On Tue, 1 Sep 2015 10:03:46 -0500, Walt Farrell wrote:
>>>
>>I can imagine a DoS attack in which an unauthorized user bogarts a QNAME/RNAME
>>generally used by an authorized facility.  But such contention could arise 
>>entirely
>>among unauthorized users.
>
>Yes, contention could arise strictly between unauthorized users, and that is 
>OK in the sense that it could not contribute to a system integrity exposure.
>
>>Are there, perhaps, RACF rules to restrict use of selected QNAMEs to 
>>specified user profiles?
>
Alas, the system is designed to protect itself from mischievous users, but not 
to protect
the mischievous users from each other.

But maybe it doesn't matter.  I wonder if Bad Things happen if the mischievous
user simply codes:

    //STEP  EXEC  PGM=IEFBR14,COND=(0,LE)
    //FILE  DD    DISP=OLD,DSN=SYS1.LINKLIB  (SYS1.**, ad lib.)

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to