[Info-vax] VSI and Process Software announcement
David Froble
davef at tsoft-inc.com
Fri Sep 23 17:08:16 EDT 2016
Stephen Hoffman wrote:
> On 2016-09-23 18:49:54 +0000, Paul Sture said:
>
>> On 2016-09-23, David Froble <davef at tsoft-inc.com> wrote:
>>> Bob Koehler wrote:
>>>> In article <32d1c9c9-97a7-45ca-9f90-f769da2a53c7 at googlegroups.com>,
>>>> IanD <iloveopenvms at gmail.com> writes:
>>>>> I assume when they mean 'older stack' they are meaning TCPIP Services?
>>>>>
>>>> Yes, the one many of us still stubbornly refer to as UCX, is what I
>>>> assumed, too. What other 'older stack' would VSI have, that they
>>>> could plan its demise?
>>>
>>> Got to wonder why you are stubborn. UCX was the product prior to
>>> TCP/IP V5.
>>> The TCP/IP V5 stuff came from the T64 product. Not UCX.
>
> UCX was the prefix. The product name has been TCP/IP Services for a
> very long time. There's all sorts of history and baggage here, too —
> both organizational and technical...
>
> We're probably also going to get to go through yet another facility
> prefix change with this new VSI work, but that's fodder for some future
> discussion...
>
>> The user interface stayed much the same as UCX V4 though.
>>
>> When I first heard that the Tru64 version was being "imported" I was
>> kind of hoping for a better interface, albeit not one "too Unixy", but
>> that didn't happen.
>
> Looking forward to 2020 and beyond, rather than looking at back...
>
> Get DHCP working out of the box. OpenVMS boots up, requests a DHCP
> address, and allows (only) remote-management connections, and an ssh
> server. Generate a system password based on the server serial number.
> That's available on Itanium. Maybe use the MAC address if there's no
> serial number set or if the x86 box has no serial number, but that ends
> up being far too obvious. This to allow full remote management on
> first boot, right after installing the bits. Get SNMPv3 working, and
> also certificate-protected TNT/Argus, and ssh as part of this
> configuration. (Want to play in the cloud, or in a VM or a hosted data
> center or such? You can't always assume and can't depend on having a
> hardware console, and remote access to same...)
>
> Load common root certificates as part of the install. Mozilla via curl
> or however y'all choose to do that. Preferably also one set of
> directories for certificates, and not having them scattered around
> Apache and SSL and SSL1 and who-knows-where-else...
>
> Always create all server directories, using consistent and reserved
> UICs. Offer to migrate the existing morass over to consistent users
> and UICs during an OpenVMS upgrade. There's no point in not creating
> all of this stuff, and no reason not to load templates or whatever other
> pieces are needed. Allow the system manager the choice of which
> services to start or not, via a consistent command interface and also
> available via a callable API. But don't add all the complexity of
> checking for directories and users and the rest, both for the VSI folks
> and services, and for the ISVs and developers. It's always there,
> it's always consistent. We aren't on VAX boxes and we aren't on 456MB
> disks, after all.
>
> (This UIC mess shouldn't even exist. It's a throwback to RSX-11M and a
> very old and very limited world-view. Use UUIDs here. This avoids
> most of the messes of UICs, including collisions. Allow users and
> applications and application bundles to have associated UUIDs. UUIDs
> and work toward containers properly applied also get away from the mess
> that is facility prefixes. Obviously out of scope for IP work. This
> is part of the authentication overhaul, and toward more modern and
> modular application management.)
>
> Install Apache as part of the base distro.
>
> Install LDAP and particularly LDAP server as part of the base distro.
> This in preparation of hauling the whole cluster management and
> authentication morass forward to this millennium.
>
> Get the configuration morass under control. That isn't a combination
> of a command-line tool, a DCL menu, and a plethora of rustic, artisanal
> configuration files. Pick one, preferably a replacement for the
> command line tool. The menu morass is for a variety of reasons, but
> then there's also no in-built menu-generation tools. Allowing OpenVMS
> users to avoid having to roll their own and wildly inconsistent menus —
> some use ^Z, some use QUIT, some EXIT, some use 9 or 99, some others use
> who-knows-what-else. I don't care if this is DCL — well, I'd prefer it
> not be or not require DCL — or some other scripting language, or some
> other tool. But the lack of this interface means that everybody does
> configuration tools differently...
>
> Get ftp and telnet out of the default configurations and menus, and make
> folks work to enable those, and any other insecure transports, services
> or tools. Lead folks to ssh, sftp, and related. Get DECnet out of the
> default install path, and for the same reasons. Don't enable stupid
> choices.
>
> Disable all network services that are incompatible with DHCP, whenever
> DHCP is enabled.
>
> Make IP cluster aware, such that you're really configuring the cluster
> akin to one host — there are still some advantages to clustering on
> OpenVMS, but the scatter-shot cluster management stinks and definitely
> makes the whole clustering implementation far less desirable — including
> automatically finding and sharing configuration data. (This likely
> ties into LDAP, though there are other ways to do this.)
>
> Don't use RMS indexed files for TCP/IP Services configuration data.
> Use SQLite databases or something that makes particularly rolling
> upgrades less complex, less constrained, and less hack-ish. Preferably
> use one file, not the usual blizzard of files. Maybe give OpenVMS
> directories that specifically store configuration data for cluster-wide,
> system-wide, application-specific and user-specific activities, but
> that's quite possibly out of scope of any IP stack work.
>
> That's off the top... There's rather more work here, to bring OpenVMS
> up to what's increasingly expected, and what will be expected 2020 and
> beyond...
>
>
You just want to take all the "fun" out of running a VMS system ....
:-)
More information about the Info-vax
mailing list