Gavin Appleton is out of the office.

2008-12-31 Thread Gavin Appleton

I will be out of the office starting  31/12/2008 and will not return until
15/01/2009.

I will respond to your message when I return.


Re: MIGRATE EXEC 5.3.0 to 5.4.0

2008-12-31 Thread Tami Zebrowski-Darrow
Hello Larry,
This is a known problem. We shipped a bad 5VMRSC40 MIGP530 file on z/VM 

5.4.0.  Through a different direct email to you I have attached a good co
py 
of this file.  You need to replace the copy on the MAINT 51D disk with th
is 
new copy and restart MIGRATE.

Tami Zebrowski-Darrow
IBM Corp
VMSES/E Service and Support


CPSYNTAX Utility

2008-12-31 Thread Brent Litster
Hello. I have made changes to system config and am now trying to run
CPSYNTAX  and am getting  Unknown CP/CMS command.  Which minidisk is
this utility on?

Thanks in advance,

 

Brent Litster

 

Brent Litster

Zions Management Services Company

2185 South 3270 West

West Valley City  84119

(801) 844-5545

blits...@zionsbank.com

 



Re: CPSYNTAX Utility

2008-12-31 Thread Dave Jones

Brent,
the CPSYNTAX exec is found on MAINT's 193 minidisk.

Happy New Year, too.
Brent Litster wrote:

Hello. I have made changes to system config and am now trying to run CPSYNTAX  
and am
getting  Unknown CP/CMS command.  Which minidisk is this utility on?

Thanks in advance,



Brent Litster



Brent Litster

Zions Management Services Company

2185 South 3270 West

West Valley City  84119

(801) 844-5545

blits...@zionsbank.com






--
DJ

V/Soft
  z/VM and mainframe Linux expertise, training,
  consulting, and software development
www.vsoft-software.com


Re: CPSYNTAX Utility

2008-12-31 Thread Brent Litster
Thanks Dave. And Happy New Year to you and everyone else on this list.
Brent

Brent Litster
Zions Management Services Company
2185 South 3270 West
West Valley City  84119
(801) 844-5545
blits...@zionsbank.com
-Original Message-
From: The IBM z/VM Operating System [mailto:ib...@listserv.uark.edu] On
Behalf Of Dave Jones
Sent: Wednesday, December 31, 2008 10:26 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: CPSYNTAX Utility

Brent,
the CPSYNTAX exec is found on MAINT's 193 minidisk.

Happy New Year, too.
Brent Litster wrote:
 Hello. I have made changes to system config and am now trying to run
CPSYNTAX  and am
 getting  Unknown CP/CMS command.  Which minidisk is this utility on?
 
 Thanks in advance,
 
 
 
 Brent Litster
 
 
 
 Brent Litster
 
 Zions Management Services Company
 
 2185 South 3270 West
 
 West Valley City  84119
 
 (801) 844-5545
 
 blits...@zionsbank.com
 
 
 
 

-- 
DJ

V/Soft
   z/VM and mainframe Linux expertise, training,
   consulting, and software development
www.vsoft-software.com


ibmvm@listserv.uark.edu

2008-12-31 Thread Thomas Kern
Copied from the VMWare Communities website. This may be an x86-only
virtualization event but I would like to see IBM (and maybe others) prese
nt
  zSeries virtualization successes too.
 
/Tom Kern


=
=
==
Call for Papers
3rd International Workshop on Virtualization Technologies in
Distributed Computing (VTDC-09)
http://grid-appliance.org/vtdc09

In conjunction with ICAC 2009
Barcelona, Spain, June 15 2009
=
=
==

Workshop scope:

Virtualization has proven to be a powerful enabler in the field of
distributed computing and has led to the emergence of the cloud
computing paradigm and the provisioning of Infrastructure-as-a-Service
(IaaS). This new paradigm raises challenges ranging from performance
evaluation of IaaS platforms, through new methods of resource management
including providing Service Level Agreements (SLAs) and energy- and
cost-efficient schedules, to the emergence of supporting technologies
such as virtual appliance management.

For the last three years, the VTDC workshop has served as a forum for
the exchange of ideas and experiences studying the challenges and
opportunities created by IaaS/cloud computing and virtualization
technologies. VTDC brings together researchers in academia and industry
who are involved in research, development and planning activities
involving the use of virtualization in the context of distributed
systems, where the opportunities and challenges with respect to the
management of such virtualized systems is of interest to the ICAC
community at large.

Important dates:

* Submission deadline: February 20th, 2009
* Notification of acceptance: March 23rd, 2009
* Final manuscripts due: April 6, 2009
* Workshop: June 15, 2009

Topics:

Authors are invited to submit original and unpublished work that
exposes a new problem, advocates a specific solution, or reports on
actual experience. Papers should be submitted as full-length 8 page
papers of double column text using single space 10pt size type on an
8.5x11 paper. Papers will be published in the proceedings of the
workshop. VTDC 2009 topics of interest include, but are not limited to:

* Infrastructure as a service (IaaS)
* Virtualization in data centers
* Virtualization for resource management and QoS assurance
* Security aspects of using virtualization in a distributed environme
nt
* Virtual networks
* Virtual data, storage as a service
* Fault tolerance in virtualized environments
* Virtualization in P2P systems
* Virtualization-based adaptive/autonomic systems
* The creation and management of environments/appliances
* Virtualization technologies
* Performance modeling (applications and systems)
* Virtualization techniques for energy/thermal management
* Case studies of applications on IaaS platforms
* Deployment studies of virtualization technologies
* Tools relevant to virtualization

Organization:

* General Chair:

o Kate Keahey, University of Chicago, Argonne National Laboratory

* Program Chair:

o Renato Figueiredo, University of Florida

* Steering Committee Chair:

o Jose A. B. Fortes, University of Florida

* Program Committee:

o Franck Cappello, INRIA
o Jeff Chase, Duke University
o Peter Dinda, Northwestern University
o Ian Foster, University of Chicago, Argonne National Laboratory
o Sebastien Goasguen, Clemson University
o Sverre Jarp, CERN
o John Lange, Northwestern University
o Matei Ripeanu, University of British Columbia
o Paul Ruth, University of Mississippi
o Kyung Ryu, IBM
o Chris Samuel, Victorian Partnership for Advanced Computing
o Frank Siebenlist, Argonne National Laboratory
o Dilma da Silva, IBM
o Mike Wray, HP
o Dongyan Xu, Purdue University
o Mazin Yousif, Avirtec
o Ming Zhao, Florida International University

* Publicity Chair:

o Ming Zhao, Florida International University

For more information:
VTDC-09 Web site: http://grid-appliance.org/vtdc09
ICAC-09 Web site: http://icac2009.acis.ufl.edu


Setting a code page in z/VM

2008-12-31 Thread Florian Bilek
Dear all,

I am just trying to figure out what has to be done to use code page 273 o
r
1141 correctly under z/VM? 

I can not find a config statement aside from the character default statem
ent
but there is no real code page statement. 

Does the code page setting come from the LE setup?  

Best regards and a Happy New Year 2009!

Florian


Re: MIGRATE EXEC 5.3.0 to 5.4.0

2008-12-31 Thread Larry J Brown
Thanks Tami, looks like that took care of it.  Apparently I have some 
parts to re-work  for PerfToolKit (I had applied a ptf or 2 to that), but 
MIGRATE ran to successful completion.  I had searched IBMLINK for any hits 
on MIGRATE, but only found a couple that were not relevant.  Thanks again!

Larry J. Brown
Shelter Insurance - Information Services
573-214-6314
ljbr...@shelterinsurance.com


This e-mail is intended only for its addressee and may contain information
that is privileged, confidential, or otherwise protected from disclosure.  If
you have received this communication in error, please notify us immediately by
e-mailing postmas...@shelterinsurance.com; then delete the original message.


Removing SPOOL volume that is empty

2008-12-31 Thread Martin, Terry R. (CMS/CTR) (CTR)
Hi

 

I just added a spool volume dynamically (have not brought in the
SYSCONFIG YET) but I want to remove it. There is nothing on it currently
(I JUST ADDED IT). How do I accomplish this?

 

I want to change the label on the volume to match our standards!

 

 

Thank You,

 

Terry Martin

Lockheed Martin - Information Technology

z/OS  z/VM Systems - Performance and Tuning

Cell - 443 632-4191

Work - 410 786-0386

terry.ma...@cms.hhs.gov

 



Fwd: [IP] Creating a rogue CA certificate

2008-12-31 Thread David Boyes
Interesting new attack on SSL-based security - compromise the CA  
infrastructure.





Begin forwarded message:


-- Forwarded Message
From: InfoSec News ale...@infosecnews.org
Date: Wed, 31 Dec 2008 09:08:14 +
To: i...@infosecnews.org i...@infosecnews.org
Subject: [ISN] Creating a rogue CA certificate

http://www.win.tue.nl/hashclash/rogue-ca/

December 30, 2008

MD5 considered harmful today
Creating a rogue CA certificate

-=-

Alexander Sotirov, Marc Stevens,
Jacob Appelbaum, Arjen Lenstra,
David Molnar, Dag Arne Osvik,
Benne de Weger

-=-

Summary

We have identified a vulnerability in the Internet Public Key  
Infrastructure
(PKI) used to issue digital certificates for secure websites. As a  
proof of
concept we executed a practical attack scenario and successfully  
created a

rogue
Certification Authority (CA) certificate trusted by all common web  
browsers.

This certificate allows us to impersonate any website on the Internet,
including
banking and e-commerce sites secured using the HTTPS protocol.

Our attack takes advantage of a weakness in the MD5 cryptographic hash
function
that allows the construction of different messages with the same MD5  
hash.

This
is known as an MD5 collision. Previous work on MD5 collisions  
between 2004

and
2007 showed that the use of this hash function in digital signatures  
can

lead to
theoretical attack scenarios. Our current work proves that at least  
one

attack
scenario can be exploited in practice, thus exposing the security
infrastructure
of the web to realistic threats.

As a result of this successfull attack, we are currently in  
possession of a
rogue Certification Authority certificate. This certificate will be  
accepted

as
valid and trusted by all common browsers, because it appears to be  
signed by

one
of the root CAs that browsers trust by default. In turn, any website
certificate
signed by our rogue CA will be trusted as well. If an unsuspecting  
user is a
victim of a man-in- the-middle attack using such a certificate, they  
will be

assured that the connection is secure through all common security
indicators: a
https://  url in the address bar, a closed padlock and messages  
such as

This
certificate is OK if they chose to inspect the certificate.

This successful proof of concept shows that the certificate validation
performed
by browsers can be subverted and malicious attackers might be able to
monitor or
tamper with data sent to secure websites. Banking and e-commerce  
sites are
particularly at risk because of the high value of the information  
secured

with
HTTPS on those sites. With a rogue CA certificate, attackers would  
be able

to
execute practically undetectable phishing attacks against such sites.

The infrastructure of Certification Authorities is meant to prevent  
exactly

this
type of attack. Our work shows that known weaknesses in the MD5 hash
function
can be exploited in realistic attack, due to the fact that even  
after years

of
warnings about the lack of security of MD5, some root CAs are still  
using

this
broken hash function.

The vulnerability we expose is not in the SSL protocol or the web  
servers

and
browsers that implement it, but in the Public Key Infrastructure. This
infrastructure has applications in other areas than the web, but we  
have not
investigated all other possible attack scenarios. So other attack  
scenarios
beyond the web are conceivable, such as in the areas of code  
signing, e-mail
security, and in other areas that use certificates for enabling  
digital

signatures or public key encryption.

The rest of this document will explain our work and its implications  
in a

fair
amount of detail. In the interest of protecting the Internet against
malicious
attacks using our technique, we have omitted the critical details of  
our
sophisticated and highly optimized method for computing MD5  
collisions. A
scientific paper about our method is in preparation and will be  
released

after a
few months, so that the affected Certification Authorities have had  
some

time to
remedy this vulnerability.

[...]

http://www.win.tue.nl/hashclash/rogue-ca/



Re: [IP] Creating a rogue CA certificate

2008-12-31 Thread Adam Thornton

On Dec 31, 2008, at 4:34 PM, David Boyes wrote:
Interesting new attack on SSL-based security - compromise the CA  
infrastructure.


Amazing that CAs still use MD5.  I would have expected Thawte, anyway,  
to know better.


Adam


Re: Removing SPOOL volume that is empty

2008-12-31 Thread Rich Greenberg
On: Wed, Dec 31, 2008 at 05:30:07PM -0500,Martin, Terry R. (CMS/CTR) (CTR) 
Wrote:

} I just added a spool volume dynamically (have not brought in the
} SYSCONFIG YET) but I want to remove it. There is nothing on it currently
} (I JUST ADDED IT). How do I accomplish this?

If it hasn't aquirred any files as yet, just DETACH xxx FROM SYSTEM

} I want to change the label on the volume to match our standards!

Laudable, but late.

-- 
Rich Greenberg  N Ft Myers, FL, USA richgr atsign panix.com  + 1 239 543 1353
Eastern time.  N6LRT  I speak for myself  my dogs only.VM'er since CP-67
Canines:Val, Red, Shasta  Casey (RIP), Red  Zero, Siberians  Owner:Chinook-L
Retired at the beach Asst Owner:Sibernet-L


Re: Removing SPOOL volume that is empty

2008-12-31 Thread Mike Walter
Without access to manuals at the moment, off the top of my head I'd try:

CP DRAIN ALL rdevaddr
CP STOP ALL rdevaddr

But before trying them,  crack open the CP Commands and Utilities manual and 
look up the syntax and usage.

Mike Walter
Hewitt Associates

P.S. SPOOL test are best done on a 2nd level test system before trying it in 
production.


- Original Message -
From: Martin, Terry R. (CMS/CTR) (CTR) [terry.mar...@cms.hhs.gov]
Sent: 12/31/2008 05:30 PM EST
To: IBMVM@LISTSERV.UARK.EDU
Subject: Removing SPOOL volume that is empty



Hi



I just added a spool volume dynamically (have not brought in the
SYSCONFIG YET) but I want to remove it. There is nothing on it currently
(I JUST ADDED IT). How do I accomplish this?



I want to change the label on the volume to match our standards!





Thank You,



Terry Martin

Lockheed Martin - Information Technology

z/OS  z/VM Systems - Performance and Tuning

Cell - 443 632-4191

Work - 410 786-0386

terry.ma...@cms.hhs.gov






The information contained in this e-mail and any accompanying documents may 
contain information that is confidential or otherwise protected from 
disclosure. If you are not the intended recipient of this message, or if this 
message has been addressed to you in error, please immediately alert the sender 
by reply e-mail and then delete this message, including any attachments. Any 
dissemination, distribution or other use of the contents of this message by 
anyone other than the intended recipient is strictly prohibited. All messages 
sent to and from this e-mail address may be monitored as permitted by 
applicable law and regulations to ensure compliance with our internal policies 
and to protect our business. E-mails are not secure and cannot be guaranteed to 
be error free as they can be intercepted, amended, lost or destroyed, or 
contain viruses. You are deemed to have accepted these risks if you communicate 
with us by e-mail.