On Tue, 1 Sep 2015 09:19:26 -0500, Paul Gilmartin <[email protected]> wrote:
>On Tue, 1 Sep 2015 06:51:43 -0500, Walt Farrell wrote: >> >>I believe it is true that ISGENQ restricts authorized callers to using only >>authorized QNAMEs, gil. Use of unauthorized QNAMES by authorized callers can >>easily end up being a system integrity issue, ... >> >I can imagine a DoS attack in which an unauthorized user bogarts a QNAME/RNAME >generally used by an authorized facility. But such contention could arise >entirely >among unauthorized users. Yes, contention could arise strictly between unauthorized users, and that is OK in the sense that it could not contribute to a system integrity exposure. >Are there, perhaps, RACF rules to restrict use of selected QNAMEs to specified >user profiles? No. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
