+ by * break
+
+# allow keyring maint to write to the keyFingerPrint attribute
+# (make an exception for adm for security reasons)
+access to filter="(!(supplementaryGid=adm))" attrs=keyFingerPrint
+ by group="cn=Keyring Maintainers,ou=users,@@DN@@" write
+ by * break
+
+# allow listmasters to write to the privateSub attribute
+access to attrs=privateSub
+ by group="cn=Listmasters,ou=users,@@DN@@" write
+ by self write
+ by * break
+
+# allow users write access to an explicit subset of their fields
+access to attrs=c,l,loginShell,ircNick,labeledURI,icqUIN,jabberJID,onVacation,birthDate,mailDisableMessage,gender,emailforward,mailCallout,mailGreylisting,mailRBL,mailRHSBL,mailWhitelist,mailContentInspectionAction,mailDefaultOptions,facsimileTelephoneNumber,telephoneNumber,postalAddress,postalCode,loginShell,onVacation,latitude,longitude,VoIP,userPassword,sudoPassword,webPassword,rtcPassword,bATVToken
+ by self write
+ by * break
+
+
+##
+## All ACLs from here on result in a decision. no fall through to later.
+##
+
+# allow authn/z by anyone
+access to attrs=userPassword,sudoPassword,webPassword,rtcPassword,bATVToken
+ by * compare
+
+# readable only by self
+access to attrs=sshrsaauthkey
+ by self read
+ by * none
+
+# debian.org readable, authenticated user readable
+access to attrs=activity-pgp,activity-from,c,l,loginShell,onVacation,birthDate,mailDisableMessage,gender,emailforward,mailCallout,mailGreylisting,mailRBL,mailRHSBL,mailWhitelist,mailContentInspectionAction,mailDefaultOptions