[Info-vax] probably a simple issue...

Paul Sture nospam at sture.ch
Mon Feb 17 11:30:30 EST 2014


On 2014-02-17, Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
> On 2014-02-17 12:18:01 +0000, Simon Clubley said:
>
>> On 2014-02-17, cyberdefensedave at gmail.com <cyberdefensedave at gmail.com> wrote:
>>>
>>> Hmmm...  In the process of fixing this all I somehow have ended up with the
>>> password to System on the 1.2 being changed, though I can still log into the
>>> 1.3 host...  What's really weird about it is that I didn't touch sysuaf.dat.
>>>
>>
>> Do you _know_ it's been changed or have you triggered breakin evasion
>> and are assuming the password has been changed because you cannot login
>> ?
>
> A reboot would work.   Or try a different login and see if that works.
>
> V7.3 is ancient, and predates the cluster-wide evasion support IIRC,
> which means that repeated entry of a bad password on one host in the
> cluster is a distinct possibility.

According to the table found at the URL below, it was introduced in
V7.3:

"VMS Intrusion Detection expands to be cluster-wide"

<http://h71000.www7.hp.com/openvms/os/openvms-release-history.html>

text version at:

<http://h71000.www7.hp.com/openvms/os/openvms-release-history.txt>

--
Paul Sture



More information about the Info-vax mailing list