Gavin Appleton is out of the office.
I will be out of the office starting 31/12/2008 and will not return until 15/01/2009. I will respond to your message when I return.
Re: MIGRATE EXEC 5.3.0 to 5.4.0
Hello Larry, This is a known problem. We shipped a bad 5VMRSC40 MIGP530 file on z/VM 5.4.0. Through a different direct email to you I have attached a good co py of this file. You need to replace the copy on the MAINT 51D disk with th is new copy and restart MIGRATE. Tami Zebrowski-Darrow IBM Corp VMSES/E Service and Support
CPSYNTAX Utility
Hello. I have made changes to system config and am now trying to run CPSYNTAX and am getting Unknown CP/CMS command. Which minidisk is this utility on? Thanks in advance, Brent Litster Brent Litster Zions Management Services Company 2185 South 3270 West West Valley City 84119 (801) 844-5545 blits...@zionsbank.com
Re: CPSYNTAX Utility
Brent, the CPSYNTAX exec is found on MAINT's 193 minidisk. Happy New Year, too. Brent Litster wrote: Hello. I have made changes to system config and am now trying to run CPSYNTAX and am getting Unknown CP/CMS command. Which minidisk is this utility on? Thanks in advance, Brent Litster Brent Litster Zions Management Services Company 2185 South 3270 West West Valley City 84119 (801) 844-5545 blits...@zionsbank.com -- DJ V/Soft z/VM and mainframe Linux expertise, training, consulting, and software development www.vsoft-software.com
Re: CPSYNTAX Utility
Thanks Dave. And Happy New Year to you and everyone else on this list. Brent Brent Litster Zions Management Services Company 2185 South 3270 West West Valley City 84119 (801) 844-5545 blits...@zionsbank.com -Original Message- From: The IBM z/VM Operating System [mailto:ib...@listserv.uark.edu] On Behalf Of Dave Jones Sent: Wednesday, December 31, 2008 10:26 AM To: IBMVM@LISTSERV.UARK.EDU Subject: Re: CPSYNTAX Utility Brent, the CPSYNTAX exec is found on MAINT's 193 minidisk. Happy New Year, too. Brent Litster wrote: Hello. I have made changes to system config and am now trying to run CPSYNTAX and am getting Unknown CP/CMS command. Which minidisk is this utility on? Thanks in advance, Brent Litster Brent Litster Zions Management Services Company 2185 South 3270 West West Valley City 84119 (801) 844-5545 blits...@zionsbank.com -- DJ V/Soft z/VM and mainframe Linux expertise, training, consulting, and software development www.vsoft-software.com
ibmvm@listserv.uark.edu
Copied from the VMWare Communities website. This may be an x86-only virtualization event but I would like to see IBM (and maybe others) prese nt zSeries virtualization successes too. /Tom Kern = = == Call for Papers 3rd International Workshop on Virtualization Technologies in Distributed Computing (VTDC-09) http://grid-appliance.org/vtdc09 In conjunction with ICAC 2009 Barcelona, Spain, June 15 2009 = = == Workshop scope: Virtualization has proven to be a powerful enabler in the field of distributed computing and has led to the emergence of the cloud computing paradigm and the provisioning of Infrastructure-as-a-Service (IaaS). This new paradigm raises challenges ranging from performance evaluation of IaaS platforms, through new methods of resource management including providing Service Level Agreements (SLAs) and energy- and cost-efficient schedules, to the emergence of supporting technologies such as virtual appliance management. For the last three years, the VTDC workshop has served as a forum for the exchange of ideas and experiences studying the challenges and opportunities created by IaaS/cloud computing and virtualization technologies. VTDC brings together researchers in academia and industry who are involved in research, development and planning activities involving the use of virtualization in the context of distributed systems, where the opportunities and challenges with respect to the management of such virtualized systems is of interest to the ICAC community at large. Important dates: * Submission deadline: February 20th, 2009 * Notification of acceptance: March 23rd, 2009 * Final manuscripts due: April 6, 2009 * Workshop: June 15, 2009 Topics: Authors are invited to submit original and unpublished work that exposes a new problem, advocates a specific solution, or reports on actual experience. Papers should be submitted as full-length 8 page papers of double column text using single space 10pt size type on an 8.5x11 paper. Papers will be published in the proceedings of the workshop. VTDC 2009 topics of interest include, but are not limited to: * Infrastructure as a service (IaaS) * Virtualization in data centers * Virtualization for resource management and QoS assurance * Security aspects of using virtualization in a distributed environme nt * Virtual networks * Virtual data, storage as a service * Fault tolerance in virtualized environments * Virtualization in P2P systems * Virtualization-based adaptive/autonomic systems * The creation and management of environments/appliances * Virtualization technologies * Performance modeling (applications and systems) * Virtualization techniques for energy/thermal management * Case studies of applications on IaaS platforms * Deployment studies of virtualization technologies * Tools relevant to virtualization Organization: * General Chair: o Kate Keahey, University of Chicago, Argonne National Laboratory * Program Chair: o Renato Figueiredo, University of Florida * Steering Committee Chair: o Jose A. B. Fortes, University of Florida * Program Committee: o Franck Cappello, INRIA o Jeff Chase, Duke University o Peter Dinda, Northwestern University o Ian Foster, University of Chicago, Argonne National Laboratory o Sebastien Goasguen, Clemson University o Sverre Jarp, CERN o John Lange, Northwestern University o Matei Ripeanu, University of British Columbia o Paul Ruth, University of Mississippi o Kyung Ryu, IBM o Chris Samuel, Victorian Partnership for Advanced Computing o Frank Siebenlist, Argonne National Laboratory o Dilma da Silva, IBM o Mike Wray, HP o Dongyan Xu, Purdue University o Mazin Yousif, Avirtec o Ming Zhao, Florida International University * Publicity Chair: o Ming Zhao, Florida International University For more information: VTDC-09 Web site: http://grid-appliance.org/vtdc09 ICAC-09 Web site: http://icac2009.acis.ufl.edu
Setting a code page in z/VM
Dear all, I am just trying to figure out what has to be done to use code page 273 o r 1141 correctly under z/VM? I can not find a config statement aside from the character default statem ent but there is no real code page statement. Does the code page setting come from the LE setup? Best regards and a Happy New Year 2009! Florian
Re: MIGRATE EXEC 5.3.0 to 5.4.0
Thanks Tami, looks like that took care of it. Apparently I have some parts to re-work for PerfToolKit (I had applied a ptf or 2 to that), but MIGRATE ran to successful completion. I had searched IBMLINK for any hits on MIGRATE, but only found a couple that were not relevant. Thanks again! Larry J. Brown Shelter Insurance - Information Services 573-214-6314 ljbr...@shelterinsurance.com This e-mail is intended only for its addressee and may contain information that is privileged, confidential, or otherwise protected from disclosure. If you have received this communication in error, please notify us immediately by e-mailing postmas...@shelterinsurance.com; then delete the original message.
Removing SPOOL volume that is empty
Hi I just added a spool volume dynamically (have not brought in the SYSCONFIG YET) but I want to remove it. There is nothing on it currently (I JUST ADDED IT). How do I accomplish this? I want to change the label on the volume to match our standards! Thank You, Terry Martin Lockheed Martin - Information Technology z/OS z/VM Systems - Performance and Tuning Cell - 443 632-4191 Work - 410 786-0386 terry.ma...@cms.hhs.gov
Fwd: [IP] Creating a rogue CA certificate
Interesting new attack on SSL-based security - compromise the CA infrastructure. Begin forwarded message: -- Forwarded Message From: InfoSec News ale...@infosecnews.org Date: Wed, 31 Dec 2008 09:08:14 + To: i...@infosecnews.org i...@infosecnews.org Subject: [ISN] Creating a rogue CA certificate http://www.win.tue.nl/hashclash/rogue-ca/ December 30, 2008 MD5 considered harmful today Creating a rogue CA certificate -=- Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger -=- Summary We have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows us to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol. Our attack takes advantage of a weakness in the MD5 cryptographic hash function that allows the construction of different messages with the same MD5 hash. This is known as an MD5 collision. Previous work on MD5 collisions between 2004 and 2007 showed that the use of this hash function in digital signatures can lead to theoretical attack scenarios. Our current work proves that at least one attack scenario can be exploited in practice, thus exposing the security infrastructure of the web to realistic threats. As a result of this successfull attack, we are currently in possession of a rogue Certification Authority certificate. This certificate will be accepted as valid and trusted by all common browsers, because it appears to be signed by one of the root CAs that browsers trust by default. In turn, any website certificate signed by our rogue CA will be trusted as well. If an unsuspecting user is a victim of a man-in- the-middle attack using such a certificate, they will be assured that the connection is secure through all common security indicators: a https:// url in the address bar, a closed padlock and messages such as This certificate is OK if they chose to inspect the certificate. This successful proof of concept shows that the certificate validation performed by browsers can be subverted and malicious attackers might be able to monitor or tamper with data sent to secure websites. Banking and e-commerce sites are particularly at risk because of the high value of the information secured with HTTPS on those sites. With a rogue CA certificate, attackers would be able to execute practically undetectable phishing attacks against such sites. The infrastructure of Certification Authorities is meant to prevent exactly this type of attack. Our work shows that known weaknesses in the MD5 hash function can be exploited in realistic attack, due to the fact that even after years of warnings about the lack of security of MD5, some root CAs are still using this broken hash function. The vulnerability we expose is not in the SSL protocol or the web servers and browsers that implement it, but in the Public Key Infrastructure. This infrastructure has applications in other areas than the web, but we have not investigated all other possible attack scenarios. So other attack scenarios beyond the web are conceivable, such as in the areas of code signing, e-mail security, and in other areas that use certificates for enabling digital signatures or public key encryption. The rest of this document will explain our work and its implications in a fair amount of detail. In the interest of protecting the Internet against malicious attacks using our technique, we have omitted the critical details of our sophisticated and highly optimized method for computing MD5 collisions. A scientific paper about our method is in preparation and will be released after a few months, so that the affected Certification Authorities have had some time to remedy this vulnerability. [...] http://www.win.tue.nl/hashclash/rogue-ca/
Re: [IP] Creating a rogue CA certificate
On Dec 31, 2008, at 4:34 PM, David Boyes wrote: Interesting new attack on SSL-based security - compromise the CA infrastructure. Amazing that CAs still use MD5. I would have expected Thawte, anyway, to know better. Adam
Re: Removing SPOOL volume that is empty
On: Wed, Dec 31, 2008 at 05:30:07PM -0500,Martin, Terry R. (CMS/CTR) (CTR) Wrote: } I just added a spool volume dynamically (have not brought in the } SYSCONFIG YET) but I want to remove it. There is nothing on it currently } (I JUST ADDED IT). How do I accomplish this? If it hasn't aquirred any files as yet, just DETACH xxx FROM SYSTEM } I want to change the label on the volume to match our standards! Laudable, but late. -- Rich Greenberg N Ft Myers, FL, USA richgr atsign panix.com + 1 239 543 1353 Eastern time. N6LRT I speak for myself my dogs only.VM'er since CP-67 Canines:Val, Red, Shasta Casey (RIP), Red Zero, Siberians Owner:Chinook-L Retired at the beach Asst Owner:Sibernet-L
Re: Removing SPOOL volume that is empty
Without access to manuals at the moment, off the top of my head I'd try: CP DRAIN ALL rdevaddr CP STOP ALL rdevaddr But before trying them, crack open the CP Commands and Utilities manual and look up the syntax and usage. Mike Walter Hewitt Associates P.S. SPOOL test are best done on a 2nd level test system before trying it in production. - Original Message - From: Martin, Terry R. (CMS/CTR) (CTR) [terry.mar...@cms.hhs.gov] Sent: 12/31/2008 05:30 PM EST To: IBMVM@LISTSERV.UARK.EDU Subject: Removing SPOOL volume that is empty Hi I just added a spool volume dynamically (have not brought in the SYSCONFIG YET) but I want to remove it. There is nothing on it currently (I JUST ADDED IT). How do I accomplish this? I want to change the label on the volume to match our standards! Thank You, Terry Martin Lockheed Martin - Information Technology z/OS z/VM Systems - Performance and Tuning Cell - 443 632-4191 Work - 410 786-0386 terry.ma...@cms.hhs.gov The information contained in this e-mail and any accompanying documents may contain information that is confidential or otherwise protected from disclosure. If you are not the intended recipient of this message, or if this message has been addressed to you in error, please immediately alert the sender by reply e-mail and then delete this message, including any attachments. Any dissemination, distribution or other use of the contents of this message by anyone other than the intended recipient is strictly prohibited. All messages sent to and from this e-mail address may be monitored as permitted by applicable law and regulations to ensure compliance with our internal policies and to protect our business. E-mails are not secure and cannot be guaranteed to be error free as they can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by e-mail.