ELF4x4 (44$$PtddddQtdRtdddGNUϕdqz> 8 0@ 8:=BE|qXdL9H{c +kSng"N / R=B!X#y9+ ^XX? 8D ذ __gmon_start___init_fini__cxa_finalize_Jv_RegisterClassesauthnz_ldap_moduleapr_pstrdupapr_hash_getapr_table_getapr_xlate_openapr_pallocmemsetapr_xlate_conv_bufferapr_snprintfstrchrapr_thread_mutex_createapr_array_makeapr_pstrcattoupperapr_table_setnstrcmpap_regexecap_pregsubapr_table_setap_log_rerror_ldap_err2stringapr_pool_cleanup_nullapr_pool_cleanup_registerap_getword_confapr_thread_mutex_lockapr_array_pushapr_thread_mutex_unlockapr_pool_cleanup_killap_getwordapr_ldap_url_parseapr_pstrmemdupstrcasecmpstrncasecmpap_log_error_atolap_pregcompapr_tokenize_to_argvap_server_root_relativeap_get_exec_lineap_set_string_slotap_set_flag_slotap_find_linked_moduleap_pcfg_openfileapr_hash_makeap_str_tolowerapr_hash_setap_cfg_getlineap_cfg_closefileapr_dynamic_fn_retrieveap_register_auth_providerap_hook_post_configap_hook_optional_fn_retrievelibldap_r-2.4.so.2libpthread.so.0libc.so.6__stack_chk_fail_edata__bss_start_endmod_authnz_ldap.soGLIBC_2.1.3GLIBC_2.4GLIBC_2.0OPENLDAP_2.4_2@si ii ii   $48LPTdh| $(<@DTX\lp,@PT;;<55t5l%%%,%%%%*2   $ ( , 0 48<@DHLPTX\`dhlptx| !"#$&'()+,-./013467S[çt3[ hhhhh h($h0(h8p,h@`0hHP4hP@8hX0<h` @hhDhpHhxLhPhThXh\h`hdhhhplh`phPth@xh0|h hhhhhhhh h(h0h8ph@`hHPhP@hX0h` hhhphxhhhUVS*du]t$h)9s hh9rƃd[^]US.ëtt $Ѓ[]Ë$ÐUS$l} u&D$E$mD$U T$$E}u)E D$U T$$E}tED$E$^EE$[]US$ME1T$$E}EUT$$EEE E<,t E<;uEEEu֋EUT$$E}t.ET$ UT$D$E$muE$[]UWVSLrEE$E}E E¸MԉЃE؋E؍PЉE܋u܋U܋ET$$PT$D$$ZEE܉D$ED$ E؉D$E D$E$uEE L[^_]UWVSlE} E UT$$cEԃ}tE UT$$FE E@$E؋tE $E܃}EE¸MЃEċEčPЉEȋuȋUȋE T$$.T$D$$8EEȉD$ED$ EĉD$EԉD$E܉$~uE UT$$vEԋE@D$E؉D$ AD$D$ E$EEEԉE̋EE¸MЃEEDED$L$tE\EE;Es'EEЈEEEt E;ErEEЃ;Ew8QEEƸMЃE fRPl[^_]UWVS<\D$xE$EԋUԾxуtуt ftftEԉEEUEPED$D$$D$D$ E$UBHD$D$ E$UBTE@DE䍓TPE@ E@,E@0E@4E@(E@LE@\E@X D$)E$[EЋUо)уtуt ftftUЋEPPE@8E@<E@@E䍓UP`E<[^_]US$]EElE$Ҹ$[]UWVS\*çEEE@ЋEЋE@ЋEԋEЋ@E؃} tEԋ@``E̋EE¸MЃE܋Eԋ@B}8EEEEԋ@UЋED$ T$ỦT$$EEE܉E"EȉuEE$EEEuыEE؋t EE؋TD$ED$E$} u\Eԋ@tf t `T$T$D$D$ D$D$E$迚  t T$T$T$D$D$ D$D$R$Nl  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tW t T$T$D$D$ D$D$W$ND$$薖@@@ T$D$ D$D$$?P@x pHT$ D$D$D$|$t$ L$D$$  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tnP, t T$ T$T$T$D$D$ D$D$e$8 @‹T$$Pt  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tW t LT$T$D$D$ D$D$q$Ò D$=T$$6T$$  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tk t T$ T$T$T$D$D$ D$D$|$Yx@L$L$T$ D$D$$։  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tW t T$T$D$D$ D$D$$ D$$•=  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tx$o‹H, t T$ L$HT$T$D$D$ D$D$$Ջ  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tw t L$ T$T$T$D$D$ D$D$$豉Ue3t(Č [^_]UWVS| 膊hEE EeE1Dž@Ћ@ЋDžDžu @Du @ tbD$$\T$ )T$T$$ytf t T$T$D$D$ D$D$$ t T$ T$T$D$D$ D$D$$艇l  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tW t XT$T$D$D$ D$D$$艅D$$у@@@ T$D$ D$D$$zP@x pHT$ D$D$D$|$t$ L$D$$  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tnP, t T$ T$T$T$D$D$ D$D$$s@‹T$$-Pt  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tW t T$T$D$D$ D$D$$  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <ta t T$@T$T$D$D$ D$D$$}@T$T$ D$D$$P@x pHT$ D$D$D$|$t$ L$D$$  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <ta t T$tT$T$D$D$ D$D$$ {@ttN)T$T$$x$jD$$utp@@t$L$T$ D$D$$׉:  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tW t T$T$D$D$ D$D$$TxD$$ V  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <$s‹H, t T$$L$ T$T$T$D$D$ D$D$$v  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <t{$q‹H, t T$ L$HT$T$D$D$ D$D$$s  t*@@`t@@` @tlt*@@`t@@` @ t ySt*@@`t@@` @@mt*@@`t@@` @ t <tw t L$ T$T$T$D$D$ D$D$$qUe3t| [^_]UWVSr5PE E܋E@(UԉT$ UЉT$UT$$2pE}t Eԋ&E@(UT$$ZpU܉BE܋@ tnu E@\nED$ $nu E@\IED$$mtED$$mu E@\ 'D$lD$E$mu)E@\EЋ@ tEЋ@ |U܉BEЋ@ tEЋ@ U܉BE@DE@0E} t> x2E@t(EP t yE@1FEP t <E܋@\ur|EЋ@EċEЋ@t/EЋ@tEЋ@uEЋ@t EЋ@0EЋ@EEЋ@ EEЋ@E t L$8EĉD$4|$0t$,ML$(}|$$ED$ ED$D$ED$D$D$ T$D$$kČ[^_]US$9möJE ED$E$qit$D$E$HkuE@((D$E$0iu E@(k2D$E$ iu E@(F:D$E$htAD$E$ju E@(D$[]UVS DlIEE EEEE@PUЋu} u+E@PU4E@(UT$$i [^]US$kAIE EE@T@ ~0E@T$MjEE@(UT$$uiU$[]US$`kHE EE$iUBX$[]US$,kéHE EE@H@ ~0E@H$iEE@(UT$$hU$[]UIHE@0P@‹E]US4jHE EE@(D$UT$$hE}u3E@(D$T$ UT$T$$=i)EUPhE@(UT$$ hUBl4[]UWVShost - weird...?AH01691: auth_ldap authenticate: using URL %sAH01692: auth_ldap authenticate: no password specifiedAH01693: auth_ldap authenticate: no user specifiedauth_ldap authenticate: final authn filter is %sAH01694: auth_ldap authenticate: user %s authentication failed; URI %s [%s][%s] (not authoritative)AH01695: auth_ldap authenticate: user %s authentication failed; URI %s [%s][%s]AH01696: auth_ldap authenticate: REMOTE_USER was to be set with attribute '%s', but this attribute was not requested for in the LDAP query for the user. REMOTE_USER will fall back to username or DN as appropriate.AH01697: auth_ldap authenticate: accepting %sAH01698: auth_ldap authorize: no sec->host - weird...?AH01699: ldap authorize: Userid is blank, AuthType=%sAH01700: ldap authorize: Creating LDAP req structureAH01701: auth_ldap authorise: User DN not found, %sAH01702: auth_ldap authorize: require user: user's DN has not been defined; failing authorizationAH01703: auth_ldap authorize: require user: authorization successfulAH01704: auth_ldap authorize: require user: authorization failed [%s][%s]AH01705: auth_ldap authorize: require user: authorization successfulAH01706: auth_ldap authorize: require user: authorization failed [%s][%s]AH01707: auth_ldap authorize user: authorization denied for user %s to %sAH01708: auth_ldap authorize: no sec->host - weird...?groupOfNamesgroupOfUniqueNamesAH01709: ldap authorize: Userid is blank, AuthType=%sAH01710: ldap authorize: Creating LDAP req structureAH01711: auth_ldap authorise: User DN not found, %sAH01712: auth_ldap authorize: require group: user's DN has not been defined; failing authorization for user %sAH01713: auth_ldap authorize: require group: testing for group membership in "%s"AH01714: auth_ldap authorize: require group: testing for %s: %s (%s)AH01715: auth_ldap authorize: require group: authorization successful (attribute %s) [%s][%d - %s]AH01719: auth_ldap authorize: require group "%s": didn't match with attr %s [%s][%d - %s]AH01716: auth_ldap authorise: require group "%s": failed [%s][%d - %s], checking sub-groupsAH01717: auth_ldap authorise: require group (sub-group): authorisation successful (attribute %s) [%s][%d - %s]AH01718: auth_ldap authorise: require group (sub-group) "%s": didn't match with attr %s [%s][%d - %s]AH01720: auth_ldap authorize group: authorization denied for user %s to %sAH01721: auth_ldap authorize: no sec->host - weird...?AH01722: ldap authorize: Userid is blank, AuthType=%sAH01723: ldap authorize: Creating LDAP req structureAH01724: auth_ldap authorise: User DN not found with filter %s: %sAH01725: auth_ldap authorize: require dn: user's DN has not been defined; failing authorizationAH01726: auth_ldap authorize: require dn: authorization successfulAH01727: auth_ldap authorize: require dn "%s": LDAP error [%s][%s]AH01728: auth_ldap authorize dn: authorization denied for user %s to %sAH01729: auth_ldap authorize: no sec->host - weird...?AH01730: ldap authorize: Userid is blank, AuthType=%sAH01731: ldap authorize: Creating LDAP req structureAH01732: auth_ldap authorise: User DN not found with filter %s: %sAH01733: auth_ldap authorize: require ldap-attribute: user's DN has not been defined; failing authorizationAH01734: auth_ldap authorize: checking attribute %s has value %sAH01735: auth_ldap authorize: require attribute: authorization successfulAH01736: auth_ldap authorize: require attribute: authorization failed [%s][%s]AH01737: auth_ldap authorize attribute: authorization denied for user %s to %sAH01738: auth_ldap authorize: no sec->host - weird...?AH01739: ldap authorize: Userid is blank, AuthType=%sAH01740: ldap authorize: Creating LDAP req structureAH01741: auth_ldap authorise: User DN not found with filter %s: %sAH01742: auth_ldap authorize: require ldap-filter: user's DN has not been defined; failing authorizationAH01743: auth_ldap authorize: checking filter %sAH01744: auth_ldap authorize: checking dn match %sAH01745: auth_ldap authorize: require ldap-filter: authorization successfulAH01746: auth_ldap authorize: require ldap-filter: %s authorization failed [%s][%s]AH01747: auth_ldap authorize: require ldap-filter: authorization failed [%s][%s]AH01748: auth_ldap authorize filter: authorization denied for user %s to %s localhostuidobjectclass=*NONESSLTLSSTARTTLSInvalid LDAP connection mode setting: must be one of NONE, SSL, or TLS/STARTTLSldapsusing SSLnot using SSLonelevelunknownbasesubtree(null)auth_ldap url parse: `%s', Host: %s, Port: %d, DN: %s, attrib: %s, scope: %s, filter: %s, connection mode: %sneveroffsearchingfindingalwaysonUnrecognized value for AuthLDAPDereferenceAliases directiveToo many AuthLDAPSubGroupAttribute valuesToo many AuthLDAPSubGroupClass valuesToo many AuthLDAPGroupAttribute directives'AuthLDAPInitialBindPattern: cannot compile regular expression 'exec:Unable to parse exec arguments from Invalid AuthLDAPBindPassword exec location:Unable to get bind password from exec of AuthLDAPURLURL to define LDAP connection. This should be an RFC 2255 compliant URL of the form ldap://host[:port]/basedn[?attrib[?scope[?filter]]].
  • Host is the name of the LDAP server. Use a space separated list of hosts to specify redundant servers.
  • Port is optional, and specifies the port to connect to.
  • basedn specifies the base DN to start searches from
  • Attrib specifies what attribute to search for in the directory. If not provided, it defaults to uid.
  • Scope is the scope of the search, and can be either sub or one. If not provided, the default is sub.
  • Filter is a filter to use in the search. If not provided, defaults to (objectClass=*).
Searches are performed using the attribute and the filter combined. For example, assume that the LDAP URL is ldap://ldap.airius.com/ou=People, o=Airius?uid?sub?(posixid=*). Searches will be done using the filter (&((posixid=*))(uid=username)), where username is the user name passed by the HTTP client. The search will be a subtree search on the branch ou=People, o=Airius.AuthLDAPBindDNDN to use to bind to LDAP server. If not provided, will do an anonymous bind.AuthLDAPBindPasswordPassword to use to bind to LDAP server. If not provided, will do an anonymous bind.AuthLDAPBindAuthoritativeSet to 'on' to return failures when user-specific bind fails - defaults to on.AuthLDAPRemoteUserIsDNSet to 'on' to set the REMOTE_USER environment variable to be the full DN of the remote user. By default, this is set to off, meaning that the REMOTE_USER variable will contain whatever value the remote user sent.AuthLDAPRemoteUserAttributeOverride the user supplied username and place the contents of this attribute in the REMOTE_USER environment variable.AuthLDAPCompareDNOnServerSet to 'on' to force auth_ldap to do DN compares (for the "require dn" directive) using the server, and set it 'off' to do the compares locally (at the expense of possible false matches). See the documentation for a complete description of this option.AuthLDAPSubGroupAttributeAttribute labels used to define sub-group (or nested group) membership in groups - defaults to member and uniqueMemberAuthLDAPSubGroupClassLDAP objectClass values used to identify sub-group instances - defaults to groupOfNames and groupOfUniqueNamesAuthLDAPMaxSubGroupDepthMaximum subgroup nesting depth to be evaluated - defaults to 10 (top-level group = 0)AuthLDAPGroupAttributeA list of attribute labels used to identify the user members of groups - defaults to member and uniquememberAuthLDAPGroupAttributeIsDNIf set to 'on', auth_ldap uses the DN that is retrieved from the server forsubsequent group comparisons. If set to 'off', auth_ldap uses the stringprovided by the client directly. Defaults to 'on'.AuthLDAPDereferenceAliasesDetermines how aliases are handled during a search. Can be one of thevalues "never", "searching", "finding", or "always". Defaults to always.AuthLDAPCharsetConfigCharacter set conversion configuration file. If omitted, character setconversion is disabled.AuthLDAPAuthorizePrefixThe prefix to add to environment variables set during successful authorization, default 'AUTHORIZE_'AuthLDAPInitialBindAsUserSet to 'on' to perform the initial DN lookup with the basic auth credentials instead of anonymous or hard-coded credentialsAuthLDAPInitialBindPatternThe regex and substitution to determine a username that can bind based on an HTTP basic auth usernameAuthLDAPSearchAsUserSet to 'on' to perform authorization-based searches with the users credentials, when this module has also performed authentication. Does not affect nested groups lookup.AuthLDAPCompareAsUserSet to 'on' to perform authorization-based compares with the users credentials, when this module has also performed authentication. Does not affect nested groups lookups.util_ldap.cAH01749: Module mod_ldap missing. Mod_ldap (aka. util_ldap) must be loaded in order for mod_authnz_ldap to function properlyAH01750: Invalid charset conversion config path %sAH01751: could not open charset conversion config file %s.utf-8AH01752: could not find the UTF-8 charset in the file %s.uldap_connection_closeuldap_connection_finduldap_cache_comparednuldap_cache_compareuldap_cache_checkuseriduldap_cache_getuserdnuldap_ssl_supporteduldap_cache_check_subgroups0ldapauthnldap-userauthzldap-groupldap-dnldap-attributeldap-filter;7;8;\<p=?A A0C`DE)YHnF@p|J$CLp?p,TQxzR|  6@F J tx?;*2$" @9AB DA  dV:AB DA ( ;AB FAAA ,;9AB F,AAA ,=AB FAAA  ?1AB DhA ,8?AB FAAA  hjAAB GA (?BAB FAAA ,CYAB IIAAA ,AVAB IAAA ,0kAB IAAA ,HqAB IaAAA ,x?AB IAAA ,ԬAB IAAA ,rAB ItAAA  AB DA $,AB EvAA  TdAB D[A  x/4AB DkA  ?dAB D[A 1AB m  AB DA , AB F}AAA $4fAB GA  \=AB DA $AB DA o`A40Edu),8t4 [8tJ<h@& (~?L 2` dԧ8p_tx D ذo8Tt   L `o oop o<&6FVfv&6FVfv&6FVfv342PA  GCC: (Ubuntu/Linaro 4.6.1-9ubuntu3) 4.6.1.symtab.strtab.shstrtab.note.gnu.build-id.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rel.dyn.rel.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.ctors.dtors.jcr.data.rel.ro.dynamic.got.got.plt.data.bss.comment$.o88<8 tt@TTHop p |Uo `d L L `m   vDD.q@|ذذn&dd``@ x XX00X* ]  8tTp  L  D   ذ  d`X (5 KXZ\h@ t0      '`Bd\hvlptx|| 5 B \9 t1 ? 6 / 4Y 0 E .dq Iu k  2 & d  4 $?d F1 Yԧ jt |  & 7w N[{ r !9HUcqXxذ  '8C"_j  -;H^oX  8/ > Q ` t   D   crtstuff.c__CTOR_LIST____DTOR_LIST____JCR_LIST____do_global_dtors_auxcompleted.6086dtor_idx.6088frame_dummy__CTOR_END____FRAME_END____JCR_END____do_global_ctors_auxmod_authnz_ldap.caplog_module_indexdefault_attributescreate_authnz_ldap_dir_configauthnz_ldap_cmdsregister_hooksutil_ldap_connection_closeutil_ldap_connection_findutil_ldap_cache_comparednutil_ldap_cache_compareutil_ldap_cache_check_subgroupsutil_ldap_cache_checkuseridutil_ldap_cache_getuserdnutil_ldap_ssl_supportedcharset_conversionsto_charsetderive_codepage_from_langget_conv_setauthn_ldap_xlate_passwordauthn_ldap_build_filterauthnz_ldap_cleanup_connection_closeset_request_varsldap_determine_binddnget_connection_for_authzauthn_ldap_check_passwordldapuser_check_authorizationldapgroup_check_authorizationldapdn_check_authorizationldapattribute_check_authorizationldapfilter_check_authorizationmod_auth_ldap_parse_urlmod_auth_ldap_set_derefmod_auth_ldap_add_subgroup_attributemod_auth_ldap_add_subgroup_classmod_auth_ldap_set_subgroup_maxdepthmod_auth_ldap_add_group_attributeset_charset_configset_bind_patternset_bind_passwordauthnz_ldap_post_configauthn_ldap_providerauthz_ldapuser_providerauthz_ldapgroup_providerauthz_ldapdn_providerauthz_ldapattribute_providerauthz_ldapfilter_providerImportULDAPOptFn__i686.get_pc_thunk.bx__DTOR_END____i686.get_pc_thunk.cx__dso_handle_DYNAMIC__stack_chk_fail_local_GLOBAL_OFFSET_TABLE_ap_register_auth_providerldap_err2string@@OPENLDAP_2.4_2apr_array_makeap_get_exec_linestrcmp@@GLIBC_2.0ap_server_root_relativeapr_pstrmemdupapr_hash_setapr_table_setapr_table_get_edataap_find_linked_module_finiapr_pool_cleanup_kill__stack_chk_fail@@GLIBC_2.4apr_xlate_conv_bufferap_hook_post_configapr_pool_cleanup_registerap_hook_optional_fn_retrieveap_pcfg_openfileap_regexec__cxa_finalize@@GLIBC_2.1.3apr_pallocapr_tokenize_to_argvap_cfg_getlineapr_thread_mutex_lockap_getword_confapr_ldap_url_parse__gmon_start__ap_log_error_apr_table_setnap_pregsubapr_pstrdupstrchr@@GLIBC_2.0ap_cfg_closefileapr_hash_makeapr_snprintfstrcasecmp@@GLIBC_2.0ap_set_flag_slotatol@@GLIBC_2.0ap_pregcompmemset@@GLIBC_2.0_endapr_dynamic_fn_retrieveapr_pool_cleanup_nullstrncasecmp@@GLIBC_2.0__bss_startap_getwordapr_array_pushap_str_tolowerauthnz_ldap_moduleapr_xlate_opentoupper@@GLIBC_2.0ap_log_rerror__Jv_RegisterClassesapr_pstrcatapr_thread_mutex_create_initap_set_string_slotapr_hash_getapr_thread_mutex_unlock