SRB mode is only needed if you use IBM's supplied API to zIIP. WLM is the
part of z/os that schedules the TCB/SRB to the a proccessor and there is a
know-how to do this, and indead requires deep knowledge of mvs interfaces
and assembler coding.
THe SRBs scheduled on the zIIP (using IBM's supplied interfaces) are
running in the same address space, so it minimize the risk. SRB mode is
also disabled for IO, so you can't infect other libraries / files like a
virus.

ITschak


On Sun, Nov 3, 2013 at 7:41 PM, Jon Perryman <[email protected]> wrote:

> I suspect we need an SRB that is non-authorized and can never get into an
> authorized state. I hate giving auditors information with which they can
> abuse us but this probably needs to be discussed. By making zIIP so cheap,
> IBM and customers are strongly encouraging us to offload as much work as
> possible onto zIIP. Products that never needed APF authorization may be
> forced to become APF authorized.  Some of our code that we ran in
> unauthorized tasks will probably move to SRB's.
>
> JAVA is a good example. IBM created "zAAP on zIIP" in z/OS 1.11. I believe
> that zAAP is accessed through a TCB which is not running authorized. With
> zAAP on zIIP, they must be using SRB's. Some of that JAVA program must be
> running in SRB mode (unless only interpretation occurs on the zIIP and
> execution is in the TCB).. A hacker can potentially create JAVA code that
> runs in SRB mode to take advantage of the authorized state. Something as
> simple as overlaying storage could create a security exposure and give them
> access to the authorized state.
>
> Jon Perryman.
>
>
>
> ----- Original Message -----
> > From: Peter Relson <[email protected]>
> >
> >> SRB's are a big security exposure so customers are unlikely to open them
> >> to their programmers.
> >
> > SRBs are the same level of security exposure that APF-authorized tasks
> > are. So if an application is already APF-authorized, switching to enclave
> > SRBs is not intrinsically more of a security exposure than already
> > existed. It is true that SRBs are more likely to tend to be key 0 than
> > authorized tasks, but that is not a security exposure. That is a "greater
> > potential for screwing up a system due to overlay of something critical"
> > exposure.
> >
> >> Is the code that runs under the ZIP and ZAP
> >> process code that normally run without any privileges in a problem
> >> state?
> >
> > Only if the perpetrator is irresponsible. It is far from unheard of to
> > have to take an application written to be unauthorized and make it
> > authorized. But if anyone thinks it is as simple as changing the linkedit
> > characteristic to AC=1 and placing it in an APF-authorized library, then
> > they need to be re-educated (and quickly if they're the one responsible
> > for the implementation).
>
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to