HP TCP/IP Services for OpenVMS
Release Notes


Previous Contents

3.16 TCPDUMP restrictions

TCPDUMP works the same way on OpenVMS as it does on UNIX systems, with the following restrictions:

3.17 TCP/IP Management Command restrictions

The following restrictions apply to the TCP/IP management commands:

For more information on TCP/IP Services management commands, refer to the HP TCP/IP Services for OpenVMS Management Command Reference guide.


Chapter 4
Corrections

This chapter describes the problems corrected in this version of TCP/IP Services.

4.1 Advanced Programming Environment problems fixed in this release

The following sections describe programming-related problems fixed in this release.

4.1.1 Buffer overflow in ntpq program

Problem:

The stack buffer overflows in the ntpq program.

Solution:

This problem is corrected in this release.

4.1.2 With PPE enabled, system crashes during shutdown

Problem:

When PPE is enabled, the system crashes during shutdown with the following message:


"SPLIPLLOW, IPL has fallen below level of owned spinlock(s)" 

Solution:

This problem is corrected in this release.

4.2 BIND Server problems fixed in this release

The following sections describe BIND server problems fixed in this release.

4.2.1 Bind server crashes on receipt of dynamic update message

Problem:

Bind server crash can be caused on receipt of a specific remote dynamic update message.

Solution:

This problem is fixed in this release.

4.2.2 SYSTEM-W-NOSUCHFILE and %DCL-E-INVIFNEST Errors

Problem:

TCPIP$BIND_STARTUP.COM displays the %SYSTEM-W-NOSUCHFILE and %DCL-E-INVIFNEST errors when the SYS$SHARE:SSL$LIBCRYPTO_SHR32.EXE image is not present on the system.

Solution:

This problem is fixed in this release.

4.2.3 %LIBRAR-E-LOOKUPERR error in the BIND server

Problem:

While configuring TCP/IP, using TCPIP$CONFIG, in the BIND server, the %LIBRAR-E-LOOKUPERR error is displayed. TCPIP$CONFIG incorrectly looks for LOOPBACK_DB.

Solution:

This problem has been fixed in this release.

4.2.4 BINDSETUP fails to conform to the database filename

Problem:

TCPIP$BINDSETUP fails to conform to the new BIND local host database filename.

Solution:

This problem is corrected in this release.

4.2.5 Entering CTRL/C for TCPIP SHOW HOST (/NOLOCAL)

may display ACCIVO)

Problem:

On OpenVMS Integrity servers, entering CTRL/C for the TCPIP SHOW HOST (/NOLOCAL) command may display an ACCIVO error within the BIND resolver.

Solution:

This problem is corrected in this release.

4.2.6 Memory usage statistics

Problem:

This release adds the ability to generate and display the memory usage statistics for the BIND Server.

Solution:

To display the memory usage statistics for the BIND Server, define the logical name as follows:


 $ DEFINE /SYSTEM TCPIP$BIND_MEMSTATS 1 

TCPIP$BIND_MEMSTATS is an existing logical name. The value does not matter; but it must be defined.

Use either the rndc stats command or the TCPIP SHOW NAME /STATISTICS command to send the memory usage statistics to the file TCPIP$BIND.STATS. The memstats information will complement the server Statistics Dump information that is normally sent to the file.

4.2.7 Delay because of using "ROUTE ADD"

Problem:

There is a delay because of using the ROUTE ADD command when the BIND resolver is disabled.

Solution: This problem is corrected in this release.

4.2.8 Resolving the local host database names

Problem:

TCPDUMP, and potentially other applications, fails to resolve the local host database names. When _SOCKADDR_LEN is not defined, a call to the getaddrinfo() function will not look in the local host database. When getaddrinfo() was called with the hints argument as NULL, the routine fails with an ACCVIO.

Solution:

This problem is corrected in this release.

4.2.9 Unexpected IPv6-looking address in the TELNET client

Problem:

The getaddrinfo() function sometimes returned AF_INET structures even when the AI_V4MAPPED flag was set. The most obvious effect was that attempting to reach an unresponsive host via TELNET would provoke a unexpected IPv6-looking address in the TELNET client and displays the Trying ... message.

Solution:

This problem is corrected in this release.

4.2.10 Specifying an invalid port number to getnameinfo()

Problem:

Specifying an invalid port number to getnameinfo() results in an ACCVIO error.

Solution:

This problem is corrected in this release.

4.2.11 NI_* flag values for getnameinfo()

Problem:

The getnameinfo() NI_* flag values were improperly changed for V5.6 when updating to the BIND 9 resolver. Changing these values broke applications that were built on pre_v5.6 versions of TCP/IP Services for OpenVMS.

Solution:

The NI_* flag values for the getnameinfo() function were improperly changed with the V5.6 release. This would cause any applications using the NI_* flag values that were built against pre-V5.6 TCP/IP versions not to run as expected on TCP/IP V5.6. This problem has been corrected, and the flag values have been returned to their pre-V5.6 definitions. Note that any applications using the NI_* flag values that were built against V5.6 will no longer execute properly on V5.6 ECO1 or later. These applications must be rebuilt.

4.2.12 TCPIP$SYSTEM:HOSTS.DAT ASCII file

Problem:

The undocumented TCPIP$SYSTEM:HOSTS.DAT ASCII file is still provided during TCP/IP installation, but the file is no longer used by the BIND resolver.

Solution:

This problem is corrected in this release.

4.2.13 Query IDs

Problem:

Query IDs generated by the DNS server are vulnerable to cryptographic analysis.

Solution:

This problem is corrected in this release.

4.2.14 BIND cluster-wide startup and shutdown command procedures

Problem:

BIND cluster-wide startup and shutdown command procedures are generated with embedded physical device names, requiring extra effort upon changing to a new system disk.

Solution:

This problem is corrected in this release.

4.2.15 BIND9 Resolver aborts

Problem:

The BIND9 Resolver aborts when multiple threads called getadrinfo simultaneously, although, RFC 3493 describes getaddrinfo as a thread safe or re-entrant function.

Solution:

This problem is corrected in this release.

4.2.16 Spoofing and cache-poisoning attack in a BIND/DNS server

Problem:

The BIND/DNS server is vulnerable to a widely publicized spoofing and cache-poisoning attack.

Solution:

This problem is corrected in this release.

4.2.17 Spoofing and cache-poisoning attack in a UDP port

Problem:

The BIND/DNS cache server uses a fixed or an arbitrarily selected UDP port for out going DNS queries. This will lead to UDP port spoofing and cache-poisoning attack.

Solution:

This problem is corrected in this release.

4.2.18 Memory leaks in BIND Resolver functions

Problem:

The BIND Resolver functions, GETNAMEINFO, GETHOSTBYNAME, GETHOSTBYADDR GETNETBYNAME,GETNETBYADDR,GETSERVBYNAME and GETSERVBYPORT causes memory leaks and does not close the files properly when called from a multithreaded program.

Solution:

This problem is corrected in this release.

4.2.19 GETADDRINFO with nodename as NULL fails

Problem:

getaddrinfo with nodename as NULL fails with BADHINTS: Not found in explore

Solution:

This problem is corrected in this release.

4.3 DHCP component problems fixed in this release

The following sections describe the DHCP problems fixed in this release.

4.3.1 DHCP server fails to update the DNS server correctly

Problem:

When DNS updates are enabled, the DHCP server fails to update the DNS server correctly if the netmask for the client's network differs from 255.255.255.0.

Solution:

This problem is corrected in this release.

4.3.2 RMS-E-FLK errors when running the TCPIP$$SETHOSTNAME.COM script's SET HOST and SET NOHOST commands

Problem:

The DHCP client, when run in a cluster where the TCPIP$* data files are shared between cluster members, could incur RMS-E-FLK errors when running the TCPIP$$SETHOSTNAME.COM script's SET HOST and SET NOHOST commands.

Solution:

This problem is corrected in this release.

4.3.3 DHCP server listens on all interfaces

Problem:

The OpenVMS DHCP server cannot be disabled on one or more interfaces. The server always listens on all the interfaces.

Solution:

A new logical, TCPIP$DHCP_IGNOR_IFS is now supported to fix this problem.

4.3.4 DHCPSIGHUP command is issued twice

Problem:

The DHCPSIGHUP command is issued twice to update the DHCP Debug Level.

Solution:

This problem is corrected in this release.

4.3.5 DHCP server logs events on ignored interfaces

Problem:

DHCP server logs events on ignored interfaces. Logging events for ignored interfaces leads to huge log files.

Solution:

This problem is corrected in this release.

4.4 failSAFE IP problems fixed in this release

The following sections describe failSAFE IP problems fixed in this release.

4.4.1 failSAFE IP does not read its configuration file

Problem:

failSAFE IP does not read its configuration file if stored in the STREAM_LF format.

Solution:

This problem is corrected in this release.

4.4.2 failSAFE IP may pick the wrong interface to monitor

Problem:

In some configurations, the failSAFE IP may pick the wrong interface to monitor. This is displayed on OPCOM and in the logfile during failSAFE IP startup.

Solution:

This problem is corrected in this release.

4.4.3 If interface_list not specified, default behavior does not work

Problem:

If the interface_list is not specified, by default, all the interfaces must be monitored. One of the earlier ECO release did not support the default behavior.

Solution:

This problem is corrected in this release.

4.4.4 IP failover sometimes losses the default route

Problem:

failSAFE IP failover sometimes losses the default route when IPv6 is configured.

Solution:

This problem is corrected in this release.

4.4.5 First static route failover

Problem:

Under certain circumstances, only the first static route reliably fails over. This is typically the default route.

Solution:

This problem is corrected in this release.

4.5 FINGER Component problems fixed in this release

The following sections describe FINGER component problems fixed in this release.

4.5.1 File access restrictions when following symbolic links.

Problem:

The FINGER server does not properly enforce the file access restrictions when following symbolic links. The client is vulnerable to a format string attack.

Solution:

This problem is corrected in this release.

4.6 FTP Server and Client problems fixed in this release

The following sections describe FTP server and client problems fixed in this release.

4.6.1 OpenVMS, TCP/IP, or Non-VMS FTP client access to ODS-5 disk

Problem:

On a non-VMS FTP client, such as Windows, UNIX, or LINUX, the filenames are displayed in the VMS format with the "^" characters in the filename. Also, when retrieving the filenames using the non-VMS FTP client, the filename in OpenVMS format is displayed with "^", such as file^.1^.2^.3^.4.txt. For retrieving the files and saving them on the PC, the "^" characters must not be included in the filenames.

Solution:

This problem is corrected in this release.

4.6.2 FTP client copies multiple versions of a file and places them in reverse order

Problem:

The FTP client copies multiple versions of a file and places them in reverse order.

Solution:

This problem is fixed in this release.

4.6.3 TCPIP$FTP_1 server stops communicating with the FTP child processes

Problem:

When the FTP server limit is reached and no new connections were accepted the TCPIP$FTP_1 server stopped communicating with the FTP child processes on the system. After the limit was reached, the child processes hung waiting on a mailbox. Although, the process rejected the new incoming connections; it appeared that communication was lost with the old processes.

Solution:

This problem is fixed in this release.

4.6.4 FTP server error messages

Problem:

In certain scenarios, the OpenVMS FTP server reports the following error messages:


425-Can't build data connection for ... 
425 Connect to network object rejected 

Solution:

This problem is fixed in this release.

4.6.5 Users can still FTP with FTP client disabled

Problem:

Although the FTP client is disabled, users can ftp to another system. Because, FTP is a DCL command, the FTP client image can be invoked even if the FTP client service is shutdown.

Solution:

This problem is corrected in this release.

4.6.6 [VMS]COPY/FTP file with multiple-dot filename does not work

Problem:

On a remote Linux or HP-UX node, if the filename starts with a dot and has multiple dots within the name, for example, .test.001, the filename is truncated. That is, the characters before the second dot are not displayed.

Solution:

This problem is corrected in this release.

4.6.7 Addition of "." to a filename

Problem:

When using FTP or $ COPY /FTP to transfer files from an OpenVMS system to a UNIX system, the FTP client adds a "." character to a filename without extension.

Solution:

This problem is corrected in this release.

4.6.8 USER command in a session that is already logged in

Problem:

The FTP server, upon receiving a USER command in a session that is already logged in, failed to return a proper error, leading to a hang.

Solution:

A message similar to the following is displayed:


"503 User SMITH, is already logged in" 

and the problem is fixed.

4.6.9 Construction of wildcarded filenames

Problem:

The FTP client does not properly construct wildcarded filenames. COPY /FTP TEST.EXE_OLD nodename"username password"::*.EXE creates a file named "_.EXE" on the remote system. Also, COPY /FTP TEST.EXE_OLD nodename"username password"::FILE.* creates a file named "FILE._" on the remote system.

Solution:

The FTP client properly constructs the wildcarded filenames.

4.6.10 "expanded" rooted logical name syntax

Problem:

FTP does not understand the "expanded" rooted logical name syntax.

Solution:

This problem is corrected in this release.

4.6.11 FTP server terminates when there are many connections and disconnections

Problem:

The FTP server terminates with an ACCVIO error when there are many connections and disconnections. The FTP server also displays an error message that is similar to the following:


session connection from 127.124.172.114 at 11-JAN-2007 18:42:08.42 
 %SYSTEM-F-NOSLOT, no PCB available 
 %TCPIP-E-FTP_CREPRC, failed to create a child process 

Solution:

This problem is corrected in this release.

4.6.12 DIRECTORY /FTP command fails to return failure status

Problem:

The DIRECTORY /FTP command fails to return a failure status, even when the target file does not exist.

Solution:

This problem is corrected in this release.

4.6.13 Entries made in TCPIP$ETC:IPNODES.DAT are not read

Problem:

Entries made in the TCPIP$ETC:IPNODES.DAT file are not read by the FTP client.

Solution:

This problem is corrected in this release.

4.6.14 FTP client echoes the keyboard input associated with ACCT

Problem:

The OpenVMS FTP client echoes the keyboard input associated with the Account (ACCT) command. Because, some FTP servers use the "account" as a secondary password, which raised security concerns.

Solution:

This problem is corrected in this release.

4.6.15 GET /FDL and COPY /FTP/FDL commands may fail

Problem:

Because of a non existent owner on the destination system, the GET /FDL and COPY /FTP/FDL commands may fail. The original owner must be omitted or ignored.

Solution:

This problem is corrected in this release.


Previous Next Contents