-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using the lookup
mapping strategy, LDAP proxy runs out of open files for invalid DNs
#9
Comments
lookup
mapping strategy, LDAP proxy runs out of open files for invalid usernameslookup
mapping strategy, LDAP proxy runs out of open files for invalid DNs
This allows the server to close the connection. See #9.
With f64e93c applied, the LDAP proxy seems to be able to handle >3000 bind requests with invalid DNs. However, it still fails with EMFILE at some point. We should also have a closer look at this issue with regard to successful bind requests (is the connection between LDAP proxy and LDAP backend terminated properly?) |
|
Otherwise, Twisted would keep the file open (see #9)
I think 6b73309 has fixed the issue mentioned above (i.e. that the connection between LDAP proxy and backend persists if the DN is malformed). There seem to be cases in which the connection persists nevertheless, but it seems to be closed after a timeout. I suspect this could rather be a side-effect of our load testing approach using locust. There seems to be a remaining issue if privacyIDEA answers with HTTP status codes |
We can reproduce this using locust:
lookup
mapping strategy on the LDAP proxylocustfile.py
and setUSER_DN
to a DN that does not exist in the LDAP backendFailures
tab'49: Invalid user.'
as expected'49: LDAP Proxy failed.'
lsof -c twistd
shows >1000 open connections from the LDAP proxy to the LDAP backendThe text was updated successfully, but these errors were encountered: