![]() |
![]() |
|
|
tlisten(1)
Name
tlisten - generic listener process
Synopsis
tlisten [-d device] -l nlsaddr [-u {uid-# | uid-name}] [-z bits] [-Z bits ]
Description
tlisten is a network independent listener process that runs as a daemon process on BEA Tuxedo application processors and provides remote service connections for other BEA Tuxedo processes, for example, tmboot(1). The following command-line options are used by tlisten.
Note: Some port numbers may be reserved for the underlying transport protocols (such as TCP/IP) used by your system. Check the documentation for your transport protocols to find out which numbers, if any, are reserved on your system.
Note: The link-level encryption value of 40 bits is provided for backward compatibility.
Note: The link-level encryption value of 40 bits is provided for backward compatibility.
The tlisten process authenticates most service requests. tlisten reads a file with a list of passwords, and any process requesting a service must present at least one of the passwords found in the file. If the APPDIR environment variable is set, passwords will be obtained from a file named APPDIR/.adm/tlisten.pw. If this file is not found, the system will look for TUXDIR/udataobj/tlisten.pw, which is created when the BEA Tuxedo system is installed. A zero-length or missing password file disables password checking. When running in this insecure mode, the tlisten and any process connecting to tlisten will generate a userlog warning message.
Processes that request services from tlisten, such as tmboot, find the passwords to be used during authentication in files on their own machines. They use the same methods as the tlisten to find their password files.
Environment Variables
Note: During the installation process, an administrative password file is created. When necessary, the BEA Tuxedo system searches for this file in the following directories (in the order shown): To ensure that your administrative password file will be found, make sure you have set the APPDIR and/or the TUXDIR environment variables.
If the link-level encryption feature is in operation between tlisten and a requesting process such as tmboot, then link-level encryption will be negotiated and activated before authentication occurs.
Termination
The only way to stop a tlisten process with normal termination is by sending it a SIGTERM signal.
Recommended Use
We recommend that you start one tlisten process for each application upon system startup. Remember to set the TUXDIR and APPDIR environment variables before invoking tlisten.
One alternative method for starting the tlisten process is to start it manually. The -u option can be omitted if the tlisten process is started by the application administrator. Duplicate tlisten command invocations using the same network address will terminate automatically and gracefully log an appropriate message.
Network Addresses
Suppose the local machine on which the tlisten is being run is using TCP/IP addressing and is named backus.company.com, with address 155.2.193.18. Further suppose that the port number at which the tlisten should accept requests is 2334. Assume that port number 2334 has been added to the network services database under the name bankapp-nlsaddr. The address specified by the -l option can be represented in the following ways.
//155.2.193.18:bankapp-nlsaddr
//155.2.193.18:2334
//backus.company.com:bankapp-nlsaddr
//backus.company.com:2334
0x0002091E9B02C112
The last of these representations is hexadecimal format. The 0002 is the first part of a TCP/IP address. The 091E is the port number 2334 translated into a hexadecimal number. After that each element of the IP address 155.2.193.12 is translated into a hexadecimal number. Thus the 155 becomes 9B, 2 becomes 02, and so on.
For a STARLAN network, a recommended address of uname.tlisten usually yields a unique name.
Windows NT Control Panel Applet
Administrative privileges on a remote NT machine are required in order to start a tlisten process on that machine through the Control Panel Applet.
See Also
![]() |
![]() |
![]() |
|
Copyright © 2000 BEA Systems, Inc. All rights reserved.
|