Re: Recataloging Linklist Datasets

2008-11-13 Thread Walt Farrell
allocated/OPENed the DB originally. And then things start failing when you get to step (c) because the wrong database (on the old volume) is used. I think that processing is what the documentation was trying to describe, for the non-reIPL case. --

Re: PDS Lock

2008-11-10 Thread Walt Farrell
-managed data set and catalog protection through the SAF interface. For more SAF information, see "System Authorization Facility" in z/OS MVS Programming: Assembler Services Guide and z/OS MVS Programming: Assembler Services Reference ABE-HSP. -- Walt Farrell, CISSP IBM STSM, z/OS Sec

Re: how to write sysrexx

2008-11-07 Thread Walt Farrell
On Fri, 7 Nov 2008 17:34:03 +0800, Tommy Tsui <[EMAIL PROTECTED]> wrote: >I checked the result, it only can show up the first 4 lines statement, >INIT(1), even the AXRCMD run successfully. I also try "/DI(1-2)", the >result is also 4. > >CMDRESULT=AXRCMD('/DI(1-2)','OUTPUTVAR.',100); > SAY OUTPUTV

Re: Best way to force jobs to a specific LPAR

2008-10-31 Thread Walt Farrell
ID(*) ACCESS(READ) WHEN(SYSID(smf-id)) If the program runs on a system you have not specified then it will abend with an S306 abend. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / sign

Re: Authentication (was: TN3270 for iPhone)

2008-10-27 Thread Walt Farrell
int out, though, that for TN3270 access (e.g., to CICS, IMS, TSO, etc.) you don't need to use passwords. You could use digital certificates instead. And if you really want to use Secure ID cards I think you'll find other vendors who provide that support on z/OS, so it's available,

Re: ICH409I 283-054 ABEND DURING FRACINIT PROCESSING

2008-10-26 Thread Walt Farrell
On Fri, 24 Oct 2008 17:43:08 -0400, Hrycewicz, David <[EMAIL PROTECTED]> wrote: >To clarify Walt's post, CA's mainframe security solutions do perform >appropriate security checking and ensure that the identity issuing the >command is authorized to execute that command on the system that it was >ro

Re: ICH409I 283-054 ABEND DURING FRACINIT PROCESSING

2008-10-24 Thread Walt Farrell
g for commands routed from a RACF system to an ACF2 or TopSecret system, or simply being ignored. To do that, you need to try a command that should fail for security reasons, not one that should work. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design ---

Re: ICH409I 283-054 ABEND DURING FRACINIT PROCESSING

2008-10-24 Thread Walt Farrell
ysplex hangs during error recovery command processing, at least when routing between systems with compatible security products, but at the cost of some command routing issues as we've discussed in this thread. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design ---

Re: ICH409I 283-054 ABEND DURING FRACINIT PROCESSING

2008-10-24 Thread Walt Farrell
I/O, then the request should fail. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO S

Re: ICH409I 283-054 ABEND DURING FRACINIT PROCESSING

2008-10-23 Thread Walt Farrell
On Thu, 23 Oct 2008 13:51:38 -0400, Scott Rowe <[EMAIL PROTECTED]> wrote: >http://preview.tinyurl.com/6g6dqa > >Looks pretty clear to me, right there in the Admin Guide. Thanks for finding that, Scott. -- Walt Farrell, CISSP IBM STSM, z/OS

Re: ICH409I 283-054 ABEND DURING FRACINIT PROCESSING

2008-10-23 Thread Walt Farrell
; are as compatible with RACF's as Top Secret's are. And for some customers, with highly centralized security administration, (2) may not be much of a problem. But with less centralized administration it may be more of a problem. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design --

Re: ICH409I 283-054 ABEND DURING FRACINIT PROCESSING

2008-10-23 Thread Walt Farrell
ands work" but I've never known if anyone has confirmed that there's any security processing happening at all on the receiving system when the security product isn't RACF. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -

Re: ICH409I 283-054 ABEND DURING FRACINIT PROCESSING

2008-10-23 Thread Walt Farrell
happening. Is this z/OS or security related? Routing operator commands within a sysplex from a system running a different security product, to a system running RACF, when you're using the OPERCMDS class, is not supported. See APAR OW34880 for a bit more info.

Re: OUTPUT JESDS= statement

2008-10-20 Thread Walt Farrell
On Mon, 20 Oct 2008 09:17:19 -0500, Chase, John <[EMAIL PROTECTED]> wrote: >Like presumably most shops, we've configured JOBCLASS STC to send the >joblog, et al to the bit bucket. Now wanting to retain the joblog for >CICS regions, I've added an //OUT1 OUTPUT JESDS=ALL statement to the >started j

Re: How to insert records using EXECIO

2008-10-16 Thread Walt Farrell
he variables after that new data. However, if an error occurs before you finish the writing then you will have lost the data in your file. -- Walt Farrell -- For IBM-MAIN subscribe / signoff / archive access instructions, se

Re: PDS Lock

2008-10-07 Thread Walt Farrell
data sets; and (b) data sets protected by (really, known to) RACF. Actually both (a) and (b) apply regardless of security product, as far as I know. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design - -- For IBM

Re: getting the mainframe id in a cobol program

2008-09-23 Thread Walt Farrell
ogram" is too imprecise as a description. Where the program runs is perhaps more important to the original question. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access i

Re: getting the mainframe id in a cobol program

2008-09-23 Thread Walt Farrell
of information required for a complete answer. Where does that COBOL program run? Batch? CICS? IMS? Elsewhere? In particular, for CICS or IMS the required techniques differ from those for batch. -- Walt Farrell, CISSP IBM STSM, z/OS

Re: OT: Stretch article

2008-09-17 Thread Walt Farrell
On Wed, 17 Sep 2008 09:30:08 EDT, IBM Mainframe Discussion List <[EMAIL PROTECTED]> wrote: > > >From the article on Stretch: >"[Stretch] ... could perform 100 billion computations a day and handle half >a million instructions per second." > >There are 86400 seconds in one day. Half a million inst

Re: Looping through SPQA/DQE's

2008-09-16 Thread Walt Farrell
On Tue, 16 Sep 2008 21:01:44 +0200, Lindy Mayfield <[EMAIL PROTECTED]> wrote: >Wayne suggested to get DQENEXT and then compare that to the first one on >the queue (ie SPQAFADQ). This works sometimes, but sometimes after >making a round, in between the first DQE and the last DQE there is the >SPQA

Re: z/OS 1.7 FTP RDW option for VB files (fwd)

2008-09-12 Thread Walt Farrell
On Fri, 12 Sep 2008 11:04:12 -0500, Paul Ip <[EMAIL PROTECTED]> wrote: >So I think it is different from what FTP does with RDW: (where = length >of Data + 4) >x''+Data It's not merely different from "what FTP does with RDW" but from what z/OS does with RDW. I doubt that FTP is putti

Re: ISFP default intrdr assignments

2008-09-12 Thread Walt Farrell
On Thu, 11 Sep 2008 14:18:47 -0500, Anton Britz <[EMAIL PROTECTED]> wrote: > >How can I change the default INTRDR assignments for ISPF to > >//? DD sysout=(A,INTRDR),DEST=DUMMY > >Summary: I want to change the default print location of all jobs to DUMMY >without inserting a route print c

Re: Name/tokens

2008-09-09 Thread Walt Farrell
eneral snipe at IBM (which, after all, does happen on this list with some regularity when the topic of interface vs non-interface comes up) rather than something related to the OP's question about scanning defined name/token pairs. My apologies. -- Walt Farre

Re: KEY 8 CSA Usage

2008-09-09 Thread Walt Farrell
On Tue, 9 Sep 2008 12:51:51 -0400, Petersen, Jim <[EMAIL PROTECTED]> wrote: >My point is that if I accidently mention it to the auditors that it is a >security exposure, we might get written up and it might be found that we >can't run the shop without the CSMAGENT. Normally, you don't tell the >a

Re: Name/tokens

2008-09-09 Thread Walt Farrell
On Tue, 9 Sep 2008 09:57:41 -0700, Edward Jaffe <[EMAIL PROTECTED]> wrote: >Walt Farrell wrote: >> But note that ECVTNTTP is not an intended programming interface, and you use >> it at your own risk. >> > >IBM never provided an "intended" interface. :-

Re: Name/tokens

2008-09-09 Thread Walt Farrell
On Tue, 9 Sep 2008 09:04:03 -0500, Rolf Ernst <[EMAIL PROTECTED]> wrote: >Ooops, > > >just answered my own question. It's a pointer off the ECVT. Sorry. > But note that ECVTNTTP is not an intended programming interface, and you use it at your own risk. -- Walt Fa

Re: zOS R10

2008-09-09 Thread Walt Farrell
On Mon, 8 Sep 2008 21:40:41 -0400, Knutson, Sam <[EMAIL PROTECTED]> wrote: >There is an explanation in the 1.10 Information Roadmap that holds out >hope. We will have to wait and see what the new web format looks like. >I do hope you can download the whole lot as a set of PDFs or zipped web >pages

Re: BPXWDYN relative GDG reference error

2008-09-09 Thread Walt Farrell
On Mon, 8 Sep 2008 15:54:33 -0500, Kirk Wolf <[EMAIL PROTECTED]> wrote: >Its wierd. Some GDGs work fine and others fail with this error. > Are you sure that, in the failing cases, that the (0) generation actually exists? In other words, perhaps no GDS entries exist for that particular GDG, and

Re: XML install questions.

2008-08-28 Thread Walt Farrell
On Wed, 27 Aug 2008 16:52:30 -0400, Howard Rifkind <[EMAIL PROTECTED]> wrote: >Anyone out there familiar with the installation of the of the XML 1.9 >product might be able to help me out with this. > >My manager wants this product installed in its own CSI. As far as I know it's not a separate pro

Re: CICS Issue

2008-08-28 Thread Walt Farrell
On Thu, 28 Aug 2008 16:05:19 +0100, Jacky Bright <[EMAIL PROTECTED]> wrote: >Yes actually we are facing performance issue. There was suggestion to >configure CICS in such a way that CICS transactions will be utilising the >both processor capacity instead of just one. You can't simply "configure C

Re: Find out allocations of current MSTJCL

2008-08-25 Thread Walt Farrell
runs IEEMB860, and IEEMB860 gets the property ND or NODSI from the PPT. With NODSI, allocation drops the SYSDSN ENQ after allocating the DD, so it won't affect subsequent allocation processing. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design

Re: Why don't I see my CSA storage in the dump?

2008-08-25 Thread Walt Farrell
On Sun, 24 Aug 2008 20:08:26 +0200, Lindy Mayfield <[EMAIL PROTECTED]> wrote: >That's exactly what I want to do. Problem is that there are some basic >concepts that aren't covered so even though I've read those chapters a >few times over, I don't get out of them what I should. I think the basics

Re: Trying to figure out IEAMSCHD

2008-08-23 Thread Walt Farrell
On Sat, 23 Aug 2008 19:02:21 +0200, Lindy Mayfield <[EMAIL PROTECTED]> wrote: >It appears, unfortunately, that WTO isn't allowed. Strange. The standard form of WTO uses an SVC, and SVCs (except for ABEND) do not work in SRB mode. If you want a WTO you'll need to use the branch-entry form (LINKAG

Re: Fwd: DB2 V8 stop command security

2008-08-21 Thread Walt Farrell
S commands such as MODIFY when directed against an address space that does not exist. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PR

Re: z/OS Features of interest

2008-08-19 Thread Walt Farrell
y. Note that in z/OS R10 a number of z/OS UNIX functions and some other z/OS components also support the use of password phrases. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff /

Re: DASD Space Allocation

2008-08-15 Thread Walt Farrell
On Fri, 15 Aug 2008 09:07:52 -0400, William F Besnier <[EMAIL PROTECTED]> wrote: >I'm not explaining my concerns correctly. My concern is not the number of >extents used; it is the space allocated, the JCL space parameter is asking >for 2500,100 cylinders of space for a total 4000 cylinders. What

Re: APF authorization question

2008-08-13 Thread Walt Farrell
t for the DSNUTILB step. He could: (a) remove the JOBLIB, possibly replacing it for other steps in the job with STEPLIB DD statements. Or (b) override the JOBLIB for the DSNUTILB step by providing that step with an APF-authorized STEPLIB. -- Walt Farrell, CISSP IB

Re: APF authorization question

2008-08-13 Thread Walt Farrell
messages as we've suggested, such as IEF188I PROBLEM PROGRAM ATTRIBUTES ASSIGNED See http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/iea2m881/2.101?SHELF=EZ2MZ900.bks&DT=20080124114103 or http://preview.tinyurl.com/5bzgpr -- Walt Farrell, CISSP IBM

Re: APF authorization question

2008-08-13 Thread Walt Farrell
ification in the PPT when you have a non-APF-authorized JOBLIB or STEPLIB. So, DSNUTILB probably ran APF-authorized, but as it was in key 8 not key 7 DB2 complained. This kind of error (using a non-authorized JOBLIB/STEPLIB) could happen for any program with selected PPT properties. You should f

Re: APF authorization question

2008-08-13 Thread Walt Farrell
PF authorization when you pull a module from the linklist. But authorization is a complex topic. Showing us your JCL and the invocation of DSNUTILB may shed some light on the issue. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -

Re: Accessing the IBM-MAIN Archives

2008-08-11 Thread Walt Farrell
On Mon, 11 Aug 2008 09:40:05 -0700, Howard Rifkind <[EMAIL PROTECTED]> wrote: >I'm trying to access the lists archives and it states that my user email address isn't the same as were it states it is. > >All messages to the list are sent from and received from this email address. > >I've even chang

Re: Urgent reply needed

2008-08-08 Thread Walt Farrell
e). If it had relevance for security the book would say so (as it does for NOPASS). By the way, for future reference: it will help everyone (you, included) if you provide a meaningful subject line that actually relates to the content of the question. -- Walt Farrel

Re: Compiled Rexx portabilty

2008-08-08 Thread Walt Farrell
On Fri, 8 Aug 2008 08:22:20 -0500, Paul Gilmartin <[EMAIL PROTECTED]> wrote: >On Fri, 8 Aug 2008 07:22:00 -0500, Walt Farrell wrote: >> >> http://www-03.ibm.com/systems/z/os/zos/bkserv/v1r10books.html >> >Thanks. By habit, I had tried z/OS 1.7. The manual doe

Re: Compiled Rexx portabilty

2008-08-08 Thread Walt Farrell
On Thu, 7 Aug 2008 19:08:12 -0500, Paul Gilmartin <[EMAIL PROTECTED]> wrote: >> http://publibz.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/h1981605/1.3.1.5?DT=20030825101721 >> >Thanks; How'd you find this link? I can follow it easily enough, >but it doesn't turn up in any shelf indexes on publibz that

Re: Compiled Rexx portabilty

2008-08-07 Thread Walt Farrell
On Thu, 7 Aug 2008 12:34:46 -0400, Dave Salt <[EMAIL PROTECTED]> wrote: >If you want compiled REXX to be portable (in other words, you want the REXX to be executable at sites that don't have the REXX 'library' installed), then you *must* use the SLINE option (as well as the ALT option). This means

Re: Compiled Rexx portabilty

2008-08-07 Thread Walt Farrell
On Thu, 7 Aug 2008 12:47:35 +0200, Itschak Mugzach <[EMAIL PROTECTED]> wrote: >Does compiled Rexx need a run-time library to operate? Yes. > If so, will static bind solve this requirement? No, however you could (as another member noted) ship the free alternate library with your compiled REXX e

Re: NOMAIL Option in TSO/E

2008-08-05 Thread Walt Farrell
t TSOE does not externalize it via ACCOUNT and RACF does not externalize it via LISTUSER. In the TSO segment, the flags exist in the TOPTION field, but I don't know what bit settings TSO/E uses for them; RACF merely holds the data for TSO/E to use. -- Walt Farrell,

Re: z/OS BIND9 DNS Vulnerable to Cache Poisoning Attack Problem?

2008-08-05 Thread Walt Farrell
ecord submission or the 1-800-IBM-SERV (1-800-426-7378) support line, for information pertaining to any z/OS Communications Server security concerns or issues. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM

Re: secure ftp on the mainframe

2008-07-29 Thread Walt Farrell
On Tue, 29 Jul 2008 11:22:16 -0500, Hal Merritt <[EMAIL PROTECTED]> wrote: >I was referring to the sftp that Walt mentioned. My take was that it was >neither TLS nor SSH. > >"SFTP is not FTP at all. It is a secure, FTP-like communication >protocol." Perhaps you didn't see the next sentence of th

Re: secure ftp on the mainframe

2008-07-24 Thread Walt Farrell
ally stated that in this thread, so I thought I'd mention it. Others have discussed additional details that I don't need to repeat. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / sig

Re: secure ftp on the mainframe

2008-07-24 Thread Walt Farrell
in some other type of "secure ftp", but I can't remember >any details. The IBM Ported Tools for z/OS provides a free, and as far as I know supported, implementation of OpenSSH for z/OS. That will give sftp support, and other ssh functionality. -- Walt Farrell, CI

Re: MQ security

2008-07-15 Thread Walt Farrell
showing "GLOBAL=YES RACLISTED" classes. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MA

Re: LOOKAT ICH408I

2008-07-11 Thread Walt Farrell
On Wed, 9 Jul 2008 07:41:05 -0500, Paul [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: >Just for instructional purposes, I wrote a job step using an undefined >HLQ that failed with: > > ICH408I ... > INSUFFICIENT ACCESS AUTHORITY > FROM CATALOG.**.MASTER (G) > >... and tried LOOKAT ICH408I. >...

Re: want to read a dataset in use

2008-07-03 Thread Walt Farrell
On Thu, 3 Jul 2008 09:23:31 -0400, Jack Kelly <[EMAIL PROTECTED]> wrote: >I don't understand, if you can rename the dataset in a second step, why >you can't browse it after the first step. I just ran a test and created a >dsn, with catalog as the disposition, and a second 'wait' step. I could >rea

Re: Off-the-wall Auditor Requests ... divergent to Security DB controls

2008-05-22 Thread Walt Farrell
an easy prevention step.. oh and things like >keep APF authorization down to a controlled level. > >We do exist on a platform with good controls.. however it does require >that we use them. Precisely the main point Ray

Re: Off-the-wall Auditor Requests (was RE: Hardware Alerts)

2008-05-22 Thread Walt Farrell
On Thu, 22 May 2008 11:46:18 -0500, Walt Farrell <[EMAIL PROTECTED]> wrote: >On Thu, 22 May 2008 09:17:34 -0500, Dave Cartwright ><[EMAIL PROTECTED]> wrote: >>...snipped... >>I'm now wondering if this is an urban myth. At the GSE LSWG meeting last >>

Re: Off-the-wall Auditor Requests (was RE: Hardware Alerts)

2008-05-22 Thread Walt Farrell
urse: (a) machines are getting faster, and the work can perhaps be split across many machines. (b) overly restrictive password rules can reduce the amount of work. Note, though, that this kind of attack requires either the ability to run an APF-authorized program on the system, or physical access to a

Re: Another Generalized Resource question

2008-05-21 Thread Walt Farrell
this with the >RACF-List folks? One comment: Enhanced Generics are irrelevant here. That option applies only to DATASET profiles, and has no effect on the characters you can use in general resource profiles. For general resource you can always use either * or **, depending on what you wan

Re: Racroute and cross memory question

2008-05-16 Thread Walt Farrell
the approach of scheduling an IRB back to the in-flight TCB could also work, I think, but feels more complex and fragile. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archiv

Re: SMS PUZZLE

2008-05-01 Thread Walt Farrell
tor can delegate all the DFP segment authority to the storage administrators. Then you have the flexibility of using the DFP segments for the simple cases, but using ACS routines for more complex cases. Of course, then the storage administrators need to learn a little about RACF. -- Walt Farre

Re: Using IKJCT441 with CALL *(module) from Rexx

2008-05-01 Thread Walt Farrell
On Thu, 1 May 2008 20:25:06 +0300, Binyamin Dissen <[EMAIL PROTECTED]> wrote: >This would be poor design. > >Allow the user to specify a parm as to how he wants this done. Perhaps he >wishes to use files under TSO. > I agree this is better done via some kind of parameter, Binyamin. In addition,

Re: Supported Documentation

2008-04-29 Thread Walt Farrell
On Tue, 29 Apr 2008 11:58:24 -0500, Paul Gilmartin <[EMAIL PROTECTED]> wrote: >On Tue, 29 Apr 2008 11:14:18 -0500, Walt Farrell wrote: > >>On Tue, 29 Apr 2008 09:12:53 -0500, Martin Kline wrote: >> >>> They tell me they will put in an untrackable request to update

Re: Supported Documentation

2008-04-29 Thread Walt Farrell
in reader's comments) and then you have something track. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the mess

Re: Authorized Rexx Assembler Function

2008-04-28 Thread Walt Farrell
des a more external way of using IKJEFTSR, by the way, as it will get control under the covers to invoke the program. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access in

Re: Catalog Search Interface (IGGCSI00) & ALTER Access

2008-04-21 Thread Walt Farrell
tion may be returned. Catalog processing has always worked that way, as far as I know, and it's the main reason that using WARNING on a RACF profile protecting a catalog gives results that most customers do not like. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design

Re: how to audit the usage of IND$FILE

2008-04-17 Thread Walt Farrell
re exists because you gave the user READ access to the data. Having that, there's little you can do to prevent him from copying it somewhere. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscr

Re: IRREVX01 strangeness

2008-04-16 Thread Walt Farrell
last, as the operand (e.g., "*)" ) will follow it. Assuming your earlier versions looked for FILTER(*) at the end, that would have worked. Or looking for FILTER(SI1*) at the end would have worked. But not looking for FILTER( at the end. -- Walt Farrell, CISSP IBM STSM, z/OS Se

Re: Authorized Rexx Assembler Function

2008-04-15 Thread Walt Farrell
On Mon, 14 Apr 2008 10:44:31 -0400, Gerhard Postpischil <[EMAIL PROTECTED]> wrote: >Walt Farrell wrote: >> That would allow an authorized program to load a module from an otherwise >> unauthorized STEPLIB. It won't let you actually start running something as >> A

Re: Authorized Rexx Assembler Function

2008-04-14 Thread Walt Farrell
as APF authorized, though. Getting something to start running authorized requires use of a function like IKJEFTSR, or TESTAUTH. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archiv

Re: Encrypted Tapes and DR <[EMAIL PROTECTED]>

2008-04-11 Thread Walt Farrell
too, Russell. And yes, you can activate a new RACF DB without an IPL, but only if it has the same dsname as the one you're already running. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe

Re: Installers (Was: IBM announcements)

2008-04-11 Thread Walt Farrell
On Thu, 10 Apr 2008 22:28:12 -0300, Clark Morris <[EMAIL PROTECTED]> wrote: >On 10 Apr 2008 16:26:17 -0700, in bit.listserv.ibm-main you wrote: > > >>In October 2000, a man I greatly admire and respect kindly wrote: >>http://bama.ua.edu/cgi-bin/wa?A2=ind0010&L=ibm-main-archives&P=R3449&I=1. >> >>O

Re: IBM announcements

2008-04-08 Thread Walt Farrell
? > That's what the announcement says. And that's how I understand it to work. -- Walt Farrell -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM

Re: IBM announcements

2008-04-08 Thread Walt Farrell
lect system-level, no-charge applications, and helps reduce the cost and skills needed to install and run those applications. -- Walt Farrell -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMA

Re: Sort order for Generic processing

2008-04-08 Thread Walt Farrell
On Tue, 8 Apr 2008 13:04:04 -0500, Rick Fochtman <[EMAIL PROTECTED]> wrote: >Apologies for my inaccuracies. The last time I even LOOKED at this was >RACF 1.4, so it's been a while. Forgive me for my confusion in the >details. But I think the general idea will be helpful to the OP. I certainly agr

Re: Sort order for Generic processing

2008-04-08 Thread Walt Farrell
x27; and for * we often use x'FC'. There are some subtle fine points that can change those values a little, but he probably doesn't need to worry about them. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -

Re: Import Connect:Direct self-signed certificate into RACF?

2008-03-25 Thread Walt Farrell
s I know It's more likely a personal or server certificate. A CA certificate is one you use to generate other certificates, not one that you use to connect to a server. You're probably better off asking on RACF-L rather than IBM-MAIN, where you'll find more of IBM's experts

Re: Can forked/spawned address spaces be identified as such?

2008-03-21 Thread Walt Farrell
king decisions. While running it can make a temporary change to a different UID. That UID becomes its new effective UID, and is used for UNIX purposes until the process switches back to its real UID. By the way, I suggest using the MVS-OE mailing list rather than IBM-MAIN if you have deta

Re: Can I know programmatically if a load module has been zapped?

2008-03-18 Thread Walt Farrell
On Wed, 19 Mar 2008 07:08:21 +1000, Shane <[EMAIL PROTECTED]> wrote: >And I have had (at least) one product team from a large ISV advise just >that. Seems they thought they shipped so many fixes as zaps that the IDR >count was an issue. >M - my thoughts were unfit for publication. >No prizes f

Re: Cloning a RACF user profile

2008-03-18 Thread Walt Farrell
d, but have never taken the time to implement it. I'll put it on the list, though. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [E

Re: Cloning a RACF user profile

2008-03-18 Thread Walt Farrell
erate commands to recreate the database. From those commands, you could select all the commands that reference the existing user ID, and then change the ID to a new one, and run the commands. Then you'd have a user just like the original one, except for the password that you'd

Re: z/OS 1.7 to z/OS 1.9 Migration - Increase in CPU/MSU Consumption

2008-03-14 Thread Walt Farrell
On Fri, 14 Mar 2008 15:40:36 -0500, Walt Farrell <[EMAIL PROTECTED]> wrote: >On Fri, 14 Mar 2008 11:46:35 -0700, Edward Jaffe ><[EMAIL PROTECTED]> wrote: > >>...snipped... >>This has nothing to do with anything said in the 1990s. It is a much >>more rece

Re: z/OS 1.7 to z/OS 1.9 Migration - Increase in CPU/MSU Consumption

2008-03-14 Thread Walt Farrell
On Fri, 14 Mar 2008 11:46:35 -0700, Edward Jaffe <[EMAIL PROTECTED]> wrote: >...snipped... >This has nothing to do with anything said in the 1990s. It is a much >more recent initiative that has been articulated verbally to ISVs, >customers at at SHARE, and in other places. It is not a formal promi

Re: Execution job class restriction

2008-03-13 Thread Walt Farrell
On Thu, 13 Mar 2008 04:08:55 -0700, Edward Jaffe <[EMAIL PROTECTED]> wrote: >Robert S. Hansel (RSH) wrote: >> If you can find a copy of the IBM publication GG66-3218-01 "RACF Security >> Administrator's Quick Reference", March 1992, there is a sample JES Exit 6 >> in Appendix G for controlling the

Re: Easy way to covert IEFBR14 and IDCAMS deletes to HDELETE

2008-03-13 Thread Walt Farrell
On Wed, 12 Mar 2008 22:21:34 -0500, Chase, John <[EMAIL PROTECTED]> wrote: >Indeed, how should Allocation know whether the program about to execute >wants to "do something" with the dataset(s) before deleting it/them? >Perhaps Allocation could be "educated" to issue HDELETE iff the dataset >is mig

Re: Easy way to covert IEFBR14 and IDCAMS deletes to HDELETE

2008-03-12 Thread Walt Farrell
On Wed, 12 Mar 2008 11:03:41 -0700, Edward Jaffe <[EMAIL PROTECTED]> wrote: >William Bishop wrote: >> The problem is that if you perfrom an IDCAMS DELETE and specify nonvsam, >> HSM does a recall. Without the nonvsam, he does an HDELETE if the dataset >> is migrated. >> > >This sounds APARable to

Re: RACF Tool PWDCOPY (ichwpin/ichpwout)

2008-03-10 Thread Walt Farrell
them somewhere. This may be simpler than using password enveloping, but is almost certainly less secure. For any further discussion on these approaches I suggest using RACF-L. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design --

Re: Secure FTP

2008-03-08 Thread Walt Farrell
you an OpenSSH implementation on z/OS, and that will give you the ability to use sftp. http://www-03.ibm.com/servers/eserver/zseries/zos/unix/port_tools.html For discussion of OpenSSH on z/OS I suggest using the MVS-OE mailing list rather than IBM-MAIN. -- Walt Farrell, CISSP IBM STSM, z/OS S

Re: IEE342I MODIFY REJECTED-TASK BUSY

2008-03-07 Thread Walt Farrell
On Fri, 7 Mar 2008 12:02:25 -0600, McKown, John <[EMAIL PROTECTED]> wrote: >Well, in the case of CICS, I was wrong. The manual states: > > >If the task is to be attached, DFHZCNA obtains a TIOA and moves the data >from the CIB to the TIOA. DFHZATT is then called to attach the task. If >the attach

Re: SDSF User Manual

2008-03-05 Thread Walt Farrell
On Tue, 4 Mar 2008 12:03:11 -0800, Schwarz, Barry A <[EMAIL PROTECTED]> wrote: >I've never seen any SDSF data in ISPF Help. SDSF does have help panels. >They are not bad as reference but it is difficult to find anything if >you don't already know the exact command. For example, is FINDLIM a >com

Re: SDSF User Manual

2008-03-05 Thread Walt Farrell
curity to RACF. The system programmer does that, and he does not do it by reading a user manual, but rather by reading the boo,k intended for system programmers, SDSF Operations and Customization. If that book is not sufficient for doing the conversion that's a different topic, in my opinion

Re: SDSF User Manual

2008-03-04 Thread Walt Farrell
On Tue, 4 Mar 2008 07:36:48 -0800, Schwarz, Barry A <[EMAIL PROTECTED]> wrote: >Does anyone know of an SDSF user manual newer than the OS/390 2.10 >version dated June 2000? The z/OS manuals are title Operation and >Customization. The 1.8 version contains chapters for batch and REXX but >nothing

Re: Abend S013 using ICHDSM00 procedure

2008-03-03 Thread Walt Farrell
o ICHDSM00, so I have to wonder what you really intended to do. -- Walt Farrell, CISSP IBM STSM, z/OS Security Design -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with

Re: FTP question

2008-02-28 Thread Walt Farrell
On Thu, 28 Feb 2008 07:05:05 -0500, Mike Liberatore <[EMAIL PROTECTED]> wrote: >I have several Open systems servers each running windows 2003. having >unique IP addresses and each running their own scripts to capture data. >This data is then being sent via ftp and stored on mainframe lpar as >GDG

Re: z/OS 1.10 announcement -DASD size

2008-02-28 Thread Walt Farrell
On Thu, 28 Feb 2008 06:48:14 -0600, Chase, John <[EMAIL PROTECTED]> wrote: >> -Original Message- >> From: IBM Mainframe Discussion List On Behalf Of Farley, Peter x23353 >> >> > -Original Message- >> > From: IBM Mainframe Discussion List O

Re: z/OS 1.10 announcement -DASD size

2008-02-27 Thread Walt Farrell
On Wed, 27 Feb 2008 17:51:57 -0500, Farley, Peter x23353 <[EMAIL PROTECTED]> wrote: >So you are saying that "everything else" includes PDSE? Yes, as PDSE is -not- VSAM. -- Walt Farrell, CISSP IBM STSM, z

Re: z/OS 1.10 announcement -DASD size

2008-02-27 Thread Walt Farrell
attribute are restricted to the first 65,520 cylinders. So, as it says, the support planned in z/OS V1.10 is for VSAM data in the extended area (except for the kinds of VSAM exempted in the next sentence), and everything else in the non extended area. -- Walt Farrell, CISSP IB

Re: Newbie RACROUTE question: how to *test* authorization?

2008-02-27 Thread Walt Farrell
rogram is a different one, it might indicate a failure when the actual job would work properly. That's a case that none of the JCL checking products can handle, as far as I know, because the results can not be checked except during actual execution. Any outside attempt to check them may give ei

Re: Newbie RACROUTE question: how to *test* authorization?

2008-02-27 Thread Walt Farrell
essage but go ahead and cut a record if you want to. > >Of course, that doesn't address the SMF noise issue for those who really >need to track attempted accesses to truly important resources to detect >actual hacking attempts. That's MSGSUPP=YES, which does not require APF

Re: Newbie RACROUTE question: how to *test* authorization?

2008-02-27 Thread Walt Farrell
gt;UACC=NONE. A Panvalet security exit constructs the pseudo-profile name, and >invokes RACROUTE to see if read access to the member is permitted or not. I would agree that's a reasonable case for using LOG=NONE. It will, however, require you to run APF-authorized, and I think it's a

Re: Newbie RACROUTE question: how to *test* authorization?

2008-02-26 Thread Walt Farrell
On Mon, 25 Feb 2008 13:08:53 -0600, Dave Kopischke <[EMAIL PROTECTED]> wrote: >On Sat, 23 Feb 2008 10:07:24 -0600, Walt Farrell wrote: > >>One could argue that letting you determine your access to resources without >>actually trying to use them (and thus without causing au

<    1   2   3   4   5   6   7   8   9   >