Hi, there is no why to set the permission of the socket created by OpenLDAP. In /etc/conf/slapd is a pre-configured socket-path but no way to configure the permissions. Right now I am using a chmod in /etc/init.d/slapd but thats not very elegant. I read about setting the permissions on the commandline of slapd but the way, describes in slapd.conf does not work for me.
That's because it requires being enabled at compile time, which we are not currently doing. I guess we could look at adding a USE flag for it, though I'm not entirely convinced that it would be worthwhile. I'll have a think about it.
the 'listener permissions' described in slapd(8c) are special, and don't affect the file permissions on the socket. I'd say that the socket permissions for /var/run/openldap/slapd.sock SHOULD default to 777, since slapd enforces permissions after the connection process anyway.
Fixed by upstream in latest 2.3 series