>
> On Mon, May 8, 2017 at 10:37 AM, Dirk van Deun
> wrote:
> >>
> >> Are you able to recompile?
> >>
> >> untested: http://people.apache.org/~covener/patches/2.4.x-bindpw_empty.diff
> >>
> >> you would not specify the directive in your case
> >>
> >
> > That fixes it. If there is no other way
On Mon, May 8, 2017 at 10:37 AM, Dirk van Deun wrote:
>>
>> Are you able to recompile?
>>
>> untested: http://people.apache.org/~covener/patches/2.4.x-bindpw_empty.diff
>>
>> you would not specify the directive in your case
>>
>
> That fixes it. If there is no other way around this, it would inde
>
> Are you able to recompile?
>
> untested: http://people.apache.org/~covener/patches/2.4.x-bindpw_empty.diff
>
> you would not specify the directive in your case
>
That fixes it. If there is no other way around this, it would indeed
seem to be a bug.
Thanks,
Dirk van Deun
--
Ceterum cens
Are you able to recompile?
untested: http://people.apache.org/~covener/patches/2.4.x-bindpw_empty.diff
you would not specify the directive in your case
On Mon, May 8, 2017 at 9:08 AM, Dirk van Deun wrote:
>>
>> On Mon, May 8, 2017 at 4:11 AM, Dirk van Deun
>> wrote:
>> > However, if the user
>
> On Mon, May 8, 2017 at 4:11 AM, Dirk van Deun
> wrote:
> > However, if the user types a user name but no password, this is
> > in effect still an attempt to use unauthenticated bind, which fails,
> > and the user gets an Internal Server Error; and even worse is that
> > reloading the page im
On Mon, May 8, 2017 at 4:11 AM, Dirk van Deun wrote:
> However, if the user types a user name but no password, this is
> in effect still an attempt to use unauthenticated bind, which fails,
> and the user gets an Internal Server Error; and even worse is that
> reloading the page immediately gives
alist
> Office: 8955329
> On-Call: +917774036954
>
>
>
>
>
>
>
>
>
> -Original Message-
> From: Dirk van Deun [mailto:dvand...@wilma.vub.ac.be]
> Sent: Monday, May
6954
-Original Message-
From: Dirk van Deun [mailto:dvand...@wilma.vub.ac.be]
Sent: Monday, May 08, 2017 1:41 PM
To: users@httpd.apache.org
Subject: [EXT] [users@httpd] AuthLDAPInitialBindAsUser etc.
Hi all,
I have a 90% solution for authenticating against an ldap server
Hi all,
I have a 90% solution for authenticating against an ldap server that
does not allow unauthenticated binds, but I'm looking for the
last 10%. I am using AuthLDAPInitialBindAsUser on,
AuthLDAPSearchAsUser on and AuthLDAPCompareAsUser on, and that works
brilliantly as long as the user enters