Re: The Story of Mainframe Passwords

2022-05-14 Thread Mike Schwab
CVOL had the restriction that if you have a DSN=HLQ.Q2 you can't create DSN=HLQ.Q2.Q3. On Sat, May 14, 2022 at 5:59 AM Leonard D Woren wrote: > > BRODCAST with its 1 byte keys is probably the only data set using > non-unique hardware keys. > > IIRC, the key values have the following meanings: >

Re: The Story of Mainframe Passwords

2022-05-13 Thread Leonard D Woren
BRODCAST with its 1 byte keys is probably the only data set using non-unique hardware keys. IIRC, the key values have the following meanings: * (I think) header with pointers to the first system notice and the first user directory blocks * free (available) record * system notice - operator

Re: The Story of Mainframe Passwords

2022-05-13 Thread Stuart Holland
of Mainframe Passwords Reg Harbeck (a name many of you should recognize) and I are putting together a presentation on the above subject. We would appreciate any material that anyone thought could be included. (I guess I should get all lawyerly here and say if you send it to us you grant us permission

Re: The Story of Mainframe Passwords

2022-05-13 Thread Seymour J Metz
of Steve Smith [sasd...@gmail.com] Sent: Thursday, May 12, 2022 3:14 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: The Story of Mainframe Passwords VSAM does not use hardware keys. What I know of that does are PDS directories (KL=8) (not PDSE), VTOCs (KL=44), SYS1.BRODCAST (KL=1), and just heard

Re: The Story of Mainframe Passwords

2022-05-12 Thread Tom Brennan
May 2022 20:19 To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: The Story of Mainframe Passwords Wow, clear text. But all that doesn't matter if a fellow sysprog modifies my logon clist to put up messages something like this: ACF01234 ID HAS BEEN OFFLINE FOR TOO LONG PLEASE LOGON AGAIN ACF01235 ACF2

Re: The Story of Mainframe Passwords

2022-05-12 Thread John McKown
On Thu, May 12, 2022, 14:04 Tom Brennan wrote: > Yes... Now that you mention it, I do remember the key in PDS > directories, but I never worked with those others directly. Do VSAM > datasets use disk keys? > No. VSAM is really designed with FBA (Fixed Block Architecture) devices in mind. Too

Re: The Story of Mainframe Passwords

2022-05-12 Thread Lennie Dymoke-Bradshaw
Although it was in clear text, it was in a read-protected control block. Lennie -Original Message- From: IBM Mainframe Discussion List On Behalf Of Tom Brennan Sent: 12 May 2022 20:19 To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: The Story of Mainframe Passwords Wow, clear text. But all

Re: The Story of Mainframe Passwords

2022-05-12 Thread Charles Mills
Cool! Any good password stories? Charles -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Steve Smith Sent: Thursday, May 12, 2022 12:14 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: The Story of Mainframe Passwords VSAM does

Re: The Story of Mainframe Passwords

2022-05-12 Thread Tom Brennan
Thanks Steve. And for now on I'll search for BDAM only in Chrome incognito mode. On 5/12/2022 12:14 PM, Steve Smith wrote: VSAM does not use hardware keys. What I know of that does are PDS directories (KL=8) (not PDSE), VTOCs (KL=44), SYS1.BRODCAST (KL=1), and just heard about PASSWORD.

Re: The Story of Mainframe Passwords

2022-05-12 Thread Farley, Peter x23353
ION, RICHARD W. Sent: Thursday, May 12, 2022 4:02 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: The Story of Mainframe Passwords Non-relative track address BDAM used it to, right? -Original Message- From: IBM Mainframe Discussion List On Behalf Of Farley, Peter x23353 Sent: Thursday, May

Re: The Story of Mainframe Passwords

2022-05-12 Thread PINION, RICHARD W.
Non-relative track address BDAM used it to, right? -Original Message- From: IBM Mainframe Discussion List On Behalf Of Farley, Peter x23353 Sent: Thursday, May 12, 2022 3:45 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: The Story of Mainframe Passwords [External Email. Exercise caution

Re: The Story of Mainframe Passwords

2022-05-12 Thread Farley, Peter x23353
Yes, ISAM positively did use hardware keys. BTDTGTTS, and I do mean scars. Peter -Original Message- From: IBM Mainframe Discussion List On Behalf Of Steve Smith Sent: Thursday, May 12, 2022 3:14 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: The Story of Mainframe Passwords VSAM does

Re: The Story of Mainframe Passwords

2022-05-12 Thread Mike Schwab
inframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of > > Tom Brennan [t...@tombrennansoftware.com] > > Sent: Wednesday, May 11, 2022 7:03 PM > > To: IBM-MAIN@LISTSERV.UA.EDU > > Subject: Re: The Story of Mainframe Passwords > > > > I remember that datase

Re: The Story of Mainframe Passwords

2022-05-12 Thread Tom Brennan
Discussion List On Behalf Of Charles Mills Sent: 11 May 2022 23:02 To: IBM-MAIN@LISTSERV.UA.EDU Subject: The Story of Mainframe Passwords Reg Harbeck (a name many of you should recognize) and I are putting together a presentation on the above subject. We would appreciate any material that anyone thought

Re: The Story of Mainframe Passwords

2022-05-12 Thread Steve Smith
VSAM does not use hardware keys. What I know of that does are PDS directories (KL=8) (not PDSE), VTOCs (KL=44), SYS1.BRODCAST (KL=1), and just heard about PASSWORD. They are (of course) available for user application with BDAM (Google suggests I meant "BDSM"... almost appropriate ;-). I don't

Re: The Story of Mainframe Passwords

2022-05-12 Thread Tom Brennan
of Mainframe Passwords I remember that dataset. When I first started, one of my jobs was to run a program someone had written that read every record looking for a dataset match, and then spit out the password. That was for folks who forgot their dataset password of course. The program took maybe 10

Re: The Story of Mainframe Passwords

2022-05-12 Thread ITschak Mugzach
y nothing of PDS > directories. > > > > > > > > > -- > > > Shmuel (Seymour J.) Metz > > > http://mason.gmu.edu/~smetz3 > > > > > > ____ > > > From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.ED

Re: The Story of Mainframe Passwords

2022-05-12 Thread Mike Schwab
ur J.) Metz > > http://mason.gmu.edu/~smetz3 > > > > > > From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf > > of Tom Brennan [t...@tombrennansoftware.com] > > Sent: Wednesday, May 11, 2022 7:03 PM

Re: The Story of Mainframe Passwords

2022-05-12 Thread Seymour J Metz
From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of Lennie Dymoke-Bradshaw [032fff1be9b4-dmarc-requ...@listserv.ua.edu] Sent: Thursday, May 12, 2022 9:00 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: The Story of Mainframe Passwords Maybe include how

Re: The Story of Mainframe Passwords

2022-05-12 Thread Lennie Dymoke-Bradshaw
Of Charles Mills Sent: 11 May 2022 23:02 To: IBM-MAIN@LISTSERV.UA.EDU Subject: The Story of Mainframe Passwords Reg Harbeck (a name many of you should recognize) and I are putting together a presentation on the above subject. We would appreciate any material that anyone thought could be included. (I

Re: The Story of Mainframe Passwords

2022-05-12 Thread Itschak Mugzach
M Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf > of Tom Brennan [t...@tombrennansoftware.com] > Sent: Wednesday, May 11, 2022 7:03 PM > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: Re: The Story of Mainframe Passwords > > I remember that dataset. When I first started,

Re: The Story of Mainframe Passwords

2022-05-12 Thread Seymour J Metz
] Sent: Wednesday, May 11, 2022 7:03 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: The Story of Mainframe Passwords I remember that dataset. When I first started, one of my jobs was to run a program someone had written that read every record looking for a dataset match, and then spit out the password

Re: The Story of Mainframe Passwords

2022-05-11 Thread Tom Brennan
I remember that dataset. When I first started, one of my jobs was to run a program someone had written that read every record looking for a dataset match, and then spit out the password. That was for folks who forgot their dataset password of course. The program took maybe 10 minutes to

Re: The Story of Mainframe Passwords

2022-05-11 Thread Gibney, Dave
les Mills > Sent: Wednesday, May 11, 2022 3:02 PM > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: The Story of Mainframe Passwords > > Reg Harbeck (a name many of you should recognize) and I are putting > together > a presentation on the above subject. We would appreciate any materi

The Story of Mainframe Passwords

2022-05-11 Thread Charles Mills
Reg Harbeck (a name many of you should recognize) and I are putting together a presentation on the above subject. We would appreciate any material that anyone thought could be included. (I guess I should get all lawyerly here and say if you send it to us you grant us permission to use it.) Note