no
24 # restart LDAP I/O operations that fail ?
25 ldap_restart: yes
27 # search scope (sub|one|base)
28 #ldap_scope: sub
30 # starting point for a search
31 ldap_search_base: MUST-SPECIFY
33 # authenticate against LDAP (bind|custom|fastbind)
34 ldap_auth_method: bind
36 # Filter LDAP records, %u = username, %r = realm
37 # if ldap_auth_method is 'bind' the filter searches for the DN
38 # otherwise the filter searches for the userPassword attribute
39 #ldap_filter: uid=%u
41 # debugging LDAP operation
42 #ldap_debug 0
44 # require and verify server certificate
45 #ldap_tls_check_peer: no
46 #ldap_tls_cacert_file:
47 #ldap_tls_cacert_dir:
49 # list of SSL/TLS ciphers to allow
50 #ldap_tls_ciphers: DEFAULT
52 # files containing client certificate and key
53 #ldap_tls_cert:
54 #ldap_tls_key: