Microsoft Windows Datacenter Server, Limited Edition

Release Notes

How to Use These Notes

Applications

Clustering

Internet Services

Network and Communications

Other

Security

Server Management

Additional Resources

© 2002 Microsoft Corporation. All rights reserved



How to Use These Notes

Back to Top

Welcome to the release notes for Windows Datacenter Server, Limited Edition.

These release notes contain important information that was not available when the product documentation for Windows Datacenter Server, Limited Edition was written.

Click the headings listed at the top of this document to see whether there is any important information that might apply to your specific setup.

In addition, read the other release notes files on the Windows Datacenter Server, Limited Edition compact disc (CD):

A list of additional resources is included at the end of this document. To link to the Microsoft Web sites referenced in this document, you must be connected to the Internet.



Applications

Back to Top

Application Center 2000

Servers running this Windows product do not support Application Center 2000 SP1 and earlier versions.

To work around this issue, upgrade to Application Center 2000 SP2.

Commerce Server 2000 SP1 BizDesk navigation links

When using Commerce Server 2000 SP1 and earlier versions on this Windows product, all BizDesk navigation links result in Active Server Pages (ASP) errors. To work around this issue, you must modify the IIS security metabase.

Note

IIS must be stopped before you can save the metabase.xml file. The following procedure has not been tested under the Direct Metabase Edit option in the Internet Information Services Properties dialog box.

To modify the IIS security metabase

  1. Using Notepad, open the metabase.xml file located at %systemsdrive%\windows\system32\inetsrv\metabase.xml.
  2. For every virtual directory that requires parent paths to be enabled, add this security statement:
    AspEnableParentPaths="TRUE" 

    This property is inherited, so it is not necessary to add it to any subdirectories of a virtual directory that has this flag set.

    For better security, this value is not recommended for the root directory, as this will turn on the security setting for every Web directory on your server.

    The following is an example of a virtual directory header in the metabase.xml file:

    <IIsWebVirtualDir           Location = "/LM/W3SVC/1/ROOT/blanksite"  
    .
    .
    .
    AspEnableParentPaths = "TRUE".
    >
    </IIsWebVirtualDir>
  3. Save the file, and then restart IIS if it is not already running.

Commerce Server 2000 SP1

Active Server Pages (ASP) pages containing calls to Commerce Server objects will fail and return error information. This will occur in Commerce Server 2000 SP1 because of changes in IIS for Windows Datacenter Server, Limited Edition.

To work around this issue, you must change the Internet Guest Account access control list (ACL) in the Program Files folder. Set the permissions to allow read access but not write access.

Content Management Server 2001

Installing Content Management Server 2001 on a server running Windows Datacenter Server, Limited Edition

During the installation of Content Management Server (CMS) 2001 on Windows Datacenter Server, Limited Edition, you are pointed to a Microsoft Web site from whichyou can download the Microsoft virtual machine (VM) for Java. On Windows Datacenter Server, Limited Edition, you do not see that information.

To work around this issue, you must first download the Microsoft VM from the Microsoft Windows Update Web site before proceeding with the CMS 2001 installation.

Resolving CMS issues with Windows Datacenter Server, Limited Edition

Any Web sites managed by CMS 2001 will not work with this Windows product. The following error will be displayed:

HTTP Error 404 File not found. 

The same problem occurs when you use the Site Builder client of CMS 2001 to create content for a CMS Web site.

To work around this issue, change the access control list for everyone in the IIS_NR directory (in \Program Files\).

Internet Connection Firewall

Internet Connection Firewall (ICF) is not included in Windows Datacenter Server, Limited Edition.

Internet Security and Acceleration Server 2000

Because Internet Security and Acceleration (ISA) Server 2000 is part of the BackOffice® 2000 suite, you must have ISA Server 2000 SP1 installed if you intend to run ISA Server 2000 on computers running Windows Datacenter Server, Limited Edition.

To work around this issue, either install ISA Server 2000 SP1 or obtain from the ISA team the QFE for computers running Windows Datacenter Server, Limited Edition.

Microsoft Systems Network Architecture

Microsoft Systems Network Architecture (SNA) 4.0 SP4 and earlier are not supported on computers running Windows Datacenter Server, Limited Edition. There is no workaround.

Server Applications: Exchange 2000 Clustering Setup

To set up Exchange 2000 Clustering on Windows Datacenter Server, Limited Edition, you must first implement Microsoft Distributed Transaction Coordinator (MSDTC) as a resource.

To implement this as a resource, see Microsoft Knowledge Base article Q290624: "HOWTO: Configure MSDTC in a Windows 2000 Cluster Environment" on the Microsoft Knowledge Base Web site. Follow the instructions provided there.

After MSDTC has been implemented as a resource, proceed with the Exchange 2000 Clustering setup.

Server Management

Server administrators who use the Web interface for remote administration will not be able to perform the following tasks on their servers if they are using a remote Web client:

On Windows Datacenter Server, Limited Edition, you can install this feature with Configure Your Server (CYS) or as an optional component under Internet Information Services (IIS).

To work around this issue

  1. Connect by using Remote Desktop for Administration so that you can carry out these operations from a remote client.
  2. Access the administration Web site at port 8098 by using SSL. Follow the instructions in the "Configuring SSL on Your Server" section of the IIS documentation.

SharePoint Team Services from Microsoft and FrontPage Server Extensions

Installing SharePoint Team Services with Windows Datacenter Server, Limited Edition

If you try to install SharePoint™ Team Services (STS) on Windows Datacenter Server, Limited Edition and the latter already has STS installed on it, your installation might fail.

To work around this installation issue

  1. Complete a clean installation of Windows Datacenter Server, Limited Edition.
  2. Delete the following folder and all of its contents:

    C:\Program Files\Microsoft SQL Server

  3. At the command prompt, type the following:

    net stop http /y

  4. Delete the following folder and all of its contents:

    C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\50

You can now install STS.

Usage Analysis feature

The FrontPage® Server Extensions (FPSE) Usage Analysis feature is no longer supported for installations of FPSE in Windows Datacenter Server, Limited Edition.

To get this feature, install STS (which ships with Windows Datacenter Server, Limited Edition) and continue to use FPSE as before. You can configure STS by using the Configure Your Server Wizard in Windows Datacenter Server, Limited Edition.



Clustering

Back to Top

Cluster Service Account permissions

In Windows Datacenter Server, Limited Edition, new Microsoft Message Queuing (MSMQ) resource installations fail to come online when Cluster Service Account (CSA) does not have permission to create child objects on the computer object associated with the dependent Network Name resource.

To work around this issue, you must open the Users and Computers MMC snap-in and then open the computer object properties to view the security descriptor. Select the Create all Child Objects check box to grant the CSA permission to create child objects on the computer object created by the Network Name resource. After that, you can bring the MSMQ resource online.

Majority Node Set

Not to be used as a general-purpose quorum mechanism

The Majority Node Set quorum feature available for server clusters in Windows Datacenter Server, Limited Edition is a new technology that has a number of applications. Note, however, that it works differently from a traditional server cluster using a standard quorum resource.

This technology is not designed for use as a general-purpose quorum mechanism in Windows Datacenter Server, Limited Edition. Microsoft is releasing this feature as a technology preview that is designed to enable vendors and non-Microsoft software providers to evaluate the feature and to incorporate it into other value-add products and services. Standard quorum resources (physical disk resources or non-Microsoft resources) are recommended for use in server clusters that are deployed in end-user production environments.

Only one instance can exist in the cluster

In Windows Datacenter Server, Limited Edition, only one instance of the Majority Node Set resource can exist in the cluster.

To work around this issue, do not create two or more Majority Node Set resources on the same cluster.

Message Queuing fails to install on a cluster

To install Microsoft Message Queuing (MSMQ) in Windows Datacenter Server, Limited Edition, you must have the new RequireKerberos property on the dependent network name enabled.

To install MSMQ on Windows Datacenter Server, Limited Edition

  1. Create the Network Name resource and leave it offline.
  2. Using Cluster Administrator, set the RequireKerberos property to 1 by selecting the Enable Kerberos Authentication check box on the parameter page for the dependent Network Name resource.
  3. If Cluster Service Account (CSA) is a domain user, give it the Create Child Objects permission on the newly created computer object.
  4. Create the MSMQ resource, and then bring it online.

For more information, click Start and then click Help and Support. In Help and Support Center, search for "Installing a Message Queuing resource."

Network Load Balancing

Access denied

Network Load Balancing Manager fails to get authenticated on a host on which it needs to perform an operation, resulting in the following error message:

Win32: Access Denied

To work around this issue, enter new credentials in Network Load Balancing Manager. The host that denied access to Network Load Balancing Manager will authenticate the new credentials.

Backward compatibility

Network Load Balancing Manager is not backwards compatible with Windows 2000 products. There is no workaround for this issue.

Connecting to existing clusters

When you use the Connect to Existing option in Network Load Balancing Manager in Windows Datacenter Server, Limited Edition to connect to an existing cluster so that you can manage it, Network Load Balancing Manager does not automatically display all of the hosts in the cluster.

To see all of the hosts in the cluster

  1. Create a text file that lists the host names or their dedicated IP addresses, with each host name or IP address on a separate line.
  2. Load this file into Network Load Balancing Manager by clicking File and then clicking Load Host List.

    Network Load Balancing Manager will contact each of the hosts, get the network load balancing information, and then display this information in the Network Load Balancing Manager user interface.

You can also load the text file by entering it as an argument when starting Network Load Balancing Manager from a command line, as in the following example:

nlbmgr.exe -hostlist <host file name>

Encryption of user credentials

Network Load Balancing Manager user credentials are stored in unencrypted form in memory, which may pose a security risk to your system.

To work around this issue, do not enter credentials in Network Load Balancing Manager if you have security concerns. To use Network Load Balancing Manager without setting the credentials, ensure that the logon credentials you use to log on to the machine on which Network Load Balancing Manager is being run have system administrator privileges on all of the host servers in the cluster.

Limited error checking

The error-checking capabilities in Network Load Balancing Manager for Windows Datacenter Server, Limited Edition are very limited.

When creating a new cluster:

When connecting to an existing cluster:

To work around this issue, refer to the troubleshooting guide in online Help to determine the problem with your cluster. After you identify the problem, you can use Network Load Balancing Manager to change cluster parameters remotely to address the problem.

Manager logs

The Network Load Balancing Manager logs displayed in the lower half of the Network Load Balancing Manager windows are not saved to a log file by default.

To work around this issue, save the Network Load Balancing Manager logs to a specific log file using the Log option on the Options menu. All subsequent events will be logged to this log file, and the file will be saved when the user quits Network Load Balancing Manager.

Mode changes

Mode changes—from unicast to multicast or vice versa—that you make through Network Load Balancing Manager are not supported in Windows Datacenter Server, Limited Edition and might result in unexpected behavior.

To work around this issue, change modes only at the host server, one host at a time. For additional information, see Help and Support Center (click Start and then click Help and Support).

Multiple Web sites or applications

If you create a network load balancing cluster, Network Load Balancing Manager will automatically add the cluster IP address to TCP/IP for each host server in the cluster. However, when you are load-balancing multiple Web sites or applications on this same network load-balancing cluster, Network Load Balancing Manager in Windows Datacenter Server, Limited Edition will not have support to add these additional IP addresses to the cluster hosts. You must do this manually.

To work around this issue, you must manually enter the IP addresses corresponding to the additional Web sites or applications in the TCP/IP properties of each host server in the cluster. You can use Network Load Balancing Manager to configure the Per-IP port rules for these IP addresses.

Remote control password

Changing remote control passwords by using Network Load Balancing Manager is not supported in Windows Datacenter Server, Limited Edition.

To work around this issue, you must change the password by using the Network Load Balancing user interface on each host server.

Verification of user credentials

Network Load Balancing Manager requires the user to enter his or her credentials, which are then verified with the local host server on which an operation is being performed by Network Load Balancing Manager. Those credentials are not saved when the user quits Network Load Balancing Manager.

There is no workaround for this issue. You must reenter user credentials each time you use Network Load Balancing Manager.



Internet Services

Back to Top

Windows Media Services

Enabling authentication plug-ins simultaneously

It is recommended that you do not enable both the Windows Media™ Services (WMS) Basic Authentication and WMS NTLM Authentication plug-ins at the same time. Authorization might not be completed when a media player is using either the MMSU or MMST protocol.

Excessive error events can cause an access violation

If the server running WMS receives a large number of diagnostic error events (such as when the connection-rate limit is exceeded several dozen times in rapid succession as a result of a virus), the server might encounter an access violation.

To work around this issue, try to avoid excessive error events by periodically checking the server for errors protecting it against viruses.

Help documentation

You cannot access WMS Help by using the F1 key. To work around this issue, use the Help button instead.

NTLM Authentication plug-in

You can enable the WMS NTLM Authentication plug-in only at the server level. If you enable this plug-in at the publishing point level, authorization might not be completed when a media player uses either the MMSU or MMST protocol.

Script debugging in the beta release

Do not use the script debugging feature in this beta release of WMS. The tool does not perform as expected and may cause issues with the script itself.

To work around this issue, debug scripts manually for this release.



Network and Communications

Back to Top

Internet Connection Sharing

The Internet Connection Sharing feature is not included in Windows Datacenter Server, Limited Edition.

Network Bridge

The Network Bridge feature is not included in Windows Datacenter Server, Limited Edition.

Real-Time Communications service

The version of the Real-Time Communications (RTC) service that ships with Windows Datacenter Server, Limited Edition is not currently compatible with either of the following versions of MSN® Messenger:

Processing requests to MSN Messenger buddies

The RTC service has the ability to verify the existence of your messenger buddy in Active Directory™ before accepting and processing presence requests targeted to this buddy. Turn off this feature in any of the following situations:

To disable subscription verification

  1. Click Start, click Control Panel, click Administration Tools, and then click Computer Management.
  2. In Extension Modules, click Routing.
  3. Right-click the Registrar module in the right pane, and then click Properties.
  4. On the Authentication tab, clear the Verify offline subscribes check box.

Remote administration

Remote administration of the RTC service is not supported in this release of Windows Datacenter Server, Limited Edition.

Supported authentication methods

Only Basic Authentication is supported in this release of Windows Datacenter Server, Limited Edition. Other authentication methods (such as Integrated Windows Authentication and Digest Authentication) will be supported in future releases.

Using Basic Authentication

To use Basic Authentication, you must change the realm value on a server. This value should be equal to the domain portion of the user's Uniform Resource Identifier (URI).

For example, if your sign-in name is test@adatum.com, you must configure the realm to adatum.com. To do this, create a file named realm.vbs with the following contents:

----- code start-------------------------------------- 
' VBScript source code Dim oSvc, oUser, oCtx, oProx
Set objArgs = WScript.Arguments
if (objArgs.count <> 1) then WScript.echo "Usage: setrealm "else set oSvc = 
CreateObject("WbemScripting.SWbemLocator").ConnectServer(".","root\cimv2")
set oCtx = CreateObject("WbemScripting.SWbemNamedValueSet")
set oUser = oSvc.InstancesOf("MSFT_SIPProxySecuritySetting")
if (oUser.count > 1 ) then WScript.echo "More than one instance of Securitysetting. Not setting the realm"else
for each oProx in oUser WScript.echo "Setting the realm attribute to : " & 
objArgs(0) oProx.realm = objArgs(0) oProx.Put_ 1, oCtx
next
end if
end if
---------code end-----------------------------------

Run this file from a command line with the syntax "realm ." Note that you must have administrator privileges to do this.

Using phones in Real-Time Communications deployments

To use Session Initiation Protocol (SIP) phones in your deployment, you need to add a new domain entry to the Registrar domain table. To do this, open the Real-Time Communications (RTC) service Microsoft Management Console (MMC) snap-in, right-click the Registrar Module icon in the Routing Extension module, and then add a new domain with the name "*;user=phone".

To use Public Switched Telephone Network (PSTN) phones by routing calls through the IP to the PSTN gateway, create an entry in the routing table. To do this, open the RTC server MMC snap-in. In the routing pane, add two routes, as described in the following procedures.

To add the first route

  1. Type User *.
  2. Type domain name <Fully Qualified Domain Name (FQDN) of the SIP proxy server>.
  3. Select Phone URI.
  4. Type the IP address of the gateway.
  5. Select Replace URI.

To add the second route

  1. Type User *.
  2. Type domain name <IP address of the SIP proxy server>.
  3. Select Phone URI.
  4. Type the IP address of the gateway.
  5. Select Replace URI.

If the user is registered as a phone number and the route "*@*" is used, incoming calls will not be routed to registered users.



Other

Back to Top

Configure your Server Wizard

If you select the file-server role and install the Web user interface for file server administration, you will be unable to view the FTP and Shares site logs by using the Web user interface. The displayed logs are actually the Administration site logs.

There is no workaround for this issue.

Finding information about making shadow copies of shared folders

To find information about making shadow copies of shared folders, open Help from the command line by clicking Start, clicking Run, and then typing the following:

hh windows.chm

Click the Contents tab, and then click the following (in order): Disks and Data, Backing Up and Recovering Data, and Shadow Copies of Shared Folders. Under Shadow Copies of Shared Folders, click the titles of the topics you want to see.

Hardware acceleration for Direct3D and OpenGL

Hardware acceleration for Direct3D® and OpenGL is not available in Windows Datacenter Server, Limited Edition.

Microsoft virtual machine for Java

The Microsoft virtual machine (Microsoft VM) is now available only as a Web download. The latest 32-bit edition of the Microsoft VM can be obtained at the Microsoft Windows Update Web site. If you do not already have a virtual machine on your system and visit a Web site with a Java applet, Internet Explorer will automatically ask if you wish to install the Microsoft VM.

Terminal Server

Terminal Server (formerly known as Terminal Services in application server mode) is not supported with this release of Windows Datacenter Server, Limited Edition. Remote Desktop for Administration (formerly known as Terminal Services in remote administration mode) is supported for Windows Datacenter Server, Limited Edition.

Using DFS between forests with established trust relationships

When you create a trust relationship between two forests Distributed File System (DFS) will not be able to resolve the address in the remote forest. DFS obtains the list of trusted domains from the directory and uses this information to access the namespace.

To work around this issue, set up a direct trust with every domain on which you need domain DFS to work.



Security

Back to Top

Applications using Local Security Authority

Security has been upgraded for Windows Datacenter Server, Limited Edition.

Applications that try to open a Local Security Authority (LSA) handle anonymously will not be permitted access. This might result in some applications failing and returning an "Access Denied" error message.

For example, if you have a Structured Query Language (SQL) database hosted on a computer running Windows Datacenter Server, Limited Edition, with an Internet Information Services (IIS) server using Named Pipes accessing the SQL database, the following error might be reported:

0x80004005 on an Access Data Object (ADODB) Open.

To verify that the failure is caused by the application trying to make an anonymous call, check the computer's event log for Event ID=6033. This log tells you how to disable this security feature if it does block functionality.

You are advised to follow up with the application vendor who is making this call to ensure that the application is updated and able to make secure calls.

Certificate Services

Failed enrollment on a Windows 2000 client

A Windows 2000 enrollment station cannot enroll against a Windows Datacenter Server, Limited Edition certification authority and domain controller unless Service Pack 2 for Windows 2000 is installed on the enrollment station. Otherwise, an error will occur on the Windows 2000 client and the enrollment will fail.

To work around this issue, install Windows 2000 Service Pack 2.

Version 2 templates

A Windows Datacenter Server, Limited Edition certification authority will not be able to issue any new version 2 templates in a Windows 2000 forest that has been upgraded to a Windows Datacenter Server, Limited Edition schema unless Service Pack 3 for Windows 2000 is used for all domain controllers. This is because a Windows Datacenter Server, Limited Edition certification authority expects only signed Lightweight Directory Access Protocol (LDAP) responses from domain controllers. This only applies to any new version 2 template that is created or duplicated.

To work around this issue, apply the QFE provided in Microsoft Knowledge Base article Q308385 on all domain controllers.



Server Management

Back to Top

Help for Shutdown.exe

In this release, Shutdown.exe Help is not accessible through the interactive shutdown dialog box activated from the command prompt. Neither F1 nor the Help button link to the Help file.

To view this Help file, click Start, click Help and Support, and then search for "shutdown."

System State Data feature works for administrators only

Any shutdown initiated by pressing CTRL+AL +DELETE and then clicking the Shut Down button will activate the System State Data feature. However, this feature works only if the user shutting down the computer is an administrator on the computer.

In all cases, only administrators on the computer can report the system state information to Microsoft if the error-reporting functionality is turned on.



Additional Resources

Back to Top

To review the latest hardware compatibility information, see the Windows Hardware Compatibility Web site.

Please note, if you require support for Windows Datacenter, Limited Edition, you must contact your Original Equipment Manufacturer (OEM).



Copyright

Back to Top

Information in this document, including URL and other Internet Web site references, is subject to change without notice and is provided for informational purposes only. The entire risk of the use or results of the use of this document remains with the user, and Microsoft Corporation makes no warranties, either express or implied. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.

Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.

© 2002 Microsoft Corporation. All rights reserved.

Microsoft, Active Directory, BackOffice, Direct3D, FrontPage, MSN, SharePoint, Windows, and Windows Media are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Acknowledgements

Portions of this product are based in part on the work of Mark H. Colburn and sponsored by the USENIX Association. Copyright © 1989 Mark H. Colburn. All rights reserved.

This product includes software developed by the University of California, Berkeley and its contributors.

Portions of this product are based in part on the work of the Regents of the University of California, Berkeley and its contributors. Because Microsoft has included the Regents of the University of California, Berkeley, software in this product, Microsoft is required to include the following text that accompanied such software:

Copyright © 1985, 1988 Regents of the University of California. All rights reserved.

Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by the University of California, Berkeley. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.

Portions of this product are based in part on the work of Greg Roelofs. Because Microsoft has included the Greg Roelofs software in this product, Microsoft is required to include the following text that accompanied such software:

Copyright © 1998-1999 Greg Roelofs. All rights reserved.

This software is provided "as is," without warranty of any kind, express or implied. In no event shall the author or contributors be held liable for any damages arising in any way from the use of this software.

Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

  1. Redistributions of source code must retain the above copyright notice, disclaimer, and this list of conditions.
  2. Redistributions in binary form must reproduce the above copyright notice, disclaimer, and this list of conditions in the documentation and/or other materials provided with the distribution.
  3. All advertising materials mentioning features or use of this software must display the following acknowledgment:

This product includes software developed by Greg Roelofs and contributors for the book, PNG: The Definitive Guide, published by O'Reilly and Associates.

Portions of this software are based in part on the work of Hewlett-Packard Company. Because Microsoft has included the Hewlett-Packard Company software in this product, Microsoft is required to include the following text that accompanied such software:

Copyright © 1994 Hewlett-Packard Company

Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Hewlett-Packard Company makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.

Portions of this software are based in part on the work of the University of Southern California. Because Microsoft has included the University of Southern California software in this product, Microsoft is required to include the following text that accompanied such software:

Copyright © 1996 by the University of Southern California. All rights reserved.

Permission to use, copy, modify, and distribute this software and its documentation in source and binary forms for any purpose and without fee is hereby granted, provided that both the above copyright notice and this permission notice appear in all copies — and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed in part by the University of Southern California, Information Sciences Institute. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.

THE UNIVERSITY OF SOUTHERN CALIFORNIA makes no representations about the suitability of this software for any purpose. THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

Portions of this software are based in part on the work of Luigi Rizzo. Because Microsoft has included the Luigi Rizzo software in this product, Microsoft is required to include the following text that accompanied such software:

© 1997-98 Luigi Rizzo (luigi@iet.unipi.it)

Portions derived from code by Phil Karn (karn@ka9q.ampr.org), Robert Morelos-Zaragoza (robert@spectra.eng.hawaii.edu) and Hari Thirumoorthy (harit@spectra.eng.hawaii.edu), Aug 1995

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

THIS SOFTWARE IS PROVIDED BY THE AUTHORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Portions of this software are based in part on the work of Massachusetts Institute of Technology. Because Microsoft has included the Massachusetts Institute of Technology software in this product, Microsoft is required to include the following text that accompanied such software:

Copyright © 1989,1990 by the Massachusetts Institute of Technology. All Rights Reserved.

WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. M.I.T. makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.

Under U.S. law, this software may not be exported outside the US without license from the U.S. Commerce department.

Portions of this software are based in part on the work of Regents of The University of Michigan. Because Microsoft has included the Regents of The University of Michigan software in this product, Microsoft is required to include the following text that accompanied such software:

Copyright © 1995,1996 Regents of The University of Michigan. All Rights Reserved.

Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of The University of Michigan not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. This software is supplied as is without expressed or implied warranties of any kind.