Re: VTAM security issue

2009-08-12 Thread Chris Mason
Jim I will spare all who have been reading all the history of this on IBMMAIN about my strong recommendation for those running SNA networks to strongly consider the need for a SNA Firewall. Which means you haven't spared us at all! I recognise a trick to which I succumb myself when the

Re: VTAM security issue

2009-08-12 Thread Chris Mason
] On Behalf Of Chris Mason Sent: Tuesday, August 11, 2009 11:12 AM To: IBM-MAIN@bama.ua.edu Subject: Re: VTAM security issue Hal As a matter of courtesy I very rarely discuss off list conversations. Does this mean Jim Marshall passed on the information you requested in private? Since you were asking

Re: VTAM security issue

2009-08-11 Thread Maarten Slegtenhorst
Gibney, Dave Verzonden: zondag 9 augustus 2009 23:46 Aan: IBM-MAIN@BAMA.UA.EDU Onderwerp: Re: VTAM security issue Isn't the A Architecture? And the S Synchronous :) Now I'm confused. What does the initialism SNA stand

Re: VTAM security issue

2009-08-11 Thread Hal Merritt
of both sides. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Chris Mason Sent: Sunday, August 09, 2009 10:08 AM To: IBM-MAIN@bama.ua.edu Subject: Re: VTAM security issue JM Right now I understand there are 20+ ways which VTAM/SNA

Re: VTAM security issue

2009-08-11 Thread Chris Mason
for resources, but neither does IP. The Domain Name space used by IP hosts is not provided by, or dependent on IP. re: http://www.garlic.com/~lynn/2009l.html#3 VTAM security issue it was the communication division ... not the networking division. vtam/ncp (pu5/pu4) formed part of a communication

Re: VTAM security issue

2009-08-11 Thread Chris Mason
: VTAM security issue JM Right now I understand there are 20+ ways which VTAM/SNA systems have been compromised. HM Please give us some details on the compromised VTAM/SNA systems. Hal Merritt - and perhaps many others including myself - are still waiting for Jim Marshall's reply. ..snip

SNA addressing (was Re: VTAM security issue)

2009-08-11 Thread Chris Mason
I'm not addressing this specifically to Pat since he knows it all perfectly. SNA addressing relies on two components - and it uses names not numbers. Within an enterprise, a naming authority is assigned which allocates - these days - just 8-character LU names.[1] The enterprise in turn is

Re: VTAM security issue

2009-08-11 Thread Hal Merritt
well out of my league here. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Chris Mason Sent: Tuesday, August 11, 2009 11:12 AM To: IBM-MAIN@bama.ua.edu Subject: Re: VTAM security issue Hal As a matter of courtesy I very rarely

Re: VTAM security issue

2009-08-10 Thread Anne Lynn Wheeler
for resources, but neither does IP. The Domain Name space used by IP hosts is not provided by, or dependent on IP. re: http://www.garlic.com/~lynn/2009l.html#3 VTAM security issue it was the communication division ... not the networking division. vtam/ncp (pu5/pu4) formed part of a communication

Re: VTAM security issue

2009-08-10 Thread Jim Marshall
I believe Jim Marshall is just trying to dismiss a fact inconvenient for the product he is promoting? FUD! See previous comments from the Chris Mason I will spare all who have been reading all the history of this on IBMMAIN about my strong recommendation for those running SNA networks to

Re: VTAM security issue

2009-08-10 Thread Anne Lynn Wheeler
re: http://www.garlic.com/~lynn/2009l.html#3 VTAM security issue http://www.garlic.com/~lynn/2009l.html#7 VTAM security issue the communication division did provide the basis for rapid uptake of personal computers via terminal (communication) emulation. A customer could get an ibm/pc

SNA: conflicting opinions (was Re: VTAM Security issue)

2009-08-10 Thread Chris Mason
Lynn (I guess[1]) I see this is no longer discussing VTAM security but is hinged to one of my lead-in comment regarding an universal network. There are some policemen in this list who require subject drift properly to be documented - or they will complain - even if the complaint is unjustified

Re: VTAM security issue

2009-08-09 Thread Chris Mason
on the compromised VTAM/SNA systems. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Jim Marshall Sent: Wednesday, January 21, 2009 2:25 PM To: IBM-MAIN@bama.ua.edu Subject: Re: VTAM security issue On Mon, 19 Jan 2009 07:41:17 -0600, Chris Mason

Re: VTAM security issue

2009-08-09 Thread Anne Lynn Wheeler
chrisma...@belgacom.net (Chris Mason) writes: There is no universal SNA network - as some in IBM imagined could be created in the early '80s - and so the access to these supposedly vulnerable VTAM systems is going to be via the universal IP network.[1] Thus one of the protocols whereby the IP

Re: VTAM security issue

2009-08-09 Thread Paul Gilmartin
On Sun, 9 Aug 2009 11:57:15 -0400, Anne Lynn Wheeler wrote: possibly SNA organization viewed it as competition (even tho SNA had nothing to do with networking). Now I'm confused. What does the initialism SNA stand for? Or, while this list is focused on initialism pedantry, is it possible that

Re: VTAM security issue

2009-08-09 Thread Patrick O'Keefe
On Sun, 9 Aug 2009 16:03:33 -0500, Paul Gilmartin paulgboul...@aim.com wrote: On Sun, 9 Aug 2009 11:57:15 -0400, Anne Lynn Wheeler wrote: possibly SNA organization viewed it as competition (even tho SNA had nothing to do with networking). Now I'm confused. What does the initialism SNA stand

Re: VTAM security issue

2009-08-09 Thread Gibney, Dave
Isn't the A Architecture? And the S Synchronous :) -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Patrick O'Keefe Sent: Sunday, August 09, 2009 2:43 PM To: IBM-MAIN@bama.ua.edu Subject: Re: VTAM security issue On Sun, 9 Aug

Re: VTAM security issue

2009-08-09 Thread Edward Jaffe
Paul Gilmartin wrote: Now I'm confused. What does the initialism SNA stand for? It's the Airport code for John Wayne Airport in Orange County. -- Edward E Jaffe Phoenix Software International, Inc 5200 W Century Blvd, Suite 800 Los Angeles, CA 90045 310-338-0400 x318

Re: VTAM security issue

2009-01-21 Thread Jim Marshall
On Mon, 19 Jan 2009 07:41:17 -0600, Chris Mason chrisma...@belgacom.net wrote: Jim FUD! There's quite a lot needs straightening out here! - etc, etc, etc. I appreciate the response from my learned colleague and he is correct about SNA Security being available. For one it is hardly

Re: VTAM security issue

2009-01-21 Thread Hal Merritt
Please give us some details on the compromised VTAM/SNA systems. -Original Message- From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of Jim Marshall Sent: Wednesday, January 21, 2009 2:25 PM To: IBM-MAIN@bama.ua.edu Subject: Re: VTAM security issue On Mon

Re: VTAM security issue

2009-01-19 Thread Chris Mason
Jim FUD! There's quite a lot needs straightening out here! 1. It is very much in general inappropriate to associate security with only with VTAM. It is very likely to be more appropriate to use the term SNA security. 2. If we are talking about long ago, with respect to security at the

Re: VTAM security issue

2009-01-17 Thread Jim Marshall
CICS of organization A is connected (LU6.2 Connection) to CICS of organization B. No problem with that. I looked into the CDRM and found some other application of organization B defined in VTAMLST of oranization A. Tried LOGON APPLID(xxx) and gpt the GMtran of org. B (if it is the default, I can

Re: VTAM security issue

2009-01-14 Thread Chris Mason
Itschak Let's see I have got your problem straight. You have two VTAM nodes, VTAMA and VTAMB. There is a CICS application running in each node, CICSA and CICSB. You want to allow CICSA to have sessions with CICSB and you want to prevent all other possible sessions between VTAMA and VTAMB, say

Re: VTAM security issue

2009-01-14 Thread Chris Mason
Tony I also want to block the ability to enter logon applid command (may be by userid, even of the solution will require entering userid password). How to achive that? I doubt you can do that with USS, but I may be wrong. Interesting! This would appear to depend on how the LU was defined

Re: VTAM security issue

2009-01-14 Thread Walt Farrell
In response to a Wed, 14 Jan 2009 08:00:36 +0200 message from Itschak Mugzach imugz...@gmail.com: You seem to be mixing terminology, and possibly causing confusion, Itschak. (Though I think Chris understands what you've said and has provided some good pointers.) You start out by saying Now,

Re: VTAM security issue

2009-01-14 Thread Itschak Mugzach
Walt, I might used worng wording, but when I said LOGON to CICS (or any other VTAM application on partner sight, I ment it. The only limit I have when Pentesting is the partner company to agree for the signon. I have seen few sites using no GMTRAN at all, so you signon to CICS with no password and

Re: VTAM security issue

2009-01-14 Thread Chase, John
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Itschak Mugzach Walt, I might used worng wording, but when I said LOGON to CICS (or any other VTAM application on partner sight, I ment it. The only limit I have when Pentesting is the partner company to agree for

Re: VTAM security issue

2009-01-14 Thread Rick Fochtman
Please have a look at this scenario: CICS of organization A is connected (LU6.2 Connection) to CICS oforganization B. No problem with that. I looked into the CDRM and found some other application of organization B defined in VTAMLST of oranization A. Tried LOGON APPLID(xxx) and gpt the GMtran

Re: VTAM security issue

2009-01-14 Thread Chris Mason
Itschak I see you are there and able to respond. Since we haven't heard a Thanks Chris that exactly meets my requirements. I must assume that my purely VTAM solution using CDRM statement operands and CDRSC statements where necessary didn't somehow answer your needs. I'd rather like to know why

Re: VTAM security issue

2009-01-14 Thread Itschak Mugzach
John, Do you want me to surprise you? As your new president said: yes, we can. Sec=YES has nothing to do with the signon procedure of CICS and how users get identified. As you know, each terminal runs the dfltuser (from SIT) if no user signed on. Its is well documented in the manuals. This is

Re: VTAM security issue

2009-01-14 Thread Itschak Mugzach
Hi Chris, You answers are just exectly what I was looking for. I RTFMed a little as well and have my ideas. For example, I looked into the USS TAB code and found that a I can force some input rules, ;like blocking LOG APPLID. I didn't respond as I am still learning your answer, BTW, I want to

Re: VTAM security issue

2009-01-14 Thread Chase, John
-Original Message- From: IBM Mainframe Discussion List On Behalf Of Itschak Mugzach John, Do you want me to surprise you? You're welcome to try, but be prepared for disappointment. As your new president said: yes, we can. Sec=YES has nothing to do with the signon procedure of

Re: VTAM security issue

2009-01-14 Thread Chris Mason
Itschak I looked into the USS TAB code and found that a I can force some input rules, ;like blocking LOG APPLID. Actually you can't! Recall I said it was a bit like ISTINCLM and the MODETAB operand. You always have the mode table entries in ISTINCLM even if you code a MODETAB operand.

VTAM security issue

2009-01-13 Thread Itschak Mugzach
Please have a look at this scenario: CICS of organization A is connected (LU6.2 Connection) to CICS of organization B. No problem with that. I looked into the CDRM and found some other application of organization B defined in VTAMLST of oranization A. Tried LOGON APPLID(xxx) and gpt the GMtran of

Re: VTAM security issue

2009-01-13 Thread Chris Mason
Itschak I'm afraid you'll need to clarify rather a lot here! A CICS application in session with another CICS application is one thing. A session initiated by means of Unformatted System Services (USS) is quite another. Your CICS-CICS session is LU type 6.2. Any session initiated with the aid

Re: VTAM security issue

2009-01-13 Thread Tony Harminc
2009/1/13 Itschak Mugzach imugz...@gmail.com Please have a look at this scenario: CICS of organization A is connected (LU6.2 Connection) to CICS of organization B. No problem with that. I looked into the CDRM and found some other application of organization B defined in VTAMLST of

Re: VTAM security issue

2009-01-13 Thread Itschak Mugzach
Chris, I know all this, but I think that at the end of your answer you started to understand. Org. A and org B are partners that security shares CICS resources VIA a CICS connection. When defining the connection, you can limit who can use which trx (by identifying the user or by assigning a user