Re: changing batch job to use SSL

2017-06-12 Thread Timothy Sipples
IPsec is another option I should have also mentioned, also a Communications Server for z/OS feature. Timothy Sipples IT Architect Executive, Industry Solutions, IBM z Systems, AP/GCG/MEA

Re: APF authorization and AC(00)

2017-06-12 Thread CM Poncelet
A REFR program's page can be stolen (without having to save it first) by the RSM if it has a higher UIC than other pages. If it then hits a page fault, the ASM reloads the missing page from the paging dataset so the program can continue executing. AFAIK It reloads only stolen pages, not the whole

Re: Estae and the Linkage Stack

2017-06-12 Thread Joseph Reichman
Thanks for getting back to me I see it now I had recovery routine and abended in a subroutine which had a BAKR it apparently deactivated it the documentation below is very unclear Thanks DeactivatinganESTAE-TypeRecoveryRoutine: A program may deactivate an ESTAE-type recovery routine only

Re: Sorting a REXX STEM variable

2017-06-12 Thread Paul Gilmartin
On 2017-06-12, at 14:20, Jesse 1 Robinson wrote: > I have a number of applications that sort a REXX array. My solution is to > load it into an ISPF table. Not only is a table easily sorted, but you can do > an instant search with single ISPF command. And so much more. > Rexx compound symbols

Re: Estae and the Linkage Stack

2017-06-12 Thread Blaicher, Christopher Y.
It is a little tricky. In the Assembler Services Guide there is a section called Linkage Stack Considerations in chapter 8, the last paragraph of which says: When you issue a PR, the system automatically deactivates all ESTAE-type recovery routines that were previously activated under that

Estae and the Linkage Stack

2017-06-12 Thread Joseph Reichman
Hi I thought for the longest time that an ESTAE was associated with a Task. Then I saw a thread with Chris Blaicher where the upshot as that a BAKR would deactivate it I did a search on the archives but didn't come up with anything

Re: Sorting a REXX STEM variable

2017-06-12 Thread Jesse 1 Robinson
I have a number of applications that sort a REXX array. My solution is to load it into an ISPF table. Not only is a table easily sorted, but you can do an instant search with single ISPF command. And so much more. Yes, you need to run in a TSO environment, but I've never found much use for a

Re: Sorting a REXX STEM variable

2017-06-12 Thread Tony Harminc
On 12 June 2017 at 15:17, Paul Gilmartin < 000433f07816-dmarc-requ...@listserv.ua.edu> wrote: > What I mean to ask is, how can I invoke an arbitrary > utility or load module (not just SORT) associating all its files with Rexx > stems, not just data sets. SORT allows this because of the I/O

Re: Sorting a REXX STEM variable

2017-06-12 Thread Paul Gilmartin
On Mon, 12 Jun 2017 20:58:24 +, Robert Prins wrote: >On 2017-06-12 14:29, John Gateley wrote: >>... >> r_c = SORTSTEM(my_stem_name,'A') >>... >> It will be on File#953 of the CBT Tape soon, but it anyone wants a preview >> then the code is in IEBUPDTE format here >>

Re: APF authorization and AC(00)

2017-06-12 Thread Paul Gilmartin
On Mon, 12 Jun 2017 13:53:23 -0400, Tony Harminc wrote: > >> Name-token services does something related. I understand it performs >> no costly locking during searches, but tests a flag after a search to >> detect that the data structure has been modified in-progress, and >> re-drive the search,

Reddit AMA on CICS TS V5.4

2017-06-12 Thread Anthony Giorgio
Hello everyone! IBM will be hosting a Reddit "Ask Me Anything" session to discuss the new release of CICS TS V5.4. We're going to run a 1-hour session on r/mainframe, to informally chat about it. The hosts will be Fraser Bohm (CICS Chief Architect, DE) and Andy Bates (CICS Principal

Re: Sorting a REXX STEM variable

2017-06-12 Thread Robert Prins
On 2017-06-12 14:29, John Gateley wrote: Hi Last weeks discussion on sorting a REXX stem inspired me to write a program to do it. example call to sort ascending "ISPEXEC LIBDEF ISPLLIB DATASET ID ('my_loadlib') STACK" "ALLOC FI(SORTPRT) DUMMY" r_c = SORTSTEM(my_stem_name,'A') "FREE

Re: APF authorization and AC(00)

2017-06-12 Thread Tony Harminc
On 12 June 2017 at 12:35, Paul Gilmartin < 000433f07816-dmarc-requ...@listserv.ua.edu> wrote: > Name-token services does something related. I understand it performs > no costly locking during searches, but tests a flag after a search to > detect that the data structure has been modified

REFR protection (was: APF authorization and AC(00)

2017-06-12 Thread David W Noon
On Mon, 12 Jun 2017 11:35:33 -0500, Paul Gilmartin (000433f07816-dmarc-requ...@listserv.ua.edu) wrote about "Re: APF authorization and AC(00)" (in <3613995808381310.wa.paulgboulderaim@listserv.ua.edu>): [snip] > Earlier, I said that REFRPROT could be made the default because load >

Re: APF authorization and AC(00)

2017-06-12 Thread Paul Gilmartin
On Mon, 12 Jun 2017 09:44:02 +0300, Binyamin Dissen wrote: >On Mon, 12 Jun 2017 00:31:28 -0400 Randy Hudson wrote: > >:>Saving a few bytes is sneered at as false economy, now. It wasn't, then. > Alas, code designed according to that criterion remains in use today (if it weren't, REFRPROT could

Re: Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-12 Thread Phil Smith
There are several things intertwined here. * CPACF is the "crypto on the chip" - z Systems instructions that do AES et al. * CEX is the z HSM. * ICSF is, of course, the z/OS service that talks to both (though you can do CPACF operations directly as well). With just CPACF,

CSFSERV recommendations

2017-06-12 Thread Roach, Dennis
Does anyone know of a paper of recommendations or best practices for CSFSERV? I can see two cases: 1. Allow all users to use but not administer the feature. 2. Restrict access to only those products/users we want to use the feature. Questions: 1. What profiles control the

Sorting a REXX STEM variable

2017-06-12 Thread John Gateley
Hi Last weeks discussion on sorting a REXX stem inspired me to write a program to do it. example call to sort ascending "ISPEXEC LIBDEF ISPLLIB DATASET ID ('my_loadlib') STACK" "ALLOC FI(SORTPRT) DUMMY" r_c = SORTSTEM(my_stem_name,'A') "FREE FILE(SORTPRT)" "ISPEXEC LIBDEF ISPLLIB "

Re: changing batch job to use SSL

2017-06-12 Thread Grinsell, Don
You have laid the ground work to be able to use SSL in your program, however, the next step is the difficult part. You will have to reengineer your application to create the SSL environment and make secure calls. As others have suggested, AT-TLS is the route to follow here. You will be able

Re: APF authorization and AC(00)

2017-06-12 Thread Gary Weinhold
It could be practical when writing high-performance code to modify a RENT module if it is not in key 0 (or use a PC to make the modification if in key 0). An example would be if an extensive chain of indirect pointers (or the NAME/TOKEN service), is used to locate life of IPL memory

Re: Does the JES2 ESTBYTE parm limit STC or just batch output?

2017-06-12 Thread Allan Staller
Cool. I learned something today. Maybe JOBCLASS(xxx) is a better place that ESTBYTE? -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Jesse 1 Robinson Sent: Friday, June 9, 2017 8:13 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Does

Re: Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-12 Thread R.S.
W dniu 2017-06-12 o 14:12, Tony Thigpen pisze: We are talking about encrypting "Data at Rest". There is *no* key exchange involved. The only purpose for encrypting keys is so you can send them to someone else. No. The purpose of encrypting keys is something called "secure key cryptography",

Re: APF authorization and AC(00)

2017-06-12 Thread Walt Farrell
On Sun, 11 Jun 2017 20:52:10 -0400, Steve Thompson wrote: >Question: Wasn't REFR for a program where, say a double-bit >parity error could occur, and it would then get loaded to a new page? I can't comment on the double-bit parity error, but I think that someone (Peter,

Re: Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-12 Thread Mark Jacobs - Listserv
Has nothing to do with key exchange. The DEK used to encrypt the data will be in clear text rather than the DEK being encrypted by the KEK. ( ICSF Master Key ). Mark Jacobs Tony Thigpen June 12, 2017 at 8:12 AM We are talking about encrypting "Data at Rest". There

Re: APF authorization and AC(00)

2017-06-12 Thread Walt Farrell
On Mon, 12 Jun 2017 02:24:30 +, Jesse 1 Robinson wrote: >I got tired of guessing. I wrote a little program that saves registers into >itself via STM. I linked it with AC(1) and RENT. Did not specify >either REUS >or REFR. The result according to StarTool is >--

Re: Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-12 Thread Tony Thigpen
We are talking about encrypting "Data at Rest". There is *no* key exchange involved. The only purpose for encrypting keys is so you can send them to someone else. Tony Thigpen Mark Jacobs - Listserv wrote on 06/12/2017 08:01 AM: Encryption/decryption without a CryptoExpress only supports

Re: Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-12 Thread Mark Jacobs - Listserv
Encryption/decryption without a CryptoExpress only supports clear keys, not protected or secured encryption keys. Might be enough for the OP, but wouldn't fly in my environment. Tony Thigpen June 12, 2017 at 7:22 AM For encrypting "data at rest", the CPACF is really

Re: Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-12 Thread Tony Thigpen
For encrypting "data at rest", the CPACF is really all he needs. The Crypto Express is intended to speed up key negotiations between sites, something not needed for his intended plans. Tony Thigpen Arye Shemer wrote on 06/12/2017 02:00 AM: Hello, Customer is currently using CPACF to encrypt

Re: APF authorization and AC(00)

2017-06-12 Thread John Eells
Paul Gilmartin wrote: On Sat, 10 Jun 2017 07:27:15 -0400, Peter Relson wrote: REFRPROT extends this to programs that are not loaded from an APF authorized library. Actually, REFRPROT extends this to programs that are bound with the REFR option regardless of module authorization or library

Re: APF authorization and AC(00)

2017-06-12 Thread Elardus Engelbrecht
Binyamin Dissen wrote: >But if you lie to zOS and assert that a non-reentrant program is reentrant, >zOS will not stop you from walking off the roof. Indeed. You will get burned badly. I once coded a SMF exit which modified itself in a macro's MF=L instead of modified that marco's copy in a

Re: APF authorization and AC(00)

2017-06-12 Thread Binyamin Dissen
On Mon, 12 Jun 2017 00:31:28 -0400 Randy Hudson wrote: :>In article <2376347398828975.wa.paulgboulderaim@listserv.ua.edu> you write: :> :>> Point taken. But it's not clear why the designers chose to allow a program :>> to be both modifyable and reloadable. This leads to

Re: APF authorization and AC(00)

2017-06-12 Thread Binyamin Dissen
The attributes are to allow the system to take care of the infrastructure, such as loading a new copy if a program is non-reentrant and serializing use if the program is described as reusable. But if you lie to zOS and assert that a non-reentrant program is reentrant, zOS will not stop you from

Customer is Using CPACF (Crypto) purchased Crypto Express

2017-06-12 Thread Arye Shemer
Hello, Customer is currently using CPACF to encrypt his data before writing to disks. Customer intent to purchased Crypto Express and want to use it to continue to encrypt the data before writing to the disks, Are there any compatibility issues ? Are there any know documents which