On Thu, 8 Mar 2012 13:49:28 +0000, Pate, Gene wrote:

>You have your definition for 'backdoor', I have mine, Next.

That is the root of your confusion.  This thread is 
about a vendor creating a backdoor according to my 
definition.  You are "amazed at the uproar over this" 
because you applied your definition of what a "backdoor" 
is without considering the description of what the 
backdoor was in the original discussion.

>if they were APF authorized then they could
>by definition switch anyone or any task in the 
>system to supervisor state 

Yes, an APF authorized program can do that.  It can 
also create a "backdoor" (my definition) that any 
task in the system can walk through and get into 
supervisor state.  That is the objection that was 
raised, and it is a very different matter.

Since your definition of a "backdoor" is simply an 
intercept of a system routine, what would you call 
it when an authorized program creates an interface 
that any program can use to put itself into 
supervisor state?

>Now if they did this magic and they were NOT APF 
>authorized, then we have a lot to talk about here.

Of course they were authorized to be able 
to install their intercept

>I have not seen the vendor code and cannot 
>comment on what it does or does not do or
>how much security checking it does or does 
>not perform before it does what it does.

That was Ed's point too.  Neither have I and 
it's the reason I said "alleged".

-- 
Tom Marchant

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

Reply via email to