Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Authentication >>
    System Administration >>
    File Transfer Using SFTP >>
    Secure File Transfer Using Transparent FTP Security >>
    Tunneling >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
        Debugging SSH Tectia Server for IBM z/OS>>
        Solving Problem Situations>>
            Using the OMVS Shell
            Common MVS Error Messages
            Common SSH Tectia Server for IBM z/OS Error Messages
            Exceeding Maximum CPU Time
            Auxiliary Storage Shortage
            SSHD2 Cannot Be Started as a Started Task
            File Transfer Server Log Messages with Wrong Timestamps
    Man Pages and Default Configuration Files >>
    Log Messages >>

Common MVS Error Messages

  • BPXP015I ... PROGRAM ... IS NOT MARKED PROGRAM CONTROLLED

    The program is not marked program-controlled. Depending on the program, the following steps may help:

    • If the program is sshd2, run the following:

      >extattr +p /opt/tectia/sbin/sshd2
      

    • If the program is CEE.SCEERUN2, see Section Preparing the System.
    • If the program is sshg3, the reason may be that the sshg3 client does not work if su is used before establishing the Secure Shell connection. The error output depends on the terminal used and what kind of an su is made before the sshg3 connection attempt. sshg3 does not need to be program-controlled, instead avoid using su before starting sshg3.

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2011 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now