HP Tru64 UNIX and TruCluster Server Version 5.1B-5 Patch Summary and Release Notes (March 2009)

Use edauth to add a harmless field to an account, the exact commands depend
on your editor. For example, pick an account that does not have a vacation set
and add u_vacation_end:
# edauth
s/:u_lock@:/u_vacation_end#0:u_lock@:/
a.
w
q
b. Check to see that the u_vacation_end#0 field was added to the account:
# edauth -g
c. Use edauth to remove the u_vacation_end#0 field from the account.
If the edauth commands fail, do not stop. Continue with the following instructions.
5. Check to see if the problem has been resolved. If it has been resolved, you are
finished.
If you still see the problem, observe the following warning and continue to step
6.
Warning!
Continue with the following steps only if the following conditions are met:
You encountered the described problem while doing a rolling upgrade of a
cluster running Enhanced Security.
You performed all previous steps.
All user authentications (logins) still fail.
6. Disable logins on the cluster by creating the file /etc/nologin:
# touch /etc/nologin
7. Disable the prpasswdd daemon from running on the cluster:
# rcmgr -c set PRPASSWDD_ARGS \
"`rcmgr get PRPASSWDD_ARGS` -disable"
8. Stop the prpasswdd daemon on every node in the cluster:
# /sbin/init.d/prpasswd stop
9. Force a checkpoint of db_checkpoint, using the db_checkpoint command
with the -1 (number 1) option :
# /usr/tcb/bin/db_checkpoint -1 -h /var/tcb/files
Continue with the instructions even if this command fails.
10. Delete the files in the dblogs directory:
# rm -f /var/tcb/files/dblogs/*
11. Force a change to the auth database, as follows:
212 TruCluster Server Patches