Internet Express for Tru64 UNIX Version V6.10 Release Notes (5900-1419, March 2011)

PostgreSQL Data Storage Format
The internal data storage format changed starting with the version of PostgreSQL that was included
with Internet Express Version 6.1. This change requires existing databases to be backed up before
removing an existing installation and restored after the new installation is completed.
The installation procedure will detect if you have an IAEPSQL subset from an earlier version of
Internet Express installed and will back up and restore your data automatically while upgrading
PostgreSQL. The migration of data provided by PostgreSQL does not handle partial indices or
large objects. This data will need to be migrated manually.
After the upgrade from Internet Express Version 6.8 or 6.9 is complete, you must verify that your
databases have been migrated successfully. A copy of previous pgsql/data directory is located
at /usr/internet/pgsql/data.preIAE6xx and the output of the database dump, performed
during update, is saved at /usr/internet/pgsql/dumpout.IAExxx.restored. Once you
have verified your new databases, these files may be removed.
If you delete your previous installation separately (not recommended), you need to manually back
up and restore your data.
For more information, see the PostgreSQL documentation at the following Web site:
http://www.postgresql.org
Dante SOCKS Server Startup Requirements
The Dante SOCKS server will not start until you specify the internal and external addresses to use
in the /etc/sockd.conf file. Look for and uncomment the lines like these:
#internal: 10.1.1.1 port = 1080
#external: 192.168.1.1
Change the addresses to the actual IP addresses of your system's network interfaces. To be able
to use the SOCKS server, you will also need to specify valid information for the method, client
pass, and pass fields in /etc/sockd.conf. See the sockd(8) reference page.
Denying Hosts Using Link-Local IPv6 Addresses
If you have configured an IPv6 subnet using only link-local addresses for host names, TCP Wrapper
will not deny client access from IPv6 hostnames specified in the /etc/hosts.allow file unless
the host name includes the interface extension for the local link. For example, to deny all telnet
connects to telnetd from IPv6 host myhost.mydomain.com configured on interface tu0, you
must enter the following in /etc/hosts.allow:
telnetd:myhost.mydomain.com%tu0:DENY
Vacation Mail Not Supported With Cyrus IMAP
The Vacation Mail feature available to users via the User Self-Administration interface does not
work for Cyrus IMAP users. This is because Cyrus IMAP does not currently support the use of
Procmail as a delivery agent. Users attempting to enable this feature will find their settings ignored,
and that no auto-reply messages will be sent. It is therefore suggested that the Vacation Mail group
under the User Self-Administration interface be disabled if your users consist primarily of Cyrus
IMAP users. See the Administration Guide for instructions on disabling this feature.
Sendmail CPU Utilization in a Multinode Cluster
Due to a threading issue in HP Tru64 UNIX Version 5.1a, Sendmail can drive CPU utilization to
nearly 100 percent on some of the cluster nodes. To fix this problem, please apply the appropriate
patch found at the following URL:
http://www1.itrc.hp.com/service/index.html
PostgreSQL Data Storage Format 5