[CLUE-Tech] LDAP

Jeremiah Stanley jeremiahstanley at yahoo.com
Tue Jul 3 16:25:13 MDT 2001


Can anyone define what this means?

ldap_sasl_interactive_bind_s: No such attribute

I'm trying to do an ldapsearch on a directory and that is the error that I
get.

JStanley
-- 
If only sitting was required, all frogs would be Buddhas...


Received: from ta10.techangle.com (techanglegw9.verioco.com [199.239.19.9])
	by clue.denver.co.us (8.9.3/8.9.3) with ESMTP id IAA24764
	for <clue-tech at clue.denver.co.us>; Tue, 3 Jul 2001 08:01:36 -0600
Received: from libranet ([64.120.32.10])
	by ta10.techangle.com (8.11.2/8.11.2) with SMTP id f63DKW118372
	for <clue-tech at clue.denver.co.us>; Tue, 3 Jul 2001 07:20:32 -0600
Content-Type: text/plain;
  charset="iso-8859-1"
From: Cyberclops <Cyberclops at techangle.com>
To: <clue-tech at clue.denver.co.us>
Date: Tue, 3 Jul 2001 07:20:46 -0600
X-Mailer: KMail [version 1.2]
MIME-Version: 1.0
Message-Id: <01070307204602.00351 at libranet>
Content-Transfer-Encoding: 8bit
Subject: [CLUE-Tech] DOS Attacks
Sender: clue-tech-admin at clue.denver.co.us
Errors-To: clue-tech-admin at clue.denver.co.us
X-BeenThere: clue-tech at clue.denver.co.us
X-Mailman-Version: 2.0beta2
Precedence: bulk
Reply-To: clue-tech at clue.denver.co.us
List-Id: CLUE technical discussions, questions and answers. <clue-tech.clue.denver.co.us>


_________________________________________________________________

     The May 2001 Denial of Service Attacks Against GRC.COM
_________________________________________________________________
               <http://grc.com/dos/intro.htm>


During the first few weeks of May, GRC.COM was the target of
several distributed denial of service (DDoS) attacks launched
by a 13-year-old hacker using a tool he did not write. Using
this tool, "Wicked" commanded multiple sustained attacks from
474 security-compromised Windows-based PC's.

The whole tale turned into a pretty good read, and is
something I imagine you may enjoy. You can read the entire
page online on our web site, or you can download the PDF
file for offline reading or printing.

The page on our site:   <http://grc.com/dos/grcdos.htm>

The PDF file:   <http://media.grc.com:8080/files/grcdos.pdf>



Windows XP:

The experience with Windows-based denial of service attacks
focused my attention on Microsoft's planned release of Windows XP
with its planned inclusion of "Full Raw Socket" support. Full raw
sockets are a powerful and dangerous Internet API that exists in
all Unix-based operating systems. But under Unix they are
deliberately protected by the rigorous requirement for "root"
privilege. (Similar to Microsoft's "Administrative" privilege.)
However Microsoft has done away with this distinction in the Home
Edition of Windows XP which threatens to populate the world with
a needlessly dangerous capability.

Microsoft and I have been arguing about this quite a lot
recently. Last Thursday, this culminated in an eight-way
telephone conference:

My page explaining the XP threat: <http://grc.com/dos/winxp.htm>



More information about the clue-tech mailing list