Looks like you are only logging conn and acl. Try config and stats for
more useful information about what exactly is being queried and returned.


On 03/25/2010 01:29 PM, Lynn York wrote:
> Below is part of the log from slapd….
>
>
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: >>> dnPrettyNormal: <CN=Lynn
> Testing,CN=Users,dc=ldaptest,DC=com>
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <<< dnPrettyNormal: <cn=Lynn
> Testing,cn=Users,dc=ldaptest,dc=com>, <cn=lynn
> testing,cn=users,dc=ldaptest,dc=com>
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: [rw] searchEntryDN: "cn=Lynn
> Testing,cn=Users,dc=ldaptest,dc=com" -> "cn=Lynn
> Testing,cn=Users,dc=ldaptest,dc=com"
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => send_search_entry: conn 3
> dn="cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com"
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access to
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "entry" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => dn: [1] dc=ldaptest,dc=com
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] matched
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => test_filter
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]:     PRESENT
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: search access
> to "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "objectClass" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= test_filter 6
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] attr entry
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: access to entry
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com", attr "entry" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: to all values by
> "cn=mwldap,cn=users,dc=ldaptest,dc=com", (=0)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= check a_dn_pat: users
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] applying
> read(=rscxd) (stop)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] mask:
> read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access
> granted by read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access to
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "objectClass" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => dn: [1] dc=ldaptest,dc=com
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] matched
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => test_filter
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]:     PRESENT
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: search access
> to "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "objectClass" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= test_filter 6
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] attr objectClass
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: access_allowed: no res from state
> (objectClass)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: access to entry
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com", attr "objectClass" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: to value by
> "cn=mwldap,cn=users,dc=ldaptest,dc=com", (=0)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= check a_dn_pat: users
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] applying
> read(=rscxd) (stop)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] mask:
> read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access
> granted by read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access to
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "uid" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => dn: [1] dc=ldaptest,dc=com
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] matched
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => test_filter
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]:     PRESENT
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: search access
> to "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "objectClass" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= test_filter 6
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] attr uid
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: access_allowed: no res from state
> (uid)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: access to entry
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com", attr "uid" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: to value by
> "cn=mwldap,cn=users,dc=ldaptest,dc=com", (=0)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= check a_dn_pat: users
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] applying
> read(=rscxd) (stop)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] mask:
> read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access
> granted by read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access to
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "uidNumber" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => dn: [1] dc=ldaptest,dc=com
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] matched
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => test_filter
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]:     PRESENT
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: search access
> to "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "objectClass" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= test_filter 6
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] attr uidNumber
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: access_allowed: no res from state
> (uidNumber)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: access to entry
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com", attr "uidNumber" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: to value by
> "cn=mwldap,cn=users,dc=ldaptest,dc=com", (=0)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= check a_dn_pat: users
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] applying
> read(=rscxd) (stop)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] mask:
> read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access
> granted by read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access to
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "gidNumber" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => dn: [1] dc=ldaptest,dc=com
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] matched
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => test_filter
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]:     PRESENT
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: search access
> to "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "objectClass" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= test_filter 6
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] attr gidNumber
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: access_allowed: no res from state
> (gidNumber)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: access to entry
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com", attr "gidNumber" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: to value by
> "cn=mwldap,cn=users,dc=ldaptest,dc=com", (=0)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= check a_dn_pat: users
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] applying
> read(=rscxd) (stop)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] mask:
> read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access
> granted by read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access to
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "loginShell" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => dn: [1] dc=ldaptest,dc=com
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] matched
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => test_filter
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]:     PRESENT
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: search access
> to "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com" "objectClass" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= test_filter 6
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_get: [1] attr loginShell
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: access_allowed: no res from state
> (loginShell)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: access to entry
> "cn=Lynn Testing,cn=Users,dc=ldaptest,dc=com", attr "loginShell" requested
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => acl_mask: to value by
> "cn=mwldap,cn=users,dc=ldaptest,dc=com", (=0)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= check a_dn_pat: users
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] applying
> read(=rscxd) (stop)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= acl_mask: [1] mask:
> read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: => access_allowed: read access
> granted by read(=rscxd)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: <= send_search_entry: conn 3 exit.
>
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: send_ldap_result: conn=3 op=1 p=3
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: send_ldap_result: err=0 matched=""
> text=""
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: send_ldap_response: msgid=2
> tag=101 err=0
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: conn=3 op=1 SEARCH RESULT tag=101
> err=0 nentries=127 text=
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: daemon: activity on 1 descriptor
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: daemon: activity on:
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]:  14r
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]:
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: daemon: read active on 14
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: connection_get(14)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: connection_get(14): got connid=3
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: connection_read(14): checking for
> input on id=3
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: ber_get_next on fd 14 failed
> errno=0 (Success)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: connection_read(14): input
> error=-2 id=3, closing.
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: connection_closing: readying
> conn=3 sd=14 for close
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: connection_close: conn=3 sd=-1
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: =>ldap_back_conn_destroy: fetching
> conn 3
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: daemon: removing 14
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: conn=3 fd=14 closed (connection
> lost)
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: daemon: epoll: listen=7
> active_threads=0 tvp=NULL
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: daemon: epoll: listen=8
> active_threads=0 tvp=NULL
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: daemon: activity on 1 descriptor
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: daemon: activity on:
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]:
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: daemon: epoll: listen=7
> active_threads=0 tvp=NULL
>
> Mar 25 13:25:16 hltraindb01 slapd[28836]: daemon: epoll: listen=8
> active_threads=0 tvp=NULL
>
>
>
> *From:* Benjamin Griese [mailto:[email protected]]
> *Sent:* Thursday, March 25, 2010 11:56 AM
> *To:* Lynn York
> *Cc:* Tyler Gates; [email protected]
> *Subject:* Re: Problem with getent passwd
>
>
>
> Hi,
> could you please also provide the appropriate log entries that show the
> query to the slapd from the client?
>
> thanks
>
> On Thu, Mar 25, 2010 at 13:52, Lynn York <[email protected]> wrote:
>
> I attempted to use "setup" to setup ldap auth.   That did not work.  When
> I run "getent passwd" it prints all the local users, then hangs for about
> 5 seconds and doesn't print the ldap users.  However, it does query the
> ldap server, I can see the queries in the ldap logs.  I have added copies
> of my configs with hopes someone can help me more :)
>
> /etc/ldap.conf
> ----------------
> base cn=users,dc=ldaptest,dc=com
> uri ldap://ldaphost/
> binddn cn=mwldap,cn=users,dc=ldaptest,dc=com
> bindpw password
> scope sub
> timelimit 120
> bind_policy soft
> bind_timelimit 120
> idle_timelimit 3600
> ssl no
> pam_password ad
> # nss_ldap configurations
> nss_base_passwd cn=users,dc=ldaptest,dc=com?sub
> nss_base_shadow
> cn=users,dc=ldaptest,dc=com?sub?&(objectCategory=users)(uidnumber=*)
> nss_base_group
> cn=users,dc=ldaptest,dc=com?sub?&(objectCategory=group)(gidnumber=*)
> nss_map_attribute user SAMACCOUNTNAME
> sasl_secprops maxssf=0
> #tls_cacertdir /etc/openldap/cacerts
>
> Slapd.conf
> ----------------
> ######################################################
> # database definitions
> ######################################################
> database ldap
> suffix  "cn=users,dc=ldaptest,dc=com"
> uri  "ldap://ads.ldaptest.com";
> overlay rwm
> rebind-as-user
> chase-referrals no
>
> acl-bind
>        bindmethod=simple
>        binddn="cn=mwldap,cn=users,dc=ldaptest,dc=com"
>        credentials=password
>
> # The database directory MUST exist prior to running slapd AND
> # should only be accessible by the slapd and slap tools.
> # Mode 700 recommended.
> directory       /var/lib/ldap
>
> # Indices to maintain for this database
> #index objectClass                       eq
> #index ou,cn,mail,surname,givenname      eq,pres,sub
> #index uidNumber,gidNumber,loginShell    eq,pres
> #index uid,memberUid                     eq,pres,sub
> #index nisMapName,nisMapEntry            eq,pres,sub
>
> rwm-map objectclass posixAccount organizationalPerson
> rwm-map attribute uid sAMAccountname
> rwm-map attribute uidNumber uidNumber
> rwm-map attribute gidNumber gidNumber
> rwm-map attribute givenName cn
> rwm-map attribute unixHomeDirectory homeDirectory
> rwm-map attribute unixUserPassword UserPassword
>
>
>
> Any help is greatly appreciated...
>
> -----Original Message-----
> From: Tyler Gates [mailto:[email protected]]
>
> Sent: Wednesday, March 24, 2010 9:31 PM
> To: Lynn York; [email protected]
> Subject: Re: Problem with getent passwd
>
> Actually I misspoke earlier -I meant run the command 'setup' from the
> terminal and select authentication. From there you should see "User
> Information" and "Authentication" columns. Just check LDAP in "User
> Information" and you should see getent populate the passwords.
> That normally does the trick.. pretty simple but if that doesn't work
> I'd check your /etc/ldap.conf is setup correctly (I mostly have to just
> add the host information and base dn). Other wise your LDAP server
> doesn't have the attributes its' expecting from its queries to generate
> user account information.
>
> On 03/24/2010 08:09 AM, Lynn York wrote:
>   
>> Here is my /etc/pam.d/system-auth file
>>
>>
>>
>> cat /etc/pam.d/system-auth
>>
>> #%PAM-1.0
>>
>> # This file is auto-generated.
>>
>> # User changes will be destroyed the next time authconfig is run.
>>
>> auth        required      pam_env.so
>>
>> auth        sufficient    pam_unix.so nullok try_first_pass
>>
>> auth        requisite     pam_succeed_if.so uid >= 500 quiet
>>
>> auth        sufficient    pam_ldap.so use_first_pass
>>
>> auth        required      pam_deny.so
>>
>>
>>
>> account     required      pam_unix.so broken_shadow
>>
>> account     sufficient    pam_succeed_if.so uid < 500 quiet
>>
>> account     [default=bad success=ok user_unknown=ignore] pam_ldap.so
>>
>> account     required      pam_permit.so
>>
>>
>>
>> password    requisite     pam_cracklib.so try_first_pass retry=3
>>
>> password    sufficient    pam_unix.so md5 shadow nullok try_first_pass
>> use_authtok
>>
>> password    sufficient    pam_ldap.so use_authtok
>>
>> password    required      pam_deny.so
>>
>>
>>
>> session     optional      pam_keyinit.so revoke
>>
>> session     required      pam_limits.so
>>
>> session     [success=1 default=ignore] pam_succeed_if.so service in
>>     
> crond
>   
>> quiet use_uid
>>
>> session     required      pam_unix.so
>>
>> session     optional      pam_ldap.so
>>
>>
>>
>>
>>
>> Also, when I ran authconfig, that didn't help.  The server still queries
>>     
> the
>   
>> ldap server, but the users don't actually show when I run getent
>>     
> passwd...
>   
>> could it be something with the rwm mappings?
>>
>>
>>
>> *From:* Tyler Gates [mailto:[email protected]]
>> *Sent:* Tuesday, March 23, 2010 8:26 PM
>> *To:* Lynn York
>> *Subject:* Re: Problem with getent passwd
>>
>>
>>
>> Sounds like it's a problem with your client side pam_ldap
>>     
> authentication.
>   
>> There's a whole buch of steps to get that working, just google it. If
>>     
> you
>   
>> have a redhat variant authconfig or setup will step you through it. It
>>     
> would
>   
>> help if you could post your system_auth file.
>>
>> On Mar 23, 2010, at 11:40 AM, Lynn York <[email protected]> wrote:
>>
>>  Hello,
>>
>>
>>
>>                 When I issue "getent passwd" I can see it query the ldap
>> server for all the information and the server is returning the correct
>> information.  However, "getent passwd" doesn't actually show the users
>>     
> that
>   
>> are in ldap.  I am not sure where my problem might be.  Can anyone offer
>>     
> any
>   
>> suggestions on where to look?
>>
>>
>>
>> Lynn York II
>>
>> MavenWire Hosting Admin
>>
>> www.mavenwire.com
>>
>> (866) 343-4870 x717
>>
>>
>>
>> MavenWire - We DELIVER
>>
>> http://www.mavenwire.com
>>
>>
>>
>> This e-mail and any attached files may contain confidential and/or
>> privileged material for the sole use of the intended recipient.  Any
>>     
> review,
>   
>> use, distribution or disclosure by others is strictly prohibited. If you
>>     
> are
>   
>> not the intended recipient (or authorized to receive this e-mail for the
>> recipient), you may not review, copy or distribute this message.  Please
>> contact the sender by reply e-mail and delete all copies of this
>>     
> message.
>   
>>
>>
>> MavenWire - We DELIVER
>>
>> http://www.mavenwire.com
>>
>>
>>
>> This e-mail and any attached files may contain confidential and/or
>> privileged material for the sole use of the intended recipient.  Any
>> review, use, distribution or disclosure by others is strictly
>> prohibited. If you are not the intended recipient (or authorized to
>> receive this e-mail for the recipient), you may not review, copy or
>> distribute this message.  Please contact the sender by reply e-mail
>> and delete all copies of this message.
>>
>> MavenWire - We DELIVER
>> http://www.mavenwire.com
>>
>> This e-mail and any attached files may contain confidential and/or
>>     
> privileged material for the sole use of the intended recipient.  Any
> review, use, distribution or disclosure by others is strictly prohibited.
> If you are not the intended recipient (or authorized to receive this
> e-mail for the recipient), you may not review, copy or distribute this
> message.  Please contact the sender by reply e-mail and delete all copies
> of this message.
>   
>>
>>     
> MavenWire - We DELIVER
> http://www.mavenwire.com
>
> This e-mail and any attached files may contain confidential and/or
> privileged material for the sole use of the intended recipient.  Any review,
> use, distribution or disclosure by others is strictly prohibited. If you are
> not the intended recipient (or authorized to receive this e-mail for the
> recipient), you may not review, copy or distribute this message.  Please
> contact the sender by reply e-mail and delete all copies of this message.
>
>
>
>
>   

Reply via email to