Re: Back Doors (was: EXCP with a DEB)

2006-08-20 Thread John (IBM-MAIN)
-- snip -- The presence of bank vaults in the world means that there must also be locksmiths in it who can open them, and I suppose that there is a similar rationale for the skills needed to breach z/OS, but this is a public forum in which I for one do not think we should facilitate such

Re: ENTERPRISE PL/I Internals Skill

2006-08-20 Thread Bernd Oppolzer
Maybe it would be a good idea to ask this question on the PL1 list ([EMAIL PROTECTED]) The PL/1 internals are documented, AFAIK, in the LE books, because EP PL/1 uses the LE runtime. The CEE procedure names also refer to LE. Kind regards Bernd Am Samstag, 19. August 2006 19:32 schrieben

Re: Greatest Software?

2006-08-20 Thread Len Rugen
What happened to the Cullinane or Cullinet (sp) from the late 70's? --- [This E-mail scanned for viruses by Declude Virus] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with

Superuser Creation like IBMUSER

2006-08-20 Thread Jacky Bright
Hi... Is it possible to create superuser like IBMUSER. I hav created user ABC with all SPEICAL OPERATIONS , AUDITOR privileges. Further, I have set the userid ABC omvs id as 0 same as tht of IBMUSER. Still I am not able to get full access to ISMF PRIMARY OPTION MENU - DFSMS V2R10 and not able

Re: Greatest Software?

2006-08-20 Thread Bob Shannon
What happened to the Cullinane or Cullinet (sp) from the late 70's? Cullinet was purchased by CA. John Cullinane is alive active in the Boston area. http://www.cullinane-group.com/ When I worked for Programart in the late 90s, we had a number of former Cullinet employees. One day they bumped

Re: Back Doors

2006-08-20 Thread David Cole
At 8/19/2006 12:37 PM, you wrote: In a recent note, john gilmore said: Date: Sat, 19 Aug 2006 15:14:20 + There are ways to do what you want to do. They would be APARable as z/OS security breaches if they werje described in sufficient detail to be usable. Yeah there are. All

Re: Superuser Creation like IBMUSER

2006-08-20 Thread Roger Lowe
On Sun, 20 Aug 2006 18:34:43 +0530, Jacky Bright [EMAIL PROTECTED] wrote: Hi... Is it possible to create superuser like IBMUSER. I hav created user ABC with all SPEICAL OPERATIONS , AUDITOR privileges. Further, I have set the userid ABC omvs id as 0 same as tht of IBMUSER. Still I am not able

Re: Back Doors

2006-08-20 Thread Bob Shannon
But for authorized programming, the security is about as robust as moldy cheese. (And I know I'm right about this!) Dave - I would argue that there is no implied security for authorized code. Bob Shannon Rocket Software -- For

Re: Back Doors

2006-08-20 Thread Shane
On Sun, 2006-08-20 at 09:23 -0400, David Cole wrote: ... But in order to believe that MVS is a highly secure system, you would also have to believe that everyone who has the ability to install programs into authorized libraries is totally trustworthy. I dunno. When you consider how many

Re: Back Doors

2006-08-20 Thread David Cole
At 8/20/2006 09:35 AM, BShannon wrote: But for authorized programming, the security is about as robust as moldy cheese. (And I know I'm right about this!) Dave - I would argue that there is no implied security for authorized code. I would agree. And so would IBM, which is why a security

Re: Back Doors

2006-08-20 Thread Ted MacNEIL
a security breach by an authorized program would not be APARable I believe that, if an IBM supplied authorised programme, did cause a breach, it should be APARable. But, what do I know? When in doubt. PANIC!! -- For

Re: Back Doors (was: EXCP with a DEB)

2006-08-20 Thread Arthur T.
On 19 Aug 2006 09:37:29 -0700, in bit.listserv.ibm-main (Message-ID:[EMAIL PROTECTED]) [EMAIL PROTECTED] wrote: If you are aware of further ways that would be APARable, I'll suggest that it's your ethical responsibility, not to disclose them or even hint of their existence in a pubic forum,

Re: IBM-MAIN Digest - 18 Aug 2006 to 19 Aug 2006 (#2006-232)

2006-08-20 Thread Rick Fochtman
snip-- In respect of your query about EXCP with DEB: Hello: Does anyone have any sample code that does I/O (read only) by manually building a DEB? (Bypassing OPEN and CLOSE.) .. I want to be able to read the directory

Back Doors

2006-08-20 Thread Keith E. Moe
But for authorized programming, the security is about as robust as moldy cheese. (And I know I'm right about this!) Dave - I would argue that there is no implied security for authorized code. I would agree. And so would IBM, which is why a security breach by an authorized program would not be

Re: Back Doors

2006-08-20 Thread Paul Gilmartin
In a recent note, David Cole said: Date: Sun, 20 Aug 2006 09:51:44 -0400 Authorized programs can breach security. There are too many reasons why authorized programs have to be written. There are too many people who write authorized programs. There are too many people (both inside a

Re: IBM-MAIN Digest - 18 Aug 2006 to 19 Aug 2006 (#2006-232)

2006-08-20 Thread Rick Fochtman
---snip--- The presence of bank vaults in the world means that there must also be locksmiths in it who can open them, and I suppose that there is a similar rationale for the skills needed to breach z/OS, but this is a public forum in which I

Re: Back Doors

2006-08-20 Thread Paul Gilmartin
In a recent note, Ted MacNEIL said: Date: Sun, 20 Aug 2006 14:44:42 + a security breach by an authorized program would not be APARable I believe that, if an IBM supplied authorised programme, did cause a breach, it should be APARable. But, what do I know? I presume the OP

Re: Back Doors

2006-08-20 Thread Bob Shannon
I believe that, if an IBM supplied authorised programme, did cause a breach, it should be APARable Given that MVS itself runs authorized that's a fair assumption. Bob Shannon Rocket Software -- For IBM-MAIN subscribe / signoff

Re: IBM-MAIN Digest - 18 Aug 2006 to 19 Aug 2006 (#2006-232)

2006-08-20 Thread Binyamin Dissen
On Sun, 20 Aug 2006 09:54:17 -0500 Rick Fochtman [EMAIL PROTECTED] wrote: : snip-- : In respect of your query about EXCP with DEB: : Hello: Does anyone have any sample code that does I/O (read only) by : manually building a DEB?

Re: SMF Records recording

2006-08-20 Thread R.S.
Mark Zelden wrote: On Tue, 8 Aug 2006 11:09:27 +0200, R.S. [EMAIL PROTECTED] wrote: BTW: Cost of offload jobs is rather irrelevant, beacuse usually they don't burn CPU cycles during rush hours. No, they burn cycles whenever a dump is triggered by a MAN dataset filling up. Yes, in some

Re: SMF Records recording

2006-08-20 Thread Ted MacNEIL
No, they burn cycles whenever a dump is triggered by a MAN dataset filling up. Yes, in some small shops / environments you can have enough of them and only dump them all once a day. That doesn't work in larger environments. I have never seen SMF Dumps 'burn' cycles. Make them low

Re: IBM-MAIN Digest - 18 Aug 2006 to 19 Aug 2006 (#2006-232)

2006-08-20 Thread Paul Gilmartin
In a recent note, Binyamin Dissen said: Date: Sun, 20 Aug 2006 12:28:43 -0400 On Sun, 20 Aug 2006 09:54:17 -0500 Rick Fochtman [EMAIL PROTECTED] wrote: :You can also use QSAM GETs to read the directory. And if you specify a KEYLEN=8 , you can see the key of each block, so you

Re: Rexx Warts

2006-08-20 Thread Thomas Berg
== Paul Gilmartin == wrote2006-08-20 02:16: In a recent note, Thomas Berg said: o Absence of facility to enumerate members of a compound variable. Right, but is it really essential ? AFAICS, You can solve this quite easily programmatically. (Albeit clumsy.) How? One can

Re: Rexx Warts

2006-08-20 Thread Paul Gilmartin
On Sun, 20 Aug 2006 22:10:23 +0200, Thomas Berg [EMAIL PROTECTED] wrote: Well, I said clumsy. When I have the need to remember the compund tails I just saves them as strings, simple example: Parse Pull xyz stem.xyz = 1 tails = tails xyz etc. I do the same. Of course, I must be certain

Re: Rexx Warts

2006-08-20 Thread Thomas Berg
== Paul Gilmartin == wrote2006-08-20 23:03: On Sun, 20 Aug 2006 22:10:23 +0200, Thomas Berg [EMAIL PROTECTED] wrote: Well, I said clumsy. When I have the need to remember the compund tails I just saves them as strings, simple example: Parse Pull xyz stem.xyz = 1 tails = tails

Re: Rexx Warts

2006-08-20 Thread Paul Gilmartin
On Sun, 20 Aug 2006 23:40:38 +0200, Thomas Berg [EMAIL PROTECTED] wrote: But a tail that contains a blank is not a valid tail. Am I right or have I missed something ? TAIL = Foo Bar Stem.TAIL = Wombat ... but it can only be accessed by assigning the tail to a variable, not

Re: Rexx Warts

2006-08-20 Thread Thomas Berg
== Paul Gilmartin == wrote2006-08-21 00:53: On Sun, 20 Aug 2006 23:40:38 +0200, Thomas Berg [EMAIL PROTECTED] wrote: But a tail that contains a blank is not a valid tail. Am I right or have I missed something ? TAIL = Foo Bar Stem.TAIL = Wombat ... but it can only be

Re: Back Doors

2006-08-20 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 08/20/2006 at 09:23 AM, David Cole [EMAIL PROTECTED] said: In fact, I'm kinda surprised that nobody's yet written a root kit for MVS. I'd be surprised if nobody has, as APAR documentation. IBM has a mechanism to keep such data out of the publicly visible part of the

Re: Back Doors

2006-08-20 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 08/20/2006 at 09:35 AM, Bob Shannon [EMAIL PROTECTED] said: Dave - I would argue that there is no implied security for authorized code. The Devil is in the details. If the user of an authorized service causes a security breach, then that is not APARable against that

Re: Back Doors (was: EXCP with a DEB)

2006-08-20 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 08/19/2006 at 10:37 AM, Paul Gilmartin [EMAIL PROTECTED] said: If you are aware of further ways that would be APARable, I'll suggest that it's your ethical responsibility, not to disclose them or even hint of their existence in a pubic forum, but to initiate the APAR.

Re: Greatest Software?

2006-08-20 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 08/19/2006 at 02:33 PM, Timothy Sipples [EMAIL PROTECTED] said: One could also argue that Microsoft BASIC was great software because it was instrumental in establishing the legal principle that software can be copyrighted. Wasn't ADR at that party first? --

Re: Rexx Warts

2006-08-20 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 08/19/2006 at 06:16 PM, Paul Gilmartin [EMAIL PROTECTED] said: How? One can come close by coding a function package in some other language, but if I understand correctly even that can't precisely entirely copy a compound from one stem to another. Why not? You go

Re: Superuser Creation like IBMUSER

2006-08-20 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 08/20/2006 at 06:34 PM, Jacky Bright [EMAIL PROTECTED] said: Is it possible to create superuser like IBMUSER. I'm not sure what you mean by superuser. IBMUSER is not root and does not automatically have all privileges. z/OS does not use the Unix 2-level (root and

Re: The Fate of VM - was: Re: Baby MVS???

2006-08-20 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 08/20/2006 at 12:35 AM, Thomas Berg [EMAIL PROTECTED] said: You mean as in regular expressions ? Well, I'd prefer a cleaner syntax then Unix regexen, more like ICON, SNOBOL and SuperWylbur®, and I'd also like support[1] for parsing keyword parameters. Right. (BTW,

Re: EXCP with a DEB

2006-08-20 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 08/19/2006 at 03:14 PM, john gilmore [EMAIL PROTECTED] said: There are ways to do what you want to do. They would be APARable as z/OS security breaches if they werje described in sufficient detail to be usable. I read his question as meaning that he's already

Re: EXCP with a DEB

2006-08-20 Thread Shmuel Metz (Seymour J.)
In [EMAIL PROTECTED], on 08/19/2006 at 08:28 PM, john gilmore [EMAIL PROTECTED] said: I have not exploited these weaknesses for fun or profit, I have, but that was before MODESET provided a cleaner and supported way to get into key zero. I've also APARed those weaknesses that I discovered.

Re: EXCP with a DEB

2006-08-20 Thread Binyamin Dissen
On Sun, 20 Aug 2006 16:24:44 -0300 Shmuel Metz (Seymour J.) [EMAIL PROTECTED] wrote: :In [EMAIL PROTECTED], on 08/19/2006 : at 08:28 PM, john gilmore [EMAIL PROTECTED] said: :I have not exploited these weaknesses for fun or profit, :I have, but that was before MODESET provided a cleaner and

Re: How can the ACS routine to bypass checking the storage volume datasets?

2006-08-20 Thread Tommy Tsui
Hi Tom, Thanks your advice again. I still have a little question on SMS. I have three JCL to allocate 3 types datasets s /* case 1 allocate temporary file //BACKUP1 EXEC PGM=ICEGENER //SYSPRINT DD SYSOUT=* //SYSUT1 DD DUMMY,DCB=(RECFM=FB,LRECL=80,BLKSIZE=0) //SYSUT2 DD

Re: EXCP with a DEB

2006-08-20 Thread john gilmore
Many of the contributions to this thread have struck me as moralistic, disingenuous, or ignorant. (It's hard to know which.) Worse, they have almost all reflected synchronic rather than diachronic thinking. Binyamin did, however, get it right. When I am developing and testing authorized

Policy Size

2006-08-20 Thread munif sadek
Hi Listers, I need to increase size of one of the log stream structure in my CFRM Policy for our production sysplex. Can some one give me list of steps? Can I update structure size in-place and do I need to include statement only for the structure whose size I am changing in my IXCMIAPU job

Re: Rexx Warts

2006-08-20 Thread Paul Gilmartin
On Sun, 20 Aug 2006 15:57:04 -0300, Shmuel Metz (Seymour J.) [EMAIL PROTECTED] wrote: How? One can come close by coding a function package in some other language, but if I understand correctly even that can't precisely entirely copy a compound from one stem to another. Why not? You go

Re: EXCP with a DEB

2006-08-20 Thread Paul Gilmartin
On Mon, 21 Aug 2006 02:03:18 +, john gilmore [EMAIL PROTECTED] wrote: Many of the contributions to this thread have struck me as moralistic, disingenuous, or ignorant. (It's hard to know which.) Worse, they have almost all reflected synchronic rather than diachronic thinking.