5    Base System Software Notes

This chapter contains notes about issues and known problems with the base operating system and, whenever possible, provides solutions or workarounds to those problems.

The following topics are discussed:

5.1    Commands and Utilities

The following notes apply to commands and utilities.

5.1.1    Escaped Comment Symbols in a Makefile

The make command will not recognize escaped comment symbols as literal characters in a Makefile. Comment lines that begin with a number sign (#) and all text following this symbol up to the end of the line are considered part of a comment. This is true even if the symbol is preceded with a backslash (\).

5.1.2    Editing an HTML File with XEmacs

If you use XEmacs to edit an HTML file, it looks for an entry corresponding to the email ID in an .emacs file. If this file does not exist or if the entry is not found, XEmacs prompts the user for the mail ID and this information is updated in the .emacs file.

5.1.3    Problem with the at Command During Daylight Saving Time

The at command can have a problem scheduling jobs during daylight saving time (DST) in time zones and countries where daylight saving time applies. The problem occurs for jobs set to execute during the transition hour on the day the clocks are set ahead.

Currently, if you schedule a command to run during the hour in which the clocks are set ahead, the command will run an hour earlier. For example, if you schedule a job to run at 2:30 AM on the day the clocks are set ahead, the job will be executed at 1:30 AM, which is one half hour before 3:00 AM.

Alternatively, you can schedule the job to run an hour later. Then it will run between 3:00 and 4:00 AM.

5.1.4    Change in the Behavior of the cron Daemon

In previous releases, the cron daemon would periodically clean files such as /var/adm/cron/log and /var/adm/messages by default.

These tasks have been removed from the root crontab file, /var/spool/cron/crontabs/root. Therefore the cron daemon does not clean up these files by default.

If you want the cron daemon to clean up these files, add the entries into your root crontab file.

5.1.5    Regular Expression Subexpression with Alternatives

The regular expression functionality does not function properly for expressions that include subexpressions with alternatives that use global match keys. For example, the following command does not function properly:

# grep -E '(ab.*|in)=' file

This problem is known to cause problems with the calendar command and may effect other utilities that rely on complex regular expression syntax.

5.1.6    Netscape Communicator

The following notes apply to the Netscape Communicator.

5.1.6.1    Netscape Communicator Dumps Core Running in CDE

Netscape Communicator dumps core when the application posts a file selection dialog (XmFileSelectionBox). Typically, this occurs when you are running the application in the Common Desktop Environment (CDE) and select the Save As option in the File pulldown menu of the Navigator browser. It can also occur when you select a link to download a file or save an attachment to a mail message in the Messenger Mailbox component.

To avoid this problem, invoke Netscape using the following script:/usr/bin/X11/netscape.

As long as this script is used to start Netscape Communicator, the application will display the file selection dialog within CDE without core dumping. Use the -xrm '*nsMotifFSBCdeMode: True' command-line option if you are starting Netscape Communicator using some other means.

For more information, see the Communicator on UNIX release notes at the Netscape Web site:

http://home.netscape.com/eng/mozilla/4.0/relnotes/unix-4.0.html

5.1.6.2    Deleting Multiple Mail Messages Causes Netscape Communicator to Dump Core

Deleting multiple mail messages in Netscape Communicator's Messenger Mailbox component sometimes causes Communicator to dump core. Usually, it requires several multiple deletions of mail to make Communicator dump core. If Communicator does not dump core immediately, deleted messages might reappear in the mail folder from which they were deleted.

5.1.6.3    Netscape Communicator Dumps Core Intermittently

Netscape Communicator intermittently dumps core and returns the following error in the terminal window from which it is started:

Memory Fault - (core dumped)
 

This core dump occurs with different hardware and software configurations and under different circumstances. Sometimes it hangs for a time, taking most of the CPU time, then it crashes. At other times, its process has to be killed and the application restarted. Numerous problems of this nature have been reported. None are resolved at this time and no workaround is available. In all cases, the behavior cannot be reproduced consistently.

5.1.6.4    Cannot Delete Mail Messages from Inbox to Trash When Using IMAP Server

After upgrading from a previous version of Communicator, an IMAP mail user cannot move messages to the Trash folder in the Messenger component. All Delete options in the user interface are insensitive (greyed-out). Setting the Move it to trash folder option in the IMAP mail server preferences window does not work. This behavior is the result of a new feature in Netscape Communicator that might require user customization after upgrading to the latest version.

Starting with Netscape Communicator, the Namespace extension to the standard IMAP protocol is used to locate the users' folders on the IMAP mail server. This feature does not work if you are using an older IMAP server that does not support the Namespace extension to the protocol. Use the following procedure to customize Netscape Communicator to be able to locate a user's Trash folder on an old IMAP server:

  1. Select the Preferences option in the Edit pulldown menu and choose the Mail and News Servers option in the Preferences window.

  2. Select the Mail Servers option from the list of Mail and News Servers options.

  3. Select the IMAP server from the list of servers and choose the Edit button to edit the server configuration.

  4. Choose the Advanced tab in the pop-up dialog box.

  5. Ensure that the Namespace field in the tab reads as follows (quotes and period included):

    Namespace: "INBOX."
    

  6. Click on the OK button in the pop-up window and again in the Preferences window to save the settings.

  7. Exit and restart Communicator.

You can now move messages to the Trash folder and all the Delete options will now be sensitive (dark letters). Because IMAP mail server configurations differ (including the location of the user's folders on the server), check with your IMAP mail server administrator if the preceding procedure fails to resolve the problem.

5.1.6.5    Communicator Returns sh: /usr/bin/X11/showps: not found

When you select a link to a PostScript file in the Navigator component of Communicator, it might return the following error message:

sh: /usr/bin/X11/showps: not found

The showps helper application has been retired from Tru64 UNIX as a result of licensing changes to Adobe Display PostScript. The user might have customized the PostScript Document MIME type to use the showps helper application in $HOME/.mailcap and $HOME/.mime.types files.

To resolve this problem, you must obtain a new PostScript viewer and reconfigure the helper application for the PostScript Document MIME type in Communicator. Use the Edit option in the Edit->Preferences->Navigator->Applications pulldown menu of Communicator to edit your PostScript Document helper application and replace /usr/bin/X11/showps with the path to your new PostScript viewer.

5.2    SysMan System Management Applications

The following sections apply to restrictions on using the SysMan system management applications.

5.2.1    SysMan Account Manager

You cannot delete a user using the SysMan Account Manager application while the dxaccounts application is running. If dxaccounts is running and you try to delete a user using the SysMan Account Manager application, the Account Manager application displays the following warning message:


/etc/.AM_is_running existing

If you continue the deletion operation, the Account Manager displays the following error message and the application hangs:

Error: key userName UID not found in /account_management/local _passwd_table

If this occurs, kill the hung process. Look for the following entry in the process table:


sysmansh /usr/share/sysman/menu/tasks/account_management

5.2.2    Tcl Error Can Occur During DNS (BIND) Configuration

During the DNS client configuration, the following steps might result in an Out Of Order Hide Tcl error:

  1. Enter a domain name in Local Domain.

  2. Add DNS servers.

  3. Choose OK in the main window.

  4. Choose Yes to update the system host name to reflect the host name with new domain name.

  5. Choose Yes to add "localhost" to access control list? option.

At this point a Tcl Stack Error can occur. However, the data is not lost.

Because all the data entered by the user is committed by the DNS client application, kill the DNS client application and restart the DNS configuration using the SysMan DNS to avoid this problem.

5.2.3    Large Integer Values in Configuration Applications

Entering a very large integer value (on the order of 1019) in numeric fields in some system configuration applications can cause a stack trace. Such large integers are not appropriate values for these applications. Therefore, this problem is not expected to impede you from configuring your system.

5.2.4    Error Message When Using sysman -cli -set values Command

If you use the sysman -cli -set values command to change specific values for an existing row in the table defined by the group staticRoutes, you might receive an error message. For example:

# sysman -cli -set values -comp routing -group staticRoutes\"
 
 -attr gateway=1.2.3.4 -key1 "dummy system 1.1.1.1"
Error: "SYSMAN_NO_DATA"
No row exists with the specified key: 'dummy system 1.1.1.1'

If a row with the defined key is present in the staticRoutes group, you can ignore this message. In any case, you can verify that the row was modified properly by issuing the following command:


# sysman -cli -list values -comp routing -group staticRoutes

5.2.5    Problem with sysman -cli When Setting Values Interactively Using the -attr Option

The following command nullifies the value of the selected attribute (attr) when using the interactive mode:


# sysman -cli -set value -comp comp -group group -attr attr

To avoid this problem, use the following syntax:

# sysman -cli -set value -comp comp -group group -attr attr = newvalue

5.2.6    The -noverbose Argument on sysman -cli When Setting Values Causes Errors

The -nonverbose option does not function properly when setting values. Therefore, do not use -nonverbose when setting values using the sysman -cli command.

5.2.7    Problem When Reconfiguring Network Interface Cards

If you use a SysMan application to reconfigure a network interface card (NIC) and you change the host name, the HOSTNAME variable in the /etc/rc.config file is not updated.

If the system has a single network interface card, you can correct this problem by performing the steps in the following procedure. If the system has more than one network interface card and you changed the host name of the primary card (that is, the card with the same host name as the system's host name), do the following to correct the problem:

  1. Use the rcmgr set HOSTNAME command to set the HOSTNAME to the correct name. For example:

    
    #  rcmgr set HOSTNAME abcxyz.com
    

  2. Use the hostname command to change the host name to the correct value in the kernel. For example:

    
    #  hostname abcxyz.com
    

  3. Use the xhost command to add localhost to the access control list of the local Xserver, as follows:

    #  xhost + localhost
    

5.2.8    SysMan Applications

The sysman configuration and administration utility does not work on hardware configurations within the following locales:

To avoid this problem, set the LC_ALL and LANG environment variables to C when you run the sysman utility.

5.2.9    NTP Configuration Restriction

If you edit the /etc/ntp.conf file manually and subsequently run the SysMan NTP client configuration utility, your changes might be lost.

The SysMan NTP client configuration utility understands only a small subset of the commands that can be used in the ntp.conf file. When the NTP client configuration utility reads the /etc/ntp.conf file, it ignores commands it does not understand and it does not output those commands when rewriting the file. It also does not allow you to enter commands it does not understand. For example, it does not allow you to enter commands using the sysman -cli command.

If you want to configure your system as an NTP sever or your configuration requires a more complex ntp.conf file than SysMan can produce, edit the ntp.conf file manually and do not use the SysMan utility to modify it. For more information, see the Network Administration guide and the ntp.conf(4) and xntp.conf(8) reference pages.

5.2.10    NTPconfig Error When Fudge Is Checked for Peer

On the Add (or Modify) NTP Servers/Peers window, the fudge factor toggle is disabled when you select peer mode. If fudge factor was already checked, it remains checked after peer mode is selected. Subsequently clicking OK or Apply causes a validation error to be reported.

To avoid this problem, change back to server mode, uncheck fudge factor, and return to peer mode.

5.2.11    NIS Configuration and Enhanced Security

The sysman nis configuration for an NIS master server does not build the prpasswd maps required for enhanced security. To build the maps, execute the following commands, after running the NIS configuration:

# cd /var/yp
# make prpasswd

5.2.12    Checkmarks Do Not Appear in Checklist

Checkmarks are supposed to appear next to a task's icon after the task is run from the System or Custom Setup graphical application (/usr/sbin/checklist).

The checkmarks do not appear. Therefore, there is no indication as to whether the task has already been run.

5.2.13    Starting the automount Daemon with an Empty Argument List

To start the automount daemon with an empty argument list, use the Configure system as an NFS client item of the Network File System (NFS) option. The option is provided by either the nfsconfig utility or the SysMan Menu.

Do not use the {Re}start NFS daemons item. It will restart the automount daemon with default arguments instead of the empty argument list and reset the AUTOMOUNT_ARGS parameter in the rc.config.common file to the default arguments. If this happens, restart the automount daemon using the Configure system as an NFS client item. This will reset the AUTOMOUNT_ARGS parameter to the empty argument list.

5.2.14    SysMan Menu

The notes in this section apply to the SysMan Menu application. Also see Section 8.11.1 for information related to online help.

5.2.14.1    Installation Branch Hangs When Run in Background

The Install software, List installed software, and Remove installed software tasks in the Installation branch of the SysMan Menu hang if you run the SysMan Menu in the background. Do not run the SysMan Menu in the background if you plan to use these tasks in Installation branch.

5.2.14.2    Installation Branch Is Not Supported for Clusters

Do not run the SysMan Menu Installation Branch in a cluster environment. The Install software, List installed software, and Remove installed software tasks in the Installation Branch of the SysMan Menu do not work on a cluster system.

5.2.14.3    Some Tasks Can Only Be Run by the root User

Each of the tasks in the SysMan Menu is associated with an action name. The task's action name is the same as its accelerator as displayed by the sysman -list command. These action names are associated with privileges by the Configure Division of Privilege (DOP) application in the SysMan Menu. Non-root users can be granted the privilege to run specific actions. There is a problem where several SysMan Menu tasks do not have a required privilege associated with their actions. You can perform these tasks only when you are logged in as root. These tasks are:

Note that in order to perform cluster tasks, the system must be a member of a cluster.

5.2.14.4    Running the SysMan Menu Standalone on a PC Fails to Launch Tasks

When you run the SysMan Menu from a PC, you might encounter the following problems:

To avoid these problems, run the SysMan Menu from within the SysMan Station by doing the following:

  1. Start the SysMan Station either from the Start menu or from a web browser.

  2. Choose the Hardware view.

  3. Right click on a host icon and choose the SysMan Station.

5.2.14.5    Manage Local and NIS Users

The Manage local users and Manage NIS users tasks in the SysMan Menu are front ends for the useradd, usermod, and userdel commands. If a warning message is displayed when a user account is added or modified, the change to /etc/passwd file has completed successfully. However, the Manage local users and Manage NIS users tasks do not correctly display the changes in their dialog boxes. This happens in the following cases:

To correct this problem, exit the task and restart it. The correct attributes for the user will now be displayed.

5.2.15    SysMan Station (SMS)

The notes in this section apply to the SysMan Station (SMS). Also see Section 8.11.2 for information related to online help.

5.2.15.1    Incorrect Launch Status

SMS checks the status returned by all the applications that it launches. A few applications incorrectly exit with non-zero (failure) status returns even though the tool has launched successfully.

5.2.15.2    Objects Might Not Display Properly from Internet Explorer

Objects might not display properly in SMS View windows when running SMS from a PC using the Internet Explorer web browser. Sometimes objects are overlayed on top of each other in the upper left-hand corner of the display window.

To correct this problem, select the Show All option from the Action menu to redraw the display properly.

5.2.15.3    Cannot Restart the Client in a Web Browser

When you are running the SMS client from a web browser, if you exit the Sysman Station and attempt to restart it by returning to the URL (http://your_machine:2301), the client will not restart.

You can correct the problem by restarting the browser. The client will load properly from the URL.

5.2.15.4    Client 5-Minute Timeout

If the SMS server (smsd) is restarted while there are active SM Station clients, the clients will keep an active network connection that times out after 5 minutes have elapsed. Attempts to use the /sbin/init.d/smsd start during this 5-minute interval will fail to restart the server because it cannot access the required network port. You must wait for the 5-minute timeout to elapse before you can restart the SMS server.

You can also check to see if any clients are using the network port with the following command:


/usr/sbin/netstat -a | grep 596

If no matches are found, you can restart the SMS daemon (smsd).

5.2.15.5    Physical_Filesystems View Displays Two Disk Objects for LSM File Systems

Two disk objects are displayed in the Physical_Filesystems view for each file system that uses LSM. One disk object represents the LSM private region, the other represents the LSM public region.

5.2.15.6    Icons Indicating Warning or Failed States

Objects in a failed or warning state are depicted in the SysMan Station's Hardware view using a red or yellow highlight for the object's icon. A very small number of objects do not have warning or failed icons. In this case, the object's label does correctly indicate that it is in a warning or failed state.

5.2.15.7    Group Icons Are Not Available for Some Objects

When objects are grouped together, a special group icon is used to represent the grouping. A small number of objects do not display a group icon when an object group is formed. In these instances, the group's label will correctly indicate that the icon represents a group.

5.2.15.8    Some Tools Might Not Execute with Proper Priviledges

Some tools may not execute with the proper privileges when launched from within the SysMan Station (SMS). This occurs only for users whose group is privileged in the Division of Privileges (DOP) database but the users themselves are not. Also, this is only a problem when launching X11 applications; suitlets will work properly.

If this problem occurs, error messages are displayed that indicate you do not have the appropriate permissions to make modifications or that you must be root to run the application.

To avoid this problem, launch the applications directly from the command line. For example, to launch the X11 Account Manager application, enter the following on the command line:

# dop X11:accounts

5.2.15.9    Multiple AdvFS Volumes Might Not Appear Properly

When multiple volumes are added to AdvFS file domains, the new AdvFS volume objects might not appear in the SMS AdvFS Filesystem and Physical Filesystem view windows.

You can correct this problem by restarting the SMS daemon (smsd). To restart the smsd daemon, exit all connected SMS client sessions and issue the following command:

 
# /sbin/init.d/smsd restart

5.2.16    Configuring Tru64 UNIX from Other Systems

You can now configure Tru64 UNIX from Linux systems. The following section provides information on how to install the SysMan client on these systems.

5.2.16.1    Installing the SysMan Client on a Linux System

You can configure a system running Tru64 UNIX from a system that is running Linux using Java by performing the following steps:

  1. Download the /usr/share/sysman/web/classLib/suit.jar file from the Tru64 UNIX system to your Linux system and add the full path of that file to your CLASSPATH environment variable.

    If you use csh and you downloaded the suit.jar file to /usr/local/lib, use the following syntax:

    setenv CLASSPATH $CLASSPATH:/usr/local/lib/suit.jar
    

    If you use ksh and you downloaded the suit.jar file to /usr/local/lib, use the following syntax:

    CLASSPATH=$CLASSPATH:/usr/local/lib/suit.jar
    export CLASSPATH
    

  2. Run SysMan Menu with the following command, substituting the name or IP address of your Tru64 UNIX computer for HOST:

    java suit HOST sysman
    

    Alternatively, you can run a SysMan task directly by substituting the accelerator for sysman. For example:

    java suit HOST ntp_config
    

You can redirect the standard output to /dev/null if you do not want to see the diagnostic messages that SysMan prints when run in this fashion.

SysMan has been tested on RedHat Linux Version 6.0 and SuSE Linux Version 6.0 on Intel using Version 1.1.7 of the Java Run-time Engine (JRE). Other versions of Linux and Java might also work.

5.3    System Administration

The following notes apply to system administration.

5.3.1    Boot Sequence Stops in Single-User Mode After Core Dump

A problem exists that causes the boot sequence to stop in single-user mode and display the following message:

/sbin/dn_setup: 1048647 Memory fault - core dumped
bcheckrc: Device Naming failed boot configure or verify.
Please correct the problem and continue or reboot
 
INIT: SINGLE-USER MODE
#

This problem is most likely to occur every time you boot systems with Fibre Channel devices or once if you have changed the hardware configuration between boots.

The problem occurs after the dsfmgr command has successfully completed during the exit cleanup routines.

Data integrity is not compromised and there is no corrective action required, except to remove the core file left in the root directory (/core or /core.dsgmgr*).

You can continue the boot process by pressing [Ctrl/d] to exit single-user mode or by initiating multi-user mode with the init 3 command. Alternatively, you can reboot the system, provided there are no Fibre Channel devices connected to the system.

5.3.2    Restriction on the hwmgr Command

Do not use the hwmgr -refresh component command.

In certain cases, using the hwmgr -refresh component command prevents the dsfmgr command from creating new device special files and the problem cannot be corrected using the dsfmg r -vF command. This problem may prevent you from being able to reboot the system without manual intervention to correct the problem.

To avoid this problem, Use the hwmgr -delete comp -idnumber to remove extraneous entries from the hardware component, SCSI, and hardware topology databases.

5.3.3    Account Manager

The following notes apply to the Account Manager, dxaccounts.

5.3.3.1    General Restrictions

The Account Manager has the following restrictions on both base security and enhanced security (C2) systems:

5.3.3.2    Account Manager and Enhanced Security

The following problems apply to the Account Manager application when running on systems with enhanced security:

5.3.3.3    NIS Plus and Minus Accounts

The plus (+) and minus (-) signs are special characters used by NIS in the local /etc/passwd file that specify whether a user is or is not allowed to log into the system. Users with accounts that are preceded by a plus sign are allowed to log in, while users with accounts that are preceded with a minus sign are not. In the following example, the user joe would be allowed to log in to the local system and the user harry would not:


+joe::::::
-harry::::::

All the account management commands insist that the NIS user account exist before creating the corresponding plus or minus account. However, even when the NIS account does exist, the account management tools refuse to create the local plus or minus account. This problem affects the following applications and commands:

To avoid this problem, use the Account Manager (dxaccounts), add a plus (+) or a minus (-) sign to the username but do not use the NIS Overrides field in the Options subdialog box. This allows the account to be added correctly. Note that the /etc/passwd record will contain a UID and GID but these will be ignored and the user's NIS UID/GID will be honored.

5.3.4    EISA Configuration Utility Revision Requirements

For Tru64 UNIX Version 5.0A and its software supplements, the supported version of the EISA Configuration Utility (ECU) is Version 1.10 or higher. If your system is configured with an EISA bus, update the ECU to this supported version.

5.3.5    Alternate Root Installation May Change Host File Dates

During an alternate root installation of base operating system subsets, such as is done using the dmu utility to set up a Dataless Management Services environment, the file access dates on some of the files in the host server's file system might be changed to correspond to those from the subset's file inventory. When the release installed into the alternate root is different from that installed on the host system, these changed dates appear invalid because they may be newer (or older) than the actual file dates from the host system's installation kit.

This occurs when the pax utility is invoked by the setld utility to copy symbolic links from the kit subsets, and the symbolic links target absolute paths that correspond to actual files in the host system's file system. The pax utility attempts to adjust the dates for the symbolic link, but the file system actually adjusts the dates for the target of the symbolic link.

The changed dates have no operational impact on the host system. The content of the affected files is not changed. However, because the dates have changed, the behavior of utilities that examine file dates (such as the find command or archivers) might be affected.

5.3.6    Use db_checkpoint for Log Trimming

A customized version of the Berkeley Database (Berkeley DB) is embedded in this version of the operating system to provide high-performance database support for critical security files. The database includes full transactional support and database recovery, using write-ahead logging and checkpointing to record changes.

The secconfig utility enables you to create a cron job to perform log file trimming; that is, to delete log files no longer involved in active transactions.

The db_archive utility requires a log file checkpoint to determine when a log file is no longer in use. Under some circumstances, security activity may not generate checkpoints for long intervals. Therefore, add the following line to the /var/spool/cron/crontabs/root before the db_archive entry:


 /usr/tcb/bin/db_checkpoint -1 -h /var/tcb/files

5.3.7    Swap Device List and /sbin/swapdefault Moved to /etc/sysconfigtab

The list of swap devices has moved from the /etc/fstab file to the /etc/sysconfigtab file. The use of /sbin/swapdefault to indicate the swap allocation modes has been moved to the /etc/sysconfigtab file.

The swap devices and swap allocation mode are automatically placed in the /etc/sysconfigtab file during installation.

Swap devices listed in /etc/fstab are ignored.

For more information, see the System Administration guide.

5.3.8    Compressed Crash Dump Might Display Incorrect Byte Count

If you have full crash dumps enabled on a machine with more than 2 GB of memory, the compressed crash dump message that displays the number of bytes will be less than zero. If a machine has over 4 GB of physical memory, the displayed value will overflow. For example:

DUMP: Will attempt to compress -688128 bytes of dump
    : into 3927949296 bytes of memory.

This problem is an artifact of the 32-bit integer math used in the printf() code that generates the message. It does not affect the results of the crash dump.

5.3.9    Security

The notes in this section have to do with system management and security.

5.3.9.1    Authentication Problem With Multi-Threaded Applications

Third-party applications that perform user authentication or impersonation from multiple threads, such as PMDF, will only correctly verify a user's group membership from the first thread. All other threads that call the sia_get_groups routine receive a failure status. This can lead to seemingly random behavior, in which a user's membership in a group of which the user is a legitimate member is sporadically denied.

5.3.9.2    Shadow Password Mode Requires 8-Character Passwords

When you configure enhanced security in Shadow Password mode, the default settings restrict users changing their passwords to a password of exactly 8 characters. Attempts to enter passwords of different sizes produce the following error message:

Password must be from 8 to 8 characters long

You can change this by setting the system default settings in the /etc/auth/system/default file, using the edauth utility. The u_newcrypt field defines the cryptographic algorithm used on password changes. The default setting of 2 causes the maximum password length to be restricted to 8 characters, which is the maximum that the BSD cryptographic algorithm can accept. Changing the u_newcrypt field to 0 invokes the bigcrypt algorithm, which allows the value of the u_maxchosen field to determine the maximum password length.

The 8-character minimum occurs because the u_minchosen field defaults to zero. Zero specifies to compute a minimum according to Green Book rules. The computed minimum is 9. The minimum is therefore set to 8 because it would exceed the maximum of 8 characters for the algorithm. You can easily change this behavior by setting the u_minchosen field to a value other than zero.

Note that these defaults will change in a future release of Tru64 UNIX.

5.3.9.3    Security and Insight Manager

The Insight Manager agent (or daemon) is configured by default when you install the operating system. Anonymous login to WebAgent applications, enabled by default, allows nonprivileged users to invoke the Insight Manager and view details of any connected devices in the local area network, although users cannot perform any operations unless authorized. If this is not appropriate given your site security policy, see the System Administration guide for information on reconfiguring the Insight Manager agent.

5.3.9.4    Behavior of useradd, usermod, and userdel Commands

The useradd command correctly honors the default administrative lock value found in the /.sysman/Account_defaults file. If the Account_defaults file does not exist, the internal default for the useradd command is to create locked accounts. Use the administrative_lock_applied extended command-line option to override the default. In the following example, the useradd command creates a locked account for foo regardless of the default value for administrative lock:

useradd -x administrative_lock_applied=1 foo

For base security, a locked account has the text Nologin in the password field in the /etc/passwd file. If an account is unlocked and has no password, that account has no value in the password field. The account is open and accessible to anyone. A warning is displayed if an unlocked account with no password is created.

For enhanced security, all accounts have an asterisk (*) in the password field in the /etc/passwd file, but the lock flag in the protected password database is correctly set to reflect the lock status. As with base security, an unlocked account with no password is accessible to anyone.

The usermod command correctly sets the lock flags for enhanced security when the administrative_lock_applied option is given on the command line. If you use the usermod command to unlock a locked account with no password, a warning is displayed.

The userdel command will retire, instead of remove, accounts on a system running enhanced security.

5.3.9.5    Prevent IP Spoofing Attacks

To detect and prevent an IP spoofing attack that can potentially result in a denial of service, configure the ifaccess.conf file to disable localhost as a source address.

For all adapters except the local loopback adapter (lo0), disable incoming packets with a source address of localhost (127.0.0.1). For example, add the following entry to the /etc/ifaccess.conf for tu0:

tu0     127.0.0.1   255.255.255.255  denylog
 

Then enable access filtering on tu0:

# ifconfig tu0 filter

5.3.10    Change in struct utmp, struct utmpx, and struct lastlog

To bring them into compliance with several UNIX and Internet standards, the struct utmp, struct utmpx, and struct lastlog structures have been changed. These changes affect the /usr/include/utmp.h, /usr/include/utmpx.h, and /usr/include/lastlog.h files :

These changes also affect the format of the /var/adm/utmp, /var/adm/wtmp, and /var/adm/lastlog files. The following conversion programs are supplied:

The programs enable you to convert your existing /var/adm/wtmp and /var/adm/lastlog files to the new format or convert new format files to the old format for use by existing programs. See the corresponding reference pages for more information.

5.3.11    Argument Size Limit for the exec System Call

The amount of memory used by the arguments to the exec system call is limited by sysconf(_SC_ARG_MAX), which is about 38 KB. You can exceed this limit systemwide by setting the exec_disable_arg_limit argument in the sysconfigtab file to 1 as follows:

# sysconfig -r proc exec_disable_arg_limit=1

When you set this argument to 1, the limit becomes an amount that is slightly less than the maximum stack size for the process, which is typically 8 MB or more. When you set the exec_disable_arg_limit argument to 1, sysconf(_SC_ARG_MAX) incorrectly reports that the limit is 38 KB. However, programs that rely on this value will not be limited to 38 KB and will function normally.

It is unlikely that programs will require more than 38 KB of memory; however, test suites that test this limit and expect an error return when sysconf(_SC_ARG_MAX) is exceeded will not obtain their expected result. If you are running test suites that expect an error return when this limit is exceeded, leave the exec_disable_arg_limit argument set to 0. Otherwise, it is recommended that you set this argument to 1.

5.3.12    Startup Messages Lost in Large Configurations

On systems that display a large number of console messages at system initialization (typically, systems configured with a large number of devices), some messages may be missing from the /var/adm/messages file. You can correct this problem by increasing the size of the kernel's message buffer.

Use either of the following procedures to change the buffer size. You must be root to make the change.

To change the buffer size using graphical administration tools, use the following steps:

  1. Start the dxkerneltuner application.

  2. Select the generic subsystem.

  3. Set the Boot Time Value entry for the msgbuf_size attribute to the new value.

  4. Apply the change before exiting.

To change the buffer size from the command line, use the following steps:

  1. Create a temporary file, /tmp/msgbufsize, containing the following lines, but replacing the 32768 with the size appropriate for your system:

    generic:
    msgbuf_size = 32768
    

  2. Enter the following command:

    
    % sysconfigdb -f /tmp/msgbufsize -m
    

    If a different entry is present in the database, sysconfigdb displays a warning message to advise you of the change in size.

The increase takes effect at the next system reboot. After rebooting, you can verify the change by entering the following command:


% sysconfig -q generic | grep msgbuf_size

Note

The default size of the message buffer is 4 KB, and the example above sets it to 32 KB. Because the space used by the buffer is not returned for general use after initialization, set the size only high enough to correct the problem.

See the System Administration guide for information on changing the buffer size.

5.3.13    Insight Manager

This section provides information on the Insight Manager.

5.3.13.1    Insight Manager Known Problems

The following problems exist in the current version of the Insight Manager:

5.3.13.2    Compaq SNMP Subagent and Insight Manager Restrictions

The online help for Insight Manager in /usr/share/sysman/bin/insightd describes four login accounts: anonymous, administrator, operator, and user. For this release, only the anonymous and administrator accounts are accessible. Before you log in as the Insight Manager administrator, use the Set Up Insight Manager application from the SysMan Menu to configure the administrator password.

This version of Insight Manager does not generate SNMP traps. Thus, alerts are not generated.

The Compaq SNMP subagent in /usr/sbin/cpq_mibs incorrectly reports the CPU logical slot instead of the physical slot on some Alpha platforms. Therefore, Insight Manager displays large values for this attribute.

The Compaq SNMP subagent returns incorrect values for SCSI disk read and write statistics. Therefore, the values displayed by the Insight Manager web pages are also incorrect. The values returned are in units of bytes rather than sectors. Additionally, the statistics displayed are only calculated once, when the subagent is started.

5.3.14    Event Manager (EVM)

The notes in this section apply to the Event Manager (EVM).

5.3.14.1    Sorting Events by Summary Gives Incorrect Ordering

If you choose to sort events by Summary in the Event Viewer, events might appear to be sorted incorrectly. The viewer uses the evmsort command to provide sorted output. In this release, the evmsort command does not provide an option to expand an event's format data item before sorting. Therefore, the results are based on the summary, before variable data has been included.

5.3.14.2    Event Viewer and evmget Display a Message When the binlog File Is Invalid

If the binary error log file, /var/adm/binary.errlog, contains invalid log entries, an error message similar to the following is displayed when you run evmget:


binlog2evm: Invalid event data encountered at offset 80216
binlog2evm: Error occurred while reading from
"/.local../usr/var/adm/binary.errlog"
binlog2evm: Skipped invalid data - restarted at offset 85248

If you see this message, follow your normal investigation and reporting procedures to determine the source of the corruption.

A short-term solution to prevent the message from being displayed is to redirect stderr to /dev/null.

If you are certain that the error log is properly backed up and does not contain required event information, you can permanently remove the invalid data by initiating a cleanup of the log file by using the directions in the binlogd(8) reference page. Note that this operation removes the log file and starts a new one. Because two generations of the error log are held, the message continues to be displayed until you run the cleanup procedure twice.

5.3.14.3    Double Clicking in the Event Viewer Launched from SMS Core Dumps

If you launch the Event Viewer from the SysMan Station (SMS) and double click in the More options window, the viewer fails, resulting in a stack trace.

To avoid this problem, single click in the More Options windows and then click OK to finish your choice.

This problem exists only when you launch the Event Viewer from SMS. If you launch the viewer from the command line or from the Sysman Menu, you can double click an option to select it.

5.3.14.4    EVM Reports Kernel Messages with Critical Priority

EVM reports all messages that are posted from the kernel through the syslog event facility as having critical priority. This incorrectly includes many informational messages that are posted when you start the system.

5.3.14.5    EVM Logger Might Miss Events

The EVM logger might not receive all events in situations where many events are posted in a short period of time. This is due to buffer overflow. If this happens, the logger inserts an event into the log reporting the number of events that were missed.

5.3.14.6    Problem with Low-Resolution Displays

Some graphical applications may be longer than the display for low-resolution displays using large fonts. Windows that are larger than the display are truncated at the bottom, often resulting in the buttons being cut off. Some windows in Quick Setup have exhibited this behavior on some displays.

To avoid this problem, you can try reducing the size of the font. See the documentation for the window manager you are using. Also, applications that have a curses (character) mode fit better than graphical applications using large fonts.

For more information, see X(1X), dtstyle(1), curses(3), and sysman_intro(8X).

5.4    Network and Communications

The following notes apply to network and communications software.

5.4.1    DHCP Database Migration (joind and bootpd)

Starting with Tru64 UNIX Version 4.0F, DHCP database files are stored in an entirely new format that is incompatible with older formats. The operating system ships with an online document, provided by JOIN Systems, that explains the reasons behind this change, lists the files that are affected, and provides instructions for converting the files to the new format. The document and conversion utility, README-DB237 and conv185-237, respectively, are located in the /etc/join directory.

5.4.2    Mail

This section provides information on problems that can occur when configuring and running mail on your systems.

5.4.2.1    The mailcv -I -t and -M -t Commands Do Not Work As Expected

If you are converting a dtmail folder hierarchy to IMAP, or you are converting a single folder that does not already exist in the IMAP hierarchy, you receive the following error message and the conversion of the hierarchy stops:

Mailcv: Can?t create output file {foldername}, ignoring conversion.
 
foldername is the new name of the folder.

Use Netscape to migrate your folders to IMAP as follows:

  1. Set the Local Mail folder to point to the directory that contains the dtmail folder hierarchy.

  2. From the Preferences menu, select the Mail & Newsgroup subtree, then select Mail Servers.

  3. Select the Local Mail Directory and change the directory to the UNIX folder directory you want to convert.

  4. Select OK and restart Netscape.

  5. Select the Netscape Messenger window to display your mail folders. Drag and drop the mail folders from the local folders to the IMAP folders or select all the messages in a folder and use the move command to move all the messages to the IMAP folder.

If you are converting dxmail or MH mail to IMAP folders, you receive the following error message:


Mailcv: Can?t create output file {foldername}, ignoring conversion.
 
foldername is the new name of the folder.

To migrate folders from dxmail or MH mail folders to IMAP, do the following:

  1. Migrate the folders to UNIX style by using the mailcv command with the -A option.

  2. Use Netscape, as described in the previous procedure, to migrate the UNIX mail folders to your IMAP folders.

5.4.2.2    IMAP Server: Preserving Uppercase User Names

If your system is configured as an IMAP server and you want to preserve uppercase for user names, do the following:

  1. Add the F=u flag for IMAP mailer in your sendmail configuration file.

  2. Edit the /var/adm/sendmail/sendmail.cf.pd file and /var/adm/sendmail/sendmail.m4 file (if it exists) before you run either the mailsetup script or mailconfig application.

    Search for the line with Mimap and add the u flag to its F= option. The original line appears as follows:

    Mimap,   P=/usr/bin/deliver, F=nsmFDM, S=10, R=20/50, A=deliver $u
     
    

    After you update the line, it should appear as follows:

    Mimap,   P=/usr/bin/deliver, F=nsmFDMu, S=10, R=20/50, A=deliver $u
     
    

If you have already configured sendmail using either the mailsetup script or the mailconfig application, apply these changes to the /var/adm/sendmail/sendmail.cf file in addition to the /var/adm/sendmail/sendmail.cf.pd and /var/adm/sendmail/sendmail.m4 files.

5.4.2.3    sendmail Warning Message

The permissions on the /var directory do not satisfy the checks by the sendmail binary. The sendmail utility expects the permission of the /var directory to be 755. However, the permissions are 775. Due to this, sendmail logs the following warning message in the syslog file every time it checks the mode of the /var directory:


WARNING: writable directory /var/adm/sendmail

This does not impact the functionality of sendmail, so you can ignore this warning. If you want, you can change the permissions on the directory to 755 by logging in as root and entering the following command:


# chmod go-w /var

5.4.2.4    Problem Starting the Sendmail Daemon

If you manually edit the /var/adm/sendmail/sendmail.cf file and there are errors in the file, the Sendmail startup script might display that the daemon started when it has not.

To verify whether the sendmail daemon has actually started, issue the following command:

# ps -aef | grep sendmail

If the sendmail process is not present, check the mail.log file for any errors associated with the start of the daemon. The full path name for this file is /var/adm/syslog.dated/current/mail.log. Correct any errors recorded in this file before starting the sendmail daemon again with the following command:


# /sbin/init.d/sendmail start

5.5    Local Area Transport

The following notes apply to Local Area Transport (LAT).

5.5.1    Duplicate Minor Numbers and latsetup

The latsetup utility sometimes creates devices with duplicate minor numbers. If you manually create LAT BSD devices that do not match the valid BSD tty name space convention, latsetup can create devices with duplicate minor numbers. For example, creating device tty0 with a minor number 2 instead of 1 can cause this problem.

5.5.2    Simultaneous llogin Connections

When doing a number of simultaneous llogin connections, use llogin with the -p option. To speed up an llogin connection, add the target host name as a reserved service.

5.6    File Systems

The notes in this section apply to file systems.

5.6.1    UNIX File System Warning Message

When a valid UFS file system has been detected and the fstype in the disk label is marked as unused, the following messages are displayed:

# ./mount /dev/disk/dsk5c /mnt
Warning: partition /dev/disk/dsk5c was detected as marked unused.
Warning: partition /dev/disk/dsk5c temporarily set to 'FS_BSDFFS'
4.2BSD fast file system.
Warning: Please use disklabel to correct this condition.

Currently the fstype in the disk label is temporarily set and will revert when you unmount the file system with no warning message. The label could be changed without the knowledge of the user if the newfs command is issued on another partition on the same disk.

If you receive this message, use the disklabel command to correct the label.

5.6.2    Advanced File System (AdvFS)

The following notes discuss features, problems, and restrictions of the Advanced File System (AdvFS).

5.6.2.1    AdvFS and fsync()

You can use the fsync() system call to synchronously write dirty file data to disk. There are two ways a file can have dirty data in memory. One way is via the write() system call. The other is from a memory write reference after an mmap() system call. For AdvFS files, the fsync() system call writes out dirty data only from the write() system call. If dirty data from an mmap() system call also needs to be written, then you must also use the msync() system call.

5.6.2.2    New AdvFS On-Disk File Formats

This version of the operating system provides a new on-disk format (Version 4) for AdvFS that was introduced in Version 5.0. Kernels built with this version of the operating system will work with the old on-disk format (Version 3) as well as with the new format. However, you cannot use a kernel built with a version of the operating system prior to Version 5.0 with the new AdvFS on-disk format.

You can bring an AdvFS domain forward from an earlier version and mount it on a system running Version 5.0 or higher. If you do this, your domain will not change; it will continue to use the Version 3 on-disk format, which is still supported.

If you perform an update installation, you do not get the new on-disk format. You only get the new on-disk format if you do a full installation or if you create a new domain using Version 5.0 or higher.

No conversion utility is available to move Version 3 domains to Version 4 domains. The only way to move your data to a new domain using the new on-disk format is to back up your data from a Version 3 domain and restore it into a new Version 4 domain.

Due to the new on-disk file formats, certain AdvFS utilities from earlier releases of the operating system have the potential to corrupt domains created using the new on-disk formats. Therefore, all statically linked AdvFS utilities from versions prior to Version 4.0 will not run on Version 5.0 or higher. Additionally, the following dynamically linked utilities from earlier releases do not run on Version 5.0 or higher:

5.6.2.3    Running verify on the root Domain

The verify command has been modified so that you can no longer run it on a mounted root domain with either the -f or -d flags. If you need to run the verify command on the root domain with either of these flags, you must boot off another disk or CD-ROM as follows:

  1. From the CD-ROM, exit the installation procedure.

  2. Change directory to the /etc/fdmns directory:

    # cd /etc/fdmns
    

  3. Create a temporary domain directory:

    
    # mkdir verify_root
    

  4. Change directory to the newly created directory:

    
    # cd verify_root
    

  5. Create a symbolic link in this directory to the disk partition that contains the domain you want to run verify on:

    
    # ln -s /dev/disk/dsk3a dsk3a
    

  6. Change directory back to the root directory (/):

    
    # cd /
    

  7. Run verify on the temporary domain:

    # /sbin/advfs/verify -f verify_root
    

  8. Delete the temporary domain:

    
    # rm -rf /etc/fdmns/verify_root
    

5.7    Logical Storage Manager

The following notes describe problems and restrictions of the Logical Storage Manager (LSM).

5.7.1    Using LSM rootvol Requires sysconfigtab Parameters

If you use the LSM rootvol volume for the root file system and the swapvol volume is in use as a primary swap volume, LSM adds the following entries to the /etc/sysconfigtab file to enable it to become root:

lsm:
lsm_rootdev_is_volume=1

If these entries are deleted or if the /etc/sysconfigtab file is deleted, the system will not boot. If this happens, you can boot the system interactively as follows:


>>> boot -fl i
.........
.........
Enter kernel_name option_1 ...
option_n: vmunix lsm_rootdev_is_volume=1

Use the sysconfigdb utility to add the LSM entries as shown previously to the /etc/sysconfigtab file after the system boots. Then, reboot the system for the changes to take effect.

5.7.2    Cannot Enable Logging on RAID 5 Volumes Using LSM's Bottom-Up Commands

You can create RAID 5 volumes using either LSM's top-down or bottom-up commands. However, you cannot enable logging using the bottom-up commands, such as volsd aslog, to associate a log subdisk to a plex or volplex att to attach a logging plex to a RAID 5 volume.

The volassist top-down command does work. Therefore, use the volassist addlog command to add logging to RAID 5 volumes. Note that if you create a RAID 5 volume using the volassist make command, logging is configured and enabled automatically.

5.7.3    LSM Dirty Region Logging (DRL) Cannot Be Used with rootvol

LSM Dirty Region Logging (DRL) cannot be used with a mirrored rootvol. If a system with a mirrored rootvol is not brought down cleanly, the system automatically recovers the rootvol by doing a complete resynchronization. Attaching a logging subdisk might degrade the rootvol write performance with no benefit in recovery time.

5.7.4    The LSMSA Server (lsmsad) Is Not Started at System Startup

The LSMSA server (lsmsad daemon) does not start on system boot. If the server is not running, it starts automatically when you start a GUI session and it stops when all GUI sessions are ended. The /lsbin/rc3.d/S79lsmsa and /lsbin/rc0.d/K41lsmsa scripts no longer exist.

Previous documentation detailing how to start and stop the server is no longer applicable. The system starts the lsmsad server as follows:

  1. When the GUI is started, the system attempts to connect it with the server process on the indicated host.

  2. If the GUI cannot connect, the system then attempts to connect it to the indicated host at the port, initlsmsad, defined in the /etc/services file, and vrts.remote.server.initLsmsadPort, defined in the /usr/lib/java/applications/lsmsa/properties file. The port numbers defined in these two files must match.

    When the GUI connects to the initlsmsad port, the inetd server executes the /usr/lib/java/applications/initlsmsad program, which creates a subprocess where the /usr/sbin/lsmsad script will run. The lsmsad script starts the LSMSA server processes VMServerImpl, VRTSRegistry, and cmdserver. After the LSMSA server processes have been started, the GUI then connects and operates normally.

  3. If the GUI cannot connect to a port, the error message "Cannot connect to the server" is displayed. When LSMSA exits and disconnects from the server, the server continues to exist in an idle state until another GUI connects or an LSM configuration event occurs (such as creation, deletion, or modification of an LSM object). When the server receives notification of an LSM configuration event, if no GUIs are connected, the server exits. When the server exits, all of the LSMSA server processes exit, as well.

If the GUI cannot connect to the server, try the following:

  1. Check the /var/lsmsa/logs/server.log file for startup and error messages.

  2. Run the /usr/lib/java/applications/initlsmsad program to view error messages. You must be root user.

  3. On a very slow network, you may need to adjust the value assigned to the CONNECTION_TIMEOUT variable in the /usr/sbin/lsmsadscript. This is the amount of time after startup that the LSMSA server will wait for a connection from the client. The default value is 30 seconds. When the server process receives an LSM configuration event, if no GUIs have been or are currently connected and the CONNECTION_TIMEOUT seconds have elapsed, the server exits.