Re: ISPF Storage Protection

2014-03-06 Thread Thomas Berg
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU]
 On Behalf Of Tom Marchant
 Sent: Wednesday, March 05, 2014 8:23 PM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: ISPF Storage Protection
 
 On Wed, 5 Mar 2014 07:10:11 -0800, dpewen :
 
 I added two functions to the svc:
 1. to turn on the APF-auth bit in the job step TCB
 2. to turn off the APF-auth bit in the job step TCB
 
 This allows me to issue the MODESET svc successfully.
 
 Congratulations! You have made it easy for any program to do anything on
 every system that has your product.

Yes, I'm also very impressed by this development, an amazing program, could 
think of a myriad of uses! 
;)


Best Regards,
Thomas Berg
 
Thomas BergSpecialistzOS/RQM/AMSwedbank AB (Publ)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


ISPF Storage Protection

2014-03-05 Thread dpewen
Hello,

I started this thread and I appreciate all the input I received from this list.
I have solved the problem by adding code to my user svc that is part of the 
product.
I added two functions to the svc: 
1. to turn on the APF-auth bit in the job step TCB
2. to turn off the APF-auth bit in the job step TCB

This allows me to issue the MODESET svc successfully.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread Rob Scott
Do NOT do this !

This is a serious system integrity exposure. 

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of dpewen
Sent: 05 March 2014 15:10
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: ISPF Storage Protection

Hello,

I started this thread and I appreciate all the input I received from this list.
I have solved the problem by adding code to my user svc that is part of the 
product.
I added two functions to the svc:
1. to turn on the APF-auth bit in the job step TCB 2. to turn off the APF-auth 
bit in the job step TCB

This allows me to issue the MODESET svc successfully.


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread Binyamin Dissen
On Wed, 5 Mar 2014 07:10:11 -0800 dpewen dpe...@bellsouth.net wrote:

:Hello,
:
:I started this thread and I appreciate all the input I received from this 
list.
:I have solved the problem by adding code to my user svc that is part of the 
product.
:I added two functions to the svc: 
:1. to turn on the APF-auth bit in the job step TCB
:2. to turn off the APF-auth bit in the job step TCB

:This allows me to issue the MODESET svc successfully.

Why on earth would you want to break system security?

Encapsulate the function! The function is not to modeset, but to do something
that requires authorization. 

--
Binyamin Dissen bdis...@dissensoftware.com
http://www.dissensoftware.com

Director, Dissen Software, Bar  Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread John McKown
If this is part of a vendor product, and we were looking at said product,
and I learned that it did this, I would _strongly_ recommend against
acquiring the product. Having this around is like having small bottles of
fulminate of mercury scattered around in the kids' play room. It is most
likely going to explode and do a lot of damage.


On Wed, Mar 5, 2014 at 9:12 AM, Rob Scott rsc...@rocketsoftware.com wrote:

 Do NOT do this !

 This is a serious system integrity exposure.

 Rob Scott
 Lead Developer
 Rocket Software
 77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
 Tel: +1.781.684.2305
 Email: rsc...@rs.com
 Web: www.rocketsoftware.com


 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
 Behalf Of dpewen
 Sent: 05 March 2014 15:10
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: ISPF Storage Protection

 Hello,

 I started this thread and I appreciate all the input I received from this
 list.
 I have solved the problem by adding code to my user svc that is part of
 the product.
 I added two functions to the svc:
 1. to turn on the APF-auth bit in the job step TCB 2. to turn off the
 APF-auth bit in the job step TCB

 This allows me to issue the MODESET svc successfully.


 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send email
 to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




-- 
Wasn't there something about a PASCAL programmer knowing the value of
everything and the Wirth of nothing?

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread Rob Scott
Please use google and search the IBM-Main archives for JSCBAUTH for *many* 
discussions about why you should not be flipping it on and off.

Apart from the fact that it is difficult to secure any facility that elevates 
the authority of the caller, there is also the multi-tasking aspect to consider.

The JSCBAUTH flip technique is analogous to something like the following :

Someone is in the habit of leaving a unloaded gun on a table in a house with 
kids running around. 
No-one gets hurt as there is no ammunition in the house, so the kids happily 
pick up and play with the gun and put it back.
Someone decides that they want to use the gun for hunting, so they load up a 
bullet and prepare to leave the house but get distracted by a phone call. 
They put the gun back on the table while they take the call and tell themselves 
to remember to unload it.
Meanwhile some kid who has knocked back a fair amount of sugar, runs into the 
room, grabs the gun and starts play-shooting.
   

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of dpewen
Sent: 05 March 2014 15:10
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: ISPF Storage Protection

Hello,

I started this thread and I appreciate all the input I received from this list.
I have solved the problem by adding code to my user svc that is part of the 
product.
I added two functions to the svc:
1. to turn on the APF-auth bit in the job step TCB 2. to turn off the APF-auth 
bit in the job step TCB

This allows me to issue the MODESET svc successfully.


--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread Ed Jaffe

On 3/5/2014 7:10 AM, dpewen wrote:

Hello,

I started this thread and I appreciate all the input I received from this list.
I have solved the problem by adding code to my user svc that is part of the 
product.
I added two functions to the svc:
1. to turn on the APF-auth bit in the job step TCB
2. to turn off the APF-auth bit in the job step TCB


Turning on JSCBAUTH makes _every TCB in the job step_ authorized! This 
is an exposure!


There should be another way to achieve what you want. But, at the very 
least you must understand that any time you're going to modify a job 
step or address space-level setting, especially one that confers 
additional privileges to otherwise non-privileged TCBs, you MUST ensure 
that all such TCBs are marked non-dispatchable for the duration of the 
enhanced setting. This is what TSO/E does during execution of a program 
on the Authorized Leg of the TMP.


--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread Wayne Driscoll
Instead of adding function codes to the SVC to allow setting and resetting
of the JSCBAUTH bit, add function codes to the SVC to perform the code that
requires authorization.  As others have mentioned, this type
of magic SVC destroys any concept of system integrity.
==
Wayne Driscoll
OMEGAMON DB2 L3 Support/Development
wdrisco(at)us(dot)ibm(dot)com
All opinions are mine, and do not represent
IBM Corporation.
==

IBM Mainframe Discussion List IBM-MAIN@listserv.ua.edu wrote on
03/05/2014 09:10:11 AM:

 From: dpewen dpe...@bellsouth.net
 To: IBM-MAIN@listserv.ua.edu,
 Date: 03/05/2014 09:10 AM
 Subject: [IBM-MAIN] ISPF Storage Protection
 Sent by: IBM Mainframe Discussion List IBM-MAIN@listserv.ua.edu

 Hello,

 I started this thread and I appreciate all the input I received fromthis
list.
 I have solved the problem by adding code to my user svc that is part
 of the product.
 I added two functions to the svc:
 1. to turn on the APF-auth bit in the job step TCB
 2. to turn off the APF-auth bit in the job step TCB

 This allows me to issue the MODESET svc successfully.


 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread John Gilmore
Needing better illumination at his workstation, he built a device for
turning on all of the lights in his offfice building.

Apart from the security exposure, this use of the JSCBAUTH bit  is
ugly and inelegant, akin to setting a two-penny nail with a pile
driver that you happen to have at hand.

John Gilmore, Ashland, MA 01721 - USA

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread Paul Gilmartin
On Wed, 5 Mar 2014 15:32:03 +, Rob Scott wrote:

Please use google and search the IBM-Main archives for JSCBAUTH for *many* 
discussions about why you should not be flipping it on and off.

Apart from the fact that it is difficult to secure any facility that elevates 
the authority of the caller, there is also the multi-tasking aspect to 
consider.
 
In my view, simply, no facility should *ever* elevate the authority of its 
caller.

Discussions such as this reinforce my belief in the utter folly of allowing
privileged and unprivileged code to operate in the same address space.
It's complex; Byzantine, and disproportionately difficult to secure.

I think z/OS UNIX got it right.  (AFAIK.)

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread Shmuel Metz (Seymour J.)
In 1394032211.10894.yahoomail...@web181501.mail.ne1.yahoo.com, on
03/05/2014
   at 07:10 AM, dpewen dpe...@bellsouth.net said:

I started this thread and I appreciate all the input I received from
this list. I have solved the problem by adding code to my user svc
that is part of the product. I added two functions to the svc: 
1. to turn on the APF-auth bit in the job step TCB
2. to turn off the APF-auth bit in the job step TCB

This allows me to issue the MODESET svc successfully.

It also opens a gaping security breach. I recommend a safer approach.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread John Gilmore
The problem is not, or not only, that of elevating the authority of a 'caller'.

It is frequently necessary to depress authority, and it is therefore
necessary to elevate it too in order to restore the status quo ante.
Worse, it is possible to do things with SRBs that cross address-space
boundaries; and this facility too is necessary.

Paul's proposed solution, admirably motivated, is akin to capital
punishment for locksmiths in a jurisdiction where locks are
ubiquitous.

John Gilmore, Ashland, MA 01721 - USA

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread Rob Scott
 In my view, simply, no facility should *ever* elevate the authority of its 
 caller.

An admirable desire, however as pointed out earlier, there are circumstances 
where even standard IBM software has had to go down this route - eg TSO and 
AUTHTSF/PGM/CMD.

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Paul Gilmartin
Sent: 05 March 2014 16:10
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF Storage Protection

On Wed, 5 Mar 2014 15:32:03 +, Rob Scott wrote:

Please use google and search the IBM-Main archives for JSCBAUTH for *many* 
discussions about why you should not be flipping it on and off.

Apart from the fact that it is difficult to secure any facility that elevates 
the authority of the caller, there is also the multi-tasking aspect to 
consider.
 
In my view, simply, no facility should *ever* elevate the authority of its 
caller.

Discussions such as this reinforce my belief in the utter folly of allowing 
privileged and unprivileged code to operate in the same address space.
It's complex; Byzantine, and disproportionately difficult to secure.

I think z/OS UNIX got it right.  (AFAIK.)

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread Tom Marchant
On Wed, 5 Mar 2014 07:10:11 -0800, dpewen :

I added two functions to the svc:
1. to turn on the APF-auth bit in the job step TCB
2. to turn off the APF-auth bit in the job step TCB

This allows me to issue the MODESET svc successfully.

Congratulations! You have made it easy for any program to do anything on every 
system that has your product.

-- 
Tom Marchant

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF Storage Protection

2014-03-05 Thread Shmuel Metz (Seymour J.)
In
CAE1XxDHEY=r5tzjrpocmoggzsqtks7trlbs-tzqxf172znu...@mail.gmail.com,
on 03/05/2014
   at 11:41 AM, John Gilmore jwgli...@gmail.com said:

It is frequently necessary to depress authority, and it is therefore
necessary to elevate it too in order to restore the status quo ante.

Nonsense; there are mechanisms to temporarily reduce authority with
any tricks to reinstate the original authority. There is no excuse for
using mechanisms such as magic SVC's.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Ed Jaffe

On 3/3/2014 4:52 PM, dpewen wrote:

Yes ... SPKA requires SUP state


SPKA works in problem state if the PKM allows it.

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
http://www.phoenixsoftware.com/

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Rob Scott
Douglas

Do you have a server address space for your product?

If so, can I suggest that perhaps a re-design would be beneficial here to 
remove any requirement for the client caller to be running in non-problem state 
:

(1) Have your server setup a system-LX and ETDEF a space-switch PC routine 
(2) Your server creates a cell pool of request block elements in the required 
key (if you are using key-7 (Db2) then the easiest way is for your server to 
execute in key-7 using a definition in SCHEDxx)
(3) The client caller then has some sort of macro interface to the PC-ss
(4) The PC-ss routine gets a cell from the server key-7 private and populates 
it 
(5) The PC-ss routine adds the new request block to the server queue
(6) Another task in the server address space processes the queue and releases 
the request cell back when done

Notes : 

(o) MVCDK and MVCSK can be used to copy data to and from the server (running in 
Key7) to your client caller (running in whatever key)
(o) If you require a synchronous response, then the PC-ss could SUSPEND the 
caller and then the request processing task can then RESUME him when done with 
the request
(o) Task level resource managers are very useful to handle caller gone 
situations when sync response is required - (see RESMGR macro) 
(o) You may wish to SAF protect the logic in the PC-ss so that only authorized 
users can add to the queue.

Using the above technique, there is no requirement for the client to be running 
in a non-problem state.
  

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Douglas P Ewen
Sent: 03 March 2014 23:51
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: ISPF storage protection

Hello,

I have a product that uses ISPF panels to allow the user to specify control 
information for the product.
This control information is turned into a control block and then passed(XCTL) 
to a program that attempts to add the control block to a queue which resides in 
storage key=7.  Although I have APF authorized the program that tries to update 
the que, I cannot get into a key=7 using the MODESET SVC.  The MODESET SVC 
fails with system completion code=047.
Is there anyway to allow a program to successfully issue the MODESET SVC under 
ISPF?

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Micheal Butz
It's.all a  catch 22 as you need to authorized to create PC rtn's

Sent from my iPhone

 On Mar 4, 2014, at 3:32 AM, Ed Jaffe edja...@phoenixsoftware.com wrote:
 
 On 3/3/2014 4:52 PM, dpewen wrote:
 Yes ... SPKA requires SUP state
 
 SPKA works in problem state if the PKM allows it.
 
 -- 
 Edward E Jaffe
 Phoenix Software International, Inc
 831 Parkview Drive North
 El Segundo, CA 90245
 http://www.phoenixsoftware.com/
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Rob Scott
Obviously the *server* code that owns the PC routines must run in an authorized 
environment - however the important thing here is that the *client* code runs 
in problem state.

Using a PC-ss to add requests to a server ASID to perform the authorized 
function on behalf of the caller means that :

(1) No updates required to IKJTSOxx
(2) No MODESET  in client code
(3) Client code can run in non-authorized state in non-TSO environments
(4) System integrity exposures are reduced 



Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Micheal Butz
Sent: 04 March 2014 12:55
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF storage protection

It's.all a  catch 22 as you need to authorized to create PC rtn's

Sent from my iPhone

 On Mar 4, 2014, at 3:32 AM, Ed Jaffe edja...@phoenixsoftware.com wrote:
 
 On 3/3/2014 4:52 PM, dpewen wrote:
 Yes ... SPKA requires SUP state
 
 SPKA works in problem state if the PKM allows it.
 
 --
 Edward E Jaffe
 Phoenix Software International, Inc
 831 Parkview Drive North
 El Segundo, CA 90245
 http://www.phoenixsoftware.com/
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Shmuel Metz (Seymour J.)
In 9111247477380775.wa.dpewenbellsouth@listserv.ua.edu, on
03/03/2014
   at 05:51 PM, Douglas P Ewen dpe...@bellsouth.net said:

Although I have APF authorized the program that tries to update 
the que (sic)

How?

Is there anyway to allow a program to successfully issue the MODESET
SVC under ISPF?

Yes. Before doing that, have you considered setting up a PC interface
for adding elements to the queue?

ISPF is subject to the same rules as any other TSO application; in
order to run authorized code, it has to use the relevant TSO services.
The easiest way is to package the code in a TSO command that is
defined to TSO as authorised and to include an ISPMTCM macro for the
command with the appropriate FLAG, e.g., FLAG=X'22'..
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Shmuel Metz (Seymour J.)
In 9819019940159674.wa.paulgboulderaim@listserv.ua.edu, on
03/03/2014
   at 06:14 PM, Paul Gilmartin paulgboul...@aim.com said:

I have no idea why APF authorized library and link edit with AC=1
alone don't suffice.

Because it would be a major security breach.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Shmuel Metz (Seymour J.)
In 1393894348.42329.yahoomail...@web181502.mail.ne1.yahoo.com, on
03/03/2014
   at 04:52 PM, dpewen dpe...@bellsouth.net said:

Yes ... SPKA requires SUP state

Actually, it's only semiprivileged. In problem state it can set any
key enabled in the PSW-key mask. However, z/OS will not (I hope)
dispatch an unauthorized program with key 7 enabled in the mask.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Paul Gilmartin
On Tue, 4 Mar 2014 08:54:43 -0500, Shmuel Metz (Seymour J.) wrote:

In 9819019940159674.wa.paulgboulderaim@listserv.ua.edu, on
03/03/2014
   at 06:14 PM, Paul Gilmartin paulgboul...@aim.com said:

I have no idea why APF authorized library and link edit with AC=1
alone don't suffice.

Because it would be a major security breach.
 
That doesn't tell me much.

Why?  How?  Would it be any less a security breach to invoke such a program
from JCL with EXEC PGM=... which likewise causes it to run in the authorized
state?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Leonardo Vaz
True, I have never understood that either, gil.

It might more to do with executing the program in the appropriate TCB than a 
security exposure.

Leo
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Paul Gilmartin
Sent: Tuesday, March 04, 2014 10:25 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF storage protection

On Tue, 4 Mar 2014 08:54:43 -0500, Shmuel Metz (Seymour J.) wrote:

In 9819019940159674.wa.paulgboulderaim@listserv.ua.edu, on
03/03/2014
   at 06:14 PM, Paul Gilmartin paulgboul...@aim.com said:

I have no idea why APF authorized library and link edit with AC=1 
alone don't suffice.

Because it would be a major security breach.
 
That doesn't tell me much.

Why?  How?  Would it be any less a security breach to invoke such a program 
from JCL with EXEC PGM=... which likewise causes it to run in the authorized 
state?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread John McKown
It has to do with the fact that the APF code itself could become
corrupted (if loaded into key-8 storage) by some user code running under
a different TCB. Or that some key 8 storage area used by the APF code could
be corrupted by user code running on a different TCB. This corruption
could be either due to poor coding, or even a malicious attempt to get
non-APF code running in APF mode.

TSO has an interface, IKJEFTSR, which can run APF safely under TSO. But
it does this my using a separate TCB structure to run the APF code and
doing a STATUS STOP on all the other TCBs in the address space. Well, most
of them, anyway. However, things running via IKJEFTSR cannot do ISPF
functions for the very same reason. The ISPF code runs on a different TCB
and that TCB is in a more or less hard wait.

ref:
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/ikj4b780/23.1
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/ikj4b780/23.1.2




On Tue, Mar 4, 2014 at 9:51 AM, Leonardo Vaz leonardo@cn.ca wrote:

 True, I have never understood that either, gil.

 It might more to do with executing the program in the appropriate TCB than
 a security exposure.

 Leo
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
 Behalf Of Paul Gilmartin
 Sent: Tuesday, March 04, 2014 10:25 AM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: ISPF storage protection

 On Tue, 4 Mar 2014 08:54:43 -0500, Shmuel Metz (Seymour J.) wrote:

 In 9819019940159674.wa.paulgboulderaim@listserv.ua.edu, on
 03/03/2014
at 06:14 PM, Paul Gilmartin paulgboul...@aim.com said:
 
 I have no idea why APF authorized library and link edit with AC=1
 alone don't suffice.
 
 Because it would be a major security breach.
 
 That doesn't tell me much.

 Why?  How?  Would it be any less a security breach to invoke such a
 program from JCL with EXEC PGM=... which likewise causes it to run in the
 authorized state?

 -- gil

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send email
 to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




-- 
Wasn't there something about a PASCAL programmer knowing the value of
everything and the Wirth of nothing?

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Rob Scott
The difference is that TSO (and ISPF) runs in problem state and the jobstep is 
unauthorized.

In batch, when executing a program linked AC(1) that comes from a valid APF 
authorized library, then the entire jobstep is considered authorized.

TSO must jump through a few hoops to attempt to provide a safe way of invoking 
the authorized program - this involves having a parallel authorized jobstep TMP 
task and suspending all TCBs on the non-authorized leg while the authorized 
code is executing.

Hence the various tables in TSO (and ISPF) to define these special circumstance 
commands (or programs) that can run authorized.

Throw into the ring, the confusion that can occur with TSOLIB and ISPLLIB (and 
STEPLIB) - it can get messy to code applications and debug problems in this 
area - especially when your code is running on other people's systems.
  

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Leonardo Vaz
Sent: 04 March 2014 15:51
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF storage protection

True, I have never understood that either, gil.

It might more to do with executing the program in the appropriate TCB than a 
security exposure.

Leo
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Paul Gilmartin
Sent: Tuesday, March 04, 2014 10:25 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF storage protection

On Tue, 4 Mar 2014 08:54:43 -0500, Shmuel Metz (Seymour J.) wrote:

In 9819019940159674.wa.paulgboulderaim@listserv.ua.edu, on
03/03/2014
   at 06:14 PM, Paul Gilmartin paulgboul...@aim.com said:

I have no idea why APF authorized library and link edit with AC=1 
alone don't suffice.

Because it would be a major security breach.
 
That doesn't tell me much.

Why?  How?  Would it be any less a security breach to invoke such a program 
from JCL with EXEC PGM=... which likewise causes it to run in the authorized 
state?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Leonardo Vaz
Wow, this ended up way more interesting than I thought it would! Thanks for the 
info Rob and John!

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Rob Scott
Sent: Tuesday, March 04, 2014 11:18 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF storage protection

The difference is that TSO (and ISPF) runs in problem state and the jobstep is 
unauthorized.

In batch, when executing a program linked AC(1) that comes from a valid APF 
authorized library, then the entire jobstep is considered authorized.

TSO must jump through a few hoops to attempt to provide a safe way of invoking 
the authorized program - this involves having a parallel authorized jobstep TMP 
task and suspending all TCBs on the non-authorized leg while the authorized 
code is executing.

Hence the various tables in TSO (and ISPF) to define these special circumstance 
commands (or programs) that can run authorized.

Throw into the ring, the confusion that can occur with TSOLIB and ISPLLIB (and 
STEPLIB) - it can get messy to code applications and debug problems in this 
area - especially when your code is running on other people's systems.
  

Rob Scott
Lead Developer
Rocket Software
77 Fourth Avenue . Suite 100 . Waltham . MA 02451-1468 . USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Leonardo Vaz
Sent: 04 March 2014 15:51
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF storage protection

True, I have never understood that either, gil.

It might more to do with executing the program in the appropriate TCB than a 
security exposure.

Leo
-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Paul Gilmartin
Sent: Tuesday, March 04, 2014 10:25 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF storage protection

On Tue, 4 Mar 2014 08:54:43 -0500, Shmuel Metz (Seymour J.) wrote:

In 9819019940159674.wa.paulgboulderaim@listserv.ua.edu, on
03/03/2014
   at 06:14 PM, Paul Gilmartin paulgboul...@aim.com said:

I have no idea why APF authorized library and link edit with AC=1 
alone don't suffice.

Because it would be a major security breach.
 
That doesn't tell me much.

Why?  How?  Would it be any less a security breach to invoke such a program 
from JCL with EXEC PGM=... which likewise causes it to run in the authorized 
state?

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Andy Wood
On Tue, 4 Mar 2014 09:25:10 -0600, Paul Gilmartin paulgboul...@aim.com wrote:

. . .

Because it would be a major security breach.
 
That doesn't tell me much.

Why?  How?  Would it be any less a security breach to invoke such a program
from JCL with EXEC PGM=... which likewise causes it to run in the authorized
state?


Perhaps you could get away without AUTHPGM, but AUTHTSF is required. Actually 
when the TSO Service Facility was created, the designers did not see a need for 
this, and they made use of AUTHPGM, which together with AUTHCMD already existed 
at that time. Some time later they saw the error of their ways and an APAR 
added AUTHTSF.

For a long time the only place where the reason for this was explained was in 
the APAR that introduced it, and at some point even that was hidden from 
customers' view.

These days the reason is explained in the TSO/E documentation: 

... programs in this list (AUTHTSF) should not accept parameters that are 
pointers to code what is to be executed (such as exit routines) as this might 
introduce an integrity exposure.

Such parameters cannot be provided when executing the program using JCL. 

The documentation even goes on to mention that IDCAMS should never be added to 
AUTHTSF. IDCAMS was the specific program that prompted the APAR that introduced 
AUTHTSF, but any number of other programs could have the same issue.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread John Gilmore
About pointers to executable code Andy Wood  wrote:

| Such parameters cannot be provided
| when executing the program using JCL.

While this is of course literally true, it is not usefully so.

It is, for example, possible to to provide offsets (in the form of
unsigned external decimal-digit strings) that a knowledgeable routine
can convert into such pointers.  It is indeed possible to provide 8-
or 16-digit external hexadecimal-digit pointer representations (in a
PARM= string) that are immediately convertible into virtual-storage
addresses.

John Gilmore, Ashland, MA 01721 - USA

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Scott Ford
John,


I ran into issues with that doing Rexx from a Cobol STC, that we haven't 
converted to C yet.

I ended up calling a IRXJCL rexx stub that did a LINKMVS to some code..I 
cheated , I plead guilty ….lol








Regards,

Scott





From: John McKown
Sent: ‎Tuesday‎, ‎March‎ ‎4‎, ‎2014 ‎11‎:‎05‎ ‎AM
To: IBM Mainframe Discussion List





It has to do with the fact that the APF code itself could become
corrupted (if loaded into key-8 storage) by some user code running under
a different TCB. Or that some key 8 storage area used by the APF code could
be corrupted by user code running on a different TCB. This corruption
could be either due to poor coding, or even a malicious attempt to get
non-APF code running in APF mode.

TSO has an interface, IKJEFTSR, which can run APF safely under TSO. But
it does this my using a separate TCB structure to run the APF code and
doing a STATUS STOP on all the other TCBs in the address space. Well, most
of them, anyway. However, things running via IKJEFTSR cannot do ISPF
functions for the very same reason. The ISPF code runs on a different TCB
and that TCB is in a more or less hard wait.

ref:
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/ikj4b780/23.1
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/ikj4b780/23.1.2




On Tue, Mar 4, 2014 at 9:51 AM, Leonardo Vaz leonardo@cn.ca wrote:

 True, I have never understood that either, gil.

 It might more to do with executing the program in the appropriate TCB than
 a security exposure.

 Leo
 -Original Message-
 From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
 Behalf Of Paul Gilmartin
 Sent: Tuesday, March 04, 2014 10:25 AM
 To: IBM-MAIN@LISTSERV.UA.EDU
 Subject: Re: ISPF storage protection

 On Tue, 4 Mar 2014 08:54:43 -0500, Shmuel Metz (Seymour J.) wrote:

 In 9819019940159674.wa.paulgboulderaim@listserv.ua.edu, on
 03/03/2014
at 06:14 PM, Paul Gilmartin paulgboul...@aim.com said:
 
 I have no idea why APF authorized library and link edit with AC=1
 alone don't suffice.
 
 Because it would be a major security breach.
 
 That doesn't tell me much.

 Why?  How?  Would it be any less a security breach to invoke such a
 program from JCL with EXEC PGM=... which likewise causes it to run in the
 authorized state?

 -- gil

 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send email
 to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN




-- 
Wasn't there something about a PASCAL programmer knowing the value of
everything and the Wirth of nothing?

Maranatha! 
John McKown

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-04 Thread Shmuel Metz (Seymour J.)
In 769b2e18f7b2fa48b3adea85570a28769a560...@mtl-hq-x01.cn.ca, on
03/04/2014
   at 03:51 PM, Leonardo Vaz leonardo@cn.ca said:

Would it be any less a security breach to invoke such a
program from JCL with EXEC PGM=... which likewise causes it to run
in the authorized state?

Yes. What makes it a security breach is allowing an unauthorized
program to invoke it authorized in an uncontrolled manner. IBM has
written voluminously about this issue.
 
-- 
 Shmuel (Seymour J.) Metz, SysProg and JOAT
 ISO position; see http://patriot.net/~shmuel/resume/brief.html 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


ISPF storage protection

2014-03-03 Thread Douglas P Ewen
Hello,

I have a product that uses ISPF panels to allow the user to specify control 
information for the product.
This control information is turned into a control block and then passed(XCTL) 
to a program that attempts to add the control
block to a queue which resides in storage key=7.  Although I have APF 
authorized the program that tries to update the que, I cannot get into a key=7 
using the MODESET SVC.  The MODESET SVC fails with system completion code=047.
Is there anyway to allow a program to successfully issue the MODESET SVC under 
ISPF?

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread Micheal Butz
Is your program in a APF authorized library link edit with AC=1

You can also use the SPKA instruction if the The only thing you desire to do is 
change the PSW storage key


Sent from my iPhone

 On Mar 3, 2014, at 6:51 PM, Douglas P Ewen dpe...@bellsouth.net wrote:
 
 Hello,
 
 I have a product that uses ISPF panels to allow the user to specify control 
 information for the product.
 This control information is turned into a control block and then passed(XCTL) 
 to a program that attempts to add the control
 block to a queue which resides in storage key=7.  Although I have APF 
 authorized the program that tries to update the que, I cannot get into a 
 key=7 using the MODESET SVC.  The MODESET SVC fails with system completion 
 code=047.
 Is there anyway to allow a program to successfully issue the MODESET SVC 
 under ISPF?
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread Paul Gilmartin
On Mon, 3 Mar 2014 19:05:29 -0500, Micheal Butz wrote:

Is your program in a APF authorized library link edit with AC=1

You can also use the SPKA instruction if the The only thing you desire to do 
is change the PSW storage key
 
Additionally: see:


http://pic.dhe.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.ikjb400/usmi.htm

to run authorized under TSO, a program must be named in the AUTHPGM NAMES( ... )
section of SYS1.PARMLIB(IKJTSOxx).  ISPF may impose further constraints.

I have no idea why APF authorized library and link edit with AC=1 alone don't 
suffice.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread Micheal Butz
Paul

Now that you bought it up I think ISPF has a table ISPTCM where you specify 
authorized command it's in the ISPF customization guide

Sent from my iPhone

 On Mar 3, 2014, at 7:14 PM, Paul Gilmartin paulgboul...@aim.com wrote:
 
 On Mon, 3 Mar 2014 19:05:29 -0500, Micheal Butz wrote:
 
 Is your program in a APF authorized library link edit with AC=1
 
 You can also use the SPKA instruction if the The only thing you desire to do 
 is change the PSW storage key
 Additionally: see:
 

 http://pic.dhe.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.ikjb400/usmi.htm
 
 to run authorized under TSO, a program must be named in the AUTHPGM NAMES( 
 ... )
 section of SYS1.PARMLIB(IKJTSOxx).  ISPF may impose further constraints.
 
 I have no idea why APF authorized library and link edit with AC=1 alone don't 
 suffice.
 
 -- gil
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread Paul Gilmartin
On Mon, 3 Mar 2014 19:21:20 -0500, Micheal Butz wrote:

Now that you bought it up I think ISPF has a table ISPTCM where you specify 
authorized command it's in the ISPF customization guide

Hmmm.  Didn't know about that.  I see:


http://pic.dhe.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.f54pc00/isptcm.htm
 
...
ENTRY
Parameter values are as follows:
ENTNAME
A valid TSO command name. This operand is required for ENTRY calls. The 
alphabetic characters in ENTNAME must be in uppercase letters. Duplicate entry 
names cause an error message to be issued. 

Sounds like a command processor.  Command processors are subtly
different from ordinary programs, although I believe either is found
in the STEPLIB/TASKLIB/ISPLLIB concatenation.

 On Mar 3, 2014, at 7:14 PM, Paul Gilmartin wrote:
 On Mon, 3 Mar 2014 19:05:29 -0500, Micheal Butz wrote:

 Is your program in a APF authorized library link edit with AC=1

 You can also use the SPKA instruction if the The only thing you desire to 
 do is change the PSW storage key

OP was trying for KEY 7.  That may be harder.

 Additionally: see:


 http://pic.dhe.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.ikjb400/usmi.htm

 to run authorized under TSO, a program must be named in the AUTHPGM NAMES( 
 ... )
 section of SYS1.PARMLIB(IKJTSOxx).  ISPF may impose further constraints.

--gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread Micheal Butz
The X'20' bit has to be set ?

Sent from my iPhone

 On Mar 3, 2014, at 7:45 PM, Paul Gilmartin paulgboul...@aim.com wrote:
 
 On Mon, 3 Mar 2014 19:21:20 -0500, Micheal Butz wrote:
 
 Now that you bought it up I think ISPF has a table ISPTCM where you specify 
 authorized command it's in the ISPF customization guide
 Hmmm.  Didn't know about that.  I see:
 

 http://pic.dhe.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.f54pc00/isptcm.htm
  
...
 ENTRY
Parameter values are as follows:
ENTNAME
A valid TSO command name. This operand is required for ENTRY calls. 
 The alphabetic characters in ENTNAME must be in uppercase letters. Duplicate 
 entry names cause an error message to be issued. 
 
 Sounds like a command processor.  Command processors are subtly
 different from ordinary programs, although I believe either is found
 in the STEPLIB/TASKLIB/ISPLLIB concatenation.
 
 On Mar 3, 2014, at 7:14 PM, Paul Gilmartin wrote:
 On Mon, 3 Mar 2014 19:05:29 -0500, Micheal Butz wrote:
 
 Is your program in a APF authorized library link edit with AC=1
 
 You can also use the SPKA instruction if the The only thing you desire to 
 do is change the PSW storage key
 
 OP was trying for KEY 7.  That may be harder.
 
 Additionally: see:
 
   
 http://pic.dhe.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.ikjb400/usmi.htm
 
 to run authorized under TSO, a program must be named in the AUTHPGM NAMES( 
 ... )
 section of SYS1.PARMLIB(IKJTSOxx).  ISPF may impose further constraints.
 
 --gil
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread dpewen
Yes ... SPKA requires SUP state



 From: Micheal Butz michealb...@optonline.net
To: IBM-MAIN@LISTSERV.UA.EDU 
Sent: Monday, March 3, 2014 5:05 PM
Subject: Re: ISPF storage protection
 

Is your program in a APF authorized library link edit with AC=1

You can also use the SPKA instruction if the The only thing you desire to do is 
change the PSW storage key


Sent from my iPhone

 On Mar 3, 2014, at 6:51 PM, Douglas P Ewen dpe...@bellsouth.net wrote:
 
 Hello,
 
 I have a product that uses ISPF panels to allow the user to specify control 
 information for the product.
 This control information is turned into a control block and then passed(XCTL) 
 to a program that attempts to add the control
 block to a queue which resides in storage key=7.  Although I have APF 
 authorized the program that tries to update the que, I cannot get into a 
 key=7 using the MODESET SVC.  The MODESET SVC fails with system completion 
 code=047.
 Is there anyway to allow a program to successfully issue the MODESET SVC 
 under ISPF?
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread Walt Farrell
On Mon, 3 Mar 2014 18:14:00 -0600, Paul Gilmartin paulgboul...@aim.com wrote:

On Mon, 3 Mar 2014 19:05:29 -0500, Micheal Butz wrote:

Is your program in a APF authorized library link edit with AC=1

You can also use the SPKA instruction if the The only thing you desire to do 
is change the PSW storage key
 
Additionally: see:


 http://pic.dhe.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.ikjb400/usmi.htm

to run authorized under TSO, a program must be named in the AUTHPGM NAMES( ... 
)
section of SYS1.PARMLIB(IKJTSOxx).  ISPF may impose further constraints.

I have no idea why APF authorized library and link edit with AC=1 alone don't 
suffice.

In part because, depending on what the APF-authorized program does, it can be 
dangerous to allow it to run under TSO, or dangerous to allow it to run with 
certain forms of parameter list. 

And, I think, in part for performance. If a program is not in the table then 
the TMP does not need to figure out whether the program is in an APF-authorized 
library and linked AC(1), it can simply invoke it using ATTACH or LINK, without 
needing to setup the special protections needed for running APF-authorized 
programs under TSO.

And in part for function, since a program invoked in the method required for 
APF-authorized programs is in some ways limited in what it can do (it can't 
interact with ISPF, for example, without special coding in the program).

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread Micheal Butz
That is exactly right if you are running an ISPF program e.g. One that used DM 
services 
It's best to be in problem state while issuing the DM service 

Being in supervisor whine issuing DM services causes problems

Sent from my iPhone

 On Mar 3, 2014, at 8:06 PM, Walt Farrell walt.farr...@gmail.com wrote:
 
 On Mon, 3 Mar 2014 18:14:00 -0600, Paul Gilmartin paulgboul...@aim.com 
 wrote:
 
 On Mon, 3 Mar 2014 19:05:29 -0500, Micheal Butz wrote:
 
 Is your program in a APF authorized library link edit with AC=1
 
 You can also use the SPKA instruction if the The only thing you desire to 
 do is change the PSW storage key
 Additionally: see:
 
   
 http://pic.dhe.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.ikjb400/usmi.htm
 
 to run authorized under TSO, a program must be named in the AUTHPGM NAMES( 
 ... )
 section of SYS1.PARMLIB(IKJTSOxx).  ISPF may impose further constraints.
 
 I have no idea why APF authorized library and link edit with AC=1 alone 
 don't suffice.
 
 In part because, depending on what the APF-authorized program does, it can be 
 dangerous to allow it to run under TSO, or dangerous to allow it to run with 
 certain forms of parameter list. 
 
 And, I think, in part for performance. If a program is not in the table then 
 the TMP does not need to figure out whether the program is in an 
 APF-authorized library and linked AC(1), it can simply invoke it using ATTACH 
 or LINK, without needing to setup the special protections needed for running 
 APF-authorized programs under TSO.
 
 And in part for function, since a program invoked in the method required for 
 APF-authorized programs is in some ways limited in what it can do (it can't 
 interact with ISPF, for example, without special coding in the program).
 
 -- 
 Walt
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions,
 send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread Paul Gilmartin
On Mon, 3 Mar 2014 20:25:40 -0500, Micheal Butz wrote:

That is exactly right if you are running an ISPF program e.g. One that used DM 
services
It's best to be in problem state while issuing the DM service

Being in supervisor whine issuing DM services causes problems
 
I would hope that anyone who codes a program to issue DM services and
links it AC=1 into an authorized library would take suitable steps to ensure
system integrity.


 On Mar 3, 2014, at 8:06 PM, Walt Farrell wrote:
 ...
 I have no idea why APF authorized library and link edit with AC=1 alone 
 don't suffice.

 In part because, depending on what the APF-authorized program does, it can 
 be dangerous to allow it to run under TSO, or dangerous to allow it to run 
 with certain forms of parameter list.
 
Aha!  The difference between a JCL-style PARM and the CPPL.  But I see there's
an AUTHCMD section of IKJTSOxx to take care of that.  I see little need for 
AUTHPGM.
But ...

 And, I think, in part for performance. If a program is not in the table then 
 the TMP does not need to figure out whether the program is in an 
 APF-authorized library and linked AC(1), it can simply invoke it using 
 ATTACH or LINK, without needing to setup the special protections needed for 
 running APF-authorized programs under TSO.
 
Nearly pointless.  There are numerous ways to waste resources without APF 
authorization.

 And in part for function, since a program invoked in the method required for 
 APF-authorized programs is in some ways limited in what it can do (it can't 
 interact with ISPF, for example, without special coding in the program).
 
In which case, it simply fails.  Does this threaten system integrity?  See my 
first
remark above.  I can't imagine why someone would APF-authorize a program
which interacts with ISPF without such special coding.

-- gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread Mike La Martina
Homework posted.

Not due till Friday.

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Micheal Butz
Sent: Monday, March 03, 2014 4:21 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF storage protection

Paul

Now that you bought it up I think ISPF has a table ISPTCM where you specify
authorized command it's in the ISPF customization guide

Sent from my iPhone

 On Mar 3, 2014, at 7:14 PM, Paul Gilmartin paulgboul...@aim.com wrote:
 
 On Mon, 3 Mar 2014 19:05:29 -0500, Micheal Butz wrote:
 
 Is your program in a APF authorized library link edit with AC=1
 
 You can also use the SPKA instruction if the The only thing you 
 desire to do is change the PSW storage key
 Additionally: see:
 

 http://pic.dhe.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.ikjb
 400/usmi.htm
 
 to run authorized under TSO, a program must be named in the AUTHPGM 
 NAMES( ... ) section of SYS1.PARMLIB(IKJTSOxx).  ISPF may impose further
constraints.
 
 I have no idea why APF authorized library and link edit with AC=1 alone
don't suffice.
 
 -- gil
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: ISPF storage protection

2014-03-03 Thread Mike La Martina
Sorry off topic posts.

I do not know why this some  posts are going to IBM Main.

I am trying to reply to my students.

Mike

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Mike La Martina
Sent: Monday, March 03, 2014 5:56 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF storage protection

Homework posted.

Not due till Friday.

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Micheal Butz
Sent: Monday, March 03, 2014 4:21 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: ISPF storage protection

Paul

Now that you bought it up I think ISPF has a table ISPTCM where you specify
authorized command it's in the ISPF customization guide

Sent from my iPhone

 On Mar 3, 2014, at 7:14 PM, Paul Gilmartin paulgboul...@aim.com wrote:
 
 On Mon, 3 Mar 2014 19:05:29 -0500, Micheal Butz wrote:
 
 Is your program in a APF authorized library link edit with AC=1
 
 You can also use the SPKA instruction if the The only thing you 
 desire to do is change the PSW storage key
 Additionally: see:
 

 http://pic.dhe.ibm.com/infocenter/zos/v1r12/topic/com.ibm.zos.r12.ikjb
 400/usmi.htm
 
 to run authorized under TSO, a program must be named in the AUTHPGM 
 NAMES( ... ) section of SYS1.PARMLIB(IKJTSOxx).  ISPF may impose 
 further
constraints.
 
 I have no idea why APF authorized library and link edit with AC=1 
 alone
don't suffice.
 
 -- gil
 
 --
 For IBM-MAIN subscribe / signoff / archive access instructions, send 
 email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email
to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN