In <listserv%[email protected]>, on 04/02/2010
   at 03:20 PM, Paul Gilmartin <[email protected]> said:

>So, now sheer conjecture.  ASMA90 may or may not do exhaustive SAF
>checking.  Why should it feel obliged to?  It was designed to run
>unauthorized.  So a maliciously crafty programmer could code an SMP/E
>APPLY step which invokes ASMA90; preallocate SYSPUNCH; and supply PUNCH
>statements which overwrite a member in what?  SYS1.PARMLIB?

No, he gets an S913. AC(1) does not turn on JSCBPASS.

>Multiply that by the increasing number of utilities called
>by SMP/E which may not do SAF checking

 Nor am I aware of any need for them to do so.


In <listserv%[email protected]>, on 04/02/2010
   at 05:04 PM, Paul Gilmartin <[email protected]> said:

>OK.  Educate me.  I had thought that once a program was APF
>authorized, it became the responsibility of that program to
>issue the SAF calls and respect the replies; if not, the program could do
>anything it wanted.

Not by magic; the program can only do what it was written to do. You can
certainly write an authorized program that bypasses security, but it
doesn't happens automatically. If the authorized program doesn't have code
to prevent it, then any OPEN will be subject to normal security controls.
 

-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to