- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- DECW$TRUSTED_UNPAUSE in DECwindows V1.3-1 or earli...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-02-2007 01:00 AM
05-02-2007 01:00 AM
DECW$TRUSTED_UNPAUSE in DECwindows V1.3-1 or earlier
Release Notes" at http://h71000.www7.hp.com/DOC/82final/6470/6470pro_004.html
DECW$TRUSTED_UNPAUSE was "introduced" as far back as, I think, V1.2-6, but never worked up through V1.3-1.
Was a public fix for this ever released, for any version of DECwindows that would run on VMS V7.3-2 or earlier?
I ask because we have no software support at present and are stuck for a while with a mix of VMS V7.3-2/-1 (DECwindows V1.3-1/V1.2-6) on our non-production systems, and V7.3 on our production systems. V7.3-2 is downstream at least several months on our production boxes.
When I worked at another site where we had software support, I believe HP supplied us with a fix that worked on at least one pre-V1.5 system, but I don't recall ever seeing a public ECO to fix it.
(My current site DID have software support until about Dec. 2004 but never requested this particular private fix.)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-02-2007 02:28 AM
05-02-2007 02:28 AM
Re: DECW$TRUSTED_UNPAUSE in DECwindows V1.3-1 or earlier
Here's the previous discussion on this:
http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=604209
Kits involving LOGINOUT and GRAPHICS and UPDATE would be the obvious bits.
Or lob a formal request at HP.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-03-2007 12:36 AM
05-03-2007 12:36 AM
Re: DECW$TRUSTED_UNPAUSE in DECwindows V1.3-1 or earlier
Thanks for the suggestions. I should have mentioned that the system is running w/ UPDATE V11 plus XFC V4. That's about as current as can be.
We don't have a current support agreement so I can't request the fix that way.
I assume that we can't request a private fix that came out before our support agreement lapsed in Dec. 2004?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-03-2007 01:02 AM
05-03-2007 01:02 AM
Re: DECW$TRUSTED_UNPAUSE in DECwindows V1.3-1 or earlier
The site support contract ended just before V8.2 shipped, so that's not an option. Save through a purchase. And if buying, it'll be the current V8.3 release, or a purchase of this fix.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-03-2007 04:14 AM
05-03-2007 04:14 AM
Re: DECW$TRUSTED_UNPAUSE in DECwindows V1.3-1 or earlier
kit with that fixed. I don't know who to contact technically, most of our work went overseas. -Dean
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-04-2007 01:51 AM
05-04-2007 01:51 AM
Re: DECW$TRUSTED_UNPAUSE in DECwindows V1.3-1 or earlier
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-26-2007 02:04 AM
06-26-2007 02:04 AM
Re: DECW$TRUSTED_UNPAUSE in DECwindows V1.3-1 or earlier
I learned a few odd things about setting up the trusted unpause account along the way:
1) Don't set the DISUSER, CAPTIVE, or RESTRICTED flags. I was told that DECwindows applications don't support CAPTIVE or RESTRICTED accounts
2)Don't set /NONETWORK, (I was told that DECwindows logins have to have network access even to use the LOCAL transport.)
3) Each time you successfully unlock a screen using the special account's password, you get a Network Login Failure event from the security server. The login failure count is incremented for the special account as well. This is because the authentication mechanism first attempts to use the actual user's account name with the password you just typed at the unlock prompt. When that fails it tries again using the account name from DECW$TRUSTED_UNPAUSE and the same password. This works (assuming you didn't fumble typing the password.)
Engineering told me that all three of these are expected behavior; but I think there might be potential problems arising from this validation scheme.
After some experimenting I set my unlock account like this and so far it works:
/DEVICE=
/DIRECTORY=[BOGUS] -
/FLAGS=(DISCTLY,DEFCLI,LOCKPWD,DISMAIL,DISIMAGE) -
/NETWORK/NOBATCH/NOLOCAL/NODIALUP/NOREMOTE -
/PRIV=NOALL -
/DEFPRIV=NOALL
Perhaps some of the flag settings are unnecessary or not useful, but I don't know that so I figured I'd use them anyway.
Likewise I'm not sure how much /DEVICE=NLA0: or /DIRECTORY=[BOGUS] really help.
Comments from the security experts?