At 11:37 -0700 on 03/15/2015, Charles Mills wrote about Re:
APF-authorized calling non-authorized:
Okay. I hear you. Here is the business problem.
I need to develop program X. It must run APF-authorized to do one of the
things it needs to do. I have written APF-authorized programs before and I
more or less know what I am doing. I know enough to ask (some of?) the right
questions and have the proper concerns.
It also needs to do something we will call "processing A." It just so
happens that there is an IBM program Y that does exactly A. (In fact, the
real purpose of program X is front-ending program Y and doing some
additional things, one of which requires authorization). The IBM program is
AC=0 in an authorized library. I of course do not have the source for Y and
so cannot inspect it for potential integrity issues.
What do you suggest? Must I re-write Y from scratch so I may be relatively
certain of its integrity?
Once your routine does its authorized thing does it need to remain
authorized? If not, then MODESET before the call.
Query - If I attach subtask and have it do the MODESET and then the
call, will the main task lose its AUTH status? If not then this might
be a way to handle the issue.
The only alternative I see is calling (LINK, etc.) Y from X.
I agree with you. While we can be relatively confident that Y does nothing
"bad" intentionally its authors presumably never intended it to run
authorized. They may have said "oh, don't worry about that -- it will ABEND
if anyone tries to do THAT" and that assumption will no longer be valid.
Suggestions?
No, there does not appear to be a V2R1 manual called MVS Planning: Security.
Charles
-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On
Behalf Of Shmuel Metz (Seymour J.)
Sent: Sunday, March 15, 2015 10:34 AM
To: [email protected]
Subject: Re: APF-authorized calling non-authorized
In <[email protected]>, on 03/15/2015
at 09:03 AM, Charles Mills <[email protected]> said:
Thanks. In my case the called program is a pre-existing utility that is
shipped AC=0 in an APF library.
To confirm: there is no integrity issue introduced here, right?
Wrong.
The called program will run non-authorized, correct?
No.
Does "MVS Planning: Security: still exist?
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN