While it is true that many might not care about someone corrupting a user
key CSA area (even if it potentially compromises their system), that is not
the only integrity exposure that user key CSA can result in.

Allowing unauthorized communication between address spaces (i.e., "covert
channels") is also made possible by this.

By the way much of TSO/E is written to expect Key 8 callers. It always has
been. If it was simply a question of changing one module to return in the
key of the caller instead of the "known" key. So this is not necessarily a
question of getting back in an unexpected state, it is also a question of
not meeting the input requirements for a service.. If it were nicer, the
service would have simply returned or abended. Instead it trusted its
caller to have met those requirements. Are they documented? I have no idea.

Peter Relson
z/OS Core Technology Design
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to