On Mon, 16 Mar 2015 16:49:26 -0400, Shmuel Metz (Seymour J.) wrote:
>
>   at 12:53 PM, Paul Gilmartin said:
>
>>is now impacted in that calling IEBCOPY causes his program to lose
>>authorization/ ABEND/whatever.
>
>Not even close.
> 
Read the thread.  Walt already corrected me on that, and I accepted the 
correction.'


On Mon, 16 Mar 2015 16:47:52 -0400, Shmuel Metz (Seymour J.) wrote:
>
>>Also, what benefit comes from changing IEBCOPY from AC(1) to AC(0)?
>
>The obvious one: it will work when invoked by an unauthorized program.
> 
I don't think so; if I were to relink IEBCOPY with AC(1) into an authorized
library, it would work equally well when called from an unauthorized program.

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to