On Tue, 1 Sep 2015 09:19:26 -0500, Paul Gilmartin <[email protected]> wrote:

>On Tue, 1 Sep 2015 06:51:43 -0500, Walt Farrell wrote:
>>
>>I believe it is true that ISGENQ restricts authorized callers to using only 
>>authorized QNAMEs, gil. Use of unauthorized QNAMES by authorized callers can 
>>easily end up being a system integrity issue, ...
>>
>I can imagine a DoS attack in which an unauthorized user bogarts a QNAME/RNAME
>generally used by an authorized facility.  But such contention could arise 
>entirely
>among unauthorized users.

Yes, contention could arise strictly between unauthorized users, and that is OK 
in the sense that it could not contribute to a system integrity exposure.


>Are there, perhaps, RACF rules to restrict use of selected QNAMEs to specified 
>user profiles?

No.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to