It is obvious that SMP/E is in the business of "executing" SYSMOD
installation instructions. SMP/E is an APF authorized/superuser program,
therefore it is a tempting attack surface. Since SMP/E is privileged, it
must be carefully designed and controlled in order to avoid arbitrary code
execution. Regardless of how much review and testing SMP/E undergoes and it
could have still have a security hole, known or unknown; therefore it is
only prudent to restrict who can use it. 

Of course, any APF authorized/superuser program could be a tempting attack
surface. Obviously, they should be thoroughly reviewed and tested before
allowing public access. If their design or function has the possibility of
arbitrary code execution, their use should be restricted to trusted users.

A fair number of years ago I submitted a DCR suggesting that customers
should have an optional facility to control access to APF libraries. I don't
remember the details I suggested. Perhaps it was CLASS(FACILITY)
'APF.data-set-name' or maybe a new class CLASS(APFLIB) 'data-set-name'. In
either case, the profile would apply to all APF libraries, in addition to
their normal RACF profiles. APF libraries would have some protection, even
if they had no regular data set profile. A profile like CLASS(APFLIB) **
UACC(READ) would prevent updates to all APF libraries, but allow execution.

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf
Of Walt Farrell
Sent: Tuesday, April 06, 2010 11:39 AM
To: [email protected]
Subject: Re: Heads Up: APAR IO11698 - New SAF FACILITY class definition
required for any SMP/E use

On Tue, 6 Apr 2010 13:28:11 +0200, R.S. <[email protected]>
wrote:

>Of course in every case we should know the meaning of the profiles and I
>believe that the GIM.** profiles will be documented. It does not
>contradict with the APAR statement - the risk details can be still
obscured.
>BTW: I bet the case is very bizarre case and it does not affect majority
>of us, BUT the APAR officially falls into category "integrity" and gets
>all the attributes of secrecy. I consider it as SPE (Small Programming
>Enhancement) with disputable qualification.

Sorry, Radoslaw, but while the implementation may have happened to provide a
functional enhancement that some of you will find useful, we would not have
released an APAR that -requires- those migration actions if it were merely
an enhancement.  

We might have introduced such improved function via an APAR, but it would
have been optional (e.g., "if you want to control function x you can define
this profile", not "if you want to allow the program to continue working at
all you must define a profile").  We do not lightly make such changes
mandatory and force migration actions on our users in the service stream.

There is a legitimate integrity exposure involved, and the APAR is properly
classified as such.  We perhaps should have said a bit more in the
documentation.  We're considering whether we can do so, and what we can say
that will convey the magnitude of our concern (though merely the fact that
we did this via an APAR with mandatory migration actions should serve as a
indication  that we have serious concerns and there is a legitimate problem
to address).

-- 
Walt Farrell, CISSP
IBM STSM, z/OS Security Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to