Sat, 06 Oct 2012 16:24:01 +0200
Update to new vendor software version and adjust patch code accordingly.
Unfortunately the vendor has apparently failed to properly test this
release which depends on missing object symbols in libsasl2.a(common.o):
undefined reference to `sasl_randcreate'
undefined reference to `sasl_mkchal'
undefined reference to `sasl_utf8verify'
undefined reference to `sasl_rand'
undefined reference to `sasl_churn'
undefined reference to `sasl_encode64'
undefined reference to `sasl_decode64'
undefined reference to `sasl_erasebuffer'
undefined reference to `sasl_randfree'
undefined reference to `sasl_strlower'
undefined reference to `get_fqhostname'
...yet to be patched.
1 ##
2 ## saslauthd.conf -- SASL Authentication Daemon Configuration
3 ##
5 # white space separated list of LDAP servers
6 ldap_servers: ldap://127.0.0.1
8 # authentication for restricted LDAP servers
9 #ldap_bind_dn: cn=operator,ou=Profile,o=example.com
10 #ldap_bind_pw: secret
12 # LDAP version to use (2|3)
13 #ldap_version 3
15 # LDAP timeout
16 #ldap_timeout 5
18 # LDAP aliases (search|find|always|never)
19 ldap_deref: never
21 # follow LDAP referrals ?
22 ldap_referrals: no
24 # restart LDAP I/O operations that fail ?
25 ldap_restart: yes
27 # search scope (sub|one|base)
28 #ldap_scope: sub
30 # starting point for a search
31 ldap_search_base: MUST-SPECIFY
33 # authenticate against LDAP (bind|custom|fastbind)
34 ldap_auth_method: bind
36 # Filter LDAP records, %u = username, %r = realm
37 # if ldap_auth_method is 'bind' the filter searches for the DN
38 # otherwise the filter searches for the userPassword attribute
39 #ldap_filter: uid=%u
41 # debugging LDAP operation
42 #ldap_debug 0
44 # require and verify server certificate
45 #ldap_tls_check_peer: no
46 #ldap_tls_cacert_file:
47 #ldap_tls_cacert_dir:
49 # list of SSL/TLS ciphers to allow
50 #ldap_tls_ciphers: DEFAULT
52 # files containing client certificate and key
53 #ldap_tls_cert:
54 #ldap_tls_key: