Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-11-02 Thread Eric Verwijs
Thanks for all the responses. I wasn't aware of any vulnerabilities, patched or 
otherwise. I don't handle our mainframe's security, another department does 
that.
Frightening.


   Regards, 
        Eric Verwijs 

Programmeur-analyste, RPC, SV et solutions de paiement - Direction générale de 
l'innovation, information et technologie
Emploi et Développement social Canada / Gouvernement du Canada
frederick.verw...@hrsdc-rhdcc.gc.ca 
Téléphone 819-654-0934 
Télécopieur 819-654-1009

Programmer Analyst, CPP, OAS, and Payment Solutions - Innovation, Information 
and Technology Branch
Employment and Social Development Canada / Government of Canada
frederick.verw...@hrsdc-rhdcc.gc.ca 
Telephone 819-654-0934 
Facsimile 819-654-1009

-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Ray Overby
Sent: November-01-18 2:35 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: eWEEK Article highlights weaknesses in Mainframe Security

Disclamer: Don't shoot the messenger (I am very passionate on this 
topic). The fact is unpatched zero day vulnerabilities exist on all z/OS 
mainframe's. Don't take my word for this. Ask KRI's clients what their 
experience is with z/Assure VAP  finding (probable) zero day integrity 
based code vulnerabilities. I say probable because the ISV's don't 
appear to share the integrity vulnerability details with anyone outside 
their respective organizations. They certainly do not share this 
information with Key Resources. So if the ISV takes longer than a couple 
of days to provide a patch its likely they did not have one before the 
vulnerability was reported. Thus you can conclude that the vulnerability 
was a zero day.

Comment: If there were no unpatched security holes then IBM wouldn't 
need to release security PTFs to fix them.
Response: Correct. You only need to look at the patches provided by your 
ISV's (IBM, CA, BMC, Rocket Sorry if I missed any one!) and you will 
find security and/or integrity patches.

Comment: I would hope that it's a lot harder to find one than it used to be.
A: No actually it is not. I started doing this in 2009.  Key Resource's 
z/Assure VAP product regularly finds integrity based-code 
vulnerabilities. Most of these vulnerabilities appear to be zero day. As 
some people would consider my comments biased, don't take my word for 
it. Ask our clients if what I am saying is accurate.

Question: What zero-day vulnerabilities would there be? I’ve not heard 
of unpatched security holes in z/OS before.
Short answer: Conspiracy of Silence. Unless you are with the companies 
that find the vulnerability, work for the ISV support group, or are part 
of the ISV management or development teams you would never know about 
the vulnerability UNTIL you saw the patch on their patch portals. 
Patches normally contain no details about the vulnerability. This is how 
mainframe integrity based-code vulnerability management is done.  These 
vulnerabilities are NOT reported on the National Vulnerability Database.

Comment: Aside from of course, phishing and other attacks aimed at the users 
and not the machine itself.
Answer: Nothing to do with phishing and other attacks. I am referring to 
integrity based-code vulnerabilities.  These vulnerabilities are in SVC's, PC 
routines, or APF).  However, a good hacker will combine vulnerabilities to 
achieve their goal. The hacker wants to establish a beach head in your network. 
From there they can traverse the network compromising system's until they get 
access to z/OS. With these integrity based-code vulnerabilities once they are 
established and able to run work on z/OS they can elevate their credentials 
with an integrity based-code vulnerabilities and turn off logging. "Run work" 
would roughly translate to: a) FTP JCL to z/OS b) Logon to TSO or something 
similar c) Submit JCL through RJE or NJE (google metasploit NJE for attach 
vectors)there are documented attacks using this technique.

Feel free to contact me offline to continue this discussion.

Ray Overby

On 10/30/2018 7:43 PM, Seymour J Metz wrote:
> If there were no unpatched security holes then IBM wouldn't need to release 
> security PTFs to fix them. I would hope that it's a lot harder to find one 
> than it used to be.
>
>
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
>
> 
> From: IBM Mainframe Discussion List  on behalf of 
> Eric Verwijs 
> Sent: Tuesday, October 30, 2018 10:59 AM
> To: IBM-MAIN@listserv.ua.edu
> Subject: eWEEK Article highlights weaknesses in Mainframe Security
>
> http://secure-web.cisco.com/1cEGuBe_ZRQESR4kUXS7ShVfhPRr6RLxpO47vTAIYiTpY0Px4GzQAVFwbRnVRDSO88yQdYgZwS9NG2LhzWNCaA7jKdLghofcDczS2pS3jXM7QWTltrwO_G_rwXUyVhX6ZWsuHZY6BnoUE_A8HOWKsXNFwYvaiJjxToXSq6pYcfH4L-krJSWFPD-gLTdPf1R9xE7aoeN-_Hy7BnmgO9LtgBCAavC3aAT3sRoaplXe4Jxk4KcS3OamjQqK37n

Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-11-01 Thread Ray Overby
Disclamer: Don't shoot the messenger (I am very passionate on this 
topic). The fact is unpatched zero day vulnerabilities exist on all z/OS 
mainframe's. Don't take my word for this. Ask KRI's clients what their 
experience is with z/Assure VAP  finding (probable) zero day integrity 
based code vulnerabilities. I say probable because the ISV's don't 
appear to share the integrity vulnerability details with anyone outside 
their respective organizations. They certainly do not share this 
information with Key Resources. So if the ISV takes longer than a couple 
of days to provide a patch its likely they did not have one before the 
vulnerability was reported. Thus you can conclude that the vulnerability 
was a zero day.


Comment: If there were no unpatched security holes then IBM wouldn't 
need to release security PTFs to fix them.
Response: Correct. You only need to look at the patches provided by your 
ISV's (IBM, CA, BMC, Rocket Sorry if I missed any one!) and you will 
find security and/or integrity patches.


Comment: I would hope that it's a lot harder to find one than it used to be.
A: No actually it is not. I started doing this in 2009.  Key Resource's 
z/Assure VAP product regularly finds integrity based-code 
vulnerabilities. Most of these vulnerabilities appear to be zero day. As 
some people would consider my comments biased, don't take my word for 
it. Ask our clients if what I am saying is accurate.


Question: What zero-day vulnerabilities would there be? I’ve not heard 
of unpatched security holes in z/OS before.
Short answer: Conspiracy of Silence. Unless you are with the companies 
that find the vulnerability, work for the ISV support group, or are part 
of the ISV management or development teams you would never know about 
the vulnerability UNTIL you saw the patch on their patch portals. 
Patches normally contain no details about the vulnerability. This is how 
mainframe integrity based-code vulnerability management is done.  These 
vulnerabilities are NOT reported on the National Vulnerability Database.


Comment: Aside from of course, phishing and other attacks aimed at the users 
and not the machine itself.
Answer: Nothing to do with phishing and other attacks. I am referring to integrity 
based-code vulnerabilities.  These vulnerabilities are in SVC's, PC routines, or APF).  
However, a good hacker will combine vulnerabilities to achieve their goal. The hacker 
wants to establish a beach head in your network. From there they can traverse the network 
compromising system's until they get access to z/OS. With these integrity based-code 
vulnerabilities once they are established and able to run work on z/OS they can elevate 
their credentials with an integrity based-code vulnerabilities and turn off logging. 
"Run work" would roughly translate to: a) FTP JCL to z/OS b) Logon to TSO or 
something similar c) Submit JCL through RJE or NJE (google metasploit NJE for attach 
vectors)there are documented attacks using this technique.

Feel free to contact me offline to continue this discussion.

Ray Overby

On 10/30/2018 7:43 PM, Seymour J Metz wrote:

If there were no unpatched security holes then IBM wouldn't need to release 
security PTFs to fix them. I would hope that it's a lot harder to find one than 
it used to be.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of Eric 
Verwijs 
Sent: Tuesday, October 30, 2018 10:59 AM
To: IBM-MAIN@listserv.ua.edu
Subject: eWEEK Article highlights weaknesses in Mainframe Security

http://secure-web.cisco.com/1cEGuBe_ZRQESR4kUXS7ShVfhPRr6RLxpO47vTAIYiTpY0Px4GzQAVFwbRnVRDSO88yQdYgZwS9NG2LhzWNCaA7jKdLghofcDczS2pS3jXM7QWTltrwO_G_rwXUyVhX6ZWsuHZY6BnoUE_A8HOWKsXNFwYvaiJjxToXSq6pYcfH4L-krJSWFPD-gLTdPf1R9xE7aoeN-_Hy7BnmgO9LtgBCAavC3aAT3sRoaplXe4Jxk4KcS3OamjQqK37nR0H3AW9MKFVQZaESyzWDzyrh9-zAveMhyg7Pwrf2PVRC_NVB9who4DKiu2x4w-qS9h0_TRcIsa8i7taFLNn3uRnvBXcyZED7CuE3hWLOKJRvH8PRslj5ZwVqdfDbfEYzbAKO_Abcu0TGiSQOS6nMco7sLYZ0Sl5rfVpSCkNmPODHPZmAoBPzLFjdZM7XhMXYE4faKg/http%3A%2F%2Fwww.eweek.com%2Fsecurity%2Ftaking-a-closer-look-at-mainframe-security

What zero-day vulnerabilities would there be? I’ve not heard of unpatched 
security holes in Z/OS before.

Unless you are not properly managing your data, that is, limit access to 
confidential information, how would someone get it? Aside from of course, 
phishing and other attacks aimed at the users and not the machine itself.



 Regards,
 Eric Verwijs

Programmer-analyste, RPC, SV et solutions de paiement - Direction générale de 
l'innovation, information et technologie
Emploi et Développement social Canada / Gouvernement du Canada
frederick.verw...@hrsdc-rhdcc.gc.ca
Téléphone 819-654-0934
Télécopieur 819-654-1009

Programmer Analyst, CPP, OAS, and Payment Solutions - Innovation, Information 
and Technology Branch
Employment and Social Development Canada / Government

Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-31 Thread Seymour J Metz
Do you mean open systems or "open" systems? z/OS may be as vulnerable as a well 
secured Linux system, but I doubr that it is as vulnerable as a windows system.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Robyn Gilchrist 
Sent: Wednesday, October 31, 2018 8:56 AM
To: IBM-MAIN@listserv.ua.edu
Subject: Re: eWEEK Article highlights weaknesses in Mainframe Security

CNMEUNIX is the NetView Unix Command processor that allowed unauthorized access 
to UID(0), patched in 2012.  IBM HTTP Server (DGW Base) had a security red 
alert back in early 2013 but, as is IBM’s prerogative, they didn’t divulge the 
particulars of the exposure.

Ray opened my eyes to exactly how z vulnerabilities and exploits occur.  Not 
alleged vulnerabilities, numbers don’t lie.  This is computer science, after 
all.  Since our conversation, I haven’t viewed the z the same way.  I haven’t 
viewed IBM-MAIN the same way.

z is just as vulnerable as open systems, maybe more so with our … er … aging 
labor staff, years of neglect in admin practices, and the false sense of 
security we’ve enjoyed behind our firewalls, green screens and 370/390/z 
architecture.
I have a presentation about the Logica hack that I’ve done at a few RUGs (RACF 
User Groups).  The hack was technically impressive and zero-day exploit was 
just one of many attack vectors.

https://secure-web.cisco.com/1jkHZbdDScNtUrvtWaZyKtQoZRhQsL0JlZG-n_A9gqHXEAmwzI6X25qvQn6OBRinaVAsukszwgWrRxXZCRukJe5TwlUNuFIFjvFe2HSH_QkLnUIH04SHRIs-WHQP_AdWBnWjbhbKp1Hx3WZ7ipUKYbPqVDQSAyeccCeKA8rL0ih8X2fZP3mWTXuFLv6yg2kryfAPVylxhXlTTLK1DfaTIkB8j-_2lnv1ZVmzLzVDMSbfoNkrSe17ZevPLw77LrUkyRQH5jGkbAeUsyFqvUex_8kLmqf0li9QagSpR5nfGIUgzoW5fz79M3-cH7069D3GOml6FAC5lpXyqBlqDMtG8ccxwB6TwIr_wrS6qhPyyFRx3hY-LWkQ2L2HlI0J05s0nDiR02S7LZmG8F2Y8vA_2J8FZMjdt8Q60K7OeMyftfJeIKcxPECtXW_qRoNf82yp-/https%3A%2F%2Fwww.rshconsulting.com%2FRSHpres%2FRSH_Consulting__Examining_Mainframe_Internet_Hack__October_2018.pdf

Robyn

Robyn E Gilchrist
Senior RACF and z/OS Technical Specialist
RSH Consulting, Inc.
617-977-9090
http://secure-web.cisco.com/1Mf8r2TLmggsKk5_CE3We_qEBM-piMInrDlZY_Rvc8MLWmONOuQE8JDZhL7c-zcxOEd2U7T-2CURlDx-r8aVwOXaRCGF4wHvJTBwZsP6wGEVUU-r7t_SazXA1dBoqCcvx0q3jZAHQ7As5gn6bOlKiFiP9WM4myTG5ExZDrYH9a10LYNNc74zI0ib1KCajv9DwVI3i2Ja74ssYwLfV9EsSQmqa2xLdSZ1lQUoV_Ik7qchR1uLMBe1e2TJvhatjHCnns3ZFHR3qaCrA73IAv7oQOzd6CAlwRQxwah8lqqIyG6K19VBqcTkBgsUxxkXEyF_gTZiN6DdLjHJQRzifnZhDD78Ai8-KITGjue7NiHV_-Xm8UWErytZEqvKa5zvkNhmZkUJ9zi9T7ZhccdL0ZPQ38ny2UQWpQ_bsCzA2DRZhMlfP_6A2dLpRVVISpVO5Jx8H/http%3A%2F%2Fwww.linkedin.com%2Fin%2Frobyn-e-gilchrist
http://secure-web.cisco.com/1dfmWiKlQwFyNZJxct55b9HkCLtdeL99UWAU8lTQqJvTE10aaQrI6uPVF9bsxHmZZBxDEgdYWsqgwM5DIL8IK4EwVggUAplG1L_MbuOK6NxcmTSyKRhEVG_F83jiuvo0S3x7t2-1v8idan9RMRCMtCw7FyFPU0LCT53R_uNmP2sEevgq0wfvbjmBwPmFMSoEFAF1tcmOXLgWyBlbyG6N2KcUrHjyQQiQAtOzUPaJ6UMNfz3bpYLSAHJEsaGnCIFJ98ZyBve98-_QnrnhC-cistfHsFYLxZdYQohqW74PEUBVPF2YE_BNa7Z8fBMDG0KXPlHJyLPNkW_g7_XCgMxrXxASfomdVn1AzB2GGzjN3588YBIY5wP8bCrBNN0-zSoLy1rTuLjvAbnzYOedzzIFSfqYuV--NAW-p9bzJYBxFbtjgS1gRBpp714MfNHt_Oy9b/http%3A%2F%2Fwww.rshconsulting.com

Upcoming RSH RACF Training - WebEx
- RACF Audit & Compliance Roadmap - MAR 11-15, 2019
- RACF Level I Administration - DEC 4-7, 2018
- RACF Level II Administration - APR 1-5, 2019
- RACF Level III Admin, Audit, & Compliance - FEB 25 - MAR 1, 2019
- RACF - Securing z/OS UNIX  - FEB 11-15, 2019


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-31 Thread R.S.

W dniu 2018-10-31 o 13:56, Robyn Gilchrist pisze:
[...]

z is just as vulnerable as open systems,

[...]
No, not *as open systems*.
BTW: z/OS is open system, while Windows is not really open. So... ;-)))

--
Radoslaw Skorupka
Lodz, Poland




==

Jeśli nie jesteś adresatem tej wiadomości:

- powiadom nas o tym w mailu zwrotnym (dziękujemy!),
- usuń trwale tę wiadomość (i wszystkie kopie, które wydrukowałeś lub zapisałeś 
na dysku).
Wiadomość ta może zawierać chronione prawem informacje, które może wykorzystać 
tylko adresat.Przypominamy, że każdy, kto rozpowszechnia (kopiuje, rozprowadza) 
tę wiadomość lub podejmuje podobne działania, narusza prawo i może podlegać 
karze.

mBank S.A. z siedzibą w Warszawie, ul. Senatorska 18, 00-950 
Warszawa,www.mBank.pl, e-mail: kont...@mbank.pl. Sąd Rejonowy dla m. st. 
Warszawy XII Wydział Gospodarczy Krajowego Rejestru Sądowego, KRS 025237, 
NIP: 526-021-50-88. Kapitał zakładowy (opłacony w całości) według stanu na 
01.01.2018 r. wynosi 169.248.488 złotych.

If you are not the addressee of this message:

- let us know by replying to this e-mail (thank you!),
- delete this message permanently (including all the copies which you have 
printed out or saved).
This message may contain legally protected information, which may be used 
exclusively by the addressee.Please be reminded that anyone who disseminates 
(copies, distributes) this message or takes any similar action, violates the 
law and may be penalised.

mBank S.A. with its registered office in Warsaw, ul. Senatorska 18, 00-950 
Warszawa,www.mBank.pl, e-mail: kont...@mbank.pl. District Court for the Capital 
City of Warsaw, 12th Commercial Division of the National Court Register, KRS 
025237, NIP: 526-021-50-88. Fully paid-up share capital amounting to PLN 
169,248,488 as at 1 January 2018.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-31 Thread zMan
Any article that starts with:
 Big-hunk heavy-metal equipment made by IBM (Z Series) ...
is hard to take seriously.

On Wed, Oct 31, 2018 at 9:33 AM Allan Staller  wrote:

> Agreed!
>
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf
> Of Arthur
> Sent: Tuesday, October 30, 2018 6:07 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: eWEEK Article highlights weaknesses in Mainframe Security
>
> On 30 Oct 2018 07:59:23 -0700, in bit.listserv.ibm-main
> (Message-ID:<
> 22f77f8ce1e2084ab5fdb5843a0ba2a191038...@mlem1865.hrdc-drhc.net>)
> frederick.verw...@hrsdc-rhdcc.gc.ca (Eric Verwijs) wrote:
>
> >https://apac01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.e
> >week.com%2Fsecurity%2Ftaking-a-closer-look-at-mainframe-securityda
> >ta=02%7C01%7Callan.staller%40HCL.COM%7C5ef96afd1d454ecd055208d63ebe358a
> >%7C189de737c93a4f5a8b686f4ca9941912%7C0%7C0%7C636765384023595472sd
> >ata=brUYMgyrrSwvVmQOv3WjstiiR%2FoHfHaiwUaOgGgenXI%3Dreserved=0
> >
> >What zero-day vulnerabilities would there be? I've not heard of
> >unpatched security holes in Z/OS before.
>
> Note that near the top of the article it says: "In this eWEEK Data Point
> article, using industry information from Ray Overby, President and CEO of
> Key Resources, Inc." It was KRI that supposedly found the zero-day vulns.
>
> I think this is not so much an article as an ad for KRI.
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions, send email
> to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> ::DISCLAIMER::
>
> --
> The contents of this e-mail and any attachment(s) are confidential and
> intended for the named recipient(s) only. E-mail transmission is not
> guaranteed to be secure or error-free as information could be intercepted,
> corrupted, lost, destroyed, arrive late or incomplete, or may contain
> viruses in transmission. The e mail and its contents (with or without
> referred errors) shall therefore not attach any liability on the originator
> or HCL or its affiliates. Views or opinions, if any, presented in this
> email are solely those of the author and may not necessarily reflect the
> views or opinions of HCL or its affiliates. Any form of reproduction,
> dissemination, copying, disclosure, modification, distribution and / or
> publication of this message without the prior written consent of authorized
> representative of HCL is strictly prohibited. If you have received this
> email in error please delete it and notify the sender immediately. Before
> opening any email and/or attachments, please check them for viruses and
> other defects.
>
> --
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>


-- 
zMan -- "I've got a mainframe and I'm not afraid to use it"

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-31 Thread Allan Staller
Agreed!

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Arthur
Sent: Tuesday, October 30, 2018 6:07 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: eWEEK Article highlights weaknesses in Mainframe Security

On 30 Oct 2018 07:59:23 -0700, in bit.listserv.ibm-main
(Message-ID:<22f77f8ce1e2084ab5fdb5843a0ba2a191038...@mlem1865.hrdc-drhc.net>)
frederick.verw...@hrsdc-rhdcc.gc.ca (Eric Verwijs) wrote:

>https://apac01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.e
>week.com%2Fsecurity%2Ftaking-a-closer-look-at-mainframe-securityda
>ta=02%7C01%7Callan.staller%40HCL.COM%7C5ef96afd1d454ecd055208d63ebe358a
>%7C189de737c93a4f5a8b686f4ca9941912%7C0%7C0%7C636765384023595472sd
>ata=brUYMgyrrSwvVmQOv3WjstiiR%2FoHfHaiwUaOgGgenXI%3Dreserved=0
>
>What zero-day vulnerabilities would there be? I've not heard of
>unpatched security holes in Z/OS before.

Note that near the top of the article it says: "In this eWEEK Data Point 
article, using industry information from Ray Overby, President and CEO of Key 
Resources, Inc." It was KRI that supposedly found the zero-day vulns.

I think this is not so much an article as an ad for KRI.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
::DISCLAIMER::
--
The contents of this e-mail and any attachment(s) are confidential and intended 
for the named recipient(s) only. E-mail transmission is not guaranteed to be 
secure or error-free as information could be intercepted, corrupted, lost, 
destroyed, arrive late or incomplete, or may contain viruses in transmission. 
The e mail and its contents (with or without referred errors) shall therefore 
not attach any liability on the originator or HCL or its affiliates. Views or 
opinions, if any, presented in this email are solely those of the author and 
may not necessarily reflect the views or opinions of HCL or its affiliates. Any 
form of reproduction, dissemination, copying, disclosure, modification, 
distribution and / or publication of this message without the prior written 
consent of authorized representative of HCL is strictly prohibited. If you have 
received this email in error please delete it and notify the sender 
immediately. Before opening any email and/or attachments, please check them for 
viruses and other defects.
--

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-31 Thread Robyn Gilchrist
CNMEUNIX is the NetView Unix Command processor that allowed unauthorized access 
to UID(0), patched in 2012.  IBM HTTP Server (DGW Base) had a security red 
alert back in early 2013 but, as is IBM’s prerogative, they didn’t divulge the 
particulars of the exposure.

Ray opened my eyes to exactly how z vulnerabilities and exploits occur.  Not 
alleged vulnerabilities, numbers don’t lie.  This is computer science, after 
all.  Since our conversation, I haven’t viewed the z the same way.  I haven’t 
viewed IBM-MAIN the same way.

z is just as vulnerable as open systems, maybe more so with our … er … aging 
labor staff, years of neglect in admin practices, and the false sense of 
security we’ve enjoyed behind our firewalls, green screens and 370/390/z 
architecture. 
I have a presentation about the Logica hack that I’ve done at a few RUGs (RACF 
User Groups).  The hack was technically impressive and zero-day exploit was 
just one of many attack vectors.

https://www.rshconsulting.com/RSHpres/RSH_Consulting__Examining_Mainframe_Internet_Hack__October_2018.pdf

Robyn

Robyn E Gilchrist
Senior RACF and z/OS Technical Specialist
RSH Consulting, Inc.
617-977-9090
www.linkedin.com/in/robyn-e-gilchrist
www.rshconsulting.com

Upcoming RSH RACF Training - WebEx
- RACF Audit & Compliance Roadmap - MAR 11-15, 2019
- RACF Level I Administration - DEC 4-7, 2018
- RACF Level II Administration - APR 1-5, 2019
- RACF Level III Admin, Audit, & Compliance - FEB 25 - MAR 1, 2019
- RACF - Securing z/OS UNIX  - FEB 11-15, 2019


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-31 Thread R.S.

W dniu 2018-10-30 o 21:55, Charles Mills pisze:

+1 on the other replies so far.

The nature of zero-day vulnerabilities is that you have not heard of them 
before.

Is z/OS inherently perfect and immune to all possible vulnerabilities, 
including those resulting from customer error? Of course not!


True, but... What?
We already know there are security patches for z/OS (let's focun on one 
system) - aren't we?
That's also obvious before PTF is released the hole was not fixed and 
there has to be some period of time between the hole is found and the 
PTF is ready and even later - applied.

So... what?
What is the conclusion of the article?
Is the z/OS less secure than let's say Windows or Linux?
Is z/OS as insecure as Windows?

Should one order some services from KRI immediately?
Is the article a form of KRI advertisement?
Is it advertisement based on FUD?
Is frightening people (which may or may not have technical knowledge) 
ethical?



My €0.02

--
Radoslaw Skorupka
Lodz, Poland




==

Jeśli nie jesteś adresatem tej wiadomości:

- powiadom nas o tym w mailu zwrotnym (dziękujemy!),
- usuń trwale tę wiadomość (i wszystkie kopie, które wydrukowałeś lub zapisałeś 
na dysku).
Wiadomość ta może zawierać chronione prawem informacje, które może wykorzystać 
tylko adresat.Przypominamy, że każdy, kto rozpowszechnia (kopiuje, rozprowadza) 
tę wiadomość lub podejmuje podobne działania, narusza prawo i może podlegać 
karze.

mBank S.A. z siedzibą w Warszawie, ul. Senatorska 18, 00-950 
Warszawa,www.mBank.pl, e-mail: kont...@mbank.pl. Sąd Rejonowy dla m. st. 
Warszawy XII Wydział Gospodarczy Krajowego Rejestru Sądowego, KRS 025237, 
NIP: 526-021-50-88. Kapitał zakładowy (opłacony w całości) według stanu na 
01.01.2018 r. wynosi 169.248.488 złotych.

If you are not the addressee of this message:

- let us know by replying to this e-mail (thank you!),
- delete this message permanently (including all the copies which you have 
printed out or saved).
This message may contain legally protected information, which may be used 
exclusively by the addressee.Please be reminded that anyone who disseminates 
(copies, distributes) this message or takes any similar action, violates the 
law and may be penalised.

mBank S.A. with its registered office in Warsaw, ul. Senatorska 18, 00-950 
Warszawa,www.mBank.pl, e-mail: kont...@mbank.pl. District Court for the Capital 
City of Warsaw, 12th Commercial Division of the National Court Register, KRS 
025237, NIP: 526-021-50-88. Fully paid-up share capital amounting to PLN 
169,248,488 as at 1 January 2018.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-31 Thread ITschak Mugzach
The risk landscape has changed. If you look at CVE for IBM products that
are based on GPL code, you will see may vulnerabilities. That's to say that
the mainframe is not immune against zero day attacks. Generally speaking,
many of the success mainframe penetration stories are based on
mis-configured software. What make it interesting is the fact that vendors
are shipping products with dangerous defaults.

ITschak

On Tue, Oct 30, 2018 at 10:56 PM Charles Mills  wrote:

> +1 on the other replies so far.
>
> The nature of zero-day vulnerabilities is that you have not heard of them
> before.
>
> Is z/OS inherently perfect and immune to all possible vulnerabilities,
> including those resulting from customer error? Of course not!
>
> Come to SHARE! Listen to the security presentations! Listen to Mark Wilson
> talk about pen testing assignments, and how he has never failed to get in
> within a few hours.
>
> Charles
>
>
> -Original Message-
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of Eric Verwijs
> Sent: Tuesday, October 30, 2018 7:59 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: eWEEK Article highlights weaknesses in Mainframe Security
>
> http://www.eweek.com/security/taking-a-closer-look-at-mainframe-security
>
> What zero-day vulnerabilities would there be? I’ve not heard of unpatched
> security holes in Z/OS before.
>
> Unless you are not properly managing your data, that is, limit access to
> confidential information, how would someone get it? Aside from of course,
> phishing and other attacks aimed at the users and not the machine itself.
>
>
>
> Regards,
> Eric Verwijs
>
> Programmer-analyste, RPC, SV et solutions de paiement - Direction générale
> de l'innovation, information et technologie
> Emploi et Développement social Canada / Gouvernement du Canada
> frederick.verw...@hrsdc-rhdcc.gc.ca
> Téléphone 819-654-0934
> Télécopieur 819-654-1009
>
> Programmer Analyst, CPP, OAS, and Payment Solutions - Innovation,
> Information and Technology Branch
> Employment and Social Development Canada / Government of Canada
> frederick.verw...@hrsdc-rhdcc.gc.ca
> Telephone 819-654-0934
> Facsimile 819-654-1009
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>


-- 
ITschak Mugzach
*|** IronSphere Platform* *|* *Information Security Contiguous Monitoring
for Legacy **|  *

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-30 Thread Clark Morris
[Default] On 30 Oct 2018 16:19:45 -0700, in bit.listserv.ibm-main
ibmmain.10.ats...@xoxy.net (Arthur) wrote:

>On 30 Oct 2018 07:59:23 -0700, in bit.listserv.ibm-main 
>(Message-ID:<22f77f8ce1e2084ab5fdb5843a0ba2a191038...@mlem1865.hrdc-drhc.net>) 
>frederick.verw...@hrsdc-rhdcc.gc.ca (Eric Verwijs) wrote:
>
>>http://www.eweek.com/security/taking-a-closer-look-at-mainframe-security
>>
>>What zero-day vulnerabilities would there be? I've not 
>>heard of unpatched security holes in Z/OS before.
>
>Note that near the top of the article it says: "In this 
>eWEEK Data Point article, using industry information from 
>Ray Overby, President and CEO of Key Resources, Inc." It 
>was KRI that supposedly found the zero-day vulns.
>
>I think this is not so much an article as an ad for KRI. 

As a former MVS systems programmer, I have always been somewhat
skeptical about the invulnerability of MVS and its successors.  I
don't know enough about VM to comment on it.  Is there a statement of
integrity for VSE, for TPF?  What are the ways someone can access the
z series if it is connected to the Internet?  What are the
vulnerabilities posed by trusted users?  Given that there are 256
gigabyte USB keys how much information can be stolen by people allowed
to log in?  Are test systems protected as well as production systems
and how many have some version of production data.  Building good sets
of coordinated test data is an expense that many organizations have
been unwilling to incur.  I know virtually nothing about KRI but that
isn't the only organization that has claimed to successfully penetrate
the mainframe.  Good security means that people have access only to
that which they need to do their jobs and for only as long as is
needed.  It means that usage is monitored.  Security is not simple and
authorized people have the ability to cause much harm.

Clark Morris
>
>--
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-30 Thread Arthur
On 30 Oct 2018 07:59:23 -0700, in bit.listserv.ibm-main 
(Message-ID:<22f77f8ce1e2084ab5fdb5843a0ba2a191038...@mlem1865.hrdc-drhc.net>) 
frederick.verw...@hrsdc-rhdcc.gc.ca (Eric Verwijs) wrote:



http://www.eweek.com/security/taking-a-closer-look-at-mainframe-security

What zero-day vulnerabilities would there be? I've not 
heard of unpatched security holes in Z/OS before.


Note that near the top of the article it says: "In this 
eWEEK Data Point article, using industry information from 
Ray Overby, President and CEO of Key Resources, Inc." It 
was KRI that supposedly found the zero-day vulns.


I think this is not so much an article as an ad for KRI. 


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-30 Thread Charles Mills
+1 on the other replies so far.

The nature of zero-day vulnerabilities is that you have not heard of them 
before.

Is z/OS inherently perfect and immune to all possible vulnerabilities, 
including those resulting from customer error? Of course not!

Come to SHARE! Listen to the security presentations! Listen to Mark Wilson talk 
about pen testing assignments, and how he has never failed to get in within a 
few hours.

Charles


-Original Message-
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Eric Verwijs
Sent: Tuesday, October 30, 2018 7:59 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: eWEEK Article highlights weaknesses in Mainframe Security

http://www.eweek.com/security/taking-a-closer-look-at-mainframe-security

What zero-day vulnerabilities would there be? I’ve not heard of unpatched 
security holes in Z/OS before.

Unless you are not properly managing your data, that is, limit access to 
confidential information, how would someone get it? Aside from of course, 
phishing and other attacks aimed at the users and not the machine itself.



Regards,
Eric Verwijs

Programmer-analyste, RPC, SV et solutions de paiement - Direction générale de 
l'innovation, information et technologie
Emploi et Développement social Canada / Gouvernement du Canada
frederick.verw...@hrsdc-rhdcc.gc.ca
Téléphone 819-654-0934
Télécopieur 819-654-1009

Programmer Analyst, CPP, OAS, and Payment Solutions - Innovation, Information 
and Technology Branch
Employment and Social Development Canada / Government of Canada
frederick.verw...@hrsdc-rhdcc.gc.ca
Telephone 819-654-0934
Facsimile 819-654-1009


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-30 Thread Lou Losee
Not just IBM, but any vendor that has a product that includes system level
code (APF authorized, Key 0 or supervisor state).

Lou
--
Artificial Intelligence is no match for Natural Stupidity
  - Unknown


On Tue, Oct 30, 2018 at 1:43 PM Seymour J Metz  wrote:

> If there were no unpatched security holes then IBM wouldn't need to
> release security PTFs to fix them. I would hope that it's a lot harder to
> find one than it used to be.
>
>
> --
> Shmuel (Seymour J.) Metz
> http://mason.gmu.edu/~smetz3
>
> 
> From: IBM Mainframe Discussion List  on behalf
> of Eric Verwijs 
> Sent: Tuesday, October 30, 2018 10:59 AM
> To: IBM-MAIN@listserv.ua.edu
> Subject: eWEEK Article highlights weaknesses in Mainframe Security
>
>
> http://secure-web.cisco.com/1cEGuBe_ZRQESR4kUXS7ShVfhPRr6RLxpO47vTAIYiTpY0Px4GzQAVFwbRnVRDSO88yQdYgZwS9NG2LhzWNCaA7jKdLghofcDczS2pS3jXM7QWTltrwO_G_rwXUyVhX6ZWsuHZY6BnoUE_A8HOWKsXNFwYvaiJjxToXSq6pYcfH4L-krJSWFPD-gLTdPf1R9xE7aoeN-_Hy7BnmgO9LtgBCAavC3aAT3sRoaplXe4Jxk4KcS3OamjQqK37nR0H3AW9MKFVQZaESyzWDzyrh9-zAveMhyg7Pwrf2PVRC_NVB9who4DKiu2x4w-qS9h0_TRcIsa8i7taFLNn3uRnvBXcyZED7CuE3hWLOKJRvH8PRslj5ZwVqdfDbfEYzbAKO_Abcu0TGiSQOS6nMco7sLYZ0Sl5rfVpSCkNmPODHPZmAoBPzLFjdZM7XhMXYE4faKg/http%3A%2F%2Fwww.eweek.com%2Fsecurity%2Ftaking-a-closer-look-at-mainframe-security
>
> What zero-day vulnerabilities would there be? I’ve not heard of unpatched
> security holes in Z/OS before.
>
> Unless you are not properly managing your data, that is, limit access to
> confidential information, how would someone get it? Aside from of course,
> phishing and other attacks aimed at the users and not the machine itself.
>
>
>
> Regards,
> Eric Verwijs
>
> Programmer-analyste, RPC, SV et solutions de paiement - Direction générale
> de l'innovation, information et technologie
> Emploi et Développement social Canada / Gouvernement du Canada
> frederick.verw...@hrsdc-rhdcc.gc.ca
> Téléphone 819-654-0934
> Télécopieur 819-654-1009
>
> Programmer Analyst, CPP, OAS, and Payment Solutions - Innovation,
> Information and Technology Branch
> Employment and Social Development Canada / Government of Canada
> frederick.verw...@hrsdc-rhdcc.gc.ca
> Telephone 819-654-0934
> Facsimile 819-654-1009
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-30 Thread Seymour J Metz
If there were no unpatched security holes then IBM wouldn't need to release 
security PTFs to fix them. I would hope that it's a lot harder to find one than 
it used to be.


--
Shmuel (Seymour J.) Metz
http://mason.gmu.edu/~smetz3


From: IBM Mainframe Discussion List  on behalf of 
Eric Verwijs 
Sent: Tuesday, October 30, 2018 10:59 AM
To: IBM-MAIN@listserv.ua.edu
Subject: eWEEK Article highlights weaknesses in Mainframe Security

http://secure-web.cisco.com/1cEGuBe_ZRQESR4kUXS7ShVfhPRr6RLxpO47vTAIYiTpY0Px4GzQAVFwbRnVRDSO88yQdYgZwS9NG2LhzWNCaA7jKdLghofcDczS2pS3jXM7QWTltrwO_G_rwXUyVhX6ZWsuHZY6BnoUE_A8HOWKsXNFwYvaiJjxToXSq6pYcfH4L-krJSWFPD-gLTdPf1R9xE7aoeN-_Hy7BnmgO9LtgBCAavC3aAT3sRoaplXe4Jxk4KcS3OamjQqK37nR0H3AW9MKFVQZaESyzWDzyrh9-zAveMhyg7Pwrf2PVRC_NVB9who4DKiu2x4w-qS9h0_TRcIsa8i7taFLNn3uRnvBXcyZED7CuE3hWLOKJRvH8PRslj5ZwVqdfDbfEYzbAKO_Abcu0TGiSQOS6nMco7sLYZ0Sl5rfVpSCkNmPODHPZmAoBPzLFjdZM7XhMXYE4faKg/http%3A%2F%2Fwww.eweek.com%2Fsecurity%2Ftaking-a-closer-look-at-mainframe-security

What zero-day vulnerabilities would there be? I’ve not heard of unpatched 
security holes in Z/OS before.

Unless you are not properly managing your data, that is, limit access to 
confidential information, how would someone get it? Aside from of course, 
phishing and other attacks aimed at the users and not the machine itself.



Regards,
Eric Verwijs

Programmer-analyste, RPC, SV et solutions de paiement - Direction générale de 
l'innovation, information et technologie
Emploi et Développement social Canada / Gouvernement du Canada
frederick.verw...@hrsdc-rhdcc.gc.ca
Téléphone 819-654-0934
Télécopieur 819-654-1009

Programmer Analyst, CPP, OAS, and Payment Solutions - Innovation, Information 
and Technology Branch
Employment and Social Development Canada / Government of Canada
frederick.verw...@hrsdc-rhdcc.gc.ca
Telephone 819-654-0934
Facsimile 819-654-1009


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: eWEEK Article highlights weaknesses in Mainframe Security

2018-10-30 Thread Lou Losee
Hi Eric,
The article is not talking about zero-day vulnerabilities with respect to
RACF or the other ESMs.  A prime example of the type of vulnerability the
article is referring to would be the recent discussion of the SVC that put
the caller into key-zero supervisor state.  A vulnerability like that can
occur also with SVCs or PCs that do not properly handle their parameters
and write to storage in key zero instead of in the callers key.  There are
multiple examples but these are just two.

Lou
--
Artificial Intelligence is no match for Natural Stupidity
  - Unknown


On Tue, Oct 30, 2018 at 9:59 AM Eric Verwijs <
frederick.verw...@hrsdc-rhdcc.gc.ca> wrote:

> http://www.eweek.com/security/taking-a-closer-look-at-mainframe-security
>
> What zero-day vulnerabilities would there be? I’ve not heard of unpatched
> security holes in Z/OS before.
>
> Unless you are not properly managing your data, that is, limit access to
> confidential information, how would someone get it? Aside from of course,
> phishing and other attacks aimed at the users and not the machine itself.
>
>
>
> Regards,
> Eric Verwijs
>
> Programmer-analyste, RPC, SV et solutions de paiement - Direction générale
> de l'innovation, information et technologie
> Emploi et Développement social Canada / Gouvernement du Canada
> frederick.verw...@hrsdc-rhdcc.gc.ca
> Téléphone 819-654-0934
> Télécopieur 819-654-1009
>
> Programmer Analyst, CPP, OAS, and Payment Solutions - Innovation,
> Information and Technology Branch
> Employment and Social Development Canada / Government of Canada
> frederick.verw...@hrsdc-rhdcc.gc.ca
> Telephone 819-654-0934
> Facsimile 819-654-1009
>
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


eWEEK Article highlights weaknesses in Mainframe Security

2018-10-30 Thread Eric Verwijs
http://www.eweek.com/security/taking-a-closer-look-at-mainframe-security

What zero-day vulnerabilities would there be? I’ve not heard of unpatched 
security holes in Z/OS before.

Unless you are not properly managing your data, that is, limit access to 
confidential information, how would someone get it? Aside from of course, 
phishing and other attacks aimed at the users and not the machine itself.



Regards,
Eric Verwijs

Programmer-analyste, RPC, SV et solutions de paiement - Direction générale de 
l'innovation, information et technologie
Emploi et Développement social Canada / Gouvernement du Canada
frederick.verw...@hrsdc-rhdcc.gc.ca
Téléphone 819-654-0934
Télécopieur 819-654-1009

Programmer Analyst, CPP, OAS, and Payment Solutions - Innovation, Information 
and Technology Branch
Employment and Social Development Canada / Government of Canada
frederick.verw...@hrsdc-rhdcc.gc.ca
Telephone 819-654-0934
Facsimile 819-654-1009


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN