Re: TSM rant

2015-02-02 Thread Koen Willems
Dear Del,
Your are the best thank you for the commitment to the list over the past years.
Your postings on the list got me out of sticky situations more than once.
A big thank you!
Best Regards,
Koen

-Oorspronkelijk bericht-
Van: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] Namens Del Hoobler
Verzonden: zaterdag 31 januari 2015 18:13
Aan: ADSM-L@VM.MARIST.EDU
Onderwerp: Re: [ADSM-L] TSM rant

Thank you for all of this input.

As many of you know, I have been a TSM lifer.
I started with WDSF in 1991, then ADSM, then TSM, (and whatever future renames 
may happen).

We started with VM/CMS, DOS 3.1, OS/2, and AIX/RT. Remember those?
Now TSM is doing things like VMware and Hyper-V and Cloud.

Up until recently, I was a developer/architect working on various client pieces 
like DP/Exchange, DP/SQL, FCM, and various other client technologies.

I hang out on this list because I know that you guys are the best of the best. 
I have learned as much from you as you have learned from me. Thank you for that.

I have heard everything you all said on this thread.
I am sorry for the frustration you have felt.

At the end of last year, I moved to the product management team.
I did this because I am committed to TSM and its future.
In this role, I am more directly involved with helping prioritize and direct 
where we take TSM into the future. I will take everything I have learned from 
you and apply it to my new role.

I firmly believe that the future of TSM is bright.
I am committed to making that happen.


Thank you,

Del


Re: Antwort: Re: GPFS 4.1 on windows and TSM Backup

2015-02-02 Thread Christian Svensson
I Just solve this issue for another customer.

Search for gpfs.dll on your Windows Server.
Search for GPFS.DLL in your Trace File you created that Stefan talking about. 

Verify if the path is the same, if not. Then just copy that file from the path 
you find in your DOS windows and copy to the path that the trace file tells you.

Run the Backup again, and it should work again.

/Christian

-Original Message-
From: Stefan Bender [mailto:stefan.ben...@de.ibm.com] 
Sent: den 30 januari 2015 15:12
To: ADSM-L@VM.MARIST.EDU
Subject: Re: Antwort: Re: GPFS 4.1 on windows and TSM Backup

Hello Stefan,
in your information I can't see anything wrong and the error messages are 
unspecific. 
So I think the best way to proceed is a PMR. 
Having a service trace from the failed backup of one file will help with the 
analysis, like "dsmc inc 
'\\bert\g$\Data\SW_GPFS_4.1\GPFS_4.1_Configuration.txt' 
-snapshotproviderfs=none -traceflag=service -tracefile=" 

Mit freundlichen Grüßen / best regards

Stefan Bender

Hechtsheimer Strasse 2 / 55131 Mainz / Germany IBM Software Group, Tivoli 
Software Development  "Tivoli Storage Manager" 
Tel. ++49-6131-846989 or ++49-7034-643-2773 / Fax. ++49-06131 -84-2520 /
email: stefan.ben...@de.ibm.com
--
IBM Deutschland Research & Development GmbH / Vorsitzende des
Aufsichtsrats: Martina Koederitz
Geschäftsführung: Dirk Wittkopp
Sitz der Gesellschaft: Böblingen / Registergericht: Amtsgericht Stuttgart, HRB 
243294 



From:   TSM 
To: ADSM-L@VM.MARIST.EDU
Date:   30.01.2015 14:10
Subject:[ADSM-L] Antwort: Re: GPFS 4.1 on windows and TSM Backup
Sent by:"ADSM: Dist Stor Manager" 



Hello Stefan,

TSM-Client is 7.1.1.3 , OS 2008 R2.

GPFS-Version 4.1.0.5.


dsm.opt:
NODENAME bert_gpfs
passwordaccess generate
TCPSERVERADDRESS 192.168.100.200
TCPPORT  1500
SNAPSHOTPROVIDERFS vss
SNAPSHOTPROVIDERIMAGE vss
managedservices webclient schedule
dirmc dirmc
domain all-local
include.fs g: snapshotproviderfs=none


Filesystem g:  is the GPFS filesystem


dsmerror.log:
01/30/2015 13:58:48 ANS1228E Sending of object '\\bert\g$\.snapshots'
failed.
01/30/2015 13:58:48 ANS5283E The operation was unsuccessful.

01/30/2015 13:58:48 ANS1228E Sending of object '\\bert\g$\Data' failed.
01/30/2015 13:58:48 ANS5283E The operation was unsuccessful.

01/30/2015 13:58:48 ANS1228E Sending of object '\\bert\g$\Daten' failed.
01/30/2015 13:58:48 ANS5283E The operation was unsuccessful.

01/30/2015 13:58:48 ANS1228E Sending of object '\\bert\g$\Data\SW_GPFS_4.1' 
failed.
01/30/2015 13:58:48 ANS5283E The operation was unsuccessful.

01/30/2015 13:58:48 ANS1228E Sending of object 
'\\bert\g$\Data\SW_GPFS_4.1\GPFS-4.1.0.5-x86_64-Windows.standard.zip'
failed.
01/30/2015 13:58:48 ANS5283E The operation was unsuccessful.

01/30/2015 13:58:49 ANS1228E Sending of object 
'\\bert\g$\Data\SW_GPFS_4.1\GPFS_4.1_Configuration.txt' failed.
01/30/2015 13:58:49 ANS5283E The operation was unsuccessful.

01/30/2015 13:58:49 ANS1228E Sending of object 
'\\bert\g$\Data\SW_GPFS_4.1\GPFS_4.1_STD_WIN_QSG.zip' failed.
01/30/2015 13:58:49 ANS5283E The operation was unsuccessful.

01/30/2015 13:58:49 ANS1228E Sending of object 
'\\bert\g$\Data\SW_GPFS_4.1\setup-x86.exe' failed.
01/30/2015 13:58:49 ANS5283E The operation was unsuccessful.

  and so on

i did manual backups with the domain admin user, the security of the GPFS
files and directories is:   everyone full access.


with best regards
stefan savoric


upgrading from 6.2.5 server

2015-02-02 Thread Lee, Gary
Looks like I won't be going to v7 for a while.  I have v5 clients still active 
with no end in site.

I am upgrading from 6.2.5 on RHEL 6.1.  What is the wisdom of the group, go to 
6.3.x or 6.4.x?

We do no dedup here and have no plans for it.
However,we do use tsm for ve.

Thankns for any help.


Re: upgrading from 6.2.5 server

2015-02-02 Thread Skylar Thompson
Just to keep things confusing, IBM includes TSM server v6.3.4 in the v6.4
release. AFAIK there is no true v6.4 server release. v6.3.4.300 has been
working great for us on the server side.

On Mon, Feb 02, 2015 at 05:31:48PM +, Lee, Gary wrote:
> Looks like I won't be going to v7 for a while.  I have v5 clients still 
> active with no end in site.
>
> I am upgrading from 6.2.5 on RHEL 6.1.  What is the wisdom of the group, go 
> to 6.3.x or 6.4.x?
>
> We do no dedup here and have no plans for it.
> However,we do use tsm for ve.
>
> Thankns for any help.

--
-- Skylar Thompson (skyl...@u.washington.edu)
-- Genome Sciences Department, System Administrator
-- Foege Building S046, (206)-685-7354
-- University of Washington School of Medicine


Re: Ransomware deleted TSM backups from node

2015-02-02 Thread Schneider, Jim
Roger,

According to my TSM Data Protection for SQL 6.4 manual, servers that run TDP 
for SQL require backdelete authority.  I don't know how to get around this 
problem.

Jim Schneider

-Original Message-
From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of Roger 
Deschner
Sent: Friday, January 30, 2015 7:40 PM
To: ADSM-L@VM.MARIST.EDU
Subject: [ADSM-L] Ransomware deleted TSM backups from node

I'm not sure there's anything that can be done about this, but take it as a 
warning anyway.

A Windows 7 desktop node here was attacked by CryptoWare 3.0 ransomware.
They encrypted all files on the node, and left a ransom note.

The node owner called me because they were having trouble restoring their files 
from TSM using a point-in-time restore. The files were gone!
Apparently this villian located which backup program was installed, found it 
was TSM, and issued actual dsmc delete backup commands, which they were allowed 
to do since PASSWORDACCESS GENERATE was in effect. So this attack vector is not 
limited to TSM; it would work with any backup program that the villian can 
figure out how to use.

I have moved this node to a domain that includes VEREXISTS=NOLIMIT 
VERDELETED=NOLIMIT RETEXTRA=NOLIMIT RETONLY=NOLIMIT for that Copy Group, while 
our data security people investigate.

I am planning to change all TSM client nodes to BACKDEL=NO ARCHDEL=NO to 
prevent a hacker from deleting backups. Anybody got a better idea?

Roger Deschner  University of Illinois at Chicago rog...@uic.edu
=== ALL YUOR BASE ARE BELONG TO US!! ===

**
Information contained in this e-mail message and in any attachments thereto is 
confidential. If you are not the intended recipient, please destroy this 
message, delete any copies held on your systems, notify the sender immediately, 
and refrain from using or disclosing all or any part of its content to any 
other person.


Re: Ransomware deleted TSM backups from node

2015-02-02 Thread Zoltan Forray
Same goes for Oracle and Notes backups.  They manage their own backups so
no way to get around this.  Same goes for PASSWORDACCESS GENERATE - AFAIK
can't schedule backups without it

On Mon, Feb 2, 2015 at 12:44 PM, Schneider, Jim 
wrote:

> Roger,
>
> According to my TSM Data Protection for SQL 6.4 manual, servers that run
> TDP for SQL require backdelete authority.  I don't know how to get around
> this problem.
>
> Jim Schneider
>
> -Original Message-
> From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of
> Roger Deschner
> Sent: Friday, January 30, 2015 7:40 PM
> To: ADSM-L@VM.MARIST.EDU
> Subject: [ADSM-L] Ransomware deleted TSM backups from node
>
> I'm not sure there's anything that can be done about this, but take it as
> a warning anyway.
>
> A Windows 7 desktop node here was attacked by CryptoWare 3.0 ransomware.
> They encrypted all files on the node, and left a ransom note.
>
> The node owner called me because they were having trouble restoring their
> files from TSM using a point-in-time restore. The files were gone!
> Apparently this villian located which backup program was installed, found
> it was TSM, and issued actual dsmc delete backup commands, which they were
> allowed to do since PASSWORDACCESS GENERATE was in effect. So this attack
> vector is not limited to TSM; it would work with any backup program that
> the villian can figure out how to use.
>
> I have moved this node to a domain that includes VEREXISTS=NOLIMIT
> VERDELETED=NOLIMIT RETEXTRA=NOLIMIT RETONLY=NOLIMIT for that Copy Group,
> while our data security people investigate.
>
> I am planning to change all TSM client nodes to BACKDEL=NO ARCHDEL=NO to
> prevent a hacker from deleting backups. Anybody got a better idea?
>
> Roger Deschner  University of Illinois at Chicago rog...@uic.edu
> === ALL YUOR BASE ARE BELONG TO US!! ===
>
> **
> Information contained in this e-mail message and in any attachments
> thereto is confidential. If you are not the intended recipient, please
> destroy this message, delete any copies held on your systems, notify the
> sender immediately, and refrain from using or disclosing all or any part of
> its content to any other person.
>



--
*Zoltan Forray*
TSM Software & Hardware Administrator
BigBro / Hobbit / Xymon Administrator
Virginia Commonwealth University
UCC/Office of Technology Services
zfor...@vcu.edu - 804-828-4807
Don't be a phishing victim - VCU and other reputable organizations will
never use email to request that you reply with your password, social
security number or confidential personal information. For more details
visit http://infosecurity.vcu.edu/phishing.html


Re: upgrading from 6.2.5 server

2015-02-02 Thread Zoltan Forray
We upgrade everything from 6.3.4.300 to 6.3.5.100 - only complication being
the Linux kernel semaphore issue which is highly aggravated due to the
change in DB2 levels that came in with 6.3.5 - still waiting for RedHat to
patch this.  RedHat just released a kernel update with 3-semaphore patches
but none have the Bugzilla ID that IBM (
http://www-01.ibm.com/support/docview.wss?uid=swg21691823) said is our
problem (and we don't pay enough for maintenance to be able to even look at
the *Bugzilla entry 1165277* ).  Can anyone out there help with getting
this info?

On Mon, Feb 2, 2015 at 12:37 PM, Skylar Thompson 
wrote:

> Just to keep things confusing, IBM includes TSM server v6.3.4 in the v6.4
> release. AFAIK there is no true v6.4 server release. v6.3.4.300 has been
> working great for us on the server side.
>
> On Mon, Feb 02, 2015 at 05:31:48PM +, Lee, Gary wrote:
> > Looks like I won't be going to v7 for a while.  I have v5 clients still
> active with no end in site.
> >
> > I am upgrading from 6.2.5 on RHEL 6.1.  What is the wisdom of the group,
> go to 6.3.x or 6.4.x?
> >
> > We do no dedup here and have no plans for it.
> > However,we do use tsm for ve.
> >
> > Thankns for any help.
>
> --
> -- Skylar Thompson (skyl...@u.washington.edu)
> -- Genome Sciences Department, System Administrator
> -- Foege Building S046, (206)-685-7354
> -- University of Washington School of Medicine
>



--
*Zoltan Forray*
TSM Software & Hardware Administrator
BigBro / Hobbit / Xymon Administrator
Virginia Commonwealth University
UCC/Office of Technology Services
zfor...@vcu.edu - 804-828-4807
Don't be a phishing victim - VCU and other reputable organizations will
never use email to request that you reply with your password, social
security number or confidential personal information. For more details
visit http://infosecurity.vcu.edu/phishing.html


Re: Ransomware deleted TSM backups from node

2015-02-02 Thread Marcel Anthonijsz
Can Schedule an admin schedule around the Oracle/Notes backup window to
enable/disable BACKDEL=YES/NO.

It is not an ideal situation, but decreases the risk. And if you configured
these nodes with specific nodenames (like you should) the malware could not
get to those clients.
Or they should scan the host for all available TSM OPT files and act from
these...

2015-02-02 19:44 GMT+01:00 Zoltan Forray :

> Same goes for Oracle and Notes backups.  They manage their own backups so
> no way to get around this.  Same goes for PASSWORDACCESS GENERATE - AFAIK
> can't schedule backups without it
>
> On Mon, Feb 2, 2015 at 12:44 PM, Schneider, Jim 
> wrote:
>
> > Roger,
> >
> > According to my TSM Data Protection for SQL 6.4 manual, servers that run
> > TDP for SQL require backdelete authority.  I don't know how to get around
> > this problem.
> >
> > Jim Schneider
> >
> > -Original Message-
> > From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of
> > Roger Deschner
> > Sent: Friday, January 30, 2015 7:40 PM
> > To: ADSM-L@VM.MARIST.EDU
> > Subject: [ADSM-L] Ransomware deleted TSM backups from node
> >
> > I'm not sure there's anything that can be done about this, but take it as
> > a warning anyway.
> >
> > A Windows 7 desktop node here was attacked by CryptoWare 3.0 ransomware.
> > They encrypted all files on the node, and left a ransom note.
> >
> > The node owner called me because they were having trouble restoring their
> > files from TSM using a point-in-time restore. The files were gone!
> > Apparently this villian located which backup program was installed, found
> > it was TSM, and issued actual dsmc delete backup commands, which they
> were
> > allowed to do since PASSWORDACCESS GENERATE was in effect. So this attack
> > vector is not limited to TSM; it would work with any backup program that
> > the villian can figure out how to use.
> >
> > I have moved this node to a domain that includes VEREXISTS=NOLIMIT
> > VERDELETED=NOLIMIT RETEXTRA=NOLIMIT RETONLY=NOLIMIT for that Copy Group,
> > while our data security people investigate.
> >
> > I am planning to change all TSM client nodes to BACKDEL=NO ARCHDEL=NO to
> > prevent a hacker from deleting backups. Anybody got a better idea?
> >
> > Roger Deschner  University of Illinois at Chicago rog...@uic.edu
> > === ALL YUOR BASE ARE BELONG TO US!! ===
> >
> > **
> > Information contained in this e-mail message and in any attachments
> > thereto is confidential. If you are not the intended recipient, please
> > destroy this message, delete any copies held on your systems, notify the
> > sender immediately, and refrain from using or disclosing all or any part
> of
> > its content to any other person.
> >
>
>
>
> --
> *Zoltan Forray*
> TSM Software & Hardware Administrator
> BigBro / Hobbit / Xymon Administrator
> Virginia Commonwealth University
> UCC/Office of Technology Services
> zfor...@vcu.edu - 804-828-4807
> Don't be a phishing victim - VCU and other reputable organizations will
> never use email to request that you reply with your password, social
> security number or confidential personal information. For more details
> visit http://infosecurity.vcu.edu/phishing.html
>



--
Kind Regards, Groetje,

Marcel Anthonijsz
T: +31(0)299-776768
M:+31(0)6-53421341


Re: Ransomware deleted TSM backups from node

2015-02-02 Thread Remco Post
> Op 2 feb. 2015, om 18:44 heeft Schneider, Jim  het 
> volgende geschreven:
> 
> Roger,
> 
> According to my TSM Data Protection for SQL 6.4 manual, servers that run TDP 
> for SQL require backdelete authority.  I don't know how to get around this 
> problem.

Mitigated by running the file backup and ‘structured data’ backup as separate 
nodes so you can at least protect your unstructured data against such 
ransomware.

> 
> Jim Schneider
> 
> -Original Message-
> From: ADSM: Dist Stor Manager [mailto:ADSM-L@VM.MARIST.EDU] On Behalf Of 
> Roger Deschner
> Sent: Friday, January 30, 2015 7:40 PM
> To: ADSM-L@VM.MARIST.EDU
> Subject: [ADSM-L] Ransomware deleted TSM backups from node
> 
> I'm not sure there's anything that can be done about this, but take it as a 
> warning anyway.
> 
> A Windows 7 desktop node here was attacked by CryptoWare 3.0 ransomware.
> They encrypted all files on the node, and left a ransom note.
> 
> The node owner called me because they were having trouble restoring their 
> files from TSM using a point-in-time restore. The files were gone!
> Apparently this villian located which backup program was installed, found it 
> was TSM, and issued actual dsmc delete backup commands, which they were 
> allowed to do since PASSWORDACCESS GENERATE was in effect. So this attack 
> vector is not limited to TSM; it would work with any backup program that the 
> villian can figure out how to use.
> 
> I have moved this node to a domain that includes VEREXISTS=NOLIMIT 
> VERDELETED=NOLIMIT RETEXTRA=NOLIMIT RETONLY=NOLIMIT for that Copy Group, 
> while our data security people investigate.
> 
> I am planning to change all TSM client nodes to BACKDEL=NO ARCHDEL=NO to 
> prevent a hacker from deleting backups. Anybody got a better idea?
> 
> Roger Deschner  University of Illinois at Chicago rog...@uic.edu
> === ALL YUOR BASE ARE BELONG TO US!! ===
> 
> **
> Information contained in this e-mail message and in any attachments thereto 
> is confidential. If you are not the intended recipient, please destroy this 
> message, delete any copies held on your systems, notify the sender 
> immediately, and refrain from using or disclosing all or any part of its 
> content to any other person.

-- 

 Met vriendelijke groeten/Kind Regards,

Remco Post
r.p...@plcs.nl
+31 6 248 21 622


7.1.1 TDP for Exchange 2010 backup Task Details not updated?

2015-02-02 Thread Prather, Wanda
TSM 6.3.4 on Win2k8-64
Exchange 2010 on Win2k8 64

This is not a show-stopper, just in the "annoying and mysterious" category.

Installed Exchange 7.1.1 TDP for a customer today.
The beautiful FCM interface popped in all the pre-reqs, VSS testing ran, I set 
the appropriate passwords and proxy relationships, full backup kicked off via 
the GUI ran like a champ.

But in the GUI, in the Task List pane, you used to be able to hover over the 
"WORKING" line and see that the backup was actually running, or click the Task 
Details tab and see how many GB have moved so far.  It was cool and the 
Exchange guys could see progress (especially important for big restores) 
without needing access to a TSM server admin account to monitor from the server 
end.

In this case the full backup ran over an hour, and there was never any updated 
information in the Task List or the Task Details until we got "completed".
Anybody else see this or figured out why?  Am I missing some java thingy?

Thanks

Wanda Prather
TSM Consultant
ICF International Enterprise and Cybersecurity Systems Division