Yes Ed, these sites all had RACF installed and yes, it still required the
VTOC "data set is RACF protected bit" to be flipped for the data set
protection call to even be made. The needed resource manager calls became
more apparent as the resources which were being protected grew.  The ACF2
"protectall" vs RACF "protectnone" philosophy soon became the guiding light
to making RACF actually usable as a security system by also implementing
"protectall". 

However APF authorization still allows the keys to the kingdom with no trace
for the clever programmer. And vendor PC calls are now the new point of
entry for system penetration attempts since they have all but replaced most
of the user written SVC's.

The landscape changes but the dirt is still the same.  The new hacker's
lament might be "so many entry points to choose from and so little time to
play". Vigilance and automation in security checking are the keys to
catching the silly things but the "clever programmer" still must have the
integrity and character to NOT do what they have both the ability and
opportunity to do.

Quis custodiet ipsos custodes

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to