That's why I like using something internal to the zSeries for zSeries
communications and automation. The source of the data can be trusted to not be
spoofed so you can authenticate that against a table of authorized users and be
safe. With the VMCF protocal (SMSG is just a commandline SENDX, right?) and the
IUCV protocal, CP handles the sizing of the data before the Linux code would
ever see it, leaving application developers to look elsewhere to code their
buffer overrun vulernabilities. It is unsniffable by the network spies so there
is no need for fancy CPU intensive encryption with public/private key
management.

/Tom Kern

--- John Summerfied <[EMAIL PROTECTED]> wrote:
> Dave Jones wrote:
> > As Dr. Boyes suggests, using the open source IUCV driver is a very good
> > way of solving this type of problem. You can find it here:
> > http://www.sinenomine.net/vm/fsiucv
> >
> > Another approach that might be applicable here is to have a simple
> > client, running on the Linux guest, and listening on a specific TCP
> > port. A server, running on VM, can then connect to the client and send
> > the client any number of Linux commands to execute. The client executes
> > the commands
> 
> Carefully, one hopes. We don't want this sort of thing getting out of
> hand again (like rsh and any number of web apps), trusting user data and
> so allowing unauthorised folk to do unauthorised things (and that
> included authorised folk exceeding their authorisation).
> 
> --
> 
> Cheers
> John


__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to