Sponsored Content
Full Discussion: AIX OS upgrade gone wrong
Operating Systems AIX AIX OS upgrade gone wrong Post 302226097 by morgan_g on Monday 18th of August 2008 07:59:43 AM
Old 08-18-2008
Thanks for the replies - will follow up
 

10 More Discussions You Might Find Interesting

1. AIX

HELP for AIX 4.3 upgrade to 5.3

Hi guys I have joined a new department and one of my tasks is to investigate the feasibility of upgrading our current AIX v 4.3 to V5.3. I do not know anything about AIX and any actual work will be done by an outside consultant until such time as I have built up my own knowledge. The system we... (3 Replies)
Discussion started by: JDM
3 Replies

2. UNIX for Dummies Questions & Answers

AIX ML upgrade

Hello everyone, I have to do a ML upgrade on AIX 5.2 from 01 to 09 this is the first time iam going to do it. are there any command i have to keep in mind?? thanks! (1 Reply)
Discussion started by: karthikosu
1 Replies

3. UNIX for Dummies Questions & Answers

AIX Upgrade

Does anyone know any gotcha's on upgrading AIX from 5.1 to 5.3? Any interim steps on needs to do or ??? (3 Replies)
Discussion started by: capeme
3 Replies

4. AIX

AIX Upgrade 5.2 to 5.3

I have an IBM P520 that I need to upgrade from 5.2 to 5.3. My background in Unix is from 15 years ago so I don't remember much. IBM documentation is hard to find. Any help would be appreciated. (1 Reply)
Discussion started by: bashtonmcse
1 Replies

5. AIX

UDB 9.5 upgrade from 8.2 on AIX 5.3

We are going from UDB DPF 8.2 to 9.5 and changing HW from P4+ to P6 and moving from 5.2 to 5.3. Anyone out there gone through this upgrade? Any words of wisdom, warnings, or other gotchas you could pass on. TIA. ART (0 Replies)
Discussion started by: ArtF
0 Replies

6. AIX

Upgrade from AIX 5.3 to 6.1

Hello Folks, i am facing some weired issues. case is like this :- initially i was on AIX 5.3 i have installed filesets related to my application and those were in APPLY state.(COMMIT is set as NO) Then i have taken lslpp -l| grep -i <apps name> in that i confirmed whether the filesets are... (1 Reply)
Discussion started by: harsh_mulay
1 Replies

7. AIX

How to upgrade AIX Firmware & TL Maintenance Level in AIX

Steps to upgrade AIX TL ( technology Level ) / Maintenance Level in AIX ( including Firmware HMC VIOS ) This article or post covers upgrades for - Hardware Management Console ( HMC ) - Firmware ( also known as microcode ) - VIO ( Virtual I/O Server = PowerVM ) - AIX Version, Technology... (2 Replies)
Discussion started by: filosophizer
2 Replies

8. AIX

AIX upgrade

i upgrade aix ml 5.3.2.1 to 5.3.2.2 but when running commnd #oslevel -r shows out put, again 5.3.2.1-- where should i chek??? 2-can any one tell me when mknfs command run which files get updated?? (2 Replies)
Discussion started by: nayyer
2 Replies

9. AIX

Upgrade AIX 5.3 to AIX6.1

Dear Guys .. I'm going to Upgrade one of the servers AIX 6.1 I want to stop rootvg mirror to save the mirror then upgrade to AIX 6.1 this is to help me in rollback if something goes wrong but .. can anyone help me how to make sure that system is relay mirrored and how to know that second... (10 Replies)
Discussion started by: top.level
10 Replies

10. AIX

How do I upgrade AIX 7.1.0.3 to 7.1.3.3 without using NIMserver??

Hello Everyone. I am trying to upgrade one of my servers which is AIX 7.1.0.3 to AIX 7.1.3.3. I have downloaded the fix packs and stored in /tmp/TL3SP3 directory. I ran inutoc .; bffcreate -ad; inutoc . then smitty installp I get an error like this Verifying requisites... ... (11 Replies)
Discussion started by: gorkhali
11 Replies
oidentd.conf(5) 						File Formats Manual						   oidentd.conf(5)

NAME
oidentd.conf - The oidentd configuration file. DESCRIPTION
The oidentd configuration file is used to specify the amount of control users have over the responses oidentd returns upon successful lookups for connections owned by them. The $HOME/.oidentd.conf file allows a user to specify what ident response will be returned for specific connections. /etc/oidentd.conf SYNTAX USER DIRECTIVE The oidentd.conf file consists of 0 or more user directives. The user directive is used to grant capabilities on a per-user basis. The user directive has the following syntax: default { <range directive> } OR user <username> { <range directive> } The default directive matches all users for whom rules are not defined. There should only be one default directive, and it should be the first statement in the file. All entries for users defined after the default definition will inherit the capabilities of the default user. Capabilities can then be allowed, denied, or forced on a per-user basis by way of the user statement followed by the username of the user to whom the properties that follow will apply. RANGE DIRECTIVE The body of a user directive consists of 1 or more range directives. The range directive is used to specify a host/port range for which a set of capabilities is binding. A range directive consists of 1 or more statements of the following form: default { <capability directive> } OR to <host> lport <lport> from <host> fport <fport> { <capability directive> } The default directive matches all host/port pairs for which rules are not defined. There should only be one default directive, and it should be the first statement in the block. Anywhere from 1 to all 4 of the to, lport, from, and fport parameters may be specified. The to parameter is used to specify the address to which a connection is made. The from parameter is used to specify the address from which a connection originates. It may be useful to specify this address when a system has more than 1 IP address. The to and from parameters take either an IP address or a hostname argument. The lport parameter is used to specify the local port from which a connection originates. The fport parameter is used to specify the destination port of a connection. The lport and fport parameters take either a port or a port range. Ports can be specified numerically (e.g. 113) or by giving a ser- vice name (e.g. "auth"). Ranges of ports take the form <starting port>:<ending port>. The ending port is optional. If the ending port is omitted, the range is taken to be any port greater than or equal to the starting port. The omission of any of the to, lport, from and fport parameters acts like a wildcard for that parameter. For example, the statement "from localhost" matches all connections from localhost on any port to any host on any port. CAPABILITY DIRECTIVE The body of a range directive consists of one or more capability directives. Capabilities are used to assign or deny privileges to specific users. Valid capabilities inside user directives are allow, deny, andforce. The capability directive consists of one or more statements of the form: allow OR deny OR force <capability>. The capability argument must be one of the capabilities described in the capability section below. The force action takes a third argument when the capability is reply. For example, force reply "randomuser". $HOME/.oidentd.conf SYNTAX A user's .oidentd.conf configuration file may contain 0 or more of the following statements: global { <capability> } OR <range directive> { <capability> } The global directive acts as a wildcard, matching all connections, so if used at all, the global directive should be the first entry in the file and should be used only once. Use is permitted anywhere in the file and infinitely many times, however it doesn't make much sense to use it in this manner. The range directive has the same syntax and semantics as the range directive in the /etc/oidentd.conf file. See above for a description. Valid capabilities are reply, random, numeric, random_numeric, and hide. Descriptions can be found below. CAPABILITIES
spoof Allow spoofed ident responses; allow the user to specify a string of her choosing as the ident reply. The only restriction on the spoofed response is that it must not be the username of another user. When a user spoofs her ident reply, the login name of the user is recorded along with the forged reply. This capability does not apply to the force action. spoof_all Allow the usernames of other users to be used as ident responses. This capability does not apply to the force action. spoof_privport Allow ident replies to be spoofed on privileged ports (ports lower than 1024). This capability does not apply to the force action. reply <string> [<string1> ... <stringN>] Reply to successful ident lookups with the ident response specified in <string>. If more than one string parameter is given, one of the strings will be selected randomly. In a user's $HOME/.oidentd.conf file, up to 20 strings may be specified for a reply statement. In the /etc/oidentd.conf file, there is no limitation on the number of strings that may be specified. The strings must be quoted strings (e.g. "string"). Strings may contain the following escape characters: new line tab carriage return  backspace v vertical tab f form feed a alert (bell) e escape \ backslash NNN The character with the ASCII code NNN in the octal base system. xNNN The character with the ASCII code NNN in the hexadecimal base system. This capability only applies to the force action. hide Hide the user; report a "HIDDEN-USER" error when an ident lookup succeeds. random Reply to successful ident lookups with a randomly generated ident response of consisting of alphanumeric characters. numeric Reply to successful ident lookups with the UID of the user that was looked up. random_numeric Reply to successful with a randomly generated ident response of the form userN, where N is a random number between 0 and 100000. EXAMPLE
/etc/oidentd.conf FILE default { default { deny spoof deny spoof_all deny spoof_privport allow random_numeric allow numeric allow hide } } Grant all users the ability to generate random numeric ident replies, the ability to generate numeric ident replies and the ability to hide their identities on all ident queries. Explicitly deny the ability to spoof ident responses. user root { default { force reply "UNKNOWN" } } Reply with "UNKNOWN" for all successful ident queries for root. user ryan { default { allow spoof allow spoof_all allow random allow hide } from 127.0.0.1 { allow spoof_privport } } Grant the user "ryan" the capability to spoof ident replies, including the ability to use other usernames as ident replies, generate random replies and hide his ident for all connections, and grant the user "ryan" the capability to spoof ident replies to privileged ports (< 1024) on connections originating from the host 127.0.0.1. EXAMPLE $HOME/.oidentd.conf FILE global { reply "unknown" } Reply with "unknown" to all successful ident lookups. to irc.example.org { reply "example" } Reply with "example" to ident lookups for connections to irc.example.org. AUTHOR
Ryan McCabe <ryan@numb.org> http://dev.ojnk.net SEE ALSO
oidentd(8) oidentd_masq.conf(5) version 2.0.8 13 Jul 2003 oidentd.conf(5)
All times are GMT -4. The time now is 09:09 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy