HP TCP/IP Services for OpenVMS
Release Notes


Previous Contents

3.11.11 SSH X11 Port Forwarding

This section includes X11 port forwarding restrictions and problems.

3.11.12 SSH File Transfer (All File Sizes)

This section includes SSH restrictions pertaining to file transfer operations.

3.11.13 SSH Transferring Large Files

This section includes restrictions pertaining to transferring large files:

3.12 TCPDUMP Restrictions

TCPDUMP works the same way on OpenVMS as it does on UNIX systems, with the following restrictions:

3.13 Determining the TCP/IP Device Name from a Channel Assignment

OpenVMS provides several ways to determine the name of a device on a channel assignment. Using the SYS$GETDVI/SYS$GETDVIW system services, the DVI$_DEVNAM, DVI$_FULLDEVNAM, and DVI$_UNIT items all return information about the device. While the first two items provide the full device name, the DVI$_UNIT item returns only the unit number of the device. To form the complete device name, a program must prefix the unit number (as a string) with the device name and controller information. In the case of the TCP/IP device name, the programmer could add the string BG or BGA . For example, BG + 1234 would produce the device name BG1234: .

The TCP/IP device name may be altered in a future release. It is good programming practice to use the DVI$_DEVNAM or DVI$_FULLDEVNAM items to obtain the full device-name string. Such programs are not based on the assumption that the TCP/IP device name is BGnnnn or BGAnnnn, and will not be affected by any future changes to the TCP/IP device name.

3.14 TCP/IP Management Command Restrictions

The following restrictions apply to the TCP/IP management commands:

For more information on TCP/IP Services management commands, refer to the HP TCP/IP Services for OpenVMS Management Command Reference guide.


Chapter 4
Corrections

This chapter describes the problems corrected in this version of TCP/IP Services.

4.1 Advanced Programming Environment Problems Fixed in This Release

The following sections describe programming-related problems fixed in this release.

4.1.1 Link Conflicts Occur When Linking to the TCPIP$LIB.OLB Library

Problem:

Link conflicts occur when a program that includes references to the strdup or putenv function is linked to the TCPIP$LIB.OLB library. The linker produces the %LINK-W-MULDEF warning message, indicating a conflict with functions of the same name in the C RTL library.

Solution:

In earlier versions of TCP/IP Services, the TCPIP$LIB.OLB library included functions that have since been defined in more recent versions of the OpenVMS C RTL library. These TCPIP$LIB.OLB routines, which have the DECC$ prefix, conflict with the routines of the same name in the recent versions of the C RTL library. With this release of TCP/IP Services, the TCPIP$LIB.OLB library has been modified to prevent such conflicts.

4.2 BIND Server Problems Fixed in This Release

The following sections describe BIND server problems fixed in this release.

4.2.1 BIND Slave Refusing Notify Requests

Problem:

A BIND server configured as a slave can refuse notify requests from a master server. The error message written to the TCPIP$BIND_RUN.LOG on the slave includes the text "refused notify from non-master." This problem occurs when the master server has been enabled for IPv6 communication by having the listen-on-v6 directive specified in the options statement in the TCPIP$BIND.CONF configuration file.

Solution:

This problem is corrected in this release.

4.2.2 The BIND Version 9 Server Process Exits With "Assertion Failure" Error

Problem:

The BIND server process exits with one of the following messages logged in the TCPIP$BIND_RUN.LOG file:


REQUIRE((((task) != 0L) && (((const isc__magic_t*)(task))->magic 
== ((('T')<< 24 | ('A') << 16 | ('S') << 8 | ('K')))))) failed 
Sun 19 03:00:13 CRITICAL: exiting (due to assertion failure) 
%SYSTEM-F-OPCCUS, opcode reserved to customer fault at 
PC=FFFFFFFF80A6C924, PS=0000001B 
 
 
REQUIRE(res->item_out == isc_boolean_true) failed 
Fri 19 13:12:04 CRITICAL: exiting (due to assertion failure) 
%SYSTEM-F-OPCCUS, opcode reserved to customer fault at 
PC=FFFFFFFF80E6C924, PS=0000001B 

Solution:

This problem is corrected in this release.

4.3 failSAFE IP Problems Fixed in This Release

The following sections describe failSAFE IP problems fixed in this release.

4.3.1 failSAFE IP Phantom Failures

Problem:

Phantom failures can occur on systems where failSAFE IP is configured with a single interface address on multiple interfaces. When LAN traffic is infrequent, failSAFE IP can signal a false error.

Solution:

This problem is corrected in this release. failSAFE IP now generates MAC-level broadcast packets, by default. The new configuration parameter GENERATE_TRAFFIC can be set to force failSAFE IP to generate gratuitous ARP packets. You can include the following new configuration parameters in the TCPIP$FAILSAFE.CONF file:
GENERATE_TRAFFIC Enables failSAFE IP to periodically generate either MAC-level broadcasts or gratuitous ARP packets. You can also configure failSAFE IP to turn off traffic generation.

Default: mac (MAC-level broadcast)
Other options: arp (gratuitous ARP packets) or off

The following is an example line in the configuration file setting the parameter to generate gratuitous ARP packets:

GENERATE_TRAFFIC: ARP

MAC_PTY If MAC-level broadcast traffic is being generated, this parameter allows you to specify the MAC protocol type (a two-byte hexadecimal number, such as 6005).

If MAC_PTY is not specified, the MAC broadcast tries each protocol type until an available one is found.

The following is an example line in the configuration file setting the MAC protocol type as 6005:

MAC_PTY: 6005

For more information about configuring failSAFE IP, see the HP TCP/IP Services for OpenVMS Management guide.

4.3.2 Users Cannot Change the Location for the failSAFE IP Log File

Problem:

failSAFE IP log files are always named:

SYS$SYSDEVICE:[TCPIP$FSAFE]TCPIP$FAILSAFE_node-name.LOG

Users cannot specify alternate locations on their systems.

Solution:

This problem is corrected in this release. The new configuration parameter LOGFILE allows users to specify a log file location other than the default.
LOGFILE Specifies the file specification for the log file created by failSAFE IP. The default is SYS$SYSDEVICE:[TCPIP$FSAFE]TCPIP$FAILSAFE_ node-name.log. Specify the parameter and location as in the following example:
LOGFILE: DEV1:[STATS]FAILSAFE.LOG

For more information about configuring failSAFE IP, see the HP TCP/IP Services for OpenVMS Management guide.

4.3.3 SHOW INTERFACE Command Does Not Display Pseudointerface Addresses

Problem:

After an interface fails or recovers an alias address, the TCP/IP management command SHOW INTERFACE does not display pseudointerface addresses.

Solution:

This problem is corrected in this release.

4.4 FTP Server Problems Fixed in This Release

The following sections describe FTP server problems fixed in this release.

4.4.1 FTP Does Not Allow IP Address Specification

Problem:

The FTP server does not allow you to specify an IP address other than that of the connected client, or the specification of a privileged port, in the PORT, LPRT, or EPRT commands. Any such commands are rejected with the following error:


500 Illegal {PORT|LPRT|EPRT} command. 

The FTP server and client prevent data connection "theft" by a third party. For the FTP server, this applies to passive-mode connections from an IP address other than the client's, or from a privileged port. For the FTP client, this applies to active-mode connections from an IP address other than the server's, or from a port other than port 20.

Solution:

If this software change is not acceptable, you can restore the original behavior by defining the following logical names:
Server Client
TCPIP$FTPD_ALLOW_ADDR_REDIRECT TCPIP$FTP_ALLOW_ADDR_REDIRECT
TCPIP$FTPD_ALLOW_PORT_REDIRECT TCPIP$FTP_ALLOW_PORT_REDIRECT

These logical names allow you to relax the IP address and port checks in the FTP server and the FTP client.

4.4.2 DCL DIRECTORY or UNIX ls Command Returns "Illegal Port Command" Error

Problem:

On an FTP client, if you use a password with an embedded space to log into an OpenVMS FTP server, the following error message is returned in response to the DCL command DIRECTORY or the UNIX command ls :


 
500 Illegal PORT command. 

Solution:

This problem is corrected in this release.

4.5 FTP Client Problems Fixed in This Release

The following sections describe FTP client problems fixed in this release.

4.5.1 FTP Client Fails to Delete Interim Files after GET/MGET Commands

Problem:

After an FTP GET or MGET command entered with wildcard characters completes, the temporary TCPIP$FTP_TEMPnnnnnnnn.TMD files created by FTP are supposed to be deleted from the SYS$SCRATCH area. However, if no files match the wildcard criteria, FTP fails to delete any of the temporary files. (If at least one file matches the wildcard criteria, FTP successfully deletes any TCPIP$FTP_TEMPnnnnnnnn.TMD files created in SYS$SCRATCH.)

Solution:

This problem is corrected in this release.

4.6 IMAP Problems Fixed in This Release

The following sections describe IMAP problems fixed in this release.

4.6.1 Mail Message Lost after IMAP Move and Purge

Problem:

If you manually move a message out of a folder and then use IMAP to purge the source folder, the mail is lost.

This problem occurs when you:

  1. Select a mail file using the IMAP client.
  2. Read the message using OpenVMS Mail and move it to another folder.
  3. Enter the Expunge command on the selected folder, using the IMAP client.

The message disappears from the destination folder. If the message was copied to a new folder, the folder ceases to exist.

Solution:

This problem is corrected in this release.

4.6.2 IMAP CLOSE Command Does Not Function Properly

Problem:

When a client logs out by issuing the IMAP CLOSE command, the IMAP server does not delete all the messages marked for deletion.

Solution:

This problem is corrected in this release. When you enter the CLOSE command, the IMAP server deletes all the messages marked for deletion.


Previous Next Contents