On 12 April 2011 08:58, john gilmore <[email protected]> wrote:
> Peter Relson has had his say, and I am unconvinced by his flag waving: 
> irresponsible modifications of IBM or ISV modules have, I suppose, occurred 
> even in this OCO era; but they are about as likely as the impact craters of 
> that purple call falling from the skies.

I am surprised. Surely the issue is not that of unauthorized,
irresponsible, or even accidental modification of IBM or ISV modules.
It is rather that many many modules are designed to run in an
authorized state, but not to be invoked in such a state by an
unexpected caller, such as the initiator. These modules are, of
course, protected from malicious exploitation by the requirements that
they live in an authorized library (or UNIX file equivalent), and that
such authorized libraries are protected from improper changes.

This has been a fundamental ingredient in the preservation of MVS
System Integrity from the very earliest days, and was a marked
difference from what came to be called SVS. If every module expecting
or willing to get control in an authorized state had to check that its
caller was the right one, or that the calling environment and passed
arguments were suitable and safe, the IBM and ISV worlds would grind
to a halt for years of remediation.

Tony H.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to