In certain circumstances, an intrusion (such as an invalid login) by
one user can cause the whole system to be locked out, and with
multiport servers such as on a terminal server, all ports could be
locked out. The workaround has been to set the TCPIP$TELNET_NO_REM_ID
logical. However, this allows the intruding user to log in on another
port without being locked out.
This problem is corrected in this release. The logical name
TCPIP$TELNET_TRUST_LOCATION allows you to specify how to handle TELNET
intrusion records. When this logical name is defined, any location
string specified by the remote client is included in the intrusion
record. For example, many terminal servers provide the physical port
number, while OpenVMS clients provide the originating user name and
terminal line. Including this information in the intrusion records
means that only a particular user or port will be locked out, not the
entire remote host (and all user ports).
Table 5-1 Current Documentation Changes
| Title |
Changes |
|
HP TCP/IP Services for OpenVMS SNMP Programming and Reference
|
|
|
HP TCP/IP Services for OpenVMS Sockets API and System Services Programming
|
- The default setting for the TCPIP_KEEPIDLE option has been
corrected.
- The new socket options TCP_TSOPTENA, TCP_PAWS, and TCP_SACKENA are
documented.
- The
accept
routine clearly describes the x-open error return.
- Information about how to convert port numbers has been included.
- Information about using 64-bit addresses with the
send()
and
receive()
functions has been added.
- Information was added to the
getservbyport()
function about converting the port number to network byte order.
- More information was added about IOCTL.
- All material about the Sockets API was moved from the HP C Run-Time Library Reference Manual for OpenVMS Systems
to the HP TCP/IP Services for OpenVMS Sockets API and System Services Programming.
- All material about programming was moved from the HP TCP/IP Services for OpenVMS Guide to IPv6 to
the HP TCP/IP Services for OpenVMS Sockets API and System Services Programming.
- Information was added about using QIOs in IPv6.
|
|
HP TCP/IP Services for OpenVMS ONC RPC Programming
|
The example in Section 3.5.1 was corrected.
|
|
HP TCP/IP Services for OpenVMS Installation and Configuration
|
- Added information about installing on I64 platforms.
- Removed information about installing on VAX platforms.
- Added information about using the enhanced IP6_SETUP.COM command
procedure to configure IPv6.
- Updated scripts of installation and configuration.
|
In addition, several HELP files have been updated and enhanced,
including:
The following manuals are not updated for TCP/IP Services Version 5.5.
Documentation changes planned for these manuals are indicated.
Table 5-2 Future Documentation Changes
| Title |
Changes |
|
Compaq TCP/IP Services for OpenVMS Concepts and Planning
|
- Information about I64 platforms will be added.
- Information about OpenVMS file specifications will be updated.
|
|
HP TCP/IP Services for OpenVMS Management
|
This manual will be enhanced with the following:
|
|
HP TCP/IP Services for OpenVMS Guide to SSH
|
- Information about the changes described in Section 1.7, SSH Features in these
release notes will be included.
- The following information will be added to Chapter 3:
The location of the Xauthentication executable file can be
specified in the SSH client configuration file. Use the
Xauthpat
keyword to specify a device and directory other than the default
location (SYS$SYSTEM:DECW$XAUTH.EXE).
- Chapter 5 will be updated to reflect Section 4.14.4, Native-Mode X11 Port Forwarding Does Not Work in these release
notes.
When X11 port forwarding is enabled on both the SSH client and
server, you can use SSH to connect to an SSH server and invoke X11
client programs there, while having them appear on your local display.
You can also "chain" port forwarding across multiple systems, even if
the intermediate systems are not running the X11 server. For example,
from SYSTEM1 you can use SSH to connect to SYSTEM2, and then from
SYSTEM2 connect to SYSTEM3. An X11 client application running on
SYSTEM3 will be displayed securely on SYSTEM1.
- The following option will be added to the "Managing Auditing"
section in Chapter 4:
AllowVmsLoginWithExpiredPw
Allowed values:
yes
,
no
Default:
yes
Description: Controls the behavior when an OpenVMS client attempts
to establish an SSH connection to an OpenVMS server account with an
expired password. The value
yes
allows the client to interact with the server to update an expired
password. The value
no
rejects the login.
Note that when the
disforce_pwd_change
flag is set in the user's SYSUAF record, the client user is allowed to
log in; a warning message is displayed instructing the user to change
the password. If the user does not change the password, the account
will be locked out and the user will not be allowed to log in again.
- The following option description will be changed. The default has
been changed from "no" to "yes."
AllowNonvmsLoginWithExpiredPw
Allowed values:
yes
,
no
Default:
yes
See Section 4.14.1, SSH Server Does Not Allow Password Change in these release notes for detailed information.
- The examples in the section "Port Forwarding for FTP" will be
corrected.
- Section 6.9.1, Changing the Default Configuration, will be
corrected. When specifying multiple hosts, a maximum of three BIND
servers will be used.
|
|
HP TCP/IP Services for OpenVMS User's Guide
|
|
|
HP TCP/IP Services for OpenVMS Tuning and Troubleshooting
|
- Information from the HP TCP/IP Services for OpenVMS Guide to IPv6 will be added.
|
|
HP TCP/IP Services for OpenVMS Management Command Reference
|
- The manual will be updated to reflect the information in
Section 3.14, TCP/IP Management Command Restrictions in these release notes.
- New ADD EXPORT options CASE_BLIND and CASE_SENSITIVE will be added
as described in Section 4.8.1, NFS Server Overwrites Files with Case-Sensitive Lookup in these release notes.
- IPv6 Neighbor Discovery logical name will be added.
To troubleshoot problems with IPv6 Neighbor Discovery, you can
define a logical name to obtain debug messages in the log file
SYS$MANAGER:TCPIP$ND6HOST.LOG.
To set the logical name, enter the following command:
$ DEFINE /SYSTEM TCPIP$ND6HOST_DEBUG 1
Define this logical before you start TCP/IP Services.
|
|
HP TCP/IP Services for OpenVMS Guide to IPv6
|
The
sysconfig
commands in Section 2.6 (Configuring an IPv6 Router) are incorrect. The
subsystem parameter on these command lines should be
ipv6
. These commands need not be entered prior to running the IP6_SETUP.COM
procedure. The IP6_SETUP.COM sets the appropriate attributes.
|
|
|
This manual is deprecated. The information in the new versions of the
HP TCP/IP Services for OpenVMS Installation and Configuration guide and the HP TCP/IP Services for OpenVMS Sockets API and System Services Programming guide has been updated and
corrected.
The remaining information from the HP TCP/IP Services for OpenVMS Guide to IPv6 will be included
in the HP TCP/IP Services for OpenVMS Management guide and the HP TCP/IP Services for OpenVMS Tuning and Troubleshooting guide in a future
release.
|