[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference turris::digital_unix

Title:DIGITAL UNIX(FORMERLY KNOWN AS DEC OSF/1)
Notice:Welcome to the Digital UNIX Conference
Moderator:SMURF::DENHAM
Created:Thu Mar 16 1995
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:10068
Total number of notes:35879

8986.0. "v4.0a erratic lpd behaviour" by NETRIX::"[email protected]" (Kim Roy) Thu Feb 27 1997 13:08

Hi everyone,

Here is my situation:

2 days ago a customer made a grave mistake and did a chmod 770 of the ENTIRE
system!  Because so many problems arised from this, he quickly changed it
to chmod 777 so that people could at least access their accounts.  He did
realize the severity of doing this, but he felt he had no choice (this is 
a university environment with literally thousands of users).  He successfully
restored his root and usr filesystems, but continues to have problems with 
printing.  If he issues an lpr command, he gets the following message:

"lpr: connect: no such file or directory 
 job queued, but cannot start daemon".

If he consequently issues a /sbin/init.d/lpd start all the jobs currently in
the queue will get printed, but the lpd daemon dies immediately after 
having printed what is in the spool queue.  And each time he issues this 
command, he gets the following message logged in his lpr.log:

Feb 26 08:00:00 poplar lpd[883]: lpd started
Feb 26 08:00:00 poplar lpd[889]: admissions: cannot open
/var/spool/lpd5/lp5err:
 No such file or directory
Feb 26 08:00:00 poplar lpd[883]: bind: Address already in use
Feb 26 08:00:04 poplar lpd[887]: central: Daemon filter 'f' terminated (-1)
Feb 26 08:00:04 poplar lpd[887]: central: filter/access error for
dfA116poplar.m
svu.ca

We verified the permissions on the file it is complaining about not being able

to open, and they are  fine.  We noticed that the restore seemed to have 
changed many of the  permissions and owners on various files, so we decided 
to re-install (an update installation) as was done previously after which 
the printing was originally working.  He did the update installation last 
night, and still the exact same problem persists.  

We tried renaming the printcap to see if it contained something that was
preventing the lpd from running, but this was not the case.  He's got about
80 different printers, all printing via LAT and every single one of them
produces the same symptoms.  As a workaround he is issuing a 
/sbin/init.d/lpd  start via cron every 15 min. to ensure that jobs are being
printed.  But this is not acceptable much longer.

Any ideas??  Anyone??  Thanks in advance.
[Posted by WWW Notes gateway]
T.RTitleUserPersonal
Name
DateLines
8986.1Some things to checkNETRIX::"[email protected]"Richard HartThu Feb 27 1997 16:1938
I'm not sure what the problem is, but if the /dev files were changed with the
rest of the system, you may have caused lots of problems. Here are some things
to check:

srwxrwxrwx   1 root     system         0 Feb 24 16:31 /dev/printer

In each spool queue:

-rw-rw----   1 daemon   system       154 Feb 12 11:43 cfA130msdazy.zk3.dec.com
-rw-rw----   1 root     system      3844 Feb 12 11:43 dfA130msdazy.zk3.dec.com
-rw-r--r--   1 root     system         5 Feb 24 16:26 lock
-rw-rw-r--   1 root     system        71 Feb 24 16:26 status

(the first two are examples of a queue file)

An error log file:

-rw-r--r--   1 daemon   daemon         0 Oct 16  1995 /usr/adm/lperr

And when you get these things fixed, a reboot would be a good idea, if you
think
you have fixed enough for it to succeed.

The message of most importance is the one that says "bind: Address already in
use". This means that lpd can not bind to the network socket which would
connect
it to remote lpd's and printers. You may have hung an lpd with the changes
that
you made which is still around and holding ontothe socket. A reboot would fix
this.

Rich Hart.





[Posted by WWW Notes gateway]
8986.2BIGUN::nessus.cao.dec.com::MayneChurchill's black dogThu Feb 27 1997 16:253
Use fverify to check file permissions and ownerships.

PJDM
8986.3He has really stuffed it in the first operationSEPPLT::MARKMark GarrettFri Feb 28 1997 01:0259
The first chmod lost all of the setuid/gid sticky bits.

As just suggested use fverify with fix.
The -y is not usually a good idea but since every file has been affected
the result can not be much worse than it is now. Since the machine has been
up and running esp in a UNI environment with 777 down the tree I would not have
much confidence in the state of security even after running fverify, But this
is a start. They may want to copy the *.inv files from the various CD kits
directories to /usr/.smdb. and rerun the fverify script again this will confirm
that the .inv files have not been fixed to cover other changes. All local
scripts and binaries should then be checked all mount points all checksum
missmatches in the log should be reviewed and replaced . If students have
been any where near this machine while it is wide open then I'm pretty sure
that they will have abused it. Take it off the net before starting the
validation. You will need to get a fresh copy of fverify nothing can be trusted!
If the machine is V4.x at least the CD will be a good source of valid unpacked
binaries. As a further thought if the  machine is 4.x boot from the v4.x CD
get single user  mount the system tree as /root /root/usr /root/var as per
the current fstab run the second script fixcd.sh. Its not pretty nor guarenteed!
It will try and validated kits that are not installed just ignore them. I have
not tried this from the cd fverify will want to log to /var so other problems
may arise. If there is any chance that the system can be restored from backup
then they should do this. I realy hope this is a small unimportant workstation:)


	Cheers
		mark :)
ps.
	Would have been ok with fverify if now one had been near the system
now its its really stuffed.

	GOOD LUCK!


#!/bin/ksh
# fix.sh
# important fverify must be run from root dir
#
cd /

for i in /usr/.smdb./*.lk
do
s=${i%%.lk}
/usr/lbin/fverify -y < $s.inv
done


#!/sbin/sh
# fixcd.sh
#
CDROOT="/"
ROOTMNT="/root"
#
cd $ROOTMNT

for s in $CDROOT/instctrl/*.inv
do
$CDROOT/usr/lbin/fverify -y < $s
done
8986.4LEXSS1::GINGERRon GingerMon Mar 03 1997 09:335
    My customer once did a chmod to 000 for every file on the system. That
    knocked execute off all commands, including chmod!
    
    The only way we could figure to recover this one was total restore from
    tape.