On Tue, 12 Feb 2013 09:11:03 -0600, Paul Gilmartin <[email protected]> wrote:

>On Tue, 12 Feb 2013 07:49:27 -0600, John McKown wrote:
>>
>>Another possible solution, which I did with different IBM module, is to
>>write a small HLASM program. This program would verify how it was called by
>>looking at the RB chain, to be sure it was not the first RB on the TCB is
>>what I'm thinking. ...
>> 
>I invoke a lot of programs with Rexx "address LINKMVS".  How does
>that affect the RB chain?

Just as you might expect. The program will be a new RB under whatever RB was 
running your REXX program. It certainly won't be the same as EXEC PGM=(the 
program) and so this would be a trivial bypass to that proposed "security" 
mechanism.

-- 
Walt

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to