Re: security with storage allocation under z.OS

2020-11-17 Thread Paul Gilmartin
> On 2020-11-17, at 10:21:10, Binyamin Dissen wrote: > > On Tue, 17 Nov 2020 13:58:23 + Seymour J Metz wrote: > > :>Indeed, OS/360 had some code that was reentrant but not refreshable; AFAIK > IBM has cleaned up all such abominations, and the binder does not allow you > to create a load

Re: security with storage allocation under z.OS

2020-11-17 Thread Seymour J Metz
To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: security with storage allocation under z.OS On Tue, 17 Nov 2020 13:58:23 + Seymour J Metz wrote: :>Indeed, OS/360 had some code that was reentrant but not refreshable; AFAIK IBM has cleaned up all such abominations, and the binder does not allow

Re: security with storage allocation under z.OS

2020-11-17 Thread Binyamin Dissen
ble. You are asserting that RENT now forces REFR? :> :>From: IBM Mainframe Assembler List on behalf of Binyamin Dissen :>Sent: Tuesday, November 17, 2020 2:35 AM :>To: ASSEMBLER-LIST@LISTSERV.UGA.EDU :>Subject: Re: security with storage all

Re: security with storage allocation under z.OS

2020-11-17 Thread Farley, Peter x23353
dely known in the hacker community compared to the Intel or ARM architectures. Peter -Original Message- From: IBM Mainframe Assembler List On Behalf Of ste...@copper.net Sent: Tuesday, November 17, 2020 10:40 AM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: security with storage allocation

Re: security with storage allocation under z.OS

2020-11-17 Thread ste...@copper.net
Mainframe Assembler List on behalf of Tony Harminc Sent: Monday, November 16, 2020 4:37 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: security with storage allocation under z.OS On Mon, 16 Nov 2020 at 12:24, Ze'ev Atlas <01774d97d104-dmarc-requ...@listserv.uga.edu> wrote: > &

Re: security with storage allocation under z.OS

2020-11-17 Thread Seymour J Metz
, 2020 4:37 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: security with storage allocation under z.OS On Mon, 16 Nov 2020 at 12:24, Ze'ev Atlas <01774d97d104-dmarc-requ...@listserv.uga.edu> wrote: > > Hi allIn the 1970's I probably could have done some getmain, wri

Re: security with storage allocation under z.OS

2020-11-17 Thread Seymour J Metz
of Farley, Peter x23353 <0dc9d8785c29-dmarc-requ...@listserv.uga.edu> Sent: Monday, November 16, 2020 4:45 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: security with storage allocation under z.OS It is not necessary to getmain storage in which to run a dynamically created progr

Re: security with storage allocation under z.OS

2020-11-17 Thread Seymour J Metz
From: IBM Mainframe Assembler List on behalf of Binyamin Dissen Sent: Tuesday, November 17, 2020 2:35 AM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: security with storage allocation under z.OS On Mon, 16 Nov 2020 18:35:29 -0700 Paul Gilmartin

Re: security with storage allocation under z.OS

2020-11-17 Thread Ze'ev Atlas
; From: "Ngan, Robert" > To: ASSEMBLER-LIST@LISTSERV.UGA.EDU > Date: 11/17/2020 02:03 AM > Subject: Re: security with storage allocation under z.OS > Sent by: "IBM Mainframe Assembler List" > > I found out the hard way that, if you code EXECUTAB

Re: security with storage allocation under z.OS

2020-11-16 Thread Binyamin Dissen
On Mon, 16 Nov 2020 18:35:29 -0700 Paul Gilmartin <0014e0e4a59b-dmarc-requ...@listserv.uga.edu> wrote: :>On 2020-11-16, at 17:47:10, Dan Greiner wrote: :>> ... :>> So, the facility only applies to virtual addresses on newer models. As I recall, the development of this facility was

Re: security with storage allocation under z.OS

2020-11-16 Thread Jim Mulder
014e0e4a59b-dmarc-requ...@listserv.uga.edu> > To: ASSEMBLER-LIST@LISTSERV.UGA.EDU > Date: 11/17/2020 02:16 AM > Subject: Re: security with storage allocation under z.OS > Sent by: "IBM Mainframe Assembler List" > Conversely, there's REFRPROT to prevent storing into programs >

Re: security with storage allocation under z.OS

2020-11-16 Thread Jim Mulder
IBM Corp. Poughkeepsie NY "IBM Mainframe Assembler List" wrote on 11/16/2020 05:29:02 PM: > From: "Ngan, Robert" > To: ASSEMBLER-LIST@LISTSERV.UGA.EDU > Date: 11/17/2020 02:03 AM > Subject: Re: security with storage allocation under z.OS > Sent by: "IBM

Re: security with storage allocation under z.OS

2020-11-16 Thread Ze'ev Atlas
That make sense, as I am competing with the Linux develipers.  I consider implementing a simple model, befiting native z/OS, with option to implement the security model when it becomes ubiquitous.  I really thank you for the information, as it gives me the basic answer to my question and

Re: security with storage allocation under z.OS

2020-11-16 Thread Paul Gilmartin
On 2020-11-16, at 17:47:10, Dan Greiner wrote: > ... > So, the facility only applies to virtual addresses on newer models. As I > recall, the development of this facility was requested by z/Linux in order to > help avoid classic stack-overflow exposures; but, it obviously has >

Re: security with storage allocation under z.OS

2020-11-16 Thread Dan Greiner
The ability to prevent instruction execution was introduced by the instruction-execution-protection (IEP) facility on the z14 (September 2017). Per the facility blurb in Chapter 1 of the PoO: "The instruction-execution-protection facility may be available on a model implementing

Re: security with storage allocation under z.OS

2020-11-16 Thread Ze'ev Atlas
- From: IBM Mainframe Assembler List On Behalf Of Steve Smith Sent: Monday, November 16, 2020 11:39 To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: security with storage allocation under z.OS There is a new operand on STORAGE, EXECUTABLE=YES|NO.  The default is YES, and for earlier releases

Re: security with storage allocation under z.OS

2020-11-16 Thread Ngan, Robert
Technologies -Original Message- From: IBM Mainframe Assembler List On Behalf Of Steve Smith Sent: Monday, November 16, 2020 11:39 To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: security with storage allocation under z.OS There is a new operand on STORAGE, EXECUTABLE=YES|NO. The default

Re: security with storage allocation under z.OS

2020-11-16 Thread Charles Mills
--Original Message- From: IBM Mainframe Assembler List [mailto:ASSEMBLER-LIST@LISTSERV.UGA.EDU] On Behalf Of Binyamin Dissen Sent: Monday, November 16, 2020 1:58 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: security with storage allocation under z.OS Why would anything break? How would t

Re: security with storage allocation under z.OS

2020-11-16 Thread Charles Mills
it could be induced to modify maliciously. Charles -Original Message- From: IBM Mainframe Assembler List [mailto:ASSEMBLER-LIST@LISTSERV.UGA.EDU] On Behalf Of Tony Harminc Sent: Monday, November 16, 2020 1:37 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: security with storage allocation

Re: security with storage allocation under z.OS

2020-11-16 Thread Binyamin Dissen
Why would anything break? How would that be any different from the same code being in your module? On Mon, 16 Nov 2020 20:32:24 + Ze'ev Atlas <01774d97d104-dmarc-requ...@listserv.uga.edu> wrote: :>I am pretty certain that something would break.  My question was to guide me to where the

Re: security with storage allocation under z.OS

2020-11-16 Thread Farley, Peter x23353
To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: security with storage allocation under z.OS Hi allIn the 1970's I probably could have done some getmain, write some code into that obtained memory and jump to that code. I assume that nowadays, this would be impossible and there is some security model to prevent

Re: security with storage allocation under z.OS

2020-11-16 Thread Tony Harminc
On Mon, 16 Nov 2020 at 12:24, Ze'ev Atlas <01774d97d104-dmarc-requ...@listserv.uga.edu> wrote: > > Hi allIn the 1970's I probably could have done some getmain, write some code > into that obtained memory and jump to that code. I assume that nowadays, this > would be impossible and there is

Re: security with storage allocation under z.OS

2020-11-16 Thread Ze'ev Atlas
equ...@listserv.uga.edu> Sent: Monday, November 16, 2020 12:24 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: security with storage allocation under z.OS Hi allIn the 1970's I probably could have done some getmain, write some code into that obtained memory and jump to that code.  I assume that no

Re: security with storage allocation under z.OS

2020-11-16 Thread Seymour J Metz
ber 16, 2020 12:24 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: security with storage allocation under z.OS Hi allIn the 1970's I probably could have done some getmain, write some code into that obtained memory and jump to that code. I assume that nowadays, this would be impossible and there i

Re: security with storage allocation under z.OS

2020-11-16 Thread Tom Harper
And curiously the facility is present for STORAGE OBTAIN and ISRV64 but not for IARCP64. Sent from my iPhone > On Nov 16, 2020, at 12:39 PM, Steve Smith wrote: > > There is a new operand on STORAGE, EXECUTABLE=YES|NO. The default is YES, > and for earlier releases there was no

Re: security with storage allocation under z.OS

2020-11-16 Thread Steve Smith
There is a new operand on STORAGE, EXECUTABLE=YES|NO. The default is YES, and for earlier releases there was no execute-prevention capability afaik. I don't know what to tell you about the "security model". It's a big subject. sas On Mon, Nov 16, 2020 at 12:24 PM Ze'ev Atlas <

Re: security with storage allocation under z.OS

2020-11-16 Thread Tom Harper
That is not impossible and used in many products for performance reasons, such as sorting. Sent from my iPhone > On Nov 16, 2020, at 12:24 PM, Ze'ev Atlas > <01774d97d104-dmarc-requ...@listserv.uga.edu> wrote: > > Hi allIn the 1970's I probably could have done some getmain, write some

security with storage allocation under z.OS

2020-11-16 Thread Ze'ev Atlas
Hi allIn the 1970's I probably could have done some getmain, write some code into that obtained memory and jump to that code.  I assume that nowadays, this would be impossible and there is some security model to prevent such a security breach.Do you know where can I find information on the