>1)    If your authorized program while executing in PSW key 0-7 stores 
into an address provided by an unauthorized caller then this is a violation of 
the IBM statement of integrity.

Sorry - I disagree with this.

It is quite OK for auth routines (eg PC-ss) to store into storage whose address 
is provided by the caller *AS LONG AS THE CALLER'S KEY IS USED* when moving the 
data. 

See the MVCDK instruction.

Likewise any authorized routine should treat caller provided storage with 
suspicion and use MVCSK to copy any data from the caller and use trusted 
control block pointers rather than rely on caller contents.


Rob Scott
Lead Developer
Rocket Software
275 Grove Street * Newton, MA 02466-2272 * USA
Tel: +1.781.684.2305
Email: rsc...@rs.com
Web: www.rocketsoftware.com

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Ray Overby
Sent: 08 March 2012 18:46
To: IBM-MAIN@bama.ua.edu
Subject: Re: Program FLIH backdoor - This is a criminal breach of security!

Charles - yes, it is somewhat ambiguous what "violation of the IBM statement of 
integrity" means. Perhaps some Integrity Vulnerability examples will help 
clarify:

1)    If your authorized program while executing in PSW key 0-7 stores 
into an address provided by an unauthorized caller then this is a violation of 
the IBM statement of integrity.

2)    If your authorized program while executing in PSW Key 0-7 or 
supervisor state branches to an address provided by an unauthorized requester 
then this is a violation of the IBM statement of Integrity.

3)    If your authorized program while executing in PSW Key 0-7 or 
supervisor state returns control to an unauthorized requester in an authorized 
state then this is a violation of the IBM statement of Integrity. By authorized 
state I mean PSW Key 0-7, Supervisor state, or now has the ability to MODESET.

4)    If your authorized program while executing in PSW Key 0-7 copies 
fetch protected storage to non-fetch protected storage then this is a violation 
of the IBM statement of integrity.

The "unauthorized requester" in these case's would be any PSW Key 8 problem 
state program that is not currently enabled to MODESET prior to issuing a 
request to an authorized service. After the request completes the program now 
has new capabilities that were not available prior to the request such as:

-    The program could now be in an authorized state (psw key 0-7 or 
supervisor state)
-    The program could now have the ability to MODESET
-    The security credentials may have been dynamically elevated (i.e. - 
I now have RACF privileged attribute which I did not have before)
-    Some code provided by my program could have been executed in an 
authorized state (PSW Key 0-7 or Supervisor state).

If you examine the before and after state around the invoking of the authorized 
service you generally see some form of elevated capabilities when a violation 
of the IBM statement of integrity occurs.

Ray Overby
Key Resources, Inc.
Ensuring System Integrity for z/Series^(TM) www.zassure.com
(312)574-0007



On 3/8/2012 11:20 AM, Charles Mills wrote:
> I will give it one more shot at trying to clarify what I mean.
>
> Witness this thread, reasonable people can disagree on what "violates 
> the statement of integrity" means. One person's reasonable or only 
> available technique is another person's violation.
>
> We could use some finer granularity. We could use a standard statement 
> of "does X but does not do Y."
>
> Charles
>
> -----Original Message-----
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On 
> Behalf Of Ray Overby
> Sent: Thursday, March 08, 2012 8:45 AM
> To: IBM-MAIN@bama.ua.edu
> Subject: Re: Program FLIH backdoor - This is a criminal breach of security!
>
> The IBM statement of Integrity or its equivalent is a standard that 
> all authorized programs should conform with. See IBM statement of 
> Integrity 
> <http://www-03.ibm.com/systems/z/os/zos/features/racf/zos_integrity_st
> atemen
> t.html>.
> If you look at z/OS V1R12.0 MVS Authorized Assembler Services Guide:
> 21.1.2
> <http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/iea2a8b0/21.1.2?
> ACTION=MATCHES&REQUEST=system+integrity&TYPE=FUZZY&SHELF=EZ2ZBK0K&DT=2
> 010062 
> 9141054&CASE=&searchTopic=TOPIC&searchText=TEXT&searchIndex=INDEX&rank
> =RANK&
> ScrollTOP=FIRSTHIT#FIRSTHIT>/you/
> will see that IBM puts the responsibility on the installation for 
> ensuring the integrity (i.e. - conforms to the IBM statement of
> Integrity) for any modifications or extensions to z/OS the 
> installation makes. This would include any authorized code 
> written/installed by the installation as well as any authorized code 
> installed that is from ISVs.
>
> If the backdoor, intercept, or other authorized program violates the 
> IBM statement of integrity then it is a problem that needs to be remediated.
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions, send 
> email to lists...@bama.ua.edu with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@bama.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

Reply via email to