Dynalloc (was Macro processor)

2017-12-22 Thread Jon Perryman
Charles broke the cardinal rule in security ( never say never ). Viruses rely on dynalloc. This vulnerability was used against Target where they were recently fined $18 million and lost millions in revenues for their data breach.  In MVS, many of the dynalloc exposures don't exist but there are e

Re: Dynalloc (was Macro processor)

2017-12-22 Thread Charles Mills
Subject: Dynalloc (was Macro processor) Charles broke the cardinal rule in security ( never say never ). Viruses rely on dynalloc. This vulnerability was used against Target where they were recently fined $18 million and lost millions in revenues for their data breach. In MVS, many of the dynalloc

Re: Dynalloc (was Macro processor)

2017-12-22 Thread Paul Gilmartin
On 2017-12-22, at 14:26:07, Jon Perryman wrote: > Charles broke the cardinal rule in security ( never say never ). Viruses rely > on dynalloc. This vulnerability was used against Target where they were > recently fined $18 million and lost millions in revenues for their data > breach. > In MVS

Re: Dynalloc (was Macro processor)

2017-12-22 Thread Jon Perryman
Again with the motivated reasoning. Give me any fact that it's unrelated. Give me any fact that I'm wrong. Of course it's based on dynamic allocation. In a permanent allocation situation (like JCL, CICS or possibly IMS), you are defining datasets that can be used at that time. From a security st

Re: Dynalloc (was Macro processor)

2017-12-22 Thread Jon Perryman
How can RACF stop someone when they have a legitimate need to update something like clists? Or do we keep making the processes so complicated that more people jump to Unix where they have complete freedom and control. Security is a balancing act of risk versus cost. Jon. On Friday, Decembe

FW: Dynalloc (was Macro processor)

2017-12-22 Thread Farley, Peter x23353
Apologies, I accidentally sent this reply so Jon directly instead of to the list. Peter -Original Message- From: Farley, Peter x23353 Sent: Friday, December 22, 2017 7:34 PM To: 'Jon Perryman' Subject: RE: Dynalloc (was Macro processor) Jon, I think our confusion (or a

Re: Dynalloc (was Macro processor)

2017-12-22 Thread Paul Gilmartin
On 2017-12-22, at 17:37:52, Jon Perryman wrote: > How can RACF stop someone when they have a legitimate need to update > something like clists? Or do we keep making the processes so complicated that > more people jump to Unix where they have complete freedom and control. > Security is a balanci

AW: Dynalloc (was Macro processor)

2017-12-23 Thread David Stokes
>>How can RACF stop someone when they have a legitimate need It can't of course. That's why the Target attack (like most others) essentially revolved around a bit of social engineering and getting access to a privileged account. Along with poor malware detection, lack of network segregation and

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Jon Perryman
This started as me being surprised that Cobol and PL/I now support Dynalloc because of the security risks. I satisfied that it exists and for whatever reason, it is no longer considered a security exposure. My apologies for allowing this to drag into a discussion about security theory in this gr

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Ed Jaffe
On 12/23/2017 8:18 AM, Jon Perryman wrote: People are clever and will find ways to abuse things if they are motivated. Dynalloc can easily be exploited. It's not exploited because no one has been motivated to exploit it. Security risks are big news in this century and there have been some *o

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Walt Farrell
On Fri, 22 Dec 2017 21:26:07 +, Jon Perryman wrote: >Charles broke the cardinal rule in security ( never say never ). Viruses rely >on dynalloc. This vulnerability was used against Target where they >were >recently fined $18 million and lost millions in revenues for their data >breach.  C

AW: Dynalloc (was Macro processor)

2017-12-23 Thread David Stokes
] Im Auftrag von Walt Farrell Gesendet: Samstag, 23. Dezember 2017 18:10 An: ASSEMBLER-LIST@LISTSERV.UGA.EDU Betreff: Re: Dynalloc (was Macro processor) On Fri, 22 Dec 2017 21:26:07 +, Jon Perryman wrote: >Charles broke the cardinal rule in security ( never say never ). Viruses rely

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Jeremy Nicoll
On Sat, 23 Dec 2017, at 16:18, Jon Perryman wrote: > Most security breaches need multiple exploits on MVS. Often, eliminating > a single exploit is enough to to stop that particular breach. > SAF (RACF) secures resources but there will be always be exposures (e.g. > A security admin can't possib

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Paul Gilmartin
On 2017-12-23, at 10:09:47, Walt Farrell wrote: > On Fri, 22 Dec 2017 21:26:07 +, Jon Perryman wrote: > >> Charles broke the cardinal rule in security ( never say never ). Viruses >> rely on dynalloc. This vulnerability was used against Target where they >> >were recently fined $18 million

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Jon Perryman
I only wanted to know why dynalloc is no longer considered an exposure. When these people did the risk analysis for dynalloc on MVS, what made them decide why it's not an exposure and does not need to be a controlled resource? Thanks, Jon. On Saturday, December 23, 2017 8:40 AM, Ed Jaffe

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Jon Perryman
I was going from a court ruling but David Stokes noted a whitepaper that confirms my suspicions in the court ruling. Target does not have z/OS nor dynalloc (by name). However Unix is by design dynalloc all the time. Jon On Saturday, December 23, 2017 9:09 AM, Walt Farrell wrote: On Fri

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Jeremy Nicoll
On Sat, 23 Dec 2017, at 18:40, Jon Perryman wrote: > I only wanted to know why dynalloc is no longer considered an exposure. > When these people did the risk analysis for dynalloc on MVS, what made > them decide why it's not an exposure and does not need to be a > controlled resource? Maybe it'

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Jon Perryman
Naming conventions only go so far in securing departmental data because of exceptions. For instance, there is departmental overlap such as payroll and general ledger. As for "Production being executed by a user", forgive me if I implied that. I was specifically saying production being executed b

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Jeremy Nicoll
On Sat, 23 Dec 2017, at 19:42, Jon Perryman wrote: > Naming conventions only go so far in securing departmental data because > of exceptions. For instance, there is departmental overlap such as > payroll and general ledger. But if there's proper separation between production ids (which run the p

Re: Dynalloc (was Macro processor)

2017-12-23 Thread retired mainframer
Am I missing something or are the arguments for disabling dynamic allocation nearly a clone of the old arguments for restricting AMASPZAP?

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Jon Perryman
Proper separation from user departments is usually not a problem from the IT perspective. User departments generally run in CICS or IMS which is very controlled (unless in VSE I think). Instead, this would most likely be an IT person where they maintain programs. You sound very confident and it'

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Keven Hall
Jon,It seems to me that what you’re saying is that if one works in a badly run z/OS shop with unprotected UserIDs and unscrupulous employees who share their user credentials then that might result in a security exposure.  In tha

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Jon Perryman
Keven, As I said before, I wanted to know why it's not considered an exposure now. I'm not interested in convincing anyone it's an exposure because it won't help to answer my question.  Jon.     On Saturday, December 23, 2017 8:48 PM, Keven Hall wrote:Jon,It seems to me that what you’re s

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Farley, Peter x23353
your question? Peter -Original Message- From: IBM Mainframe Assembler List [mailto:ASSEMBLER-LIST@LISTSERV.UGA.EDU] On Behalf Of Jon Perryman Sent: Sunday, December 24, 2017 12:39 AM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Dynalloc (was Macro processor) EXTERNAL: This email origi

Re: Dynalloc (was Macro processor)

2017-12-23 Thread Keven Hall
] On Behalf Of Jon Perryman Sent: Sunday, December 24, 2017 12:39 AM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Dynalloc (was Macro processor) EXTERNAL: This email originated from outside of Broadridge. Do not click any links or open any attachments unless you trust the sender and know

Re: Dynalloc (was Macro processor)

2017-12-24 Thread Jon Perryman
Jon Perryman Sent: Sunday, December 24, 2017 12:39 AM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Dynalloc (was Macro processor) EXTERNAL: This email originated from outside of Broadridge. Do not click any links or open any attachments unless you trust the sender and know the content is safe. K

Re: Dynalloc (was Macro processor)

2017-12-24 Thread Peter Relson
The argument that dynalloc is the problem strikes me as somewhat dubious. It was suggested that you need to restrict dynalloc because an allocated data set is a way to capture data that the user is already authorized to access. That is not the "problem" statement; a data set might contribute to

Re: Dynalloc (was Macro processor)

2017-12-24 Thread Paul Gilmartin
On 2017-12-24, at 00:10:58, Farley, Peter x23353 wrote: > > ... Without necessary access rights, allocation is a useless tool for > malfeasance of any kind. > Ummm... Denial of Service? -- gil

Re: Dynalloc (was Macro processor)

2017-12-24 Thread Farley, Peter x23353
. Peter -Original Message- From: IBM Mainframe Assembler List [mailto:ASSEMBLER-LIST@LISTSERV.UGA.EDU] On Behalf Of Paul Gilmartin Sent: Sunday, December 24, 2017 9:33 AM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Dynalloc (was Macro processor) On 2017-12-24, at 00:10:58, Farley, Peter

AW: Dynalloc (was Macro processor)

2017-12-24 Thread David Stokes
Farley, Peter x23353 Gesendet: Sonntag, 24. Dezember 2017 19:02 An: ASSEMBLER-LIST@LISTSERV.UGA.EDU Betreff: Re: Dynalloc (was Macro processor) OK, possibly for 5 minutes or so. Mainframe operations personnel are trained, in my experience, to prioritize such issues in order to keep the batch stream

Re: Dynalloc (was Macro processor)

2017-12-24 Thread Paul Gilmartin
On 2017-12-24, at 11:01:38, Farley, Peter x23353 wrote: > > If truly a DOS attempt, then this would be followed the next day by promotion > to the street for the responsible programmer and reprimands for the code > reviewer(s) for missing such a trick. > But the DoS could be inadvertent, by a

Re: Dynalloc (was Macro processor)

2017-12-24 Thread Charles Mills
: Sunday, December 24, 2017 9:33 AM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Dynalloc (was Macro processor) On 2017-12-24, at 00:10:58, Farley, Peter x23353 wrote: > > ... Without necessary access rights, allocation is a useless tool for malfeasance of any kind. > Ummm...

Re: Dynalloc (was Macro processor)

2017-12-24 Thread Walt Farrell
On Sun, 24 Dec 2017 12:17:22 -0700, Paul Gilmartin wrote: >On 2017-12-24, at 11:01:38, Farley, Peter x23353 wrote: >> >> If truly a DOS attempt, then this would be followed the next day by >> promotion to the street for the responsible programmer and reprimands for >> the code reviewer(s) for

Re: Dynalloc (was Macro processor)

2017-12-24 Thread Walt Farrell
On Sun, 24 Dec 2017 05:38:48 +, Jon Perryman wrote: >Keven, As I said before, I wanted to know why it's not considered an exposure >now. Why do you assume it was ever considered an exposure? -- Walt

Re: Dynalloc (was Macro processor)

2017-12-24 Thread Jon Perryman
Think like a security admin instead of programmer. You are right that dynalloc is not a problem but to a security admin, it is an exposure. Exposures combine to become a problem.  Here are some examples (UNRELATED to dynalloc) that may help to clarify. 1. Don't you have customers that refuse to

Re: Dynalloc (was Macro processor)

2017-12-24 Thread Michael Stack
Walt, you wrote, "Therefore, RACF is not allowing an ENQ on a DSN, because RACF has no idea that an ENQ is being done." and it occurs to me to point out that, likewise, ENQ is not preventing access to a DSN because ENQ has no idea that a dsn is being accessed (which, of course, is different from

Re: Dynalloc (was Macro processor)

2017-12-26 Thread Farley, Peter x23353
IST@LISTSERV.UGA.EDU] Im Auftrag von Farley, Peter x23353 Gesendet: Sonntag, 24. Dezember 2017 19:02 An: ASSEMBLER-LIST@LISTSERV.UGA.EDU Betreff: Re: Dynalloc (was Macro processor) OK, possibly for 5 minutes or so. Mainframe operations personnel are trained, in my experience, to prioritize suc

Re: Dynalloc (was Macro processor)

2017-12-26 Thread Farley, Peter x23353
24, 2017 2:17 PM To: ASSEMBLER-LIST@LISTSERV.UGA.EDU Subject: Re: Dynalloc (was Macro processor) EXTERNAL: This email originated from outside of Broadridge. Do not click any links or open any attachments unless you trust the sender and know the content is safe. On 2017-12-24, at 11:01:38, Far

Re: Dynalloc (was Macro processor)

2017-12-27 Thread Tom Marchant
On Sun, 24 Dec 2017 15:58:10 -0500, Walt Farrell wrote: >RACF is not allowing an ENQ on a DSN, because RACF has no idea >that an ENQ is being done. If anyone were to control that, it would >be data set allocation, who would have to invoke RACF to ask if >the user would have authority to eventua

Re: Dynalloc (was Macro processor)

2017-12-27 Thread Walt Farrell
On Wed, 27 Dec 2017 08:22:33 -0500, Tom Marchant wrote: >It is even more difficult for RACF to answer the question if the data >set may only be accessed by certain programs. Excellent point, Tom, and an even better example than mine. Thanks. -- Walt

Re: AW: Dynalloc (was Macro processor)

2017-12-23 Thread Jon Perryman
I'm not saying that it comes down to dynalloc. Security never comes down to a single exploitation. Think about alcatraz which despite all the extreme security measures still had an escape. I'm sayiing that dynalloc is not controlled by security admins and there are simple scenario's to exploit i