Re: COBOL for z/OS V6R2M0

2019-08-03 Thread Mike Schwab
Fifth Third Bank is already being used. On Fri, Aug 2, 2019, 16:14 Chris Hoelscher wrote: > So does SECONDTENNESSEE move up to FIRSTTENNESSEE ?? > > Thank You, > Chris Hoelscher| ITI . DB Services . Mainframe Database | Humana Inc.| T > 502.476.2538 or 502.407.7266 > > -Original

Re: Extract next eight character positions after SubString Match

2019-08-03 Thread Scott Barry
The dataset-inventory information is available using IDCAMS/DCOLLECT utility and DFSORT/ICETOOL provides decoder-ring logic to analyze the DCOLLECT output and report on DATACLAS usage (as well as other SMS-construct usage) within your z/OS system, including DFHSM-migrated datasets as well as

Re: Capital One Data Breach-100 Million Customers affected

2019-08-03 Thread Charles Mills
https://krebsonsecurity.com/2019/08/what-we-can-learn-from-the-capital-one-hack/ The details are OT to mainframes, of course. Charles -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Bill Johnson Sent: Wednesday, July 31, 2019

Re: Pervasive Encryption - why?

2019-08-03 Thread Cameron Conacher
Hello Matt, I am not sure about backups. This is Pervasive Encryption. So, again my understanding is that IF your RACFID can access the file, you will read the data and it will be presented to you as unencrypted. Now, if you write it to DASD and encryption is on for that device it will be

Re: Pervasive Encryption - why?

2019-08-03 Thread Jesse 1 Robinson
The protective side of data security is only half technical. The other half is GDPR (General Data Protection Regulation), a set of controls that spell out Draconian penalties for any entity that allows--or presides over--a data breach affecting EU citizens. The hair-raising penalties are more

Re: Getting ABEND reason code from attached subtask

2019-08-03 Thread Greg Price
On 2019-08-04 4:06 AM, Kirk Wolf wrote: I'm curious. Say that I have something like: ATTACH EP=MYPROG,ECB=MYECB LTR R15,R15 BZ ATTERR ST R1,MYTCB WAIT 1,ECB=MYECB DETACH MYTCB I know that I can get either the subtask return code or ABEND completion code(s) from the ECB. But in the case of an

Re: Pervasive Encryption - why?

2019-08-03 Thread Cameron Conacher
Thanks everyone. That certainly helps. On Sat, Aug 3, 2019 at 4:31 PM Charles Mills wrote: > Others have mentioned backups. The real value is in the right to *do* > backups. Your storage administrator may have access to the dataset, but not > the decryption key. So he can do backups, but he

Re: Getting ABEND reason code from attached subtask

2019-08-03 Thread Steve Smith
At ABEND, R15 contains the REASON. For a normal return, R15 contains the return code, and R0 often contains a reason, but that is a weaker convention. On a normal return, registers come back however the called program sets them. However, a subtask returns to the system. Maybe you could find

Re: Capital One Data Breach-100 Million Customers affected

2019-08-03 Thread Matt Hogstrom
I think the main take-away is that in almost all cases its either software bugs, poor security defaults that don’t force changes in credentials / passwords, bad default configurations for ease of use which results in poor configurations or perhaps malice in the form of allowing a breach. We

Pervasive Encryption - why?

2019-08-03 Thread Cameron Conacher
Hello everyone, I have a curiousity question about Pervasive Encryption. If we are already protecting resources with RACF, what additional benefit do we get from Pervasive Encryption? I think it is a good idea, since encrypted data lets me sleep better. Pervasive Encryption appears to be very

Re: Pervasive Encryption - why?

2019-08-03 Thread Steve Smith
There are some good presentations on SHARE about this. The point about backups is that the backups are made of the encrypted file, by personnel and software that do *not* have the access to the decryption key. That allows admins & sysprogs to manage storage & such without having the ability to

Re: Getting ABEND reason code from attached subtask

2019-08-03 Thread Charles Mills
@Kirk, is the ABEND reason code somewhere in the TCB? I would do the search but you can do it as well as I. Is R0 = normal completion reason code "architected"? I don't recall that it is. It is something of a convention, but is it an "MVS linkage"? If not, I *suspect* the contents of R0 have

Re: Getting ABEND reason code from attached subtask

2019-08-03 Thread Seymour J Metz
ITYM R15. description of ABEND includes " ,REASON=reason code". -- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 From: IBM Mainframe Discussion List on behalf of Charles Mills Sent: Saturday, August 3, 2019 4:28 PM To:

Re: Pervasive Encryption - why?

2019-08-03 Thread Paul Gilmartin
On Sat, 3 Aug 2019 13:24:46 -0400, Matt Hogstrom wrote: >One use case is backups. If someone can access a backup outside of the >controls the system it resides on employs they could not compromise the data. >Consider potential data services that host backups offsite for instance. Your

Re: Getting ABEND reason code from attached subtask

2019-08-03 Thread Seymour J Metz
Is the RB chain intact after an ABEND? If so, you can look at R15. -- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 From: IBM Mainframe Discussion List on behalf of Kirk Wolf Sent: Saturday, August 3, 2019 2:05 PM To: IBM-MAIN@LISTSERV.UA.EDU

Re: Pervasive Encryption - why?

2019-08-03 Thread Charles Mills
Others have mentioned backups. The real value is in the right to *do* backups. Your storage administrator may have access to the dataset, but not the decryption key. So he can do backups, but he can't steal credit card numbers or health information. Charles -Original Message- From:

Re: COBOL for z/OS V6R2M0

2019-08-03 Thread Peter Relson
If it is truly the case that the new version of the module is not being used, then clearly the old version is being found somewhere. If you have replaced the copy in the only data set where it lives and refreshed LLA, then these are the possibilities that come to mind -- you are not re-fetching

Getting ABEND reason code from attached subtask

2019-08-03 Thread Kirk Wolf
I'm curious. Say that I have something like: ATTACH EP=MYPROG,ECB=MYECB LTR R15,R15 BZ ATTERR ST R1,MYTCB WAIT 1,ECB=MYECB DETACH MYTCB I know that I can get either the subtask return code or ABEND completion code(s) from the ECB. But in the case of an ABEND, is there an easy way to get the

Re: Capital One Data Breach-100 Million Customers affected

2019-08-03 Thread Charles Mills
Amen to that, Brother. And complexity, which makes it hard to get everything right (and you only need to get one or two things wrong to have a problem). That is what struck me reading the Krebs piece. Charles -Original Message- From: IBM Mainframe Discussion List

Re: Pervasive Encryption - why?

2019-08-03 Thread Matt Hogstrom
One use case is backups. If someone can access a backup outside of the controls the system it resides on employs they could not compromise the data. Consider potential data services that host backups offsite for instance. Your protecting your data while entrusting someone with ensuring its