I suppose that I should have started this thread by stating right away 
that we have and use SAFESFS.  Given it's price, ease of use, the 
complexity of SFS's native ACLs, and the reduction in backup times from 
hugely fewer authorizations, I can't understand why anyone using SFS would 
not have purchased and installed SAFESFS.  No, I do not get paid or 
compensated in any way for sharing that opinion.  Well... my compensation 
is the same good feeling we all get from helping one another on the list 
to "discover" a useful tools and product, in this case SafeSFS (or 
SafeAccess, for that matter).

In response to some of the excellent replies (and all have been):

1) install tools that blindly link MAINT 19E and don't tell you or fail 
reasonably when it doesn't work (or worse yet, when it succeeds and they 
dump random crap on there w/o telling you)
R: I intend to the MAINT 19E disk current, and maintain the MAINT.YDISK 
filespace as a "shadow copy" that is accessed by everything after the file 
server comes up.  Thus, products can still blindly and (cursedly) silently 
install to the actual MAINT 19E disk.  We'll be writing a program to 
detect differences between the mdisk and filespace and report such 
automatically each day.  It's the "random crap", much of which is probably 
obsolete, installed onto the Y-disk that inspired this effort.

2) loss of the benefit of the YDISK saved segment, although that was a 
while back when storage was still a lot more constrained. It would be nice 
to never see the SSTAT/YSTAT mismatch message again...
R: I did not seriously consider that.  I figured that we have so few CMS 
users now that everyone could have their own 19E disk accessed without 
noticing all that much resource utilization.  It might be true.  But the 
Y-STAT might be mitigated by Kris' DIRCONTROL/dataspace suggestion.  I'll 
have more research to do on that idea, including the ramifications of 
changing their virtual machines from XA mode to XC mode.

3) The complexity of managing ACLs for large numbers of CMS users using 
the built-in tools.
R: Solved.  Easily.  By SafeSFS.  Taking a truly onerous issue and making 
it a veritable "piece of cake"... one single authorization record:
    ACCEPT USER *  READ  *:MAINT.YDISK. 

4) CMS products that expect their important bits to be on the Y disk and 
that rearrange their environment internally after starting up, releasing 
anything but what they expect to be there.
R: Yeah, that could be an "interesting opportunity".  But that's what 
end-users are for -- the best testing!  ;-)

Following thorough testing, updates to the SYSPROF EXEC should replace the 
"ACCESS MAINT 19E Y/S * * Y2" with "ACCESS PPS01:MAINT.YDISK Y".  MAINT 
here also has a 019C disk, for local tools.  It already has a "YDISK EXEC" 
to re-LINK and ACCESS MAINT's 019E.  That will be changed to access the 
SFS filespace so that users have an easy way to recover a released 
filemode Y -- at least without having to know that complex SFS access 
syntax.  ;-)~

5) (kind'a) I think you could simulate the same effect as mode 0 by using 
group-based security grants for "public" files.
That could work.  And I suppose we could just have a sub-directory like 
"MAINT.YDISK.HIDDEN" and place all the hidden files there.  But given that 
we'll keep the MAINT 019E disk current, we'll probably just not place most 
hidden files on SFS to begin with (except the VMSES PARTCAT Y1, HEWITT 
PARTCAT Y1, and the GENDIRT'ed files).  Kris pointed out on of my 
concerns: "GENDIRT" for compilers (including HLASM, and COBOL2; we keep 
PL/I on it's own disk).  HLASM and COBOL2 need those files that were 
hidden by GENDIRT.  Since there's no "ACCESS dirid Y/S * * Y2" support, I 
suppose we'll just have to let the users suffer through "exposure" to the 
formerly hidden files (not as bad as exposure to Unix).  There are not 
that many, so wasted FST storage should not be much of a problem - 
especially if we go the dataspace route.  :-)

>From Kris:
Beware too for "special tools": my customer uses my LOOK tool to scan 
files for strings.  Without precautions such tools will set all  DOLRs to 
the date someone searched... 
R: Excellent point!  Long ago I wrote a "HUNTFILE EXEC" that just looks 
for files with given fileid patterns, and "HUNTSCAN EXEC" that actually 
reads files and searches for text strings.  It already turns off MDISK 
cache while it is searching.  It will need additional changes to stop DOLR 
updates. 
Q: Any quick-tips on what you had to do? If not, I'll dig through the doc.
My LOOK has since been updated to avoid that (no, I don't think it is on 
VM's download lib, but I can send it). 
R: I don't suppose that one can every have enough utilities.  Sure, I'd be 
happy if sent a copy.  You already have my e-mail address.  

Similar, a simple BROWSE when one is curious will update the DOLR.  So, we 
have a PIEK EXEC that avoids this (in Dutch "piek" is pronounced exactly 
like the English "peek"). 
R: Ugh.  Something so simple can be so difficult  :-( 
SFS needs a DOLRUNJPA - Date Of Last Real Use Not Just Poking Around! 
SHARE requirement?  ;-)
Q: What did you do in PIEK to keep from updating the DOLR.  After all, we 
have the source for BROWSE.  :-)

Thank you all (and future contributors) for excellent ideas and 
considerations.

Mike Walter 
Hewitt Associates 
Any opinions expressed herein are mine alone and do not necessarily 
represent the opinions or policies of Hewitt Associates.

 
The information contained in this e-mail and any accompanying documents may 
contain information that is confidential or otherwise protected from 
disclosure. If you are not the intended recipient of this message, or if this 
message has been addressed to you in error, please immediately alert the sender 
by reply e-mail and then delete this message, including any attachments. Any 
dissemination, distribution or other use of the contents of this message by 
anyone other than the intended recipient 
is strictly prohibited.


Reply via email to