ELF4Pa4 (WW\ll^nn$$PtdSSSQtdRtd\llXXGNUWx<7 0@ 79<BE|qXdL|`G r("xuR eKq>ZR!V+ p/,Ge XppXp? p8L  9 __gmon_start___init_fini__cxa_finalize_Jv_RegisterClassesauthnz_ldap_moduleapr_ldap_url_parseapr_pstrdupstrlenapr_pallocstrcpymemsetstrcasecmpstrncasecmpgetpidap_log_errorap_register_providerap_hook_post_configap_hook_auth_checkerap_hook_optional_fn_retrieveapr_dynamic_fn_retrieveapr_thread_mutex_createapr_array_makeapr_array_pushapr_hash_getap_find_linked_moduleap_server_root_relativeap_pcfg_openfileapr_hash_makeap_cfg_getlineap_getword_confap_str_tolowerapr_hash_setap_cfg_closefileapr_table_getapr_xlate_openapr_xlate_conv_bufferapr_snprintfstrchrap_log_rerrorldap_err2stringapr_pstrcat__ctype_toupper_locapr_table_setnstrcmpap_requiresap_getword_whiteapr_pool_cleanup_nullapr_pool_cleanup_registerapr_thread_mutex_lockapr_thread_mutex_unlockap_getwordap_note_basic_auth_failureap_set_string_slotap_set_flag_slotlibldap_r-2.4.so.2libpthread.so.0libc.so.6__stack_chk_fail_edata__bss_start_endmod_authnz_ldap.soOPENLDAP_2.4_2GLIBC_2.1.3GLIBC_2.4GLIBC_2.0GLIBC_2.3k si ii ii ii llllll mm$m(m|D$T$$tHD$4$\$t$|$Ít&4$D$^\$t$|$Í|GD$|$$t딍t&UWVSNSL $h $l e$< 1$` T$,G,U$T$$T$$1tuT$4$DD$(D$(T$,D$D$4T$$t`T$(D$ p$|$T$T$D$D$$< e3L [^_]Ít&4$l$$T$tT$@tK|$@T$@AD$lL$L8D$$T$LL$DD$\q 밍t&q 맋D$\t$D|$L„ҋv@uML$H|$D$ D$L$L$PD$D$dD$ $tL$Pt$|$D$ D$D$D$D$ $kUWVS÷G $ e$ 1҉D$PL$PEqHT$d| $T$lN1҅D$XtP|$lDŽ$DŽ$oHD$Xxl$DՉT$T1҉|$@vD$X 9PD$@L$D#E#M tۋE>L$P$$D$T$8$nT$8uT$lB ыRTt$PT$Q,T$Q4T$Q0T$ QD$4$T$dD$LD$ pD$D$LD$$pT$lBL@Fl$Pt8pl$`uFT$Ppl$`T$D$ D$D$D$D$},$D$dH D$X@ T1ɉl$|l$lD$h!D$XD$hT$hD$T 9P) T$Tt$TD$@#T$D#V t̋F$T$P|$Q$$ D$\(L$d( 8 $T$UD$ T$E T$PD$D$L$D$l~ $FƋD$Lx,XL$Pt$ t$`T$\|$T$L$D$D$ D$D$4$2$8Jt$Pnt&$NjD$LP,T$8T$8L$`|$ t$T$T$\D$ D$D$T$D$ $$8$|$$T$dD$ED$D$ E 4$D$D$LD$lK>T$Pl$`D$ D$T$D$D$D$,$$1$ e3k Ĝ [^_]ÍvL$PD$ D$D$NL$D$PD$p$떋t$\[t$d 8 UDD$ T$$T$E T$PD$D$L$D$h $$ƋD$Lx,T$8T$8L$`t$$|$ T$T$P $D$D$T$D$ D$D$f~t$\ cQELxEPt$dF 8= $]T$`D$ D$t$D$$D$tD$D$PD$?EL@YdD$\L$t|$x=D$dD$pT$8T$8|$$L$p|$tD$ T$T$`L$ D$D$P|$D$D$ D$$}Pl~L$dT$L$PT$$T$ U $T$T$LT$Ѓ$$NjD$LP,L$9L$PT$|t$t$`D$ L$T$D$4$$D$D$OE(|$dD$ ET$PD$$D$G$x$T$PD$ $D$t$E D$E$D$ED$ E $D$D$LD$t$iL$PD$ D$|$|$`L$D$\D$D$<$KEDT$dD$$D$T$PD$ E $D$D$LD$ht%$ƋD$Lx,L$`T$Pt$ |$ $T$D$LD$D$ D$D$tO&T$dBt 8L$Pt$dFIL$PD$ D$D$^L$D$D$p$-t$l~ |$dW|D$lHl$`D$ D$D$,$D$ D$D$PD$D$P$J~$T6NjD$Lh,dT$P|$$t$l$ l$`T$D$ D$D$D$D$,$>1l$`D$D$P$D$ D$D$D$,$D$lT$PD$(D$ D$lD$$XL$l$D$ $T$PD$t$A D$A$D$AD$ A $D$D$LD$tt_L$Lt$PA,t$D$ D$D$ D$D$,$8|$l l$\l$PD$E$@L$PUD$dl$d,$D$$T$PEE+t$PD$ D$D$t$D$LD$l$`,$kD$lx 52L$Pl$`D$ D$L$D$D$D$,$1L$Pl$`D$ D$L$D$D$D$,$1|$PD$ D$D$|$D$8D$mL$Pl$`D$ D$L$D$D$D$,$S1*'|$PD$ D$D$|$D$D$l$PD$ D$D$%l$D$D$eL$Pl$`D$ D$L$D$eD$D$,$1t$JNjD$LP,T$8XT$8L$`|$$t$T$ T$P $D$D$T$D$ D$D$l.T$Pl$`D$ D$T$D$D$D$,$L$PD$ D$D$HL$D$D$,Sê5UVSÆ5t&Ћu[^]S[O5[localhostnot using SSLbasesubtreeunknownonelevel(null)uidobjectclass=*NONESTARTTLSldaps0ldapauthnuldap_connection_closeuldap_connection_finduldap_cache_comparednuldap_cache_compareuldap_cache_checkuseriduldap_cache_getuserdnuldap_ssl_supportedneveroffsearchingfindingalwaysonISO-8859-1util_ldap.cutf-8accept-language(&(%s)(%s=*()\AUTHENTICATE_ldap-uniquememberldap-userldap-dnldap-groupldap-attributeldap-filtermod_authz_user.cAuthLDAPURLAuthLDAPBindDNAuthLDAPBindPasswordAuthLDAPBindAuthoritativeAuthLDAPRemoteUserIsDNAuthLDAPRemoteUserAttributeAuthzLDAPAuthoritativeAuthLDAPCompareDNOnServerAuthLDAPGroupAttributeAuthLDAPGroupAttributeIsDNAuthLDAPDereferenceAliasesAuthLDAPCharsetConfigInvalid LDAP connection mode setting: must be one of NONE, SSL, or TLS/STARTTLS[%d] auth_ldap url parse: `%s', Host: %s, Port: %d, DN: %s, attrib: %s, scope: %s, filter: %s, connection mode: %s/build/buildd/apache2-2.2.20/modules/aaa/mod_authnz_ldap.cUnrecognized value for AuthLDAPAliasDereference directiveToo many AuthLDAPGroupAttribute directivesModule mod_ldap missing. Mod_ldap (aka. util_ldap) must be loaded in order for mod_auth_ldap to function properlyInvalid charset conversion config path %scould not open charset conversion config file %s.could not find the UTF-8 charset in the file %s.[%d] auth_ldap authenticate: using URL %s[%d] auth_ldap authenticate: no sec->host - weird...?[%d] auth_ldap authenticate: no password specified[%d] auth_ldap authenticate: no user specified[%d] auth_ldap authenticate: user %s authentication failed; URI %s [%s][%s] (not authoritative)[%d] auth_ldap authenticate: user %s authentication failed; URI %s [%s][%s][%d] auth_ldap authenticate: REMOTE_USER was to be set with attribute '%s', but this attribute was not requested for in the LDAP query for the user. REMOTE_USER will fall back to username or DN as appropriate.[%d] auth_ldap authenticate: accepting %s[%d] auth_ldap authorise: no sec->host - weird...?ldap authorize: Userid is blank, AuthType=%sldap authorize: Creating LDAP req structureauth_ldap authorise: User DN not found, %s[%d] auth_ldap authorise: require user: user's DN has not been defined; failing authorisation[%d] auth_ldap authorise: require user: authorisation successful[%d] auth_ldap authorise: require user: authorisation failed [%s][%s][%d] auth_ldap authorise: require dn: user's DN has not been defined; failing authorisation[%d] auth_ldap authorise: require dn: authorisation successful[%d] auth_ldap authorise: require dn "%s": LDAP error [%s][%s][%d] auth_ldap authorise: require group: user's DN has not been defined; failing authorisation[%d] auth_ldap authorise: require group: testing for group membership in "%s"[%d] auth_ldap authorise: require group: testing for %s: %s (%s)[%d] auth_ldap authorise: require group: authorisation successful (attribute %s) [%s][%s][%d] auth_ldap authorise: require group "%s": authorisation failed [%s][%s][%d] auth_ldap authorise: require ldap-attribute: user's DN has not been defined; failing authorisation[%d] auth_ldap authorise: checking attribute %s has value %s[%d] auth_ldap authorise: require attribute: authorisation successful[%d] auth_ldap authorise: require attribute: authorisation failed [%s][%s][%d] auth_ldap authorise: require ldap-filter: user's DN has not been defined; failing authorisation[%d] auth_ldap authorise: checking filter %s[%d] auth_ldap authorise: checking dn match %s[%d] auth_ldap authorise: require ldap-filter: authorisation successful[%d] auth_ldap authorise: require ldap-filter: %s authorisation failed [%s][%s][%d] auth_ldap authorise: require ldap-filter: authorisation failed [%s][%s][%d] auth_ldap authorise: agreeing because non-restricted[%d] auth_ldap authorise: declining to authorise (not authoritative)[%d] auth_ldap authorise: authorisation denied[%d] auth_ldap authorise: declining to authorise (no ldap requirements)URL to define LDAP connection. This should be an RFC 2255 complaint URL of the form ldap://host[:port]/basedn[?attrib[?scope[?filter]]].
  • Host is the name of the LDAP server. Use a space separated list of hosts to specify redundant servers.
  • Port is optional, and specifies the port to connect to.
  • basedn specifies the base DN to start searches from
  • Attrib specifies what attribute to search for in the directory. If not provided, it defaults to uid.
  • Scope is the scope of the search, and can be either sub or one. If not provided, the default is sub.
  • Filter is a filter to use in the search. If not provided, defaults to (objectClass=*).
Searches are performed using the attribute and the filter combined. For example, assume that the LDAP URL is ldap://ldap.airius.com/ou=People, o=Airius?uid?sub?(posixid=*). Searches will be done using the filter (&((posixid=*))(uid=username)), where username is the user name passed by the HTTP client. The search will be a subtree search on the branch ou=People, o=Airius.DN to use to bind to LDAP server. If not provided, will do an anonymous bind.Password to use to bind to LDAP server. If not provided, will do an anonymous bind.Set to 'on' to return failures when user-specific bind fails - defaults to on.Set to 'on' to set the REMOTE_USER environment variable to be the full DN of the remote user. By default, this is set to off, meaning that the REMOTE_USER variable will contain whatever value the remote user sent.Override the user supplied username and place the contents of this attribute in the REMOTE_USER environment variable.Set to 'off' to allow access control to be passed along to lower modules if the UserID and/or group is not known to this moduleSet to 'on' to force auth_ldap to do DN compares (for the "require dn" directive) using the server, and set it 'off' to do the compares locally (at the expense of possible false matches). See the documentation for a complete description of this option.A list of attributes used to define group membership - defaults to member and uniquememberIf set to 'on', auth_ldap uses the DN that is retrieved from the server forsubsequent group comparisons. If set to 'off', auth_ldap uses the stringprovided by the client directly. Defaults to 'on'.Determines how aliases are handled during a search. Can bo one of thevalues "never", "searching", "finding", or "always". Defaults to always.Character set conversion configuration file. If omitted, character setconversion is disabled.;н\`@0 @P p`zR|  0F J tx?;*2$"@м#AN PC`*AhT|AA AACL AA AAA f CA AAD <AN0A AN A(T@C0DSS E (HhC0ISJ C t,_C Le D ,hC DSF{ E a G <AA AAQ@ AA AAE 4XAC CN0 C AAE T@AA CAC`s AA AAH \ AA AAH <XAA AAQA AA AAD @AA AAQA AA AAD AP ;;I;0M;4HN;8N;<N;@O<