At 8/19/2006 12:37 PM, you wrote:
In a recent note, john gilmore said:

> Date:         Sat, 19 Aug 2006 15:14:20 +0000
>
> There are ways to do what you want to do.  They would be APARable as z/OS
> security breaches if they werje described in sufficient detail to be usable.

Yeah there are. All he has to do is have the right to write and install authorized programs.

If there are ways for nonauthorized programming to breach security, than (a) I for one do not know of them, and (b) they certainly would be APARable.

However, for authorized programming, the rules change completely. Yes, it certainly would be possible to manually build a DEB, and no, it would not be APARable because it is acknowledged by both IBM and by the mainframe community at large that authorized programs have the power to corrupt the operating system in arbitrary ways, and so authorized programs have to be trusted.

When a data center gives someone the right to add programs to authorized libraries, just about any and all security can be breached by that person. All it takes is knowledge, and there are probably thousands of programmers who have both the access and the knowledge. And thousands more, being unemployed, who have the knowledge but not (for now) the access.

For nonauthorized programming, the MVS system is pretty much bulletproof. (Am I right? I am not, by any means, a security expert, but I think I'm right about this.)

But for authorized programming, the security is about as robust as moldy cheese. (And I know I'm right about this!)

Security is both a technological problem and a managerial problem. Both are essential to good security, but neither, by themselves, is sufficient.

For any computer system, someone has to be trusted. At the very least, the developers of a system, the developers of products for a system, and anyone who needs to write authorized applications for a system, these are all people who have to be trusted.

It is up to management to decide who needs to be trusted, and it is important for them to make these decisions intelligently. But even good management has full control only over their own employees. They have no control over who IBM decides to trust, and only limited control with respect to 3rd party vendors. (They can decide, within the limits of available choices, which products to buy and which not to buy.)

Once management has decided who is to have what level of trust, then it is important for technology to supply bulletproof tools that allow management to implement their decisions with confidence. The problem is, with respect to programming, there are only two security levels available: authorized programming and nonauthorized programming.

With respect to nonauthorized programming, I expect that RACF is about as good as it can be.

But in order to believe that MVS is a highly secure system, you would also have to believe that everyone who has the ability to install programs into authorized libraries is totally trustworthy. I dunno. When you consider how many programmers there are at IBM, at 3rd party vendors, and in house, that's an awful lot of people to trust.

That's a consequence of authorization being essentially a two tiered construct. A program either is authorized or it is not. If it is authorized, then it can corrupt any storage anywhere in any way that it sees fit. All it takes is knowledge.

Also, IBM has made way too many useful services authorized-only services. This unnecessarily increases the need for programs to be made authorized.

It seems to me that there is something of a NASA mentality here. If we were all honest, objective and thoughtful, we'd all know that there is a huge problem here. But this two tiered authority system has been with us for 35 years or so, were all comfortable with it, to change it would be a huge and disruptive undertaking, and so let's just sweep it under the rug and hope that nothing really bad happens.

In fact, I'm kinda surprised that nobody's yet written a root kit for MVS. (Or have they? Nah... I think not. MVS is just too small a segment of the industry for it to be worth it.)

Dave Cole              REPLY TO: [EMAIL PROTECTED]
Cole Software          WEB PAGE: http://www.colesoft.com
736 Fox Hollow Road    VOICE:    540-456-8536
Afton, VA 22920        FAX:      540-456-6658


PS: As for the notion of not talking about it lest somebody bad is listening ... Well, this is a problem that's been ignored for 35 years, and so somebody bad probably already knows quite a bit about it. Maybe if we do start talking about it, something will actually get done.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to