Re: ATTACH with RSAPF=YES

2017-05-25 Thread Walt Farrell
On Thu, 25 May 2017 19:33:22 -0500, John McKown wrote: >​Thanks. I may put in an RFC on the BPX1FRK documentation to ask that it >explicitly state that the APF status is maintained. Granted, in the Usage >Notes, there is the sentence: "​In other respects, for z/OS UNIX the child >is identical t

Re: ATTACH with RSAPF=YES

2017-05-25 Thread John McKown
On Thu, May 25, 2017 at 4:52 PM, Walt Farrell wrote: > On Thu, 25 May 2017 14:24:05 -0500, John McKown < > john.archie.mck...@gmail.com> wrote: > > >​Well, from what I vaguely gather, this entire thread started off with the > >question of "how does an APF authorized program run a non-APF authoriz

Re: ATTACH with RSAPF=YES

2017-05-25 Thread Walt Farrell
On Thu, 25 May 2017 14:24:05 -0500, John McKown wrote: >​Well, from what I vaguely gather, this entire thread started off with the >question of "how does an APF authorized program run a non-APF authorized >program from a library not on the APF list?". Apparently the OP was trying >this and got a

Re: ATTACH with RSAPF=YES

2017-05-25 Thread John McKown
On Thu, May 25, 2017 at 1:50 PM, Walt Farrell wrote: > On Thu, 25 May 2017 11:46:20 -0500, John McKown < > john.archie.mck...@gmail.com> wrote: > > >On Thu, May 25, 2017 at 10:44 AM, Walt Farrell > >wrote: > >> execmvs() would be better than LINKX or ATTACHX for this scenario, in > >> general, a

Re: ATTACH with RSAPF=YES

2017-05-25 Thread Walt Farrell
On Thu, 25 May 2017 11:46:20 -0500, John McKown wrote: >On Thu, May 25, 2017 at 10:44 AM, Walt Farrell >wrote: >> execmvs() would be better than LINKX or ATTACHX for this scenario, in >> general, as it handles all the environmental cleanup and handles any >> necessary authorization issues. >> >

Re: ATTACH with RSAPF=YES

2017-05-25 Thread John McKown
On Thu, May 25, 2017 at 10:44 AM, Walt Farrell wrote: > ​ > > >a UNIX directory. So I was not envisioning him using a UNIX exec() > function > >to run the non-APF program in the child. I was thinking the "historic" use > >of LINKX or maybe ATTACHX.​ The mention of a TASKLIB for a dynamically > >a

Re: ATTACH with RSAPF=YES

2017-05-25 Thread Walt Farrell
On Thu, 25 May 2017 08:11:31 -0500, John McKown wrote: >On Wed, May 24, 2017 at 2:28 PM, Peter Hunkeler wrote: > >> > The above is why I really "push" the UNIX fork() alternative. >> [snip] >> >> >If a "steplib" is needed, the initial child program can simply DYNALLOC >> the DSNs and then use a

Re: ATTACH with RSAPF=YES

2017-05-25 Thread Peter Relson
>perhaps attaching as a job step may be an answer? No it is not. The fact that the initiator uses RSAPF=YES simply correlates to the fact that that option is intended for the initiator's use. Peter Relson z/OS Core Technology Design ---

Re: ATTACH with RSAPF=YES

2017-05-25 Thread John McKown
On Wed, May 24, 2017 at 2:28 PM, Peter Hunkeler wrote: > > The above is why I really "push" the UNIX fork() alternative. > [snip] > > >If a "steplib" is needed, the initial child program can simply DYNALLOC > the DSNs and then use an ATTACHX with a TASKLIB. > > Assuming there will be an exec() in

Re: ATTACH with RSAPF=YES

2017-05-24 Thread Jim Mulder
As the documentation clearly states: "The system checks for this attribute only when the program is being invoked with a parameter string of more than 100 bytes and the program is APF authorized. In this case, if the LONGPARM attribute is not set on, the system fails the invocation. " Wha

Re: ATTACH with RSAPF=YES

2017-05-24 Thread Paul Gilmartin
On Wed, 24 May 2017 16:40:16 -0400, Jim Mulder wrote: > > Uhhh, Clem's program is not the Initiator, and does not >do what the Initiator does to request LongParm checking, so no >LongParm checking is done for its ATTACHes. > Sounds like a bug. Or an integrity threat. If I had Clem's program I

Re: ATTACH with RSAPF=YES

2017-05-24 Thread Jim Mulder
> > That is not the way the Initiator works. The Initiator is not > >APF-authorized. > > > I'll assume Initiator uses an SVC or PC to launch the program with > suitable APF-authority (in a separate address space?) similar to what > fork() and BPX1EXM do. What component performs the allocations

Re: AW: Re: ATTACH with RSAPF=YES

2017-05-24 Thread Paul Gilmartin
On Wed, 24 May 2017 21:28:26 +0200, Peter Hunkeler wrote: >> The above is why I really "push" the UNIX fork() alternative. >[snip] > >>If a "steplib" is needed, the initial child program can simply DYNALLOC the >>DSNs and then use an ATTACHX with a TASKLIB. > >Assuming there will be an exec() in

AW: Re: ATTACH with RSAPF=YES

2017-05-24 Thread Peter Hunkeler
> The above is why I really "push" the UNIX fork() alternative. [snip] >If a "steplib" is needed, the initial child program can simply DYNALLOC the >DSNs and then use an ATTACHX with a TASKLIB. Assuming there will be an exec() in the forked process, a steplib can be setup simply by setting

Re: ATTACH with RSAPF=YES

2017-05-24 Thread Paul Gilmartin
On Wed, 24 May 2017 13:22:23 -0400, Jim Mulder wrote: > That is not the way the Initiator works. The Initiator is not >APF-authorized. > I'll assume Initiator uses an SVC or PC to launch the program with suitable APF-authority (in a separate address space?) similar to what fork() and BPX1EXM d

Re: ATTACH with RSAPF=YES

2017-05-24 Thread Out The Darkness Just for All My Haters
t; BRR14 AND BACK WE GO > * > -- > > > Clem Clarke > > > Robin Atwood wrote: > >> Yes, the point was taken. I am now investigating using fork() to spin-off >> another address space. >> >> Thanks >> Robin >> &

Re: ATTACH with RSAPF=YES

2017-05-24 Thread Out The Darkness Just for All My Haters
All I can tell you is this. There are hard drives being brought into my home with CD blanks and being taken out one at a time and sold. Various devices being connected to the router and live streamed. When Bright House came to install the new router I ordered I was told it was set up and secure.

Re: ATTACH with RSAPF=YES

2017-05-24 Thread John McKown
On Wed, May 24, 2017 at 12:22 PM, Jim Mulder wrote: > That is not the way the Initiator works. The Initiator is not > APF-authorized. > > Does your program use any key 8 storage (like the save area that was > provided when your program was ATTACHed, or the subpool 0 area that you > FREEMAIN

Re: ATTACH with RSAPF=YES

2017-05-24 Thread Jim Mulder
That is not the way the Initiator works. The Initiator is not APF-authorized. Does your program use any key 8 storage (like the save area that was provided when your program was ATTACHed, or the subpool 0 area that you FREEMAIN when the program that you ATTACHed ends)? Could the unauthor

Re: ATTACH with RSAPF=YES

2017-05-23 Thread Clem Clarke
Clarke Robin Atwood wrote: Yes, the point was taken. I am now investigating using fork() to spin-off another address space. Thanks Robin -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Peter Relson Sent: 23 May 2017 00:24 To: IBM-MAIN@LISTS

Re: ATTACH with RSAPF=YES

2017-05-23 Thread Robin Atwood
EDU Subject: Re: ATTACH with RSAPF=YES On Tue, May 23, 2017 at 2:43 AM, Robin Atwood wrote: > Yes, the point was taken. I am now investigating using fork() to > spin-off another address space. > ​From my vague monitoring of this thread, I think that is a wonderful idea. I don't know how

Re: ATTACH with RSAPF=YES

2017-05-23 Thread John McKown
On Tue, May 23, 2017 at 2:43 AM, Robin Atwood wrote: > Yes, the point was taken. I am now investigating using fork() to spin-off > another address space. > ​From my vague monitoring of this thread, I think that is a wonderful idea. I don't know how much you're "in to" what can be done, but there

Re: ATTACH with RSAPF=YES

2017-05-23 Thread Robin Atwood
: Re: ATTACH with RSAPF=YES As best I can tell (unless I missed it), the OP has not answered the question of whether they understand that after doing something to remove authorization from the space, they are OK with leaving the space unauthorized. If that is not the case, we might as well end the

Re: ATTACH with RSAPF=YES

2017-05-22 Thread Peter Relson
there is no way to do that while maintaining system integrity, and it is unlikely anyone would accept such a "solution". Walt Farrell has pointed out approaches that are conceivably OK. ATTACH with RSAPF=YES should be off the table. Peter Relson z/OS Core Technol

Re: ATTACH with RSAPF=YES

2017-05-22 Thread Robin Atwood
2017 22:43 To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES On Fri, 19 May 2017 08:37:00 -0500, Walt Farrell wrote: >On Fri, 19 May 2017 20:05:43 +0700, Robin Atwood wrote: > >>(2) is interesting. Actually my first thought was to use ASCRE to >>spawn a new ASID to e

Re: ATTACH with RSAPF=YES

2017-05-19 Thread Paul Gilmartin
On Fri, 19 May 2017 08:37:00 -0500, Walt Farrell wrote: >On Fri, 19 May 2017 20:05:43 +0700, Robin Atwood wrote: > >>(2) is interesting. Actually my first thought was to use ASCRE to spawn a new >>ASID to execute the command but >>I have heard that address space creation/destruction is a major ov

Re: ATTACH with RSAPF=YES

2017-05-19 Thread Walt Farrell
On Fri, 19 May 2017 20:05:43 +0700, Robin Atwood wrote: >(2) is interesting. Actually my first thought was to use ASCRE to spawn a new >ASID to execute the command but >I have heard that address space creation/destruction is a major overhead and >so focused on ATTACH. My first question would b

Re: ATTACH with RSAPF=YES

2017-05-19 Thread Robin Atwood
@LISTSERV.UA.EDU] On Behalf Of Walt Farrell Sent: 19 May 2017 19:34 To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES On Fri, 19 May 2017 14:32:27 +0700, Robin Atwood wrote: >The situation would be that the client routes a command to the server >on the host which routes i

Re: ATTACH with RSAPF=YES

2017-05-19 Thread Walt Farrell
On Fri, 19 May 2017 14:32:27 +0700, Robin Atwood wrote: >The situation would be that the client routes a command to the server on the >host which routes it to a dependent ASID. The DA gets the ACEE of the user and >executes the command via IJKEFTSR. The command is one of a suite of >Rexx execs

Re: ATTACH with RSAPF=YES

2017-05-19 Thread Robin Atwood
@LISTSERV.UA.EDU] On Behalf Of Tom Marchant Sent: 19 May 2017 01:47 To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES On Thu, 18 May 2017 08:09:03 -0700, Charles Mills wrote: >I hope you are getting the idea how risky this entire approach is. You >are playing "you bet you

Re: ATTACH with RSAPF=YES

2017-05-19 Thread Robin Atwood
Harminc Sent: 18 May 2017 23:23 To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES On 18 May 2017 at 08:56, Robin Atwood wrote: > What is the situation of a module that is loaded from an authorised > library but was linked with AC=0? Is it authorised? Can it get auth

Re: ATTACH with RSAPF=YES

2017-05-18 Thread Tom Marchant
On Thu, 18 May 2017 08:09:03 -0700, Charles Mills wrote: >I hope you are getting the idea how risky this entire approach is. You are >playing "you bet your mainframe." You might get it right today And if you don't get it right, you might discover that, or you might not. It is very difficult

Re: ATTACH with RSAPF=YES

2017-05-18 Thread Tony Harminc
On 18 May 2017 at 08:56, Robin Atwood wrote: > What is the situation of a module that is loaded from an authorised library > but was linked with AC=0? Is it authorised? Can it get authorised? > Modules are not authorized. Job steps are authorized. If you are able to get your job step from an un

Re: ATTACH with RSAPF=YES

2017-05-18 Thread Charles Mills
ERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES Early versions of SDSF provided an SVC that would make the user authorized. It was 'supported' in that it was part of an official IBM program product. There was a general discomfort with this strategy even though the SVC code tried very

Re: ATTACH with RSAPF=YES

2017-05-18 Thread Jesse 1 Robinson
Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Charles Mills Sent: Thursday, May 18, 2017 8:09 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: (External):Re: ATTACH with RSAPF=YES Tom answered most of your question but in addition > Can it get authorised? I don't

Re: ATTACH with RSAPF=YES

2017-05-18 Thread Charles Mills
--Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Robin Atwood Sent: Thursday, May 18, 2017 5:56 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES What is the situation of a module that is loaded from an authorised librar

Re: ATTACH with RSAPF=YES

2017-05-18 Thread Tom Marchant
On Thu, 18 May 2017 19:56:27 +0700, Robin Atwood wrote: >What is the situation of a module that is loaded from an authorised library >but was linked with AC=0? Is it authorised? Can it get authorised? Loaded by whom? When you EXEC PGM=x, if program X is linked AC=1 and is loaded from an APF aut

Re: ATTACH with RSAPF=YES

2017-05-18 Thread Robin Atwood
20:58 To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES We have a requirement to attach user modules from an unauthorised library and execute them from an STC which runs APF authorised. You need to reject that requirement. It cannot be accomplished while maintaining system

Re: ATTACH with RSAPF=YES

2017-05-17 Thread Binyamin Dissen
IN@LISTSERV.UA.EDU :>Subject: Re: ATTACH with RSAPF=YES :> :>On Tue, 16 May 2017 20:42:42 +0700, Robin Atwood wrote: :> :>>>However, as you're running work on behalf of various end-users, I hope you're authenticating those users and >running the work under the prope

Re: ATTACH with RSAPF=YES

2017-05-17 Thread Robin Atwood
Peter- Thanks for this, I shall ponder. Robin -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Peter Relson Sent: 16 May 2017 20:58 To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES We have a requirement to attach user

Re: ATTACH with RSAPF=YES

2017-05-17 Thread Robin Atwood
@LISTSERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES On Tue, 16 May 2017 20:42:42 +0700, Robin Atwood wrote: >>However, as you're running work on behalf of various end-users, I hope you're >>authenticating those users and >running the work under the proper end-user >>

Re: ATTACH with RSAPF=YES

2017-05-16 Thread Walt Farrell
On Tue, 16 May 2017 20:42:42 +0700, Robin Atwood wrote: >>However, as you're running work on behalf of various end-users, I hope you're >>authenticating those users and >running the work under the proper end-user >>identity in each case. And that would probably require authorization >of the >>

Re: ATTACH with RSAPF=YES

2017-05-16 Thread Peter Relson
We have a requirement to attach user modules from an unauthorised library and execute them from an STC which runs APF authorised. You need to reject that requirement. It cannot be accomplished while maintaining system integrity. Use of something like "fork" can perhaps accomplish the goal with

Re: ATTACH with RSAPF=YES

2017-05-16 Thread Robin Atwood
>However, as you're running work on behalf of various end-users, I hope you're >authenticating those users and >running the work under the proper end-user >identity in each case. And that would probably require authorization >of the >STC. Yes, we run under the ACEE of the user. Robin ---

Re: ATTACH with RSAPF=YES

2017-05-16 Thread Walt Farrell
On Tue, 16 May 2017 14:09:49 +0700, Robin Atwood wrote: >Thanks to everyone for replying, I would never realised you had to flip >JSCBAUTH from the macro documentation. >The actual business requirement is that we run Rexx execs that call ISPF >services on behalf of workstation users >running an I

Re: ATTACH with RSAPF=YES

2017-05-16 Thread Charles Mills
AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES Thanks to everyone for replying, I would never realised you had to flip JSCBAUTH from the macro documentation. The actual business requirement is that we run Rexx execs that call ISPF services on behalf of workstation users running

Re: ATTACH with RSAPF=YES

2017-05-16 Thread Robin Atwood
Of Binyamin Dissen Sent: 15 May 2017 20:56 To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: ATTACH with RSAPF=YES Well, if you want to run unauthorized stuff you would first need to set your job as non-APF by resetting the bit. Of course, your authorized key8 storage will be subject to change by the

Re: ATTACH with RSAPF=YES

2017-05-15 Thread Mike Shaw
On 5/15/2017 12:45 PM, Greg Dyck wrote: On 5/15/2017 11:27 AM, Paul Gilmartin wrote: What does the TSO TMP use to accomplish this? Extreme care ;-) It has been a while, but my memory is that the TMP stops all of the tasks above (or is that below?) it in the task tree and then passes the reque

Re: ATTACH with RSAPF=YES

2017-05-15 Thread Greg Dyck
On 5/15/2017 11:27 AM, Paul Gilmartin wrote: What does the TSO TMP use to accomplish this? Extreme care ;-) It has been a while, but my memory is that the TMP stops all of the tasks above (or is that below?) it in the task tree and then passes the request to a special jobstep task (with it's

Re: ATTACH with RSAPF=YES

2017-05-15 Thread Paul Gilmartin
On Mon, 15 May 2017 10:28:37 -0400, Steve Smith wrote: >RSAPF probably shouldn't even be documented. AFAIK, it's only purpose is >to allow the system to support unauthorized tasks and jobs, and is used >only with the creation of a new job-step task. And there is no >communication between the ini

Re: ATTACH with RSAPF=YES

2017-05-15 Thread Jesse 1 Robinson
Sent: Monday, May 15, 2017 7:29 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: (External):Re: ATTACH with RSAPF=YES RSAPF probably shouldn't even be documented. AFAIK, it's only purpose is to allow the system to support unauthorized tasks and jobs, and is used only with the creation of a ne

Re: ATTACH with RSAPF=YES

2017-05-15 Thread Steve Smith
May 2017 15:18:38 +0700, Robin Atwood > wrote: > > >We have a requirement to attach user modules from an unauthorised library > >and execute them from an STC which > > > >runs APF authorised. Calling ATTACH with RSAPF=YES seems to do exactly > what > >I want ...

Re: ATTACH with RSAPF=YES

2017-05-15 Thread Walt Farrell
On Mon, 15 May 2017 15:18:38 +0700, Robin Atwood wrote: >We have a requirement to attach user modules from an unauthorised library >and execute them from an STC which > >runs APF authorised. Calling ATTACH with RSAPF=YES seems to do exactly what >I want ... It _can_ do what you w

Re: ATTACH with RSAPF=YES

2017-05-15 Thread Binyamin Dissen
case? On Mon, 15 May 2017 15:18:38 +0700 Robin Atwood wrote: :>We have a requirement to attach user modules from an unauthorised library :>and execute them from an STC which :> :>runs APF authorised. Calling ATTACH with RSAPF=YES seems to do exactly what :>I want but every time I tr

Re: ATTACH with RSAPF=YES

2017-05-15 Thread John McKown
On Mon, May 15, 2017 at 7:30 AM, Greg Dyck wrote: > Be aware that what you are attempting to do is dangerous and has the > potential to create system integrity exposures that would allow a problem > state program to cause a system failure. I am not saying that it can not > be done safely, becaus

Re: ATTACH with RSAPF=YES

2017-05-15 Thread Greg Dyck
Be aware that what you are attempting to do is dangerous and has the potential to create system integrity exposures that would allow a problem state program to cause a system failure. I am not saying that it can not be done safely, because it can be. But to do it safely without creating a sys

ATTACH with RSAPF=YES

2017-05-15 Thread Robin Atwood
We have a requirement to attach user modules from an unauthorised library and execute them from an STC which runs APF authorised. Calling ATTACH with RSAPF=YES seems to do exactly what I want but every time I try it I get abend S306-0C, "authorised program attaching module from an unautho