Yeah, about that:  What ~is~ a "controled program"?  I noticed that
qualification, but my background is apps development and I'm woefully
ignorant in spots.

---
Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313

/* Expecting the world to treat you fairly because you are a good person is
a little like expecting the bull not to attack you because you are a
vegetarian.  -Dennis Wholey */


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
Behalf Of Seymour J Metz
Sent: Tuesday, May 7, 2019 17:05

The quoted text refers to controlled programs, which are not what users
normally run.

________________________________________
From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> on behalf of
Bob Bridges <robhbrid...@gmail.com>
Sent: Tuesday, May 7, 2019 5:02 PM

Well, more correctly, an installation ~can~ control users' ability to create
dumps.  Here's a bit from the RACF manual:

"Your installation can control the dumping (with SYSUDUMP, SYSABEND, and
SYSMDUMP statements) of address spaces that contain controlled programs by
defining a profile to protect a resource called IEAABD.DMPAUTH in the
FACILITY general resource class. / To control the dumping (with SYSABEND,
SYSMDUMP,
and SYSUDUMP statements) of address spaces that have tasks running in a task
control block (TCB) key of less than 8, a profile protecting a resource
called IEAABD.DMPAKEY must be defined in the FACILITY general resource
class."

>From the way this is worded, I gather that if you don't define that rule in
RACF then dumps aren't restricted.  ACF2 and Top Secret may have the
restriction turned on by default, I'm not sure.  My current three clients
seem all to have this feature turned on, that is, they're controling access
to dumps.

-----Original Message-----
From: Seymour J Metz
Sent: Tuesday, May 7, 2019 16:29

"MVS users nowadays need special authority to create a program dump"?

-----Original Message-----
From: Bob Bridges <robhbrid...@gmail.com>
Sent: Tuesday, May 7, 2019 3:33 PM

And thus what I said last night:  MVS has been around longer, so it's had
more opportunity to find and plug holes.  Give it another two decades and we
may find that even Windows is much more secure.

Not perfect, of course, even then.  Iron sharpens iron, so the Good Guys and
the Bad Guys continue to get smarter together.

In 1978 and '79 I worked for a university that had a DECsystem-10.  I
learned a ~ton~ back then about...well, I didn't think of it as hacking, but
I could start a program, then <Ctrl-C> it and inspect the machine code at my
leisure.  I made substantial progress toward figuring out Colossal Cave's
"magic mode" before I left there for another job.  It's primarily by
remembering those days that I came to understand why MVS users nowadays need
special authority to create a program dump.

-----Original Message-----
From: Seymour J Metz
Sent: Tuesday, May 7, 2019 13:21

While the old mainframes were too expensive for individual users, that
changed by the 1960s and moreso by the 1970s. Reme4mber the Honeywell
Kitchen Computer? The DEC PDP-5 and PDP-8?

As for mainframe security I don't believe that such operating systems as
IBSYS/IBJOB cleared storage between jobs.

-----Original Message-----
From: Jesse 1 Robinson <jesse1.robin...@sce.com>
Sent: Tuesday, May 7, 2019 1:12 PM

When I explain mainframe security to the unwashed but curious, I cite
history above all. The mainframe emerged from the primordial bit bucket soup
at a time and in a form that utterly precluded individual users from
possessing their own computers. The notion of one-computer-one-user was
monstrously unthinkable. Mainframe was of necessity a shared environment in
which utter strangers were obligated to breathe the same digital air and
excrete into the same pools. Preventing cross contamination was the first
commandment. This overriding concern guided and often dictated decades of
evolution. There was never a moment in the mainframe's lineage where
security or integrity could be architecturally compromised for *any* other
goal.

Contrast that with any sort of Pee-Cee, where Pee stood originally for 'be
sure to close the dorm room door when you toddle down the hall for a cold
one'. Likewise for the U of xNIX. Each machine had one devoted owner whose
needs were paramount. Unfortunately the computer could not discern its
master by nose, a simple trick any dog could perform instinctively.

Then the throwable machines, by virtue of price and availability, were
ushered on to the big-boy stage, and shareability was suddenly de rigueur.
So began still-developing Rube Goldberg mechanisms to keep multiple users
out of each other's shorts. After decades of flailing around, the only
'security tool' trusted by weenie-ware folks with something important to
protect is server isolation. Let's be clear. The major reason for the
mind-boggling proliferation of midrange servers is not the need for more
MIPS and gigabytes. It's the fundamental distrust common to all
non-mainframe users that anyone else allowed onto MY hardware is a potential
mugger. One app, one server. You got a problem with that? The boss will buy
you your own server.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to