On Thu, 22 Apr 2010 15:46:27 +0100 Sam Siegel <[email protected]> wrote:

:>On Thu, Apr 22, 2010 at 3:39 PM, Bob Shannon 
<[email protected]>wrote:

:>> >I'm trying to write some authorized code that has a requirement to invoke
:>> >unauthorized user exits.

:>> Use SYNCH. Assume all data received from the exit is untrusted and insure
:>> the caller verifies it. Caller can save addresses on behalf of the exit.

:>SYNCH was previously suggested and I'm using it.

:>To verify data my intention is to use VSMLOC.

Not good.

Even IVSK is not enough.

You have to consider that you will be interrupted and the status of the
storage location may change.

Only safe way is to use the keyed instructions so the reference is real time.

--
Binyamin Dissen <[email protected]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to