Thank you, Peter. Others have also responded - thank you - suggesting Unix Pipes and TCP/IP. Those environments being new to me, I will try to solve my problem using only MVS for now, but if not, then Unix, here I come.
I believe the only way to run authorized is to link (Bind) AC(1), which I'm trying to avoid. I may be overly sensitive here, but I am not trying to get around security. I am, however, trying to understand how two unauthorized address spaces using XM POST between them, apparently not allowed, would pose a security risk if they could. OK — I'll take a shot at answering my own question, based on a comment by Charles Mills: "random" address spaces. If unauthorized XM POSTs were allowed without restriction, then one AS could "POST" to any other AS, possibly interrupting a program or destroying data. Yeah, that'd be bad. But then it would help if a set of MVS OS services were developed that could "handshake" together two (or more) specific, not random, unauthorized ASs so they could communicate between themselves. Thanks again -- Richard Zierdt ________________________________ From: IBM Mainframe Discussion List <[email protected]> on behalf of Peter Relson <[email protected]> Sent: Sunday, December 8, 2024 8:39 AM To: [email protected] <[email protected]> Subject: Re: IEAMSXMP - Cross Memory POST - Supervisor State required? This Message Is From an External Sender This message came from outside your organization. You do not need to be supervisor state to use plain XM Post (POST with ASCB). But you do need to be authorized (any of supervisor state, system key, APF-authorization works). You do need to be supervisor state to use IEAMSXMP. Back in the days of B1 security, the "communication" to another address space that POST can be considered to do would have been a security violation. Nowadays a POST like that is simply unacceptable. It was not allowed then, it is not allowed now. Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN Confidentiality Warning/Avertissement de confidentialité: This message is intended only for the named recipients. This message may contain information that is privileged or confidential. If you are not the named recipient, its employee or its agent, please notify us immediately and permanently destroy this message and any copies you may have. Ce message est destiné uniquement aux destinataires dûment nommés. Il peut contenir de l'information privilégiée ou confidentielle. Si vous n'êtes pas le destinataire dûment nommé, son employé ou son mandataire, veuillez nous aviser sans tarder et supprimer ce message ainsi que toute copie qui peut en avoir été faite. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
