Browse Prior Art Database

Analyzing Net.Acc for Maximum Recovery

IP.com Disclosure Number: IPCOM000114616D
Original Publication Date: 1995-Jan-01
Included in the Prior Art Database: 2005-Mar-29
Document File: 2 page(s) / 62K

Publishing Venue

IBM

Related People

Kells, TR: AUTHOR

Abstract

Disclosed is a method for analyzing the network accounts database for errors in structure.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Analyzing Net.Acc for Maximum Recovery

      Disclosed is a method for analyzing the network accounts
database for errors in structure.

      Fixacc does not always completely recover all the objects
within net.acc.  With different problems, different recovery methods
achieve differing results.  Certain errors within net.acc can cause
fatal errors with some recovery strategies.  A method of analyzing
net.acc is needed to allow fixacc to use the best recovery schemes.

      Net.acc is comprised of four sections, the first three are of
fixed length and the fourth section is grown dynamically.  The first
section is the header, or modals, and it contains miscellaneous
information and statistics.  The second section is an array of group
names,  the indices are used to set group membership for individual
users.  The third section is a user hash table.  Each entry in the
hash table contains a pointer to a linked list of users with a common
hash value.  The final section contains user and access control
objects.  Access control objects contain resource names and a list of
user and group ids and their specific access rights.  User objects
contain all the information specific to a user, including a unique
user id.

      The first three parts are fixed length objects and the only
analysis required is to check for ASCIIZ strings that are not
properly terminated.  The user and access control objects are
dynamically allocated and are different sizes.  These objects require
advance analysis to properly recover as many objects as possible.

      There are two recovery techniques for user and access control
objects.  The first method is to linearly sc...