| Hi Ian,
>> When I ran the MCC_STARTUP_DNA4_EVL.COM file , I had the following
>> errors:-
>> DELETE NODE4 MCCDUF OBJECT TASK
>> No Privilege to Perform directive at Node.
>> CREATE NODE4 MCCDUF OBJECT TASK NUMBER 0
>> No Privilege to Perform directive at Node.
>> To get around this problem , I have used by user=xxxxx , by
>> password=xxxx
In general, DNA4 commands requires to
1) be able to connect to its NML object over the network
2) have privileges to perform modify or action commands to the
requested entity.
If you do not wish to use "by user,by password" qualifier, you can
use proxy to a privileged account to perform these commands.
For enabling local sink monitor, additional "default" privileges of
DETACH,SYSNAM,TMPMBX,NETMBX,SYSPRV are required.
>> The other Error has'nt been solved:-
>> "Internal Error in DECnet Phase IV AM".
Which command did you use to get this error? If the command is
ENABLing local sink monitor, this is a known bug. The problem has
been addressed and fixed.
|
|
> You say that the problem is fixed - but where can I get the fix from?
At the moment, when someone posts an answer like "it has been fixed"
they mean the code has been corrected and tested in a private executable.
However, these executables are NOT compatable with the field test kit,
and unfortunately we can't take the time to support private distributions
without impacting our SSB date.
We are still considering when to distribute an internal field test update.
-- Erik
|
| to .1
>> CREATE NODE4 MCCDUF OBJECT TASK NUMBER 0
This assumes there is a default decnet access defined at executor level
NCP> set executor nonpriv user xxx nonpriv password yyy
Since VMS V5.3, netconfig.com asks you whether you want such a default access
and anyone a little conscious with security will answer NO to this question
> If you do not wish to use "by user,by password" qualifier, you can
> use proxy to a privileged account to perform these commands.
Using by user and by password ... Does this imply to write a username/password
combination in a command file ???? to a privileged account ??? Have you ever
heard of favourite weaknesses exploited by hackers to gain control over a
system ?
As there is currently no node authentication whithin Decnet, proxy mechanism can
be very easily screwed up by node masquerading. Therefore any proxy to a
privileged account is at high risk and should never be allowed/recommended.
I hope you will never recommend such a solution at a customer site.
Please provide an workable solution that would not involve Digital's liability.
Pierre
|