On 21 Jun 2007 14:03:20 -0700, in bit.listserv.ibm-main (Message-ID:<[EMAIL PROTECTED]>) [EMAIL PROTECTED] (R.S.) wrote:

From time to time I read on the list about companies which demand ISVs to provide source code for SVC routines to analyze it from security point of view. While I don't know to much about z/OS 'guts', I'm wondering what is the reason for that? Or rather, why the SVC code is so important, while APF-authorized libraries are not subject to analyze. The same apply to propgrams in SCHEDxx members. AFAIK (I could be wrong) APF-authorized program can bypass security rules, so it can be dangeours. Is SVC more dangerous ?

What follows is a mixture of facts, opinion, and experience. I am not pointing a finger at any particular companies or software packages.

SVCs are useful, in part, in that they can perform authorized functions when called from non-authorized programs. Therefore, they need to be extra-careful that they do not perform functions when they oughtn't. An authorized program to, for instance, issue an MVS command is relatively safe because it can be called only from another authorized program. An SVC to do the same needs to do extensive checking to be sure the caller is authorized to issue the command.

Many companies, and some software packages, even have "get yourself authorized" SVCs. If you know the secret software handshake, you can make your non-authorized program authorized. Some of these SVCs do better jobs than others of assuring that they came from programs which are to be trusted. Regardless, they're frowned on by auditors.


--
I cannot receive mail at the address this was sent from.
To reply directly, send to ar23hur "at" intergate "dot" com

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to