Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

2020-05-04 Thread Tom Brennan
I don't think it matters much.  If the PC gets hacked then the hacker 
can probably figure out ways to get access to the mainframe whether it's 
setup to automatically logon or not.


On 5/4/2020 1:31 PM, Tom Marchant wrote:

On Mon, 4 May 2020 19:14:31 +, Frank Swarbrick wrote:


What I would love to see is some sort of "single signon" option, where a user 
would only need
to sign on to their personal workstation and not need to explicitly sign on to 
z/OS at all.


IMO, this is a bad idea unless you can count on everyone's workstation being at 
least as secure
as z/OS is. All you need is one user who gets their PC hacked and the hacker 
has access to z/OS,
with whatever authority that user has.



--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

2020-05-04 Thread Gibney, Dave
The vast majority of z/OS users don't  need elevated authority, unlike much of 
Windows Workstations.
I don't think it would be a good idea to include Sysprogs and z/OS Security 
Admins in the extended length world.

> -Original Message-
> From: IBM Mainframe Discussion List  On
> Behalf Of Tom Marchant
> Sent: Monday, May 04, 2020 1:32 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)
> 
> On Mon, 4 May 2020 19:14:31 +, Frank Swarbrick wrote:
> 
> >What I would love to see is some sort of "single signon" option, where
> >a user would only need to sign on to their personal workstation and not
> need to explicitly sign on to z/OS at all.
> 
> IMO, this is a bad idea unless you can count on everyone's workstation being
> at least as secure as z/OS is. All you need is one user who gets their PC
> hacked and the hacker has access to z/OS, with whatever authority that user
> has.
> 
> --
> Tom Marchant
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email to
> lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Using Windows ssh with z/OS

2020-05-04 Thread Don Poitras
In article <6673472942485742.wa.paulgboulderaim@listserv.ua.edu> you wrote:
> On Mon, 4 May 2020 17:39:39 -0500, Wendell Lovewell wrote:
> >
> >Installing Rocket's bash provided the cursor history scrolling I was looking 
> >for.   
> >
> >I don't perceive a difference between TERM=xterm+256color and TERM=xterm in 
> >the command-line-only functions I use.  (I don't see any coloring in the ls 
> >or other output for either value.)
> >
> >I have "bash" as the last line in /etc/profile.  This seems to work, but I 
> >do have to enter "exit" twice to close the window.  Is there a way to invoke 
> >bash so that this is not necessary?  I'm also not sure if this matters, but 
> >"echo $SHELL" still shows "/bin/sh", not "/bin/bash".
> >
> SHELL=/bin/bash exec $SHELL
> -- gil

If you have permission (or know someone that has permission), do:

TSO ALTUSER userid OMVS(PROGRAM('/path/to/bin/bash'))

-- 
Don Poitras - SAS Development  -  SAS Institute Inc. - SAS Campus Drive
sas...@sas.com   (919) 531-5637Cary, NC 27513

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: AW: Using Windows ssh with z/OS

2020-05-04 Thread Paul Gilmartin
On Mon, 4 May 2020 17:39:39 -0500, Wendell Lovewell wrote:
>
>Installing Rocket's bash provided the cursor history scrolling I was looking 
>for.   
>
>I don't perceive a difference between TERM=xterm+256color and TERM=xterm in 
>the command-line-only functions I use.  (I don't see any coloring in the ls or 
>other output for either value.)
>
>I have "bash" as the last line in /etc/profile.  This seems to work, but I do 
>have to enter "exit" twice to close the window.  Is there a way to invoke bash 
>so that this is not necessary?  I'm also not sure if this matters, but "echo 
>$SHELL" still shows "/bin/sh", not "/bin/bash".
>
SHELL=/bin/bash exec $SHELL

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: AW: Using Windows ssh with z/OS

2020-05-04 Thread Jack J. Woehr

On 5/4/20 4:39 PM, Wendell Lovewell wrote:

I have "bash" as the last line in /etc/profile.  This seems to work, but I do have to enter "exit" twice to 
close the window.  Is there a way to invoke bash so that this is not necessary?  I'm also not sure if this matters, but 
"echo $SHELL" still shows "/bin/sh", not "/bin/bash".


The shell that loads when you log in is chosen by your profile.

Not sure how this is done in USS but someone administratively could 
simply change your login shell to /bin/bash.


In the meantime, just create a profile in your home directory .profile 
that does exec /bin/bash


--
Jack J. Woehr # Science is more than a body of knowledge. It's a way of
www.well.com/~jax # thinking, a way of skeptically interrogating the universe
www.softwoehr.com # with a fine understanding of human fallibility. - Carl Sagan

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: AW: Using Windows ssh with z/OS

2020-05-04 Thread Wendell Lovewell
Thanks to everyone for the advice. 

Installing Rocket's bash provided the cursor history scrolling I was looking 
for.   

I don't perceive a difference between TERM=xterm+256color and TERM=xterm in the 
command-line-only functions I use.  (I don't see any coloring in the ls or 
other output for either value.)

I have "bash" as the last line in /etc/profile.  This seems to work, but I do 
have to enter "exit" twice to close the window.  Is there a way to invoke bash 
so that this is not necessary?  I'm also not sure if this matters, but "echo 
$SHELL" still shows "/bin/sh", not "/bin/bash".

- Wendell

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Mainframe user ID length

2020-05-04 Thread Frank Swarbrick
I know on my MQ instance I have installed on my home Windows machine, MQ 
truncates my Windows user ID "Frank Swarbrick" to "Frank Swarbr".


From: IBM Mainframe Discussion List  on behalf of 
Seymour J Metz 
Sent: Monday, May 4, 2020 2:46 PM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: Mainframe user ID length

The maximum length on Linux is 32; whether MQ will work with a name longer than 
12 is a separate issue. There are also Linux commands that will display the UID 
instead of a username longer than 8. LDAP can map long names to short. I don't 
know about non-IBM LDAP.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of 
Frank Swarbrick [frank.swarbr...@outlook.com]
Sent: Monday, May 4, 2020 2:48 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Mainframe user ID length

Wow! That's a lot to digest.
A couple of things.  First, I see the following documented:

“On z/OS® and UNIX and Linux, the maximum length of a user ID is 12 
characters.”  From 
https://www.ibm.com/support/knowledgecenter/SSFKSJ_9.1.0/com.ibm.mq.sec.doc/q010300_.htm

I wonder how this works if RACF user IDs are only allowed up to 8 characters.  
Would an alternate SAF product be required?  I can't see anything documented to 
explain how this might work.


On a separate line, are you saying is it possible for z/OS to use a non-z/OS 
LDAP server for authentication (and authorization?), including user IDs and 
passwords?  But this would that still require TSO and CICS (and IMS? and 
others?) signon processes to be able to handle those user IDs?  It sounds like 
both of these things are true, but I want to make sure I am not 
misunderstanding you.


From: IBM Mainframe Discussion List  on behalf of 
Timothy Sipples 
Sent: Saturday, May 2, 2020 12:34 AM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: Mainframe user ID length

Frank Swarbrick wrote:
>"more than 8"?  What's the limit, if any?

The z/OS LDAP Server's CN limit is 256 characters, so it's at least that
large.

>Which system components/products permit/prohibit this?
>(Start your list with JCL.)

You can specify pretty much anything you want in JCL. Do you mean JES2? If
so, that'll use maximum 8 character user IDs.

Whatever list I come up with is necessarily going to be partial, but as
we've already seen (I linked to the documentation) MQ for z/OS can
authenticate users with the IBM Directory Server for z/OS at least in
certain contexts. CICS Transaction Server for z/OS also can in certain
contexts. See for example this documentation:

https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/security/java/dist_identity.html

Other z/OS components and products that come to mind include the z/OS
Container Extensions, WebSphere Application Server for z/OS, and the IBM
HTTP Server for z/OS. See for example here:

https://www.ibm.com/support/knowledgecenter/SSEQTJ_9.0.5/com.ibm.websphere.ihs.doc/ihs/tihs_apacheldapcfg.html

There are quite a large number of intersections, so many that we've now
reached the stage when one of them fell overboard. z/OS HCD had some LDAP
affinities (would you believe), but they were removed in z/OS 2.3.
Evidently that one was too "crazy." :-)

Bob Bridges wrote:
>I'm about to expose my ignorance here: IDS and LDAP, aren't they just
>IBM's attempt to let z/OS talk to non-z/OS systems?

No, not according to IBM. Right at the very beginning of the IBM (Tivoli)
Directory Server for z/OS redbook, Section 1.1, it says that this
component is for both z/OS and non-z/OS workloads. So take the hint: if
maximum 8 character user IDs are constraining, then start using the IBM
Directory Server for z/OS to authenticate users if you aren't already,
as/where it makes sense for you. Or use a certain something else to
authenticate (see below).

>Or put it this way: If you say I can be authenticated via LPAR using a
>longer ID, and then perform tasks on the mainframe using that ID, how
does
>RACF-or-whatever determine permissions?

First of all, you didn't include "RACF" in the text I reacted to. RACF is
a popular but optional z/OS component. z/OS is not equivalent to RACF.
Second, if you are talking about RACF specifically, yes, it does use
maximum 8 character user IDs But you're not required to authenticate
with them. I (somewhat facetiously) pointed out that you don't have to
authenticate at all, although (as I also pointed out) I'll urge you to at
least perform authorizations. More seriously, z/OS RACF has supported
client certificate authentication since the 1990s. (This feature was
initially introduced way back in the OS/390 days. The OS/390 TN3270E
Server picked up support for it with OS/390 2.9, backported to 2.8. IBM
Personal Communications picked up support for this feature in the late
1990s, too.) See here for an introductory reference:


Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

2020-05-04 Thread Frank Swarbrick
Well, in our case at least the workstation refers to a company provided and 
managed workstation.  We can't log on to z/OS from our personal devices.  And 
we use SSO for many applications.  I don't know how it works; only that it does 
work.


From: IBM Mainframe Discussion List  on behalf of Tom 
Marchant <000a2a8c2020-dmarc-requ...@listserv.ua.edu>
Sent: Monday, May 4, 2020 2:31 PM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

On Mon, 4 May 2020 19:14:31 +, Frank Swarbrick wrote:

>What I would love to see is some sort of "single signon" option, where a user 
>would only need
>to sign on to their personal workstation and not need to explicitly sign on to 
>z/OS at all.

IMO, this is a bad idea unless you can count on everyone's workstation being at 
least as secure
as z/OS is. All you need is one user who gets their PC hacked and the hacker 
has access to z/OS,
with whatever authority that user has.

--
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Mainframe user ID length (not ... Digest ...)

2020-05-04 Thread Paul Gilmartin
On Mon, 4 May 2020 15:31:52 -0500, Tom Marchant wrote:

>On Mon, 4 May 2020 19:14:31 +, Frank Swarbrick wrote:
>
>>What I would love to see is some sort of "single signon" option, where a user 
>>would only need 
>>to sign on to their personal workstation and not need to explicitly sign on 
>>to z/OS at all.
>
>IMO, this is a bad idea unless you can count on everyone's workstation being 
>at least as secure 
>as z/OS is. All you need is one user who gets their PC hacked and the hacker 
>has access to z/OS, 
>with whatever authority that user has.
> 
But the user will keep credentials on a desktop system (I've done so with ssh)
or on a Post-It on the terminal screen, etc.

Multi-factor?

Real-time facial recognition with challenge-response?  Remember, Watson
won at Jeopardy, and could probably beat captchas.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Mainframe user ID length

2020-05-04 Thread Seymour J Metz
The maximum length on Linux is 32; whether MQ will work with a name longer than 
12 is a separate issue. There are also Linux commands that will display the UID 
instead of a username longer than 8. LDAP can map long names to short. I don't 
know about non-IBM LDAP.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of 
Frank Swarbrick [frank.swarbr...@outlook.com]
Sent: Monday, May 4, 2020 2:48 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Mainframe user ID length

Wow! That's a lot to digest.
A couple of things.  First, I see the following documented:

“On z/OS® and UNIX and Linux, the maximum length of a user ID is 12 
characters.”  From 
https://www.ibm.com/support/knowledgecenter/SSFKSJ_9.1.0/com.ibm.mq.sec.doc/q010300_.htm

I wonder how this works if RACF user IDs are only allowed up to 8 characters.  
Would an alternate SAF product be required?  I can't see anything documented to 
explain how this might work.


On a separate line, are you saying is it possible for z/OS to use a non-z/OS 
LDAP server for authentication (and authorization?), including user IDs and 
passwords?  But this would that still require TSO and CICS (and IMS? and 
others?) signon processes to be able to handle those user IDs?  It sounds like 
both of these things are true, but I want to make sure I am not 
misunderstanding you.


From: IBM Mainframe Discussion List  on behalf of 
Timothy Sipples 
Sent: Saturday, May 2, 2020 12:34 AM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: Mainframe user ID length

Frank Swarbrick wrote:
>"more than 8"?  What's the limit, if any?

The z/OS LDAP Server's CN limit is 256 characters, so it's at least that
large.

>Which system components/products permit/prohibit this?
>(Start your list with JCL.)

You can specify pretty much anything you want in JCL. Do you mean JES2? If
so, that'll use maximum 8 character user IDs.

Whatever list I come up with is necessarily going to be partial, but as
we've already seen (I linked to the documentation) MQ for z/OS can
authenticate users with the IBM Directory Server for z/OS at least in
certain contexts. CICS Transaction Server for z/OS also can in certain
contexts. See for example this documentation:

https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/security/java/dist_identity.html

Other z/OS components and products that come to mind include the z/OS
Container Extensions, WebSphere Application Server for z/OS, and the IBM
HTTP Server for z/OS. See for example here:

https://www.ibm.com/support/knowledgecenter/SSEQTJ_9.0.5/com.ibm.websphere.ihs.doc/ihs/tihs_apacheldapcfg.html

There are quite a large number of intersections, so many that we've now
reached the stage when one of them fell overboard. z/OS HCD had some LDAP
affinities (would you believe), but they were removed in z/OS 2.3.
Evidently that one was too "crazy." :-)

Bob Bridges wrote:
>I'm about to expose my ignorance here: IDS and LDAP, aren't they just
>IBM's attempt to let z/OS talk to non-z/OS systems?

No, not according to IBM. Right at the very beginning of the IBM (Tivoli)
Directory Server for z/OS redbook, Section 1.1, it says that this
component is for both z/OS and non-z/OS workloads. So take the hint: if
maximum 8 character user IDs are constraining, then start using the IBM
Directory Server for z/OS to authenticate users if you aren't already,
as/where it makes sense for you. Or use a certain something else to
authenticate (see below).

>Or put it this way: If you say I can be authenticated via LPAR using a
>longer ID, and then perform tasks on the mainframe using that ID, how
does
>RACF-or-whatever determine permissions?

First of all, you didn't include "RACF" in the text I reacted to. RACF is
a popular but optional z/OS component. z/OS is not equivalent to RACF.
Second, if you are talking about RACF specifically, yes, it does use
maximum 8 character user IDs But you're not required to authenticate
with them. I (somewhat facetiously) pointed out that you don't have to
authenticate at all, although (as I also pointed out) I'll urge you to at
least perform authorizations. More seriously, z/OS RACF has supported
client certificate authentication since the 1990s. (This feature was
initially introduced way back in the OS/390 days. The OS/390 TN3270E
Server picked up support for it with OS/390 2.9, backported to 2.8. IBM
Personal Communications picked up support for this feature in the late
1990s, too.) See here for an introductory reference:

https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.icha700/icha700_Enabling_client_login_using_certificates.htm

In this case users don't present maximum 8 character user IDs at all, or
not really. They present digital certificates, and those may be coming
from PIN-protected smart cards for example. Please do check this out! It's
a really nifty solution, and the 

Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

2020-05-04 Thread Tom Marchant
On Mon, 4 May 2020 19:14:31 +, Frank Swarbrick wrote:

>What I would love to see is some sort of "single signon" option, where a user 
>would only need 
>to sign on to their personal workstation and not need to explicitly sign on to 
>z/OS at all.

IMO, this is a bad idea unless you can count on everyone's workstation being at 
least as secure 
as z/OS is. All you need is one user who gets their PC hacked and the hacker 
has access to z/OS, 
with whatever authority that user has.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S0F9 and SOFD ABENDs and SVC dumps - oh my!

2020-05-04 Thread Tony Harminc
On Mon, 4 May 2020 at 04:23, Barbara Nitz  wrote:

> Doesn't matter. With an IMS region, you cannot use cancel (z/OS: 
> "non-cancelable, use force arm"). You cannot use force arm (z/OS: "cancel 
> first, please"). And you cannot use force because IMS intercepts that and 
> tells you to terminate the IMS region by de-registering it from IMS.
...

How does IMS (or anyone else) "intercept" a FORCE? Is it watching the
command interface (SSI) or some such anti social behaviour?

Tony H.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

2020-05-04 Thread Frank Swarbrick
It's simple enough to write your own CICS signon screen to allow for longer 
user IDs (and passwords/phrases), but I think CICS would have to add support 
for the EXEC CICS SIGNON command to allow for a longer user ID.  Currently:
"
USERID(data-value)
Specifies the 8-byte sign-on user ID.

The user ID supplied is converted to uppercase.

"
They did, of course, already add support for a "PASSPHRASE" of up to 100 
characters.



From: IBM Mainframe Discussion List  on behalf of 
Wayne Bickerdike 
Sent: Monday, May 4, 2020 2:40 AM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

There are more CICS users than TSO users. Is there a howto for the CICS
signon screen to accept long IDs and Passphrases?

On Mon, May 4, 2020 at 6:03 PM Timothy Sipples  wrote:

> Bob Bridges wrote:
> >So maybe - maybe, I don't know either - if I sign on to z/OS with a
> >certificate, or LDAP, or anything other than the usual, the sign-on
> routine
> >MAKES UP an 8-byte ID and stores it in the ACEE. If so, after that
> >everything works fine, I guess.
>
> I don't think RACF itself works that way, or at least the z/OS 2.4
> documentation doesn't suggest so. Take a look at this information, for
> example:
>
>
> https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.icha700/icha700_Certificate_mapping.htm
>
> Let's suppose the user is authenticating with RACF (not with the IBM
> Directory Server for z/OS, a.k.a. "LDAP"), and the user transmits an X.509
> client digital certificate for that purpose. RACF has to know ahead of
> time whether or not to authenticate that particular user (digital
> certificate). So the digital certificate has to be known to RACF ahead of
> time. Since the digital certificate has to be known, it's not unreasonable
> to associate an up to 8 character "short" user ID with that certificate.
> And that's how it works, as I understand it. The user doesn't present the
> short user ID -- well, not really, I'll get to this in a moment -- but
> RACF can check the certificate and create an ACEE with a mapped short user
> ID.
>
> There are three basic choices here as I understand it:
>
> 1. A one-to-one mapping (one certificate to short ID ABCD1234). The
> documentation does a little bit of handwaving here along the lines of
> "this might be difficult to administer," but I'd argue that's somewhat
> dated advice now that so many organizations use identity management tools.
>
> 2. A many-to-one mapping (multiple certificates to ABCD1234).
>
> 3. Either mapping, but with the certificate itself holding an embedded
> short name ("hostIdMapping"). Certificate issuers don't typically support
> this extension, or at least they hide it well, but the z/OS PKI Services
> do. (Is this technique "cheating"? Not really)
>
> In all these cases the user need not be aware there's a short name that
> RACF uses "under the covers." The user just supplies a valid, unexpired
> client certificate -- from a PIN-protected smart card perhaps. From RACF's
> perspective the X.509 digital certificate is really just another alias, a
> verbose one.
>
> z/OS LDAP also supports broadly similar RACF ID mapping (supply a long CN,
> which the directory maps to a short name), but it's optional. You can
> certainly authenticate with LDAP as a standalone matter if you wish.
>
> It's an interesting idea to have a fourth option for digital certificate
> authentication with RACF, which would be like choice #1 but without
> telling RACF what the short user ID is ahead of time -- to let RACF create
> one "on the fly," probably with caching and templating. For example, allow
> me to register a bunch of digital certificates in RACF as valid users, but
> I'm not going to tell you (RACF) what their short user IDs are ahead of
> time. The first time you encounter a particular certificate, just create a
> short user ID of C$-- (where the dashes are RACF's randomized or
> sequential choice, of any length -- randomized as default, but sequential
> as an option), store it, and use that on-the-fly short ID to build the
> ACEE. For example. I'd have to ponder that one a bit more, but if you
> think you've got a good use case, ask (RFE).
>
> Of course it'd be "nice" to have more than a maximum 8 character ID (with
> the current maximum of 39 different characters per position) internally in
> RACF, but I imagine that'd be a big plumbing problem and potentially break
> a lot of important stuff if not done carefully. Fortunately, you're not
> required to limit users' experiences to maximum 8 character user IDs: use
> LDAP CNs, use digital certificates, or use something else.
>
> By the way, if someone is looking for an interesting project, I'd be
> pretty neat to have a sample TSO/E signon screen that accepts a LDAP CN
> and passphrase that's then checked against the IBM Directory Server for
> z/OS for authentication (and thus also with the SAF security provider,
> 

Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

2020-05-04 Thread Frank Swarbrick
Interesting stuff.  I certainly won't claim to understand it all.
What I would love to see is some sort of "single signon" option, where a user 
would only need to sign on to their personal workstation and not need to 
explicitly sign on to z/OS at all.  It seems like (to me, anyway!) a user could 
use a TN3270 application to connect to the z/OS Communication Server and 
somehow a credential authentication could be done between the TN3270 client and 
the TN3270 server.  I think then CICS/TSO/etc. would need to query the "TN3270 
session" and bypass the associated signon screen(s) if the session has already 
been authenticated.  Or something like that.  Does this sound remotely in the 
realm of possibility?


From: IBM Mainframe Discussion List  on behalf of 
Timothy Sipples 
Sent: Monday, May 4, 2020 2:02 AM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

Bob Bridges wrote:
>So maybe - maybe, I don't know either - if I sign on to z/OS with a
>certificate, or LDAP, or anything other than the usual, the sign-on
routine
>MAKES UP an 8-byte ID and stores it in the ACEE. If so, after that
>everything works fine, I guess.

I don't think RACF itself works that way, or at least the z/OS 2.4
documentation doesn't suggest so. Take a look at this information, for
example:

https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.icha700/icha700_Certificate_mapping.htm

Let's suppose the user is authenticating with RACF (not with the IBM
Directory Server for z/OS, a.k.a. "LDAP"), and the user transmits an X.509
client digital certificate for that purpose. RACF has to know ahead of
time whether or not to authenticate that particular user (digital
certificate). So the digital certificate has to be known to RACF ahead of
time. Since the digital certificate has to be known, it's not unreasonable
to associate an up to 8 character "short" user ID with that certificate.
And that's how it works, as I understand it. The user doesn't present the
short user ID -- well, not really, I'll get to this in a moment -- but
RACF can check the certificate and create an ACEE with a mapped short user
ID.

There are three basic choices here as I understand it:

1. A one-to-one mapping (one certificate to short ID ABCD1234). The
documentation does a little bit of handwaving here along the lines of
"this might be difficult to administer," but I'd argue that's somewhat
dated advice now that so many organizations use identity management tools.

2. A many-to-one mapping (multiple certificates to ABCD1234).

3. Either mapping, but with the certificate itself holding an embedded
short name ("hostIdMapping"). Certificate issuers don't typically support
this extension, or at least they hide it well, but the z/OS PKI Services
do. (Is this technique "cheating"? Not really)

In all these cases the user need not be aware there's a short name that
RACF uses "under the covers." The user just supplies a valid, unexpired
client certificate -- from a PIN-protected smart card perhaps. From RACF's
perspective the X.509 digital certificate is really just another alias, a
verbose one.

z/OS LDAP also supports broadly similar RACF ID mapping (supply a long CN,
which the directory maps to a short name), but it's optional. You can
certainly authenticate with LDAP as a standalone matter if you wish.

It's an interesting idea to have a fourth option for digital certificate
authentication with RACF, which would be like choice #1 but without
telling RACF what the short user ID is ahead of time -- to let RACF create
one "on the fly," probably with caching and templating. For example, allow
me to register a bunch of digital certificates in RACF as valid users, but
I'm not going to tell you (RACF) what their short user IDs are ahead of
time. The first time you encounter a particular certificate, just create a
short user ID of C$-- (where the dashes are RACF's randomized or
sequential choice, of any length -- randomized as default, but sequential
as an option), store it, and use that on-the-fly short ID to build the
ACEE. For example. I'd have to ponder that one a bit more, but if you
think you've got a good use case, ask (RFE).

Of course it'd be "nice" to have more than a maximum 8 character ID (with
the current maximum of 39 different characters per position) internally in
RACF, but I imagine that'd be a big plumbing problem and potentially break
a lot of important stuff if not done carefully. Fortunately, you're not
required to limit users' experiences to maximum 8 character user IDs: use
LDAP CNs, use digital certificates, or use something else.

By the way, if someone is looking for an interesting project, I'd be
pretty neat to have a sample TSO/E signon screen that accepts a LDAP CN
and passphrase that's then checked against the IBM Directory Server for
z/OS for authentication (and thus also with the SAF security provider,
indirectly). This part of the z/OS 

Re: zOSHF / zFS

2020-05-04 Thread Allan Staller
The root, is not the same as the sysplex root. 

/* syplex root file system  - z/OS sysplex root */  
  <- /global/zosmf needs to be here
ROOT  FILESYSTEM('OMVS.')
  TYPE(ZFS) MODE(RDWR) AUTOMOVE
   
/* altroot sysplex root file system - alternate z/OS sysplex root 
*/ 
ALTROOT FILESYSTEM('OMVS.')  
  MOUNTPOINT('/sysalt')
   
/* system-specific file system  - z/OS USS -  directory */ 
MOUNT FILESYSTEM('OMVS.')  
  TYPE(ZFS) MODE(RDWR) UNMOUNT PARM('NORWSHARE')   
  MOUNTPOINT('/')  
   
/* z/OS USS operating system- z/OS USS binary $VERSION zFS  
   Image specific root FS */<---   /global /zosmf not 
here
MOUNT  FILESYSTEM('OMVS.OPSYS.')
  TYPE(ZFS) MODE(READ) UNMOUNT  PARM('NORWSHARE')  
  MOUNTPOINT('/$VERSION')  
   


-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Steve Beaver
Sent: Monday, May 4, 2020 1:56 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: zOSHF / zFS

[CAUTION: This Email is from outside the Organization. Unless you trust the 
sender, Don’t click links or open attachments as it may be a Phishing email, 
which can steal your Information and compromise your Computer.]

Allan

It is the first entry off the root

All the other zFS of interest are hung off of /REL240 meaning the JAVA's and 
the Liberty_zos

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Allan Staller
Sent: Monday, May 4, 2020 1:48 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: zOSHF / zFS

Is the mountpoint /global/zosmf hung off of the sysplex root?

In all cases, I would think any system would complain the ZFS is already 
mounted.
Check the mount mode for the zosmf zfs (s/b R/W)

SYSPLEX(YES) should make the zosmf zfs visible to all images provided the 
mountpoint is available.



-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Steve Beaver
Sent: Monday, May 4, 2020 1:40 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: zOSHF / zFS

[CAUTION: This Email is from outside the Organization. Unless you trust the 
sender, Don’t click links or open attachments as it may be a Phishing email, 
which can steal your Information and compromise your Computer.]

We have SYSPLEX(YES) and FORK(COW)

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Jousma, David
Sent: Monday, May 4, 2020 12:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: zOSHF / zFS

Steve,

I replied earlier to one of your other threads about this.  Unless you are 
running with Shared Sysplex Root, you cannot mount the same filesystem on
multiple systems for READ/WRITE.   You will know if you are or are not by
BPMPRMxx SYSPLEX (YES|NO) setting.There is quite a bit of pre-work and
planning required to turn on SYSPLEX Filesystem.

/* SYSPLEX ROOT DEFINTIONS */
/* */
VERSION('')
SYSPLEX(YES)


The alternative I gave you then is to manually UNMOUNT the filesystem from 
where ZOSMF was, and MOUNT It on the system you WANT to run ZOSMF on, and you 
should be fine.

_
Dave Jousma
AVP | Manager, Systems Engineering

Fifth Third Bank  |  1830 East Paris Ave, SE  |  MD RSCB2H  |  Grand Rapids, MI 
49546
616.653.8429  |  fax: 616.653.2717


-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Steve Beaver
Sent: Monday, May 4, 2020 1:22 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: zOSHF / zFS

**CAUTION EXTERNAL EMAIL**

**DO NOT open attachments or click on links from unknown senders or unexpected 
emails**

I have come up against and INTERESTING problem.  Ona zOS 2.4 system

On my MONOPLEX the zFS for zOSMF showed MOUTED in ISH and when I look at in 
SDSF FS it's all good zOSMF operates as it should.

In my 4-way SYSPLEX the JAVA's and the LIBERTY zFS are correct in ISH and in 
SDSF FS

Now the ZOSMF zFS shows it was properly mounted in ISH, however in SDSF FS, the 
zFS is not visible, and the IZUANG1 fails.

Any ideas

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the 

Re: Mainframe user ID length

2020-05-04 Thread Frank Swarbrick
MQ does, in fact, support that, and I've used it.  It's the "Channel 
Authentication" user mapping feature.
I was just wondering if it was "directly supported" without a mapping, if the 
presented user ID was more than 8 characters.
Thanks.


From: IBM Mainframe Discussion List  on behalf of 
Walt Farrell 
Sent: Sunday, May 3, 2020 7:22 AM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: Mainframe user ID length

On Thu, 30 Apr 2020 19:46:04 +, Frank Swarbrick 
 wrote:

>Is z/OS still limited in all cases to 8 upper case characters?  I am curious 
>if a user that only has access to MQ might be able to have a longer and
>ideally mixed case user ID.  They wouldn't have access to TSO or CICS or IMS.

It is in theory possible for an application (such as MQ) to use z/OS security 
services to map an alternative identity (which might have different 
characteristics from a z/OS user ID) into a standard z/OS user ID.

That can be done, for example, when applications support authentication via 
digital certificates, or via Kerberos (e.g., Windows Active Directory), or via 
LDAP. And there are additional mechanisms besides those three that z/OS 
supports.

I have no idea whether MQ supports any of those alternative mechanisms, nor 
which ones, nor whether they're applicable in your environment.

--
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Mainframe user ID length

2020-05-04 Thread Lennie Dymoke-Bradshaw
> As a side note, why won't JCL accept all legal e-mail address?

I thought there was an IBM stated aim to get to this, but I cannot find it. 

Certainly the recently added (Z/OS 1.3 I think) email field (WAEMAIL) in the 
RACF WORKATTR segment has a requirement to be unique within the RACF database. 
So there is a one-to-one mapping between email addresses and RACF userids. 
Looks like this is paving the way to achieving what you suggest.

Lennie Dymoke-Bradshaw | Security Lead | RSM Partners Ltd  
Web:  www.rsmpartners.com
'Dance like no one is watching. Encrypt like everyone is.'

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Seymour J Metz
Sent: 04 May 2020 17:05
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: [IBM-MAIN] Mainframe user ID length

Your claim was "You can specify pretty much anything you want in JCL."

Regardless of why it is coded that way, the code is in the C/I and the error 
message comes from the C/I. The fact remains that you are limited in what you 
can specify in JCL. My first thought was that you meant that JECL had looser 
limits, but I couldn't find thoses paraemters in either JES2 JECL or JES3 JECL.

As a side note, why won't JCL accept all legal e-mail address?


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of 
Timothy Sipples [sipp...@sg.ibm.com]
Sent: Monday, May 4, 2020 1:22 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Mainframe user ID length

Shmuel Metz wrote:
>According to MVS JCL Reference, SA23-1385-40, both USER=abcdefghi and 
>EMAIL=foo+...@patriot.net are illegal. That's not a JES issue.

It is JES's issue. JCL is simply respecting JES limits there using that 
particular syntax. If you want to pass a longer user ID to something else using 
a different vocabulary, JCL isn't going to stop you.

Example: Try using JCL to invoke z/OS's FTP client to transfer a file to an 
arbitrary FTP server, specifying a user ID longer than 8 characters.
Can it be done? Of course it can; it's perfectly routine. You just don't use 
JES-related syntax, that's all.

- - - - - - - - - -
Timothy Sipples
I.T. Architect Executive
Digital Asset & Other Industry Solutions IBM Z & LinuxONE
- - - - - - - - - -
E-Mail: sipp...@sg.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: zOSHF / zFS

2020-05-04 Thread Steve Beaver
Allan

It is the first entry off the root

All the other zFS of interest are hung off of /REL240 meaning the JAVA's and 
the Liberty_zos

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Allan Staller
Sent: Monday, May 4, 2020 1:48 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: zOSHF / zFS

Is the mountpoint /global/zosmf hung off of the sysplex root?

In all cases, I would think any system would complain the ZFS is already 
mounted.
Check the mount mode for the zosmf zfs (s/b R/W)

SYSPLEX(YES) should make the zosmf zfs visible to all images provided the 
mountpoint is available.



-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Steve Beaver
Sent: Monday, May 4, 2020 1:40 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: zOSHF / zFS

[CAUTION: This Email is from outside the Organization. Unless you trust the 
sender, Don’t click links or open attachments as it may be a Phishing email, 
which can steal your Information and compromise your Computer.]

We have SYSPLEX(YES) and FORK(COW)

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Jousma, David
Sent: Monday, May 4, 2020 12:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: zOSHF / zFS

Steve,

I replied earlier to one of your other threads about this.  Unless you are 
running with Shared Sysplex Root, you cannot mount the same filesystem on
multiple systems for READ/WRITE.   You will know if you are or are not by
BPMPRMxx SYSPLEX (YES|NO) setting.There is quite a bit of pre-work and
planning required to turn on SYSPLEX Filesystem.

/* SYSPLEX ROOT DEFINTIONS */
/* */
VERSION('')
SYSPLEX(YES)


The alternative I gave you then is to manually UNMOUNT the filesystem from 
where ZOSMF was, and MOUNT It on the system you WANT to run ZOSMF on, and you 
should be fine.

_
Dave Jousma
AVP | Manager, Systems Engineering

Fifth Third Bank  |  1830 East Paris Ave, SE  |  MD RSCB2H  |  Grand Rapids, MI 
49546
616.653.8429  |  fax: 616.653.2717


-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Steve Beaver
Sent: Monday, May 4, 2020 1:22 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: zOSHF / zFS

**CAUTION EXTERNAL EMAIL**

**DO NOT open attachments or click on links from unknown senders or unexpected 
emails**

I have come up against and INTERESTING problem.  Ona zOS 2.4 system

On my MONOPLEX the zFS for zOSMF showed MOUTED in ISH and when I look at in 
SDSF FS it's all good zOSMF operates as it should.

In my 4-way SYSPLEX the JAVA's and the LIBERTY zFS are correct in ISH and in 
SDSF FS

Now the ZOSMF zFS shows it was properly mounted in ISH, however in SDSF FS, the 
zFS is not visible, and the IZUANG1 fails.

Any ideas

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN **CAUTION EXTERNAL 
EMAIL**

**DO NOT open attachments or click on links from unknown senders or unexpected 
emails**


This e-mail transmission contains information that is confidential and may
be privileged.   It is intended only for the addressee(s) named above. If
you receive this e-mail in error, please do not read, copy or disseminate it in 
any manner. If you are not the intended recipient, any disclosure, copying, 
distribution or use of the contents of this information is prohibited. Please 
reply to the message immediately by informing the sender that the message was 
misdirected. After replying, please erase it from your computer system. Your 
assistance in correcting this error is appreciated.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
::DISCLAIMER::

The contents of this e-mail and any attachment(s) are confidential and intended 
for the named recipient(s) only. E-mail transmission is not guaranteed to be 
secure or error-free as information could be intercepted, corrupted, lost, 
destroyed, arrive late or incomplete, or may contain viruses in transmission. 
The e mail and its contents (with or without referred errors) shall therefore 
not attach any liability on the originator or HCL or its affiliates. Views or 
opinions, if any, presented in this email are solely those of the author and 
may not necessarily reflect the views or opinions of HCL or its affiliates. 

Re: zOSHF / zFS

2020-05-04 Thread Allan Staller
Is the mountpoint /global/zosmf hung off of the sysplex root?

In all cases, I would think any system would complain the ZFS is already 
mounted.
Check the mount mode for the zosmf zfs (s/b R/W)

SYSPLEX(YES) should make the zosmf zfs visible to all images provided the 
mountpoint is available.



-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Steve Beaver
Sent: Monday, May 4, 2020 1:40 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: zOSHF / zFS

[CAUTION: This Email is from outside the Organization. Unless you trust the 
sender, Don’t click links or open attachments as it may be a Phishing email, 
which can steal your Information and compromise your Computer.]

We have SYSPLEX(YES) and FORK(COW)

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Jousma, David
Sent: Monday, May 4, 2020 12:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: zOSHF / zFS

Steve,

I replied earlier to one of your other threads about this.  Unless you are 
running with Shared Sysplex Root, you cannot mount the same filesystem on
multiple systems for READ/WRITE.   You will know if you are or are not by
BPMPRMxx SYSPLEX (YES|NO) setting.There is quite a bit of pre-work and
planning required to turn on SYSPLEX Filesystem.

/* SYSPLEX ROOT DEFINTIONS */
/* */
VERSION('')
SYSPLEX(YES)


The alternative I gave you then is to manually UNMOUNT the filesystem from 
where ZOSMF was, and MOUNT It on the system you WANT to run ZOSMF on, and you 
should be fine.

_
Dave Jousma
AVP | Manager, Systems Engineering

Fifth Third Bank  |  1830 East Paris Ave, SE  |  MD RSCB2H  |  Grand Rapids, MI 
49546
616.653.8429  |  fax: 616.653.2717


-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Steve Beaver
Sent: Monday, May 4, 2020 1:22 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: zOSHF / zFS

**CAUTION EXTERNAL EMAIL**

**DO NOT open attachments or click on links from unknown senders or unexpected 
emails**

I have come up against and INTERESTING problem.  Ona zOS 2.4 system

On my MONOPLEX the zFS for zOSMF showed MOUTED in ISH and when I look at in 
SDSF FS it's all good zOSMF operates as it should.

In my 4-way SYSPLEX the JAVA's and the LIBERTY zFS are correct in ISH and in 
SDSF FS

Now the ZOSMF zFS shows it was properly mounted in ISH, however in SDSF FS, the 
zFS is not visible, and the IZUANG1 fails.

Any ideas

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN **CAUTION EXTERNAL 
EMAIL**

**DO NOT open attachments or click on links from unknown senders or unexpected 
emails**


This e-mail transmission contains information that is confidential and may
be privileged.   It is intended only for the addressee(s) named above. If
you receive this e-mail in error, please do not read, copy or disseminate it in 
any manner. If you are not the intended recipient, any disclosure, copying, 
distribution or use of the contents of this information is prohibited. Please 
reply to the message immediately by informing the sender that the message was 
misdirected. After replying, please erase it from your computer system. Your 
assistance in correcting this error is appreciated.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
::DISCLAIMER::

The contents of this e-mail and any attachment(s) are confidential and intended 
for the named recipient(s) only. E-mail transmission is not guaranteed to be 
secure or error-free as information could be intercepted, corrupted, lost, 
destroyed, arrive late or incomplete, or may contain viruses in transmission. 
The e mail and its contents (with or without referred errors) shall therefore 
not attach any liability on the originator or HCL or its affiliates. Views or 
opinions, if any, presented in this email are solely those of the author and 
may not necessarily reflect the views or opinions of HCL or its affiliates. Any 
form of reproduction, dissemination, copying, disclosure, modification, 
distribution and / or publication of this message without the prior written 
consent of authorized representative of HCL is strictly prohibited. If you have 
received this email in error please delete it and notify the sender 
immediately. Before opening any email and/or 

Re: Mainframe user ID length

2020-05-04 Thread Frank Swarbrick
Wow! That's a lot to digest.
A couple of things.  First, I see the following documented:

“On z/OS® and UNIX and Linux, the maximum length of a user ID is 12 
characters.”  From 
https://www.ibm.com/support/knowledgecenter/SSFKSJ_9.1.0/com.ibm.mq.sec.doc/q010300_.htm

I wonder how this works if RACF user IDs are only allowed up to 8 characters.  
Would an alternate SAF product be required?  I can't see anything documented to 
explain how this might work.


On a separate line, are you saying is it possible for z/OS to use a non-z/OS 
LDAP server for authentication (and authorization?), including user IDs and 
passwords?  But this would that still require TSO and CICS (and IMS? and 
others?) signon processes to be able to handle those user IDs?  It sounds like 
both of these things are true, but I want to make sure I am not 
misunderstanding you.


From: IBM Mainframe Discussion List  on behalf of 
Timothy Sipples 
Sent: Saturday, May 2, 2020 12:34 AM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: Mainframe user ID length

Frank Swarbrick wrote:
>"more than 8"?  What's the limit, if any?

The z/OS LDAP Server's CN limit is 256 characters, so it's at least that
large.

>Which system components/products permit/prohibit this?
>(Start your list with JCL.)

You can specify pretty much anything you want in JCL. Do you mean JES2? If
so, that'll use maximum 8 character user IDs.

Whatever list I come up with is necessarily going to be partial, but as
we've already seen (I linked to the documentation) MQ for z/OS can
authenticate users with the IBM Directory Server for z/OS at least in
certain contexts. CICS Transaction Server for z/OS also can in certain
contexts. See for example this documentation:

https://www.ibm.com/support/knowledgecenter/SSGMCP_5.5.0/security/java/dist_identity.html

Other z/OS components and products that come to mind include the z/OS
Container Extensions, WebSphere Application Server for z/OS, and the IBM
HTTP Server for z/OS. See for example here:

https://www.ibm.com/support/knowledgecenter/SSEQTJ_9.0.5/com.ibm.websphere.ihs.doc/ihs/tihs_apacheldapcfg.html

There are quite a large number of intersections, so many that we've now
reached the stage when one of them fell overboard. z/OS HCD had some LDAP
affinities (would you believe), but they were removed in z/OS 2.3.
Evidently that one was too "crazy." :-)

Bob Bridges wrote:
>I'm about to expose my ignorance here: IDS and LDAP, aren't they just
>IBM's attempt to let z/OS talk to non-z/OS systems?

No, not according to IBM. Right at the very beginning of the IBM (Tivoli)
Directory Server for z/OS redbook, Section 1.1, it says that this
component is for both z/OS and non-z/OS workloads. So take the hint: if
maximum 8 character user IDs are constraining, then start using the IBM
Directory Server for z/OS to authenticate users if you aren't already,
as/where it makes sense for you. Or use a certain something else to
authenticate (see below).

>Or put it this way: If you say I can be authenticated via LPAR using a
>longer ID, and then perform tasks on the mainframe using that ID, how
does
>RACF-or-whatever determine permissions?

First of all, you didn't include "RACF" in the text I reacted to. RACF is
a popular but optional z/OS component. z/OS is not equivalent to RACF.
Second, if you are talking about RACF specifically, yes, it does use
maximum 8 character user IDs But you're not required to authenticate
with them. I (somewhat facetiously) pointed out that you don't have to
authenticate at all, although (as I also pointed out) I'll urge you to at
least perform authorizations. More seriously, z/OS RACF has supported
client certificate authentication since the 1990s. (This feature was
initially introduced way back in the OS/390 days. The OS/390 TN3270E
Server picked up support for it with OS/390 2.9, backported to 2.8. IBM
Personal Communications picked up support for this feature in the late
1990s, too.) See here for an introductory reference:

https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.icha700/icha700_Enabling_client_login_using_certificates.htm

In this case users don't present maximum 8 character user IDs at all, or
not really. They present digital certificates, and those may be coming
from PIN-protected smart cards for example. Please do check this out! It's
a really nifty solution, and the world seems to be (re)discovering it
lately.

Another approach you can take is to authenticate with the IBM Directory
Server for z/OS (or other LDAP server, but that one is a terrific one) and
leverage a mapping to a "short name." This is the approach z/VSE takes
when you turn on its included LDAP authentication support, and it's both
simple and clever. You're certainly free to submit RFEs for IBM's
consideration if you'd like more such features, such as a TSO/E sign on
screen comparable to z/VSE's LDAP friendly sign on screen.

>...Even if I've logged on from some other OS using a longer 

Re: zOSHF / zFS

2020-05-04 Thread Steve Beaver
We have SYSPLEX(YES) and FORK(COW)

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Jousma, David
Sent: Monday, May 4, 2020 12:30 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: zOSHF / zFS

Steve,

I replied earlier to one of your other threads about this.  Unless you are
running with Shared Sysplex Root, you cannot mount the same filesystem on
multiple systems for READ/WRITE.   You will know if you are or are not by
BPMPRMxx SYSPLEX (YES|NO) setting.There is quite a bit of pre-work and
planning required to turn on SYSPLEX Filesystem.   

/* SYSPLEX ROOT DEFINTIONS */  
/* */  
VERSION('') 
SYSPLEX(YES)   


The alternative I gave you then is to manually UNMOUNT the filesystem from
where ZOSMF was, and MOUNT It on the system you WANT to run ZOSMF on, and
you should be fine.

_
Dave Jousma
AVP | Manager, Systems Engineering  

Fifth Third Bank  |  1830 East Paris Ave, SE  |  MD RSCB2H  |  Grand Rapids,
MI 49546
616.653.8429  |  fax: 616.653.2717


-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of
Steve Beaver
Sent: Monday, May 4, 2020 1:22 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: zOSHF / zFS

**CAUTION EXTERNAL EMAIL**

**DO NOT open attachments or click on links from unknown senders or
unexpected emails**

I have come up against and INTERESTING problem.  Ona zOS 2.4 system

On my MONOPLEX the zFS for zOSMF showed MOUTED in ISH and when I look at in
SDSF FS it's all good zOSMF operates as it should.

In my 4-way SYSPLEX the JAVA's and the LIBERTY zFS are correct in ISH and in
SDSF FS

Now the ZOSMF zFS shows it was properly mounted in ISH, however in SDSF FS,
the zFS is not visible, and the IZUANG1 fails.

Any ideas

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN **CAUTION
EXTERNAL EMAIL**

**DO NOT open attachments or click on links from unknown senders or
unexpected emails**


This e-mail transmission contains information that is confidential and may
be privileged.   It is intended only for the addressee(s) named above. If
you receive this e-mail in error, please do not read, copy or disseminate it
in any manner. If you are not the intended recipient, any disclosure,
copying, distribution or use of the contents of this information is
prohibited. Please reply to the message immediately by informing the sender
that the message was misdirected. After replying, please erase it from your
computer system. Your assistance in correcting this error is appreciated.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: zOSHF / zFS

2020-05-04 Thread Bulent Dülger
Do you see all the zOSMF zfs file systems when you issue the /D Omvs,f command 
in the LPAR IZUANG1 fails. And what kind of messages do you see in the IZUANG1 
joblog referencing failure?

Saygılarımla / Best Regards.

Bülent Dülger
Principal Mainframe IT Consultant and CoFounder

ServiZ Information Technologies Inc.
E-mail  : bul...@serviz.com.tr


> On 4 May 2020, at 20:22, Steve Beaver  wrote:
> 
> I have come up against and INTERESTING problem.  Ona zOS 2.4 system
> 
> On my MONOPLEX the zFS for zOSMF showed MOUTED in ISH and when I look at in
> SDSF FS it's all good zOSMF operates as it should.
> 
> In my 4-way SYSPLEX the JAVA's and the LIBERTY zFS are correct in ISH and in
> SDSF FS
> 
> Now the ZOSMF zFS shows it was properly mounted in ISH, however in SDSF FS,
> the zFS is not visible, and the IZUANG1 fails.
> 
> Any ideas
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: zOSHF / zFS

2020-05-04 Thread Jousma, David
Steve,

I replied earlier to one of your other threads about this.  Unless you are 
running with Shared Sysplex Root, you cannot mount the same filesystem on 
multiple systems for READ/WRITE.   You will know if you are or are not by 
BPMPRMxx SYSPLEX (YES|NO) setting.There is quite a bit of pre-work and 
planning required to turn on SYSPLEX Filesystem.   

/* SYSPLEX ROOT DEFINTIONS */  
/* */  
VERSION('') 
SYSPLEX(YES)   


The alternative I gave you then is to manually UNMOUNT the filesystem from 
where ZOSMF was, and MOUNT It on the system you WANT to run ZOSMF on, and you 
should be fine.
_
Dave Jousma
AVP | Manager, Systems Engineering  

Fifth Third Bank  |  1830 East Paris Ave, SE  |  MD RSCB2H  |  Grand Rapids, MI 
49546
616.653.8429  |  fax: 616.653.2717


-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Steve Beaver
Sent: Monday, May 4, 2020 1:22 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: zOSHF / zFS

**CAUTION EXTERNAL EMAIL**

**DO NOT open attachments or click on links from unknown senders or unexpected 
emails**

I have come up against and INTERESTING problem.  Ona zOS 2.4 system

On my MONOPLEX the zFS for zOSMF showed MOUTED in ISH and when I look at in 
SDSF FS it's all good zOSMF operates as it should.

In my 4-way SYSPLEX the JAVA's and the LIBERTY zFS are correct in ISH and in 
SDSF FS

Now the ZOSMF zFS shows it was properly mounted in ISH, however in SDSF FS, the 
zFS is not visible, and the IZUANG1 fails.

Any ideas

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN **CAUTION EXTERNAL 
EMAIL**

**DO NOT open attachments or click on links from unknown senders or unexpected 
emails**


This e-mail transmission contains information that is confidential and may be 
privileged.   It is intended only for the addressee(s) named above. If you 
receive this e-mail in error, please do not read, copy or disseminate it in any 
manner. If you are not the intended recipient, any disclosure, copying, 
distribution or use of the contents of this information is prohibited. Please 
reply to the message immediately by informing the sender that the message was 
misdirected. After replying, please erase it from your computer system. Your 
assistance in correcting this error is appreciated.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


zOSHF / zFS

2020-05-04 Thread Steve Beaver
I have come up against and INTERESTING problem.  Ona zOS 2.4 system

On my MONOPLEX the zFS for zOSMF showed MOUTED in ISH and when I look at in
SDSF FS it's all good zOSMF operates as it should.

In my 4-way SYSPLEX the JAVA's and the LIBERTY zFS are correct in ISH and in
SDSF FS

Now the ZOSMF zFS shows it was properly mounted in ISH, however in SDSF FS,
the zFS is not visible, and the IZUANG1 fails.

Any ideas

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Mainframe user ID length

2020-05-04 Thread Seymour J Metz
Your claim was "You can specify pretty much anything you want in JCL."

Regardless of why it is coded that way, the code is in the C/I and the error 
message comes from the C/I. The fact remains that you are limited in what you 
can specify in JCL. My first thought was that you meant that JECL had looser 
limits, but I couldn't find thoses paraemters in either JES2 JECL or JES3 JECL.

As a side note, why won't JCL accept all legal e-mail address?


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of 
Timothy Sipples [sipp...@sg.ibm.com]
Sent: Monday, May 4, 2020 1:22 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Mainframe user ID length

Shmuel Metz wrote:
>According to MVS JCL Reference, SA23-1385-40, both
>USER=abcdefghi and EMAIL=foo+...@patriot.net are
>illegal. That's not a JES issue.

It is JES's issue. JCL is simply respecting JES limits there using that
particular syntax. If you want to pass a longer user ID to something else
using a different vocabulary, JCL isn't going to stop you.

Example: Try using JCL to invoke z/OS's FTP client to transfer a file to
an arbitrary FTP server, specifying a user ID longer than 8 characters.
Can it be done? Of course it can; it's perfectly routine. You just don't
use JES-related syntax, that's all.

- - - - - - - - - -
Timothy Sipples
I.T. Architect Executive
Digital Asset & Other Industry Solutions
IBM Z & LinuxONE
- - - - - - - - - -
E-Mail: sipp...@sg.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Z/VM LPAR

2020-05-04 Thread Mike Schwab
Never.  Dynamic LPAR addition and deletion.

On Mon, May 4, 2020 at 12:09 PM Nai, Dean  wrote:
>
> Anyone know if we need a POR to activate a new Z/VM LPAR
>
>
> Dean Nai
>
>
>
>
> >
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN



-- 
Mike A Schwab, Springfield IL USA
Where do Forest Rangers go to get away from it all?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

2020-05-04 Thread Seymour J Metz
Keep in mind that it would be the short userid that would be used to complete 
unqualified data set names, except when the prefix is used.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of 
Timothy Sipples [sipp...@sg.ibm.com]
Sent: Monday, May 4, 2020 4:02 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

Bob Bridges wrote:
>So maybe - maybe, I don't know either - if I sign on to z/OS with a
>certificate, or LDAP, or anything other than the usual, the sign-on
routine
>MAKES UP an 8-byte ID and stores it in the ACEE. If so, after that
>everything works fine, I guess.

I don't think RACF itself works that way, or at least the z/OS 2.4
documentation doesn't suggest so. Take a look at this information, for
example:

https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.icha700/icha700_Certificate_mapping.htm

Let's suppose the user is authenticating with RACF (not with the IBM
Directory Server for z/OS, a.k.a. "LDAP"), and the user transmits an X.509
client digital certificate for that purpose. RACF has to know ahead of
time whether or not to authenticate that particular user (digital
certificate). So the digital certificate has to be known to RACF ahead of
time. Since the digital certificate has to be known, it's not unreasonable
to associate an up to 8 character "short" user ID with that certificate.
And that's how it works, as I understand it. The user doesn't present the
short user ID -- well, not really, I'll get to this in a moment -- but
RACF can check the certificate and create an ACEE with a mapped short user
ID.

There are three basic choices here as I understand it:

1. A one-to-one mapping (one certificate to short ID ABCD1234). The
documentation does a little bit of handwaving here along the lines of
"this might be difficult to administer," but I'd argue that's somewhat
dated advice now that so many organizations use identity management tools.

2. A many-to-one mapping (multiple certificates to ABCD1234).

3. Either mapping, but with the certificate itself holding an embedded
short name ("hostIdMapping"). Certificate issuers don't typically support
this extension, or at least they hide it well, but the z/OS PKI Services
do. (Is this technique "cheating"? Not really)

In all these cases the user need not be aware there's a short name that
RACF uses "under the covers." The user just supplies a valid, unexpired
client certificate -- from a PIN-protected smart card perhaps. From RACF's
perspective the X.509 digital certificate is really just another alias, a
verbose one.

z/OS LDAP also supports broadly similar RACF ID mapping (supply a long CN,
which the directory maps to a short name), but it's optional. You can
certainly authenticate with LDAP as a standalone matter if you wish.

It's an interesting idea to have a fourth option for digital certificate
authentication with RACF, which would be like choice #1 but without
telling RACF what the short user ID is ahead of time -- to let RACF create
one "on the fly," probably with caching and templating. For example, allow
me to register a bunch of digital certificates in RACF as valid users, but
I'm not going to tell you (RACF) what their short user IDs are ahead of
time. The first time you encounter a particular certificate, just create a
short user ID of C$-- (where the dashes are RACF's randomized or
sequential choice, of any length -- randomized as default, but sequential
as an option), store it, and use that on-the-fly short ID to build the
ACEE. For example. I'd have to ponder that one a bit more, but if you
think you've got a good use case, ask (RFE).

Of course it'd be "nice" to have more than a maximum 8 character ID (with
the current maximum of 39 different characters per position) internally in
RACF, but I imagine that'd be a big plumbing problem and potentially break
a lot of important stuff if not done carefully. Fortunately, you're not
required to limit users' experiences to maximum 8 character user IDs: use
LDAP CNs, use digital certificates, or use something else.

By the way, if someone is looking for an interesting project, I'd be
pretty neat to have a sample TSO/E signon screen that accepts a LDAP CN
and passphrase that's then checked against the IBM Directory Server for
z/OS for authentication (and thus also with the SAF security provider,
indirectly). This part of the z/OS documentation starts to explain how to
do that:

https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.ikjb400/logpan.htm

- - - - - - - - - -
Timothy Sipples
I.T. Architect Executive
Digital Asset & Other Industry Solutions
IBM Z & LinuxONE
- - - - - - - - - -
E-Mail: sipp...@sg.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to 

Re: z/OS performance question

2020-05-04 Thread Edgington, Jerry
Thanks, everyone.  We are running z/OS v2.1, just upgraded from z/OS v1.12.  
Over the weekend, I add a second structure to the CLASSDEF SML.  Hopefully, 
that will help with the issues.


Thanks again,

Jerry



From: IBM Mainframe Discussion List  on behalf of 
Michael Babcock 
Sent: Sunday, May 3, 2020 12:43 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: z/OS performance question

This message was sent from an external source outside of Western & Southern's 
network. Do not click links or open attachments unless you recognize the sender 
and know the contents are safe.


If you are on z/OS 2.4 you don’t need to tune the classes.  Just turn on
auto tuning.

On Fri, May 1, 2020 at 1:44 PM Edgington, Jerry <
jerry.edging...@westernsouthernlife.com> wrote:

> Thanks Allen, that is good place to start.  The CPU% for the ISGLOCK,
> IXCSTR1 and IXCSTR2 are 58%, 74% and 21%, which seem very high to me. But,
> the IXCSTR3 and IXCSTR4 are very low.  It would seem I might have an
> imbalance with the XCF messages and size. Async rate for IXCSTR1 is 120
>
> I am wondering if I need to adjust my CLASSDEF CLASSLEN size for each of
> the structures.  We are running ICFs on GP, with one virtual connection to
> each ICFA/B.  Not ideal, but all I could do at the moment.
>
>
> /* TRANSPORT CLASSES. */
> CLASSDEF CLASS(SML) CLASSLEN(956) GROUP(UNDESIG)
> CLASSDEF CLASS(MED) CLASSLEN(8000)
> CLASSDEF CLASS(DEFAULT) CLASSLEN(16316)
> CLASSDEF CLASS(BIG) CLASSLEN(32000)
>
> /* XCF STRUCTURES   */
> PATHOUT STRNAME(IXCSTR1) CLASS(SML)
> PATHOUT STRNAME(IXCSTR2) CLASS(MED)
> PATHOUT STRNAME(IXCSTR3) CLASS(BIG)
> PATHOUT STRNAME(IXCSTR4) CLASS(DEFAULT)
> /*  */
> PATHIN  STRNAME(IXCSTR1,IXCSTR2,IXCSTR3,IXCSTR4)
>
> Also, we have:
> FUNCTIONS ENABLE(DUPLEXCF16, SYSSTATDETECT, CRITICALPAGING)
>
> Thanks Jerry
>
>
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf
> Of Allan Staller
> Sent: Friday, May 1, 2020 2:32 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: z/OS performance question
>
> This message was sent from an external source outside of Western &
> Southern's network. Do not click links or open attachments unless you
> recognize the sender and know the contents are safe.
>
> 
>
> The only tuning I a aware of for XCF is to provide appropriate transport
> classes for  the messages being passed. If inappropriate, this will usually
> show up as CPU concumption in the XCFAS address space. Look at the CPU
> consumed, not the delay.
>
> It is possible that this is contributing to the CICS delays. GRS will use
> XCF if available.
>
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf
> Of Edgington, Jerry
> Sent: Friday, May 1, 2020 12:30 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: z/OS performance question
>
> [CAUTION: This Email is from outside the Organization. Unless you trust
> the sender, Don’t click links or open attachments as it may be a Phishing
> email, which can steal your Information and compromise your Computer.]
>
> To anyone,
>
> I am not a performance person at all, but can someone help me with
> pointing me in the right direction.  We are running a small SYSplex, but we
> are getting delays on one LPAR, PROC-XCFAS
>
> *SYSTEMPROC-XCFAS  3.7 users
> ALL STCPROC-XCFAS  3.2 users
> IMS   PROC-XCFAS 26.0 % delay
> RMFPROC-XCFAS 18.0 % delay
> RMFGAT PROC-XCFAS 21.0 % delay
> IMSCTL PROC-XCFAS 25.0 % delay
> TN3270 PROC-XCFAS 28.0 % delay
> VTAM   PROC-XCFAS 19.0 % delay
>
> Also, we are ACF2 shop and our production CICS regions are getting delays:
>
> ENQ -ACFVSAM   38.0 % delay LOGONIDS
> ENQ -ACF2ACB  100.0 % delay LOGONIDS
>
> So any help would be great.
> Thanks,
> Jerry Edgington
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email
> to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> ::DISCLAIMER::
> 
> The contents of this e-mail and any attachment(s) are confidential and
> intended for the named recipient(s) only. E-mail transmission is not
> guaranteed to be secure or error-free as information could be intercepted,
> corrupted, lost, destroyed, arrive late or incomplete, or may contain
> viruses in transmission. The e mail and its contents (with or without
> referred errors) shall therefore not attach any liability on the originator
> or HCL or its affiliates. Views or opinions, if any, presented in this
> email are solely those of the author and may not necessarily reflect the
> views or opinions of HCL or its affiliates. Any form of 

Z/VM LPAR

2020-05-04 Thread Nai, Dean
Anyone know if we need a POR to activate a new Z/VM LPAR


Dean Nai




>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: S0F9 and SOFD ABENDs and SVC dumps - oh my!

2020-05-04 Thread Martin Packer
This is the whole "bound to another address space" issue. Does it matter 
what sequence you take the address spaces down in? And I wonder if the 
same applies to Db2 and MQ. (I would guess not as the binding/attachment 
must be different.)

Cheers, Martin

Martin Packer

zChampion, Systems Investigator & Performance Troubleshooter, IBM

+44-7802-245-584

email: martin_pac...@uk.ibm.com

Twitter / Facebook IDs: MartinPacker

Blog: 
https://www.ibm.com/developerworks/mydeveloperworks/blogs/MartinPacker

Podcast Series (With Marna Walle): https://developer.ibm.com/tv/mpt/or 
  
https://itunes.apple.com/gb/podcast/mainframe-performance-topics/id1127943573?mt=2


Youtube channel: https://www.youtube.com/channel/UCu_65HaYgksbF6Q8SQ4oOvA



From:   Barbara Nitz 
To: IBM-MAIN@LISTSERV.UA.EDU
Date:   04/05/2020 09:23
Subject:[EXTERNAL] Re: S0F9 and SOFD ABENDs and SVC dumps - oh my!
Sent by:IBM Mainframe Discussion List 



On Thu, 30 Apr 2020 09:09:32 -0400, Peter Relson  
wrote:

>
>z/OS FORCE did not work
>
>
>Wanna bet?
>
>FORCE,ARM runs in the address space so would have been affected.
>FORCE does not.

Doesn't matter. With an IMS region, you cannot use cancel (z/OS: 
"non-cancelable, use force arm"). You cannot use force arm (z/OS: "cancel 
first, please"). And you cannot use force because IMS intercepts that and 
tells you to terminate the IMS region by de-registering it from IMS. Which 
doesn't work because it is already *unknown* (i.e. deregistered) in the 
control region, but the de-registering hasn't made it down the tcbs in 
that IMS message region. Sometimes the callrtm program worked after the 
5th invocation, but sometimes it didn't work even after 10 invocations. 
(With the dumps to verify it didn't work in between invocations.)

IMS message regions are BAD, IMHO.

Regards, Barbara

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




Unless stated otherwise above:
IBM United Kingdom Limited - Registered in England and Wales with number 
741598. 
Registered office: PO Box 41, North Harbour, Portsmouth, Hampshire PO6 3AU


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

2020-05-04 Thread Wayne Bickerdike
Not CESL.

On Mon, May 4, 2020 at 6:40 PM Wayne Bickerdike  wrote:

> There are more CICS users than TSO users. Is there a howto for the CICS
> signon screen to accept long IDs and Passphrases?
>
> On Mon, May 4, 2020 at 6:03 PM Timothy Sipples  wrote:
>
>> Bob Bridges wrote:
>> >So maybe - maybe, I don't know either - if I sign on to z/OS with a
>> >certificate, or LDAP, or anything other than the usual, the sign-on
>> routine
>> >MAKES UP an 8-byte ID and stores it in the ACEE. If so, after that
>> >everything works fine, I guess.
>>
>> I don't think RACF itself works that way, or at least the z/OS 2.4
>> documentation doesn't suggest so. Take a look at this information, for
>> example:
>>
>>
>> https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.icha700/icha700_Certificate_mapping.htm
>>
>> Let's suppose the user is authenticating with RACF (not with the IBM
>> Directory Server for z/OS, a.k.a. "LDAP"), and the user transmits an
>> X.509
>> client digital certificate for that purpose. RACF has to know ahead of
>> time whether or not to authenticate that particular user (digital
>> certificate). So the digital certificate has to be known to RACF ahead of
>> time. Since the digital certificate has to be known, it's not
>> unreasonable
>> to associate an up to 8 character "short" user ID with that certificate.
>> And that's how it works, as I understand it. The user doesn't present the
>> short user ID -- well, not really, I'll get to this in a moment -- but
>> RACF can check the certificate and create an ACEE with a mapped short
>> user
>> ID.
>>
>> There are three basic choices here as I understand it:
>>
>> 1. A one-to-one mapping (one certificate to short ID ABCD1234). The
>> documentation does a little bit of handwaving here along the lines of
>> "this might be difficult to administer," but I'd argue that's somewhat
>> dated advice now that so many organizations use identity management tools.
>>
>> 2. A many-to-one mapping (multiple certificates to ABCD1234).
>>
>> 3. Either mapping, but with the certificate itself holding an embedded
>> short name ("hostIdMapping"). Certificate issuers don't typically support
>> this extension, or at least they hide it well, but the z/OS PKI Services
>> do. (Is this technique "cheating"? Not really)
>>
>> In all these cases the user need not be aware there's a short name that
>> RACF uses "under the covers." The user just supplies a valid, unexpired
>> client certificate -- from a PIN-protected smart card perhaps. From
>> RACF's
>> perspective the X.509 digital certificate is really just another alias, a
>> verbose one.
>>
>> z/OS LDAP also supports broadly similar RACF ID mapping (supply a long
>> CN,
>> which the directory maps to a short name), but it's optional. You can
>> certainly authenticate with LDAP as a standalone matter if you wish.
>>
>> It's an interesting idea to have a fourth option for digital certificate
>> authentication with RACF, which would be like choice #1 but without
>> telling RACF what the short user ID is ahead of time -- to let RACF
>> create
>> one "on the fly," probably with caching and templating. For example,
>> allow
>> me to register a bunch of digital certificates in RACF as valid users,
>> but
>> I'm not going to tell you (RACF) what their short user IDs are ahead of
>> time. The first time you encounter a particular certificate, just create
>> a
>> short user ID of C$-- (where the dashes are RACF's randomized or
>> sequential choice, of any length -- randomized as default, but sequential
>> as an option), store it, and use that on-the-fly short ID to build the
>> ACEE. For example. I'd have to ponder that one a bit more, but if you
>> think you've got a good use case, ask (RFE).
>>
>> Of course it'd be "nice" to have more than a maximum 8 character ID (with
>> the current maximum of 39 different characters per position) internally
>> in
>> RACF, but I imagine that'd be a big plumbing problem and potentially
>> break
>> a lot of important stuff if not done carefully. Fortunately, you're not
>> required to limit users' experiences to maximum 8 character user IDs: use
>> LDAP CNs, use digital certificates, or use something else.
>>
>> By the way, if someone is looking for an interesting project, I'd be
>> pretty neat to have a sample TSO/E signon screen that accepts a LDAP CN
>> and passphrase that's then checked against the IBM Directory Server for
>> z/OS for authentication (and thus also with the SAF security provider,
>> indirectly). This part of the z/OS documentation starts to explain how to
>> do that:
>>
>>
>> https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.ikjb400/logpan.htm
>>
>> - - - - - - - - - -
>> Timothy Sipples
>> I.T. Architect Executive
>> Digital Asset & Other Industry Solutions
>> IBM Z & LinuxONE
>> - - - - - - - - - -
>> E-Mail: sipp...@sg.ibm.com
>>
>> --
>> For IBM-MAIN subscribe / 

Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

2020-05-04 Thread Wayne Bickerdike
There are more CICS users than TSO users. Is there a howto for the CICS
signon screen to accept long IDs and Passphrases?

On Mon, May 4, 2020 at 6:03 PM Timothy Sipples  wrote:

> Bob Bridges wrote:
> >So maybe - maybe, I don't know either - if I sign on to z/OS with a
> >certificate, or LDAP, or anything other than the usual, the sign-on
> routine
> >MAKES UP an 8-byte ID and stores it in the ACEE. If so, after that
> >everything works fine, I guess.
>
> I don't think RACF itself works that way, or at least the z/OS 2.4
> documentation doesn't suggest so. Take a look at this information, for
> example:
>
>
> https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.icha700/icha700_Certificate_mapping.htm
>
> Let's suppose the user is authenticating with RACF (not with the IBM
> Directory Server for z/OS, a.k.a. "LDAP"), and the user transmits an X.509
> client digital certificate for that purpose. RACF has to know ahead of
> time whether or not to authenticate that particular user (digital
> certificate). So the digital certificate has to be known to RACF ahead of
> time. Since the digital certificate has to be known, it's not unreasonable
> to associate an up to 8 character "short" user ID with that certificate.
> And that's how it works, as I understand it. The user doesn't present the
> short user ID -- well, not really, I'll get to this in a moment -- but
> RACF can check the certificate and create an ACEE with a mapped short user
> ID.
>
> There are three basic choices here as I understand it:
>
> 1. A one-to-one mapping (one certificate to short ID ABCD1234). The
> documentation does a little bit of handwaving here along the lines of
> "this might be difficult to administer," but I'd argue that's somewhat
> dated advice now that so many organizations use identity management tools.
>
> 2. A many-to-one mapping (multiple certificates to ABCD1234).
>
> 3. Either mapping, but with the certificate itself holding an embedded
> short name ("hostIdMapping"). Certificate issuers don't typically support
> this extension, or at least they hide it well, but the z/OS PKI Services
> do. (Is this technique "cheating"? Not really)
>
> In all these cases the user need not be aware there's a short name that
> RACF uses "under the covers." The user just supplies a valid, unexpired
> client certificate -- from a PIN-protected smart card perhaps. From RACF's
> perspective the X.509 digital certificate is really just another alias, a
> verbose one.
>
> z/OS LDAP also supports broadly similar RACF ID mapping (supply a long CN,
> which the directory maps to a short name), but it's optional. You can
> certainly authenticate with LDAP as a standalone matter if you wish.
>
> It's an interesting idea to have a fourth option for digital certificate
> authentication with RACF, which would be like choice #1 but without
> telling RACF what the short user ID is ahead of time -- to let RACF create
> one "on the fly," probably with caching and templating. For example, allow
> me to register a bunch of digital certificates in RACF as valid users, but
> I'm not going to tell you (RACF) what their short user IDs are ahead of
> time. The first time you encounter a particular certificate, just create a
> short user ID of C$-- (where the dashes are RACF's randomized or
> sequential choice, of any length -- randomized as default, but sequential
> as an option), store it, and use that on-the-fly short ID to build the
> ACEE. For example. I'd have to ponder that one a bit more, but if you
> think you've got a good use case, ask (RFE).
>
> Of course it'd be "nice" to have more than a maximum 8 character ID (with
> the current maximum of 39 different characters per position) internally in
> RACF, but I imagine that'd be a big plumbing problem and potentially break
> a lot of important stuff if not done carefully. Fortunately, you're not
> required to limit users' experiences to maximum 8 character user IDs: use
> LDAP CNs, use digital certificates, or use something else.
>
> By the way, if someone is looking for an interesting project, I'd be
> pretty neat to have a sample TSO/E signon screen that accepts a LDAP CN
> and passphrase that's then checked against the IBM Directory Server for
> z/OS for authentication (and thus also with the SAF security provider,
> indirectly). This part of the z/OS documentation starts to explain how to
> do that:
>
>
> https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.ikjb400/logpan.htm
>
> - - - - - - - - - -
> Timothy Sipples
> I.T. Architect Executive
> Digital Asset & Other Industry Solutions
> IBM Z & LinuxONE
> - - - - - - - - - -
> E-Mail: sipp...@sg.ibm.com
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>


-- 
Wayne V. Bickerdike


Re: S0F9 and SOFD ABENDs and SVC dumps - oh my!

2020-05-04 Thread Barbara Nitz
On Thu, 30 Apr 2020 09:09:32 -0400, Peter Relson  wrote:

>
>z/OS FORCE did not work
>
>
>Wanna bet?
>
>FORCE,ARM runs in the address space so would have been affected.
>FORCE does not.

Doesn't matter. With an IMS region, you cannot use cancel (z/OS: 
"non-cancelable, use force arm"). You cannot use force arm (z/OS: "cancel 
first, please"). And you cannot use force because IMS intercepts that and tells 
you to terminate the IMS region by de-registering it from IMS. Which doesn't 
work because it is already *unknown* (i.e. deregistered) in the control region, 
but the de-registering hasn't made it down the tcbs in that IMS message region. 
Sometimes the callrtm program worked after the 5th invocation, but sometimes it 
didn't work even after 10 invocations.  (With the dumps to verify it didn't 
work in between invocations.)

IMS message regions are BAD, IMHO.

Regards, Barbara

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: IBM-MAIN Digest - 2 May 2020 to 3 May 2020 (#2020-125)

2020-05-04 Thread Timothy Sipples
Bob Bridges wrote:
>So maybe - maybe, I don't know either - if I sign on to z/OS with a
>certificate, or LDAP, or anything other than the usual, the sign-on 
routine
>MAKES UP an 8-byte ID and stores it in the ACEE. If so, after that
>everything works fine, I guess.

I don't think RACF itself works that way, or at least the z/OS 2.4 
documentation doesn't suggest so. Take a look at this information, for 
example:

https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.icha700/icha700_Certificate_mapping.htm

Let's suppose the user is authenticating with RACF (not with the IBM 
Directory Server for z/OS, a.k.a. "LDAP"), and the user transmits an X.509 
client digital certificate for that purpose. RACF has to know ahead of 
time whether or not to authenticate that particular user (digital 
certificate). So the digital certificate has to be known to RACF ahead of 
time. Since the digital certificate has to be known, it's not unreasonable 
to associate an up to 8 character "short" user ID with that certificate. 
And that's how it works, as I understand it. The user doesn't present the 
short user ID -- well, not really, I'll get to this in a moment -- but 
RACF can check the certificate and create an ACEE with a mapped short user 
ID.

There are three basic choices here as I understand it:

1. A one-to-one mapping (one certificate to short ID ABCD1234). The 
documentation does a little bit of handwaving here along the lines of 
"this might be difficult to administer," but I'd argue that's somewhat 
dated advice now that so many organizations use identity management tools.

2. A many-to-one mapping (multiple certificates to ABCD1234).

3. Either mapping, but with the certificate itself holding an embedded 
short name ("hostIdMapping"). Certificate issuers don't typically support 
this extension, or at least they hide it well, but the z/OS PKI Services 
do. (Is this technique "cheating"? Not really)

In all these cases the user need not be aware there's a short name that 
RACF uses "under the covers." The user just supplies a valid, unexpired 
client certificate -- from a PIN-protected smart card perhaps. From RACF's 
perspective the X.509 digital certificate is really just another alias, a 
verbose one.

z/OS LDAP also supports broadly similar RACF ID mapping (supply a long CN, 
which the directory maps to a short name), but it's optional. You can 
certainly authenticate with LDAP as a standalone matter if you wish.

It's an interesting idea to have a fourth option for digital certificate 
authentication with RACF, which would be like choice #1 but without 
telling RACF what the short user ID is ahead of time -- to let RACF create 
one "on the fly," probably with caching and templating. For example, allow 
me to register a bunch of digital certificates in RACF as valid users, but 
I'm not going to tell you (RACF) what their short user IDs are ahead of 
time. The first time you encounter a particular certificate, just create a 
short user ID of C$-- (where the dashes are RACF's randomized or 
sequential choice, of any length -- randomized as default, but sequential 
as an option), store it, and use that on-the-fly short ID to build the 
ACEE. For example. I'd have to ponder that one a bit more, but if you 
think you've got a good use case, ask (RFE).

Of course it'd be "nice" to have more than a maximum 8 character ID (with 
the current maximum of 39 different characters per position) internally in 
RACF, but I imagine that'd be a big plumbing problem and potentially break 
a lot of important stuff if not done carefully. Fortunately, you're not 
required to limit users' experiences to maximum 8 character user IDs: use 
LDAP CNs, use digital certificates, or use something else.

By the way, if someone is looking for an interesting project, I'd be 
pretty neat to have a sample TSO/E signon screen that accepts a LDAP CN 
and passphrase that's then checked against the IBM Directory Server for 
z/OS for authentication (and thus also with the SAF security provider, 
indirectly). This part of the z/OS documentation starts to explain how to 
do that:

https://www.ibm.com/support/knowledgecenter/SSLTBW_2.4.0/com.ibm.zos.v2r4.ikjb400/logpan.htm

- - - - - - - - - -
Timothy Sipples
I.T. Architect Executive
Digital Asset & Other Industry Solutions
IBM Z & LinuxONE
- - - - - - - - - -
E-Mail: sipp...@sg.ibm.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN