This started as me being surprised that Cobol and PL/I now support Dynalloc 
because of the security risks. I satisfied that it exists and for whatever 
reason, it is no longer considered a security exposure. My apologies for 
allowing this to drag into a discussion about security theory in this group.
Most security breaches need multiple exploits on MVS. Often, eliminating a 
single exploit is enough to to stop that particular breach.
SAF (RACF) secures resources but there will be always be exposures (e.g. A 
security admin can't possibly analyze every single resourse - more often it's a 
best estimate and experience).  Open for dynalloc datasets is the same as a 
permanent dataset. This is not the exposure
I'll try to explain it again for those who are interested. Here are the 
attributes of the exposure again:1. You must be an employee because you need 
inside information. (They know many things processes and  general security to 
avoid getting caught).2. The dataset is protected where they can't get read the 
file. Or they want information from a database that is protected. They cannot 
get to it from their userid.3. The first thing to exploit is run the program 
under a different userid that has authority. This is easily accomplished by 
moving it to production or having another employee run it (there are many easy 
methods to do this).4. The program has read access but how does the employee 
see that data? Writing to any of the permanent allocations are usually 
restricted and writing to these datasets will normally cause problems. The 
program is useless to the employee at this point.5. The program must use 
dynalloc to a dataset the employee can access. In cobol & pl/I, this is now 
easily accomplished by specifying a dataset in the program.6. Most employee's 
have full control for their datasets and allow anyone to allocate and write 
them. Or the dataset could be another production dataset. 
People are clever and will find ways to abuse things if they are motivated. 
Dynalloc can easily be exploited. It's not exploited because no one has been 
motivated to exploit it.
Regards, Jon.

 On Friday, December 22, 2017 4:54 PM, "Farley, Peter x23353" 
<peter.far...@broadridge.com> wrote:
I think our confusion (or at least my confusion) with your statements is that 
in the z/OS environment (including z/OS Unix), access to ALL files is subject 
to SAF restrictions.  Allocation by DYNALLOC may in fact succeed, but OPEN will 
fail if the running user ID is denied access by whichever SAF is running.

Where is the security exposure then?

I do assume complete and correct SAF definitions here.  If your SAF isn't well 
set up for data safety then all bets are off.  I am also assuming that the 
running user ID for production jobs is NOT any ordinary user's TSO ID, but the 
unique user ID(s) allowed only to the production scheduler software.   

Reply via email to