>First, I want to THANK YOU for clarification. Now it's more clear for
me.
>However both code - APF and SVC can be poor. Both can be invoked, APF 
>program can be invoked directly - it is still a risk it could accept 
>'magic parameters' and do something wrong. For example I imagine DSS 
>program clone which accept ADMIN keyword without further authorization.

>In other words - both kinds of code can be dangerous when poorly
written 
>or contain 'backdoors'.

While both, APF and SVC, can be poorely programmed, one difference is
that
you *can* control who can call APF-Code. You can't control who's calling
an SVC. So in the latter case, you're completely dependent on the code
to do the authorizaiton check right.

Peter Hunkeler
Credit Suisse

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to