INFO-VAX Sat, 02 Aug 2008 Volume 2008 : Issue 419 Contents: Re: "Network tape drive" for VMS Re: "Network tape drive" for VMS Re: "Network tape drive" for VMS Re: (kinda) HP, parts ain't parts; KVM internal power supply Re: (kinda) HP, parts ain't parts; KVM internal power supply Re: (kinda) HP, parts ain't parts; KVM internal power supply Re: (kinda) HP, parts ain't parts; KVM internal power supply Re: Amazon: "DEC is Dead, Long Live DEC" Re: Amazon: "DEC is Dead, Long Live DEC" Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) Re: Another BIND vulnerability (cache poisoning) BIND Patch WAS: Another BIND vulnerability (cache poisoning) Connecting storage on a HSG80 and a EVA4100 Re: Connecting storage on a HSG80 and a EVA4100 Re: Connecting storage on a HSG80 and a EVA4100 Correctable ECC errors on ES45 Re: Correctable ECC errors on ES45 Re: Correctable ECC errors on ES45 Re: Correctable ECC errors on ES45 cxx EXPORT_SYMBOLS causes linker error RMS-W-RTB Re: cxx EXPORT_SYMBOLS causes linker error RMS-W-RTB Re: cxx EXPORT_SYMBOLS causes linker error RMS-W-RTB Re: F$CVTIME inconsistency after all those years Re: F$CVTIME inconsistency after all those years Re: F$CVTIME inconsistency after all those years Re: F$CVTIME inconsistency after all those years Re: F$CVTIME inconsistency after all those years Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Re: How do you allow telnet access to your own computer? Just in case y'all forgot ! Re: Just in case y'all forgot ! Re: Just in case y'all forgot ! Mercurial on OpenVMS question Re: Mercurial on OpenVMS question Newbquest: pipe() and vfork/creprc/spawn Re: Newbquest: pipe() and vfork/creprc/spawn Re: Newbquest: pipe() and vfork/creprc/spawn Re: Newbquest: pipe() and vfork/creprc/spawn Re: Newbquest: pipe() and vfork/creprc/spawn SHOW DEVICE: bug or feature VAX C copying sign bit on unsigned int bit shift operations? Re: VAX C copying sign bit on unsigned int bit shift operations? Re: VERY Old RDB Manuals (V2.3) wanted! Re: VERY Old RDB Manuals (V2.3) wanted! Re: VERY Old RDB Manuals (V2.3) wanted! Re: VERY Old RDB Manuals (V2.3) wanted! Re: VERY Old RDB Manuals (V2.3) wanted! Re: VERY Old RDB Manuals (V2.3) wanted! Re: VERY Old RDB Manuals (V2.3) wanted! Re: VERY Old RDB Manuals (V2.3) wanted! Re: VERY Old RDB Manuals (V2.3) wanted! Re: Were can I buy a cheap vaxstation Re: What happened to VAXeln after DEC stopped selling it ? Re: What happened to VAXeln after DEC stopped selling it ? Would someone give me a pinout pointer, please. Re: Would someone give me a pinout pointer, please. Re: Would someone give me a pinout pointer, please. Re: Would someone give me a pinout pointer, please. Re: Would someone give me a pinout pointer, please. Re: Would someone give me a pinout pointer, please. Re: Would someone give me a pinout pointer, please. [VMS] Several VMS manuals - Guide to DCL / System procedures etc - VMS V4.nn / ---------------------------------------------------------------------- Date: Wed, 30 Jul 2008 10:11:02 -0400 From: "Syltrem" Subject: Re: "Network tape drive" for VMS Message-ID: "Albrecht Schlosser" wrote in message news:n0t3l5-2ij.ln1@news.hus-software.de... > Is there anything available that could be called a > "network tape drive" that is supported with > > (a) OpenVMS / Alpha 7.3-2 > (b) OpenVMS / I64, 8.2 or 8.3 ff. ? > > The reason is to have the backup tape drive separated from the > server for easier access to change the backup tapes. > > Please don't ask, why would you want to do that. It's simply > because of a user's request. And this should *not* be another > VMS server (cluster node) with a tape drive ;-) > > Albrecht We hired a service where a person come in every day to change tapes and bring the ones from the last backup to the vault. Services like this exist everywhere in major cities. You don't have to change tapes yourself. As for us, we rarely go to our computer room which is 10 minutes from here. Only to push the reset button on a windows server once in a while. Syltrem ------------------------------ Date: 30 Jul 2008 14:30:27 GMT From: VAXman- @SendSpamHere.ORG Subject: Re: "Network tape drive" for VMS Message-ID: <48907b03$0$4999$607ed4bc@cv.net> In article , "Syltrem" writes: > >"Albrecht Schlosser" wrote in message >news:n0t3l5-2ij.ln1@news.hus-software.de... >> Is there anything available that could be called a >> "network tape drive" that is supported with >> >> (a) OpenVMS / Alpha 7.3-2 >> (b) OpenVMS / I64, 8.2 or 8.3 ff. ? >> >> The reason is to have the backup tape drive separated from the >> server for easier access to change the backup tapes. >> >> Please don't ask, why would you want to do that. It's simply >> because of a user's request. And this should *not* be another >> VMS server (cluster node) with a tape drive ;-) >> >> Albrecht > > >We hired a service where a person come in every day to change tapes and >bring the ones from the last backup to the vault. >Services like this exist everywhere in major cities. >You don't have to change tapes yourself. As for us, we rarely go to our >computer room which is 10 minutes from here. Only to push the reset button >on a windows server once in a while. A service that provides secure transportation of vital and privileged data such as was employed in this case??? http://breachblog.com/2008/07/18/bms.aspx It's costing BMS a good few pennies now to provide safeguards for its employee's credit and identity as well as their family's members. -- VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)COM ... pejorative statements of opinion are entitled to constitutional protection no matter how extreme, vituperous, or vigorously expressed they may be. (NJSC) Copr. 2008 Brian Schenkenberger. Publication of _this_ usenet article outside of usenet _must_ include its contents in its entirety including this copyright notice, disclaimer and quotations. ------------------------------ Date: Fri, 01 Aug 2008 18:53:08 -0400 From: glenn everhart Subject: Re: "Network tape drive" for VMS Message-ID: Syltrem wrote: > "Albrecht Schlosser" wrote in message > news:n0t3l5-2ij.ln1@news.hus-software.de... >> Is there anything available that could be called a >> "network tape drive" that is supported with >> >> (a) OpenVMS / Alpha 7.3-2 >> (b) OpenVMS / I64, 8.2 or 8.3 ff. ? >> >> The reason is to have the backup tape drive separated from the >> server for easier access to change the backup tapes. >> >> Please don't ask, why would you want to do that. It's simply >> because of a user's request. And this should *not* be another >> VMS server (cluster node) with a tape drive ;-) >> >> Albrecht > > > We hired a service where a person come in every day to change tapes and > bring the ones from the last backup to the vault. > Services like this exist everywhere in major cities. > You don't have to change tapes yourself. As for us, we rarely go to our > computer room which is 10 minutes from here. Only to push the reset button > on a windows server once in a while. > > Syltrem > > Note that a decnet remote tape driver was on sigtapes and has been available for some time. Look for dtdriver or zrdriver - it was named various things - but worked well. Vax or alpha. Never tried on IA64, but source is around (in macro32). The base driver calls a local daemon process to do actual storage which communicates with a daemon on the box with the actual tape. A tcp/ip version exists too. Hunter Goatley wrote some DCL procedures around this that made it easier to use; I think he has it in his archives also. Look among the virtual disk submissions. Glenn Everhart ------------------------------ Date: Fri, 1 Aug 2008 17:24:25 -0700 (PDT) From: ewing.bettles@cityofpaloalto.org Subject: Re: (kinda) HP, parts ain't parts; KVM internal power supply Message-ID: <69cd36cc-faef-4c97-b4c6-ec5982221a79@t1g2000pra.googlegroups.com> We have 5 of the HP KVM units referenced in the original post and 4 of them have had the same power supply issues in the last few months. I've just contacted the power supply manufacturer, DVE, and the lady in their US office in Fremont, CA is going to find out if they can supply me with replacement units. We'll see... ------------------------------ Date: Fri, 01 Aug 2008 18:26:41 -0700 From: "Tom Linden" Subject: Re: (kinda) HP, parts ain't parts; KVM internal power supply Message-ID: On Fri, 01 Aug 2008 17:24:25 -0700, wrote: > We have 5 of the HP KVM units referenced in the original post and 4 of > them have had the same power supply issues in the last few months. > I've just contacted the power supply manufacturer, DVE, and the lady > in their US office in Fremont, CA is going to find out if they can > supply me with replacement units. We'll see... Throw em in the garbage and get a terminal server. -- PL/I for OpenVMS www.kednos.com ------------------------------ Date: Sat, 02 Aug 2008 07:41:54 -0400 From: "Richard B. Gilbert" Subject: Re: (kinda) HP, parts ain't parts; KVM internal power supply Message-ID: Tom Linden wrote: > On Fri, 01 Aug 2008 17:24:25 -0700, > wrote: > >> We have 5 of the HP KVM units referenced in the original post and 4 of >> them have had the same power supply issues in the last few months. >> I've just contacted the power supply manufacturer, DVE, and the lady >> in their US office in Fremont, CA is going to find out if they can >> supply me with replacement units. We'll see... > > Throw em in the garbage and get a terminal server. > Raritan is the name of THE KVM company. Good stuff and they support it. ------------------------------ Date: Sat, 02 Aug 2008 05:31:59 -0700 From: "Tom Linden" Subject: Re: (kinda) HP, parts ain't parts; KVM internal power supply Message-ID: On Sat, 02 Aug 2008 04:41:54 -0700, Richard B. Gilbert wrote: > Tom Linden wrote: >> On Fri, 01 Aug 2008 17:24:25 -0700, >> wrote: >> >>> We have 5 of the HP KVM units referenced in the original post and 4 of >>> them have had the same power supply issues in the last few months. >>> I've just contacted the power supply manufacturer, DVE, and the lady >>> in their US office in Fremont, CA is going to find out if they can >>> supply me with replacement units. We'll see... >> Throw em in the garbage and get a terminal server. >> > > Raritan is the name of THE KVM company. Good stuff and they support it. Was not implying they weren't good quality, terminal servers are just a much better solution, not as much clutter. -- PL/I for OpenVMS www.kednos.com ------------------------------ Date: Tue, 29 Jul 2008 15:11:49 +0200 From: AC Subject: Re: Amazon: "DEC is Dead, Long Live DEC" Message-ID: <1bd427fce53eb0c2e4ede351aef70b54@msgid.frell.theremailer.net> In article <40d30ff39e248031e013efcdd539686f@pseudo.borked.net> Ted wrote: > > http://snipr.com/DECdead Also on eBay: http://easyurl.net/DECdead ------------------------------ Date: 29 Jul 2008 13:47:58 GMT From: Subject: Re: Amazon: "DEC is Dead, Long Live DEC" Message-ID: <176uZD2KcidF-pn2-MsVGnQ4XBj7y@rikki.tavi.co.uk> On Tue, 29 Jul 2008 13:11:49 UTC, AC wrote: > In article > <40d30ff39e248031e013efcdd539686f@pseudo.borked.net> > Ted wrote: > > > > http://snipr.com/DECdead > > Also on eBay: http://easyurl.net/DECdead Got mine off Amazon after the first post! And it's arrived... ------------------------------ Date: Tue, 29 Jul 2008 01:05:56 -0700 (PDT) From: IanMiller Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: <090544ea-822b-4c3c-99f3-2325bc826c1a@c65g2000hsa.googlegroups.com> On 28 Jul, 14:12, davi...@alpha1.mdx.ac.uk wrote: > In article , koeh...@eisner.nospam= .encompasserve.org (Bob Koehler) writes: > > >In article <488a10c0$0$14356$c3e8...@news.astraweb.com>, JF Mezei writes: > > >> If VMS is not affected, then HP should post this info on the CERT web > >> site to indicate that VMS has been tested and while the public tests > >> show it as vulnerable, it is not vulnerable to actual "attacks". > > > =A0 How does HP define whether VMS is affected, when HP doesn't own all > > =A0 the BIND implementations being run on VMS? =A0 The best HP can do i= s > > =A0 tell us whether UCX (clear throat, "HP TCP/IP Services for OpenVMS"= ) > > =A0 is affected. > > That is ALL that is being asked of them. > > > =A0 What has Process got to say about theirs? > > They have already released patches for the vulnerability > > see > > http://www.multinet.process.com/scripts/eco/eco_tlb.com?NAMED-050_A052 > > released 16th July > > and for TCPWARE > > http://vms.process.com/scripts/eco/eco_tlb.com?NAMED_V582P010 > > released 18th July > > David Webb > Security team leader > CCSS > Middlesex University Note those are for the current versions. Patches for earlier versions (e.g. TCPWARE V5.7-2) will be along sometime. ------------------------------ Date: Tue, 29 Jul 2008 01:18:37 -0700 (PDT) From: IanMiller Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: On 28 Jul, 14:12, Jan-Erik S=F6derholm wrote: > IanMiller wrote: > > On Jul 25, 9:37 pm, Jan-Erik S=F6derholm > > wrote: > > >> I'm failing to see how this is a major problem for > >> my VMS systems, at least... > > >> Jan-Erik. > > > As far as I can see you only have a problem if you have BIND resolver > > that does recursive searches =A0using DNS servers you don't control. > > So if you use local host file then not a problem. If you use internal > > corporate DNS servers only then not a problem either. > > I suspect few VMS systems are vulnerable in practice. > > OK, as I thought. > > So probably the only affected VMS systems are a few hobbyist > systems with direct Internet connections here and there. > Hardly something to care *that* much about. > > And I'd guess that the only case when a VMS systems has to > resolve a lot of external domains, is if you use your > VMS systems for "surfing", and I can't realy see why > you'd want to do that. There are much better and cheaper > "surf-platforms" available... > > So, again, where *is* the problem ?? Besides of the > possible perception that HP don't care, of course... > > Jan-Erik. > > > As usual, the problem is perception not reality. HP have not yet > > produced a patch therefore they don't care rather than actually > > looking at how many VMS systems that you manage have problem and doing > > something about it (if necessary). The reaction here is as expected. The usual arguments rehashed. :-( I expect those few people that have had a potential problem on their VMS systems have done something about it - changed configuration or contacted the vendor of their TCPIP product. ------------------------------ Date: Tue, 29 Jul 2008 11:09:37 +0000 (UTC) From: david20@alpha2.mdx.ac.uk Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: In article <090544ea-822b-4c3c-99f3-2325bc826c1a@c65g2000hsa.googlegroups.com>, IanMiller writes: >On 28 Jul, 14:12, davi...@alpha1.mdx.ac.uk wrote: >> In article , koeh...@eisner.nospam= >..encompasserve.org (Bob Koehler) writes: >> >> >In article <488a10c0$0$14356$c3e8...@news.astraweb.com>, JF Mezei ei.spam...@vaxination.ca> writes: >> >> >> If VMS is not affected, then HP should post this info on the CERT web >> >> site to indicate that VMS has been tested and while the public tests >> >> show it as vulnerable, it is not vulnerable to actual "attacks". >> >> > =A0 How does HP define whether VMS is affected, when HP doesn't own all >> > =A0 the BIND implementations being run on VMS? =A0 The best HP can do i= >s >> > =A0 tell us whether UCX (clear throat, "HP TCP/IP Services for OpenVMS"= >) >> > =A0 is affected. >> >> That is ALL that is being asked of them. >> >> > =A0 What has Process got to say about theirs? >> >> They have already released patches for the vulnerability >> >> see >> >> http://www.multinet.process.com/scripts/eco/eco_tlb.com?NAMED-050_A052 >> >> released 16th July >> >> and for TCPWARE >> >> http://vms.process.com/scripts/eco/eco_tlb.com?NAMED_V582P010 >> >> released 18th July >> >> David Webb >> Security team leader >> CCSS >> Middlesex University > > >Note those are for the current versions. Patches for earlier versions >(e.g. TCPWARE V5.7-2) will be along sometime. Though that is slightly less of an issue since the latest versions of TCPWARE and Multinet will run on versions of VMS back to VMS 5.5-2. Hence it is much more likely users will either already be running the latest version or will be able to upgrade without too much difficulty. With UCX it is more of an issue since recent versions have been much more tied to the OS version hence upgrading to the latest DEC TCPIP service version may also mean upgrading to a new OS version. David Webb Security team leader CCSS Middlesex University ------------------------------ Date: Tue, 29 Jul 2008 11:04:03 +0000 (UTC) From: david20@alpha2.mdx.ac.uk Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: In article , "Tom Linden" writes: >On Mon, 28 Jul 2008 08:12:34 -0700, wrote: > >> In article , "Tom Linden" >> writes: >>> On Mon, 28 Jul 2008 06:42:43 -0700, wrote: >>> >>>> No - unpatched internal DNS servers which are setup to do recursive >>>> queries are >>>> vulnerable to attack from compromised internal windows systems. >>> >>> How do you check if it is set up that way? >>> >> >> Look in TCPIP$BIND.CONF >> >> If recursion is restricted to internal systems you will have something >> like >> >> acl "internal" { >> xxx.xxx.xxxx/24 ; 10/8 ; >> }; >> >> options { >> directory "SYS$SPECIFIC:[TCPIP$BIND]"; >> allow-recursion { "internal"; }; >> max-cache-size 10M; >> }; >> >> If there is no allow-recursion option specified then recursion is allowed >> from all hosts. >> >Don't have an acl statement, and only > >options { > directory "TCPIP$BIND_COMMON:[TCPIP$BIND]"; > recursion yes; > In that case it looks like anyone, internal or external, who can send a DNS query on udp or tcp 53 to your server can send a recursive query. (Of course you may have firewalls in place protecting the DNS server from external access). David Webb Security team leader CCSS Middlesex University >> see >> >> http://www.openvms.compaq.com/doc/83final/6526/6256pro_010.html#bind9_access_tab >> >> and for the acl statement >> >> http://www.openvms.compaq.com/doc/83final/6526/6256pro_008.html#bind9_acl_sec >> >> >> David Webb >> Security team leader >> CCSS >> Middlesex University >> >>> -- >>> PL/I for OpenVMS >>> www.kednos.com > > > >-- >PL/I for OpenVMS >www.kednos.com ------------------------------ Date: Tue, 29 Jul 2008 10:44:19 +0000 (UTC) From: david20@alpha2.mdx.ac.uk Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: In article <488e0fbb$0$1845$c3e8da3@news.astraweb.com>, JF Mezei writes: >david20@alpha1.mdx.ac.uk wrote: >> Look in TCPIP$BIND.CONF >> >> If recursion is restricted to internal systems you will have something like >> >> acl "internal" { >> xxx.xxx.xxxx/24 ; 10/8 ; >> }; >> >> options { >> directory "SYS$SPECIFIC:[TCPIP$BIND]"; >> allow-recursion { "internal"; }; >> max-cache-size 10M; >> }; >> >> If there is no allow-recursion option specified then recursion is allowed >> from all hosts. > > >Pardon my ignorance, but this latest issue happens when a local client >tries to resolve a list of foreign hosts and uses his designated DNS >server to do this. So the requests come from the internal lan and are >thus validated in the above rule, aren't they ? Yes the above just shows the the DNS being set up so that only internal hosts can send requests for recursive replies. This is a fairly common setup since providing recursion for external hosts has long been frowned upon. ( note. If you turn off recursion totally then the DNS server will then send back a referral to your client which will then have to contact a more authorative server itself. This would mean that your DNS server would do no caching but would also slow down DNS lookups. It would also mean that your internal DNS clients would need to have the ability to make direct calls to external DNS servers over udp 53 (and possibly tcp 53 depending upon the client) through your firewall. ) The issue is the DNS cache being poisoned by someone managing to get a record for say google.com into your DNS' cache pointing at their site. To do this they send requests for domain1.google.com, domain2.google.com ... to your DNS and at the same time forge lots of responses which contain as additional information that the DNS server should goto google.com (with their address) for an authorative answer. The address they provide for google.com is then cached by your server. Without the patch getting this to work ie getting the false google record cached is a low probability event but is feasible in a reasonable amount of time by just keeping repeating this attack. With the patch the amount of time required becomes pretty much totally infeasible. This can all theoretically be carried out from an owned internal system ie virus infected system, system which has downloaded something from the web etc etc David Webb Security team leader CCSS Middlesex University ------------------------------ Date: Tue, 29 Jul 2008 08:37:53 -0400 From: "Richard Whalen" Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: Note that Apple is behind on this patch too: http://db.tidbits.com/article/9706 ------------------------------ Date: Tue, 29 Jul 2008 06:30:32 -0700 (PDT) From: IanMiller Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: <8bb25add-390c-4cd3-b5b2-dafa666c4c27@z72g2000hsb.googlegroups.com> On 29 Jul, 13:37, "Richard Whalen" wrote: > Note that Apple is behind on this patch too: > > http://db.tidbits.com/article/9706 and are the apple mac newsgroups filled with people shouting that this is the end of the mac? I guess not. ------------------------------ Date: Tue, 29 Jul 2008 11:20:01 -0700 (PDT) From: Rich Jordan Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: <42ee55df-e7e6-4e27-80d5-45dce69b296e@56g2000hsm.googlegroups.com> On Jul 29, 8:30=A0am, IanMiller wrote: > On 29 Jul, 13:37, "Richard Whalen" wrote: > > > Note that Apple is behind on this patch too: > > >http://db.tidbits.com/article/9706 > > and are the apple mac newsgroups filled with people shouting that this > is the end of the mac? I guess not. No, but there are a lot of very unhappy and heated posts about it; I imagine Apple is catching flak more directly too. We'll see how they respond (since they already missed the boat on a proactive one) compared to HP. ------------------------------ Date: 01 Aug 2008 03:53:24 GMT From: no_spam@e.THUNDERMAKER.NET (Spud Demon) Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: <489288b4$0$33220$815e3792@news.qwest.net> koehler@eisner.nospam.encompasserve.org (Bob Koehler) writes in article dated 29 Jul 2008 07:59:57 -0500: >In article , "Richard Whalen" writes: >> Note that Apple is behind on this patch too: >> >> http://db.tidbits.com/article/9706 > > How many folks are using thier Macs as DNS servers? Suns are much > more popular for that purpose, although I no longer know what is > being used "around here". Only a hobbyist would use a boutique OS like VMS or MACOS for a service as mundane as DNS in the first place. But this threat was enough to make me migrate to Linux. All it took was some minor editing of the .conf file; the .db files just worked. Next migrations: HTTP and the dreaded mail services (SMTP and IMAP). --Spud Demon ------------------------------ Date: Fri, 1 Aug 2008 08:56:07 -0700 (PDT) From: Rich Jordan Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: On Jul 29, 7:37=A0am, "Richard Whalen" wrote: > Note that Apple is behind on this patch too: > > http://db.tidbits.com/article/9706 Apple has released a fix for OS-X 10.4 and 10.5 http://support.apple.com/kb/HT2647 So I guess now we're just waiting on HP for a fix or at least a statement. ------------------------------ Date: Fri, 1 Aug 2008 09:23:52 -0700 (PDT) From: Rich Jordan Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: <412d22da-76c4-4bc5-88d5-d35675ede06f@8g2000hse.googlegroups.com> On Aug 1, 11:16=A0am, davi...@alpha2.mdx.ac.uk wrote: > In article , Rich Jordan writes: > > >On Jul 29, 7:37=3DA0am, "Richard Whalen" wrote: > >> Note that Apple is behind on this patch too: > > >>http://db.tidbits.com/article/9706 > > >Apple has released a fix for OS-X 10.4 and 10.5 > > >http://support.apple.com/kb/HT2647 > > >So I guess now we're just waiting on HP for a fix or at least a > >statement. > > It seems they do have a fix available but for some reason don't seem to b= e > publicising that fact > > " > As I mentioned before, we do have the updated images in hand -- just need= to > confirm that you need them and for which platform and version (Alpha or > Integrity; V5.6, V5.5, or V5.4). =A0I guess another option would be to go= ahead > and distribute a saveset containing images for all those versions; we hav= e > such a saveset built also. =A0 > I am pleased to hear that you are using the BIND server on OpenVMS, and I > wish more customers would choose such a configuration. > " > > Maybe VMS engineering should for security patches think of following the = HP-UX > teams lead by notifying comp.os.vms. They regularly publish security patc= h > notifications to > > comp.sys.hp.hpux, > comp.security.unix > and > comp.security.misc > > David Webb > Security team leader > CCSS > Middlesex University Process has released a NAMED patch for TCPware V5.7-2 now, so its trickling back to earlier versions. I'm on the mailing list for patches and security updates for VMS from HP. So far I have not received anything concerning the DNS issue. ------------------------------ Date: Fri, 1 Aug 2008 11:18:40 -0700 (PDT) From: DaveG Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: On Aug 1, 1:07=A0pm, JF Mezei wrote: > > As I mentioned before, we do have the updated images in hand -- just ne= ed to > > confirm that you need them and for which platform and version (Alpha or > > Integrity; V5.6, V5.5, or V5.4). > > Oh, what good stealth marketing ! > > DAMNED IT ! GO TELL CERT THAT VMS HAS A PATCH AVAILABLE. > > Not doing so is negligence. This is a high visibility issue and lack fo > mention that VMS has a patch makes VMS non-viable in modern times. If > you want to artificially restrict VMS to "servers", then make fucken > damned sure your bind SERVER is updated because that is part of what > being a server is all about. > > How can VMS management be so incompetant or so out of touch with reality = ? Why not ask them? ------------------------------ Date: 01 Aug 2008 20:20:09 GMT From: no_spam@e.THUNDERMAKER.NET (Spud Demon) Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: <48936ff9$0$89388$815e3792@news.qwest.net> david20@alpha2.mdx.ac.uk writes in article dated Fri, 1 Aug 2008 14:58:54 +0000 (UTC): >In article , "Tom Linden" writes: >>On Thu, 31 Jul 2008 20:53:24 -0700, Spud Demon >> wrote: >>> Next migrations: HTTP and the dreaded mail services (SMTP and IMAP). >> >>What don't you like about WASD or MX? >> >Or PMDF > >or even Communigate PRO It's not a problem with each and every particular piece of software; it's that I want to be able to maintain my hobbyist site using a single hardware platform. My big deal is audio, and in order to keep it on my Alphas, I'm sticking to version 7.3-1, which means TCPIP 5.4. My first migration to Linux was NFS, because the Alpha hardware I own supports IDE poorly to not-at-all, and also because it's (near?) impossible to get VMS to talk to MacOS. The Mac NFS client wants to used non-privileged ports, and VMS insists they be privileged. Linux can be configured to allow both. SSH is also a big deal to me. UCX has a nasty old version which crashes a lot. On Linux, it just works. No more worries about whether somebody's capturing passwords from my telnet sessions, unless I have to manage the VMS boxes remotely. No problem with VMS Apache (CSWS) on my current pages, but what if I decide to write some Java servlets? VMS Java is perpetually behind, and my newer Linux hardware has more CPU cycles and available memory. UCX IMAP is incredibly slow. I'm hoping for a 100x speed improvement when I migrate. --Spud Demon ------------------------------ Date: Sat, 2 Aug 2008 05:18:29 -0700 (PDT) From: Jerry Eckert Subject: Re: Another BIND vulnerability (cache poisoning) Message-ID: <33c83325-7a90-4831-8b59-d1aa650b03f4@e39g2000hsf.googlegroups.com> On Jul 28, 5:06=A0pm, Jan-Erik S=F6derholm wrote: > Fine then, nothing to care about for me, those managing > the DNS *servers* has to patch *their* systems... > > Was that realy what all the fuzz was about ? > I believe many are concerned because HP hasn't announced to those who track these things that: (a) OpenVMS systems are affected by the vulnerability, and (b) that the patch is available. In other words, communication and perception. ------------------------------ Date: Sat, 02 Aug 2008 05:35:48 -0700 From: "Tom Linden" Subject: BIND Patch WAS: Another BIND vulnerability (cache poisoning) Message-ID: On Sat, 02 Aug 2008 05:18:29 -0700, Jerry Eckert wrote: > On Jul 28, 5:06 pm, Jan-Erik Söderholm > wrote: >> Fine then, nothing to care about for me, those managing >> the DNS *servers* has to patch *their* systems... >> >> Was that realy what all the fuzz was about ? >> > I believe many are concerned because HP hasn't announced to those who > track these things that: (a) OpenVMS systems are affected by the > vulnerability, and (b) that the patch is available. In other words, > communication and perception. > > It could be construed as negligence, and that has legal ramifications, notwitstanding disclaimers to the contrary. -- PL/I for OpenVMS www.kednos.com ------------------------------ Date: Thu, 31 Jul 2008 06:55:42 -0400 From: "Ken Robinson" Subject: Connecting storage on a HSG80 and a EVA4100 Message-ID: <7dd80f60807310355o5fa81b6dw4c4a9afd1438b343@mail.gmail.com> I posted this question in the ITRC SAN forum & I thought I'd post it here also... We have an VMS cluster (alphas) whose storage in on a HSG80. The fibre from the machines connects to the HSG80 via a Storageworks SAN 8 switch. We just got a bl860c blade which will have it's storage on a EVA4100 connected via 2 CISCO MDS 9120 switches. Is it possible to connect the two switches so the older machines would be able to see the new EVA and the blade would be able to see the HSG80? Thanks in advance, Ken ------------------------------ Date: Thu, 31 Jul 2008 05:34:15 -0700 From: "Tom Linden" Subject: Re: Connecting storage on a HSG80 and a EVA4100 Message-ID: On Thu, 31 Jul 2008 03:55:42 -0700, Ken Robinson = wrote: > I posted this question in the ITRC SAN forum > > & I thought I'd post it here also... > > We have an VMS cluster (alphas) whose storage in on a HSG80. The fibre= > from the machines connects to the HSG80 via a Storageworks SAN 8 > switch. > > We just got a bl860c blade which will have it's storage on a EVA4100 > connected via 2 CISCO MDS 9120 switches. > > Is it possible to connect the two switches so the older machines would= > be able to see the new EVA and the blade would be able to see the > HSG80? I've done it with Brocade switches of which I believe the SAN 8 is one. Provided the Cisco switch supports 1 GB fibre it should work. > > Thanks in advance, > > Ken -- = PL/I for OpenVMS www.kednos.com ------------------------------ Date: Thu, 31 Jul 2008 13:52:30 GMT From: "Colin Butcher" Subject: Re: Connecting storage on a HSG80 and a EVA4100 Message-ID: You should be able to connect the old and new switches together. Be careful about SANswitch IDs, fabric IDs and especially zoning. Modern zoning practice (single initiator with multiple targets, soft zoning by WWID etc.) is quite different from how it used to be. You might also need to lock down port types and speeds on the new switches. It might be easier to move the HSG80 and Alpha connections into the new switch - that will probably get you better performance as well rather than having all the traffic between the switches going over a single 1Gbps link. Do read the current "SAN design guide" carefully. Good luck with it all. -- Cheers, Colin. Legacy = Stuff that works properly! ------------------------------ Date: Fri, 01 Aug 2008 09:32:26 -0700 From: Malcolm Dunnett Subject: Correctable ECC errors on ES45 Message-ID: <48933a9c@flight> I have an ES45 with 16GB of memory ( four 4GB Dataram kits ). When I run the memtest of sys_exer (from the >>>) on it I get some Correctable ECC errors. There's not a lot of them, but I'm used to not seeing any. I ran the test for about 12 hours (approximately 2500 passes) and I had a dozen or so errors, calling out four different boards. In an earlier run there was a burst of several dozen errors on one chip (not sure exactly how many, it overflowed the scrollback buffer of the terminal emulator I was using), but then they went away (does memtest perhaps read a location multiple times before writing to it again? ). Anyway, what's your feeling about this amount of errors: is it normal, ok or unacceptable in your estimation? Memtest reports 0 soft errors on the memory, doesn't a correctable ECC error count as a "soft error"? ps, the ES45 has four 1GHz CPUs, in case that makes a difference. ------------------------------ Date: Fri, 1 Aug 2008 15:02:47 -0400 From: "Tom Lake" Subject: Re: Correctable ECC errors on ES45 Message-ID: > Memtest reports 0 soft errors on the memory, doesn't > a correctable ECC error count as a "soft error"? I don't know how Memtest defines it but I wouldn't consider an error corrected by ECC to be a soft error. I'd consider a soft error to be one where a memory location gave an uncorrectable error on some passes but not all. Tom Lake ------------------------------ Date: Fri, 01 Aug 2008 15:05:05 -0400 From: "Richard B. Gilbert" Subject: Re: Correctable ECC errors on ES45 Message-ID: <39SdnR_INP-ywg7VnZ2dnUVZ_hadnZ2d@comcast.com> Malcolm Dunnett wrote: > I have an ES45 with 16GB of memory ( four 4GB Dataram kits ). > > When I run the memtest of sys_exer (from the >>>) > on it I get some Correctable ECC errors. > > There's not a lot of them, but I'm used to not seeing > any. I ran the test for about 12 hours (approximately > 2500 passes) and I had a dozen or so errors, calling > out four different boards. > > In an earlier run there was a burst of several dozen errors > on one chip (not sure exactly how many, it overflowed the > scrollback buffer of the terminal emulator I was using), but then > they went away (does memtest perhaps read a location > multiple times before writing to it again? ). > > Anyway, what's your feeling about this amount of > errors: is it normal, ok or unacceptable in > your estimation? > > Memtest reports 0 soft errors on the memory, doesn't > a correctable ECC error count as a "soft error"? > > ps, the ES45 has four 1GHz CPUs, in case that > makes a difference. Errors, soft or hard, are not acceptable! Pick up the phone and call Dataram!! Explain your problem, and then do what they tell you to do. I believe that Dataram is pretty good about this sort of thing! ------------------------------ Date: Fri, 01 Aug 2008 12:29:31 -0700 From: "Tom Linden" Subject: Re: Correctable ECC errors on ES45 Message-ID: On Fri, 01 Aug 2008 12:05:05 -0700, Richard B. Gilbert wrote: > Pick up the phone and call Dataram!! Explain your problem, and then do > what they tell you to do. I believe that Dataram is pretty good about > this sort of thing! They will likely ask if you reseated the DIMMs and the boards. Did you? -- PL/I for OpenVMS www.kednos.com ------------------------------ Date: Tue, 29 Jul 2008 06:42:10 -0500 From: Roy Goodman Subject: cxx EXPORT_SYMBOLS causes linker error RMS-W-RTB Message-ID: Hello: We are using the new /EXPORT_SYMBOLS qualifier on the cxx compiler (http://h71000.www7.hp.com/commercial/cplus/I64 _doc/rni64.html#vlatest_relnotes_sec) for building shared images on VMS 8.3-1H1. The problem is that our symbol names are (apparently) very long and result in an options file that the linker cannot read. The linker fails while reading the options file, with an RMS-W-RTB error. It seems that the cxx compiler attempts to truncate very long names by putting "..." at the end of the comment field. However the resulting line has 2049 characters, and I believe that the linker's buffer is only 2048 bytes. It seems that the cxx compiler is off by one (or two) in its calculation. This problem is solved easily by removing the comments from the linker options file, or by just removing the "..." string from the end of the longest lines. If anyone is interested, I can supply the (600Kb) linker options file that was generated, or just one or two relevant lines. Cheers, Roy Goodman DEC Badge #163941 (Remove "nospa" from email address to reply) ------------------------------ Date: Tue, 29 Jul 2008 09:53:01 -0400 From: "Ed Vogel" Subject: Re: cxx EXPORT_SYMBOLS causes linker error RMS-W-RTB Message-ID: "Roy Goodman" wrote in message news:Xns9AEA4E5D97198rlgoodmannyc@216.196.97.142... > Hello: > > We are using the new /EXPORT_SYMBOLS qualifier on the cxx compiler > (http://h71000.www7.hp.com/commercial/cplus/I64 > _doc/rni64.html#vlatest_relnotes_sec) for building shared images on VMS > 8.3-1H1. The problem is that our symbol names are (apparently) very long > and result in an options file that the linker cannot read. The linker > fails while reading the options file, with an RMS-W-RTB error. > Roy, This is a know problem. It has been corrected in our internal sources and the fix will be included in a future release of the compiler. In addition to the workarounds you suggest, I believe it is also possible to first create the options file as an implied CR file (using an editor). As I recall, the problem only occurs when you let the compiler create the file (and it becomes stream LF). We are sorry for the trouble this problem has caused, Ed Vogel HP C/C++ for OpenVMS Engineering ------------------------------ Date: Wed, 30 Jul 2008 05:55:46 -0500 From: Roy Goodman Subject: Re: cxx EXPORT_SYMBOLS causes linker error RMS-W-RTB Message-ID: "Ed Vogel" wrote in news:g6n7c0$p65$1@usenet01.boi.hp.com: > We are sorry for the trouble this problem has caused, > Ed: Thanks very much for your quick answer. It is appreciated. Cheers, Roy Goodman ------------------------------ Date: Thu, 31 Jul 2008 05:44:42 -0700 (PDT) From: AEF Subject: Re: F$CVTIME inconsistency after all those years Message-ID: <7f7a7879-06d0-4c18-8cec-50788e8d234d@x35g2000hsb.googlegroups.com> On Jul 18, 2:20 am, JF Mezei wrote: > F$CVTIME requires a time in: 31-FEB-1999:18:57:36 format. > But the result is in format: 31-FEB-1999 18:57:36 format > > What this means is that you can't feed the result of F$CVTIME back into > F$CVTIME ! > > Since it is the only means of doing date calculations in DCL, I would > suggest that VMS engineering spend some brain CPU cycles thinking about > some way to fix this :-) > > I built a time value and have to do one calculation on it, and then > multiple different calculations from the base result, and since that > base result is unusable, I have to first "fix" it to make it usable again. > > Perhaps add an item code in F$CVTIME that is similar to ABSOLUTE but has > the requisite : betwene date and time ? (To the tune of Still Crazy after all these years:) Still crazy after all these years. --Paul Simon AEF ------------------------------ Date: Fri, 01 Aug 2008 03:44:26 -0400 From: JF Mezei Subject: Re: F$CVTIME inconsistency after all those years Message-ID: <4892bf60$0$1804$c3e8da3@news.astraweb.com> Another oddity: $ temp = f$time() $ temp2 = f$cvtime("''temp'-1 :" ,"ABSOLUTE") $ show symbol temp2 TEMP2 = "31-JUL-2008 17:36:26.74" $ show symbol temp TEMP = " 1-AUG-2008 03:36:26.74" This subtracted 10 hours from it. !!!! $ temp2 = f$cvtime("''temp'-2 :" ,"ABSOLUTE") $ show symbol temp2 TEMP2 = "31-JUL-2008 07:36:26.74" This subtracted 20 hours from it. (I was trying to find a way to remove 3 days from it, and deja news ended up telling me you need a delta time of -3-00:00:00 with f$cvtime, but the above is still "interesting" :-) ------------------------------ Date: 1 Aug 2008 07:56:33 -0500 From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) Subject: Re: F$CVTIME inconsistency after all those years Message-ID: In article <4892bf60$0$1804$c3e8da3@news.astraweb.com>, JF Mezei writes: > Another oddity: > > $ temp = f$time() > $ temp2 = f$cvtime("''temp'-1 :" ,"ABSOLUTE") > > $ show symbol temp2 > TEMP2 = "31-JUL-2008 17:36:26.74" > $ show symbol temp > TEMP = " 1-AUG-2008 03:36:26.74" When you don't include all the punctuation, there are rules for figuring out which : you did include. I'm fairly sure those are documented. The "1 :" looks like hours in this case since the - separating the day and hour is required in a delta time when days are specified. The following subtracts one day: $ temp2 = f$cvtime("''temp'-1-" ,"ABSOLUTE") And this finds files created in the last 5 minutes: $ dir/since=-:5 ------------------------------ Date: Fri, 1 Aug 2008 15:09:40 +0000 (UTC) From: david20@alpha2.mdx.ac.uk Subject: Re: F$CVTIME inconsistency after all those years Message-ID: In article , koehler@eisner.nospam.encompasserve.org (Bob Koehler) writes: >In article <4892bf60$0$1804$c3e8da3@news.astraweb.com>, JF Mezei writes: >> Another oddity: >> >> $ temp = f$time() >> $ temp2 = f$cvtime("''temp'-1 :" ,"ABSOLUTE") >> >> $ show symbol temp2 >> TEMP2 = "31-JUL-2008 17:36:26.74" >> $ show symbol temp >> TEMP = " 1-AUG-2008 03:36:26.74" > > When you don't include all the punctuation, there are rules for > figuring out which : you did include. I'm fairly sure those are > documented. The "1 :" looks like hours in this case since the - > separating the day and hour is required in a delta time when days > are specified. > > The following subtracts one day: > >$ temp2 = f$cvtime("''temp'-1-" ,"ABSOLUTE") > > And this finds files created in the last 5 minutes: > >$ dir/since=-:5 > But the surprising thing is that an extra space between the number and the punctuation is interpreted as a zero Imhub2:sh time 1-AUG-2008 16:00:42 Imhub2:dir/since="-:1"/date %DIRECT-W-NOFILES, no files found Imhub2:dir/since="-:1 "/date Directory PMAS_ROOT:[DATA] TEST.TXT;1 1-AUG-2008 15:53:58.32 Imhub2:write sys$output f$cvtime("''f$time()'-10:" ,"ABSOLUTE") 1-AUG-2008 06:03:18.24 Imhub2:write sys$output f$cvtime("''f$time()'-1 :" ,"ABSOLUTE") 1-AUG-2008 06:03:23.55 Imhub2:write sys$output f$cvtime("''f$time()'-10 :" ,"ABSOLUTE") %DCL-W-IVATIME, invalid absolute time - use DD-MMM-YYYY:HH:MM:SS.CC format \1-AUG-2008 16:03:37.70-10 :\ Imhub2:write sys$output f$cvtime("''f$time()'-1:" ,"ABSOLUTE") 1-AUG-2008 15:04:45.97 David Webb Security team leader CCSS Middlesex University > ------------------------------ Date: 01 Aug 2008 20:25:31 GMT From: nospam@e.THUNDERMAKER.NET (Spud Demon) Subject: Re: F$CVTIME inconsistency after all those years Message-ID: <4893713b$0$89388$815e3792@news.qwest.net> JF Mezei writes in article <4892bf60$0$1804$c3e8da3@news.astraweb.com> dated Fri, 01 Aug 2008 03:44:26 -0400: >Another oddity: > >$ temp = f$time() >$ temp2 = f$cvtime("''temp'-1 :" ,"ABSOLUTE") > >(I was trying to find a way to remove 3 days from it, and deja news >ended up telling me you need a delta time of -3-00:00:00 with f$cvtime, >but the above is still "interesting" :-) $ temp2 = f$cvtime("''temp'-3-:" ,"ABSOLUTE") --Spud Demon ------------------------------ Date: Tue, 29 Jul 2008 00:55:54 -0700 (PDT) From: etmsreec@yahoo.co.uk Subject: Re: How do you allow telnet access to your own computer? Message-ID: <6805436f-aa2d-495d-865f-9922be19d749@k37g2000hsf.googlegroups.com> On 29 Jul, 02:39, hamilto...@encompasserve.org wrote: > Im wondering how i can acsess my own computer with telnet, how do i do > this? It might be worth providing some more information or specifying the question a little more precisely. What type of computer is it? What operating environment does it run? Does it have an IP stack on it? ------------------------------ Date: 29 Jul 2008 11:45:34 GMT From: VAXman- @SendSpamHere.ORG Subject: Re: How do you allow telnet access to your own computer? Message-ID: <488f02de$0$20909$607ed4bc@cv.net> In article , hamilton_n@encompasserve.org writes: >Im wondering how i can acsess my own computer with telnet, how do i do >this? Just because I'm paranoid doesn't preclude the fact that they're out there to get me! :) Thus, I wouldn't open my computer(s) to TELNET access! With TELNET, the username and password are sent in plain, visible text. If you log in over the internet, you'd stand the chance of having your access info intercepted. I would setup ssh2 instead of TELNET for secure communication. Once you've set up ssh, you can also have sftp (secure ftp) to your machine as well. I would suggest that you NOT start ssh on the default port 22 unless you like having the port scanners drive you nuts. Regardless, as others have pointed out, some more information and details on the TCP/IP stack you're using would help a great deal. -- VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)COM ... pejorative statements of opinion are entitled to constitutional protection no matter how extreme, vituperous, or vigorously expressed they may be. (NJSC) Copr. 2008 Brian Schenkenberger. Publication of _this_ usenet article outside of usenet _must_ include its contents in its entirety including this copyright notice, disclaimer and quotations. ------------------------------ Date: 29 Jul 2008 08:00:20 -0500 From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) Subject: Re: How do you allow telnet access to your own computer? Message-ID: In article , hamilton_n@encompasserve.org writes: > Im wondering how i can acsess my own computer with telnet, how do i do > this? telnet 127.0.0.1 ------------------------------ Date: 29 Jul 2008 08:01:51 -0500 From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) Subject: Re: How do you allow telnet access to your own computer? Message-ID: In article <488f02de$0$20909$607ed4bc@cv.net>, VAXman- @SendSpamHere.ORG writes: > In article , hamilton_n@encompasserve.org writes: >>Im wondering how i can acsess my own computer with telnet, how do i do >>this? > > Just because I'm paranoid doesn't preclude the fact that they're out there > to get me! :) Thus, I wouldn't open my computer(s) to TELNET access! With > TELNET, the username and password are sent in plain, visible text. If you > log in over the internet, you'd stand the chance of having your access info > intercepted. If the user connects to his own system using 127.0.0.1, the data should never reach the NIC. But if he'd ask a more clear question, he'd get better answers. ------------------------------ Date: Tue, 29 Jul 2008 10:22:50 -0400 From: "Richard B. Gilbert" Subject: Re: How do you allow telnet access to your own computer? Message-ID: Bob Koehler wrote: > In article <488f02de$0$20909$607ed4bc@cv.net>, VAXman- @SendSpamHere.ORG writes: >> In article , hamilton_n@encompasserve.org writes: >>> Im wondering how i can acsess my own computer with telnet, how do i do >>> this? >> Just because I'm paranoid doesn't preclude the fact that they're out there >> to get me! :) Thus, I wouldn't open my computer(s) to TELNET access! With >> TELNET, the username and password are sent in plain, visible text. If you >> log in over the internet, you'd stand the chance of having your access info >> intercepted. > > If the user connects to his own system using 127.0.0.1, the data > should never reach the NIC. But if he'd ask a more clear question, > he'd get better answers. > And if his network, like mine, is physically secure and accessable only to trusted personnel, it's not an issue. If the network is not physically secure, the problem is real and it may be worth solving. Or maybe not. Not every network is populated by potential or actual criminals! ------------------------------ Date: Tue, 29 Jul 2008 08:30:30 -0700 (PDT) From: hamilton_n@encompasserve.org Subject: Re: How do you allow telnet access to your own computer? Message-ID: <6006a456-99c7-4951-9f30-474454a67708@m36g2000hse.googlegroups.com> On Jul 29, 10:22 am, "Richard B. Gilbert" wrote: > Bob Koehler wrote: > > In article <488f02de$0$20909$607ed...@cv.net>, VAXman- @SendSpamHere.ORG writes: > >> In article , hamilto...@encompasserve.org writes: > >>> Im wondering how i can acsess my own computer with telnet, how do i do > >>> this? > >> Just because I'm paranoid doesn't preclude the fact that they're out there > >> to get me! :) Thus, I wouldn't open my computer(s) to TELNET access! With > >> TELNET, the username and password are sent in plain, visible text. If you > >> log in over the internet, you'd stand the chance of having your access info > >> intercepted. > > > If the user connects to his own system using 127.0.0.1, the data > > should never reach the NIC. But if he'd ask a more clear question, > > he'd get better answers. > > And if his network, like mine, is physically secure and accessable only > to trusted personnel, it's not an issue. > > If the network is not physically secure, the problem is real and it may > be worth solving. Or maybe not. Not every network is populated by > potential or actual criminals! I just want to have some of my freinds able to acsess this and I know them all very well so I really am not worried about that very much, but how do I find out my ip address so I can give it to them so they can access it with there computers. ------------------------------ Date: 29 Jul 2008 15:18:04 GMT From: VAXman- @SendSpamHere.ORG Subject: Re: How do you allow telnet access to your own computer? Message-ID: <488f34ac$0$20913$607ed4bc@cv.net> In article , koehler@eisner.nospam.encompasserve.org (Bob Koehler) writes: >In article <488f02de$0$20909$607ed4bc@cv.net>, VAXman- @SendSpamHere.ORG writes: >> In article , hamilton_n@encompasserve.org writes: >>>Im wondering how i can acsess my own computer with telnet, how do i do >>>this? >> >> Just because I'm paranoid doesn't preclude the fact that they're out there >> to get me! :) Thus, I wouldn't open my computer(s) to TELNET access! With >> TELNET, the username and password are sent in plain, visible text. If you >> log in over the internet, you'd stand the chance of having your access info >> intercepted. > > If the user connects to his own system using 127.0.0.1, the data > should never reach the NIC. But if he'd ask a more clear question, > he'd get better answers. I have my accounts setup with no REMOTE access. Even TELNET 0 or 127.0.0.1 or localhost are seen as REMOTE requests. Supplying username and password yield: You are not authorized to login from this source %TELNET-S-REMCLOSED, Remote connection closed -TELNET-I-SESSION, Session 01, host localhost, port 23 -- VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)COM ... pejorative statements of opinion are entitled to constitutional protection no matter how extreme, vituperous, or vigorously expressed they may be. (NJSC) Copr. 2008 Brian Schenkenberger. Publication of _this_ usenet article outside of usenet _must_ include its contents in its entirety including this copyright notice, disclaimer and quotations. ------------------------------ Date: Tue, 29 Jul 2008 11:41:39 -0400 From: "Richard B. Gilbert" Subject: Re: How do you allow telnet access to your own computer? Message-ID: hamilton_n@encompasserve.org wrote: > On Jul 29, 10:22 am, "Richard B. Gilbert" > wrote: >> Bob Koehler wrote: >>> In article <488f02de$0$20909$607ed...@cv.net>, VAXman- @SendSpamHere.ORG writes: >>>> In article , hamilto...@encompasserve.org writes: >>>>> Im wondering how i can acsess my own computer with telnet, how do i do >>>>> this? >>>> Just because I'm paranoid doesn't preclude the fact that they're out there >>>> to get me! :) Thus, I wouldn't open my computer(s) to TELNET access! With >>>> TELNET, the username and password are sent in plain, visible text. If you >>>> log in over the internet, you'd stand the chance of having your access info >>>> intercepted. >>> If the user connects to his own system using 127.0.0.1, the data >>> should never reach the NIC. But if he'd ask a more clear question, >>> he'd get better answers. >> And if his network, like mine, is physically secure and accessable only >> to trusted personnel, it's not an issue. >> >> If the network is not physically secure, the problem is real and it may >> be worth solving. Or maybe not. Not every network is populated by >> potential or actual criminals! > > I just want to have some of my freinds able to acsess this and I know > them all very well so I really am not worried about that very much, > but how do I find out my ip address so I can give it to them so they > can access it with there computers. How you find out your IP address depends on what sort of a network you have. If your computer is connected DIRECTLY to your Cable or ADSL Modem you can use "ifconfig", see the man page. If you have a router, things get a little more complicated and you may not be able to do it at all. ------------------------------ Date: Tue, 29 Jul 2008 11:29:13 -0400 From: "Richard B. Gilbert" Subject: Re: How do you allow telnet access to your own computer? Message-ID: VAXman- @SendSpamHere.ORG wrote: > In article , koehler@eisner.nospam.encompasserve.org (Bob Koehler) writes: >> In article <488f02de$0$20909$607ed4bc@cv.net>, VAXman- @SendSpamHere.ORG writes: >>> In article , hamilton_n@encompasserve.org writes: >>>> Im wondering how i can acsess my own computer with telnet, how do i do >>>> this? >>> Just because I'm paranoid doesn't preclude the fact that they're out there >>> to get me! :) Thus, I wouldn't open my computer(s) to TELNET access! With >>> TELNET, the username and password are sent in plain, visible text. If you >>> log in over the internet, you'd stand the chance of having your access info >>> intercepted. >> If the user connects to his own system using 127.0.0.1, the data >> should never reach the NIC. But if he'd ask a more clear question, >> he'd get better answers. > > I have my accounts setup with no REMOTE access. Even TELNET 0 or 127.0.0.1 > or localhost are seen as REMOTE requests. Supplying username and password > yield: > > You are not authorized to login from this source > %TELNET-S-REMCLOSED, Remote connection closed > -TELNET-I-SESSION, Session 01, host localhost, port 23 > That should not be necessary unless you allow access through your firewall, or don't have a firewall. Mine does not allow anything in unless I initiate the connection from inside. ------------------------------ Date: 29 Jul 2008 16:06:13 GMT From: VAXman- @SendSpamHere.ORG Subject: Re: How do you allow telnet access to your own computer? Message-ID: <488f3ff5$0$20941$607ed4bc@cv.net> In article <6006a456-99c7-4951-9f30-474454a67708@m36g2000hse.googlegroups.com>, hamilton_n@encompasserve.org writes: >{...snip...} >I just want to have some of my freinds able to acsess this and I know >them all very well so I really am not worried about that very much, >but how do I find out my ip address so I can give it to them so they >can access it with there computers. Brad, Since you've asked here, we can only assume your machine is running VMS. If that assumption is valid, we'd need to know which TCP/IP stack you're running on the VMS box to properly assist you. $ SHOW NETWORK Shows me my IP addresses but that won't allow your friends to access any of my systems as the addresses shown are NAT addresses on an inside net. If you can explain a little more about your connection to the internet, I and others could better assist you. If your address is handed out via DHCP, you may want to look into running a DynDNS client on your VMS sys- tem. -- VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)COM ... pejorative statements of opinion are entitled to constitutional protection no matter how extreme, vituperous, or vigorously expressed they may be. (NJSC) Copr. 2008 Brian Schenkenberger. Publication of _this_ usenet article outside of usenet _must_ include its contents in its entirety including this copyright notice, disclaimer and quotations. ------------------------------ Date: Tue, 29 Jul 2008 13:21:02 -0400 From: "Richard B. Gilbert" Subject: Re: How do you allow telnet access to your own computer? Message-ID: Richard B. Gilbert wrote: > hamilton_n@encompasserve.org wrote: >> On Jul 29, 10:22 am, "Richard B. Gilbert" >> wrote: >>> Bob Koehler wrote: >>>> In article <488f02de$0$20909$607ed...@cv.net>, VAXman- >>>> @SendSpamHere.ORG writes: >>>>> In article >>>>> , >>>>> hamilto...@encompasserve.org writes: >>>>>> Im wondering how i can acsess my own computer with telnet, how do >>>>>> i do >>>>>> this? >>>>> Just because I'm paranoid doesn't preclude the fact that they're >>>>> out there >>>>> to get me! :) Thus, I wouldn't open my computer(s) to TELNET >>>>> access! With >>>>> TELNET, the username and password are sent in plain, visible text. >>>>> If you >>>>> log in over the internet, you'd stand the chance of having your >>>>> access info >>>>> intercepted. >>>> If the user connects to his own system using 127.0.0.1, the data >>>> should never reach the NIC. But if he'd ask a more clear question, >>>> he'd get better answers. >>> And if his network, like mine, is physically secure and accessable only >>> to trusted personnel, it's not an issue. >>> >>> If the network is not physically secure, the problem is real and it may >>> be worth solving. Or maybe not. Not every network is populated by >>> potential or actual criminals! >> >> I just want to have some of my freinds able to acsess this and I know >> them all very well so I really am not worried about that very much, >> but how do I find out my ip address so I can give it to them so they >> can access it with there computers. > > How you find out your IP address depends on what sort of a network you > have. If your computer is connected DIRECTLY to your Cable or ADSL > Modem you can use "ifconfig", see the man page. If you have a router, > things get a little more complicated and you may not be able to do it at > all. Excuse me for replying to my own post but I just realized I had responded as if the OP were using Unix. For VMS and TCP/IP Services you have to execute SYS$MANAGER:TCPIP$CONFIG.COM and select option 1 "Core Environment" next select option 2 "Interfaces" from the "Core Environment" menu. That should show you your IP address if you are using TCP/IP Services V5.1 or something earlier or later that offers the same user interface. If you are using a third party TCP/IP stack, you will need to tell us what you are using and then wait for someone who is familiar with the third party software to tell you how to find the IP address using whatever tools are available. If you are using an RFC-1918 address; e.g. 10.0.0.0 - 10.255.255.255 (10/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 - 192.168.255.255 (192.168/16 prefix) Then your friends will have considerable difficulty accessing your system. If you are behind a router that does "NAT" (Network Address Translation) your friends may still be able to connect but the how-to would be pretty far off topic for this newsgroup. ------------------------------ Date: 29 Jul 2008 12:31:18 -0500 From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) Subject: Re: How do you allow telnet access to your own computer? Message-ID: In article <6006a456-99c7-4951-9f30-474454a67708@m36g2000hse.googlegroups.com>, hamilton_n@encompasserve.org writes: > > I just want to have some of my freinds able to acsess this and I know > them all very well so I really am not worried about that very much, > but how do I find out my ip address so I can give it to them so they > can access it with there computers. How to find the IP address may depend on what IP stack you're using. On mine, and many others "show network" will tell you. ------------------------------ Date: Tue, 29 Jul 2008 13:58:34 -0400 From: sol gongola Subject: Re: How do you allow telnet access to your own computer? Message-ID: <488f5a65$0$5014$607ed4bc@cv.net> Bob Koehler wrote: > In article <6006a456-99c7-4951-9f30-474454a67708@m36g2000hse.googlegroups.com>, hamilton_n@encompasserve.org writes: >> I just want to have some of my freinds able to acsess this and I know >> them all very well so I really am not worried about that very much, >> but how do I find out my ip address so I can give it to them so they >> can access it with there computers. > > How to find the IP address may depend on what IP stack you're using. > On mine, and many others "show network" will tell you. > Why not just take a look at your router settings. You will need to get to it any to let a telnet session in to your network AND if you are unable to get to the router, you probably aren't authorized to do what you want. ------------------------------ Date: Tue, 29 Jul 2008 14:44:01 -0400 From: JF Mezei Subject: Re: How do you allow telnet access to your own computer? Message-ID: <488f6567$0$1804$c3e8da3@news.astraweb.com> ifconfig -a works on VMS (Tcpip services). It will lists your interfaces. However, on a home network, it is likely that the interfaces are of a local LAN IP address and your router NATs those into your public IP address. there are various web sites you can access(such as those doing a speedtest ) which will display your public IP address. I don't have one off hand but www.dslreports.com does have one speed test in its "tools" section. If you have a router, you will also need to configure that router to point calls for port 23 to yoru VMS machine. ------------------------------ Date: Tue, 29 Jul 2008 15:50:21 -0600 From: Jeff Campbell Subject: Re: How do you allow telnet access to your own computer? Message-ID: <1217367658_13859@isp.n> Richard B. Gilbert wrote: [snipped] > Excuse me for replying to my own post but I just realized I had > responded as if the OP were using Unix. > > For VMS and TCP/IP Services you have to execute > SYS$MANAGER:TCPIP$CONFIG.COM > and select option 1 "Core Environment" > next select option 2 "Interfaces" from the "Core Environment" menu. Richard, If TCPIP Services is up and running you the command $ TCPIP SHOW INTERFACE will show the current addresses. As others have pointed out $ SHOW NETWORK will do it as well. Jeff [snipped] ----== Posted via Pronews.Com - Unlimited-Unrestricted-Secure Usenet News==---- http://www.pronews.com The #1 Newsgroup Service in the World! >100,000 Newsgroups ---= - Total Privacy via Encryption =--- ------------------------------ Date: Tue, 29 Jul 2008 20:52:21 -0400 From: "Richard B. Gilbert" Subject: Re: How do you allow telnet access to your own computer? Message-ID: Jeff Campbell wrote: > Richard B. Gilbert wrote: > [snipped] >> Excuse me for replying to my own post but I just realized I had >> responded as if the OP were using Unix. >> >> For VMS and TCP/IP Services you have to execute >> SYS$MANAGER:TCPIP$CONFIG.COM >> and select option 1 "Core Environment" >> next select option 2 "Interfaces" from the "Core Environment" menu. > > Richard, > > If TCPIP Services is up and running you the command > > $ TCPIP SHOW INTERFACE > > will show the current addresses. > > As others have pointed out > > $ SHOW NETWORK > > will do it as well. > > Jeff > Yeah. Obviously it's not something I need to do very often! ------------------------------ Date: Thu, 31 Jul 2008 12:22:14 -0500 From: Michael Austin Subject: Re: How do you allow telnet access to your own computer? Message-ID: <4vmkk.19576$N87.969@nlpi068.nbdc.sbc.com> hamilton_n@encompasserve.org wrote: > On Jul 29, 10:22 am, "Richard B. Gilbert" > wrote: >> Bob Koehler wrote: >>> In article <488f02de$0$20909$607ed...@cv.net>, VAXman- @SendSpamHere.ORG writes: >>>> In article , hamilto...@encompasserve.org writes: >>>>> Im wondering how i can acsess my own computer with telnet, how do i do >>>>> this? >>>> Just because I'm paranoid doesn't preclude the fact that they're out there >>>> to get me! :) Thus, I wouldn't open my computer(s) to TELNET access! With >>>> TELNET, the username and password are sent in plain, visible text. If you >>>> log in over the internet, you'd stand the chance of having your access info >>>> intercepted. >>> If the user connects to his own system using 127.0.0.1, the data >>> should never reach the NIC. But if he'd ask a more clear question, >>> he'd get better answers. >> And if his network, like mine, is physically secure and accessable only >> to trusted personnel, it's not an issue. >> >> If the network is not physically secure, the problem is real and it may >> be worth solving. Or maybe not. Not every network is populated by >> potential or actual criminals! > > I just want to have some of my freinds able to acsess this and I know > them all very well so I really am not worried about that very much, > but how do I find out my ip address so I can give it to them so they > can access it with there computers. How do you have it connected to the internet? Linksys/SOHO router via ADSL/Cable modem? then log into the router and port-forward port 23 to the internal address of your VAX/Alpha (ie port 23 ->> 192.168.1.??) If you have SSH enabled on the box, also port-forward port 22 and they can use ssh (search for Putty download and use that as your client). You may not worry about it, but there are hackers out there that will hammer those ports trying to break in - usually with username root or Administrator. ------------------------------ Date: Thu, 31 Jul 2008 12:32:21 -0500 From: Michael Austin Subject: Re: How do you allow telnet access to your own computer? Message-ID: Michael Austin wrote: > hamilton_n@encompasserve.org wrote: >> On Jul 29, 10:22 am, "Richard B. Gilbert" >> wrote: >>> Bob Koehler wrote: >>>> In article <488f02de$0$20909$607ed...@cv.net>, VAXman- >>>> @SendSpamHere.ORG writes: >>>>> In article >>>>> , >>>>> hamilto...@encompasserve.org writes: >>>>>> Im wondering how i can acsess my own computer with telnet, how do >>>>>> i do >>>>>> this? >>>>> Just because I'm paranoid doesn't preclude the fact that they're >>>>> out there >>>>> to get me! :) Thus, I wouldn't open my computer(s) to TELNET >>>>> access! With >>>>> TELNET, the username and password are sent in plain, visible text. >>>>> If you >>>>> log in over the internet, you'd stand the chance of having your >>>>> access info >>>>> intercepted. >>>> If the user connects to his own system using 127.0.0.1, the data >>>> should never reach the NIC. But if he'd ask a more clear question, >>>> he'd get better answers. >>> And if his network, like mine, is physically secure and accessable only >>> to trusted personnel, it's not an issue. >>> >>> If the network is not physically secure, the problem is real and it may >>> be worth solving. Or maybe not. Not every network is populated by >>> potential or actual criminals! >> >> I just want to have some of my freinds able to acsess this and I know >> them all very well so I really am not worried about that very much, >> but how do I find out my ip address so I can give it to them so they >> can access it with there computers. > > How do you have it connected to the internet? Linksys/SOHO router via > ADSL/Cable modem? then log into the router and port-forward port 23 to > the internal address of your VAX/Alpha (ie port 23 ->> 192.168.1.??) > If you have SSH enabled on the box, also port-forward port 22 and they > can use ssh (search for Putty download and use that as your client). > > You may not worry about it, but there are hackers out there that will > hammer those ports trying to break in - usually with username root or > Administrator. Oh - and if you are using ADSL - odds are that your IP address will change frequently... You can register a domain name (you can use http://domains.spacelots.com/ to register and help support those of us in the VMS community) and use a dynamic DNS provider like zoneedit or DynDNS (most newer Linksys routers have this built in so you don't need a script) to keep your address updated. I will be uploading a new version of the zoneedit DDNS updater using a PHP script - runs as a batch job every 5 minutes on my server... ------------------------------ Date: Wed, 30 Jul 2008 09:12:07 -0400 From: "David" Subject: Just in case y'all forgot ! Message-ID: We sell, refurbished & repair ALL Alpha systems. We specialize in Alpha systems We have one of the best, if not THE best, reputations in the business for quality and support. If you don't believe us ... ask in this newsgroup ! As for Ebay - all I can say is Caveat Freakin' Emptor ! Regards to y'all Another XP1000 lottery coming soon !!! -- David B Turner ============================================= Island Computers US Corp PO Box 86 Tybee GA 31328 Toll Free: 1-877 636 4332 x201, Mobile x251 Email: dturner@islandco.com International & Local: (001)- 404-806-7749 Fax: 912 786 8505 Web: www.islandco.com ============================================= ------------------------------ Date: Thu, 31 Jul 2008 10:44:00 -0700 From: Alan Frisbie Subject: Re: Just in case y'all forgot ! Message-ID: David wrote: > We have one of the best, if not THE best, reputations in the business for > quality and support. > If you don't believe us ... ask in this newsgroup ! Nobody asked, but I will say that I am a happy customer. The rare problems are always taken care of quickly and cheerfully. That is what keeps me coming back. Alan Frisbie ------------------------------ Date: Fri, 01 Aug 2008 04:08:36 GMT From: Malcolm Dunnett Subject: Re: Just in case y'all forgot ! Message-ID: <8%vkk.3128$%b7.281@edtnps82> Alan Frisbie wrote: > David wrote: > >> We have one of the best, if not THE best, reputations in the business >> for quality and support. >> If you don't believe us ... ask in this newsgroup ! > > Nobody asked, but I will say that I am a happy customer. I'll second that - I've always had excellent service from Island Computer. ps. If you check back David you'll see I gave you a plug in my reply to the guy looking for a cheap VAXStation. ------------------------------ Date: Fri, 01 Aug 2008 09:29:44 -0700 From: "Jeffrey H. Coffield" Subject: Mercurial on OpenVMS question Message-ID: The situation: All of this is on OpenVMS 8.3. I have Mercurial and Python working from a command line prompt. I got Mercurial to run (perhaps crawl is a better verb here) using Apache but the performance is underwhelming. I tried WASD but have had no luck in getting all the config files straight and I really don't want to learn YAWS (yet another web server). We have our own web server written in VMS Basic that seems to run about as fast as WASD. It does some special things that we need for other reasons. The question: Can anyone direct me to a spec for what a web server on OpenVMS would need to do to run the Mercurial hgwebdir.cgi? It looks like there is some standard Python modules for CGI but I'm not that proficient in Python. Jeffrey Coffield www.digitalsynergyinc.com ------------------------------ Date: Fri, 01 Aug 2008 18:45:55 +0200 From: =?ISO-8859-1?Q?Jean-Fran=E7ois_Pi=E9ronne?= Subject: Re: Mercurial on OpenVMS question Message-ID: <48933dc5$0$27858$426a74cc@news.free.fr> Jeffrey, > The situation: > > All of this is on OpenVMS 8.3. > > I have Mercurial and Python working from a command line prompt. > > I got Mercurial to run (perhaps crawl is a better verb here) using > Apache but the performance is underwhelming. > One of my friend from HP has ported mod_python and mod_wsgi on OpenVMS, using one of this module give a performance boost. > I tried WASD but have had no luck in getting all the config files > straight and I really don't want to learn YAWS (yet another web server). > Here is the rules I used for http://hg.vmspython.dyndns.org/ pass /static/* /mercurial_root/mercurial/templates/static/* pass /wasd/static/* /mercurial_root/mercurial/templates/static/* pass /gnupatch/static/* /mercurial_root/mercurial/templates/static/* pass /gnudiffutils/static/* /mercurial_root/mercurial/templates/static/* pass /vmspython/static/* /mercurial_root/mercurial/templates/static/* pass /vmstools/static/* /mercurial_root/mercurial/templates/static/* pass /test/static/* /mercurial_root/mercurial/templates/static/* pass /vmsflex/static/* /mercurial_root/mercurial/templates/static/* script+ * /disk$user1/hgsrv_user/hgcgiplus* \ map=once ods=5 script=syntax=unix script=query=none \ script=as=hgusr throttle=1,,,30 \ script=param=PYRTE=/WSGI=BUFFER > We have our own web server written in VMS Basic that seems to run about > as fast as WASD. It does some special things that we need for other > reasons. > > The question: > > Can anyone direct me to a spec for what a web server on OpenVMS would > need to do to run the Mercurial hgwebdir.cgi? > Mercurial can run as a standalone Web server $ hg help serve will give you more information. > It looks like there is some standard Python modules for CGI but I'm not > that proficient in Python. > > Jeffrey Coffield > www.digitalsynergyinc.com JFP ------------------------------ Date: Fri, 1 Aug 2008 08:38:02 -0700 (PDT) From: Gibletses@gmail.com Subject: Newbquest: pipe() and vfork/creprc/spawn Message-ID: I am a noob to OpenVMS, though not Unix, so be kind! The age-old UNIX C code for hooking into a new process (and feeding it) is the fork/exec mechanism. The OpenVMS FAQ raises more questions on this than it can answer, and that answer is: "You Can't Do That", or at least, not like that. I'm bald now, but I think I'm close. Think in terms of the functional reqs of telnetd or sshd and you'll understand what the basic desired goal is. A server process running as SYSTEM, listening for TCP connections, accepts such requests, assumes the identity of a given user, and mux'es the input and outputs of an arbitrary OpenVMS command on the single TCP socket. On UNIX or even Windows, this is reasonably straight-forward and simple, until some architect with a pointy head says it has to use select() because select() is cool...but that's getting off-topic. I set about creating mailboxes for stdin, stdout, and stderr, set the privs on those MBXs, assume the persona of my user, and fire off a loginout.exe process with creprc(). This appears to be the 'Way It Is Done' and I used a variety of examples in creating the spaghetti code I now use. In fact, it's very similar to some of the code used in http.c The box (Alpha 600-au) reboots as soon as the creprc() call is hit. BSOD. I have no idea why. Whiskey tango foxtrot. ------------------------------ Date: Fri, 01 Aug 2008 18:33:17 GMT From: Rob Brown Subject: Re: Newbquest: pipe() and vfork/creprc/spawn Message-ID: On Fri, 1 Aug 2008, Gibletses@gmail.com wrote: > I set about creating mailboxes for stdin, stdout, and stderr, set > the privs on those MBXs, assume the persona of my user, and fire off > a loginout.exe process with creprc(). This appears to be the 'Way It > Is Done' and I used a variety of examples in creating the spaghetti > code I now use. In fact, it's very similar to some of the code used > in http.c > > The box (Alpha 600-au) reboots as soon as the creprc() call is hit. > BSOD. I have no idea why. Waving my arms vigorously, I would guess a bad creprc call, probably an access violation. With too many privs you can take down the entire system. Try testing as an unprivileged user and the minimum privileges required. Then you should get a status return from creprc telling you whiskey tango foxtrot. ;-) Also research what privileges are really required. Perhaps DETACH privilege is all you require. And you won't need to run as SYSTEM. hth -- Rob Brown b r o w n a t g m c l d o t c o m G. Michaels Consulting Ltd. (780)438-9343 (voice) Edmonton (780)437-3367 (FAX) http://gmcl.com/ ------------------------------ Date: 1 Aug 2008 13:48:28 -0500 From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) Subject: Re: Newbquest: pipe() and vfork/creprc/spawn Message-ID: In article , Gibletses@gmail.com writes: > I am a noob to OpenVMS, though not Unix, so be kind! > > I set about creating mailboxes for stdin, stdout, and stderr, set the > privs on those MBXs, assume the persona of my user, and fire off a > loginout.exe process with creprc(). This appears to be the 'Way It Is > Done' and I used a variety of examples in creating the spaghetti code > I now use. In fact, it's very similar to some of the code used in > http.c Sounds like you're trying to duplicate the file inheritance of parent to subprocesses in UNIX. Don't try. One of the reasons that VMS doesn't have a UNIX style fork() is the vast difference in the I/O subsystem. For network deamon style processes, use the network documentation (different for every IP stack) and let the network software start your process. If you're doing this outside of a network stack, let us know more about why you're changing personas and there's probably a built-in mechanism to do this. If you absolutely must follow the approach you're using, don't create mailboxes for the process permanent files, just get the names of the correct IO devices and pass them to $creprc. Do create the mailbox for the mbxunit argument if the parent cares how the subprocess did. You will need privileges to create a process for another user, and you can do that via $creprc agruments instead of $persona. And if you screw up while using privileges, yes you can induce "fat Al bugcheck". And the system crash dump will try very hard to tell you what you did wrong, if you bother to study it. ------------------------------ Date: Fri, 01 Aug 2008 14:54:25 -0400 From: "Richard B. Gilbert" Subject: Re: Newbquest: pipe() and vfork/creprc/spawn Message-ID: Gibletses@gmail.com wrote: > I am a noob to OpenVMS, though not Unix, so be kind! > > The age-old UNIX C code for hooking into a new process (and feeding > it) is the fork/exec mechanism. > > The OpenVMS FAQ raises more questions on this than it can answer, and > that answer is: "You Can't Do That", or at least, not like that. I'm > bald now, but I think I'm close. > > Think in terms of the functional reqs of telnetd or sshd and you'll > understand what the basic desired goal is. A server process running as > SYSTEM, listening for TCP connections, accepts such requests, assumes > the identity of a given user, and mux'es the input and outputs of an > arbitrary OpenVMS command on the single TCP socket. On UNIX or even > Windows, this is reasonably straight-forward and simple, until some > architect with a pointy head says it has to use select() because > select() is cool...but that's getting off-topic. > > I set about creating mailboxes for stdin, stdout, and stderr, set the > privs on those MBXs, assume the persona of my user, and fire off a > loginout.exe process with creprc(). This appears to be the 'Way It Is > Done' and I used a variety of examples in creating the spaghetti code > I now use. In fact, it's very similar to some of the code used in > http.c > > The box (Alpha 600-au) reboots as soon as the creprc() call is hit. > BSOD. I have no idea why. > > Whiskey tango foxtrot. Please strip your code down to the absolute minimum required to reproduce the problem and post it. Unless, of course, you find the problem in the process of pruning away everything not essential to the problem! ------------------------------ Date: Fri, 01 Aug 2008 18:55:06 -0400 From: =?ISO-8859-1?Q?Arne_Vajh=F8j?= Subject: Re: Newbquest: pipe() and vfork/creprc/spawn Message-ID: <4893944a$0$90276$14726298@news.sunsite.dk> Bob Koehler wrote: > In article , Gibletses@gmail.com writes: >> I set about creating mailboxes for stdin, stdout, and stderr, set the >> privs on those MBXs, assume the persona of my user, and fire off a >> loginout.exe process with creprc(). This appears to be the 'Way It Is >> Done' and I used a variety of examples in creating the spaghetti code >> I now use. In fact, it's very similar to some of the code used in >> http.c > > Sounds like you're trying to duplicate the file inheritance of > parent to subprocesses in UNIX. Don't try. One of the reasons > that VMS doesn't have a UNIX style fork() is the vast difference > in the I/O subsystem. > > For network deamon style processes, use the network documentation > (different for every IP stack) and let the network software > start your process. Or use threads which are also somewhat native on VMS. Arne ------------------------------ Date: Sat, 2 Aug 2008 13:50:26 +0000 (UTC) From: helbig@astro.multiCLOTHESvax.de (Phillip Helbig---remove CLOTHES to reply) Subject: SHOW DEVICE: bug or feature Message-ID: SHOW DEVICE $33$ shows all devices with names starting with $33$, as would one expect. Except if one is logged in on the corresponding node, in which case it displays everything SHOW DEVICE does, i.e. in particular device names which do not start with (nor contain) $33$. Other abbreviations, such as SHOW DEVICE D, SHOW DEVICE DK, SHOW DEVICE DS, SHOW DEVICE MB etc do not show this behaviour. I see this on 7.3 VAX and 7.3-2 ALPHA. Bug or feature? ------------------------------ Date: Fri, 1 Aug 2008 09:14:46 -0700 (PDT) From: Fatz Subject: VAX C copying sign bit on unsigned int bit shift operations? Message-ID: HP C V7.3-009 on OpenVMS Alpha V7.3-2 OpenVMS V7.3-2 Hello, Here's a test prog I used to discover that compiling /STANDARD=VAXC gives different treatment of unsigned ints from compiling with ANSI C. Do you agree? I can work around the problem by separating out the embedded operations in the initialisers of decode_bitfield and do them as they appear in main. But thought I should show willing and post my findings in case other people are between standards and haven't come across this. /* DECODE_BITFIELD.C */ #include #include void bprintf(int); unsigned int decode_bitfield(unsigned int, unsigned int, unsigned int); int main(int argc, char **argv) { unsigned int object_id = (argc > 1) ? atoi(argv[1]) : 0; unsigned int shift = (argc > 2) ? atoi(argv[2]) : 0; unsigned int length = (argc > 3) ? atoi(argv[3]) : 0; if (object_id) { unsigned int mask = 0xffffffff; unsigned int field = 0; unsigned int value = 0; printf("decode_bitfield: mask = "); bprintf(mask); printf("\n"); mask = mask >> (32 - (shift + length)); printf("decode_bitfield: mask >> %-3d = ", (32 - (shift + length))); bprintf(mask); printf("\n"); mask = mask >> shift; printf("decode_bitfield: mask >> %-3d = ", shift); bprintf(mask); printf("\n"); mask = mask << shift; printf("decode_bitfield: mask << %-3d = ", shift); bprintf(mask); printf("\n"); field = mask & object_id; printf("decode_bitfield: field = "); bprintf(field); printf("\n"); printf("decode_bitfield: object_id = "); bprintf(object_id); printf("\n"); value = field >> shift; printf("decode_bitfield: value = %-3d\n", value); printf("decode_bitfield: returned = %-3d\n", decode_bitfield(object_id, shift, length)); } } void bprintf(int value) { int i = 0; for (i = 31; i >= 0; i--) printf("%u%s", ((1 << i) & value) ? 1 : 0, i % 4 ? "" : " "); } unsigned int decode_bitfield(unsigned int object_id, unsigned int shift, unsigned int length) { unsigned int mask = 0xffffffff; unsigned int field = 0; unsigned int value = 0; mask = mask >> (32 - (shift + length)); mask = mask >> shift; mask = mask << shift; field = mask & object_id; value = field >> shift; printf("decode_bitfield: object_id = %u, shift = %u, length = %u \n", object_id, shift, length); printf("decode_bitfield: debug - mask = %u, field = %u, value = %u \n", mask, field, value); return value; } /* sample output */ CC /NOLIST/OBJECT=DECODE_BITFIELD.OBJ DECODE_BITFIELD.C LINK /TRACE/NOMAP/EXEC=DECODE_BITFIELD.EXE DECODE_BITFIELD.OBJ $ mc []decode_bitfield 9673453 2 5 decode_bitfield: mask = 1111 1111 1111 1111 1111 1111 1111 1111 decode_bitfield: mask >> 25 = 0000 0000 0000 0000 0000 0000 0111 1111 decode_bitfield: mask >> 2 = 0000 0000 0000 0000 0000 0000 0001 1111 decode_bitfield: mask << 2 = 0000 0000 0000 0000 0000 0000 0111 1100 decode_bitfield: field = 0000 0000 0000 0000 0000 0000 0110 1100 decode_bitfield: object_id = 0000 0000 1001 0011 1001 1010 1110 1101 decode_bitfield: value = 27 decode_bitfield: object_id = 9673453, shift = 2, length = 5 decode_bitfield: debug - mask = 124, field = 108, value = 27 decode_bitfield: returned = 27 cc/stand=vaxc decode_bitfield link decodE_bitfield $ mc []decode_bitfield 9673453 2 5 decode_bitfield: mask = 1111 1111 1111 1111 1111 1111 1111 1111 decode_bitfield: mask >> 25 = 0000 0000 0000 0000 0000 0000 0111 1111 decode_bitfield: mask >> 2 = 0000 0000 0000 0000 0000 0000 0001 1111 decode_bitfield: mask << 2 = 0000 0000 0000 0000 0000 0000 0111 1100 decode_bitfield: field = 0000 0000 0000 0000 0000 0000 0110 1100 decode_bitfield: object_id = 0000 0000 1001 0011 1001 1010 1110 1101 decode_bitfield: value = 27 decode_bitfield: object_id = 9673453, shift = 2, length = 5 ! ! ******************************************** ! this is where it all goes pear shaped! ! ******************************************** ! decode_bitfield: debug - mask = 4294967292, field = 9673452, value = 2418363 decode_bitfield: returned = 2418363 Slainte, Fatz. ------------------------------ Date: 1 Aug 2008 14:08:37 -0500 From: koehler@eisner.nospam.encompasserve.org (Bob Koehler) Subject: Re: VAX C copying sign bit on unsigned int bit shift operations? Message-ID: In article , Fatz writes: > HP C V7.3-009 on OpenVMS Alpha V7.3-2 > OpenVMS V7.3-2 I cannot reproduce your result using Compaq C V6.2-008 on OpenVMS Alpha V7.2-1, nor DEC C V4.0 on OpenVMS VAX 6.1, nor VAX C 3.2-044 on that same VAX. So at least it's not an old bug. ------------------------------ Date: Tue, 29 Jul 2008 09:49:27 -0700 (PDT) From: vaxorcist Subject: Re: VERY Old RDB Manuals (V2.3) wanted! Message-ID: On Jul 28, 7:18 pm, Rich Jordan wrote: > Do you know the timeframe for those releases? The oldest I have here > on hand is the November 1992 CONDOC kit and it covers Rdb V4.1. I > _might_ have a few older ones but only going back a year or two more, > in storage. As in its a pain in the rear to get at them and I won't > try if the 2.x or 3.x availability dates are before early 1990... > > Rich RDB/VAX V2.3 release date is 9/87 (the last RDB version to work under VMS V4.x). But nevertheless thanks for considering to dig out old manuals ... Regards, Ulli ------------------------------ Date: Tue, 29 Jul 2008 09:52:18 -0700 (PDT) From: vaxorcist Subject: Re: VERY Old RDB Manuals (V2.3) wanted! Message-ID: On Jul 28, 7:27 pm, Al Kossow wrote: > The release note for 3.0 is Jul, 1988 and the earliest manuals I see > from the DEC archives at CHM are 1985. > > Were they putting docs for layered products on documentation CDs this > early? What are the "DEC archives at CHM"? Is it anything available online or otherwise? Regards, Ulli ------------------------------ Date: Tue, 29 Jul 2008 18:53:11 +0100 From: "David Biddulph" Subject: Re: VERY Old RDB Manuals (V2.3) wanted! Message-ID: <488f54de$1_1@glkas0286.greenlnk.net> "vaxorcist" wrote in message news:f14d92ad-c2e7-40e3-8a89-05f9a20fdba2@b1g2000hsg.googlegroups.com... > On Jul 28, 7:27 pm, Al Kossow wrote: > >> The release note for 3.0 is Jul, 1988 and the earliest manuals I see >> from the DEC archives at CHM are 1985. ... > What are the "DEC archives at CHM"? Google is your friend: http://www.decconnection.org/computermuseum.pdf -- David Biddulph ------------------------------ Date: Tue, 29 Jul 2008 11:12:48 -0700 (PDT) From: Rich Jordan Subject: Re: VERY Old RDB Manuals (V2.3) wanted! Message-ID: <3075372c-6add-4776-a7a3-c8fc7675b318@y21g2000hsf.googlegroups.com> On Jul 29, 11:49=A0am, vaxorcist wrote: > On Jul 28, 7:18 pm, Rich Jordan wrote: > > > Do you know the timeframe for those releases? =A0The oldest I have here > > on hand is the November 1992 CONDOC kit and it covers Rdb V4.1. =A0I > > _might_ have a few older ones but only going back a year or two more, > > in storage. =A0As in its a pain in the rear to get at them and I won't > > try if the 2.x or 3.x availability dates are before early 1990... > > > Rich > > RDB/VAX V2.3 release date is 9/87 (the last RDB version to work under > VMS V4.x). > But nevertheless thanks for considering to dig out old manuals ... > > Regards, > > Ulli Ulli, sorry, but that is definitely earlier than anything I have in storage. I have one or two of the kits that DEC sent out in plastic CD folders (looked like floppy disk cases) before they moved to the early pasteboard folders but I think they're from late '89 at the absolute earliest. Actually those may be more accessible since they didn't fit in the box with the pasteboard ones. I'll check if I can. Rich ------------------------------ Date: Mon, 28 Jul 2008 14:05:35 -0700 From: "Dann Corbit" Subject: Re: VERY Old RDB Manuals (V2.3) wanted! Message-ID: "vaxorcist" wrote in message news:536a9b32-0c9a-4e47-bf84-80169e12fc76@x35g2000hsb.googlegroups.com... > RDB V2.3 (or any other Version 2.x or 3.x) manuals wanted to borrow, > buy oder trade for hobbyist use. > Genuine manuals, copies or files (pdf/tiff/...), anything is welcome! You won't want to use version 2.x or 3.x unless you really have to. There was an 80% improvment in performance between version 3.0 and 4.1. See: "How the Rdb/VMS Data Sharing System Became Fast (1992) " by David Lomet Rick Anderson T. K. Rengarajan Peter Spiro I can probably find manuals for 4.0 and above somewhere. I have all Rdb versions from 4.0 up to modern versions. ** Posted from http://www.teranews.com ** ------------------------------ Date: Tue, 29 Jul 2008 20:19:57 -0700 (PDT) From: Sue Subject: Re: VERY Old RDB Manuals (V2.3) wanted! Message-ID: <892d6ffd-3726-4eb7-8811-672252d474a2@m73g2000hsh.googlegroups.com> On Jul 27, 11:45=A0am, vaxorcist wrote: > RDB V2.3 (or any other Version 2.x or 3.x) manuals wanted to borrow, > buy oder trade for hobbyist use. > Genuine manuals, copies or files (pdf/tiff/...), anything is welcome! > > Regards > > Ulli Ulli, Please send me email on may HP email account. thanks Sue Skonetski ------------------------------ Date: Tue, 29 Jul 2008 23:59:54 -0700 (PDT) From: vaxorcist Subject: Re: VERY Old RDB Manuals (V2.3) wanted! Message-ID: <336cba58-59ae-498b-adf8-03a0e3089401@c58g2000hsc.googlegroups.com> On 28 Jul., 23:05, "Dann Corbit" wrote: > You won't want to use version 2.x or 3.x unless you really have to. There > was an 80% improvment in performance between version 3.0 and 4.1. See: > "How the Rdb/VMS Data Sharing System Became Fast (1992) " > by David Lomet Rick Anderson T. K. Rengarajan Peter Spiro > > I can probably find manuals for 4.0 and above somewhere. I have all Rdb > versions from 4.0 up to modern versions. Thank you for the hint on the article about RDB performance. I will read it carefully. Nevertheless I want to run RDB on OLD VAX hardware using VMS V4 as a Hobbyist. So there's no need for speed - it's all for fun! Regards Ulli P.S. May I ask for help again when I want to use newer versions (e.g. V4) additionally? ------------------------------ Date: Wed, 30 Jul 2008 00:05:34 -0700 (PDT) From: vaxorcist Subject: Re: VERY Old RDB Manuals (V2.3) wanted! Message-ID: <0fd4084e-fc09-456b-9250-e7ed74e7de17@z66g2000hsc.googlegroups.com> On 29 Jul., 20:12, Rich Jordan wrote: > Ulli, > sorry, but that is definitely earlier than anything I have in > storage. I have one or two of the kits that DEC sent out in plastic > CD folders (looked like floppy disk cases) before they moved to the > early pasteboard folders but I think they're from late '89 at the > absolute earliest. > > Actually those may be more accessible since they didn't fit in > the box with the pasteboard ones. I'll check if I can. > > Rich Sounds like RDB V3.x, probably V3.1. Would be very nice if you could have a look and check! Thank you! Regards Ulli ------------------------------ Date: Wed, 30 Jul 2008 02:25:10 -0700 From: "Dann Corbit" Subject: Re: VERY Old RDB Manuals (V2.3) wanted! Message-ID: "vaxorcist" wrote in message news:336cba58-59ae-498b-adf8-03a0e3089401@c58g2000hsc.googlegroups.com... > On 28 Jul., 23:05, "Dann Corbit" wrote: > >> You won't want to use version 2.x or 3.x unless you really have to. >> There >> was an 80% improvment in performance between version 3.0 and 4.1. See: >> "How the Rdb/VMS Data Sharing System Became Fast (1992) " >> by David Lomet Rick Anderson T. K. Rengarajan Peter Spiro >> >> I can probably find manuals for 4.0 and above somewhere. I have all Rdb >> versions from 4.0 up to modern versions. > > Thank you for the hint on the article about RDB performance. > I will read it carefully. > Nevertheless I want to run RDB on OLD VAX hardware using VMS V4 as a > Hobbyist. So there's no need for speed - it's all for fun! > > Regards > > Ulli > > P.S. > May I ask for help again when I want to use newer versions (e.g. V4) > additionally? Sure, that's what Usenet is for. Rdb V 4.2.1 is really the minimum that I would run, since there were so many bugs fixed and also the big speedup. Consider: http://www.sciinc.com/remotedba/techinfo/versioninfo/rdb410.asp http://www.sciinc.com/remotedba/techinfo/versioninfo/rdb411.asp http://www.sciinc.com/remotedba/techinfo/versioninfo/rdb420.asp http://www.sciinc.com/remotedba/techinfo/versioninfo/rdb421.asp We've got it running on an old VAX running VMS 6.1 here: SQL> show version Current version of SQL is: VAX SQL V4.2-1 SQL> attach 'filename cnxdir:connx_rdb_examples'; SQL> show tables User tables in database with filename cnxdir:connx_rdb_examples BLOBTEST CUSTOMERS EQUIPMNT EQUIP_VIEW A view. ORDERS PRODUCTS PRODUCT_GROUPS SQL> ** Posted from http://www.teranews.com ** ------------------------------ Date: Tue, 29 Jul 2008 15:04:22 +0100 From: baldrick Subject: Re: Were can I buy a cheap vaxstation Message-ID: <49WdnYa5quv1vhLVnZ2dnUVZ8uCdnZ2d@posted.plusnet> Bob Koehler wrote: > A cabinet would be good. All I've got right now is a collection of > RZ12 storage boxes. > Hi Bob (and thanks for the welcome back didn't go anywhere just didn't have regular usenet access)... A BA356 plus an 8 bit personality module works great. However a wide personality module should also work fine to give you wide drives on the back of your DS10. For the record a neat DSSI trick is to use a HSD10 with wide drives in a BA356 and an 8 bit personality module. As above it makes the wide drives negotiate narrow and work. And to be complete (not for your benefit Bob) but for those considering using a 9.1 GB wide drive on a 5.5-2 system beware the size limitation in 5.5-2! Nic -- nclews at csc dot com aka Mr. CP Charges "The idea that Bill Gates has appeared like a knight in shining armour to lead all customers out of a mire of technological chaos neatly ignores the fact that it was he who, by peddling second-rate technology, led them into it in the first place."- DNA ------------------------------ Date: Thu, 31 Jul 2008 12:16:10 -0700 (PDT) From: mmjmm@comcast.net Subject: Re: What happened to VAXeln after DEC stopped selling it ? Message-ID: <4c707ed7-151e-4d78-abf5-472b5d6e01e3@a1g2000hsb.googlegroups.com> On Jun 16, 8:20=A0am, clubley@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley) wrote: > In article <96d2b474-97d1-4d1c-812e-c23b6843f...@79g2000hsk.googlegroups.= com>, johnwalla...@gmail.com writes: > > > > > > > On Jun 13, 8:16 pm, clubley@remove_me.eisner.decus.org-Earth.UFP > > (Simon Clubley) wrote: > >> Does anyone know what happened to VAXeln ? > > >> Was it released into the community, just discontinued, or sold on to a > >> third party ? > > >> The reason I was asking is that I am curious to find out more about it= . > >> I've found the Bookreader type manuals at > > >> =A0 =A0 =A0 =A0http://www.sysworks.com.au/swadm_dat_root/cddoc04jan1/V= AXELN_41.html > > >> and > >> =A0 =A0 =A0 =A0http://www.sysworks.com.au/swadm_dat_root/vaxdocdec96/d= 33vza11.html > > >> Does anyone know if the manuals are available online in a more friendl= y > >> format ? > > >> In case anyone's curious, this is just for personal interest; I would = like > >> to know more about it's internal design. > > >> Thanks, > > >> Simon. > > >> -- > >> Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP > >> Microsoft: Bringing you 1980's technology to a 21st century world > > > How about "sold to a third party" *and* "discontinued" ? > > [snip detailed history of VAXELN, post DEC] > > Thanks for taking the time to post this history; it answers all my > questions. > > > > > If you have a VAX (real or emulated) as host, and a VAX as target > > (dunno if emulated ones work, as VAXELN has hardware-specific boot and > > kernel requirements), and access to the VAXELN kit, you might find > > that there is no PAK required to use the toolkit on the host, and none > > on the target either. Obviously you could only legitimately do that if > > you had a licence. > > No, I don't have a license, so now that I know that it wasn't made freely > available after DEC disposed of it, that's not a path that I am going to > go down. I'll stick with reading the online documentation that I found. > > > > > I might have more info available, subject to varying amounts of > > latency. Real time response not guaranteed. > > Thanks for the offer, but this isn't necessary. I was just looking at > it out of personal curiosity to see what facilities it offered and what > it's development environment was; the online documentation will be good > enough for that. > > > Where are you geographically? There may be expertise available > > locally; e.g. Germany had several good VAXELN people inside and > > outside DEC. > > I'm in the UK (North Yorkshire to be precise), but as I mentioned above, > I was just curious about VAXELN; I don't have any systems running it. > > Thanks for the detailed response you gave, > > Simon. > > -- > Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP > Microsoft: Bringing you 1980's technology to a 21st century world- Hide q= uoted text - > > - Show quoted text - VAXELN was not sold to a third party. When the development group was sold to Smart Modular Technologies, the product was abandoned at Compaq who had purchased DEC several years before. After a while Compaq lost track of it even though it was their own intellectual property. I understand they made some half-hearted attempts to contact its old developers and get a copy of it back but that never materialized. I'm sure VAXELN is sitting comfortably somewhere in a private backup where it is at peace, at least for now. When HP bought Compaq they also bought the rights to VAXELN. I'm sure they have no idea. ------------------------------ Date: 31 Jul 2008 19:31:12 GMT From: VAXman- @SendSpamHere.ORG Subject: Re: What happened to VAXeln after DEC stopped selling it ? Message-ID: <489212ff$0$20928$607ed4bc@cv.net> In article <4c707ed7-151e-4d78-abf5-472b5d6e01e3@a1g2000hsb.googlegroups.com>, mmjmm@comcast.net writes: >{...snip...} > >When HP bought Compaq they also bought the rights to VAXELN. I'm sure >they have no idea. When HP bought Compaq they also bought the rights to VMS. We're certain they have no idea. -- VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)COM ... pejorative statements of opinion are entitled to constitutional protection no matter how extreme, vituperous, or vigorously expressed they may be. (NJSC) Copr. 2008 Brian Schenkenberger. Publication of _this_ usenet article outside of usenet _must_ include its contents in its entirety including this copyright notice, disclaimer and quotations. ------------------------------ Date: Wed, 30 Jul 2008 13:02:06 -0400 From: norm.raphael@metso.com Subject: Would someone give me a pinout pointer, please. Message-ID: This is a multipart message in MIME format. --=_alternative 005D915C85257496_= Content-Type: text/plain; charset="US-ASCII" I need the pinouts from the flatwire (from a DECserver-200 Harmonica) MMJ to the adapter into a DEC LG31 RS232 Male 2-8,20 so adapter connector end is FEMALE. If you can supply the correct Hxxxx-yy number, that would also help. --=_alternative 005D915C85257496_= Content-Type: text/html; charset="US-ASCII"

I need the pinouts from the flatwire (from a DECserver-200 Harmonica) MMJ to the adapter into a DEC LG31 RS232 Male 2-8,20 so adapter connector end is FEMALE.

If you can supply the correct Hxxxx-yy number, that would also help. --=_alternative 005D915C85257496_=-- ------------------------------ Date: Wed, 30 Jul 2008 10:59:40 -0700 (PDT) From: BHall Subject: Re: Would someone give me a pinout pointer, please. Message-ID: <25890ab9-31c3-41c6-899d-d60b782f4940@e39g2000hsf.googlegroups.com> On Jul 30, 12:02=A0pm, norm.raph...@metso.com wrote: > I need the pinouts from the flatwire (from a DECserver-200 Harmonica) MMJ > to the adapter into a DEC LG31 RS232 Male 2-8,20 so adapter connector end > is FEMALE. > If you can supply the correct Hxxxx-yy number, that would also help. Pinouts for some DECconnect adapters can be found here: http://h71000.www7.hp.com/wizard/padapters.html#BC16E I would suggest the H8575-A as a starting point, although I have no practical knowledge of the LG31. Bill ------------------------------ Date: Wed, 30 Jul 2008 14:43:34 -0400 From: "Richard B. Gilbert" Subject: Re: Would someone give me a pinout pointer, please. Message-ID: norm.raphael@metso.com wrote: > > > I need the pinouts from the flatwire (from a DECserver-200 Harmonica) > MMJ to the adapter into a DEC LG31 RS232 Male 2-8,20 so adapter > connector end is FEMALE. > If you can supply the correct Hxxxx-yy number, that would also help. The DEC MMJ to DB-25M is H8575-E. HTH ------------------------------ Date: Wed, 30 Jul 2008 20:37:46 -0700 (PDT) From: Hein RMS van den Heuvel Subject: Re: Would someone give me a pinout pointer, please. Message-ID: <65645918-1a5b-4c4d-b414-28c79190eaf8@26g2000hsk.googlegroups.com> On Jul 30, 2:43=A0pm, "Richard B. Gilbert" wrote: > norm.raph...@metso.com wrote: > > > I need the pinouts from the flatwire (from a DECserver-200 Harmonica) > > MMJ to the adapter into a DEC LG31 RS232 Male 2-8,20 so adapter > > connector end is FEMALE. > > If you can supply the correct Hxxxx-yy number, that would also help. > > The DEC MMJ to DB-25M is H8575-E. > > HTH What do you mean with "2-8,20" ? Table 4-1 in the following manual descibribes the pinout for a 25-pin serial connector http://www.xenya.si/sup/info/digital/MDS/jun99/Cd3/PRINTER/LG31EIN2.PDF ps... I have an excess H8575-A, and maybe an -E if I dig deeper in the treasure chest, Email me a street address and I'l put one in the Mail. Hein. ------------------------------ Date: 31 Jul 2008 14:27:43 GMT From: VAXman- @SendSpamHere.ORG Subject: Re: Would someone give me a pinout pointer, please. Message-ID: <4891cbde$0$5004$607ed4bc@cv.net> In article <65645918-1a5b-4c4d-b414-28c79190eaf8@26g2000hsk.googlegroups.com>, Hein RMS van den Heuvel writes: >On Jul 30, 2:43=A0pm, "Richard B. Gilbert" >wrote: >> norm.raph...@metso.com wrote: >> >> > I need the pinouts from the flatwire (from a DECserver-200 Harmonica) >> > MMJ to the adapter into a DEC LG31 RS232 Male 2-8,20 so adapter >> > connector end is FEMALE. >> > If you can supply the correct Hxxxx-yy number, that would also help. >> >> The DEC MMJ to DB-25M is H8575-E. >> >> HTH > >What do you mean with "2-8,20" ? Pins 2-8 and 20 of a DB25 connector. 2-8, 20 is 8 pins but on an MMJ, there are only 6 conductors and the center 2 conductors are grounds. As I recall, there's a TX pair, RX pair, DSR and DTR on the MMJ. -- VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)COM ... pejorative statements of opinion are entitled to constitutional protection no matter how extreme, vituperous, or vigorously expressed they may be. (NJSC) Copr. 2008 Brian Schenkenberger. Publication of _this_ usenet article outside of usenet _must_ include its contents in its entirety including this copyright notice, disclaimer and quotations. ------------------------------ Date: Thu, 31 Jul 2008 13:50:02 -0700 (PDT) From: johnwallace4@gmail.com Subject: Re: Would someone give me a pinout pointer, please. Message-ID: <8a0ca148-c090-431e-84cb-679eae53d470@k13g2000hse.googlegroups.com> On Jul 31, 4:37 am, Hein RMS van den Heuvel wrote: > On Jul 30, 2:43 pm, "Richard B. Gilbert" > wrote: > > > norm.raph...@metso.com wrote: > > > > I need the pinouts from the flatwire (from a DECserver-200 Harmonica) > > > MMJ to the adapter into a DEC LG31 RS232 Male 2-8,20 so adapter > > > connector end is FEMALE. > > > If you can supply the correct Hxxxx-yy number, that would also help. > > > The DEC MMJ to DB-25M is H8575-E. > > > HTH > > What do you mean with "2-8,20" ? > > Table 4-1 in the following manual descibribes the pinout for a 25-pin > serial connector > > http://www.xenya.si/sup/info/digital/MDS/jun99/Cd3/PRINTER/LG31EIN2.PDF > > ps... I have an excess H8575-A, and maybe an -E if I dig deeper in the > treasure chest, > Email me a street address and I'l put one in the Mail. > > Hein. Re: What do you mean with "2-8,20" ? The minimum you need to know about 25way RS232 pinouts (with apologies): Pins 2 and 3 are TX and RX, it may not matter which is which. Usually connect pin 2 at one end of the lead to pin 3 at the other (ie two conductors). Occasionally it needs 2->2 and 3->3 instead of 2->3 and 3- >2. Pins 4 and 5 are RTS and CTS. At each end, just link them together, usually no need to cable them all the way through. Pins 6,8,20 are DTR, DSR, and DCD. Again, at each end, just link them together. 7 is ground, needs to be cabled from one end to the other (interesting things may happen if you don't). Hence 2-8, 20. RTS CTS DTR DSR and DCD are various flavours of hardware status and/or flow control, originally associated with modems, but also occasionally used on relatively slow stuff like printers etc. And occasionally abused for other purposes. A cable like the above will work in many many circumstances, and anything where it doesn't work is beyond the scope of this post. A handy gadget to have in the days of 25pin "DEC nearly-compatible" terminals and printers and the like used to be a back to back 25 way plug and socket with LEDs on the important pins, so you can see status and work out which pins are live outputs. These days probably a PC9pin equivalent would be good. Dunno where you'd get one these days (my 25pin one came from Maplin but I couldn't see one there just now; some improvisation with a pair of connectors and a few LEDs would substitute if they really aren't commercially available any more). Have fun, John ------------------------------ Date: Thu, 31 Jul 2008 18:10:53 -0400 From: "Richard B. Gilbert" Subject: Re: Would someone give me a pinout pointer, please. Message-ID: johnwallace4@gmail.com wrote: > On Jul 31, 4:37 am, Hein RMS van den Heuvel > wrote: >> On Jul 30, 2:43 pm, "Richard B. Gilbert" >> wrote: >> >>> norm.raph...@metso.com wrote: >>>> I need the pinouts from the flatwire (from a DECserver-200 Harmonica) >>>> MMJ to the adapter into a DEC LG31 RS232 Male 2-8,20 so adapter >>>> connector end is FEMALE. >>>> If you can supply the correct Hxxxx-yy number, that would also help. >>> The DEC MMJ to DB-25M is H8575-E. >>> HTH >> What do you mean with "2-8,20" ? >> >> Table 4-1 in the following manual descibribes the pinout for a 25-pin >> serial connector >> >> http://www.xenya.si/sup/info/digital/MDS/jun99/Cd3/PRINTER/LG31EIN2.PDF >> >> ps... I have an excess H8575-A, and maybe an -E if I dig deeper in the >> treasure chest, >> Email me a street address and I'l put one in the Mail. >> >> Hein. > > Re: What do you mean with "2-8,20" ? > > The minimum you need to know about 25way RS232 pinouts (with > apologies): > > Pins 2 and 3 are TX and RX, it may not matter which is which. Usually > connect pin 2 at one end of the lead to pin 3 at the other (ie two > conductors). Occasionally it needs 2->2 and 3->3 instead of 2->3 and 3- >> 2. > > Pins 4 and 5 are RTS and CTS. At each end, just link them together, > usually no need to cable them all the way through. > > Pins 6,8,20 are DTR, DSR, and DCD. Again, at each end, just link them > together. > > 7 is ground, needs to be cabled from one end to the other (interesting > things may happen if you don't). > > Hence 2-8, 20. > > RTS CTS DTR DSR and DCD are various flavours of hardware status and/or > flow control, originally associated with modems, but also occasionally > used on relatively slow stuff like printers etc. And occasionally > abused for other purposes. > > A cable like the above will work in many many circumstances, and > anything where it doesn't work is beyond the scope of this post. > > A handy gadget to have in the days of 25pin "DEC nearly-compatible" > terminals and printers and the like used to be a back to back 25 way > plug and socket with LEDs on the important pins, so you can see status > and work out which pins are live outputs. These days probably a PC9pin > equivalent would be good. Dunno where you'd get one these days (my > 25pin one came from Maplin but I couldn't see one there just now; some > improvisation with a pair of connectors and a few LEDs would > substitute if they really aren't commercially available any more). The gadget you describe above is known as a "breakout box". The better ones have bipolar LEDs for each pin and DIP switches to connect or disconnect each pin and jumper wires that can be used to connect pin X on one side to pin Y on the other side. Mine runs on a 9V battery, others may use AA cells. I don't know if they are still made and sold, RS-232 serial interfaces are no longer as popular as they used to be! Mine will be pried from my cold dead hands. . . . ------------------------------ Date: Sat, 02 Aug 2008 14:29:20 +0100 From: me Subject: [VMS] Several VMS manuals - Guide to DCL / System procedures etc - VMS V4.nn / Message-ID: <9fm894pbda3rfaj500h1kjie9100k5qbh2@4ax.com> Hello I am clearing out my office and have found 2 ring binders containing the following manuals for VMS 4.0 / 4.4 Ring binder one Interdiction to VAX/ VMS system routines - AA-Z500B-TE (april 86) VAX/VMS Command Definition Utility reference Manual AA-Z408A-TE (Sept 1984) Guide to VMS text processing (formatting files with DSR) Ring binder two Guide to using VMS Command Procedures AA-LA11A-TE (VMS 5.0 dated April 1988) VMS DCL Concepts Manual AA-LT10A-TE (VMS 5.0 dated April 1988) and separate manuals as follows - all are for VMS 5.0 VMS Command definition manual VMS command Liberian Utility manual VMS Message Utility manual VMS Sumslp Utility manual Any one interested and willing to collect from Sidcup Kent UK (Postal code DA14) drop an email to dpn_vms (at sign) fruzz - dot - com (also posted to comp.os.vms) Regards ------------------------------ End of INFO-VAX 2008.419 ************************