On Tue, 15 Apr 2008 18:19:08 +0200 Lindy Mayfield <[EMAIL PROTECTED]>
wrote:

:>For completeness, since I started this whole, ah, thing, I'm curious
:>what they are.  Here are the techniques I've learned so far, including
:>the one that violates system integrity:

:>__ The standard acceptable method is to call TSO/E Service Facility,
:>IKJEFTSR and pass it the name of an authorized module.

:>__ Call an SVC that flips the JSCBAUTH bit back on.  This is
:>non-standard.  If it is to be implemented even on a development system
:>then added security needs to be built in to make sure it isn't misused.

:>__ Simply put all the authorized stuff into an SVC or PC routine.

:>That's all I've collected so far.  Are there more ways?

DEBAPFIN

SVC screening.

--
Binyamin Dissen <[EMAIL PROTECTED]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to