It doesn't need to specifically mention UNIX, gil.

If someone managed to inappropriately escalate their privileges to root, what 
would that let them do? Answer: they would be able to bypass some set of 
security protections provided by RACF. That's enough to qualify for an APAR 
under, as I understand the Statement of Integrity.

-- 
Walt
On Fri, 12 Jun 2015 16:36:41 -0500, Paul Gilmartin <paulgboul...@aim.com> wrote:

>... Specifically, z/OS “System Integrity” is 
>defined as the inability of any program not authorized by a mechanism under 
>the installation’s control 
>to circumvent or disable store or fetch protection, access a resource 
>protected by the z/OS Security 
>Server (RACF®), or obtain control in an authorized state; that is, in 
>supervisor state, with a protection 
>key less than eight (8), or Authorized Program Facility (APF) authorized.
>
>Does this cover a UNIX user's escalating privileges to root?  None of 
>"circumvent or disable store or
>fetch protection", "in supervisor state", "with a protection key less than 
>eight (8)", nor "Authorized
>Program Facility (APF) authorized" would seem to apply -- I believe root 
>relies none of these.  Is root
>covered by the remaining "access a resource protected by the z/OS Security 
>Server (RACF®)"?
>
>Or would a clarification be in order?  At least nowadays the SoI ought to 
>mention UNIX.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to