>I can imagine a DoS attack in which an unauthorized user bogarts a QNAME/RNAME >generally used by an authorized facility.
And that is why use of non-authorized QNAMEs by an authorized caller is poor form. In some cases existing QNAMEs that are not SYSZxxxx have been made authorized-only (thus protecting that qname from being used by an unauthorized caller) to save the exploiter from having to change (as sometimes such a change would have adverse effects not only on the exploiter but on others that legitimately rely on the qname/rname). Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
