Hi Chris,

You answers are just exectly what I was looking for. I RTFMed a little as
well and have my ideas. For example, I looked into the USS TAB code and
found that a I can force some input rules, ;like blocking LOG APPLID. I
didn't respond as I am still learning your answer, BTW, I want to thanks all
those who responded, I learened from all, even from those that delt with my
wrong wording.

Many thanks,

Itschak



On Wed, Jan 14, 2009 at 7:01 PM, Chris Mason <[email protected]>wrote:

> Itschak
>
> I see you are there and able to respond. Since we haven't heard a "Thanks
> Chris that exactly meets my requirements." I must assume that my purely
> VTAM solution using CDRM statement operands and CDRSC statements where
> necessary didn't somehow answer your needs. I'd rather like to know why
> since it's so straightforward.
>
> And, of course, I'm still trying to have you avoid any unnecessary expense!
>
> So let's try again from the beginning.
>
> > CICS of organization "A" is connected (LU6.2 Connection) to CICS of
> organization "B". No problem with that.
>
> Translation: There is a CICSA-CICSB set of sessions. (being LU 6.2 it will
> be a
> set of sessions rather than a single session.). Whatever measures are taken
> to prevent other sessions being established need to allow this set of
> sessions
> to be established.
>
> > I looked into the CDRM and found some other application (probably
> plural "applications") of organization "B" defined in VTAMLST of
> oranization "A".
>
> Translation: I browsed the CDRSC (CDRM was corrected in a following post to
> CDRSC) major node VTAMLST member or members in the VTAMA VTAMLST
> library and found other CDRSC statements presumably corresponding to other
> applications, some of them other CICS applications. (The fact some were
> other CICS applications is mentioned in a following post.)
>
> > Tried LOGON APPLID(xxx) and gpt the GMtran of org. "B" (if it is the
> default, I can travel in this CICS...).
>
> Translation: I succeeded in logging onto one or more CICS applications in
> VTAMB, CICSB, CICSB1 ..., using the names I found in the CDRSC statements
> and I was presented with the "Good Morning" messages. Assuming there is no
> CICS-level security imposed, I can enter transactions in these CICS
> applications.
>
> > I also riched TSO logon etc.
>
> Translation: I also succeeded in logging onto the TSO application in VTAMB,
> TSOB, as far as the logon panel. And I succeeded in logging onto other
> applications.
>
> > Now, I want to block (at) org "b" ability to get to org "a" applications
> other
> then the CICS connection that was agreed between Org "A" and "B".
>
> Translation: Having seen what I can do as a user associated with VTAMA in
> accessing applications in VTAMB, I am concerned that a user associated with
> VTAMB can access applications in VTAMA, the VTAM with which I am working.
> I want to prevent a user associated with VTAMB accessing applications in
> VTAMA.
>
> > Is this possible?
>
> Translation: None needed!
>
> Answer: Assuming you have the authority to change VTAM definitions, in the
> VBUILD TYPE=CDRM member in VTAMA VTAMLST, change the VTAMB CDRM
> statement to specify CDRSC=REQ and do *not* define any of the end-user
> LUs associated with, "owned by", VTAMB as CDRSCs. That way none of the
> VTAMB end-users can initiate a session with any of the VTAMA applications -
> exactly what I think you want to achieve. In order still to be able to set
> up
> the CICSA-CICSB sessions, you will need to define a CDRSC in VTAMA for
> CICSB as CICSB CDRSC CDRM=VTAMB within a VBUILD TYPE=CDRSC member.
> Hitherto, I expect this CDRSC will have been defined dynamically because
> you
> specified CDRSC=OPT for VTAMB and CDRDYN=YES is in effect for your local
> CDRM.
>
> Walt, these are not just pointers, this is chapter and verse!
>
> To continue:
>
> > I also want to block the ability to enter logon applid command (may be by
> userid, even of the solution will require entering userid & password). How
> to
> achive that?
>
> Answer: Presumably you are talking about blocking the use of LOGON APPLID
> (xxx) at VTAMB for the VTAMA applications. When stated like that, this is
> clearly undesirable since it would prevent end-users in VTAMB accessing
> applications in VTAMB! Also, unless that "trick" of using SSCPFM=FSS works
> and that value can be applied to the VTAM definition, there is no way
> actually
> to prevent the use of the default USS LOGON and LOGOFF commands.
>
> If the end-users in VTAMB access SNA by means of a TN3270 server, then
> use of RESTRICTAPPL can impose use of a userid and password as described in
> the Communications Server IP Configuration Guide.
>
> > What other alternatives are offered to connect to vtam applications when
> USS tab is displaied, other then LOG APPLID and selecting from the uss tab?
> I
> mean, is there any bypass to LOG APPLID if blocked?
>
> Translation: What other alternatives are offered to connect to VTAM
> applications when USS message 10 is displayed other then LOGON APPLID(xxx)
> *or* selecting from LOGON command aliases defined in the USS table? I mean,
> is there any bypass to LOGON APPLID(xxx) if blocked?
>
> Answer: Use of the interpret table can, in effect, bypass the use of
> commands defined in the USS table.
>
> The usual alternative to use of USS LOGON commands in order to initiate
> sessions from end-user LUs is to use a session manager with which a session
> is established by means of a LOGAPPL operand on the LU (or LOCAL)
> statement definition.
>
> -
>
> > Now, there is no way to stop some one in org "A" to simply logon to org
> "B"
> CICS.
>
> Answer: Oh yes there is - see above.
>
> > Believe me, I tried it and accessed many vtam applications. few of them
> where no protected well. Some of them uses default ACB names. the ability
> to
> finally logon into is depend on the level of security implemented at org
> "B". In
> many cases I tested, it was not a problem to enter in. I am sure I can do
> it
> with some success at any site. There are always holes in security.
>
> Translation: Believe me, I tried it and accessed many VTAM applications. A
> few of them were not well protected. Some of them use default ACB names,
> that is, the names in the installation samples. The ability to logon to the
> application is dependent on the level of security implemented at org "B".
> In
> many cases I tested, it was not a problem to enter into the application. I
> am
> sure I can do it with some success at any site. There are always holes in
> security.
>
> Question: Are your organisations A and B using different network
> identifiers? If
> so that would explain how you were able to log onto applications which had
> not had the default APPL names changed.
>
> Response: You will not be able to get near the application if you adopt the
> CDRM definition operand values I mentioned. However, as the VTAM
> administrator at VTAMA and with no influence over the VTAM definitions in
> VTAMB, there is unavoidably one application logon you cannot block: that of
> end-users in VTAMA accessing - via the USS LOGON command - CICSB, the
> CICS for which you were obliged to define a CDRSC. In order to cover that
> you will be obliged to persuade the VTAM administrator at VTAMB to specify
> CDRSC=REQ on the CDRM statement for VTAMA and to create a CDRSC
> statement for CICSA.
>
> > Now that I found the door, I am looking to see how to limit Access from A
> to
> B by LU 6.2 from CICS and not from any terminal at "A".
>
> Translation: Now that I have found the door, I am looking to see how to
> allow
> access from A to B by means of the LU 6.2 connection from CICSA to CICSB
> but to forbid access from A to B by direct logon using the USS LOGON
> command from an end-user in VTAMA.
>
> > I think that the two organization agrred to connect their CICS systems on
> a
> limited services. Not to open a door to any terminal and to any vtam
> application. Assume that LOG APPL will accept netname.applid as P1...
>
> Translation: I believe that the two organizations want to connect their
> CICS
> systems for limited functions. I believe that they do not want to allow any
> end-user LU to logon to any application LU where the USS command is of the
> form LOGON APPLID(netname.applid).
>
> -
>
> Am I getting closer?
>
> Chris Mason
>
> On Wed, 14 Jan 2009 16:51:31 +0200, Itschak Mugzach
> <[email protected]> wrote:
>
> >Walt, I might used worng wording, but when I said LOGON to CICS (or any
> >other VTAM application on partner sight, I ment it. The only limit I
> >have when Pentesting is the partner company to agree for the signon.
> >I have seen few sites using no GMTRAN at all, so you signon to CICS with
> no
> >password and get the default user auth! There are also few other VTAM
> >applications that uses internal userid and passowrd that is stored in a
> >file. NDM is a sumple for super user that is described in a parameter
> >library.
> >
>  >ITschak
> >
> >On Wed, Jan 14, 2009 at 4:42 PM, Walt Farrell <[email protected]>
> wrote:
> >
> >> In response to a Wed, 14 Jan 2009 08:00:36 +0200 message from Itschak
> >> Mugzach <[email protected]>:
> >>
> >> You seem to be mixing terminology, and possibly causing confusion,
> Itschak.
> >>  (Though I think Chris understands what you've said and has provided
> some
> >> good pointers.)
> >>
> >> You start out by saying
> >> > Now, there is no way to stop some one in org "A" to simply logon to
> org
> >> "B"
> >> > CICS.
> >>
> >> Logging on to CICS is controlled by the user ID and password provided
> >> during
> >> the CICS signon processing.
> >>
> >> You go on to say:
> >> >Believe me, I tried it and accessed many vtam applications. few of
> >> >them where no protected well. Some of them uses default ACB names. the
> >> >ability to finally logon into is depend on the level of security
> >> implemented
> >> >at org "B".
> >>
> >> What you're talking about there is NOT "logging on to CICS" but
> connecting
> >> to org B's system, via VTAM, and logging on to other VTAM applications
> they
> >> have, not CICS.
> >>
> >> I'm not disputing that you were able to do that, but I feel it's
> important
> >> to properly express what has happened and thus, perhaps, avoid
> confusion.
> >>
> >> And yes, the ability to logon to B's applications, if you can reach B
> via
> >> an
> >> LU2 connection, is dependent on the security implemented at B and in its
> >> applications.
> >>
> >> --
> >>  Walt Farrell, CISSP
> >>  IBM STSM, z/OS Security Design
>
> ----------------------------------------------------------------------
>  For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to