In a message dated 8/19/2006 10:22:08 A.M. Central Daylight Time,  
[EMAIL PROTECTED] writes:

>The only security breach would be granting authorization to an  adversary
>to use an APF library or installing a user SVC. That's not a  z/OS issue;
>it's site policy issue. By definition, an authorized  program is a trusted
>program. The security breach is improperly  granting access to an authorized
>program.
Which is exactly what I assumed before writing intermediate-level details  on 
how to construct a nuclear device in your kitchen (low-leverl details are  
available elsewhere on the Internet).  IBM will accept APARs which show  that 
their standard security and protection mechanisms left a hole which could  be 
exploited either intentionally or accidentally.  And in order to make  a 
program 
authorized, either one must obtain permission from one's management  or else 
one must exploit a hole which IBM has guaranteed they will  close.  IBM will 
not accept APARs, however, which show that there is a  hole in management's 
policies on allowing programmers to authorize a  program.
 
For all I know, the OP owns his own P/390 and he is the only user of  it in 
the world.  He can certainly grant himself the necessary authority,  as I used 
to do to myself when I owned my own P/390.
 
Whatever technique one uses, one must first be able to authorize the  program 
which utilizes the technique.
 
Bill  Fairchild




----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to