Re: Ops privs

2007-08-27 Thread Rob van der Heij
On 8/27/07, David Boyes [EMAIL PROTECTED] wrote:

  Most CP commands right now only allow the ESM to audit, not to control
  access. If the ESM gets granular access control, we need a a lot of
  new error messages to reflect that.

 Or just one:

 HCPE Command option not permitted by security profile. RC=1234

 Exactly what isn't permitted isn't the end user's business (to prevent
 gaming the system and determining what options are permitted by trial
 and error), but should be recorded in the ESM log.

Beg to differ. My experience is that this is not helpful. My all time
favorite is the console log full of  Command complete for user
messages. You want the requester and owner of the resource (the one
who can grant access) to be able to sort this out, so it should be
clear to either one of them which profile was preventing or not
allowing access. Hiding the why does not make it more secure. There
are more effective ways to detect systematic attacks and friends.

  An easy API for
  RACROUTE might be nice to avoid yet-another-list of powerful users
  (especially since some weasels want that all disks with lists of
  powerful users are protected against reading).

 Takes us back to either a universal *RPI service provider built into CP
 that we can connect to with pipes and do our own ESM, or supplying a
 default ESM that's more granular than the classic CP model, doesn't it?

You're making wind and causing confusion. *RPI is what CP uses to
connect to the RACFVM's. CMS Pipelines can connect to *RPI but that's
the reverse of what we want.
What I am asking for is an application resource profile that is not
used by CP but by applications to control access to services (e.g.
APPL.TCPIP.LINK.ABC could allow query or start/stop of link ABC based
on access to that profile). It would also require extra support in the
ESM to have granular access control for those 3rd party checks
(ICHCONN is global).

One could imagine a new/changed diagnose to ask CP to ask the ESM, but
we have no easy way to use such a diagnose. A new system IUCV service
looks cool but also lacks the tools to use it. So maybe a new CP
command is the easiest way.

Rob


Re: Ops privs

2007-08-27 Thread Colin Allinson
I want to wind back a bit on this one:-

We do use RACF as an ESM and we do use LOGONBY (controlled by RACF 
profiles) extensively.

I understand that any user with LOGONBY authority can log on and give any 
of the commands mentioned but we would be extremely unhappy about these 
users being able to give those commands on behalf of that user without 
logging on. This should not be the assumption and, if it becomes so, then 
there should be an easy way to revert to the current status :- 

There are 2 issues here :-

1.  Visibility
Searching RACF audit record is no substitute for seeing the 
commands entered on the console of the user.

2.  Serialisation
Insisting the user logs on (LOGONBY) ensures that they (and only 
they) have control of that user at that time.\

I would be OK with the ability to enable the behaviour suggested but I 
would be very unhappy for it to be the default that we had to find a 
workaround for. 
 


Colin G Allinson
Technical Manager VM
Amadeus Data Processing GmbH
T +49 (0) 8122-43 49 75
F +49 (0) 8122-43 32 60
[EMAIL PROTECTED]
http://www.amadeus.com



IMPORTANT  -  CONFIDENTIALITY  NOTICE  - This e-mail is intended only for 
the use of the individual or entity shown above as addressees . It may 
contain information which is privileged, confidential or otherwise 
protected from disclosure under applicable laws .  If the reader of this 
transmission is not the intended recipient, you are hereby notified that 
any dissemination, printing, distribution, copying, disclosure or the 
taking of any action in reliance on the contents of this information is 
strictly prohibited.  If you have received this transmission in error, 
please immediately notify us by reply e-mail or using the address below 
and delete the message and any attachments from your system . 

Amadeus Data Processing GmbH 
Geschäftsführer: Eberhard Haag 
Sitz der Gesellschaft: Erding 
HR München 48 199 
Berghamer Strasse 6 
85435 Erding 
Germany

Re: Ops privs

2007-08-27 Thread Thomas Kern
This is the kind of change that I hope WILL NOT be the default and will
actually take some effort on my part to implement. It is too dramatic a change,
with too many installations depending upon the current behavior. 

As to the serialization of control of a target user, what if there were a
'lock' setting that could be set before executing these new commands on behalf
of a target user and unset when the administrator is finished fiddling with the
target user. If done in an ESM, I would hope that rules could be written to
require that the 'lock' be set by the same requestor. 

/Tom Kern
/301-903-2211

--- Colin Allinson [EMAIL PROTECTED] wrote:
 I want to wind back a bit on this one:-
 
 We do use RACF as an ESM and we do use LOGONBY (controlled by RACF 
 profiles) extensively.
 
 I understand that any user with LOGONBY authority can log on and give any 
 of the commands mentioned but we would be extremely unhappy about these 
 users being able to give those commands on behalf of that user without 
 logging on. This should not be the assumption and, if it becomes so, then 
 there should be an easy way to revert to the current status :- 
 
 There are 2 issues here :-
 
 1.  Visibility
 Searching RACF audit record is no substitute for seeing the 
 commands entered on the console of the user.
 
 2.  Serialisation
 Insisting the user logs on (LOGONBY) ensures that they (and only 
 they) have control of that user at that time.\
 
 I would be OK with the ability to enable the behaviour suggested but I 
 would be very unhappy for it to be the default that we had to find a 
 workaround for. 
  
 Colin G Allinson
 Technical Manager VM
 Amadeus Data Processing GmbH
 T +49 (0) 8122-43 49 75
 F +49 (0) 8122-43 32 60
 [EMAIL PROTECTED]
 http://www.amadeus.com



   

Be a better Heartthrob. Get better relationship answers from someone who knows. 
Yahoo! Answers - Check it out. 
http://answers.yahoo.com/dir/?link=listsid=396545433


Re: Ops privs

2007-08-27 Thread Graves Nora E
We use LOGONBY to be able to log onto a test user whose profile has
nothing but class G authority.  It's great to be able to do final
testing to make sure that the final users have access to all necessary
functions.  Changing the privileges by default might negate some of
those results. 


Nora Graves
[EMAIL PROTECTED]
Main IRS, Room 6513
(202) 622-6735 
Fax (202) 622-3123

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Alan Altmark
Sent: Friday, August 24, 2007 12:54 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

On Friday, 08/24/2007 at 11:54 EDT, Schuh, Richard [EMAIL PROTECTED]
wrote:
 In that case, FORCE and XAUTOLOG should be in a class that does not
include 
 SHUTDOWN. After all, why should we trust TCPIP any more than we do 
 other
users? 
 Who knows what information it is shipping to Chuckie unbeknownst to
us?

C says: no no no.  it's fine.  really.  trust me.  (heh heh)

There are some who believe that the authority to LOGON BY to a user
should implicitly allow:
- XAUTOLOG
- SET SECUSER or OBSERVER
- SEND (a la class C)
- FORCE
- SIGNAL SHUTDOWN

Thoughts?


Re: Ops privs

2007-08-27 Thread Rob van der Heij
On 8/27/07, Graves Nora E [EMAIL PROTECTED] wrote:

 We use LOGONBY to be able to log onto a test user whose profile has
 nothing but class G authority.  It's great to be able to do final
 testing to make sure that the final users have access to all necessary
 functions.  Changing the privileges by default might negate some of
 those results.

I think your scenario would still be safe with what Alan suggested.
During your test you would have the privileges of the target only.

Your scenario would only break when Alan had proposed reverse
inheritance or sideways inheritance of privileges (the person who
logged on to TESTABC could also have chosen to logon to TCPMAINT, so
let's now give TESTABC the authorisation that TCPMAINT would have
had).
A somewhat similar problem is with the altuser implementation when the
target gets the combined authorisation of the worker machine and the
owner of the job.

Rob


Re: Ops privs

2007-08-27 Thread Stracka, James (GTI)
I also agree with Richard.  

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On Behalf 
Of O'Brien, Dennis L
Sent: Friday, August 24, 2007 6:22 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs


I agree with Richard.  Not only do you have a serialization issue with 
multiple people able to issue commands, but all these additional commands would 
need to be logable by an ESM.  I can't think of any cases where I'd want to 
give SEND or SIGNAL SHUTDOWN authorization to general users.  If I did, I'd 
rather be able to give that authorization individually, and not have it lumped 
in with Logonby.
 

   Dennis O'Brien

  

 

  _  

From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On Behalf 
Of Schuh, Richard
Sent: Friday, August 24, 2007 13:21
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: [IBMVM] Ops privs



No. No. No. No. No.

 

We use LOGONBY as a means of controlling who is allowed to log on to 
group ids and tracking what they do. None of those other commands would be 
useful or necessary in that context. Giving those permissions  would negate, or 
at least complicate, our ability to track who did what when. Further, we would 
not want one user to be able to alter or compromise the functions being 
performed by another who was already logged on via LOGONBY. SEND, FORCE, and 
SIGNAL SHUTDOWN certainly have that potential, for example.

 

Most of what is listed could be useful only to someone who is really 
knowledgeable about the functions of the virtual machine. They are also mostly 
useful in looking after service machines. They are not useful to someone who is 
a more naïve user who logs on to a group id to perform simple functions or to 
run an application program, and could be somewhat dangerous if abused, 
accidentally or on purpose, by such a person. It is the latter group that we 
must protect against by not giving them authorities that they will never need. 
The former group probably has the knowledge needed to function without the 
added authority. 

 

Regards, 
Richard Schuh 

 


  _  



There are some who believe that the authority to LOGON BY to a user 
should
implicitly allow:
- XAUTOLOG
- SET SECUSER or OBSERVER
- SEND (a la class C)
- FORCE
- SIGNAL SHUTDOWN

Thoughts?




-- 
Kris Buelens,
IBM Belgium, VM customer support


This message w/attachments (message) may be privileged, confidential or 
proprietary, and if you are not an intended recipient, please notify the 
sender, do not use or share it and delete it. Unless specifically indicated, 
this message is not an offer to sell or a solicitation of any investment 
products or other financial product or service, an official confirmation of any 
transaction, or an official statement of Merrill Lynch. Subject to applicable 
law, Merrill Lynch may monitor, review and retain e-communications (EC) 
traveling through its networks/systems. The laws of the country of each 
sender/recipient may impact the handling of EC, and EC may be archived, 
supervised and produced in countries other than the country in which you are 
located. This message cannot be guaranteed to be secure or error-free. This 
message is subject to terms available at the following link: 
http://www.ml.com/e-communications_terms/. By messaging with Merrill Lynch you 
consent to the foregoing.



Re: Ops privs

2007-08-27 Thread David Boyes
  we need a a lot of
   new error messages to reflect that.
 
  Or just one:
 
  HCPE Command option not permitted by security profile. RC=1234
 
  Exactly what isn't permitted isn't the end user's business (to
prevent
  gaming the system and determining what options are permitted by
trial
  and error), but should be recorded in the ESM log.
 
 Beg to differ. My experience is that this is not helpful. My all time
 favorite is the console log full of  Command complete for user
 messages. You want the requester and owner of the resource (the one
 who can grant access) to be able to sort this out, so it should be
 clear to either one of them which profile was preventing or not
 allowing access. Hiding the why does not make it more secure. There
 are more effective ways to detect systematic attacks and friends.

I think we will have to agree to disagree. Most of the security weasels
I know claim that the less information you give a potential intruder,
the better, but that stems from their mindset that *everyone* is a
potential intruder. 

From a usability standpoint, your argument has merit, but I think I
would point out that much of the user context we've had historically no
longer exists. The number of CMS-intensive shops is being slowly
strangled to nothing, and we increasingly see CP plus guests, with only
a tiny number of sysprogs having access to a CMS userid. At what point
does the balance tip to focusing on the integrity of the CP hipervisors
and guest OSes, not on CMS users?

Also, if the question is determining what happened, what's to stop us
from engineering a *standardized* way to determine the cause of a
failure or to review the right set of logs, and deploying that. Right
now, everyone out there has to build their own, and document it, and
support it. The idea of a common security event stream with proper
filtering is, oh, about 30-35 years old now. Isn't it time we caught up
with the rest of civilization? 

   An easy API for
   RACROUTE might be nice to avoid yet-another-list of powerful users
   (especially since some weasels want that all disks with lists of
   powerful users are protected against reading).
 
  Takes us back to either a universal *RPI service provider built into
CP
  that we can connect to with pipes and do our own ESM, or supplying a
  default ESM that's more granular than the classic CP model, doesn't
it?
 
 You're making wind and causing confusion.

sarcasm

Silly me. I thought I was having a serious discussion with other
grownups about better ways to implement security models. Pardon me while
I find the party in the other room. 

/sarcasm

 What I am asking for is an application resource profile that is not
 used by CP but by applications to control access to services (e.g.
 APPL.TCPIP.LINK.ABC could allow query or start/stop of link ABC based
 on access to that profile). It would also require extra support in the
 ESM to have granular access control for those 3rd party checks
 (ICHCONN is global).

And that's the next step. Once we can ask the questions and get answers
at a granular level, then we go after the inconsistencies in CP command
behavior, and extend to the parameter level; the syntax you propose
looks nice, and would fit in with what I had in mind. 

 One could imagine a new/changed diagnose to ask CP to ask the ESM, but
 we have no easy way to use such a diagnose. A new system IUCV service
 looks cool but also lacks the tools to use it. So maybe a new CP
 command is the easiest way.

So you're proposing a *AUTH or something like that where you can pose a
authorization question from a user, which will be answered by whatever
is connected to *RPI? 

IUCV has the advantage that it can already be transported across ISFC,
which would allow concentrating authorization information on certain
nodes in a cluster, a useful scalability and auditability feature. 


-- db


Re: Ops privs

2007-08-27 Thread Schuh, Richard
If it were done in that other ESM for VM, it would be in its audit file.
In the absense of an ESM to inplement it, it would be BAU with no new
capability. 

Regards, 
Richard Schuh 

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of A. Harry Williams
Sent: Saturday, August 25, 2007 5:40 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

On Sat, 25 Aug 2007 00:20:38 +0200 Rob van der Heij said:
On 8/24/07, Alan Altmark [EMAIL PROTECTED] wrote:

 There are some who believe that the authority to LOGON BY to a user
should
 implicitly allow:
 - XAUTOLOG
 - SET SECUSER or OBSERVER
 - SEND (a la class C)
 - FORCE
 - SIGNAL SHUTDOWN

Put away what you're smoking... Let's get back again to the style
where we come up with the requirements and plea for years to get the
commands in the directory, and you guys code it ... :-)

I understand the idea that these commands achieve things that you
could do if you would logon to the virtual machine. Sure, but far from
complete: FOR has been suggested, but what about STORE HOST (as long
as the frame holds a page of that virtual machine) and DETACH, and...

My major concern is auditing. While I trust that the implementation
will take care of auditing in the ESM, it makes it much harder to see
who has been messing with it.  Normally when a user tells his server
suddenly failed you could scan the PROP logging and see which of the
developers reconnected, and tell him to hit his peer over the head
with it. But when neither of the virtual machines has its console
spooled, you would not be able to tell what happened.

Well, that implies a greater need for logging the auditing.  The
other system does that via SMF.  In VM, that would be either
Accounting records or Monitor records.  Based on granularity of
controlling how much is logged, and the similarity of what is
done for other logging uses on VM, I'd recommend Monitor records.

...

Rob

/ahw


Re: Ops privs

2007-08-27 Thread Rob van der Heij
On 8/27/07, David Boyes [EMAIL PROTECTED] wrote:

 So you're proposing a *AUTH or something like that where you can pose a
 authorization question from a user, which will be answered by whatever
 is connected to *RPI?

The need to do an IUCV connection adds a lot of complexity we don't
need. I think that if we want even locally written tools to exploit
this, a CP command would be better. Even if that means it becomes a
synchronous interface. So
  CP CANYOUDO resource name access mode

 IUCV has the advantage that it can already be transported across ISFC,
 which would allow concentrating authorization information on certain
 nodes in a cluster, a useful scalability and auditability feature.

I think it would be enough to get CP's answer on *this* system,
whatever way CP has come to that conclusion. If CP would trust to
connect to the ESM via ISFC, then CP may use that...

Rob


Re: Ops privs

2007-08-27 Thread Alan Altmark
On Monday, 08/27/2007 at 09:20 EDT, Rob van der Heij [EMAIL PROTECTED] 
wrote:

 Your scenario would only break when Alan had proposed reverse
 inheritance or sideways inheritance of privileges (the person who
 logged on to TESTABC could also have chosen to logon to TCPMAINT, so
 let's now give TESTABC the authorisation that TCPMAINT would have
 had).

Rob, I did not propose to give TESTABC the authorization that TCPMAINT 
would have/  Rather, I proposed that TESTABC could, for example:
- XAUTOLOG TCPMAINT because the user could just bring up another terminal 
session and LOGON TCPMAINT/DISC
- FORCE TCPMAINT because the user could LOGON TCPMAINT/LOGOFF
- SEND TCPMAINT because the user could LOGON TCPMAINT/SET SECUSER 
TESTABC/DISC or just LOGON TCPMAINT and start issuing commands
- SIGNAL SHUTDOWN TCPMAINT because the user could LOGON TCPMAINT/SIGNAL 
SHUTDOWN/DISC

 A somewhat similar problem is with the altuser implementation when the
 target gets the combined authorisation of the worker machine and the
 owner of the job.

That is only the default RACF implementation and is controlled by a RACF 
exit; CP does not redrive the authorization.  In fact, the Common Criteria 
evaluated configuration requires that this exit be removed.  It's on the 
To Do list to allow the RACF admin to identify specific users who are, in 
fact, batch machines that need that functionality.

Alan Altmark
z/VM Development
IBM Endicott


Question about IBM-supplied pipe stages/DVD CKD chunk format

2007-08-27 Thread Adam Thornton
So, I'm working on a product that, at its heart, is a couple of DASD  
images that get restored to the platters.


Right now, I require two additional 3390-3s for installation: one to  
hold the VMARC image of the CMSDDR dump of the disk (because VMARC is  
copyable around a network easily because it's F 80, while CMSDDR is  
wildly V), and one to hold the unpacked image so that CMSDDR can  
restore it.


This is idiotic, but I can't think of a better way to do it, unless:

So, is the on-disk format of the CKD images that the z/VM DVD  
installer operates on documented?  Because it'd be REAL HANDY to say,  
hey, put these files on an FTP server somewhere, access MAINT's 2CC  
disk, run INSTPIPE, make sure you have DASD attached at 150 and 151,  
and then run the following two pipe stages:


PIPE FTPGET -v BEF -DVDEOF -h host -u userid -p password -d dir  
CKD150* | ECKDREST 150
PIPE FTPGET -v BEF -DVDEOF -h host -u userid -p password -d dir  
CKD151* | ECKDREST 151


Adam


Re: Question about IBM-supplied pipe stages/DVD CKD chunk format

2007-08-27 Thread Dave Jones

Hello, Adam.

Yup this would be a very slick way of distributing software; but I don't 
think the format of the data on the DVDs is documented anywhere, nor to 
I think IBM will be documenting how to use the FTPGET stage, either. 
During the recent 5.3 ESP program, I asked about getting FTPGET 
documented, but never heard back anything official from IBM.


Plus, you will notice that there are *two* undocumented stages used by 
the DVD restore process: FTPGET itself, and the stage right behind it: 
ECKDREST...that's not a part of the normal pipeline stage collection, 
either.



Adam Thornton wrote:
So, I'm working on a product that, at its heart, is a couple of DASD 
images that get restored to the platters.


Right now, I require two additional 3390-3s for installation: one to 
hold the VMARC image of the CMSDDR dump of the disk (because VMARC is 
copyable around a network easily because it's F 80, while CMSDDR is 
wildly V), and one to hold the unpacked image so that CMSDDR can restore 
it.


This is idiotic, but I can't think of a better way to do it, unless:

So, is the on-disk format of the CKD images that the z/VM DVD installer 
operates on documented?  Because it'd be REAL HANDY to say, hey, put 
these files on an FTP server somewhere, access MAINT's 2CC disk, run 
INSTPIPE, make sure you have DASD attached at 150 and 151, and then run 
the following two pipe stages:


PIPE FTPGET -v BEF -DVDEOF -h host -u userid -p password -d dir CKD150* 
| ECKDREST 150
PIPE FTPGET -v BEF -DVDEOF -h host -u userid -p password -d dir CKD151* 
| ECKDREST 151


Adam


--
DJ
V/Soft


Re: Question about IBM-supplied pipe stages/DVD CKD chunk format

2007-08-27 Thread Alan Altmark
On Monday, 08/27/2007 at 12:28 EDT, Adam Thornton 
[EMAIL PROTECTED] wrote:
 
 So, is the on-disk format of the CKD images that the z/VM DVD
 installer operates on documented? 

No.  They are subject to change w/o notice.  (Though only on a release 
boundary, obviously!  :-)  )

Alan Altmark
z/VM Development
IBM Endicott


Re: Ops privs

2007-08-27 Thread Colin Allinson
Alan Altmark [EMAIL PROTECTED] wrote(in part) :-

 I proposed that TESTABC could, for example:
 - XAUTOLOG TCPMAINT because the user could just bring up another 
terminal 
   session and LOGON TCPMAINT/DISC
 - FORCE TCPMAINT because the user could LOGON TCPMAINT/LOGOFF
 - SEND TCPMAINT because the user could LOGON TCPMAINT/SET SECUSER 
   TESTABC/DISC or just LOGON TCPMAINT and start issuing commands
 - SIGNAL SHUTDOWN TCPMAINT because the user could LOGON TCPMAINT/SIGNAL 

   SHUTDOWN/DISC

I certainly do not want a user to be able to FORCE another simply because 
they have LOGONBY authority for that userid. If allowing this is optional 
(for those shops that want it) then fine but I do not want to be put in a 
position where this is the default authority for LOGONBY.

David Boyes [EMAIL PROTECTED] wrote :-
 The number of CMS-intensive shops is being slowly
 strangled to nothing, and we increasingly see CP plus guests, with only
 a tiny number of sysprogs having access to a CMS userid. At what point
 does the balance tip to focusing on the integrity of the CP hipervisors
 and guest OSes, not on CMS users?

Overall you may be right but we are not the only TPF shop where there are 
many hundreds of VM userids running TPF and many more for the control and 
administration of these. It will be a long while before we reach the 
simplicity of running 20-30 Linux images where everything is done within 
the guests.


Colin G Allinson
Technical Manager VM
Amadeus Data Processing GmbH
T +49 (0) 8122-43 49 75
F +49 (0) 8122-43 32 60
[EMAIL PROTECTED]
http://www.amadeus.com



IMPORTANT  -  CONFIDENTIALITY  NOTICE  - This e-mail is intended only for 
the use of the individual or entity shown above as addressees . It may 
contain information which is privileged, confidential or otherwise 
protected from disclosure under applicable laws .  If the reader of this 
transmission is not the intended recipient, you are hereby notified that 
any dissemination, printing, distribution, copying, disclosure or the 
taking of any action in reliance on the contents of this information is 
strictly prohibited.  If you have received this transmission in error, 
please immediately notify us by reply e-mail or using the address below 
and delete the message and any attachments from your system . 

Amadeus Data Processing GmbH 
Geschäftsführer: Eberhard Haag 
Sitz der Gesellschaft: Erding 
HR München 48 199 
Berghamer Strasse 6 
85435 Erding 
Germany

Re: Question about IBM-supplied pipe stages/DVD CKD chunk format

2007-08-27 Thread Adam Thornton

On Aug 27, 2007, at 11:28 AM, Dave Jones wrote:


Hello, Adam.

Yup this would be a very slick way of distributing software; but I  
don't think the format of the data on the DVDs is documented  
anywhere, nor to I think IBM will be documenting how to use the  
FTPGET stage, either. During the recent 5.3 ESP program, I asked  
about getting FTPGET documented, but never heard back anything  
official from IBM.


Plus, you will notice that there are *two* undocumented stages used  
by the DVD restore process: FTPGET itself, and the stage right  
behind it: ECKDREST...that's not a part of the normal pipeline  
stage collection, either.


Yeah, but I don't need to know *how* either of those stages work,  
really.


I did some experimenting; ECKDREST works if you just download (er,  
and PIPE UNPACK) the disk files.  FTPGET appears to just pull the  
binary image of the files (hunhcome to think of it, if I were  
doing a whole mod-3, I might need some ridiculous amount of memory to  
buffer the output of the initial FTPGET stage anyway, although if it  
does it one record at a time, not so much).  UNPACK, well, UNPACKs to  
some track image format that ECKDREST consumes that I don't actually  
need to care about.


Yes, of course this might break at some point if IBM changes their  
formats, but it works with z/VM 5.1 through 5.3, which is, frankly,  
almost everyone I currently care about supporting for this product.   
I see that Alan just confirmed that: if they change without notice,  
they will do so on a release boundary, and it will be obvious because  
the requires z/VM 5.1 or later for Level 2 installation will change  
to...something else.\


But since it's not documented, I guess I *do* need to figure out what  
the format that ECKDREST uses is, so I can dump to it, run it through  
PIPE PACK and then split to 4M chunks or whatever it is that the CKD  
files actually are.  (COPYFILE ( FROM x FOR y PACK would do this  
split, right?)


Adam


Re: Ops privs

2007-08-27 Thread Bob Bolch
But isn't FORCE just shorthand for LOGON u1 HERE By u2 followed by
LOGOFF?

Bob Bolch

 

I certainly do not want a user to be able to FORCE another simply because
they have LOGONBY authority for that userid. If allowing this is optional
(for those shops that want it) then fine but I do not want to be put in a
position where this is the default authority for LOGONBY. 

David Boyes [EMAIL PROTECTED] wrote :- 



Re: Ops privs

2007-08-27 Thread David Boyes
David Boyes [EMAIL PROTECTED] wrote :- 
 The number of CMS-intensive shops is being slowly
 strangled to nothing, and we increasingly see CP plus guests, with
only
 a tiny number of sysprogs having access to a CMS userid. At what
point
 does the balance tip to focusing on the integrity of the CP
hipervisors
 and guest OSes, not on CMS users? 

 Overall you may be right but we are not the only TPF shop where there
are many hundreds
 of VM userids running TPF and many more for the control and
administration of these. 
 It will be a long while before we reach the simplicity of running
20-30 Linux images 
 where everything is done within the guests. 

Makes sense, and there will always be exceptions, just as the
guest-only configuration was the exception a few years back. 

I don't want to prohibit your configuration, but I do want to try to get
the default configuration to reflect the most common uses (principle
of least surprise). 


Re: Question about IBM-supplied pipe stages/DVD CKD chunk format

2007-08-27 Thread Thomas Kern
Take a look at the PIPEDDR package on the IBM Downloads site. It can dump
 a
'userid mdisk-addr' or '* attached-addr' to a packed CMS file. The packed

format is equally transportable around the network as Binary-Fixed-1024. 
If
you compare PIPEDDR and CMSDDR, you may find that PIPEDDR is a bit faster
 in
elapsed time. I don't have any numbers to prove that yet but my experimen
ts
about piping encrypted DASD images to tape have given some indications.

I can imagine the VM community sharing DASD images of linux systems or ju
st
filesystems in the future. Perhaps it is time for a community designed an
d
written utility to replace (for our purposes, not IBM's) the base DDR
command. Typical input to be user mdisk, a full volume to be attached, a
standard-label (or a non-labeled) tape dataset, a CMS file or even an
FTPable network file. Typical output would be about the same diversity
(anyone have any others? A linux file on a Read-Write minidisk? ). There
should be installation replacable exits for compression and encryption. A
nd
the CMS file versions of the data should be in a network transportable
format (Binary-Fixed-4096?).

Anyone else have ideas for this fantasy?

/Tom Kern
/301-903-2211



On Mon, 27 Aug 2007 11:20:50 -0500, Adam Thornton [EMAIL PROTECTED]
et
wrote:

So, I'm working on a product that, at its heart, is a couple of DASD
images that get restored to the platters.

Right now, I require two additional 3390-3s for installation: one to
hold the VMARC image of the CMSDDR dump of the disk (because VMARC is
copyable around a network easily because it's F 80, while CMSDDR is
wildly V), and one to hold the unpacked image so that CMSDDR can
restore it.

This is idiotic, but I can't think of a better way to do it, unless:

So, is the on-disk format of the CKD images that the z/VM DVD
installer operates on documented?  Because it'd be REAL HANDY to say,
hey, put these files on an FTP server somewhere, access MAINT's 2CC
disk, run INSTPIPE, make sure you have DASD attached at 150 and 151,
and then run the following two pipe stages:

PIPE FTPGET -v BEF -DVDEOF -h host -u userid -p password -d dir
CKD150* | ECKDREST 150
PIPE FTPGET -v BEF -DVDEOF -h host -u userid -p password -d dir
CKD151* | ECKDREST 151

Adam

=



Re: Ops privs

2007-08-27 Thread Schuh, Richard
That way, you can surprise everyone who has been using the old defaults
for years :-) 

Regards, 
Richard Schuh 


-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of David Boyes
Sent: Monday, August 27, 2007 10:27 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs


I don't want to prohibit your configuration, but I do want to try to get
the default configuration to reflect the most common uses (principle
of least surprise). 


Re: Ops privs

2007-08-27 Thread Schuh, Richard
It depends. There is the BYUSER field that gets updates with the LOGON
... BY u2. Would it get updated by the FORCE?

 

Regards, 
Richard Schuh 

 



From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Bob Bolch
Sent: Monday, August 27, 2007 10:08 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

 

But isn't FORCE just shorthand for LOGON u1 HERE By u2 followed by
LOGOFF?

Bob Bolch

 

I certainly do not want a user to be able to FORCE another simply
because they have LOGONBY authority for that userid. If allowing this is
optional (for those shops that want it) then fine but I do not want to
be put in a position where this is the default authority for LOGONBY. 

David Boyes [EMAIL PROTECTED] wrote :- 



Re: Ops privs

2007-08-27 Thread Stracka, James (GTI)
Reminds me of a system modification we had back in the day, at another
company, that the SNA Staff could LOGON to VMVTAM but could not issue
LOGOFF.

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Alan Altmark
Sent: Monday, August 27, 2007 12:27 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs


On Monday, 08/27/2007 at 09:20 EDT, Rob van der Heij [EMAIL PROTECTED]

wrote:

 Your scenario would only break when Alan had proposed reverse 
 inheritance or sideways inheritance of privileges (the person who 
 logged on to TESTABC could also have chosen to logon to TCPMAINT, so 
 let's now give TESTABC the authorisation that TCPMAINT would have 
 had).

Rob, I did not propose to give TESTABC the authorization that TCPMAINT 
would have/  Rather, I proposed that TESTABC could, for example:
- XAUTOLOG TCPMAINT because the user could just bring up another
terminal 
session and LOGON TCPMAINT/DISC
- FORCE TCPMAINT because the user could LOGON TCPMAINT/LOGOFF
- SEND TCPMAINT because the user could LOGON TCPMAINT/SET SECUSER 
TESTABC/DISC or just LOGON TCPMAINT and start issuing commands
- SIGNAL SHUTDOWN TCPMAINT because the user could LOGON TCPMAINT/SIGNAL 
SHUTDOWN/DISC

 A somewhat similar problem is with the altuser implementation when the

 target gets the combined authorisation of the worker machine and the 
 owner of the job.

That is only the default RACF implementation and is controlled by a RACF

exit; CP does not redrive the authorization.  In fact, the Common
Criteria 
evaluated configuration requires that this exit be removed.  It's on the

To Do list to allow the RACF admin to identify specific users who are,
in 
fact, batch machines that need that functionality.

Alan Altmark
z/VM Development
IBM Endicott


This message w/attachments (message) may be privileged, confidential or 
proprietary, and if you are not an intended recipient, please notify the 
sender, do not use or share it and delete it. Unless specifically indicated, 
this message is not an offer to sell or a solicitation of any investment 
products or other financial product or service, an official confirmation of any 
transaction, or an official statement of Merrill Lynch. Subject to applicable 
law, Merrill Lynch may monitor, review and retain e-communications (EC) 
traveling through its networks/systems. The laws of the country of each 
sender/recipient may impact the handling of EC, and EC may be archived, 
supervised and produced in countries other than the country in which you are 
located. This message cannot be guaranteed to be secure or error-free. This 
message is subject to terms available at the following link: 
http://www.ml.com/e-communications_terms/. By messaging with Merrill Lynch you 
consent to the foregoing.



Re: Ops privs

2007-08-27 Thread Alan Altmark
On Monday, 08/27/2007 at 12:55 EDT, Colin Allinson 
[EMAIL PROTECTED] wrote:

 I certainly do not want a user to be able to FORCE another simply 
because they 
 have LOGONBY authority for that userid. If allowing this is optional 
(for those 
 shops that want it) then fine but I do not want to be put in a position 
where 
 this is the default authority for LOGONBY. 

I hear you.

I have understood from the various comments like yours that the concerns 
are not actually related to security, but to system management (avoiding 
accidents).  I understand and accept that.

So, no worries about users suddenly and unexpectedly being able to FORCE 
(e.g.) another user.

You will still need to be aware of CP FOR's use of LOGON BY as 
authorization (ESM only, and only when you are not currently the secuser).

Alan Altmark
z/VM Development
IBM Endicott


Debian SSL Server

2007-08-27 Thread Suleiman Shahin

Greetings,
 
I used the Debian SSL Enabler from SNA on zVM 5.1 until yesterday when I 
migrated to zVM
5.3 when it stopped working.
 
I found a couple of errors and corrected them but still no go and I am still 
scratching my head.
Has any one tried Debian SSL Enabler from SNA on 5.3 and can tell me what to 
expect or what to look for?
 
 
Thanks very much  in advance.
 
Suleiman Shahin
 
 
  
_
Learn. Laugh. Share. Reallivemoms is right place!
http://www.reallivemoms.com?ocid=TXT_TAGHMloc=us

Re: Ops privs

2007-08-27 Thread Schuh, Richard
Is FOR new with 5.3? H CP FOR gets me the display for FOrward.

Regards, 
Richard Schuh 


-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Alan Altmark
Sent: Monday, August 27, 2007 10:58 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

On Monday, 08/27/2007 at 12:55 EDT, Colin Allinson 
[EMAIL PROTECTED] wrote:

 I certainly do not want a user to be able to FORCE another simply 
because they 
 have LOGONBY authority for that userid. If allowing this is optional 
(for those 
 shops that want it) then fine but I do not want to be put in a
position 
where 
 this is the default authority for LOGONBY. 

I hear you.

I have understood from the various comments like yours that the concerns

are not actually related to security, but to system management (avoiding

accidents).  I understand and accept that.

So, no worries about users suddenly and unexpectedly being able to FORCE

(e.g.) another user.

You will still need to be aware of CP FOR's use of LOGON BY as 
authorization (ESM only, and only when you are not currently the
secuser).

Alan Altmark
z/VM Development
IBM Endicott


Re: RSCS

2007-08-27 Thread Colleen Brown
Hi,
I passed this on to our RSCS ID person and he has corrected the 
statement.  However, the correction won't show up in the current book and 
help files.
Don't know how this one slipped past!  Thanks for finding it!

Colleen M Brown 
IBM z/VM and Related Products Development and Service 



Schuh, Richard [EMAIL PROTECTED] 
Sent by: The IBM z/VM Operating System IBMVM@LISTSERV.UARK.EDU
08/17/2007 04:06 PM
Please respond to
The IBM z/VM Operating System IBMVM@LISTSERV.UARK.EDU


To
IBMVM@LISTSERV.UARK.EDU
cc

Subject
RSCS






There is no RCF for a HELP display, but one that looks somewhat strange is 
the HELP RSCS TCPNJE display. If you look at the STREAMS= parameter in the 
syntax diagram, the non-default line calls for a rather odd entry. J
Regards,
Richard Schuh 


Re: RSCS

2007-08-27 Thread Schuh, Richard
Thanks for fixing and responding.

 

Regards, 
Richard Schuh 

 



From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Colleen Brown
Sent: Monday, August 27, 2007 9:49 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: RSCS

 


Hi, 
I passed this on to our RSCS ID person and he has corrected the
statement.  However, the correction won't show up in the current book
and help files. 
Don't know how this one slipped past!  Thanks for finding it! 

Colleen M Brown   
IBM z/VM and Related Products Development and Service 



Schuh, Richard [EMAIL PROTECTED] 
Sent by: The IBM z/VM Operating System IBMVM@LISTSERV.UARK.EDU 

08/17/2007 04:06 PM 

Please respond to
The IBM z/VM Operating System IBMVM@LISTSERV.UARK.EDU

To

IBMVM@LISTSERV.UARK.EDU 

cc

 

Subject

RSCS

 

 

 




There is no RCF for a HELP display, but one that looks somewhat strange
is the HELP RSCS TCPNJE display. If you look at the STREAMS= parameter
in the syntax diagram, the non-default line calls for a rather odd
entry. :-) 

Regards,
Richard Schuh 



Re: Ops privs

2007-08-27 Thread Alan Altmark
On Monday, 08/27/2007 at 02:17 EDT, Schuh, Richard [EMAIL PROTECTED] 
wrote:
 Is FOR new with 5.3? H CP FOR gets me the display for FOrward.

Yes, it is new with z/VM 5.3.  And the abbreviation of FORWARD is now 
FORW.  :-)

Alan Altmark
z/VM Development
IBM Endicott


Re: Debian SSL Server

2007-08-27 Thread David Boyes
It would help if you supplied us what errors you're seeing, and what you
see in the TCPIP log.

 

I used the Debian SSL Enabler from SNA on zVM 5.1 until yesterday when I
migrated to zVM
5.3 when it stopped working.
I found a couple of errors and corrected them but still no go and I am
still scratching my head.
Has any one tried Debian SSL Enabler from SNA on 5.3 and can tell me
what to expect or what to look for?





Re: Ops privs

2007-08-27 Thread Rob van der Heij
On 8/27/07, David Boyes [EMAIL PROTECTED] wrote:

 I think we will have to agree to disagree. Most of the security weasels
 I know claim that the less information you give a potential intruder,
 the better, but that stems from their mindset that *everyone* is a
 potential intruder.

More like different context. For *authentication* it is good practice
not to reveal any information when wrong credentials are supplied.
This is where the weasels come from. It was just a nasty prank of me
to do a password check that provided hits like 4 good, 2 at the wrong
place or the next password response. The approach to revoke a
user when someone tried to logon to that account 3 times with a
wrong password is imho more a security problem than a solution to one.

But once the user is authenticated, it's not a potential intruder
anymore. At that point, we normally assume the user is doing the right
thing because business conduct guidelines will guide the user. If such
a relation does not exist, you have entirely different problems that
don't get solved by a  computer says No response (see my Less that
G approach).

Rob


Re: Debian SSL Server

2007-08-27 Thread Mark Bodenstein

David,

The interface between SSLSERV and TCPIP has changed in z/VM 5.3.  See:

http://www.vm.ibm.com/related/tcpip/tcprl2rl.html#rl2ssl

Does Sine Nomine have a version of the SSL 
Enabler incorporating the appropriate RPM for z/VM 5.3?


Thanks,

Mark

At 02:25 PM 8/27/2007, David Boyes wrote:
It would help if you supplied us what errors 
you’re seeing, and what you see in the TCPIP log…..


I used the Debian SSL Enabler from SNA on zVM 
5.1 until yesterday when I migrated to zVM

5.3 when it stopped working.
I found a couple of errors and corrected them 
but still no go and I am still scratching my head.
Has any one tried Debian SSL Enabler from SNA on 
5.3 and can tell me what to expect or what to look for?




Mark Bodenstein ([EMAIL PROTECTED])
Cornell University 

Re: Debian SSL Server

2007-08-27 Thread Suleiman Shahin

Hello Dave,
 
I am not seeing any errors,  but I can attach the log from TCPIP and SSLSERV.
 
Suleiman Shahin 


Date: Mon, 27 Aug 2007 14:25:06 -0400From: [EMAIL PROTECTED]: Re: Debian SSL 
ServerTo: IBMVM@LISTSERV.UARK.EDU




It would help if you supplied us what errors you’re seeing, and what you see in 
the TCPIP log…..
 

I used the Debian SSL Enabler from SNA on zVM 5.1 until yesterday when I 
migrated to zVM5.3 when it stopped working.I found a couple of errors and 
corrected them but still no go and I am still scratching my head.Has any one 
tried Debian SSL Enabler from SNA on 5.3 and can tell me what to expect or what 
to look for?
_
Learn. Laugh. Share. Reallivemoms is right place!
http://www.reallivemoms.com?ocid=TXT_TAGHMloc=us

Re: Debian SSL Server

2007-08-27 Thread David Boyes
Does Sine Nomine have a version of the SSL Enabler incorporating the
appropriate RPM for z/VM 5.3?



Not yet. It's behind a few other significant pieces of paying work at
the moment. It's a few weeks away at best. 

 

More later. 

 

-- db



Re: Ops privs

2007-08-27 Thread Alan Altmark
On Sunday, 08/26/2007 at 10:18 EDT, David Boyes [EMAIL PROTECTED] 
wrote:
  Bundle RACF??? That might be a blow to the users of VM:Secure and
 other
  ESMs.
 
 Is it? Let's think about that:

The only way it is possible to ship RACF installed and enabled with the 
z/VM base is to provide a snap out ordering feature (a la z/OS) that 
ships with RACF uninstalled and disabled.  The snap out feature results 
in a price reduction equal to the price of RACF.

The rules for this sort of thing were ironed out by lawyers in prior 
centuries and are well established.

 1) The major difference between RACF and the alternatives is that all of
 the alternatives are easier to use, administer, operate and understand.

I'm sorry, David, but your brush is too broad.  z/OS shops who bring in 
Linux and z/VM usually prefer RACF on z/VM as it is much easier for them 
to use, administer, operate, and understand.  Why?  Because RACF is 
extremely popular with z/OS customers.

Alan Altmark
z/VM Development
IBM Endicott


Re: Ops privs

2007-08-27 Thread Stracka, James (GTI)
Better the evil you know then the one you do not know?

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Alan Altmark
Sent: Monday, August 27, 2007 3:32 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs


On Sunday, 08/26/2007 at 10:18 EDT, David Boyes [EMAIL PROTECTED] 
wrote:
  Bundle RACF??? That might be a blow to the users of VM:Secure and
 other
  ESMs.
 
 Is it? Let's think about that:

The only way it is possible to ship RACF installed and enabled with the 
z/VM base is to provide a snap out ordering feature (a la z/OS) that 
ships with RACF uninstalled and disabled.  The snap out feature
results 
in a price reduction equal to the price of RACF.

The rules for this sort of thing were ironed out by lawyers in prior 
centuries and are well established.

 1) The major difference between RACF and the alternatives is that all 
 of the alternatives are easier to use, administer, operate and 
 understand.

I'm sorry, David, but your brush is too broad.  z/OS shops who bring in 
Linux and z/VM usually prefer RACF on z/VM as it is much easier for them

to use, administer, operate, and understand.  Why?  Because RACF is 
extremely popular with z/OS customers.

Alan Altmark
z/VM Development
IBM Endicott


This message w/attachments (message) may be privileged, confidential or 
proprietary, and if you are not an intended recipient, please notify the 
sender, do not use or share it and delete it. Unless specifically indicated, 
this message is not an offer to sell or a solicitation of any investment 
products or other financial product or service, an official confirmation of any 
transaction, or an official statement of Merrill Lynch. Subject to applicable 
law, Merrill Lynch may monitor, review and retain e-communications (EC) 
traveling through its networks/systems. The laws of the country of each 
sender/recipient may impact the handling of EC, and EC may be archived, 
supervised and produced in countries other than the country in which you are 
located. This message cannot be guaranteed to be secure or error-free. This 
message is subject to terms available at the following link: 
http://www.ml.com/e-communications_terms/. By messaging with Merrill Lynch you 
consent to the foregoing.



Re: Ops privs

2007-08-27 Thread Schuh, Richard
Out of curiosity, what percentages of the new licenses are for shops
that fit the category z/OS shops who bring in Linux and z/VM?

Regards, 
Richard Schuh 


-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Alan Altmark
Sent: Monday, August 27, 2007 12:32 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

On Sunday, 08/26/2007 at 10:18 EDT, David Boyes [EMAIL PROTECTED] 
wrote:
  Bundle RACF??? That might be a blow to the users of VM:Secure and
 other
  ESMs.
 
 Is it? Let's think about that:

The only way it is possible to ship RACF installed and enabled with the 
z/VM base is to provide a snap out ordering feature (a la z/OS) that 
ships with RACF uninstalled and disabled.  The snap out feature
results 
in a price reduction equal to the price of RACF.

The rules for this sort of thing were ironed out by lawyers in prior 
centuries and are well established.

 1) The major difference between RACF and the alternatives is that all
of
 the alternatives are easier to use, administer, operate and
understand.

I'm sorry, David, but your brush is too broad.  z/OS shops who bring in 
Linux and z/VM usually prefer RACF on z/VM as it is much easier for them

to use, administer, operate, and understand.  Why?  Because RACF is 
extremely popular with z/OS customers.

Alan Altmark
z/VM Development
IBM Endicott


Re: Debian SSL Server

2007-08-27 Thread Mark Bodenstein

Thanks David.  Glad to hear you're getting paying work.  :-)

Mark

At 03:08 PM 8/27/2007, you wrote:
Does Sine Nomine have a version of the SSL Enabler incorporating the 
appropriate RPM for z/VM 5.3?


Not yet. It's behind a few other significant pieces of paying work 
at the moment. It's a few weeks away at best.


More later.

-- db


Re: Ops privs

2007-08-27 Thread Alan Altmark
On Monday, 08/27/2007 at 03:38 EDT, Schuh, Richard [EMAIL PROTECTED] 
wrote:
 Out of curiosity, what percentages of the new licenses are for shops
 that fit the category z/OS shops who bring in Linux and z/VM?

I have no idea.  z/OS sysprog attendance at z/VM and Linux sessions at 
conferences continues to grow.  My in-box is getting more notes that start 
Hi.  My name is Bob and I'm a z/OS syprog.  [HI, BOB.]

Alan Altmark
z/VM Development
IBM Endicott


Re: Debian SSL Server

2007-08-27 Thread Suleiman Shahin

Dave,
 
I am attaching the TCPIP log for you to look at if you wish.
 
Thanks.  Suleiman Shahin 


Date: Mon, 27 Aug 2007 15:41:22 -0400From: [EMAIL PROTECTED]: Re: Debian SSL 
ServerTo: [EMAIL PROTECTED] David.  Glad to hear you're getting paying work.  
:-)MarkAt 03:08 PM 8/27/2007, you wrote:
Does Sine Nomine have a version of the SSL Enabler incorporating the 
appropriate RPM for z/VM 5.3?Not yet. It’s behind a few other significant 
pieces of paying work at the moment. It’s a few weeks away at best.  More 
later.  -- db
_
Find a local pizza place, movie theater, and more….then map the best route!
http://maps.live.com/default.aspx?v=2ss=yp.bars~yp.pizza~yp.movie%20theatercp=42.358996~-71.056691style=rlvl=13tilt=-90dir=0alt=-1000scene=950607encType=1FORM=MGAC01

Re: Ops privs

2007-08-27 Thread Adam Thornton

On Aug 27, 2007, at 2:53 PM, Alan Altmark wrote:


On Monday, 08/27/2007 at 03:38 EDT, Schuh, Richard [EMAIL PROTECTED]
wrote:

Out of curiosity, what percentages of the new licenses are for shops
that fit the category z/OS shops who bring in Linux and z/VM?


I have no idea.  z/OS sysprog attendance at z/VM and Linux sessions at
conferences continues to grow.  My in-box is getting more notes  
that start

Hi.  My name is Bob and I'm a z/OS syprog.  [HI, BOB.]


I wonder why they're all named Bob.  That's sort of weird.

Adam


Re: Ops privs

2007-08-27 Thread Kris Buelens
I know why they're all called BOB: to drive z/OS, you can't drink ;-)

About 10 years ago an action was organized in Belgium to avoid drunk
drivers: people driving to a party should select a BOB, the guy that
wouldn't drink alcohol and drive the company home.  I don't know who
selected BOB as name, but it was a success, and since then everyone here
know who BOB is.  I heard that a similar action was since then undertaken in
other countries, but with another name than BOB.


2007/8/27, Adam Thornton [EMAIL PROTECTED]:


  I have no idea.  z/OS sysprog attendance at z/VM and Linux sessions at
  conferences continues to grow.  My in-box is getting more notes
  that start
  Hi.  My name is Bob and I'm a z/OS syprog.  [HI, BOB.]

 I wonder why they're all named Bob.  That's sort of weird.

 Adam


-- 
Kris Buelens,
IBM Belgium, VM customer support


Re: Ops privs

2007-08-27 Thread Richards.Bob
Alan,

Hi. My name really is Bob and I'm a z/OS sysprog. pause for greeting
And I am looking for a new job! :-)

Seriously, as of last week, I have been informed that my position has
been eliminated. If anyone on this list is looking for an individual
with basic z/VM and Linux skills coupled with extensive z/OS skills,
please drop me a note offline.

My apologies to the list administrator for not clearing this blatant
attempt for assistance in my job search in advance of posting it.   

Bob Richards
VP, Enterprise Technologist

-
- Enterprise Technology Infrastructure- 
- Mainframe Services  Capacity Performance Mgmt  -
- Office:  404-575-2798Mobile:  610-246-2943   -
- email:   [EMAIL PROTECTED] -



-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Alan Altmark
Sent: Monday, August 27, 2007 3:53 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

On Monday, 08/27/2007 at 03:38 EDT, Schuh, Richard [EMAIL PROTECTED] 
wrote:
 Out of curiosity, what percentages of the new licenses are for shops
 that fit the category z/OS shops who bring in Linux and z/VM?

I have no idea.  z/OS sysprog attendance at z/VM and Linux sessions at 
conferences continues to grow.  My in-box is getting more notes that
start 
Hi.  My name is Bob and I'm a z/OS syprog.  [HI, BOB.]

Alan Altmark
z/VM Development
IBM Endicott 
  
  
  
LEGAL DISCLAIMER 
The information transmitted is intended solely for the individual or entity to 
which it is addressed and may contain confidential and/or privileged material. 
Any review, retransmission, dissemination or other use of or taking action in 
reliance upon this information by persons or entities other than the intended 
recipient is prohibited. If you have received this email in error please 
contact the sender and delete the material from any computer. 
  
SunTrust and Seeing beyond money are federally registered service marks of 
SunTrust Banks, Inc. 
[ST:XCL] 
 
 
 
 


Re: Ops privs

2007-08-27 Thread David Boyes
  1) The major difference between RACF and the alternatives is that
all of
  the alternatives are easier to use, administer, operate and
understand.
 z/OS shops who bring in
 Linux and z/VM usually prefer RACF on z/VM as it is much easier for
them
 to use, administer, operate, and understand.  Why?  Because RACF is
 extremely popular with z/OS customers.

A koan for Considering the Presence of Buddha-Nature in ESMs:

I hit myself on the head with a hammer. It hurts. I hit myself again. It
still hurts. I hit myself with a padded hammer. It hurts less, but it's
still being hit with a hammer -- but it's a familiar pain and I know
what to do to treat it. I hit myself on the head with a empty bleach
bottle. It still hurts, but it's a different kind of hurt. 

Here endeth the tale. 

If you're familiar with RACF elsewhere, then yes, you've already taken
the first blow to the head, and it's a familiar pain (but not to the
head, or at least not immediately). There are net-new Z sites that don't
have RACF/zOS. 

Considered in the abstract (ie, without a pre-existing RACF investment),
RACF *is* really, really ugly compared to VM:Secure or even ACF2. The
reasons the alternatives exist is to ameliorate that ugly nature. 

I've managed systems with all three tools installed at various times.
IMHO, RACF's principal advantages are that popular presence on the Other
Side, and that you (IBM) own it and can decide to supply it by default
if you choose to do so w/o dealing with an outside entity. 

You can put a lot of lipstick on that pig with RACTOOLS and some
front-end execs, but it's still a pig deep down.


Re: Ops privs

2007-08-27 Thread Stephen Buckles
Sorry; supporting z/OS DRIVES one to drinking!




Kris Buelens [EMAIL PROTECTED] 
Sent by: The IBM z/VM Operating System IBMVM@listserv.uark.edu
08/27/2007 03:10 PM
Please respond to
The IBM z/VM Operating System IBMVM@listserv.uark.edu


To
IBMVM@listserv.uark.edu
cc

Subject
Re: Ops privs






I know why they're all called BOB: to drive z/OS, you can't drink ;-)

About 10 years ago an action was organized in Belgium to avoid drunk 
drivers: people driving to a party should select a BOB, the guy that 
wouldn't drink alcohol and drive the company home.  I don't know who 
selected BOB as name, but it was a success, and since then everyone here 
know who BOB is.  I heard that a similar action was since then undertaken 
in other countries, but with another name than BOB. 


2007/8/27, Adam Thornton [EMAIL PROTECTED]:

 I have no idea.  z/OS sysprog attendance at z/VM and Linux sessions at
 conferences continues to grow.  My in-box is getting more notes
 that start
 Hi.  My name is Bob and I'm a z/OS syprog.  [HI, BOB.] 

I wonder why they're all named Bob.  That's sort of weird.

Adam

-- 
Kris Buelens,
IBM Belgium, VM customer support 


-
This e-mail and any attachments are intended only for the
individual or company to which it is addressed and may contain
information which is privileged, confidential and prohibited from
disclosure or unauthorized use under applicable law.  If you are
not the intended recipient of this e-mail, you are hereby notified
that any use, dissemination, or copying of this e-mail or the
information contained in this e-mail is strictly prohibited by the
sender.  If you have received this transmission in error, please
return the material received to the sender and delete all copies
from your system.

Re: Ops privs

2007-08-27 Thread Dave Jones
A completely uneducated guess would be  50%, and perhaps as high as 
90%. Shops that are already comfortable with the IBM mainframe 'mindset' 
are much more willing, imho, to consider migrating workload to z/VM and 
Linux than organizations that have no previous mainframe experience.


Schuh, Richard wrote:

Out of curiosity, what percentages of the new licenses are for shops
that fit the category z/OS shops who bring in Linux and z/VM?

Regards, 
Richard Schuh 



-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Alan Altmark
Sent: Monday, August 27, 2007 12:32 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

On Sunday, 08/26/2007 at 10:18 EDT, David Boyes [EMAIL PROTECTED] 
wrote:

Bundle RACF??? That might be a blow to the users of VM:Secure and

other

ESMs.

Is it? Let's think about that:


The only way it is possible to ship RACF installed and enabled with the 
z/VM base is to provide a snap out ordering feature (a la z/OS) that 
ships with RACF uninstalled and disabled.  The snap out feature
results 
in a price reduction equal to the price of RACF.


The rules for this sort of thing were ironed out by lawyers in prior 
centuries and are well established.



1) The major difference between RACF and the alternatives is that all

of

the alternatives are easier to use, administer, operate and

understand.

I'm sorry, David, but your brush is too broad.  z/OS shops who bring in 
Linux and z/VM usually prefer RACF on z/VM as it is much easier for them


to use, administer, operate, and understand.  Why?  Because RACF is 
extremely popular with z/OS customers.


Alan Altmark
z/VM Development
IBM Endicott


--
DJ
V/Soft


Re: Ops privs

2007-08-27 Thread McKown, John
 If that is true, then I shudder to think of what the MS Windows people
are abusing! I mean, I know that MS apologists are on dreamy dust and
have little connection to reality anymore.
 
 

--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage
Administrative Services Group
Information Technology

This message (including any attachments) contains confidential
information intended for a specific individual and purpose, and its
content is protected by law.  If you are not the intended recipient, you
should delete this message and are hereby notified that any disclosure,
copying, or distribution of this transmission, or taking any action
based on it, is strictly prohibited.
  

-Original Message-
From: The IBM z/VM Operating System
[mailto:[EMAIL PROTECTED] On Behalf Of Stephen Buckles
Sent: Monday, August 27, 2007 3:35 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs



Sorry; supporting z/OS DRIVES one to drinking! 



 



Re: Ops privs

2007-08-27 Thread Schuh, Richard
At one time I think I remember Barton mentioning something about getting
a lot of business from smaller shops. Of course, it could be dangerous
to trust my memory in a critical situation, I couldn't even remember the
command for building an NSS this morning. I had to look it up.

Regards, 
Richard Schuh 


-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Dave Jones
Sent: Monday, August 27, 2007 1:41 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

A completely uneducated guess would be  50%, and perhaps as high as 
90%. Shops that are already comfortable with the IBM mainframe 'mindset'

are much more willing, imho, to consider migrating workload to z/VM and 
Linux than organizations that have no previous mainframe experience.

Schuh, Richard wrote:
 Out of curiosity, what percentages of the new licenses are for shops
 that fit the category z/OS shops who bring in Linux and z/VM?
 
 Regards, 
 Richard Schuh 
 
 
 -Original Message-
 From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED]
On
 Behalf Of Alan Altmark
 Sent: Monday, August 27, 2007 12:32 PM
 To: IBMVM@LISTSERV.UARK.EDU
 Subject: Re: Ops privs
 
 On Sunday, 08/26/2007 at 10:18 EDT, David Boyes
[EMAIL PROTECTED] 
 wrote:
 Bundle RACF??? That might be a blow to the users of VM:Secure and
 other
 ESMs.
 Is it? Let's think about that:
 
 The only way it is possible to ship RACF installed and enabled with
the 
 z/VM base is to provide a snap out ordering feature (a la z/OS) that

 ships with RACF uninstalled and disabled.  The snap out feature
 results 
 in a price reduction equal to the price of RACF.
 
 The rules for this sort of thing were ironed out by lawyers in prior 
 centuries and are well established.
 
 1) The major difference between RACF and the alternatives is that all
 of
 the alternatives are easier to use, administer, operate and
 understand.
 
 I'm sorry, David, but your brush is too broad.  z/OS shops who bring
in 
 Linux and z/VM usually prefer RACF on z/VM as it is much easier for
them
 
 to use, administer, operate, and understand.  Why?  Because RACF is 
 extremely popular with z/OS customers.
 
 Alan Altmark
 z/VM Development
 IBM Endicott

-- 
DJ
V/Soft


Re: Ops privs

2007-08-27 Thread Rob van der Heij
On 8/27/07, Kris Buelens [EMAIL PROTECTED] wrote:
 I know why they're all called BOB: to drive z/OS, you can't drink ;-)

 About 10 years ago an action was organized in Belgium to avoid drunk
 drivers: people driving to a party should select a BOB, the guy that
 wouldn't drink alcohol and drive the company home.  I don't know who
 selected BOB as name, but it was a success, and since then everyone here
 know who BOB is.  I heard that a similar action was since then undertaken in
 other countries, but with another name than BOB.

It's a Dutch acronym for Bewust Onbeschonken Bestuurder
(deliberately not-drunk driver)

Rob (not Bob)


Re: Ops privs

2007-08-27 Thread Schuh, Richard
I thought it quite the opposite; you had to be a heavy drinker to drive
z/OS (or at least its predecessor). :-)

 

Regards, 
Richard Schuh 

 



From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Kris Buelens
Sent: Monday, August 27, 2007 1:10 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

 

I know why they're all called BOB: to drive z/OS, you can't drink ;-)

About 10 years ago an action was organized in Belgium to avoid drunk
drivers: people driving to a party should select a BOB, the guy that
wouldn't drink alcohol and drive the company home.  I don't know who
selected BOB as name, but it was a success, and since then everyone here
know who BOB is.  I heard that a similar action was since then
undertaken in other countries, but with another name than BOB. 



2007/8/27, Adam Thornton [EMAIL PROTECTED]:


 I have no idea.  z/OS sysprog attendance at z/VM and Linux sessions at
 conferences continues to grow.  My in-box is getting more notes
 that start
 Hi.  My name is Bob and I'm a z/OS syprog.  [HI, BOB.] 

I wonder why they're all named Bob.  That's sort of weird.

Adam


-- 
Kris Buelens,
IBM Belgium, VM customer support 



Re: Ops privs

2007-08-27 Thread Gregg C Levine
Hello!
I happen to know. Coffee. There are more coffee shops, like Starbucks but
stranger then the ones around me, in their home city.

Disturbing, but true.

--
Gregg C Levine [EMAIL PROTECTED]
The Force will be with you. Always. Obi-Wan Kenobi
  

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of McKown, John
Sent: Monday, August 27, 2007 4:43 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

 If that is true, then I shudder to think of what the MS Windows people are
abusing! I mean, I know that MS apologists are on dreamy dust and have
little connection to reality anymore.
 
 
--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage
Administrative Services Group
Information Technology

This message (including any attachments) contains confidential information
intended for a specific individual and purpose, and its content is protected
by law.  If you are not the intended recipient, you should delete this
message and are hereby notified that any disclosure, copying, or
distribution of this transmission, or taking any action based on it, is
strictly prohibited.
  
-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Stephen Buckles
Sent: Monday, August 27, 2007 3:35 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Ops privs

Sorry; supporting z/OS DRIVES one to drinking!