How to identify holddata date

2022-06-27 Thread ITschak Mugzach
I would like to check the last date holddata was received on my MVS csi,
without looking at the logs. Is that information written somewhere in SMP
and can be retrieved by query?

Best,
ITschak

ITschak Mugzach
*|** IronSphere Platform* *|* *Information Security Continuous Monitoring
for z/OS, x/Linux & IBM I **| z/VM coming soon  *

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Encrypted datasets - question about key (pervasive encryption)

2022-06-27 Thread Gibney, Dave
How, in the most general case, perhaps unblocked, binary data, do you know 
you've got valid data? 

> -Original Message-
> From: IBM Mainframe Discussion List  On
> Behalf Of Eric D Rossman
> Sent: Monday, June 27, 2022 6:03 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: Encrypted datasets - question about key (pervasive encryption)
> 
> [EXTERNAL EMAIL] DO NOT CLICK links or attachments unless you recognize
> the sender and know the content is safe.
> 
> It looks like she was using the term KVV to mean the same thing I was
> referring to. I had just never heard it called that.
> 
> I think your understanding was fairly close. I was getting hung up on the
> terminology. Sorry for that.
> 
> The check is on the OPEN. I'm not from DFSMS but this is my understanding:
> 
> We use the label from the catalog to retrieve the dataset encryption key and
> then use the returned key to check that we get back valid data. If anything
> goes wrong (label isn't found, using the key doesn't return valid data, etc.),
> we stop the OPEN and fail the operation.
> 
> Eric Rossman, CISSP
> ICSF Cryptographic Security Development
> z/OS Enabling Technologies
> edros...@us.ibm.com
> 
> -Original Message-
> From: IBM Mainframe Discussion List  On
> Behalf Of Radoslaw Skorupka
> Sent: Saturday, June 25, 2022 5:30 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: [EXTERNAL] Re: Encrypted datasets - question about key (pervasive
> encryption)
> 
> Well, I found the information about KVV in some IBM presentations, like IBM
> Client Center Montpellier - September 19-22, 2017 IBM Z Security
> Conference or Pervasive Encryption Overview
> - z/OS Data Set Encryption, November 15, 2018 both authored by Cecilia
> Carranza Lewis.
> Maybe I misunderstood something.
> 
> Regarding the issue - obviously authors know better than user. :-) I tried to
> read shared dataset with no key present and with key present, same label,
> different value.
> Now the question: how the system knows the key is different? Does it
> happen before open?
> My understanding (it seems, wrong one) was quite simple: first check is key
> label. Next check is key hash or other way allowing to compare key values
> without knowing them.
> 
> --
> Radoslaw Skorupka
> Lodz, Poland
> 
> 
> 
> W dniu 24.06.2022 o 22:03, Eric D Rossman pisze:
> > While it is true that you can use different CKDS, the label must refer to 
> > the
> same key (even under different master keys) or you won't be able to open
> the dataset.
> >
> > There is no KVV anywhere. The value in the catalog for each encrypted
> dataset is unique to that dataset and is not directly related to the key. You
> will know if you have the correct keys by trying to open the dataset.
> >
> > Eric Rossman, CISSP
> > ICSF Cryptographic Security Development
> > z/OS Enabling Technologies
> > edros...@us.ibm.com
> >
> > -Original Message-
> > From: IBM Mainframe Discussion List  On
> Behalf Of Radoslaw Skorupka
> > Sent: Friday, June 24, 2022 3:35 PM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: [EXTERNAL] Re: Encrypted datasets - question about key
> (pervasive encryption)
> >
> > Well, labels are unique within ICSF realm or more precisely - CKDS.
> > However it is possible to share dataset between systems, non-sysplexed to
> simplify the considerations. And it is possible (by mistake) to have same
> labels but different key values. Or just replace the key by mistake.
> >
> > KVV - I meant Key Verification Value.
> >
> >
> > --
> > Radoslaw Skorupka
> > Lodz, Poland
> >
> >
> >
> >
> > W dniu 24.06.2022 o 20:08, Eric D Rossman pisze:
> >> Labels for dataset encryption keys (DATA or CIPHER) are unique. You
> cannot have the same label with different types where one of the types is
> DATA or CIPHER. What "KVV" are you referring to?
> >>
> >> Eric Rossman, CISSP
> >> ICSF Cryptographic Security Development
> >> z/OS Enabling Technologies
> >> edros...@us.ibm.com
> >>
> >> -Original Message-
> >> From: IBM Mainframe Discussion List  On
> Behalf Of Radoslaw Skorupka
> >> Sent: Friday, June 24, 2022 9:14 AM
> >> To: IBM-MAIN@LISTSERV.UA.EDU
> >> Subject: [EXTERNAL] Encrypted datasets - question about key (pervasive
> encryption)
> >>
> >> Encrypted dataset can be easily recognized using ISPF/PDF 3.4 - I line
> commands.
> >> However "Encrypted - YES" does not contain some important details.
> >> Next step could be IDCAMS LISTCAT ENT(dataset) - it shows key label.
> >> However in some cases it is possible to have two different keys with same
> label. I guess that's why KVV is recorded in VVDS.
> >> Now the question: how to get information about the KVV without digging
> in VVDS structures?
> >>
> >> --
> >> Radoslaw Skorupka
> >> Lodz, Poland
> >>
> 
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> 
> -

Re: Encrypted datasets - question about key (pervasive encryption)

2022-06-27 Thread Eric D Rossman
It looks like she was using the term KVV to mean the same thing I was referring 
to. I had just never heard it called that.

I think your understanding was fairly close. I was getting hung up on the 
terminology. Sorry for that.

The check is on the OPEN. I'm not from DFSMS but this is my understanding:

We use the label from the catalog to retrieve the dataset encryption key and 
then use the returned key to check that we get back valid data. If anything 
goes wrong (label isn't found, using the key doesn't return valid data, etc.), 
we stop the OPEN and fail the operation.

Eric Rossman, CISSP
ICSF Cryptographic Security Development
z/OS Enabling Technologies
edros...@us.ibm.com

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Radoslaw Skorupka
Sent: Saturday, June 25, 2022 5:30 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [EXTERNAL] Re: Encrypted datasets - question about key (pervasive 
encryption)

Well, I found the information about KVV in some IBM presentations, like IBM 
Client Center Montpellier - September 19-22, 2017 IBM Z Security Conference or 
Pervasive Encryption Overview
- z/OS Data Set Encryption, November 15, 2018 both authored by Cecilia Carranza 
Lewis.
Maybe I misunderstood something.

Regarding the issue - obviously authors know better than user. :-) I tried to 
read shared dataset with no key present and with key present, same label, 
different value.
Now the question: how the system knows the key is different? Does it happen 
before open?
My understanding (it seems, wrong one) was quite simple: first check is key 
label. Next check is key hash or other way allowing to compare key values 
without knowing them.

-- 
Radoslaw Skorupka
Lodz, Poland



W dniu 24.06.2022 o 22:03, Eric D Rossman pisze:
> While it is true that you can use different CKDS, the label must refer to the 
> same key (even under different master keys) or you won't be able to open the 
> dataset.
>
> There is no KVV anywhere. The value in the catalog for each encrypted dataset 
> is unique to that dataset and is not directly related to the key. You will 
> know if you have the correct keys by trying to open the dataset.
>
> Eric Rossman, CISSP
> ICSF Cryptographic Security Development
> z/OS Enabling Technologies
> edros...@us.ibm.com
>
> -Original Message-
> From: IBM Mainframe Discussion List  On Behalf Of 
> Radoslaw Skorupka
> Sent: Friday, June 24, 2022 3:35 PM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: [EXTERNAL] Re: Encrypted datasets - question about key (pervasive 
> encryption)
>
> Well, labels are unique within ICSF realm or more precisely - CKDS.
> However it is possible to share dataset between systems, non-sysplexed to 
> simplify the considerations. And it is possible (by mistake) to have same 
> labels but different key values. Or just replace the key by mistake.
>
> KVV - I meant Key Verification Value.
>
>
> --
> Radoslaw Skorupka
> Lodz, Poland
>
>
>
>
> W dniu 24.06.2022 o 20:08, Eric D Rossman pisze:
>> Labels for dataset encryption keys (DATA or CIPHER) are unique. You cannot 
>> have the same label with different types where one of the types is DATA or 
>> CIPHER. What "KVV" are you referring to?
>>
>> Eric Rossman, CISSP
>> ICSF Cryptographic Security Development
>> z/OS Enabling Technologies
>> edros...@us.ibm.com
>>
>> -Original Message-
>> From: IBM Mainframe Discussion List  On Behalf Of 
>> Radoslaw Skorupka
>> Sent: Friday, June 24, 2022 9:14 AM
>> To: IBM-MAIN@LISTSERV.UA.EDU
>> Subject: [EXTERNAL] Encrypted datasets - question about key (pervasive 
>> encryption)
>>
>> Encrypted dataset can be easily recognized using ISPF/PDF 3.4 - I line 
>> commands.
>> However "Encrypted - YES" does not contain some important details.
>> Next step could be IDCAMS LISTCAT ENT(dataset) - it shows key label.
>> However in some cases it is possible to have two different keys with same 
>> label. I guess that's why KVV is recorded in VVDS.
>> Now the question: how to get information about the KVV without digging in 
>> VVDS structures?
>>
>> --
>> Radoslaw Skorupka
>> Lodz, Poland
>>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Copy file, omitting first X characters

2022-06-27 Thread Farley, Peter x23353
Sorry, I replied too quickly - Your statement is correct.  In the context of 
the actual variable record (including the RDW), it DOES mean 1 to 4 and 17 to 
end.

Apologies.

Peter

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Farley, Peter x23353
Sent: Monday, June 27, 2022 6:31 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Copy file, omitting first X characters

EXTERNAL EMAIL

NO!  (1,4,17) means "Keep positions 1-4 and 13 to end"!!!  In SORT control 
cards for variable records, positions after 1-4 are PLUS 4 from the "record" 
position.  Column 13 of your data (AFTER THE RDW BYTES which are invisible in a 
BROWSE or EDIT session) is "17" in the SORT control card (13 + 4)!!!

Always remember a variable record is 4 bytes longer than your actual data due 
to the RDW at the front.

Peter

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Frank Swarbrick
Sent: Monday, June 27, 2022 6:06 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Copy file, omitting first X characters

OK, so with BUILD=(1,4,17) this must mean "Keep positions 1-4 and 17-end).  
This works.  Thanks!

From: IBM Mainframe Discussion List  on behalf of 
Farley, Peter x23353 <031df298a9da-dmarc-requ...@listserv.ua.edu>
Sent: Monday, June 27, 2022 1:35 PM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: Copy file, omitting first X characters

Sort input control cards (DFSORT or SYNCSORT):

 OPTION COPY
 INREC BUILD=(1,4,(5+X))

Where (5+X) is a constant equal to 5 plus the X characters you want to strip -- 
e.g. to strip the first 8 characters X=8 so (5+8) = 13, so " INREC 
BUILD=(1,4,13)".

Another way to calculate the position to start copying is "column I want to 
keep + 4", in the above example (9+4) = 13.

HTH

Peter

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Frank Swarbrick
Sent: Monday, June 27, 2022 3:11 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Copy file, omitting first X characters

EXTERNAL EMAIL

I know this is very basic, but it's been a while...  I want to copy a file 
where each record in the new file omits the first X number of characters from 
the source file, but includes everything else.  Both files are variable length 
files.
I imagine sort (I have IBM DFSORT) is the appropriate tool, but I'm simply not 
sure what options to specify.
Thanks!

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Copy file, omitting first X characters

2022-06-27 Thread Farley, Peter x23353
NO!  (1,4,17) means "Keep positions 1-4 and 13 to end"!!!  In SORT control 
cards for variable records, positions after 1-4 are PLUS 4 from the "record" 
position.  Column 13 of your data (AFTER THE RDW BYTES which are invisible in a 
BROWSE or EDIT session) is "17" in the SORT control card (13 + 4)!!!

Always remember a variable record is 4 bytes longer than your actual data due 
to the RDW at the front.

Peter

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Frank Swarbrick
Sent: Monday, June 27, 2022 6:06 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: Copy file, omitting first X characters

OK, so with BUILD=(1,4,17) this must mean "Keep positions 1-4 and 17-end).  
This works.  Thanks!

From: IBM Mainframe Discussion List  on behalf of 
Farley, Peter x23353 <031df298a9da-dmarc-requ...@listserv.ua.edu>
Sent: Monday, June 27, 2022 1:35 PM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: Copy file, omitting first X characters

Sort input control cards (DFSORT or SYNCSORT):

 OPTION COPY
 INREC BUILD=(1,4,(5+X))

Where (5+X) is a constant equal to 5 plus the X characters you want to strip -- 
e.g. to strip the first 8 characters X=8 so (5+8) = 13, so " INREC 
BUILD=(1,4,13)".

Another way to calculate the position to start copying is "column I want to 
keep + 4", in the above example (9+4) = 13.

HTH

Peter

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Frank Swarbrick
Sent: Monday, June 27, 2022 3:11 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Copy file, omitting first X characters

EXTERNAL EMAIL

I know this is very basic, but it's been a while...  I want to copy a file 
where each record in the new file omits the first X number of characters from 
the source file, but includes everything else.  Both files are variable length 
files.
I imagine sort (I have IBM DFSORT) is the appropriate tool, but I'm simply not 
sure what options to specify.
Thanks!

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Copy file, omitting first X characters

2022-06-27 Thread Frank Swarbrick
OK, so with BUILD=(1,4,17) this must mean "Keep positions 1-4 and 17-end).  
This works.  Thanks!

From: IBM Mainframe Discussion List  on behalf of 
Farley, Peter x23353 <031df298a9da-dmarc-requ...@listserv.ua.edu>
Sent: Monday, June 27, 2022 1:35 PM
To: IBM-MAIN@LISTSERV.UA.EDU 
Subject: Re: Copy file, omitting first X characters

Sort input control cards (DFSORT or SYNCSORT):

 OPTION COPY
 INREC BUILD=(1,4,(5+X))

Where (5+X) is a constant equal to 5 plus the X characters you want to strip -- 
e.g. to strip the first 8 characters X=8 so (5+8) = 13, so " INREC 
BUILD=(1,4,13)".

Another way to calculate the position to start copying is "column I want to 
keep + 4", in the above example (9+4) = 13.

HTH

Peter

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Frank Swarbrick
Sent: Monday, June 27, 2022 3:11 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Copy file, omitting first X characters

EXTERNAL EMAIL

I know this is very basic, but it's been a while...  I want to copy a file 
where each record in the new file omits the first X number of characters from 
the source file, but includes everything else.  Both files are variable length 
files.
I imagine sort (I have IBM DFSORT) is the appropriate tool, but I'm simply not 
sure what options to specify.
Thanks!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: File Transfer Alternatives - Different Platforms

2022-06-27 Thread Rob Schramm
Not sure this exists anymore but there used to be a channel attached some
sort of conversion that used ficon.

But I do know that recently as of at least a few operating systems ago IBM
significantly improved FTP performance.

Also there's some company that does a JDBC type driver that is supposedly
good at really pumping data. And no it's it wasn't IBM it was some other
company and I can't remember who it was now.  It's been seven or eight
years I was interested because of CICS interdependency analyzer and running
the database on DB2 Linux / Windows and I wanted an easy way to pump the
data across for a load.  And they had a driver that would do it really well.

I think there is IBM backup software that pushes stuff to the cloud which
might be able to do what you're looking for.

Sorry I just have too many dust bunnies in my memory right now.

Rob

On Mon, Jun 27, 2022, 13:47 Paul Gilmartin <
042bfe9c879d-dmarc-requ...@listserv.ua.edu> wrote:

> On Mon, 27 Jun 2022 17:22:41 +, Steve Finch wrote:
>
> >SMB, NFS, DB2
> >
> Depending on availability of the vehicle on "Different Platforms".
>
> How does one transfer a file with DB2?  As a BLOB?
>
> >-Original Message-
> >From: Mark Jacobs
> >Sent: Monday, June 27, 2022 10:18 AM
> >
> >This might be a silly question, but are there any solutions out there for
> data access by different platforms other than sending data around the
> internal network? I'm thinking of have a huge storage device where servers,
> Linux, Windows, zOS can access the same data. With data locking so when
> server 'X' is writing the data, no other server can read it, and the
> reverse of course too. No data updates when data is being read.
>
> --
> gil
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Copy file, omitting first X characters

2022-06-27 Thread Sri h Kolusu
Frank,

Peter provided an excellent example of stripping the desired characters.  For 
Variable length copies, you just need to specify the START position of the 
field you want to write from(Please account for the RDW) and you don't have to 
specify the length as under the covers SORT will figure out the length to copy 
by using the length in RDW

Kolusu

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Copy file, omitting first X characters

2022-06-27 Thread Farley, Peter x23353
Sort input control cards (DFSORT or SYNCSORT):

 OPTION COPY
 INREC BUILD=(1,4,(5+X))

Where (5+X) is a constant equal to 5 plus the X characters you want to strip -- 
e.g. to strip the first 8 characters X=8 so (5+8) = 13, so " INREC 
BUILD=(1,4,13)".

Another way to calculate the position to start copying is "column I want to 
keep + 4", in the above example (9+4) = 13.

HTH

Peter

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Frank Swarbrick
Sent: Monday, June 27, 2022 3:11 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Copy file, omitting first X characters

EXTERNAL EMAIL

I know this is very basic, but it's been a while...  I want to copy a file 
where each record in the new file omits the first X number of characters from 
the source file, but includes everything else.  Both files are variable length 
files.
I imagine sort (I have IBM DFSORT) is the appropriate tool, but I'm simply not 
sure what options to specify.
Thanks!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, please notify us immediately by e-mail and delete the message and any 
attachments from your system.

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Copy file, omitting first X characters

2022-06-27 Thread Paul Gilmartin
On Mon, 27 Jun 2022 19:10:43 +, Frank Swarbrick wrote:

>I know this is very basic, but it's been a while...  I want to copy a file 
>where each record in the new file omits the first X number of characters from 
>the source file, but includes everything else.  Both files are variable length 
>files.
>I imagine sort (I have IBM DFSORT) is the appropriate tool,
>
It usually is.

>... but I'm simply not sure what options to specify.
>
That's frequently the problem.

I use:
sed -E s/^.{X}//

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Copy file, omitting first X characters

2022-06-27 Thread Frank Swarbrick
I know this is very basic, but it's been a while...  I want to copy a file 
where each record in the new file omits the first X number of characters from 
the source file, but includes everything else.  Both files are variable length 
files.
I imagine sort (I have IBM DFSORT) is the appropriate tool, but I'm simply not 
sure what options to specify.
Thanks!

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: How To Handle RACROUTE logic

2022-06-27 Thread Walt Farrell
On Mon, 27 Jun 2022 10:20:43 -0500, Mike Cairns  wrote:

>One important difference you might need to be aware of is between a normal 
>RACROUTE call that executes under the authority of the current user associated 
>with the running address space (a First Party call - i.e. checking your own 
>current access rights), and the special case known as Third Party RACROUTE 
>call where you also give the userid on the call and it's not necessarily the 
>same userid as you are executing under at the time.  For this, you need first 
>to create a new RACF ACEE and pass this to the RACROUTE call - IIRC this 
>*requires* you to have APF Authorisation (actually, Supervisor State, however 
>you get that, but most commonly this means you are APF'd), IOW you won't be 
>doing this from a normal user address space.

More correctly, Mike, to create an ACEE or specify a userid on the AUTH call 
(which tells RACF to create an ACEE for that user) you need to be authorized: 
any of APF, supervisor state, or system key will work.

Another caveat: If this is happening in CICS, the code should be using CICS 
services, not RACROUTE, to do any checking.

-- 
Walt

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: File Transfer Alternatives - Different Platforms

2022-06-27 Thread Paul Gilmartin
On Mon, 27 Jun 2022 17:22:41 +, Steve Finch wrote:

>SMB, NFS, DB2
> 
Depending on availability of the vehicle on "Different Platforms".

How does one transfer a file with DB2?  As a BLOB?

>-Original Message-
>From: Mark Jacobs
>Sent: Monday, June 27, 2022 10:18 AM
>
>This might be a silly question, but are there any solutions out there for data 
>access by different platforms other than sending data around the internal 
>network? I'm thinking of have a huge storage device where servers, Linux, 
>Windows, zOS can access the same data. With data locking so when server 'X' is 
>writing the data, no other server can read it, and the reverse of course too. 
>No data updates when data is being read.

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: [External]File Transfer Alternatives - Different Platforms

2022-06-27 Thread Steve Finch
SMB, NFS, DB2

Steve Finch

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Mark Jacobs
Sent: Monday, June 27, 2022 10:18 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [External]File Transfer Alternatives - Different Platforms

Attention: This message originated from outside the RPS Network. Always use 
caution when clicking on links or opening attachments.   

This might be a silly question, but are there any solutions out there for data 
access by different platforms other than sending data around the internal 
network? I'm thinking of have a huge storage device where servers, Linux, 
Windows, zOS can access the same data. With data locking so when server 'X' is 
writing the data, no other server can read it, and the reverse of course too. 
No data updates when data is being read.

Mark Jacobs

Sent from [ProtonMail](https://protonmail.com), Swiss-based encrypted email.

GPG Public Key - 
https://api.protonmail.ch/pks/lookup?op=get&search=markjac...@protonmail.com

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: File Transfer Alternatives - Different Platforms

2022-06-27 Thread Paul Gilmartin
On Mon, 27 Jun 2022 14:17:43 +, Mark Jacobs wrote:

>... With data locking so when server 'X' is writing the data, no other 
> server can read it, and the reverse of course too. No data updates when data 
> is being read.
>
With  a Solaris FTP server I have relied on UNIX behavior:
...
PUT filename incoming/filename
RENAME  incoming/filename filename
QUIT

o UNIX rename is preemptive -- it quietly replaces any existing copy.
o UNIX rename is atomic -- no other process will observe two
  instances of "filename" or none.
o UNIX rename is nondisruptive -- a process which has open()ed a
  descriptor on a file can continue to process that file via the descriptor
  regardless of any rename() or ulink().  (Regina appears to violate
  this; perhaps it does a stat() before each STREAM I/O operation.)

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: File Transfer Alternatives - Different Platforms

2022-06-27 Thread Mike Shaw
We have a Synology NAS RAID server  that Windows and our z/OS system
connect to via FTP.  OSX and Linux can also talk to it via other protocols
. It is very easy to use.

Mike Shaw

On Mon, Jun 27, 2022, 10:17 AM Mark Jacobs <
0224d287a4b1-dmarc-requ...@listserv.ua.edu> wrote:

> This might be a silly question, but are there any solutions out there for
> data access by different platforms other than sending data around the
> internal network? I'm thinking of have a huge storage device where servers,
> Linux, Windows, zOS can access the same data. With data locking so when
> server 'X' is writing the data, no other server can read it, and the
> reverse of course too. No data updates when data is being read.
>
> Mark Jacobs
>
> Sent from [ProtonMail](https://protonmail.com), Swiss-based encrypted
> email.
>
> GPG Public Key -
> https://api.protonmail.ch/pks/lookup?op=get&search=markjac...@protonmail.com
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: How To Handle RACROUTE logic

2022-06-27 Thread Mike Cairns
You don't need to concern yourself with *how* the user is (or is not) given 
access to the resource.  You don't need to concern yourself with which RACF 
profile protects the resource either.  You just pass the necessary information 
about the user, the access level being requested and the resource name to the 
RACROUTE call and RACF determines the answer for you.  This answer might be 
because the user is permitted directly on the access list of the profile 
covering the resource, or one (or more) of the groups they are a member of is 
on the access list, or the resource might grant access via the Universal Access 
attribute, or the user might have some other ability such as Operations, or 
even a RACF exit might get into the equation and contribute to the answer your 
RACROUTE call gets back.  It's all 'under the covers'.  In general, it's a bad 
idea to try and second guess RACF by assuming that some named Group or other 
structure is used specifically to make access decisions - poor design choice 
(made all too often by folks who don't really understand RACF).  

One important difference you might need to be aware of is between a normal 
RACROUTE call that executes under the authority of the current user associated 
with the running address space (a First Party call - i.e. checking your own 
current access rights), and the special case known as Third Party RACROUTE call 
where you also give the userid on the call and it's not necessarily the same 
userid as you are executing under at the time.  For this, you need first to 
create a new RACF ACEE and pass this to the RACROUTE call - IIRC this 
*requires* you to have APF Authorisation (actually, Supervisor State, however 
you get that, but most commonly this means you are APF'd), IOW you won't be 
doing this from a normal user address space.

HTH - Cheers - Mike

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: File Transfer Alternatives - Different Platforms

2022-06-27 Thread Seymour J Metz
External network, and there's a lot of overlap.


From: IBM Mainframe Discussion List  on behalf of 
Mark Jacobs <0224d287a4b1-dmarc-requ...@listserv.ua.edu>
Sent: Monday, June 27, 2022 10:17 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: File Transfer Alternatives - Different Platforms

This might be a silly question, but are there any solutions out there for data 
access by different platforms other than sending data around the internal 
network? I'm thinking of have a huge storage device where servers, Linux, 
Windows, zOS can access the same data. With data locking so when server 'X' is 
writing the data, no other server can read it, and the reverse of course too. 
No data updates when data is being read.

Mark Jacobs

Sent from 
[ProtonMail](https://secure-web.cisco.com/1j6M1ose_YIfZQY74VoK7-GAZ1IWpXkmscnNSi3QfDZhKSKw_oUqKpiEDTUieTBcBeLwrkQOWB0mIordv5S1K5p_scK7JtviC507Puh-59TJcahAZbQ1__d45Jn-ryMl_MDdqscW-rTO77b0zlEp8U1_hItxb_5mLQoLpWl1B3p-BK270U-_AFFhtD2PGNCDS-tIyc9lwXsZJbf2ENJmDTco78WPQgv0qcEQvQlDMr2rrjLGeiChl3emcFHvdUNfom9cS-N2S4CibvAWke3xKsCViQ40uRCcRWafcjwjnUuMToEWcWmmQRdfr8Esp21wRwSSm3GNuB-FKOkENiG29S9551b_z9x-5YfjboNaPEa2h--vcF7FrYQiJ79CIFQy2uzRCy2ekdNMbFlRFRDJAbOwqWN0h3YEl6ULsldyRmbBsiGsythez4FSKosKhgKWV/https%3A%2F%2Fprotonmail.com),
 Swiss-based encrypted email.

GPG Public Key - 
https://secure-web.cisco.com/1wnU6Bogw8V-dRbrot1eWxuZA0SQaZPenhN7O302ILYUjD0E0mDmCzCVUGr4gOG13tkEJgWgXql0As37IVg2zjwscf8aZzKf_QWSkaPfLTPOk4J0SrmPBpPIOLr_Tznox5V86-ZrrIitTn1xBpy-RhBeviyWZYadm7Os9ThHD5pY3N2TsDVTdiQAve9za_EFvt60fvgk7kbC6Wh5mRIPUkvTV1BjqNJhZ_aKFPO5mCJiVPERtmMtCU3WtaQ9-36I15rstA96-1iA7o6ht-CG6JTNBnFiF_6co_qVv8yspb_fGMxzUNru6_d5MOWajE7ZMZGoTZ65iDXKF_NIAIwdG1PYPYbql4Mx7tKUPwjrtk9eqTexKjsysqD3u0mvvrExd4ZSaJsNIEHVHFTFr2800SgwN_rTCkBQtLlmtVA44fA2pcV9lhozDpveKFvr9w8ea/https%3A%2F%2Fapi.protonmail.ch%2Fpks%2Flookup%3Fop%3Dget%26search%3Dmarkjacobs%40protonmail.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: File Transfer Alternatives - Different Platforms

2022-06-27 Thread Wayne Bickerdike
JDBC?

On Mon, Jun 27, 2022 at 3:44 PM Paul Gilmartin <
042bfe9c879d-dmarc-requ...@listserv.ua.edu> wrote:

> On Mon, 27 Jun 2022 14:17:43 +, Mark Jacobs wrote:
>
> >This might be a silly question, but are there any solutions out there for
> data access by different platforms other than sending data around the
> internal network? I'm thinking of have a huge storage device where servers,
> Linux, Windows, zOS can access the same data. With data locking so when
> server 'X' is writing the data, no other server can read it, and the
> reverse of course too. No data updates when data is being read.
> >
> NFS?
>
> z/OS can operate as either server or client.
>
> --
> gil
>
> --
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>


-- 
Wayne V. Bickerdike

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: File Transfer Alternatives - Different Platforms

2022-06-27 Thread Paul Gilmartin
On Mon, 27 Jun 2022 14:17:43 +, Mark Jacobs wrote:

>This might be a silly question, but are there any solutions out there for data 
>access by different platforms other than sending data around the internal 
>network? I'm thinking of have a huge storage device where servers, Linux, 
>Windows, zOS can access the same data. With data locking so when server 'X' is 
>writing the data, no other server can read it, and the reverse of course too. 
>No data updates when data is being read.
> 
NFS?

z/OS can operate as either server or client.

-- 
gil

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


File Transfer Alternatives - Different Platforms

2022-06-27 Thread Mark Jacobs
This might be a silly question, but are there any solutions out there for data 
access by different platforms other than sending data around the internal 
network? I'm thinking of have a huge storage device where servers, Linux, 
Windows, zOS can access the same data. With data locking so when server 'X' is 
writing the data, no other server can read it, and the reverse of course too. 
No data updates when data is being read.

Mark Jacobs

Sent from [ProtonMail](https://protonmail.com), Swiss-based encrypted email.

GPG Public Key - 
https://api.protonmail.ch/pks/lookup?op=get&search=markjac...@protonmail.com

--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: Some UNIX file usage questions

2022-06-27 Thread David Crayford

On 27/06/2022 7:09 am, Andrew Rowley wrote:

On 24/06/2022 3:17 pm, David Crayford wrote:
There's a more complete example here 
https://github.com/zsystems/java-samples/blob/master/MvsConsoleInteraction.java. 



Using Object.wait()/notify() is a bit hairy. A more modern 
implementation would use Condition.await()/signal() but it's fine for 
this use case.


I cut as much as possible out of my example so there was less code to 
wade through to see the logic of the stop/modify etc.


There are some significant differences between the IBM example and mine:

- The IBM example does nothing until it receives the MODIFY command. 
My example does something (sleep), and responds to STOP and MODIFY 
commands.
In a real implementation the sleep would be replaced with the actual 
function of the STC. I think this is more realistic, most STCs have a 
function they perform until they are stopped - they don't just respond 
to modify commands.


That's ok for a simple single threaded server but won't fly if you use a 
framework. We use the Spring Boot application framework which implements 
multiple concurrent services. We spin up a ConsoleController thread that 
shuts down the Spring application context on a STOP command for a clean 
termination.
Our stuff can run on distributed systems so using a console listener is 
optional. Unless you REALLY need to run on z/OS (native code) you should 
strive to write Java applications that can run multi-platform.




- The IBM example returns true from handleStop which results in an 
immediate System.exit(0). I think this will result in an ugly abend if 
there is a dataset being processed at the time because it is not 
properly closed. My example is designed for a clean shutdown.


It's a simple sample. But it shows a useful model which is how we used 
it in more sophisticated environment.





Object.wait/notify is probably a reasonable approximation of an ECB. I 
would be more inclined to use higher level constructs.




--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN


Re: USS compare

2022-06-27 Thread Allan Staller
Classification: Confidential

The diff command (with appropriate options)  will do what you want.

-Original Message-
From: IBM Mainframe Discussion List  On Behalf Of 
Bhum Muth
Sent: Friday, June 24, 2022 6:02 PM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: USS compare

[CAUTION: This Email is from outside the Organization. Unless you trust the 
sender, Don’t click links or open attachments as it may be a Phishing email, 
which can steal your Information and compromise your Computer.]

mounted zFS files(2 etc files) them zOS, /etc is a directory and I want to 
compare the contents of two directories.

Thanks,
BM

--
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN
::DISCLAIMER::

The contents of this e-mail and any attachment(s) are confidential and intended 
for the named recipient(s) only. E-mail transmission is not guaranteed to be 
secure or error-free as information could be intercepted, corrupted, lost, 
destroyed, arrive late or incomplete, or may contain viruses in transmission. 
The e mail and its contents (with or without referred errors) shall therefore 
not attach any liability on the originator or HCL or its affiliates. Views or 
opinions, if any, presented in this email are solely those of the author and 
may not necessarily reflect the views or opinions of HCL or its affiliates. Any 
form of reproduction, dissemination, copying, disclosure, modification, 
distribution and / or publication of this message without the prior written 
consent of authorized representative of HCL is strictly prohibited. If you have 
received this email in error please delete it and notify the sender 
immediately. Before opening any email and/or attachments, please check them for 
viruses and other defects.


--
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN