At 8/20/2006 11:04 AM, PGilmartin wrote:
In a recent note, David Cole said:

DCole wrote:
Authorized programs can breach security.
There are too many reasons why authorized programs have to be written.
There are too many people who write authorized programs.
There are too many people (both inside a Corp. and outside[!]) who
have the right to install authorized programs into authorized libraries.

If I were responsible for security, I would be concerned.

What are the authorization requirements of software your company
markets?  I perceive you wish they could be less.

I wrote my article without regard to my own personal "wishes" or XDC's needs.

Since z/XDC is designed to be useful for debugging all kinds of programs, including authorized ones, it makes extensive use of a large number of authorized interfaces.

When used to debug nonauthorized programs, z/XDC runs nonauthorized, so when it needs to perform something authorized, it invokes a private service SVC to perform that operation.

Our customers have to be willing to trust Cole Software that z/XDC's service SVC is written both competently and without malicious intent. Fortunately for us, our customers are willing to extent that trust. Why? Well, we've been around for a long time and we've got a good reputation.

However, at the risk of cutting my own throat, I will go ahead and state the obvious: I doubt that longevity and reputation alone would be considered by a security professional to be sufficient criteria for extending trust. And I don't think that even our security conscious customers examine either myself or my employees with the same level of diligence that they might examine their own employees.






VM is better in z/OS in this respect. I know utilities that require APF authorization on z/OS, but operate comfortably in class G virtual machines in VM production environments. VM CP can restrict the set of devices a server can manipulate, and provide interprocess communication to that server without giving that server higher privileges.

My experience with VM is only a little bit greater than nil. That being said, however, ...

I think you're missing the point here. I'm talking about security, not integrity. Security focuses on the protection of business process and data. Integrity focuses on the protection of the software.

Violating integrity is only one tool by which security can be breached. Sure, VM may be well designed to protect its own integrity. But what about the business process/data being manipulated by the program(s) running within the virtual machine? What does VM do to protect the integrity of those programs?

In any case, I'm guessing that there are plenty of programs, both customer written, vendor written, and IBM written, that have good reasons to run within virtual machines that have higher privileges. And I'm guessing that that's a lot of programs to trust. So think may not be a whole lot of difference between z/VM and z/OS with respect to this issue.


Dave Cole              REPLY TO: [EMAIL PROTECTED]
Cole Software          WEB PAGE: http://www.colesoft.com
736 Fox Hollow Road    VOICE:    540-456-8536
Afton, VA 22920 FAX: 540-456-6658
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to