Patch Name: PHSS_17692 Patch Description: s700_800 10.24 VirtualVault 3.50 TGP patch Creation Date: 99/03/03 Post Date: 99/03/15 Hardware Platforms - OS Releases: s700: 10.24 s800: 10.24 Products: VirtualVault A.03.50 US/Canada Release; VirtualVault A.03.50 International Release Filesets: VaultTGP.TGP-CORE Automatic Reboot?: No Status: General Superseded Critical: No Path Name: /hp-ux_patches/s700_800/10.X/PHSS_17692 Symptoms: PHSS_17692: There is no way to run an application server that requires a platform other than VVOS, including those that require HP-UX 11.0. Currently there is a demand from customers for VirtualVault that will act as a front-end to provide security for such services, but the current implementation of the Trusted Gateway Proxy (TGP) prevents this type of configuration. The TGP requires that a server be local to the VirtualVault. Defect Description: PHSS_17692: The TGP does not adequately support communication between a secured plug-in for the Outside NES and a back end server on the Inside network. The TGP configuration should be expanded to only require that one of its communication endpoints be locally initiated on the VirtualVault platform (regardless of sensitivity). SR: 4701417204 Patch Files: /tcb/lib/tgpd /var/opt/vaultTS/inside/vault/bin/tgp-edit /var/opt/vaultTS/inside/vault/loc/C/html/tgp-edit.html what(1) Output: /tcb/lib/tgpd: $Source: src/tgproxy/configuration.c, vaultTGP, vaul tTGP_3.5 $Date: 99/03/03 10:50:34 $ $Revisio n: 1.9 PATCH_10.24 (PHSS_17692) $ $Source: src/tgproxy/proxy.c, vaultTGP, vaultTGP_3.5 $Date: 99/03/03 10:50:34 $ $Revision: 1.11 PATCH_10.24 (PHSS_17692) $ HP VirtualVault, tgpd, revision A.01.01 $Source: src/lib/conf/gpent.c, vaultTGP, vaultTGP_3. 5 $Date: 99/03/03 10:50:36 $ $Revision: 1.7 PATCH_10.24 (PHSS_17692) $ src/lib/conf/gpent.c, vaultTGP, vaultTGP_3.5 1.7 0 3/03/99 $Source: src/lib/conf/if_info.c, vaultTGP, vaultTGP_ 3.5 $Date: 99/03/03 10:50:37 $ $Revision: 1. 6 PATCH_10.24 (PHSS_17692) $ lib/libsecurity/identity.c, libsecurity_util, vvos_d avis, davis26 $Date: 97/10/01 15:16:15 $ $Re vision: 1.8 PATCH_10.24 (PHCO_11251) $ lib/libsecurity/mandlib.c, libsecurity_macilb, vvos_ davis, davis26 $Date: 97/10/01 15:16:16 $ $R evision: 1.17 PATCH_10.24 (PHCO_11251) $ lib/libsecurity/privileges.c, libsecurity_util, vvos _davis, davis26 $Date: 97/10/01 15:16:17 $ $ Revision: 1.1.1.12 PATCH_10.24 (PHCO_11251) $ lib/libsecurity/authaudit.c, libsecurity_audit, vvos _davis, davis26 $Date: 97/10/01 15:16:11 $ $ Revision: 1.21 PATCH_10.24 (PHCO_11251) $ lib/libsecurity/sec_conf.c, libsecurity_util, vvos_d avis, davis26 $Date: 97/10/01 15:18:19 $ $Re vision: 1.5 PATCH_10.24 (PHCO_11251) $ lib/libsecurity/sec_nls.c, libsecurity, vvos_davis, davis60 $Date: 97/10/01 16:00:20 $ $Revision : 1.1.1.4 PATCH_10.24 (PHCO_12734) $ Internal_Unsupported_Version libc.a_ID@@/main/r10dav /libc_dav/15 /ux/libc/libs/libc/archive_pa1/libc.a_ID Jul 18 1997 15:26:17 /var/opt/vaultTS/inside/vault/bin/tgp-edit: $Source: src/admin/cgi/tgp-edit/tgp-edit.c, vaultTGP , vaultTGP_3.5 $Date: 99/03/03 10:50:35 $ $R evision: 1.9 PATCH_10.24 (PHSS_17692) $ HP VirtualVault, tgp-edit, revision A.01.00 $Source: src/lib/conf/gpent.c, vaultTGP, vaultTGP_3. 5 $Date: 99/03/03 10:50:36 $ $Revision: 1.7 PATCH_10.24 (PHSS_17692) $ src/lib/conf/gpent.c, vaultTGP, vaultTGP_3.5 1.7 0 3/03/99 $Source: src/lib/conf/port.c, vaultTGP, vaultTGP_3.5 $Date: 99/03/03 10:50:36 $ $Revision: 1.7 P ATCH_10.24 (PHSS_17692) $ $Source: src/lib/conf/if_info.c, vaultTGP, vaultTGP_ 3.5 $Date: 99/03/03 10:50:37 $ $Revision: 1. 6 PATCH_10.24 (PHSS_17692) $ /var/opt/vaultTS/inside/vault/loc/C/html/tgp-edit.html: src/admin/html/tgp-edit.html, vaultTGP, vaultTGP_3.5 1.6 03/03/99 -- cksum(1) Output: 4136328505 533972 /tcb/lib/tgpd 227754267 65754 /var/opt/vaultTS/inside/vault/bin/tgp-edit 1424585011 27159 /var/opt/vaultTS/inside/vault/loc/C/html/ tgp-edit.html Patch Conflicts: None Patch Dependencies: None Hardware Dependencies: None Other Dependencies: None Supersedes: None Equivalent Patches: None Patch Package Size: 670 KBytes Installation Instructions: Please review all instructions and the Hewlett-Packard SupportLine User Guide or your Hewlett-Packard support terms and conditions for precautions, scope of license, restrictions, and, limitation of liability and warranties, before installing this patch. ------------------------------------------------------------ 1. Back up your system before installing a patch. 2. Login as root. 3. Copy the patch to the /tmp directory. 4. Move to the /tmp directory and unshar the patch: cd /tmp sh PHSS_17692 5a. For a standalone system, run swinstall to install the patch: swinstall -x autoreboot=true -x match_target=true \ -s /tmp/PHSS_17692.depot 5b. For a homogeneous NFS Diskless cluster run swcluster on the server to install the patch on the server and the clients: swcluster -i -b This will invoke swcluster in the interactive mode and force all clients to be shut down. WARNING: All cluster clients must be shut down prior to the patch installation. Installing the patch while the clients are booted is unsupported and can lead to serious problems. The swcluster command will invoke an swinstall session in which you must specify: alternate root path - default is /export/shared_root/OS_700 source depot path - /tmp/PHSS_17692.depot To complete the installation, select the patch by choosing "Actions -> Match What Target Has" and then "Actions -> Install" from the Menubar. 5c. For a heterogeneous NFS Diskless cluster: - run swinstall on the server as in step 5a to install the patch on the cluster server. - run swcluster on the server as in step 5b to install the patch on the cluster clients. By default swinstall will archive the original software in /var/adm/sw/patch/PHSS_17692. If you do not wish to retain a copy of the original software, you can create an empty file named /var/adm/sw/patch/PATCH_NOSAVE. Warning: If this file exists when a patch is installed, the patch cannot be deinstalled. Please be careful when using this feature. It is recommended that you move the PHSS_17692.text file to /var/adm/sw/patch for future reference. To put this patch on a magnetic tape and install from the tape drive, use the command: dd if=/tmp/PHSS_17692.depot of=/dev/rmt/0m bs=2k Special Installation Instructions: The patch installation replaces the Trusted Gateway Proxy Daemon (tgad) as well the tgp-edit CGI program. The TGP Daemon processes may be stopped during patch installation.