Mac Management Announcement 2/15/2016

As a first step to improve the security of our campus computers, as well as the campus network, we will be instituting a new policy to ensure that Macs on campus are up to date with all the latest security updates from Apple. This will bring our Mac computing experience more in line with our Windows computing experience.

Effective Monday, February 22, university-owned Mac computers will automatically be prompted to download and install critical operating system updates. If the download requires a restart, you will have the ability to postpone this restart up to two times. For the third time, the restart will proceed after you click okay.

Please contact the Technology Service Desk at 253.879.8585 or if you have any questions or concerns.

[Resolved] Wireless hotspots intermittently unavailable

The wireless network has been sporadically unavailable since late last night, January 22, due to equipment malfunction. We are working with the vendor to resolve the problem and have no estimates on a resolution time. This affects most areas of campus, except Regester Hall and the Library stack areas.

[Update 1/23/09 @ 7:00 pm] With temporary solution in place, all tests show connectivity is restored. If you experience any wireless connectivity problems, please contact the Helpdesk.

Banner Modifications

This week 2 modification were to scripts running Banner.  These modifications were necessary to hide the password passed to gurjobs, fgractg, and forappl when listing the process list from the OS command prompt.

E-mail problem: 5550 5.3.0 Can’t create output

Some user reported this morning the inability to send messages to users. They received a common error,

Final-Recipient: RFC822;
X-Actual-Recipient: RFC822;
Action: failed
Status: 5.3.0
(reason: Can’t create output)

This error was the result of poor deactivation of the quotaing system. The quota system had been turned off, but not removed from the fstab file. When the system was rebooted yesterday, the quota system was re-enabled and locked account in excess of their time limit. This issue has been corrected.

Dial-in Failures

The radius daemon and portmaster were reset to address several reported issues with dial-in access. The core reason for users not being authenticated is not completely clear, but there are indications that the portmaster or the radius daemon became confused about the appropriate share secret. Once all entryies were reset authentication started to be validated correctly.

During the process, four modems were identified as failing to respond properly and were removed from service.