[Info-vax] probably a simple issue...
Paul Sture
nospam at sture.ch
Mon Feb 17 11:30:30 EST 2014
On 2014-02-17, Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
> On 2014-02-17 12:18:01 +0000, Simon Clubley said:
>
>> On 2014-02-17, cyberdefensedave at gmail.com <cyberdefensedave at gmail.com> wrote:
>>>
>>> Hmmm... In the process of fixing this all I somehow have ended up with the
>>> password to System on the 1.2 being changed, though I can still log into the
>>> 1.3 host... What's really weird about it is that I didn't touch sysuaf.dat.
>>>
>>
>> Do you _know_ it's been changed or have you triggered breakin evasion
>> and are assuming the password has been changed because you cannot login
>> ?
>
> A reboot would work. Or try a different login and see if that works.
>
> V7.3 is ancient, and predates the cluster-wide evasion support IIRC,
> which means that repeated entry of a bad password on one host in the
> cluster is a distinct possibility.
According to the table found at the URL below, it was introduced in
V7.3:
"VMS Intrusion Detection expands to be cluster-wide"
<http://h71000.www7.hp.com/openvms/os/openvms-release-history.html>
text version at:
<http://h71000.www7.hp.com/openvms/os/openvms-release-history.txt>
--
Paul Sture
More information about the Info-vax
mailing list