On Tue, 12 Feb 2013 09:11:03 -0600, Paul Gilmartin <[email protected]> wrote:
>On Tue, 12 Feb 2013 07:49:27 -0600, John McKown wrote: >> >>Another possible solution, which I did with different IBM module, is to >>write a small HLASM program. This program would verify how it was called by >>looking at the RB chain, to be sure it was not the first RB on the TCB is >>what I'm thinking. ... >> >I invoke a lot of programs with Rexx "address LINKMVS". How does >that affect the RB chain? Just as you might expect. The program will be a new RB under whatever RB was running your REXX program. It certainly won't be the same as EXEC PGM=(the program) and so this would be a trivial bypass to that proposed "security" mechanism. -- Walt ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
