Paul,
Thankfully, APF authorization and system resource access security are 2 
separate things.  When the OPEN SVC gets invoked, it will perform a 
RACROUTE REQUEST=AUTH call for the dataset being opened, regardless of the 
value in JSCBAUTH.  The only way that security checks are bypassed is via 
the NODSI option in the PPT.  Now an APF authorized program could switch 
to key 0 and update various fields so the security system thinks they have 
more authority than they really should, but that isn't an issue when using 
a utility, particularly one that is covered under the z/OS statement of 
integrity.

===============================================
Wayne Driscoll
OMEGAMON DB2 L3 Support/Development
wdrisco(AT)us.ibm.com
===============================================



From:
Paul Gilmartin <[email protected]>
To:
[email protected]
Date:
04/02/2010 05:04 PM
Subject:
Re: Heads Up: APAR IO11698 - New SAF FACILITY class definition required 
for any SMP/E use
Sent by:
IBM Mainframe Discussion List <[email protected]>



On Fri, 2 Apr 2010 16:47:54 -0500, Wayne Driscoll wrote:

>Ed's concern is much more valid and realistic than Gil's.  In Gil's case,
>having SYSPUNCH refer to SYS1.PARMLIB, or some other protected dataset
>really won't cause a problem, because APF authorization doesn't
>automatically bypass the security system.  However, a maliciously coded
>
OK.  Educate me.  I had thought that once a program was APF
authorized, it became the responsibility of that program to
issue the SAF calls and respect the replies; if not, the program
could do anything it wanted.

For example, suppose someone link edited IEBGENER into an APF
authorized library and marked it AC=1.  Now, I do:

    //STEP     EXEC  PGM=IEBGENER
    //STEPLIB   DD   DISP=SHR,DSN=...
    //SYSUT2    DD   DISP=SHR,DSN=SYS1.PARMLIB(...)
    //SYSUT1    DD   *
        ...

Where does it fail?
 
>HLASM user exit could, since it contains customer supplied code.  Of
>course, if the Assembler is invoked via SMP/E authorized, those HLASM
>exits will have to be located in an APF authorized library, or else a 306
>abend will occur, so the writer of the malicious exit will still need a
>way to update an APF library.
>
And that wouldn't happen, except at Bob Shannon's site.

Thanks,
gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html



----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to