Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread John McKown
No. APF is not done on a TCB by TCB basis. Every TCB points to a control block called the JSCB (Job Step Control Block). There is an undocumented parameter: JSCB= on the ATTACHX macro which allows specification of the address of this control block, possibly dynamically allocated and initialized. Ho

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread John McKown
On Fri, 2011-04-22 at 18:35 -0600, Frank Swarbrick wrote: > Where can an application programmer who can barely spell SVC and PC > get an understanding of what these are? (I know the SVC is supervisor > call, but that's about it.) Well, how to write an SVC is documented here: http://publibz.bould

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Robert A. Rosenberg
At 19:04 -0500 on 04/22/2011, Patrick Roehl wrote about Re: Mixing Auth and Non-Auth Modules: Would this work? Program A (non-authorized) does an ATTACHX with DCB which points to an authorized library to start program B in a new TCB. Program B would be authorized and service RACROUTE requests

Re: MEMLIMIT Parameter Question

2011-04-22 Thread Hardee, Charles H
Thanks Dan and Mark, however I am now confused, but not by anything either of said. Dan, in the dump I am looking at, I found the SCTX and it does, in fact, have the value you indicate. Mark, I found the RAX in this dump and it, too, had the same value as found in the SCTX. However, and this is t

SMF 62 record

2011-04-22 Thread Johnny Ying
Hello I collected some SMF62 record in my shop to analyse dataset openning,and I happended to find that there‘s no record relates to DB2 table spaces dataset.The doc says:’This record is not generated when a system task issues the OPEN macro’ ,so what does the 'system task' exactly mean? tha

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Frank Swarbrick
Where can an application programmer who can barely spell SVC and PC get an understanding of what these are? (I know the SVC is supervisor call, but that's about it.) -- Frank Swarbrick Applications Architect - Mainframe Applications Development FirstBank Data Corporation - Lakewood, CO USA P:

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Patrick Roehl
Would this work? Program A (non-authorized) does an ATTACHX with DCB which points to an authorized library to start program B in a new TCB. Program B would be authorized and service RACROUTE requests from program A via common storage and a WAIT/POST protocol. Program A would then be free to c

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread john gilmore
Gerhard Postpischl is of course quite right; trapdoors are necessary during the development of much softwar; and they are useful for later troubleshooting tooe. What has interested me more about this thread has been its preoccupation with SVCs, which are at best obsolescent. There is nothin

Re: MEMLIMIT Parameter Question

2011-04-22 Thread DanD
I also found that in the SCT Extention... SCTXMEMS DSXL1SOURCE OF MEMLIMIT VALUE @L5A SCTXMLSZ DSCL8MEMLIMIT SIZE (IN MB)@L5A For REGION=0M SCTXMEMS is 3 and SCTXMLSZ is X'0000' (at least at our shop). Dan wrote: Hello

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Scott Rowe
As long as that sandbox doesn't share anything with any production system maybe. On Fri, Apr 22, 2011 at 5:45 PM, Gerhard Postpischil wrote: > On 4/22/2011 4:17 PM, Rob Schramm wrote: > >> Super Secret (aka Security Through Obscurity) is always a bad idea. >> Security and integrity are difficult

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Rob Schramm
Dang.. did I use Always again and left out the 1 or 2 use cases? Then lock them up in data sets only the trusted can use and certainly putting them in linklst would be something to be avoided. Or on sandbox systems that if co-opted would not adversely affect your business. Rob Schramm On

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Gerhard Postpischil
On 4/22/2011 4:17 PM, Rob Schramm wrote: Super Secret (aka Security Through Obscurity) is always a bad idea. Security and integrity are difficult enough when balanced against allowing progress to occur. Adding in ridiculously risky back doors into your system is a recipe for disaster. I take

Re: OMVS S213-FC

2011-04-22 Thread Marco Gianfranco Indaco
Hi Lizette, yes, we traced and verified spool for allocation of that file... It's removed, allocated and written sequentially and used only to write after checks ftpapi's stem. I can't understand.. -- For IBM-MAIN subscribe / sign

Re: ECSA Fragmentation reporting

2011-04-22 Thread Graham Harris
Thanks for that Rob. I'm not really after a real time thing, just a point in time snapshot to be taken on a regular basis to track the largest ECSA fragments. On 22 April 2011 09:27, Rob Scott wrote: > Graham > > You can easily knock up your own tool using the VSMLIST service if you > require

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Rob Schramm
Super Secret (aka Security Through Obscurity) is always a bad idea. Security and integrity are difficult enough when balanced against allowing progress to occur. Adding in ridiculously risky back doors into your system is a recipe for disaster. An auditor that doesn't know enough to ask the righ

Re: Deleting post

2011-04-22 Thread Jim Thomas
I have ... but then again .. it is also my point.. especially with AI (I speak of the robot). -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Matthew Stitt Sent: Friday, April 22, 2011 2:37 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Deletin

Re: Deleting post

2011-04-22 Thread Matthew Stitt
Read "DUNE, The Butlerian Jihad", etc.. On Fri, 22 Apr 2011 14:23:22 -0500, Jim Thomas wrote: >Humm... what happened to AI and having robot's 'learn' ??. > > >-Original Message- >From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf >Of Staller, Allan >Sent: Fri

Re: Deleting post

2011-04-22 Thread Jim Thomas
Humm... what happened to AI and having robot's 'learn' ??. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Staller, Allan Sent: Friday, April 22, 2011 2:05 PM To: IBM-MAIN@bama.ua.edu Subject: Re: Deleting post See "I,Robot by Issac Asim

Re: Deleting post

2011-04-22 Thread Sam Siegel
On Fri, Apr 22, 2011 at 11:47 AM, Schwarz, Barry A < barry.a.schw...@boeing.com> wrote: > Does that imply that no inaction can ever be immoral? > > In my book no. It seems John believes otherwise. > -Original Message- > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] O

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Rick Fochtman
--- I hope that this SVC has been removed. These "super-secret" SVC's are nothing more than MASSIVE integrity exposures, that can be relatively easily spoofed, and should be banned from any and all z/OS sites. -

Re: Deleting post

2011-04-22 Thread Staller, Allan
See "I,Robot by Issac Asimov" I quote from the first law of robotics; A robot may not injure a human being or, through inaction, allow a human being to come to harm. -- For IBM-MAIN subscribe / signoff / archive access instru

Re: Deleting post

2011-04-22 Thread Mark Jacobs
I quote from the first law of robotics; A robot may not injure a human being or, through inaction, allow a human being to come to harm. On 04/22/11 14:47, Schwarz, Barry A wrote: Does that imply that no inaction can ever be immoral? -Original Message- From: IBM Mainframe Discussion

Re: Deleting post

2011-04-22 Thread Schwarz, Barry A
Does that imply that no inaction can ever be immoral? -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of john gilmore Sent: Friday, April 22, 2011 5:50 AM To: IBM-MAIN@bama.ua.edu Subject: Re: Deleting post Neither the past nor even our re

Re: EXTERNAL: Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Roach, Dennis (N-GHG CORP.)
I hope your auditors never visit a shop I am at. They are not worth the money. My auditores use tools that identify each active user SVC, non user SVCs that IBM does has not supplied, and all SVCs that have been updated. Vendors must certify that the SVC does not override the problem state prot

Re: MEMLIMIT Parameter Question

2011-04-22 Thread Mark Zelden
On Fri, 22 Apr 2011 10:58:01 -0400, Hardee, Charles H wrote: >Hello Everyone, > > > >I am in need of locating the where the MEMLIMT value is stored for the >active job. > >Can anyone out there give me an idea of where to look? > The RAX (RSM ADDRESS SPACE BLOCK EXTENSION) mapped by IARRAX. If

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Emily A. Rambo
On Fri, 22 Apr 2011 12:10:15 -0500, Wayne Driscoll wrote: >I hope that this SVC has been removed. These "super-secret" SVC's are >nothing more than MASSIVE integrity exposures, that can be relatively >easily spoofed, and should be banned from any and all z/OS sites. > >=

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Ted MacNEIL
>You must not have auditors. This is not an audit issue. >This is a security breach waiting to happen. Auditors can only monitor procedures. And, they can only point out issues that SMEs have identified. >How do you prevent someone from calling their program the same name as one in >the intern

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Wayne Driscoll
I hope that this SVC has been removed. These "super-secret" SVC's are nothing more than MASSIVE integrity exposures, that can be relatively easily spoofed, and should be banned from any and all z/OS sites. === Wayne Driscoll OMEGAMON DB2 L3 Support/D

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread John McKown
That is a very bad idea. It would be better to make the RACF functions in the SVC itself. Perhaps doing a validation before by checking a FACILITY profile. On Apr 22, 2011 11:28 AM, "Emily A. Rambo" wrote: > If there's no way to get what you need without using the functions that IBM > requires be

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Veilleux, Jon L
You must not have auditors. This is a security breach waiting to happen. How do you prevent someone from calling their program the same name as one in the internal table? -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of Emily A. Rambo S

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Emily A. Rambo
If there's no way to get what you need without using the functions that IBM requires be authorized, here's another possibility. We had a sysprog years ago who coded a user SVC that could be called to flip the JSCBAUTH bit on or off, with a very short list of program names in an internal table t

Re: OMVS S213-FC

2011-04-22 Thread Lizette Koehler
> Hi, we have a problem in a rexx function that send data using ftpapi and > after start > ssh using bpxbatch. > The problem occurs randomly and appare as a S213-FC when we try to make > operation on output files(i.e. ftp log) This happens rarely and we have just > checked the > correct syntax of

OMVS S213-FC

2011-04-22 Thread Marco Gianfranco Indaco
Hi, we have a problem in a rexx function that send data using ftpapi and after start ssh using bpxbatch. The problem occurs randomly and appare as a S213-FC when we try to make operation on output files(i.e. ftp log) This happens rarely and we have just checked the correct syntax of rm/alloc/open/w

MEMLIMIT Parameter Question

2011-04-22 Thread Hardee, Charles H
Hello Everyone, I am in need of locating the where the MEMLIMT value is stored for the active job. Can anyone out there give me an idea of where to look? Also, if you know, is the value stored in the address space control block, whatever block that is, a merged value between the system

Re: Deleting post

2011-04-22 Thread Ted MacNEIL
>Morality ... computing ... >I thought we'd beaten the (recent) oxymoron thread to death. I wasn't judging. I was asking a question. If you don't want something read, don't write it. - Ted MacNEIL eamacn...@yahoo.ca Twitter: @TedMacNEIL

Re: OMEG monitoring after HyperSwap

2011-04-22 Thread Mike Schwab
Allocate, delete, migrate, or recall a dataset in the affected storage group. Or a migrate a volume to level 0 so a migrate / recall occurs for unused datasets. On Fri, Apr 22, 2011 at 9:19 AM, Wang Xiaobing wrote: > Restart OMEGAMON still get nothing...:-( > -- Mike A Schwab, Springfield IL USA

Re: OMEG monitoring after HyperSwap

2011-04-22 Thread Johnny Luo
try to verify the space info in RMF III storage group space monitor. If it's empty too, the problem lies in SMS. Best Regards, Johnny Luo On Fri, Apr 22, 2011 at 10:19 PM, Wang Xiaobing wrote: > Restart OMEGAMON still get nothing...:-( > >

Re: OMEG monitoring after HyperSwap

2011-04-22 Thread Wang Xiaobing
Restart OMEGAMON still get nothing...:-( -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Walt Farrell
On Thu, 21 Apr 2011 15:27:48 -0500, Patrick Roehl wrote: >The RACF functions are used to determine if a 3rd party is allowed to access a >specific resource. > >RACROUTE REQUEST=VERIFY,ENVIR=CREATE >RACROUTE REQUEST=AUTH >RACROUTE REQUEST=VERIFY,ENVIR=DELETE > >The process is run as a started task

User Experience Session Speakers for Orlando SHARE (Aug 7-12, 2011)

2011-04-22 Thread SHARE LVM Team
(Cross-posted to IBMVM, IBM-Main and Linux-390) The SHARE Linux & VM Program is looking for individuals who are able to attend the upcoming conference in Orlando, FL (August 7-12, 2011), and who are interested in presenting User Experience sessions on topics related to Linux and virtualization. W

Re: OMEG monitoring after HyperSwap

2011-04-22 Thread Johnny Luo
OMEGAMON or RMF can only get the space info after the first data set is allocated on it. HyperSwap may swap the ucb and it's possible that the space stat is updated at the ucb level . So after a swap the old info is lost. Just my guess. Best Regards, Johnny Luo On Fri, Apr 22, 2011 at 9:35 PM,

OMEG monitoring after HyperSwap

2011-04-22 Thread Wang Xiaobing
Hi , Today, after a HyperSwap processing, all are looks well, but the OMEGAMON For Storage can not get the Storage Group sapce information, any one experience the same problem ? Thanks. Wang -- For IBM-MAIN subscribe / signoff

Re: Deleting post

2011-04-22 Thread john gilmore
The lawyers' doctrine of de minimis---Let's not decide issues that need not be reached--suggests that questions about the morality of deleting a post from the UA IBM-MAIN archive are at best moot. We have no centralized system of Orwellian memory holes, only a congeries of ineptly implemente

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Patrick Roehl
I should have been more specific with the macro parameters. Below are the full macros being used, which include the ACEE parameter. If there is a non-authorized way to perform a check with supplied credentials, that would be an excellent solution. RACROUTE REQUEST=VERIFY, ENVIR=CREATE,

Re: Deleting post

2011-04-22 Thread Shane Ginnane
Morality ... computing ... I thought we'd beaten the (recent) oxymoron thread to death. Or maybe I've just spent too much time dealing with the marketing side of the industry ... Shane ... On Fri, Apr 22nd, 2011 at 9:12 PM, Ted MacNEIL wrote: > >I've removed the post from the UA archives. > >

Re: PARTIAL RELEASE and Space Constraint Relief

2011-04-22 Thread Binyamin Dissen
On Thu, 21 Apr 2011 13:42:32 +0800 ibmnew wrote: :> The application programmers in our shop always allocate many big datesets(PS,PDS,VSAM),but they only use <10% space oF the datasets. :> I want to release the spaces that aren't used by SMS . :> Could you tell me how to do it? :> I

Re: Deleting post

2011-04-22 Thread Ted MacNEIL
>I've removed the post from the UA archives. Don't get me wrong, and I'm not criticising, but is that the moral thing to do? - Ted MacNEIL eamacn...@yahoo.ca Twitter: @TedMacNEIL -- For IBM-MAIN subscribe / signoff / archive acce

Re: Error 167 from socket() call in CICS

2011-04-22 Thread Jan MOEYERSONS
On Thu, 21 Apr 2011 13:49:14 -0700, John Weber wrote: >Hi, > >We are calling from z/OS CICS COBOL to a C program which is opening a socket to start a TCPIP connection and we got back error 167 from the socket () function call. Do you have TCPIP.SEZATCP in both your //DFHRPL and //STEPLIB ? Is

Re: Error 167 from socket() call in CICS

2011-04-22 Thread David Crayford
On 22/04/2011 12:59 PM, Chris Mason wrote: John The *issue* here is that IBM - and possibly other vendors - when dealing with socket calls - that's socket calls in general not just the actual socket() call - just seem not to be comprehensive in documenting all possible return codes (errnos) for

Re: Submit a series of jobs in order after the previous has completed

2011-04-22 Thread Robert A. Rosenberg
At 00:39 -0500 on 04/21/2011, Paul Gilmartin wrote about Re: Submit a series of jobs in order after the previous: I could build multi-data-set tapes starting with a nonspecific VOLSER with the power of JCL. I once did this in Rexx, scanning the TIOT (Thanks, Steve Bacher) for the volser of

Re: ECSA Fragmentation reporting

2011-04-22 Thread Rob Scott
Graham You can easily knock up your own tool using the VSMLIST service if you require real-time results. Most (if not all) commercial MVS monitors would offer a display that shows this sort of information - however I am guessing that you are after something free. Rob Scott Lead Developer Rock

Re: Mixing Auth and Non-Auth Modules

2011-04-22 Thread Rob Scott
RACROUTE REQUEST=AUTH only needs to be called from an authorized environment when using certain (less common) keywords. Which keyword is being used that makes authorization required? Rob Scott Lead Developer Rocket Software 275 Grove Street * Newton, MA 02466-2272 * USA Tel: +1.617.614.2305 Em

AUTO: Angelo Corridori is out of the office. (returning 04/25/2011)

2011-04-22 Thread Angelo Corridori
I am out of the office until 04/25/2011. I am out of the office. I will respond to your message when I return; limited access to e-mail/phonemail. Note: This is an automated response to your message "IBM-MAIN Digest - 20 Apr 2011 to 21 Apr 2011 (#2011-111)" sent on 4/22/11 0:00:01. This is the