Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4

Warning: Cannot modify header information - headers already sent by (output started at /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code:102) in /var/www/iplanru/data/www/intesco.ru/d59ed/index.php(1) : eval()'d code(2) : eval()'d code on line 4
etc/init.d/saslauthd000066600000017601150771261270010440 0ustar00#! /bin/sh ### BEGIN INIT INFO # Provides: saslauthd # Required-Start: $local_fs $remote_fs # Required-Stop: $local_fs $remote_fs # Default-Start: 2 3 4 5 # Default-Stop: 1 # Short-Description: saslauthd startup script # Description: This script starts the saslauthd daemon. It is # configured using the file /etc/default/saslauthd. ### END INIT INFO # Author: Fabian Fagerholm # Do NOT "set -e" # PATH should only include /usr/* if it runs after the mountnfs.sh script PATH=/sbin:/usr/sbin:/bin:/usr/bin # Global variables DAEMON=/usr/sbin/saslauthd DEFAULT_FILES=`find /etc/default -regex '/etc/default/saslauthd[_a-zA-Z0-9\-]*$' -print | sort` # Exit if the package is not installed [ -x "$DAEMON" ] || exit 0 # Load the VERBOSE setting and other rcS variables . /lib/init/vars.sh # Define LSB log_* functions. # Depend on lsb-base (>= 3.0-6) to ensure that this file is present. . /lib/lsb/init-functions # Function that starts all saslauthd instances # Parameters: none # Return value: none do_startall() { for instance in $DEFAULT_FILES do start_instance $instance done } # Function that stops all saslauthd instances # Parameters: none # Return value: none do_stopall() { for instance in $DEFAULT_FILES do stop_instance $instance done } # Function that sends a SIGHUP to all saslauthd instances # Parameters: none # Return value: none do_reloadall() { for instance in $DEFAULT_FILES do reload_instance $instance done } # Function that starts a single saslauthd instance # Parameters: # $1 = path of default file for this instance # Return value: # 0 on success (does not mean the instance started) # 1 on failure start_instance() { # Load defaults file for this instance. . $1 # If the daemon is not enabled, give the user a warning and stop. if [ "$START" != "yes" ]; then log_warning_msg "To enable $NAME, edit $1 and set START=yes" return 0 fi # If the short name of this instance is undefined, warn the user # but choose a default name. if [ -z "$NAME" ]; then log_warning_msg "Short name (NAME) undefined in $1, using default" NAME=default fi log_daemon_msg "Starting $DESC" "$NAME" # Determine run directory and pid file location by looking # for an -m option. RUN_DIR=`echo "$OPTIONS" | xargs -n 1 echo | sed -n '/^-m$/{n;p}'` if [ -z "$RUN_DIR" ]; then # No run directory defined in defaults file, fail. log_failure_msg "No run directory defined for $NAME, not starting" return 1 fi PIDFILE=$RUN_DIR/saslauthd.pid # If no mechanisms are defined, fail. if [ -z "$MECHANISMS" ]; then log_failure_msg "No mechanisms defined in $1, not starting $NAME" return 1 fi # If there are mechanism options defined, prepare them for use with # the -O flag. if [ -n "$MECH_OPTIONS" ]; then MECH_OPTIONS="-O $MECH_OPTIONS" fi # If there is a threads option defined, prepare it for use with # the -n flag. if [ -n "$THREADS" ]; then THREAD_OPTIONS="-n $THREADS" fi # Construct argument string. DAEMON_ARGS="-a $MECHANISMS $MECH_OPTIONS $OPTIONS $THREAD_OPTIONS" # If there is a statoverride for the run directory, then pull # permission and ownership information from it and create the directory. # Otherwise, we create the directory with default permissions and # ownership (root:sasl, 710). if dpkg-statoverride --list $RUN_DIR > /dev/null; then createdir `dpkg-statoverride --list $RUN_DIR` else createdir root sasl 710 $RUN_DIR fi # Start the daemon, phase 1: see if it is already running. start-stop-daemon --start --quiet --pidfile $PIDFILE --name $NAME \ --exec $DAEMON --test > /dev/null if [ "$?" != "0" ]; then log_progress_msg "(already running)" log_end_msg 0 return 0 fi # Start the daemon, phase 2: it was not running, so actually start it now. start-stop-daemon --start --quiet --pidfile $PIDFILE --name $NAME \ --exec $DAEMON -- $DAEMON_ARGS if [ "$?" -ne "0" ]; then log_end_msg 1 return 1 fi # Started successfully. log_end_msg 0 return 0 } # Function that stops a single saslauthd instance # Parameters: # $1 = path of default file for this instance # Return value: # 0 on success (daemon was stopped) # 1 if the daemon was already stopped # 2 if the daemon could not be stopped stop_instance() { # Load defaults file for this instance. . $1 # If the short name of this instance is undefined, warn the user # but choose a default name. if [ -z "$NAME" ]; then log_warning_msg "Short name (NAME) undefined in $1, using default" NAME=default fi # Determine run directory and pid file location by looking # for an -m option. RUN_DIR=`echo "$OPTIONS" | xargs -n 1 echo | sed -n '/^-m$/{n;p}'` if [ -z "$RUN_DIR" ]; then # No run directory defined in defaults file, fail. log_failure_msg "No run directory defined for $NAME, cannot stop" return 2 fi PIDFILE=$RUN_DIR/saslauthd.pid log_daemon_msg "Stopping $DESC" "$NAME" start-stop-daemon --stop --quiet --retry=TERM/30/KILL/5 \ --pidfile $PIDFILE --exec $DAEMON if [ "$?" -eq "2" ]; then # Failed to stop. log_end_msg 1 return 2 fi if [ "$?" -eq "1" ]; then # Already stopped. log_progress_msg "(not running)" fi # Many daemons don't delete their pidfiles when they exit. rm -f $PIDFILE # Stopped successfully. log_end_msg 0 return $RETVAL } # Function that sends a SIGHUP to a single saslauthd instance # Parameters: # $1 = path of default file for this instance # Return value: # 0 on success (does not mean the daemon was reloaded) # other values on failure reload_instance() { # Load defaults file for this instance. . $1 # If the short name of this instance is undefined, warn the user # but choose a default name. if [ -z "$NAME" ]; then log_warning_msg "Short name (NAME) undefined in $1, using default" NAME=default fi # Determine run directory and pid file location by looking # for an -m option. RUN_DIR=`echo "$OPTIONS" | xargs -n 1 echo | sed -n '/^-m$/{n;p}'` if [ -z "$RUN_DIR" ]; then # No run directory defined in defaults file, fail. log_failure_msg "No run directory defined for $NAME, cannot reload" return 2 fi PIDFILE=$RUN_DIR/saslauthd.pid log_daemon_msg "Reloading $DESC" "$NAME" # Reload the daemon. First, see if it is already running. start-stop-daemon --start --quiet --pidfile $PIDFILE \ --exec $DAEMON --test > /dev/null if [ "$?" -eq "0" ]; then # Not running, signal this and stop. log_progress_msg "(not running)" log_end_msg 0 return 0 fi start-stop-daemon --stop --signal 1 \ --pidfile $PIDFILE --exec $DAEMON log_end_msg $? } # Function that creates a directory with the specified # ownership and permissions # Parameters: # $1 = user # $2 = group # $3 = permissions (octal) # $4 = path to directory # Return value: none createdir() { # In the future, use -P/-Z to have SE Linux enhancement install -d --group="$2" --mode="$3" --owner="$1" "$4" } # Action switch case "$1" in start) do_startall ;; stop) do_stopall ;; reload|force-reload) do_reloadall ;; restart) do_stopall do_startall ;; start-instance) if [ -f /etc/default/$2 ]; then start_instance /etc/default/$2 else log_failure_msg "Instance $2 does not exist." fi ;; stop-instance) if [ -f /etc/default/$2 ]; then stop_instance /etc/default/$2 else log_failure_msg "Instance $2 does not exist." fi ;; reload-instance|force-reload-instance) if [ -f /etc/default/$2 ]; then reload_instance /etc/default/$2 else log_failure_msg "Instance $2 does not exist." fi ;; restart-instance) if [ -f /etc/default/$2 ]; then stop_instance /etc/default/$2 start_instance /etc/default/$2 else log_failure_msg "Instance $2 does not exist." fi ;; *) SCRIPTNAME=$0 echo "Usage: $SCRIPTNAME {start|stop|restart|reload|force-reload}" >&2 echo " or {start-instance|stop-instance|restart-instance|" >&2 echo " reload-instance|force-reload-instance} " \ "" >&2 exit 3 ;; esac : etc/default/saslauthd000066600000003627150771466200010702 0ustar00# # Settings for saslauthd daemon # Please read /usr/share/doc/sasl2-bin/README.Debian for details. # # Should saslauthd run automatically on startup? (default: no) START=yes # Description of this saslauthd instance. Recommended. # (suggestion: SASL Authentication Daemon) DESC="SASL Authentication Daemon" # Short name of this saslauthd instance. Strongly recommended. # (suggestion: saslauthd) NAME="saslauthd" # Which authentication mechanisms should saslauthd use? (default: pam) # # Available options in this Debian package: # getpwent -- use the getpwent() library function # kerberos5 -- use Kerberos 5 # pam -- use PAM # rimap -- use a remote IMAP server # shadow -- use the local shadow password file # sasldb -- use the local sasldb database file # ldap -- use LDAP (configuration is in /etc/saslauthd.conf) # # Only one option may be used at a time. See the saslauthd man page # for more information. # # Example: MECHANISMS="pam" MECHANISMS="pam" # Additional options for this mechanism. (default: none) # See the saslauthd man page for information about mech-specific options. MECH_OPTIONS="" # How many saslauthd processes should we run? (default: 5) # A value of 0 will fork a new process for each connection. THREADS=2 # Other options (default: -c -m /var/run/saslauthd) # Note: You MUST specify the -m option or saslauthd won't run! # # WARNING: DO NOT SPECIFY THE -d OPTION. # The -d option will cause saslauthd to run in the foreground instead of as # a daemon. This will PREVENT YOUR SYSTEM FROM BOOTING PROPERLY. If you wish # to run saslauthd in debug mode, please run it by hand to be safe. # # See /usr/share/doc/sasl2-bin/README.Debian for Debian-specific information. # See the saslauthd man page and the output of 'saslauthd -h' for general # information about these options. # # Example for postfix users: "-c -m /var/spool/postfix/var/run/saslauthd" OPTIONS="-c -m /var/run/saslauthd" usr/sbin/saslauthd000066600000260550150773470030010245 0ustar00ELF>7@@(Z@8@@@@@@@@@@ I I PPaPa  (P(Pa(Pa``@@DDPtd44A4AQtd/lib64/ld-linux-x86-64.so.2GNUGNUJa` e%oA|k3bsmhej ;x\U}X<{H:tv |6=$g0nF%[RpcaY9f1OVEM`').T~o&JurK ! *78#4A?IBCP+5 />(L"Ni@G^]ylz_, SZqDd2Qw-W 2+!$BE|=|<9 8qX$uR)?* E],QeJ_xdPV\"RE]G$$NlxjXt=KiyZ$ #^*>q@M6)E_{@:4x=v^k XRmGgfo u* Ya_aP6@ .@%3@@4@0Ya Ya% Ya(Ya@"@1@(Alibgssapi_krb5.so.2__gmon_start___Jv_RegisterClasseslibkrb5.so.3krb5_free_data_contentskrb5_rd_reqkrb5_kt_resolvekrb5_mk_reqkrb5_get_init_creds_opt_initkrb5_get_init_creds_passwordkrb5_parse_namekrb5_free_cred_contentskrb5_cc_initializekrb5_cc_resolvekrb5_init_contextkrb5_cc_destroykrb5_cc_store_credkrb5_free_keyblockkrb5_free_contextkrb5_free_principalkrb5_auth_con_freekrb5_kt_read_service_keykrb5_get_init_creds_opt_set_tkt_lifekrb5_sname_to_principallibk5crypto.so.3libcom_err.so.2_finilibkrb5support.so.0libcrypt.so.1cryptlibdb-4.8.sodb_createdb_strerrorlibpam.so.0pam_get_itempam_startpam_strerrorpam_acct_mgmtpam_endpam_authenticatelibldap_r-2.4.so.2ldap_msgfreeldap_get_optionldap_get_dnldap_simple_bind_sldap_initializeldap_start_tls_sldap_value_freeldap_count_entriesldap_err2stringldap_memfreeldap_first_entryldap_next_attributeldap_compare_sldap_get_valuesldap_unbindldap_set_optionldap_search_stldap_sasl_interactive_bind_sldap_whoami_sldap_first_attributeliblber-2.4.so.2ber_bvfreeber_pvt_opt_onber_freelibcrypto.so.0.9.8EVP_MD_sizeEVP_get_digestbynameEVP_DecodeUpdateEVP_cleanupEVP_DigestFinalEVP_DecodeInitEVP_DigestUpdateEVP_DecodeFinalEVP_DigestInitOpenSSL_add_all_digestslibresolv.so.2libc.so.6socketstrcpyfchmodfopengai_strerrorftruncatepipe__strdupconnectstrncpysignalforktime__lxstatunlinklistenmkdirreallocfsync_exitstrpbrkgetpidkill__assert_failstrtolendpwentmmapsyslogfgetsgetpwnamcallocstrlensigemptysetopenloggetaddrinfomemsetwritev__errno_locationchdirreadgetnameinfogetoptdup2vsnprintflseekmemcpyfcloseendspentmallocstrcatumaskstrcasecmpgetspnam__ctype_b_locoptargstderralarmmunmapstrncasecmpstrncatgethostnamefwritesigactionwaitpidstrchrfprintfacceptsleep__ctype_tolower_locfreeaddrinfosetsidfcntlaccessstrcmp__libc_start_main__cxa_atexit_edata__bss_start__sasldb_internal_listGLIBC_2.2.5DB4_8OPENLDAP_2.4_2OPENSSL_0.9.8LIBPAM_1.0krb5_3_MITGLIBC_2.3    ui 0 (ZH   = ($iS `/h 8 )0 ii ui RaRa Ya(Ya0YaRaRaRaRaRaRaRaRaRa Sa Sa Sa Sa Sa(Sa0Sa8Sa@SaHSaPSaXSa`SahSapSaxSaSaSaSaSaSaSaSa Sa!Sa"Sa#Sa$Sa%Sa&Sa'Sa(SaTa)Ta*Ta+Ta, Ta-(Ta.0Ta/8Ta0@Ta1HTa2PTa3XTa4`Ta5hTa6pTa7xTa8Ta9Ta:Ta;Ta<Ta=Ta>Ta?Ta@TaATaBTaCTaDTaETaFTaGTaHUaIUaJUaKUaM UaN(Ua0UaO8UaP@UaQHUaRPUaSXUaT`UaUhUaVpUaWxUaUaXUaYUaZUa[Ua\Ua]Ua^Ua_Ua`UaaUabUacUadUaeUafUagVahVaiVajVak Val(Vam0Van8Vao@VapHVaqPVarXVas`VathVaupVavxVawVaVaxVayVazVa{Va|Va}Va~VaVaVaVaVaVaVaVaWaWaWaWa Wa(Wa0Wa8Wa@WaHk EH5#!%#!@%#!h%#!h%#!h%#!h%#!h%#!h%#!h%#!hp%#!h`%#!h P%#!h @%#!h 0%#!h %#!h %#!h%z#!h%r#!h%j#!h%b#!h%Z#!h%R#!h%J#!h%B#!h%:#!hp%2#!h`%*#!hP%"#!h@%#!h0%#!h % #!h%#!h%"!h%"!h %"!h!%"!h"%"!h#%"!h$%"!h%%"!h&%"!h'p%"!h(`%"!h)P%"!h*@%"!h+0%"!h, %"!h-%"!h.%z"!h/%r"!h0%j"!h1%b"!h2%Z"!h3%R"!h4%J"!h5%B"!h6%:"!h7p%2"!h8`%*"!h9P%""!h:@%"!h;0%"!h< % "!h=%"!h>%!!h?%!!h@%!!hA%!!hB%!!hC%!!hD%!!hE%!!hF%!!hGp%!!hH`%!!hIP%!!hJ@%!!hK0%!!hL %!!hM%!!hN%z!!hO%r!!hP%j!!hQ%b!!hR%Z!!hS%R!!hT%J!!hU%B!!hV%:!!hWp%2!!hX`%*!!hYP%"!!hZ@%!!h[0%!!h\ % !!h]%!!h^% !h_% !h`% !ha% !hb% !hc% !hd% !he% !hf% !hgp% !hh`% !hiP% !hj@% !hk0% !hl % !hm% !hn%z !ho%r !hp%j !hq%b !hr%Z !hs%R !ht%J !hu%B !hv%: !hwp%2 !hx`%* !hyP%" !hz@% !h{0% !h| % !h}% !h~%!h%!h%!h%!h%!h%!h%!h%!h%!hp%!h`%!hP%!h@%!h0%!h %!h%!h%z!h%r!h%j!h1I^HHPTI0@H@@Hǐ@GHH!HtHÐUHSH= !uKPaH !HPaHHH9s$fDHH !PaH !H9r !H[fff.UH=w!HtHt PaÐ1ÐUHSHHZHtuHsHH{Hu)H1Ht fOKBHH[]fH1HtfNOBH[H]fHtfNO@H[]ÐSHyH= "!HtlH/uHHHz!Hu!AsHT!H=U!AHQ!sH5!1H[f.1hADuhAzfDH=!1HuH[1xAx1H|A@bff.H\$Hl$HLl$Lt$HLd$HX5HIIHDŽ$ 5HH$(5YA16H1Ht3Hernal erHNO saslaHuthd intHBHHHJBrorH$05H$85L$@5L$H5L$P5HX5f1AOHtINO saslaIuthd intIernal erLLPLH@rorrH=h!L$00LA1LH=<!1LzqHI/HHHxLtx1A"H1HINO saslaHuthd priHncipal nHame erroLHjHzHrHfB rf.E1Mt A}Au Ab%ALMAhAL$0 H$M1HALLl$ =&H$(5H$5Lt*H$(5MA1|H$0(HttAH$(5H$ 5HHt4H$5H$(5H$(5AH$5H$ 5H$(5ct8H$5H$(5jH$(5}!A1L$4H$04LLH$5H$(5E1E1HHLd$HD$$t]H$ 5H$(5H$5H$(5H$(5ھA1Ab%AMH$ 5H$(5HatMH$5H$(5XH$ 5H$(5sH$(5V?A1H$(5H!L$51L$ 5HDŽ$5HDŽ$5HHDŽ$4HDŽ$00HDŽ$80uKH5{!HH$4HL$00:LHH$5Hg1HA1 HtGHǾ]A@t ftHH$(5HnH$5H$(5H$ 5H$(5H$(5HvH$5H$4L$5E11HL$00H$5HtHLD$0 L$00LLD$(fLD$(L$5H !E11HL,$LƄ$/ Ld$H$5AHtH1HDŽ$5EZH$5E1E1LLHH$.H$5HtHHDŽ$5HLH$5H1r(HafOK@Pf!f.1ÐSHH@HL$8HT$ H<$Ht$HHHD$HD$ `D@Hd$(ct_H|$8SAH¿1eHt%INO PAM sHtart errf@orLHx@H@[DH|$8H|$tnH|$8AH¿1H|$8:H1HtHuth erroHNO PAM afBrH2HZHH@[@H|$8)tsH|$8WAH¿1H|$8]H1HHcct erroHNO PAM afBrHBH HfDH|$81d H1HfOKBHff.AWIAVAUATUHSHcHH(HT$IƸMtcE1E1JD-\1ELt#fH}HtHA9LH([]A\A]A^A_f.KnCDnAID9kHD$L01DIHT$ JD-Ht$HPHH$cH$uKI?CDnKn@IHKngAfDA1KnCDn/I8AH¿1 tt&A1 F@ A F@6fDATUHS1 DHx"HuuFHxHcHHt HH"@6Hnf"H[]A\HX\XHc\HHt"UL`t5HA$IEt"uA$\If.LfA"H[]A\fAWIAVIAUATUSHH M5H!HL$`Ll$I(H!MLAHP HHD!1 H[(HS s{xߋSHsUsH{A ML($[LMAl MALl2fH!pHxH$`11A I$qH!HپAHP HHD!19eHteINO [ALERIT] CouldIn't contIact remoIte autheInticatioIn serverL0LhL`LXLP LH(L@0@8HĈ[]A\A]A^A_f F@H$  F@ Hމ1AAcMcBƄ$ $ t8< ;< 3HffD< < HusAHxAHs~AHLLI MIHLHDŽ$AHDŽ$L$ LH$(HDŽ$0AHDŽ$8L$@n!H$HHDŽ$PAHDŽ$X`wH$j1AYAOL1HLLbL1HL}LE Hމ1AAMcBƄ$ $ t4< < H@< o< gHuA HA H/!_+$H1HHredentiaHNO remotHe serverH rejecteHd your cHB H:HrHHZHJfB(lsB*HrjEH1HHNO [ALERIT] The rIemote auIthenticaItion serIver is cIurrentlyI unavailHLzLrHLjLb LZ(LR0LJ8B@ableBD MAHgHHھ0A1l%AH1HINO [ALERHT] UnexpHected reHsponse fHrom remoLHjHzHrHZ HnticatioHte autheIn serverHB0HJ(HLz8B@7H{UA1rAH1HHNO [ALERHT] errorH synchroHnizing wHith remoH*HzHrHZHJ HA@A AAAA5Ai !?$]H1HTIOK remotIe authenIticationH successLLJLBHjHB fulH1(ML麃AA1uA1_L1HL:LL1HLL$tH1HkINO [ALERIT] saslaIuthd intIernal erL2LjLbLZHB ror%HtHLH1L^WpA1cHLfD1HLNLA1>1A($~H1HuH׾A$@t ftH-HLA1H1AAH1H@AAHHLA1XfV#DSH0H= !H/H=!cA5HtHXH=z!Ht81HHH=d!HXYaHD$$uiH2!P u1H0[f.tHP AHHD!1{H=!H!D!H!IH1A3y1A@` t#t6AA1cfDR@ fR@vfDAWAVAUATUSHx HH|$@Ht$0HL$X H|$0 H !H L$P Lt$`B@H!DeMLAHP HHD!17H[(HS s{xߋSHs`sH{A MLD H$ZLMA` MAL`1fH!pHxH$P 11A I$yH!Hپ(AHP HHD!1/9HHteINO [ALERIT] CouldIn't contIact remoHte autheHnticatioHn serverLLPLHL@Hh Hx(Hp0@8Hx H[]A\A]A^A_R@AR@ 2H|$@L-!H|$0AH|$XLD$811fD1A|%@HH9rD9DM;T$8LT$8эDHchHI/IHcD$8McHcL|$HH\$PHD$8)D<%HM Ht4HI9~+ tM A16 Az@ u AcHھJ A11Ð1ffff.HtH b@H1ffffff.fffff.fffff.H\$Hl$1Ld$Ll$HH$HI1IHHHHDŽ$8@4@HDŽ$@@1@HDŽ$HP6@HDŽ$P3@HDŽ$0b@HDŽ$`b@HDŽ$pb@覉H}HHl$H$A3ALHIHD$H$]LHjH1Ht fOKBHH$H$L$L$Hf.H$1@HH>DHtfNO@@&H1HvfNOBHeHt#tHt 9 HEL 81Au NH9tHu1@A'o1r A#QHcHLAMtD$LMLHHA׃tt1BAe AMt A}hAu Ab%AL$1MHھA'$f.HG|$tL A뒾 A&1D$?HH\$Hl$HLd$Ll$迀Lt$L|$HHHD$PHIHL$MMHIŸMALﺀ@@1HHt ;Hft }Mt A?H|$tHD$8Mt A<$Mt A>DuvHD$PL(1H\$Hl$ Ld$(Ll$0Lt$8L|$@HHÐbfHH@H&DfDILdKqHLHKIH,KIL KIHJILJH1fDAEI}fHffffff.H\$Hl$HLd$Ll$ H(HIeIĸMtHHID$WHI$tGHFHID$t5HID$IEMeID$1H\$Hl$Ld$Ll$ H(LoH\$Hl$HLd$Lt$ALl$H(AHI9v%H$Hl$Ld$Ll$Lt$ H(C|~IŸMtAEN43+fD<(uL;AD\28fI\$`AHHII9L9r,A$<)t[~<*tu<\uLAD\5cLHLH)DLAD\00zf.LAD\29Zf.LxAD\2a:f.L9r Lm1LHLH)_ffff.SHHH[DHt H$t$HH$Hۋt$t;A@t#HE0.HAuAD9@.Hu H8@.t@HHuHdHD EtA.HyuHHtA)DtNIIA<.ttI@ f.Ht.HxuHMttIIL1HLHHH߉D$MD$@AWAVAUMATIUHSHH8HHT$LL$Ht >uE1H|$tHD$8L1Mt A<$"AMt A}1D9HALD9DMA9DLE1E1t%D<%HuGHD$HT$H1H8[]A\A]A^A_L$U$DL$=$DpH(HA~LHT$(L)A~RfH|$ܽHT$f@L@HHT$(H)InH蘽H|$HT$(InfDLhHT$(LInH|$HfD@HT$(0f.HDHT$(HWH@˼1 A#c:fHSHt)HH;HtAHHCC[fff.AWAVAUATIUHSHH(HH5HLLLHT$;f.H=@b%AI|$ AD$(I0I$HH=@HD$tfvH=@t4H=@fDuMttLt$LHt?u덐MDtuLl$LH|$t ugHT$HaH|$fDMt uRHT$HaH|$qfDH(1[]A\A]A^A_HD$HD$HFfDL|$L3ff.ATAUHSHH HHGHHCHC 4{.<Hl$H$s@HH;AE11H2AA2iA1}EA"uZ@CAH D[]A\f.HGHNHHE18t/@APtD[HSAH'<ҺAHED1/CH A[]DA\fH;HH螿AfDCHHsHD$HHt .HHt DE5HH t HHH!t H!sHHH%t H%:HHkHSDH)EH;H€ 蛼HCD<EDE @A$1ȶHSǂ H;Hˆ P6>HSH;Hœ HSH;H  HCH;1ҾD YaEHEȻPHSH;H˜ 註pHC1Ҿ YaH;HE|HC<@u5H;HT$a詼Ht$HtH{H@;HCH=@t u5H;HT$acHt$HtH{H;HCHH@@ H;a覺NHC<H{Hto@Hm@@q1Ht t  f HtCH D[]A\ff׹HHKHCsfH1`ݹHs@HS@qHH)1P襹HS@@A$1f.A$1ϳf.HCA$ 1襳BHCA$ 1腳pHCA$ 1eHCpA$H H 1=H;11褺.HCA1`蔸<Hs1`t|Hsp1`T<Hs1`4\Hs1`HsEHH~HH{@HfHW#AH¿$1HCA$H)1 A#1AͱHu 蹵AH¿$1襱虵AH¿$1腱yAH¿$1eYXAH¿$1Ed9(AH¿$1%A_HS A#1AH8A7 AH¿#1ͰHu `A#1诰HAQfff.Hl$Ld$ILt$L|$IH\$Ll$HH:I*HŸHL葱HHH|@菵HøHLl$L葶LYL$ALHLLLL$XLL$LL$LHD$mHL2LLHLܷE|$ELd$p1LL輳H$HcHLH9H(D$D$EH$H$L$L$L$L$HfH訰HA蝰HcE)LH43IcEH苳@H\$Hl$HHHHwH\$Hl$HDHHMHt׀8tHHh1tfffff.H\$Hl$LLd$Ll$HLt$L|$HHIIIMHD$HHD$@HD$8HD$0HD$(I|Hu7H\$XHl$`Ld$hLl$pLt$xL$HĈ>tHt 9JHEL LD$(H@HH@HL L$LkHt$(HE1E1E1H|$8Ht L$L$MtLL$襲L$MtLL$萳L$MtLL${L$H|$0Ht1L$RL$H|$HHt L$[L$H|$@Ht L$DL$H|$(HL$L$r A#1OsDHGH}LL$HE1LLLH0 H}LL$@E1LLLH0 dHEHL$8Ht$@E1M H HL$H$HL$HH}ò4v0藯AH¿#1E1E1}E1EOHHHuMHHtHt$8H}tTu=HT$HN A'E1E1E1AH¿#1HT$Hd A'1Ht$8H}_HI.ML%E1II}HtfLL$蘰L$uH}LTHIƋL$QHHL6tH;D$E1E1.HL$!H}HT$0LL$L$IMH}LLL$ƬHIIL$u!?HLLD$LD$IuRI0HuLL$rLjL$HT$0H}LL$L$IsE1E1E1gH;D$XHL$KE1CH\$Ll$HLt$L|$IHl$Ld$HHMIIHD$XHD$PHD$HHD$@HD$8HD$ HD$(HD$ AHD$HD$0A8MH{4:!LL$PH0MLLLbH|$0Ht[H|$XHtH|$PHt H|$HHtH|$8HtH|$@Ht萫H\$hHl$pLd$xL$L$L$HĘHC<t:H;Ht$@11詰HD$@HL`f.LL$8LD$ LLLH5HD$8@LL$XHǰE1LLLHSHt$XLH;H°NH{LL$HMLLLH0wsHCHL$0Ht$HH;LD$E1ɋ0HL$H HL$PH$խ4vPǽ褪AH¿#1萦C 0A$1oDHHHu/HHtHt$0H;fDǽ AH¿#1x A#1]H\$Ld$HLl$Lt$IL|$Hl$HD$HIIMHDŽ$HDŽ$<Hl$H+@HnHEH$HCH$HMH$1H@LRH$HtVH$Ht褩H$H$L$L$L$L$Hf.L$H0 E1LtH$Hc?ZHl$H$H.HCH=PtjtaL$LLLHMA}fHﺀAH)LH8)~H=0DH\$Hl$HLd$Ll$Lt$L|$HHGLD$(LL$HLD$0Ht$HT$HL$HD$8H0HD$0u)HD$HLhHD$ MtA}u=H|$ H\$XHl$`Ld$hLl$pLt$xL$HĈH|$(tHD$(8tH-GHAxAE1I,$AIHHLcLHL袧uMcKvHHhAHFHpAK|=Ht$(хuqHCH=Pt u@H=t 0u/HD$H1HD$ fDHt$(L묐HL$HT$E1Ht$HvHD$HHD$ DH\$Hl$HLd$Ll$ILt$L|$HhHMLL$ LD$IHHD$(HD$ HD$HD$ AtJH|$(HtH|$ HtDH\$8Hl$@Ld$HLl$PLt$XL|$`HhfDHD$ E1111MHxHD$(H$%AuHt$(HaAtHCH=Pt uH=S0FHD$ HLLHL@A$fDHSHt'HHH[[fffff.HSHt2HHDHu%-t 1[ HSHDPtHߺ 1[ff.AWAVAUIATUSH~AHHLHIfIM0 M0H$H$IH$I0 H$I0HD$xIHD$pIHD$hI0HD$`I@HD$0IHD$(IHD$ I HD$IH!HD$IH%HD$I@HD$8IHD$@IHD$HI@HD$PI HD$XI H$f.LH营HHڋ H!%tDHJHDHH)H uƄ$Huf.H}rf MHHDP uـ#PH,$D@#fDHUHEH}tI趡MHHPu-t _苡HUHDPuH}uXDA tA<tPADž A<t A8t=A0t A0 u3L1HĨ[]A\A]A^A_AtAƅ8A0uúLL#뱀:HREzHmu?H}0f蛠UHHDH uلH<$ A胠eH<$ AmiH<$ AWH<$ AA H<$ A+AH<$ ApH<$ A@H<$ AH<$AӟZH<$A轟-H<$.A觟H<$@A葟H<$WA{5H<$lAe AHP/ADž4H$H;!fH$H!!LH$H!2HA H|$xH H$H HL H|$hH H|$pH 1HھXA#&hAH1ADž0i AH TADž4DHL /H|$`HH<$A躝tH<$A訝uhAH)u~ADž eHA QHHIDž I 0HA AH进ADž  AH蚛ADž HA HA H<$DALt;H<$RA:tH<$ZA(uPH|$PH2]HEA<IAH4ADž $H<$mAƚtH<${A贚uH|$HHH<$A苚tH<$AyuH|$@HH<$APtH<$A>uH|$8HHsH<$AH<$ADH<$AH<$AәH<$ A轙H<$!A觙H<$2A葙tjH<$@AtAH<$MAmH AH)H|$0H_H|$HHsH|$H1\H|$HEH|$ H.H|$(HHAHAffffff.H\$Hl$HLd$Ll$H8H>Ht1H\$Hl$ Ld$(Ll$0H8ÿ 臙IŸMtпP)AEIEIEIESHI<1P)HȕI$XAI$0 jAADŽ$ I$03AI$sAADŽ$ HLADŽ$0ADŽ$4AƄ$8IDŽ$ IDŽ$ ADŽ$ ADŽ$ ADŽ$ ADŽ$ ADŽ$ADŽ$<LLu3D$MeGL+D$aLD$ZD$GLD$D$ِHA HtH 1f.SHIH H= HtiHt-胗H1Ht fNOBHH [VH1HtfOKBHH [f.H= YaHT$HL$LD$@HT$HL$LD$u H=> XH( ۖHefNO@W11҄t5Dɍt 1%Hu15Ի ffff.USH(f$HD$fD$HD$Ɛ)fD=ʻ 1HӒt蚐8u%n tԉhAPA1dfk麐APA1AZAHPA1!H([]DH(1[]USH(f$HD$fD$HD$)fD= 1Ht躏8u% tԉ麸A`A1f苏A`A1azAH`A1AH([]DH(1[]USH(f$HD$fD$HD$)fD= 1Htڎ8u% tԉApA1f諎8ApA1蚏AHpA1aH([]DH(1[]HH=U Ht u HDH 1 AA1HUSHH=ۺ ^HXHbHH tzH5 HH$H=͸ HھA@H= 1BHÉ tJ1b tH AAU1H[]úAA8AA1AHA11EAA1*越(AA1觋[AHf.AUATAUA$'ASAAHELՏHHL1HLA9v_ HƒHrA9rW49vэ<fDAEAEAF)9wك9wH袎HD[]A\A]H߉D$舎D$H[]A\A]ÿAA1syfH1 萏( tHÿAA-3S1 St. 98@Ǎ9w=ų [ÿAA1ύffffff.= SHyGlu [f.hh{lCh@H@HHM H@HHpXH9rXHLH`H9uHHHSHPHSHPHSHPHS HP HS(HP(HS0HP0HS8HP8HS@HP@HSHHPHHSPHPPHSXHPXƴ u${h[H PP[fDdA%A1HC`LH\$Hl$Ld$HX=V x1H\$@Hl$HLd$PHXfD1HH@uAH - t&l$AHHuӱ A  Ӌ u  p 1HIcԈH$HHD$HCHD$HCHD$HCHD$ HC HD$(HC(HD$0HC0HD$8HC8L HC@H@@`P& hH$ H% P = 1`AHA1$AHA İ 1AHA D1AHA 1AHA k v AHA1| H\$Hl$HLd$Ll$ILt$L|$H(=. IILŸx>H$H$L$L$L$L$ H(fDL1HL[LD$ LLIAT$ F|:AT<w1nHD$(s H$<LD$4 H$<L H$<L H$H|$@D$$1C2H諅H|$@HH1);H$Ht$@1HHT$<Hޮ |$$P P $T$$Hl$8RHH@1HHH s@uHJHct$t VHHufDHz1AUAATE1UHSH u(DHD[]A\A]f.HtH}th HD9NztsA1Ʌ~:HuH9|GHUH1@)HrHH9|'HG99uHD[]A\A]fDHHH)G9nDKxuΣ ~ C:Af.H\$Hl$Ld$HH$8H (@L$@L$HHH)H$H)y)q)i)a)Y)Q)I)AH$H$DŽ$DŽ$0H$H$ H$y/ Ƅ$uCt͢ teHHھ A1AwH$H$L$HÐ}H=d IHپ A1@}  $A,zF xffff.AWAVAAUATIUSHHHT$yvHl$I$u AfH)tnIHLD|HHE/}ɺ A A1 D#w AH A1HH[]A\A]A^A_H\$fH\$H)fDAWAVAAUATIUSHHHT$uHl$I$u AfH)tnIHLD}vHHE/}ɺ A A1+DCv AH A1 HH[]A\A]A^A_H\$fH\$H)̐H( uC=m }H=y lv tH d !A#A1H(Ð=. H1f$HD$fD$HD$v= 1}H= u eH A#A1 CfDH\$Hl$Ld$H(H|$$ND$OD$ HIuƄ$A$I!%tH$DIT$LDIfA)Dff$Ht#H$H$L$ H(AHzHu tH!A#A1H\$Lt$Hl$Ld$Ll$HhL$>L9Ht3H$@H$HL$PL$XL$`Hh$>fff$>H$0҉H$>H9uLƄ0Hk$>ff=f$>L$ ЉLk$>H9'LƄ CH$>ff=f$>kL$ЉL$>H9LƄH$>ff=f$>H$>H9e$0i$ 4LHIHLE1LHLD1LHJ1rHHDLH$<HHAf$>ff$<Ht`Hpu"A#A1]b%AQ"Aҹ"Aƹ #A$>HfHu {H!A#A1]U!A>!A#A1>!A*!A#A1*!AfDAUATUSH(` $ nur= p[a[a]pVo/ D ?  @ w @t1tf$HD$fD$HD$nfD=n 1Hpn8tn(!A#A1|oAH#A1\"q< f$HD$fD$HD$,nfD= 1H;pm8tmD(!A#A1DnAH#A1tA!A#A1Dn!AH#AYBv< 1܋=ߘ vD r!A#A1ڙ uDə !A#A1 – S H= nHX H rHHA H5\ HHH=" Hھ!AH= 1Bnؗ  1jH= ~mHXHqHH tH5Ә HH@H= Hھ "A\H=} pmZa1 HH5b lHfŗ Za1Ҿf4 Ol 1s= nZak)H= n= l?Ws= wo?H "A1#AӔ t [ ߉ @H Y "A#A1s]A#AZ`o[jH c"A#A1,Ek~"AH#A1 o jH ="A#A1jZ"AHi%"A#A1js"AHiH [ h#A#A1{j"AHJriH + @#A#A1C\jAHH u1p=™ Noו @H= j= q H= m= 1 _ ,$A1A1r@o#A1A1[LfDn; = $q u[H= mif.#WH ј $A1A1fDH #A1A1놐H= di`ffffff.H@1Wj~+\ tHcȺ>$A 1A1QHS:h|>t1 u[@HcȺv$A11A[؃% [gP$A1A1gHm$A1A1kfffff.ATUSH~ @A}guXfHŃ $A%1A1OhgHx&A%1A1/5kD=. nH= j\jJ11$AhG1% nnn1i~iriqH=z fHxkHHB nH5U HEiH& HfHH/saslautHChd.p1fC idCBH= gЕ ,HT$pǾ1fD$pHD$xHDŽ$fD$rgP= 11f=h ¾1fk%AHcȉ7 dH1k=& 11HlH= 1'jH H!%t=ؔ HDHJHDHH)eH= Cg= H$DŽ$dH= l=e t{lHc L %A%1A1nHĠ[]A\f=v H$iH$u+H= d$+hl@1$A%1A$$A%1A1@1$A%1AxeA]1fD$A%1A1z&A%1A1dH== d^gfD&A%1A12DŽ$-b86cH I%1Ah'A1H$= cf%1A@'A1DŽ$H$DŽ$a8b$AH%1A1yH$DŽ$oa8xbH ) I 'A%1A18=R H$Pb&f'A%1A1fA%1ADŽ$Y`8DŽ$aH I%1A'A1H$DŽ$`8a$AHf.S^aH @je1Ҿ^aieH^aH *AaH t ,*AaH Y ?+AaH > ]@+AaH # S+AoaH  5+ATaH A0,A9aH ҂ x%AaH Fx,AaH D,A`H E-A`H f #P-A`H K 7x-A`H 0 =-A|`H  H-Aa`H A@.AF`H ߁ (.A+`H ā .A(`1Y12\fATE1USHH |= H5 @%AHމW8O'v1fD$/AH=) Lf.H= tf v @H= wH=ـ _%9 L@1i<@ ࿉ !f MH=h VHIAD @H=1 H= MLr LH=m 0\?]H=N VHXHZHH H5& HHH= Hھ/&AH= 1BW H1f$HD$HD$fD$VXavZ16Q1@%b t,3=v~ ~1t 9[~ 11CY B~ 1%A1AH  H%A1A1H ߀ 1%A1AHʀ %A1AH10@SH &A1A1T%&AH1A1d/A1A1N@/A1A18>X9SH  p/A1A1 #TAH넿C&A1A1WMH %A4.A1A11XWRH r /A1A1zSHA1A1Z`WA1A<BW]&A1A1%A1A1GG#EgGGܺG vT2fDAWHGHW DDGL^@AVDO AUATUoSHD$HD$HT$Hf.VN  NH ʉHL9uDd$D‰D!D\$D!Dt$D|$G"xj ʋL$AE VD‰щD!! ً\$A DL$p $щˉ!D!Gν \, !! t$A 2|AA!!B*ƇGD ƍ42މAA!!D DD$ЍBF0AA!!D L l$D+FDE!A!B6ؘiD DщAE!!B:DD|$D ÍˉAA!D!D DD$G[AA!!D A42D4t$E1\DA!!D DT$ F,1B"kDDD!!B:q B4)D!D! ً\$ ECyAA!T$D!D AD|$G=!IAAADl$A!EA!E Dl$D|$B>b%D|$A AՉt$DA!E!!D t$D|$B9@@DAA!E DEAD41L$A! QZ^&DD!G%ǶD A AE!D!B]/D EATA AE!A!GSDE AF,.AA!AAD!D AA46Dt$AE!DB1AA!E D|$DB:EAAA!E!E AF42T$AA!A AE!D!7D AATAE!DAA!B E EDAAE!A!E AF,)L$AA!AAEZED!D AA Dt$AE! DB2AA!E D|$DB>EAAA!E!E-ogE AF46AA!AAD!BL*D AAt5AE!DAA!BB9E D|$DA E1A1F,*T$AEqA1B>"amD|$D1ADA1ʍ 8ED1DD1D1֍41L$ E D꾤D1G>KD|$1A͉A1э*`KAD1A EA1BpDA1F42D1AAD1֋T$ DE~(D1B!'1ATAE1G0A1F,)1AAD1A΋L$AED1D1 t$ 29DDD1G1΍42D1G>|D|$1AՉA1AD1A-*CADt$B1eVEDA1B&D")AA1ADE AA A1֍#DDt$A A1DAB9AA A1BY[eD 1ىB  1ӍB}DD$ 1΍t5B9]D|$ 1 1l$ э+O~oB,DD$ 1B2CDt$ 1B9N 1ݍ,* 1 *T$ȍ~S 1\$5:B* 1ˍ4 1Ӎ\B1ӆWL|$ 1ڍL HT$OA2HP@fHH9u[]A\A]A^A_fAVAUAB ATUHSWHЍ?9щWWDA@E1A)1E9SrhHTHH H)A9wHs1HEAF?1DA9v(D1A@Ht5HAD$?A9wD1HE)HDt!AJL-DUHHH9u[]A\A]A^@WW/f.UHSHHFˆ$T$T$?T$VшT$L$7T$L$w{8)¾XaH1H1HpHsHHڋ M M M HMHH9uHXHH9uH[]úx)@AWHAVIAUATUSH(@H$HL$wH$LfAHfHL9uL|$pMoALLDHL9ut:HH|Hf*H@+HH9uDHHH9uHN@HLLHfD06H2\HH9u@L1AFAFA#EgAFAFܺAF vT2I~XAFlAFhAFX#EgAF\@AF`ܺAFdvT2L1@EHI9uHI9uHD$H$ HH9uH([]A\A]A^A_H\$1D$$D$ D$#EgHD$D$ܺD$vT2+H$H޻HD$H1HD$!fHl$HH\$HXHH1HH1HHHl$H\$1H@AVHMAAUATUSHHp@vH$HNAHHH9uL$IMALLf.HH9uEt9AHHNDD HD HL9u@HHL9uHN@HL@06H2\HH9uLd$`@1D$tD$pLD$`#EgD$dD$hܺD$lvT2HL1LL1LL@1D$tD$pD$`#EgD$dD$hܺD$lvT2CLL11LL14Hp[]A\A]A^L$`HƉH1D$D$$#EgD$D$ܺD$ vT21HLAL)HHfDHH9u1ʉTʉTXHHuGhGUHSHHH91ʉTTXʉTHHuH$HHH9uHĸ[]ÐH\$Hl$HLd$Ll$HHHHAtfLd$HT$HL-DLLHT$HAu@LH|$T$uKIr DH\$(Hl$0Ld$8Ll$@HHDH+D1H1f.DCE11HHCH|$T$SL,$MtA}HCLD5fL-C'@H\$Hl$HLd$HHHu"H$Hl$Ld$Hf.HtHFHt HHHt!1H(AHU@AHU@1fDH\$Hl$HLd$Ll$ILt$HHHu2H\$pHl$xL$L$L$HĘHtHtHtLHD$@Lt$@HD$HHD$PLl$HD$XHD$`HD$HD$HD$ HD$(HD$0HFHtH!?HI11[AH\$Hl$HLd$Ll$HLt$L|$HHIIMMι5HHD$x9H0M'M@H$ Ml }L$L$LHLHD$PHL$x1LHHD$PHD$HD$ HD$XHD$`HD$hHD$pHD$HD$ HD$(HD$0HD$8HD$@5Ht$xHtH߉L$UL$L$H$S@H|$ S@L$H$H$L$L$L$L$H@L$HM>1L1L$f.H$E1HL$1D$pD$@HT$HD$PH$D$XHD$xHh=uyT$(H$HH9H$t H$HHt$ LL$yAD$(L$AHI=1L1fH;H=H1L1չjDLMIHP=L1;fDH<1L1Lf@fDH\$Hl$HLd$Ll$HLt$HHHMHL$LAHHD$XUHLMC=%i LL$`LD$hHAulHL$XHHAtpHt$XHtHH|$hS@DH\$pHl$xL$L$L$HĘfHy<1H1f.HD$hMHD$8Lt$0HD$@HD$HHD$PHD$0HD$`D$8MHD$HD$HD$HD$ L$$u L8IHD$XE1L1Dl$HHALA9H:H11AH:H1@H91H1AHD$X1L1H@A`L91HHF;1A1H9HAADD f.H:1H1AHHHH=:H151Hfffff.H1E1MtIMHL:H$HfDH\$Hl$LLl$Ld$HLt$L|$HX MILd$H$ Lf:H$ MHD$0AtADH$( H$0 L$8 L$@ L$H L$P HX fDH$ HU(HItNH$ ILIsp_pwdp == SHADOW_PW_EPERMNO Insufficient permission to access NIS authentication database (saslauthd)DEBUG: auth_shadow: pw mismatch: '%s' != '%s'DEBUG: auth_shadow: account expired: %dl > %dlDEBUG: auth_shadow: password expired: %ld + %ld < %ld*NP*NO Account expiredNO Password expiredDEBUG: auth_shadow: OK: %sUnknow errorlak_init did not run.Retrying authenticationfilter pattern not setupUsername not available.Domain/Realm not available.Service not available.User DN not available.ldap_initialize failed (%s)start tls failed (%s).Entry not found (%s).Duplicate entries found (%s).1.1ldap_whoami_s() failed.ldap_serversldap_bind_dnldap_bind_pwldap_passwordldap_versionldap_search_baseldap_filterldap_password_attrldap_group_dnldap_group_attrldap_group_filterldap_group_search_baseldap_group_scopeoneldap_group_match_methodldap_default_realmldap_default_domainldap_auth_methodcustomfastbindldap_timeoutldap_size_limitldap_time_limitldap_derefsearchfindalwaysneverldap_referralsldap_restartldap_scopeldap_use_saslldap_idldap_sasl_authc_idldap_authz_idldap_sasl_authz_idldap_realmldap_sasl_realmldap_mechldap_sasl_mechldap_sasl_secpropsldap_start_tlsldap_tls_check_peerldap_tls_cacert_fileldap_tls_cacert_dirldap_tls_ciphersldap_tls_certldap_tls_keyldap_debugldap://localhost/(uid=%u)uniqueMember{CRYPT}{UNIX}{MD5}{SMD5}{SHA}{SSHA}User not foundInvalid passwordGroup member check failedOut of memoryGeneric errorSuccessmd5sha1Authentication failed for %s%s%s: %s (%d)Authentication method not setup properly (%d)Incomplete lookup substitution formatUnable to set LDAP_OPT_X_TLS_CACERTFILE (%s).Unable to set LDAP_OPT_X_TLS_CACERTDIR (%s).Unable to set LDAP_OPT_X_TLS_REQUIRE_CERT (%s).Unable to set LDAP_OPT_X_TLS_CIPHER_SUITE (%s).Unable to set LDAP_OPT_X_TLS_CERTFILE (%s).Unable to set LDAP_OPT_X_TLS_KEYFILE (%s).Unable to set LDAP_OPT_DEBUG_LEVEL %x.Failed to set LDAP_OPT_PROTOCOL_VERSION %d, required for ldap_start_tls and ldap_use_sasl.Unable to set LDAP_OPT_PROTOCOL_VERSION %d.Unable to set LDAP_OPT_NETWORK_TIMEOUT %d.%d.Unable to set LDAP_OPT_TIMELIMIT %d.Unable to set LDAP_OPT_DEREF %d.Unable to set LDAP_OPT_REFERRALS.Unable to set LDAP_OPT_SIZELIMIT %d.Unable to set LDAP_OPT_RESTART.Unable to set LDAP_OPT_X_SASL_SECPROPS.ldap_simple_bind() failed %d (%s).ldap_sasl_interactive_bind() failed %d (%s).user ldap_search_st() failed: %sgroup ldap_search_st() failed: %sUnknown ldap_group_match_method value.Could not open saslauthd config file: %s (%m)Cannot connect to ldap server (configuration error)Bind to ldap server failed (invalid user/password or insufficient access)Retry condition (ldap server connection reset or broken)*()\p@p@p@p@p@p@p@p@p@p@p@p@Pp@Pp@Pp@Pp@Pp@Pp@Pp@Pp@Pp@p@p@p@p@p@p@p@p@p@p@ p@p@p@p@p@p@p@p@p@p@p@p@p@p@o@p@p@Pq@p@p@p@p@p@p@p@p@p@p@p@p@p@p@o@p@p@p@p@p@p@p@p@p@p@p@p@p@o@ q@p@p@ @@@@ AA @A @AP~@`XaAP~@pXaAP~@XaAP~@XaAAAAAAAAAattempting to release lock on slot: %dcould not release lock on slot: %d attempting a read lock on slot: %dcould not acquire a read lock on slot: %d attempting a write lock on slot: %dcould not acquire a write lock on slot: %d failed while writing to mmap file: %scould not mmap shared memory segmentmmaped shared memory segment on file: %scache timeout must be positivecache size must be positive and non zerofound with invalid passwd, update pending[login=%s] [service=%s] [realm=%s]: %sfcntl: %sflock file removed: %scould not allocate memory/cache.flockcould not open flock file: %sopen: %sflock file opened at %scache mmap file removed: %s/cache.mmapcould not open mmap file: %smmap: %slookup committedSASLAUTHD_CACHE_MAGICbucket size: %d bytesstats size : %d bytestimeout : %d secondscache table: %d total bytescache table: %d slotscache table: %d bucketsfound with valid passwdnot found, update pendingcache_un_lockcache_get_rlockcache_get_wlockcache_cleanup_lockcache_init_lockcache_cleanup_mmcache_alloc_mmcache_get_next_primecache_set_timeoutcache_set_table_sizecache_commitcache_lookuphAcache_initcfile_read: no memorycfile_read: cannot open %s%s: line %d: no colon separator%s: line %d: keyword %s: no valuekrbtf_name: cookie name (%s) too longkrbtf_name: need room for %d bytes, got %dkrbtf_init: %s is a symbolic linkkrbtf_init pidstring too long(!?)MEMORY:0krbtf_init %s: %msaslauthd[%d] :%-16s: %s %-16s: %sread failureread: %swrite failurewrite: %srx_rectx_recaccept lock file removed: %ssocket removed: %sresponse: %sNULL login receivedNULL password receivedNULL response from mechanismacquired accept lockreleased accept locksocket accept failureaccept: %scould not acquire accept lockcould not release accept lock/mux.acceptusing accept lock file: %s/muxcould not create socketcould not bind to socket: %sbind: %scould not chmod socket: %schmod: %slisten: %slistening on socket: %slogin exceeded MAX_REQ_LEN: %dpassword exceeded MAX_REQ_LEN: %dservice exceeded MAX_REQ_LEN: %drealm exceeded MAX_REQ_LEN: %dcould not open accept lock file: %scould not listen on socket: %sipc_cleanupipc_loopget_accept_lockrel_accept_lockdo_requestsend_noipc_initchild exited: %dpid file removed: %spid file lock removed: %smaster exited: %dchild exited: %lucould not fork child processfork: %sforked child: %lufork failed, retryingCannot start saslauthdCheck syslog for errorsfailed to set session id: %s/dev/nullfailed to open /dev/null: %s%lu master pid is: %lusigaction: %sUnknown2.1.23usage: saslauthd [options] option information: mechanism. a:cdhO:lm:n:rs:t:vV/var/run/saslauthdnum_procs : %dmech_option: NULLmech_option: %srun_path : %sauth_mech : %scould not chdir to: %schdir: %s/saslauthd.pid.lockcan't create startup pipeusing process modelsaslauthd master fork failed: %scould not read from startup_pipeAnother instance of saslauthd is currently runningcould not open pid file %s: %scould not lock pid file %s: %sunable to set close-on-exec for pidfilecould not write to pid file %s: %scould not write success result to startup pipefailed to set sigaction for SIGCHLDfailed to set sigaction for SIGALRMfailed to set sigaction for SIGPIPEfailed to set sigaction for SIGHUPfailed to set sigaction for SIGTERMfailed to set sigaction for SIGINT-m requires an absolute pathnameinvalid number of worker processes definedunknown authentication mechanism: %sfailed to initialize mechanism %sinternal mechanism failure: %sauth success (cached): [user=%s] [service=%s] [realm=%s]auth success: [user=%s] [service=%s] [realm=%s] [mech=%s]auth failure: [user=%s] [service=%s] [realm=%s] [mech=%s] [reason=%s]mechanism returned unknown response: %ssaslauthd %s authentication mechanisms: -a Selects the authentication mechanism to use. -c Enable credential caching. -d Debugging (don't detach from tty, implies -V) -r Combine the realm with the login before passing to authentication mechanism Ex. login: "foo" realm: "bar" will get passed as login: "foo@bar" The realm name is passed untouched. -O