You may find this useful:

https://public.dhe.ibm.com/partnerworld/pub/misc/coding_for_system_integrity_in_zOS_for_isvs.pdf#!

--Art Celestini


At 05:11 PM 11/30/2013, Jim Thomas wrote:
 
>Chris,
>
>Thank you for your reply sir ... I concur w/your suggestions and no, I am not 
>and will not do so.
>
>That said, w/regard to TPROT, I've had a localized routine that I wrote before 
>the hardware 
>got involved. 
>
>Again, thank you for your suggestions.
>
>Kind Regards.
>
>Jim Thomas
>
>-----Original Message-----
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>Behalf Of Blaicher, Christopher Y.
>Sent: Saturday, November 30, 2013 3:53 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: Re: Un-authorized caller calling authorized services.
>
>There are a number of things you need to do to prevent an integrity exposure.  
>At one point I saw a presentation by IBM on this, but right now I can't place 
>my hands on it.  If I do find it, I will post it.  Here are the main points of 
>it, as I remember them.
>
>- Don't ever read data from a caller's address space when you are not in the 
>caller's key.  As an SVC or PC your routine can be entered in key 
>zero/supervisor state, I.E. you are a god and can do anything you want.
>
>- Don't EVER, EVER write data to a caller's address space when you are not in 
>the caller's key.
>
>- You may have written the routine for your exclusive use, but don't 
>assume/think/hope that no one else is going to find it.  Someone will and then 
>they will try to exploit it or use it for nefarious purposes.
>
>- TPROT data areas to be referenced.
>
>Let's assume the interface calls for R1 pointing to a two word parameter list. 
> First of all, the words pointed to by R1 may be outside of his address space, 
>so you want to verify their location is valid.  Then the individual parms may 
>or may not point to valid data in his address space.
>
>The original presentation went into about 10 different ways a nefarious user 
>can try to get your valid routine to do something bad.  Maybe Peter Relson has 
>access to it and can post it.
>
>Chris Blaicher
>Principal Software Engineer, Software Development Syncsort Incorporated
>50 Tice Boulevard, Woodcliff Lake, NJ 07677
>P: 201-930-8260  |  M: 512-627-3803
>E: cblaic...@syncsort.com
>
>
>-----Original Message-----
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>Behalf Of Jim Thomas
>Sent: Saturday, November 30, 2013 3:09 PM
>To: IBM-MAIN@LISTSERV.UA.EDU
>Subject: Re: Un-authorized caller calling authorized services.
>
>Forgive me, 
>
>I have an authorized service that I've written but needs to be able to allow 
>un-authorized callers to use.
>
>Could anybody please provide any direction on the best way to implement this 
>??. I've already looked at PC's (which might be fine) and having a server type 
>address space (not something I want to do).
>
>I just want to use an acceptable API or venue of sorts. 
>
>Lastly, a while back, I'd posted an email asking how to get a product SMP/E 
>instable and while I never got any responses per se, I did get one offline 
>email from someone that faced the same issues as I did.
>
>To that person, if you happen to read this, please re-contact me offline. I 
>apologize but I lost your email but have some information for you. 
>
>Kind Regards.
>
>Jim Thomas
>j...@thethomasresidence.us 
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to