HP TCP/IP Services for OpenVMS
Release Notes


Previous Contents

3.10.6 SNMP MIB Browser Usage

If you use either the -l (loop mode) or -t (tree mode) flag, you cannot also specify the -m (maximum repetitions) flag or the -n (nonrepeaters) flag. The latter flags are incompatible with loop mode and tree mode.

Incorrect use of the -n and -m flags results in the following types of messages:


$ snmp_request mynode.co.com public getbulk -v2c -n 20 -m 10 -t 1.3.6.1.2.1 
Warning: -n reset to 0 since -l or -t flag is specified. 
Warning: -m reset to 1 since -l or -t flag is specified. 
1.3.6.1.2.1.1.1.0 = mynode.company.com 

3.10.7 Duplicate Subagent Identifiers

With this version of TCP/IP Services, two subagents can have the same identifier parameter. Be aware, however, that having two subagents with the same name makes it difficult to determine the cause of problems reported in the log file.

3.10.8 Community Name Restrictions

The following restrictions on community names are imposed by TCPIP$CONFIG.COM:

3.10.9 eSNMP Programming and Subagent Development

The following notes pertain to eSNMP programming and subagent development.

3.11 SSH Problems and Restrictions

This section contains the following information:

Note

References to SSH, SCP, or SFTP commands also imply SSH2, SCP2, and SFTP2, respectively.

3.11.1 SSH-Related Security Advisories

Computer Emergency Readiness Team (CERT®) advisories are issued by the CERT Coordination Center (CERT/CC), a center of Internet security expertise located at the Software Engineering Institute, a federally-funded research and development center operated by Carnegie Mellon University. CERT advisories are a core component of the Technical Cyber Security Alerts document featured by the United States Computer Emergency Readiness Team (US-CERT), which provides timely information about current security issues, vulnerabilities, and exploits.

CERT and HP Software Security Response Team (SSRT) security advisories might be prompted by SSH activity. CERT advisories are documented at the following CERT/CC web site:


http://www.cert.org/advisories. 

Table 3-1 provides brief interpretations of several SSH-related advisories:

Table 3-1 CERT/SSRT Network Security Advisories
Advisory Impact on OpenVMS
CERT CA-2003-24 OpenSSH only; OpenVMS is not vulnerable.
CERT CA-2002-36 A worst case consequence of this vulnerability is a denial of service (DoS) for a single connection of one of the following types:
  • Server process handling a connection from a malicious client
  • Client process connecting to a malicious server

In either case, a malicious remote host cannot gain access to the OpenVMS host (for example, to execute arbitrary code), and the OpenVMS server is still able to receive a new connection.

CERT-2001-35 OpenVMS is not vulnerable. Affects SSH Version 1 only, which is not supported.
CERT CA-1999-15 RSAREF2 library is not used; OpenVMS is not vulnerable.
SSRT3629A/B OpenVMS is not vulnerable.

3.11.2 SSH General Notes and Restrictions

This section includes general notes and restrictions that are not specific to a particular SSH application.

3.11.3 UNIX Features That are Not Supported by SSH

This section describes features that are expected in a UNIX environment but are not supported by SSH for OpenVMS.

3.11.4 SSH Command Syntax

This section includes notes and restrictions pertaining to command syntax.

3.11.5 SSH Authentication

This section includes notes and restrictions pertaining to SSH authentication.

3.11.6 SSH Keys

This section includes notes and restrictions pertaining to SSH keys.

3.11.7 SSH Sessions

This section includes restrictions pertaining to SSH sessions.

3.11.8 SSH Messages

This section includes notes and restrictions pertaining to SSH session messages.

3.11.9 SSH Remote Commands

This section includes notes and restrictions pertaining to SSH remote commands.

3.11.10 SSH Batch Mode

This section includes batch mode restrictions.


Previous Next Contents