HP OpenVMS Systems Documentation |
HP TCP/IP Services for OpenVMS
|
Previous | Contents |
Problem:
SSH file transfer clients and server do not handle VMS-style wildcards.
Solution:
Many usages for VMS-style wildcards are now supported. The behavior,
where possible, matches that for DCL commands such as
$ COPY
and
$ DIRECTORY
. For example,
ls afile.*
retrieves all versions of a file, while
get afile.*
retrieves only the highest version number. One extension to the
standard VMS set is recognition of the
?
in addition to the
%
to match a single character.
4.19.24 Text Display for Usage Does Not Match Documentation
Problem:
Text display for Usage: does not match documentation or what is supported or tested.
Solution:
"Usage" text reflects what is implemented, and also matches information
in any DCL help files.
4.19.25 Allow Restrictions on Execution of SFTP-server2
Problem:
Allow restrictions on access to SSH filecopy.
Solution:
The following methods are available to restrict users who have ssh access to a server from using scp or sftp for filecopy:
DisallowSftpServer Default: "no" "yes" disables sftp-server2 for all users SftpDenyUsers Default: empty string Interprets regular expressions in the same way that DenyUsers does. |
$ MCR AUTHORIZE UAF> ADD /IDENTIFIER TCPIP$SSH_FILECOPY_DISALLOWED %UAF-I-RDBADDMSG, identifier TCPIP$SSH_FILECOPY_DISALLOWED value %X8001009F added to rights database UAF> SHOW /IDENTIFIER TCPIP$SSH_FILECOPY_DISALLOWED Name Value Attributes TCPIP$SSH_FILECOPY_DISALLOWED %X8001009F UAF> GRANT TCPIP$SSH_FILECOPY_DISALLOWED USER1 %UAF-I-GRANTMSG, identifier TCPIP$SSH_FILECOPY_DISALLOWED granted to USER1 UAF> SHOW USER1 Username: USER1 Owner: Default ... Identifier Value Attributes TCPIP$SSH_FILECOPY_DISALLOWED %X8001009F |
Problem:
Using SFTP to pull fixed length files with an odd-numbered record length, e.g., 773 bytes, from an OpenVMS system to a system running an operating system other than OpenVMS results in a corrupted file.
Solution:
This problem has been corrected.
4.19.27 Pasting from Text Editor Loses Characters
Problem:
When a user logs in with SSH and pastes from the paste buffer, characters can be lost. If the user is running a text editor, it receives a "data overrun" error.
Solution:
This problem has been corrected.
4.19.28 sftp ls on Directory with a Large Number of Files Cannot Be Interrupted
Problem:
When doing an ls for a directory or search list with a large number of files, entering q at the prompt "<Press any key for more or q to quit>" results in apparent hang that cannot be interrupted with CTRL/C .
Solution:
Pressing q now returns immediately to the sftp> prompt. Additional improvements for ls displays include the following:
$ sftp "-C" yourremote |
Because global variables are used for this fix, the code is not thread-safe. In batch mode the default remains to suppress display of the prompt. You cannot force the display of the prompt in batch mode. If CTRL/C is entered at the " <Press any key...> " prompt, you may need to enter a "q" or a carriage return to return to the sftp> prompt. Note that entering CTRL/C at the sftp> prompt (followed by a carriage return) causes an exit to the DCL level. |
The following sections describe SSL problems fixed in this release.
4.20.1 After Installing SSL, POP SSL Ceases to Function
Problem:
After installing the SSL V1.2 kit on TCP/IP Services, POP SSL support ceases to function. The POP server will not listen on its SSL port and, consequently, will not service clients coming in through SSL. The TCPIP$POP_RUN.LOG POP server log file contains these lines:
POP server will not listen for SSL connections. SSL$LIBCRYPTO_SHR32_INIT status: %LIB-E-KEYNOTFOU, key not found in tree |
Solution:
This problem is corrected in this release.
4.21 TELNET Problems Fixed in This Release
The following sections describe TELNET problems fixed in this release.
4.21.1 TELNET Intrusion Detection Inflexibility
Problem:
In certain circumstances, an intrusion (such as an invalid login) by one user can cause the whole system to be locked out, and with multiport servers such as on a terminal server, all ports could be locked out. The workaround has been to set the TCPIP$TELNET_NO_REM_ID logical. However, this allows the intruding user to log in on another port without being locked out.
Solution:
This problem is corrected in this release. The logical name
TCPIP$TELNET_TRUST_LOCATION allows you to specify how to handle TELNET
intrusion records. When this logical name is defined, any location
string specified by the remote client is included in the intrusion
record. For example, many terminal servers provide the physical port
number, while OpenVMS clients provide the originating user name and
terminal line. Including this information in the intrusion records
means that only a particular user or port will be locked out, not the
entire remote host (and all user ports).
4.22 Miscellaneous Problems Fixed in This Release
The following sections describe miscellaneous problems fixed in this release.
4.22.1 PPP Supports the Scaling Kernel and IA64 Architecture
PPP now supports both the Scaling Kernel and IA64 architecture.
4.22.2 TCPIP SHOW ROUTE/MASK Reports Error
Problem:
TCPIP SHOW ROUTE dest/mask did not work as expected in few cases. In cases where mask value was greater than or equal to 24, the response to this command as follows:
%TCPIP-E-ROUTEERROR, error accessing routes database(TCPIP$ROUTE) -TCPIP-W-NORECORD, information not found This posed problems while checking for the dynamic routes. |
Solution:
This problem is fixed in this release. The code now considers the CIDR mask specified while matching the given destination address
This chapter describes updates to the information in the TCP/IP Services product documentation.
This information will be supplied in the final release of TCP/IP Services.
5.1 Documentation Updated for This Release
The following manuals are updated for TCP/IP Services Version 5.6. Documentation changes planned for these manuals are indicated.
The following manuals are not updated for TCP/IP Services Version 5.6. Documentation changes planned for these manuals are indicated.
To set up NTP autokeys, use one of the following procedures:
server 127.127.1.0 prefer fudge 127.127.1.0 stratum 0 |
keysdir SYS$SPECIFIC:[TCPIP$NTP] crypto |
server alice autokey |
ALICE>ntp_keygen -"T" |
BOB>ntp_keygen |
ALICE>@sys$startup:tcpip$ntp_startup |
BOB>@sys$startup:tcpip$ntp_startup |
Bob should eventually synch to Alice (this may take up to 10 minutes).
ntpdc -p
should show an asterisk (*) in the leftmost column.
A.2 Default TC Identity Scheme (method 2)
server 127.127.1.0 prefer fudge 127.127.1.0 stratum 0 |
keysdir SYS$SPECIFIC:[TCPIP$NTP] crypto pw littlesecret |
keysdir SYS$SPECIFIC:[TCPIP$NTP] crypto pw bigsecret server alice autokey |
ALICE>ntp_keygen -"T" -p littlesecret -q bigsecret |
BOB>ntp_keygen -q bigsecret |
ALICE>@sys$startup:tcpip$ntp_startup |
BOB>@sys$startup:tcpip$ntp_startup |
Bob should eventually synch to Alice (maybe around 10 minutes).
ntpdc -p
should show an asterisk (*) in the leftmost column.
A.3 PC Identity Scheme
server 127.127.1.0 prefer fudge 127.127.1.0 stratum 0 |
keysdir SYS$SPECIFIC:[TCPIP$NTP] crypto pw littlesecret |
server alice autokey |
ALICE>ntp_keygen -"P" -p littlesecret |
BOB>ntp_keygen -"P" -l tcpip$ntpkey_rsakey_alice.timestamp - _BOB> tcpip$ntpkey_rsa-md5cert_alice.timestamp |
ALICE>@sys$startup:tcpip$ntp_startup |
BOB>@sys$startup:tcpip$ntp_startup |
Bob should eventually synch to Alice (this may take up to 10 minutes).
ntpdc -p
should show an asterisk (*) in the leftmost column.
A.4 IFF scheme (method 1)
server 127.127.1.0 prefer fudge 127.127.1.0 stratum 0 |
keysdir SYS$SPECIFIC:[TCPIP$NTP] crypto pw littlesecret |
server alice autokey |
ALICE>ntp_keygen -"T" -"I" -p littlesecret |
BOB>ntp_keygen -"H" -p littlesecret |
BOB>ntp_keygen -"I" -l tcpip$ntpkey_iffpar_alice_tcpip_zko_h.3344261784 |
ALICE>@sys$startup:tcpip$ntp_startup |
BOB>@sys$startup:tcpip$ntp_startup |
Bob should eventually synch to Alice (this may take up to 10 minutes).
ntpdc -p
should show an asterisk (*) in the leftmost column.
A.5 Alternate IFF Scheme (method 2)
server 127.127.1.0 prefer fudge 127.127.1.0 stratum 0 |
keysdir SYS$SPECIFIC:[TCPIP$NTP] crypto pw littlesecret |
keysdir SYS$SPECIFIC:[TCPIP$NTP] crypto pw bigsecret server alice autokey |
ALICE>ntp_keygen -"T" -"I" -p littlesecret |
BOB>ntp_keygen -"H" -p bigsecret |
ALICE>ntp_keygen -e -q littlesecret -p bigsecret |
BOB> typ SYS$SPECIFIC:[TCPIP$NTP]TCPIP$NTPKEY_IFFKEY_ALICE.3344272304 # SYS$SPECIFIC:[TCPIP$NTP]TCPIP$NTPKEY_IFFKEY_ALICE.3344272304 # Thu Dec 22 15:32:10 2005 -----BEGIN DSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: DES-CBC,E03763213C218BDC O9xAmWUEfJzCYEO6Zgn1KWm67M9NKlc/LzqHH+1K/kWQ/YXudUIf1ugdj+Umpphy R5UyrpVz8kWms4M/VsPZBvMgP2SIXPyYO5ANz0WlMYbk9Myd8Xfc/6LEhYMEhxeM Mjo95aUuWq/+YtlEAzrVvWjhQnHvNpHJtQxNw/7L6/ftVOGT0MuB1e9jJoaGo+lp yBSbhUYmwiyZfJUYvteXfOME/XH3rEx3h8/8k88zL1qACetHxeFmUMIoQq7lUqjg CeKMAidxgUWlmhixYVcUtvuD0ZNYqQ4jjUFfDrlgfAPmeHNLndehEStcQbB3ItLC -----END DSA PRIVATE KEY----- |
BOB>ntp_keygen -"I" -l tcpip$ntpkey_iffkey_alice.3344272304 |
ALICE>@sys$startup:tcpip$ntp_startup |
BOB>@sys$startup:tcpip$ntp_startup |
Bob should eventually synch to Alice (this may take up to 10 minutes).
ntpdc -p
should show an asterisk (*) in the leftmost column.
A.6 GQ scheme
server 127.127.1.0 prefer fudge 127.127.1.0 stratum 0 |
keysdir SYS$SPECIFIC:[TCPIP$NTP] crypto pw littlesecret |
server alice autokey |
ALICE>ntp_keygen -"T" -"G" -p littlesecret |
BOB>ntp_keygen -"H" -p littlesecret |
BOB>ntp_keygen -"G" -r alice -l tcpip$ntpkey_gqpar_alice.timestamp |
ALICE>@sys$startup:tcpip$ntp_startup |
BOB>@sys$startup:tcpip$ntp_startup |
Bob should eventually synch to Alice (this may take up to 10 minutes). ntpdc -p should show an asterisk (*) in the leftmost column.
Previous | Next | Contents |