In a message dated 6/19/2005 4:53:02 P.M. Central Daylight Time,  edgould@
AMERITECH.NET writes:

>>  ... anyone who worked at the same shop for a long time knows how to  
>> become APF-authorized ...



Knowing how to become APF-authorized and being allowed to by the security  
rules are two different matters.
 
A decent security audit will look for loopholes that let you bypass the  
normal security rules, such as undocumented local SVCs that return control in  
authorized states if you put a magic value in GPR1, a Program Interrupt front  
end that looks for an illegal op code like X'CA' (CA uses this  technique) 
followed by magic values to request various authorized  functions, and the 
like.  
All these loopholes should be long gone in any  system that takes security 
serious.
 
Bill Fairchild

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to