I suppose that I should have started this thread by stating right away
that we have and use SAFESFS. Given it's price, ease of use, the
complexity of SFS's native ACLs, and the reduction in backup times from
hugely fewer authorizations, I can't understand why anyone using SFS would
not have purchased and installed SAFESFS. No, I do not get paid or
compensated in any way for sharing that opinion. Well... my compensation
is the same good feeling we all get from helping one another on the list
to "discover" a useful tools and product, in this case SafeSFS (or
SafeAccess, for that matter).
In response to some of the excellent replies (and all have been):
1) install tools that blindly link MAINT 19E and don't tell you or fail
reasonably when it doesn't work (or worse yet, when it succeeds and they
dump random crap on there w/o telling you)
R: I intend to the MAINT 19E disk current, and maintain the MAINT.YDISK
filespace as a "shadow copy" that is accessed by everything after the file
server comes up. Thus, products can still blindly and (cursedly) silently
install to the actual MAINT 19E disk. We'll be writing a program to
detect differences between the mdisk and filespace and report such
automatically each day. It's the "random crap", much of which is probably
obsolete, installed onto the Y-disk that inspired this effort.
2) loss of the benefit of the YDISK saved segment, although that was a
while back when storage was still a lot more constrained. It would be nice
to never see the SSTAT/YSTAT mismatch message again...
R: I did not seriously consider that. I figured that we have so few CMS
users now that everyone could have their own 19E disk accessed without
noticing all that much resource utilization. It might be true. But the
Y-STAT might be mitigated by Kris' DIRCONTROL/dataspace suggestion. I'll
have more research to do on that idea, including the ramifications of
changing their virtual machines from XA mode to XC mode.
3) The complexity of managing ACLs for large numbers of CMS users using
the built-in tools.
R: Solved. Easily. By SafeSFS. Taking a truly onerous issue and making
it a veritable "piece of cake"... one single authorization record:
ACCEPT USER * READ *:MAINT.YDISK.
4) CMS products that expect their important bits to be on the Y disk and
that rearrange their environment internally after starting up, releasing
anything but what they expect to be there.
R: Yeah, that could be an "interesting opportunity". But that's what
end-users are for -- the best testing! ;-)
Following thorough testing, updates to the SYSPROF EXEC should replace the
"ACCESS MAINT 19E Y/S * * Y2" with "ACCESS PPS01:MAINT.YDISK Y". MAINT
here also has a 019C disk, for local tools. It already has a "YDISK EXEC"
to re-LINK and ACCESS MAINT's 019E. That will be changed to access the
SFS filespace so that users have an easy way to recover a released
filemode Y -- at least without having to know that complex SFS access
syntax. ;-)~
5) (kind'a) I think you could simulate the same effect as mode 0 by using
group-based security grants for "public" files.
That could work. And I suppose we could just have a sub-directory like
"MAINT.YDISK.HIDDEN" and place all the hidden files there. But given that
we'll keep the MAINT 019E disk current, we'll probably just not place most
hidden files on SFS to begin with (except the VMSES PARTCAT Y1, HEWITT
PARTCAT Y1, and the GENDIRT'ed files). Kris pointed out on of my
concerns: "GENDIRT" for compilers (including HLASM, and COBOL2; we keep
PL/I on it's own disk). HLASM and COBOL2 need those files that were
hidden by GENDIRT. Since there's no "ACCESS dirid Y/S * * Y2" support, I
suppose we'll just have to let the users suffer through "exposure" to the
formerly hidden files (not as bad as exposure to Unix). There are not
that many, so wasted FST storage should not be much of a problem -
especially if we go the dataspace route. :-)
>From Kris:
Beware too for "special tools": my customer uses my LOOK tool to scan
files for strings. Without precautions such tools will set all DOLRs to
the date someone searched...
R: Excellent point! Long ago I wrote a "HUNTFILE EXEC" that just looks
for files with given fileid patterns, and "HUNTSCAN EXEC" that actually
reads files and searches for text strings. It already turns off MDISK
cache while it is searching. It will need additional changes to stop DOLR
updates.
Q: Any quick-tips on what you had to do? If not, I'll dig through the doc.
My LOOK has since been updated to avoid that (no, I don't think it is on
VM's download lib, but I can send it).
R: I don't suppose that one can every have enough utilities. Sure, I'd be
happy if sent a copy. You already have my e-mail address.
Similar, a simple BROWSE when one is curious will update the DOLR. So, we
have a PIEK EXEC that avoids this (in Dutch "piek" is pronounced exactly
like the English "peek").
R: Ugh. Something so simple can be so difficult :-(
SFS needs a DOLRUNJPA - Date Of Last Real Use Not Just Poking Around!
SHARE requirement? ;-)
Q: What did you do in PIEK to keep from updating the DOLR. After all, we
have the source for BROWSE. :-)
Thank you all (and future contributors) for excellent ideas and
considerations.
Mike Walter
Hewitt Associates
Any opinions expressed herein are mine alone and do not necessarily
represent the opinions or policies of Hewitt Associates.
The information contained in this e-mail and any accompanying documents may
contain information that is confidential or otherwise protected from
disclosure. If you are not the intended recipient of this message, or if this
message has been addressed to you in error, please immediately alert the sender
by reply e-mail and then delete this message, including any attachments. Any
dissemination, distribution or other use of the contents of this message by
anyone other than the intended recipient
is strictly prohibited.