>I can imagine a DoS attack in which an unauthorized user bogarts a 
QNAME/RNAME
>generally used by an authorized facility.

And that is why use of non-authorized QNAMEs by an authorized caller is 
poor form.

In some cases existing QNAMEs that are not SYSZxxxx have been made 
authorized-only (thus protecting that qname from being used by an 
unauthorized caller) to save the exploiter from having to change (as 
sometimes such a change would have adverse effects not only on the 
exploiter but on others that legitimately rely on the qname/rname).

Peter Relson
z/OS Core Technology Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to