Internet Express for Tru64 UNIX Version 6.8 Release Notes (14235)

Table Of Contents
3 PostgreSQL Data Storage Format
The internal data storage format changed starting with the version of PostgreSQL that was
included with Internet Express Version 6.1. This change requires existing databases to be backed
up before removing an existing installation and restored after the new installation is completed.
The installation procedure will detect if you have an IAEPSQL subset from an earlier version of
Internet Express installed and will back up and restore your data automatically while upgrading
PostgreSQL. The migration of data provided by PostgreSQL does not handle partial indices or
large objects. This data will need to be migrated manually.
After the upgrade from Internet Express Version 6.5 or 6.4 is complete, you must verify that your
databases have been migrated successfully. A copy of previous pgsql/data directory is located
at /usr/internet/pgsql/data.preIAE6xx and the output of the database dump, performed
during update, is saved at /usr/internet/pgsql/dumpout.IAExxx.restored. Once you
have verified your new databases, these files may be removed.
If you delete your previous installation separately (not recommended), you need to manually
back up and restore your data.
For more information, see the PostgreSQL documentation at the following Web site:
http://www.postgresql.org
4 Dante SOCKS Server Startup Requirements
The Dante SOCKS server will not start until you specify the internal and external addresses to
use in the /etc/sockd.conf file. Look for and uncomment the lines like these:
#internal: 10.1.1.1 port = 1080
#external: 192.168.1.1
Change the addresses to the actual IP addresses of your system's network interfaces. To be able
to use the SOCKS server, you will also need to specify valid information for the “method,” “client
pass,” and “pass” fields in /etc/sockd.conf. See the sockd(8) reference page.
5 Denying Hosts Using Link-Local IPv6 Addresses
If you have configured an IPv6 subnet using only link-local addresses for host names, TCP
Wrapper will not deny client access from IPv6 hostnames specified in the /etc/hosts.allow
file unless the host name includes the interface extension for the local link. For example, to deny
all telnet connects to telnetd from IPv6 host myhost.mydomain.com configured on interface
tu0, you must enter the following in /etc/hosts.allow:
telnetd:myhost.mydomain.com%tu0:DENY
6 Vacation Mail Not Supported With Cyrus IMAP
The Vacation Mail feature available to users via the User Self-Administration interface does not
work for Cyrus IMAP users. This is because Cyrus IMAP does not currently support the use of
Procmail as a delivery agent. Users attempting to enable this feature will find their settings
ignored, and that no auto-reply messages will be sent. It is therefore suggested that the Vacation
Mail group under the User Self-Administration interface be disabled if your users consist primarily
of Cyrus IMAP users. See the Administration Guide for instructions on disabling this feature.
7 Sendmail CPU Utilization in a Multinode Cluster
Due to a threading issue in HP Tru64 UNIX Version 5.1a, Sendmail can drive CPU utilization to
nearly 100 percent on some of the cluster nodes. To fix this problem, please apply the appropriate
patch found at the following URL:
http://www1.itrc.hp.com/service/index.html
4