How to identify holddata date
I would like to check the last date holddata was received on my MVS csi, without looking at the logs. Is that information written somewhere in SMP and can be retrieved by query? Best, ITschak ITschak Mugzach *|** IronSphere Platform* *|* *Information Security Continuous Monitoring for z/OS, x/Linux & IBM I **| z/VM coming soon * -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Encrypted datasets - question about key (pervasive encryption)
How, in the most general case, perhaps unblocked, binary data, do you know you've got valid data? > -Original Message- > From: IBM Mainframe Discussion List On > Behalf Of Eric D Rossman > Sent: Monday, June 27, 2022 6:03 PM > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: Re: Encrypted datasets - question about key (pervasive encryption) > > [EXTERNAL EMAIL] DO NOT CLICK links or attachments unless you recognize > the sender and know the content is safe. > > It looks like she was using the term KVV to mean the same thing I was > referring to. I had just never heard it called that. > > I think your understanding was fairly close. I was getting hung up on the > terminology. Sorry for that. > > The check is on the OPEN. I'm not from DFSMS but this is my understanding: > > We use the label from the catalog to retrieve the dataset encryption key and > then use the returned key to check that we get back valid data. If anything > goes wrong (label isn't found, using the key doesn't return valid data, etc.), > we stop the OPEN and fail the operation. > > Eric Rossman, CISSP > ICSF Cryptographic Security Development > z/OS Enabling Technologies > edros...@us.ibm.com > > -Original Message- > From: IBM Mainframe Discussion List On > Behalf Of Radoslaw Skorupka > Sent: Saturday, June 25, 2022 5:30 AM > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: [EXTERNAL] Re: Encrypted datasets - question about key (pervasive > encryption) > > Well, I found the information about KVV in some IBM presentations, like IBM > Client Center Montpellier - September 19-22, 2017 IBM Z Security > Conference or Pervasive Encryption Overview > - z/OS Data Set Encryption, November 15, 2018 both authored by Cecilia > Carranza Lewis. > Maybe I misunderstood something. > > Regarding the issue - obviously authors know better than user. :-) I tried to > read shared dataset with no key present and with key present, same label, > different value. > Now the question: how the system knows the key is different? Does it > happen before open? > My understanding (it seems, wrong one) was quite simple: first check is key > label. Next check is key hash or other way allowing to compare key values > without knowing them. > > -- > Radoslaw Skorupka > Lodz, Poland > > > > W dniu 24.06.2022 o 22:03, Eric D Rossman pisze: > > While it is true that you can use different CKDS, the label must refer to > > the > same key (even under different master keys) or you won't be able to open > the dataset. > > > > There is no KVV anywhere. The value in the catalog for each encrypted > dataset is unique to that dataset and is not directly related to the key. You > will know if you have the correct keys by trying to open the dataset. > > > > Eric Rossman, CISSP > > ICSF Cryptographic Security Development > > z/OS Enabling Technologies > > edros...@us.ibm.com > > > > -Original Message- > > From: IBM Mainframe Discussion List On > Behalf Of Radoslaw Skorupka > > Sent: Friday, June 24, 2022 3:35 PM > > To: IBM-MAIN@LISTSERV.UA.EDU > > Subject: [EXTERNAL] Re: Encrypted datasets - question about key > (pervasive encryption) > > > > Well, labels are unique within ICSF realm or more precisely - CKDS. > > However it is possible to share dataset between systems, non-sysplexed to > simplify the considerations. And it is possible (by mistake) to have same > labels but different key values. Or just replace the key by mistake. > > > > KVV - I meant Key Verification Value. > > > > > > -- > > Radoslaw Skorupka > > Lodz, Poland > > > > > > > > > > W dniu 24.06.2022 o 20:08, Eric D Rossman pisze: > >> Labels for dataset encryption keys (DATA or CIPHER) are unique. You > cannot have the same label with different types where one of the types is > DATA or CIPHER. What "KVV" are you referring to? > >> > >> Eric Rossman, CISSP > >> ICSF Cryptographic Security Development > >> z/OS Enabling Technologies > >> edros...@us.ibm.com > >> > >> -Original Message- > >> From: IBM Mainframe Discussion List On > Behalf Of Radoslaw Skorupka > >> Sent: Friday, June 24, 2022 9:14 AM > >> To: IBM-MAIN@LISTSERV.UA.EDU > >> Subject: [EXTERNAL] Encrypted datasets - question about key (pervasive > encryption) > >> > >> Encrypted dataset can be easily recognized using ISPF/PDF 3.4 - I line > commands. > >> However "Encrypted - YES" does not contain some important details. > >> Next step could be IDCAMS LISTCAT ENT(dataset) - it shows key label. > >> However in some cases it is possible to have two different keys with same > label. I guess that's why KVV is recorded in VVDS. > >> Now the question: how to get information about the KVV without digging > in VVDS structures? > >> > >> -- > >> Radoslaw Skorupka > >> Lodz, Poland > >> > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > > -
Re: Encrypted datasets - question about key (pervasive encryption)
It looks like she was using the term KVV to mean the same thing I was referring to. I had just never heard it called that. I think your understanding was fairly close. I was getting hung up on the terminology. Sorry for that. The check is on the OPEN. I'm not from DFSMS but this is my understanding: We use the label from the catalog to retrieve the dataset encryption key and then use the returned key to check that we get back valid data. If anything goes wrong (label isn't found, using the key doesn't return valid data, etc.), we stop the OPEN and fail the operation. Eric Rossman, CISSP ICSF Cryptographic Security Development z/OS Enabling Technologies edros...@us.ibm.com -Original Message- From: IBM Mainframe Discussion List On Behalf Of Radoslaw Skorupka Sent: Saturday, June 25, 2022 5:30 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: [EXTERNAL] Re: Encrypted datasets - question about key (pervasive encryption) Well, I found the information about KVV in some IBM presentations, like IBM Client Center Montpellier - September 19-22, 2017 IBM Z Security Conference or Pervasive Encryption Overview - z/OS Data Set Encryption, November 15, 2018 both authored by Cecilia Carranza Lewis. Maybe I misunderstood something. Regarding the issue - obviously authors know better than user. :-) I tried to read shared dataset with no key present and with key present, same label, different value. Now the question: how the system knows the key is different? Does it happen before open? My understanding (it seems, wrong one) was quite simple: first check is key label. Next check is key hash or other way allowing to compare key values without knowing them. -- Radoslaw Skorupka Lodz, Poland W dniu 24.06.2022 o 22:03, Eric D Rossman pisze: > While it is true that you can use different CKDS, the label must refer to the > same key (even under different master keys) or you won't be able to open the > dataset. > > There is no KVV anywhere. The value in the catalog for each encrypted dataset > is unique to that dataset and is not directly related to the key. You will > know if you have the correct keys by trying to open the dataset. > > Eric Rossman, CISSP > ICSF Cryptographic Security Development > z/OS Enabling Technologies > edros...@us.ibm.com > > -Original Message- > From: IBM Mainframe Discussion List On Behalf Of > Radoslaw Skorupka > Sent: Friday, June 24, 2022 3:35 PM > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: [EXTERNAL] Re: Encrypted datasets - question about key (pervasive > encryption) > > Well, labels are unique within ICSF realm or more precisely - CKDS. > However it is possible to share dataset between systems, non-sysplexed to > simplify the considerations. And it is possible (by mistake) to have same > labels but different key values. Or just replace the key by mistake. > > KVV - I meant Key Verification Value. > > > -- > Radoslaw Skorupka > Lodz, Poland > > > > > W dniu 24.06.2022 o 20:08, Eric D Rossman pisze: >> Labels for dataset encryption keys (DATA or CIPHER) are unique. You cannot >> have the same label with different types where one of the types is DATA or >> CIPHER. What "KVV" are you referring to? >> >> Eric Rossman, CISSP >> ICSF Cryptographic Security Development >> z/OS Enabling Technologies >> edros...@us.ibm.com >> >> -Original Message- >> From: IBM Mainframe Discussion List On Behalf Of >> Radoslaw Skorupka >> Sent: Friday, June 24, 2022 9:14 AM >> To: IBM-MAIN@LISTSERV.UA.EDU >> Subject: [EXTERNAL] Encrypted datasets - question about key (pervasive >> encryption) >> >> Encrypted dataset can be easily recognized using ISPF/PDF 3.4 - I line >> commands. >> However "Encrypted - YES" does not contain some important details. >> Next step could be IDCAMS LISTCAT ENT(dataset) - it shows key label. >> However in some cases it is possible to have two different keys with same >> label. I guess that's why KVV is recorded in VVDS. >> Now the question: how to get information about the KVV without digging in >> VVDS structures? >> >> -- >> Radoslaw Skorupka >> Lodz, Poland >> -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Copy file, omitting first X characters
Sorry, I replied too quickly - Your statement is correct. In the context of the actual variable record (including the RDW), it DOES mean 1 to 4 and 17 to end. Apologies. Peter -Original Message- From: IBM Mainframe Discussion List On Behalf Of Farley, Peter x23353 Sent: Monday, June 27, 2022 6:31 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Copy file, omitting first X characters EXTERNAL EMAIL NO! (1,4,17) means "Keep positions 1-4 and 13 to end"!!! In SORT control cards for variable records, positions after 1-4 are PLUS 4 from the "record" position. Column 13 of your data (AFTER THE RDW BYTES which are invisible in a BROWSE or EDIT session) is "17" in the SORT control card (13 + 4)!!! Always remember a variable record is 4 bytes longer than your actual data due to the RDW at the front. Peter -Original Message- From: IBM Mainframe Discussion List On Behalf Of Frank Swarbrick Sent: Monday, June 27, 2022 6:06 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Copy file, omitting first X characters OK, so with BUILD=(1,4,17) this must mean "Keep positions 1-4 and 17-end). This works. Thanks! From: IBM Mainframe Discussion List on behalf of Farley, Peter x23353 <031df298a9da-dmarc-requ...@listserv.ua.edu> Sent: Monday, June 27, 2022 1:35 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Copy file, omitting first X characters Sort input control cards (DFSORT or SYNCSORT): OPTION COPY INREC BUILD=(1,4,(5+X)) Where (5+X) is a constant equal to 5 plus the X characters you want to strip -- e.g. to strip the first 8 characters X=8 so (5+8) = 13, so " INREC BUILD=(1,4,13)". Another way to calculate the position to start copying is "column I want to keep + 4", in the above example (9+4) = 13. HTH Peter -Original Message- From: IBM Mainframe Discussion List On Behalf Of Frank Swarbrick Sent: Monday, June 27, 2022 3:11 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Copy file, omitting first X characters EXTERNAL EMAIL I know this is very basic, but it's been a while... I want to copy a file where each record in the new file omits the first X number of characters from the source file, but includes everything else. Both files are variable length files. I imagine sort (I have IBM DFSORT) is the appropriate tool, but I'm simply not sure what options to specify. Thanks! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Copy file, omitting first X characters
NO! (1,4,17) means "Keep positions 1-4 and 13 to end"!!! In SORT control cards for variable records, positions after 1-4 are PLUS 4 from the "record" position. Column 13 of your data (AFTER THE RDW BYTES which are invisible in a BROWSE or EDIT session) is "17" in the SORT control card (13 + 4)!!! Always remember a variable record is 4 bytes longer than your actual data due to the RDW at the front. Peter -Original Message- From: IBM Mainframe Discussion List On Behalf Of Frank Swarbrick Sent: Monday, June 27, 2022 6:06 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Copy file, omitting first X characters OK, so with BUILD=(1,4,17) this must mean "Keep positions 1-4 and 17-end). This works. Thanks! From: IBM Mainframe Discussion List on behalf of Farley, Peter x23353 <031df298a9da-dmarc-requ...@listserv.ua.edu> Sent: Monday, June 27, 2022 1:35 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Copy file, omitting first X characters Sort input control cards (DFSORT or SYNCSORT): OPTION COPY INREC BUILD=(1,4,(5+X)) Where (5+X) is a constant equal to 5 plus the X characters you want to strip -- e.g. to strip the first 8 characters X=8 so (5+8) = 13, so " INREC BUILD=(1,4,13)". Another way to calculate the position to start copying is "column I want to keep + 4", in the above example (9+4) = 13. HTH Peter -Original Message- From: IBM Mainframe Discussion List On Behalf Of Frank Swarbrick Sent: Monday, June 27, 2022 3:11 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Copy file, omitting first X characters EXTERNAL EMAIL I know this is very basic, but it's been a while... I want to copy a file where each record in the new file omits the first X number of characters from the source file, but includes everything else. Both files are variable length files. I imagine sort (I have IBM DFSORT) is the appropriate tool, but I'm simply not sure what options to specify. Thanks! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Copy file, omitting first X characters
OK, so with BUILD=(1,4,17) this must mean "Keep positions 1-4 and 17-end). This works. Thanks! From: IBM Mainframe Discussion List on behalf of Farley, Peter x23353 <031df298a9da-dmarc-requ...@listserv.ua.edu> Sent: Monday, June 27, 2022 1:35 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Copy file, omitting first X characters Sort input control cards (DFSORT or SYNCSORT): OPTION COPY INREC BUILD=(1,4,(5+X)) Where (5+X) is a constant equal to 5 plus the X characters you want to strip -- e.g. to strip the first 8 characters X=8 so (5+8) = 13, so " INREC BUILD=(1,4,13)". Another way to calculate the position to start copying is "column I want to keep + 4", in the above example (9+4) = 13. HTH Peter -Original Message- From: IBM Mainframe Discussion List On Behalf Of Frank Swarbrick Sent: Monday, June 27, 2022 3:11 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Copy file, omitting first X characters EXTERNAL EMAIL I know this is very basic, but it's been a while... I want to copy a file where each record in the new file omits the first X number of characters from the source file, but includes everything else. Both files are variable length files. I imagine sort (I have IBM DFSORT) is the appropriate tool, but I'm simply not sure what options to specify. Thanks! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: File Transfer Alternatives - Different Platforms
Not sure this exists anymore but there used to be a channel attached some sort of conversion that used ficon. But I do know that recently as of at least a few operating systems ago IBM significantly improved FTP performance. Also there's some company that does a JDBC type driver that is supposedly good at really pumping data. And no it's it wasn't IBM it was some other company and I can't remember who it was now. It's been seven or eight years I was interested because of CICS interdependency analyzer and running the database on DB2 Linux / Windows and I wanted an easy way to pump the data across for a load. And they had a driver that would do it really well. I think there is IBM backup software that pushes stuff to the cloud which might be able to do what you're looking for. Sorry I just have too many dust bunnies in my memory right now. Rob On Mon, Jun 27, 2022, 13:47 Paul Gilmartin < 042bfe9c879d-dmarc-requ...@listserv.ua.edu> wrote: > On Mon, 27 Jun 2022 17:22:41 +, Steve Finch wrote: > > >SMB, NFS, DB2 > > > Depending on availability of the vehicle on "Different Platforms". > > How does one transfer a file with DB2? As a BLOB? > > >-Original Message- > >From: Mark Jacobs > >Sent: Monday, June 27, 2022 10:18 AM > > > >This might be a silly question, but are there any solutions out there for > data access by different platforms other than sending data around the > internal network? I'm thinking of have a huge storage device where servers, > Linux, Windows, zOS can access the same data. With data locking so when > server 'X' is writing the data, no other server can read it, and the > reverse of course too. No data updates when data is being read. > > -- > gil > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Copy file, omitting first X characters
Frank, Peter provided an excellent example of stripping the desired characters. For Variable length copies, you just need to specify the START position of the field you want to write from(Please account for the RDW) and you don't have to specify the length as under the covers SORT will figure out the length to copy by using the length in RDW Kolusu -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Copy file, omitting first X characters
Sort input control cards (DFSORT or SYNCSORT): OPTION COPY INREC BUILD=(1,4,(5+X)) Where (5+X) is a constant equal to 5 plus the X characters you want to strip -- e.g. to strip the first 8 characters X=8 so (5+8) = 13, so " INREC BUILD=(1,4,13)". Another way to calculate the position to start copying is "column I want to keep + 4", in the above example (9+4) = 13. HTH Peter -Original Message- From: IBM Mainframe Discussion List On Behalf Of Frank Swarbrick Sent: Monday, June 27, 2022 3:11 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Copy file, omitting first X characters EXTERNAL EMAIL I know this is very basic, but it's been a while... I want to copy a file where each record in the new file omits the first X number of characters from the source file, but includes everything else. Both files are variable length files. I imagine sort (I have IBM DFSORT) is the appropriate tool, but I'm simply not sure what options to specify. Thanks! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential. If the reader of the message is not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail and delete the message and any attachments from your system. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Copy file, omitting first X characters
On Mon, 27 Jun 2022 19:10:43 +, Frank Swarbrick wrote: >I know this is very basic, but it's been a while... I want to copy a file >where each record in the new file omits the first X number of characters from >the source file, but includes everything else. Both files are variable length >files. >I imagine sort (I have IBM DFSORT) is the appropriate tool, > It usually is. >... but I'm simply not sure what options to specify. > That's frequently the problem. I use: sed -E s/^.{X}// -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Copy file, omitting first X characters
I know this is very basic, but it's been a while... I want to copy a file where each record in the new file omits the first X number of characters from the source file, but includes everything else. Both files are variable length files. I imagine sort (I have IBM DFSORT) is the appropriate tool, but I'm simply not sure what options to specify. Thanks! -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: How To Handle RACROUTE logic
On Mon, 27 Jun 2022 10:20:43 -0500, Mike Cairns wrote: >One important difference you might need to be aware of is between a normal >RACROUTE call that executes under the authority of the current user associated >with the running address space (a First Party call - i.e. checking your own >current access rights), and the special case known as Third Party RACROUTE >call where you also give the userid on the call and it's not necessarily the >same userid as you are executing under at the time. For this, you need first >to create a new RACF ACEE and pass this to the RACROUTE call - IIRC this >*requires* you to have APF Authorisation (actually, Supervisor State, however >you get that, but most commonly this means you are APF'd), IOW you won't be >doing this from a normal user address space. More correctly, Mike, to create an ACEE or specify a userid on the AUTH call (which tells RACF to create an ACEE for that user) you need to be authorized: any of APF, supervisor state, or system key will work. Another caveat: If this is happening in CICS, the code should be using CICS services, not RACROUTE, to do any checking. -- Walt -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: File Transfer Alternatives - Different Platforms
On Mon, 27 Jun 2022 17:22:41 +, Steve Finch wrote: >SMB, NFS, DB2 > Depending on availability of the vehicle on "Different Platforms". How does one transfer a file with DB2? As a BLOB? >-Original Message- >From: Mark Jacobs >Sent: Monday, June 27, 2022 10:18 AM > >This might be a silly question, but are there any solutions out there for data >access by different platforms other than sending data around the internal >network? I'm thinking of have a huge storage device where servers, Linux, >Windows, zOS can access the same data. With data locking so when server 'X' is >writing the data, no other server can read it, and the reverse of course too. >No data updates when data is being read. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: [External]File Transfer Alternatives - Different Platforms
SMB, NFS, DB2 Steve Finch -Original Message- From: IBM Mainframe Discussion List On Behalf Of Mark Jacobs Sent: Monday, June 27, 2022 10:18 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: [External]File Transfer Alternatives - Different Platforms Attention: This message originated from outside the RPS Network. Always use caution when clicking on links or opening attachments. This might be a silly question, but are there any solutions out there for data access by different platforms other than sending data around the internal network? I'm thinking of have a huge storage device where servers, Linux, Windows, zOS can access the same data. With data locking so when server 'X' is writing the data, no other server can read it, and the reverse of course too. No data updates when data is being read. Mark Jacobs Sent from [ProtonMail](https://protonmail.com), Swiss-based encrypted email. GPG Public Key - https://api.protonmail.ch/pks/lookup?op=get&search=markjac...@protonmail.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: File Transfer Alternatives - Different Platforms
On Mon, 27 Jun 2022 14:17:43 +, Mark Jacobs wrote: >... With data locking so when server 'X' is writing the data, no other > server can read it, and the reverse of course too. No data updates when data > is being read. > With a Solaris FTP server I have relied on UNIX behavior: ... PUT filename incoming/filename RENAME incoming/filename filename QUIT o UNIX rename is preemptive -- it quietly replaces any existing copy. o UNIX rename is atomic -- no other process will observe two instances of "filename" or none. o UNIX rename is nondisruptive -- a process which has open()ed a descriptor on a file can continue to process that file via the descriptor regardless of any rename() or ulink(). (Regina appears to violate this; perhaps it does a stat() before each STREAM I/O operation.) -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: File Transfer Alternatives - Different Platforms
We have a Synology NAS RAID server that Windows and our z/OS system connect to via FTP. OSX and Linux can also talk to it via other protocols . It is very easy to use. Mike Shaw On Mon, Jun 27, 2022, 10:17 AM Mark Jacobs < 0224d287a4b1-dmarc-requ...@listserv.ua.edu> wrote: > This might be a silly question, but are there any solutions out there for > data access by different platforms other than sending data around the > internal network? I'm thinking of have a huge storage device where servers, > Linux, Windows, zOS can access the same data. With data locking so when > server 'X' is writing the data, no other server can read it, and the > reverse of course too. No data updates when data is being read. > > Mark Jacobs > > Sent from [ProtonMail](https://protonmail.com), Swiss-based encrypted > email. > > GPG Public Key - > https://api.protonmail.ch/pks/lookup?op=get&search=markjac...@protonmail.com > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: How To Handle RACROUTE logic
You don't need to concern yourself with *how* the user is (or is not) given access to the resource. You don't need to concern yourself with which RACF profile protects the resource either. You just pass the necessary information about the user, the access level being requested and the resource name to the RACROUTE call and RACF determines the answer for you. This answer might be because the user is permitted directly on the access list of the profile covering the resource, or one (or more) of the groups they are a member of is on the access list, or the resource might grant access via the Universal Access attribute, or the user might have some other ability such as Operations, or even a RACF exit might get into the equation and contribute to the answer your RACROUTE call gets back. It's all 'under the covers'. In general, it's a bad idea to try and second guess RACF by assuming that some named Group or other structure is used specifically to make access decisions - poor design choice (made all too often by folks who don't really understand RACF). One important difference you might need to be aware of is between a normal RACROUTE call that executes under the authority of the current user associated with the running address space (a First Party call - i.e. checking your own current access rights), and the special case known as Third Party RACROUTE call where you also give the userid on the call and it's not necessarily the same userid as you are executing under at the time. For this, you need first to create a new RACF ACEE and pass this to the RACROUTE call - IIRC this *requires* you to have APF Authorisation (actually, Supervisor State, however you get that, but most commonly this means you are APF'd), IOW you won't be doing this from a normal user address space. HTH - Cheers - Mike -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: File Transfer Alternatives - Different Platforms
External network, and there's a lot of overlap. From: IBM Mainframe Discussion List on behalf of Mark Jacobs <0224d287a4b1-dmarc-requ...@listserv.ua.edu> Sent: Monday, June 27, 2022 10:17 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: File Transfer Alternatives - Different Platforms This might be a silly question, but are there any solutions out there for data access by different platforms other than sending data around the internal network? I'm thinking of have a huge storage device where servers, Linux, Windows, zOS can access the same data. With data locking so when server 'X' is writing the data, no other server can read it, and the reverse of course too. No data updates when data is being read. Mark Jacobs Sent from [ProtonMail](https://secure-web.cisco.com/1j6M1ose_YIfZQY74VoK7-GAZ1IWpXkmscnNSi3QfDZhKSKw_oUqKpiEDTUieTBcBeLwrkQOWB0mIordv5S1K5p_scK7JtviC507Puh-59TJcahAZbQ1__d45Jn-ryMl_MDdqscW-rTO77b0zlEp8U1_hItxb_5mLQoLpWl1B3p-BK270U-_AFFhtD2PGNCDS-tIyc9lwXsZJbf2ENJmDTco78WPQgv0qcEQvQlDMr2rrjLGeiChl3emcFHvdUNfom9cS-N2S4CibvAWke3xKsCViQ40uRCcRWafcjwjnUuMToEWcWmmQRdfr8Esp21wRwSSm3GNuB-FKOkENiG29S9551b_z9x-5YfjboNaPEa2h--vcF7FrYQiJ79CIFQy2uzRCy2ekdNMbFlRFRDJAbOwqWN0h3YEl6ULsldyRmbBsiGsythez4FSKosKhgKWV/https%3A%2F%2Fprotonmail.com), Swiss-based encrypted email. GPG Public Key - https://secure-web.cisco.com/1wnU6Bogw8V-dRbrot1eWxuZA0SQaZPenhN7O302ILYUjD0E0mDmCzCVUGr4gOG13tkEJgWgXql0As37IVg2zjwscf8aZzKf_QWSkaPfLTPOk4J0SrmPBpPIOLr_Tznox5V86-ZrrIitTn1xBpy-RhBeviyWZYadm7Os9ThHD5pY3N2TsDVTdiQAve9za_EFvt60fvgk7kbC6Wh5mRIPUkvTV1BjqNJhZ_aKFPO5mCJiVPERtmMtCU3WtaQ9-36I15rstA96-1iA7o6ht-CG6JTNBnFiF_6co_qVv8yspb_fGMxzUNru6_d5MOWajE7ZMZGoTZ65iDXKF_NIAIwdG1PYPYbql4Mx7tKUPwjrtk9eqTexKjsysqD3u0mvvrExd4ZSaJsNIEHVHFTFr2800SgwN_rTCkBQtLlmtVA44fA2pcV9lhozDpveKFvr9w8ea/https%3A%2F%2Fapi.protonmail.ch%2Fpks%2Flookup%3Fop%3Dget%26search%3Dmarkjacobs%40protonmail.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: File Transfer Alternatives - Different Platforms
JDBC? On Mon, Jun 27, 2022 at 3:44 PM Paul Gilmartin < 042bfe9c879d-dmarc-requ...@listserv.ua.edu> wrote: > On Mon, 27 Jun 2022 14:17:43 +, Mark Jacobs wrote: > > >This might be a silly question, but are there any solutions out there for > data access by different platforms other than sending data around the > internal network? I'm thinking of have a huge storage device where servers, > Linux, Windows, zOS can access the same data. With data locking so when > server 'X' is writing the data, no other server can read it, and the > reverse of course too. No data updates when data is being read. > > > NFS? > > z/OS can operate as either server or client. > > -- > gil > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN > -- Wayne V. Bickerdike -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: File Transfer Alternatives - Different Platforms
On Mon, 27 Jun 2022 14:17:43 +, Mark Jacobs wrote: >This might be a silly question, but are there any solutions out there for data >access by different platforms other than sending data around the internal >network? I'm thinking of have a huge storage device where servers, Linux, >Windows, zOS can access the same data. With data locking so when server 'X' is >writing the data, no other server can read it, and the reverse of course too. >No data updates when data is being read. > NFS? z/OS can operate as either server or client. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
File Transfer Alternatives - Different Platforms
This might be a silly question, but are there any solutions out there for data access by different platforms other than sending data around the internal network? I'm thinking of have a huge storage device where servers, Linux, Windows, zOS can access the same data. With data locking so when server 'X' is writing the data, no other server can read it, and the reverse of course too. No data updates when data is being read. Mark Jacobs Sent from [ProtonMail](https://protonmail.com), Swiss-based encrypted email. GPG Public Key - https://api.protonmail.ch/pks/lookup?op=get&search=markjac...@protonmail.com -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: Some UNIX file usage questions
On 27/06/2022 7:09 am, Andrew Rowley wrote: On 24/06/2022 3:17 pm, David Crayford wrote: There's a more complete example here https://github.com/zsystems/java-samples/blob/master/MvsConsoleInteraction.java. Using Object.wait()/notify() is a bit hairy. A more modern implementation would use Condition.await()/signal() but it's fine for this use case. I cut as much as possible out of my example so there was less code to wade through to see the logic of the stop/modify etc. There are some significant differences between the IBM example and mine: - The IBM example does nothing until it receives the MODIFY command. My example does something (sleep), and responds to STOP and MODIFY commands. In a real implementation the sleep would be replaced with the actual function of the STC. I think this is more realistic, most STCs have a function they perform until they are stopped - they don't just respond to modify commands. That's ok for a simple single threaded server but won't fly if you use a framework. We use the Spring Boot application framework which implements multiple concurrent services. We spin up a ConsoleController thread that shuts down the Spring application context on a STOP command for a clean termination. Our stuff can run on distributed systems so using a console listener is optional. Unless you REALLY need to run on z/OS (native code) you should strive to write Java applications that can run multi-platform. - The IBM example returns true from handleStop which results in an immediate System.exit(0). I think this will result in an ugly abend if there is a dataset being processed at the time because it is not properly closed. My example is designed for a clean shutdown. It's a simple sample. But it shows a useful model which is how we used it in more sophisticated environment. Object.wait/notify is probably a reasonable approximation of an ECB. I would be more inclined to use higher level constructs. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
Re: USS compare
Classification: Confidential The diff command (with appropriate options) will do what you want. -Original Message- From: IBM Mainframe Discussion List On Behalf Of Bhum Muth Sent: Friday, June 24, 2022 6:02 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: USS compare [CAUTION: This Email is from outside the Organization. Unless you trust the sender, Don’t click links or open attachments as it may be a Phishing email, which can steal your Information and compromise your Computer.] mounted zFS files(2 etc files) them zOS, /etc is a directory and I want to compare the contents of two directories. Thanks, BM -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ::DISCLAIMER:: The contents of this e-mail and any attachment(s) are confidential and intended for the named recipient(s) only. E-mail transmission is not guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or may contain viruses in transmission. The e mail and its contents (with or without referred errors) shall therefore not attach any liability on the originator or HCL or its affiliates. Views or opinions, if any, presented in this email are solely those of the author and may not necessarily reflect the views or opinions of HCL or its affiliates. Any form of reproduction, dissemination, copying, disclosure, modification, distribution and / or publication of this message without the prior written consent of authorized representative of HCL is strictly prohibited. If you have received this email in error please delete it and notify the sender immediately. Before opening any email and/or attachments, please check them for viruses and other defects. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN