Previous | Contents |
The NTP server has a stratum limit of 15. The server does not
synchronize to any time server that reports a stratum of 15 or greater.
This may cause problems if you try to synchronize to a server running
the UCX NTP server, if that server has been designated as "free
running" (with the
local-master
command). For proper operation, the
local-master
designation must be specified with a stratum no greater than 14.
3.9 SNMP Problems and Restrictions
This section describes restrictions to the SNMP component for this
release. For more information about using SNMP, refer to the
HP TCP/IP Services for OpenVMS SNMP Programming and Reference manual.
3.9.1 Incomplete Restart
When the SNMP master agent and subagents fail or are stopped, TCP/IP Services is often able to restart all processes automatically. However, under certain conditions, subagent processes may not restart. When this happens, the display from the DCL command SHOW SYSTEM does not include TCPIP$OS_MIBS and TCPIP$HR_MIB. If this situation occurs, restart SNMP by entering the following commands:
$ @SYS$STARTUP:TCPIP$SNMP_SHUTDOWN.COM $ @SYS$STARTUP:TCPIP$SNMP_STARTUP.COM |
On slow systems, the SNMP Installation Verification Procedure can fail because a subagent does not respond to the test query. The error messages look like this:
. . . Shutting down the SNMP service... done. Creating temporary read/write community SNMPIVP_153. Enabling SET operations. Starting the SNMP service... done. SNMPIVP: unexpected text in response to SNMP request: "- no such name - returned for variable 1" See file SYS$SYSDEVICE:[TCPIP$SNMP]TCPIP$SNMP_REQUEST.DAT for more details. sysContact could not be retrieved. Status = 0 The SNMP IVP has NOT completed successfully. SNMP IVP request completed. Press Return to continue ... |
You can ignore these types of messages in the IVP.
3.9.3 Using Existing MIB Subagent Modules
If an existing subagent does not execute properly, you may need to relink it against the current version of TCP/IP Services to produce a working image. Some subagents (such as those for HP Insight Management Agents for OpenVMS) also require a minimum version of OpenVMS and a minimum version of TCP/IP Services.
The following restrictions apply:
Although images may run without being relinked, backward compatibility is not guaranteed. Such images can result in inaccurate data or run-time problems. |
1.3.6.1.2.1.25.4.2.1.1.1321206828 = 1321206828 1.3.6.1.2.1.25.4.2.1.1.1321206829 = 1321206829 1.3.6.1.2.1.25.4.2.1.1.1321206830 = 1321206830 |
o_oid; Null oid or oid->elements, or oid->nelem == 0 |
After upgrading to the current version of TCP/IP Services, you must
disable and then enable SNMP using the TCPIP$CONFIG.COM command
procedure. When prompted for "this node" or "all
nodes," select the option that reflects the previous configuration.
3.9.5 Communication Controller Data Not Fully Updated
When you upgrade TCP/IP Services and then modify an existing communication controller, programs that use the communication controller might not have access to the updated information.
To ensure that programs like the MIB browser (SNMP_REQUEST) have access to the new data about the communication controller, do the following:
$ @SYS$STARTUP:SNMP_SHUTDOWN.COM $ @SYS$STARTUP:SNMP_STARTUP.COM |
If you use either the -l (loop mode) or -t (tree mode) flag, you cannot also specify the -m (maximum repetitions) flag or the -n (nonrepeaters) flag. The latter flags are incompatible with loop mode and tree mode.
Incorrect use of the -n and -m flags results in the following types of messages:
$ snmp_request mynode.co.com public getbulk -v2c -n 20 -m 10 -t 1.3.6.1.2.1 Warning: -n reset to 0 since -l or -t flag is specified. Warning: -m reset to 1 since -l or -t flag is specified. 1.3.6.1.2.1.1.1.0 = mynode.company.com |
With this version of TCP/IP Services, two subagents can have the same
identifier parameter. Be aware, however, that having two subagents with
the same name makes it difficult to determine the cause of problems
reported in the log file.
3.9.8 Community Name Restrictions
The following restrictions on community names are imposed by TCPIP$CONFIG.COM:
The following notes pertain to eSNMP programming and subagent development.
The SNMP Installation Verification Program will not run correctly if debug or trace options are turned on for any TCP/IP Services for OpenVMS component.
For example, including the line:
options debug |
in TCPIP$ETC:RESOLV.CONF results in unsuccessful completion status.
The problem also exists if socket tracing is turned on and directed to SYS$OUTPUT with the following command:
$ DEFINE TCPIP$SOCKET_TRACE SYS$OUTPUT |
The additional output produced by these and other debug or trace options can cause problems with the SNMP IVP because it was designed to parse output from a standard configuration only.
To run the SNMP IVP test either run the program directly:
or execute the TCPIP configuration menu:
and then select option "7 - Run tests" and then option "2 - SNMP IVP". |
This section contains the following information:
References to SSH, SCP, or SFTP commands also imply SSH2, SCP2, and SFTP2, respectively. |
Computer Emergency Readiness Team (CERT®) advisories are issued by the CERT Coordination Center (CERT/CC), a center of Internet security expertise located at the Software Engineering Institute, a federally-funded research and development center operated by Carnegie Mellon University. CERT advisories are a core component of the Technical Cyber Security Alerts document featured by the United States Computer Emergency Readiness Team (US-CERT), which provides timely information about current security issues, vulnerabilities, and exploits.
CERT and HP Software Security Response Team (SSRT) security advisories might be prompted by SSH activity. CERT advisories are documented at the following CERT/CC web site:
http://www.cert.org/advisories. |
Table 3-1 provides brief interpretations of several SSH-related advisories:
Advisory | Impact on OpenVMS |
---|---|
CERT CA-2003-24 | OpenSSH only; OpenVMS is not vulnerable. |
CERT CA-2002-36 |
A worst case consequence of this vulnerability is a denial of service
(DoS) for a single connection of one of the following types:
In either case, a malicious remote host cannot gain access to the OpenVMS host (for example, to execute arbitrary code), and the OpenVMS server is still able to receive a new connection. |
CERT-2001-35 | OpenVMS is not vulnerable. Affects SSH Version 1 only, which is not supported. |
CERT CA-1999-15 | RSAREF2 library is not used; OpenVMS is not vulnerable. |
SSRT3629A/B | OpenVMS is not vulnerable. |
This section includes general notes and restrictions that are not specific to a particular SSH application.
This section describes features that are expected in a UNIX environment but are not supported by SSH for OpenVMS.
This section includes notes and restrictions pertaining to command syntax.
# ssh user@vmssystem directory SYS$SYSDEVICE:[user] |
# ssh user@vmssystem directory 'SYS$SYSDEVICE:[user]' |
This section includes notes and restrictions pertaining to SSH authentication.
$ TCPIP TCPIP> SHOW HOST client-ip-address |
$ write sys$output - $_ "''f$trnlnm("TCPIP$INET_HOST")'.''f$trnlnm("TCPIP$INET_DOMAIN")'" |
$ ssh hosta %SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=000000000000 0000, PC=FFFFFFFF811A88E8, PS=0000001B Improperly handled condition, image exit forced. Signal arguments: Number = 0000000000000005 Name = 000000000000000C 0000000000000000 0000000000000000 FFFFFFFF811A88E8 000000000000001B Register dump: R0 = FFFFFFFFFFFFFFFE R1 = 0000000000495D08 R2 = 000000000001DEE0 R3 = 00000000004ABE18 R4 = 0000000000000000 R5 = 0000000000000000 R6 = 0000000000000000 R7 = 0000000000000000 R8 = 0000000000000000 R9 = 0000000000000000 R10 = 0000000000000000 R11 = 00000000002F7C20 R12 = 0000000000000000 R13 = 0000000000498708 R14 = 00000000004EDF48 R15 = 000000007AECFE10 R16 = 0000000000000000 R17 = 0000000000000000 R18 = 0000000000000000 R19 = 000000007B624258 R20 = 0000000077770000 R21 = 0000000000000008 R22 = FFFFFFFF77774A00 R23 = 0000000300000000 R24 = 0000000000000001 R25 = 0000000000000001 R26 = 0000000000118A6C R27 = 000000007C062700 R28 = 0000000000000000 R29 = 000000007ADEF290 SP = 000000007ADEF290 PC = FFFFFFFF811A88E8 PS = 100000000000001B |
This section includes notes and restrictions pertaining to SSH keys.
StrictHostKeyChecking yes |
$ SET SECURITY/PROTECTION=(G,W) TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]SSH2_CONFIG.; |
. . . $ image = f$edit("sys$system:tcpip$ssh_ssh2.exe","upcase") $! call install_image 'image' "" <== existing line $ call install_image 'image' "readall" <== replacement . . . |
Steps 2 and 3 involve modification of system files. Therefore, it may be necessary to repeat the modifications after a future update of TCP/IP Services. |
Creating private key file: TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]HOSTKEY Creating public key file: TCPIP$SSH_DEVICE:[TCPIP$SSH.SSH2]HOSTKEY.PUB |
While the keys are being generated, you might notice a delay. This does not indicate a hang. |
Previous | Next | Contents |