I guess being a defense contractor I have a different take on data security.
I call the Internet the "Network of Death" because of the potential
exposures that are there because the "that's good enough is rampant".  In my
business it is either secure or it isn't.  I sell security of their
information to my customer as much as I sell the product.  For this reason
we have to jump through hoops to protect information when the product does
not complete the solution.  In the case of the 3494, I cannot share it in
any way with more than one customer making it expensive.  The reason is I
cannot block a rogue host from doing something it shouldn't.  A host becomes
rogue when it is broken into.  It is not a question of if but when.  I need
to be able to have many tiers of security.  Sharing resources is not
possible in the 3494 environment without creating an exposure unless all the
systems attached are of the same security categorization and enforce the
same security constructs meaning they are owned by the same management team.
So, again, my take is just a little different.

One thing I can tell you is there were a room full of people in various
industries concerned about this issue at Share.  And, like at Share, we as
competent professionals can agree to disagree on the grounds of our business
requirements.  That is why we have a thing called requirements voting, a
democratic way to influence the direction of IBM dollars spent on research
and development.

I agree with you on the subject of not doing library range scans because you
have no idea what is going to happen.  I do not use them either.  Not even
on a move drmedia command.  The bottom line if you do a '*' and have no idea
what is there you have no idea what you will get.  And, actually, in our
environment we do a lot of moving ownership of LUNs around in our Sharks as
workload requires them (unassign from one and reassign to another) so I get
to decide who can see these LUNs at any point in time.  And, in fact, I can
allow more than one system to see the same LUN if I wish.  The Shark
autonumbers the LUNs.  That is a minor semantic of the discussion.  The
important thing from my point of view I get to say who can see what LUNs.
And, no matter what kind of GOD you are you cannot get past that.  All Share
is asking for is at the hardware level of the 3494 allow us to do the same
thing for volumes whether they are virtual VTS volumes or physical volumes.
I think you would agree even in the financial industry this would be an
added value security function when many hosts have been given mtlib
equivalent access to the Library Manager.  Thus comparing the ESS to the
3494 is very applicable to this discussion when you think of the ESS being
delivered by default with LUN access restricted, but you can turn it off and
the 3494 is delivered with no volume security and no way to turn it on.

Thanks for this healthy debate of the issues.  It helps put into perspective
the quality of people on this List Server and their ability to
philosophically debate a subject.  We all win from a discussion like this.
It fuels the best in innovation by our vendors as they develop future
products.

You get one more rebutal.


-----Original Message-----
From: Allen Barth [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, March 20, 2002 5:00 PM
To: [EMAIL PROTECTED]
Subject: Re: 3494 Volume Stealing


Paul,

It's clear to me that we disagree.  I understand and accept the
inter-operating parameters and requirements of the 3494, and have installed
and/or written code residing on each attached host to only look for tapes
that it owns.  I don't do scans - period.  I think your reference to the
Shark disk server capabilities is an apples to oranges comparison.  For one,
Shark lun inventories are a stable commodity (unless more dasd is added and
LSS's are created) in that they (luns) don't checkin/checkout like tapes do
in a tape library.  For another, YOU don't get to pick what the luns are
called, but YOU do get to pick what tape volsers you'll use.

And what about VTS?  One of my 3494s has VTS enabled and the carts used by
the VTS function aren't owned or managed by ANY externally attached system.
This has caused no impact to me.

Now I'm not saying that the 3494 is perfect.  There are definitely functions
that I'd like to see added.  For example, ever try to find out the volser of
a cart in cell xxx after the label fell off?  There's only 1 painful
way....pull up a chair and slowly wade through the inventory on the LM
console until you find it.  There is no perfect solution to disparate
systems claiming tapes, but  the more responsibility you off-load, the less
flexibility you will get.

Regards,
Al Barth





"Seay, Paul" <[EMAIL PROTECTED]>
Sent by: "ADSM: Dist Stor Manager" <[EMAIL PROTECTED]> 03/19/02 11:00 PM
Please respond to "ADSM: Dist Stor Manager"


        To:     [EMAIL PROTECTED]
        cc:
        Subject:        Re: 3494 Volume Stealing


Allen,

I do not normally boast about my knowledge on something but in this area of
this product I know it as well as the engineers do and probably better when
considering its interaction with host systems.  I have actually run the
traces and I can tell you that the buffers returned from the 3494 during an
inventory function are in error in some cases because of an internal bug in
the LM.  This bug can cause software that does no error checking to get all
balled up and do something wrong.  It is kind of like adding 1 + 1 and
expecting to always get 2.  The way the LM inventory search facility works
(TSM uses this) is it passes back 100 tapes at a time.  The first buffer has
a header on it that has the total count of entries.  The last buffer is what
is left.  Unfortunately, the buffer is not cleared, so there is residual
data in the buffer from previous calls.  The last entry in the last buffer
has a null entry in it.  IBM never tested the count always being right. And,
in fact determined they have no way to guarantee the count is correct
because they just get the count from a DB2 table on the LM, they do not
count the number of entries they are returning.  So, any application that
does not scan for the null entry can end up picking up bogus information.
Note that these buffers can contain all tapes for all hosts, not just the
ones for a specific category.  The category is in the records returned.
Usually, the counter is short and you are missing tapes, but I suppose it
could be high and cause the logic to process volumes that are not yours.

Just food for thought.  There is no user code in my environment.

In the case I described below, there was only one host attached to this
library and it was non-mixed.  We just kept getting 2 tapes or 4 tapes short
of what was actually in the library.  If you read the 3494 programmers guide
you will find that there is a lot more to this than meets the superfical
mtlib command.  There is a whole set of c routines to allow you to code to
the lmcpd interface.  In fact, I am in the process of designing an insert
and categorize function for TSM.  Then, I will have some user code.  It will
work like the mainframe, automatically categorize the tapes and check them
in.  The way I am going to do this is execute a high level language perl
script that can be recoded easily that will do the necessary mtlib and TSM
commands.  This will limit the unsolicited messages processing in the coded
routine significantly.

I know the site that is having this problem with the 4 TSM Servers.  This is
a tight environment.  Another site that has an MVS and TSM environment had
an MVS tape eaten.  Both are in the process of reproducing this problem at
will.

This may still be a user problem, but I am betting either TSM code or the
Library Manager.

What everyone is asking for is security by the attaching node as to which
tapes can be acted upon by volume range.  This was discussed at length at
Share related to TSM because no other libraries have the kind of smarts the
3494 or ACSLS have to even do this in hardware.  The position of the
customers including us is that the 3494 is an enterprise class, high
integrity, high dollar product.  Yes, the functionality is not there in the
LM, but the amount of code to do a table check of valid ranges is small.
Each host has to be identified to the 3494 library, why not add the valid
ranges and categories too.  The big sell for IBM to do this is if I could
secure a library at this level then I could share it between many
environments like the Shark Disk LUN masking allows me.  In other words
consolidate many libraries into one.  Yes, a host could still mount its own
tapes in the wrong drive, that is its problem as you say or set the hardware
scratch mount category on the wrong drive to its own.  These are difficult
to solve in the library design.  But, to allow any system to checkin a FF00
tape or change the category of a tape owned by another host is a problem. By
default, what IBM should do is make it work the way it does now.  All
systems can do anything to "*".  Then, you can lock it down if you want.

I am going to be discussing this issue with 3494 hardware engineering in a
couple weeks hopefully.  It has always been an issue for us, but now that
people are having these kind of problems, I have sturdier ground to stand on
to get IBM to provide the functionality.  And why are they having these
problems, because everyone wants the reliability of the 3590 platform, have
this library already installed and say why not.


-----Original Message-----
From: Allen Barth [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, March 19, 2002 5:50 PM
To: [EMAIL PROTECTED]
Subject: Re: 3494 Volume Stealing


I stand by the statement that the 3494 volume claiming is working as
designed.

I have a 3494 which for the last 6 years is used concurrently by: multiple
non-shared os/390 lpars two disparate as/400 systems multiple rs/6k servers
2 TSM systems

Yes, it is up to the 'host software' to maintain category limits.   In
every one of these 'host' environments, the 'host software' is a combination
of system or product software and user written code.  None of these systems
uses a pure search technique, there's always some user code to help each
system 'know' what its' valid tapes are.  In some it's just a little harder
to find the user code.  I further use a different volser range for each
platform to aid in more generic user code.  I don't see any way that a
robotic tape server able to hook up to a plethora of platforms and software
could be expected to isolate categories.  Also think of error conditions.
There is no way in for the 3494 to move or recategorize tapes.  Those
commands must come from attached hosts.

OK, this is all a learning curve.  Been there did that.   But I think it
works.

my .02

Al Barth




"Seay, Paul" <[EMAIL PROTECTED]>
Sent by: "ADSM: Dist Stor Manager" <[EMAIL PROTECTED]> 03/19/02 03:03 PM
Please respond to "ADSM: Dist Stor Manager"


        To:     [EMAIL PROTECTED]
        cc:
        Subject:        Re: 3494 Volume Stealing


Actually, Nick we think there really is a bug.  I saw something similar once
on Netbackup.  Essentially, the 3494 inventory count got off from the actual
number of entries presented in the SEARCH=YES type CHECKIN equivalent in
NetBackup.  After we ran a full offline inventory of the library the problem
went away for a week or two and would come back.  Eventually, we got a LM
code level that apparently fixed the corruption problem.  Have not seen it
for a long time.

-----Original Message-----
From: Nicholas Cassimatis [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, March 19, 2002 10:07 AM
To: [EMAIL PROTECTED]
Subject: Re: 3494 Volume Stealing


This falls under the old "Measure twice, cut once" rule.  If you're sharing
a library and NOT doublechecking yourself, you're asking for trouble. Plain
and simple.  Don't describe a "defect" to something that  is working at the
level it's designed to.  The nice thing about a shared library is you can
have a pool of "spare" tape to assign to any server you want to, as needed.

Checkout and checkin of tape can be a destructive process, and shouldn't be
taken too lightly.

Nick Cassimatis
[EMAIL PROTECTED]

Today is the tomorrow of yesterday.




                      "Orville L.
                      Lantto"                  To:
[EMAIL PROTECTED]
                      <orville.lantto@D        cc:
                      TREND.COM>               Subject:  Re: 3494 Volume
Stealing
                      Sent by: "ADSM:
                      Dist Stor
                      Manager"
                      <[EMAIL PROTECTED]
                      .EDU>


                      03/15/2002 05:43
                      PM
                      Please respond to
                      "ADSM: Dist Stor
                      Manager"





The volume which was "stolen" was checked in to another TSM server with that
server's scratch category code (verified by mtlib).  Yes, this is very
disturbing!


Orville L. Lantto
Datatrend Technologies, Inc.  (http://www.datatrend.com)
121 Cheshire Lane #700
Minnetonka, MN 55305
Email: [EMAIL PROTECTED]
V: 952-931-1203
F: 952-931-1293
C: 612-770-9166




"Seay, Paul" <[EMAIL PROTECTED]>
Sent by: "ADSM: Dist Stor Manager" <[EMAIL PROTECTED]> 03/15/02 03:15 PM
Please respond to "ADSM: Dist Stor Manager"


        To:     [EMAIL PROTECTED]
        cc:
        Subject:        Re: 3494 Volume Stealing


Yes and no.  Once a tape is ejected from the library, when it is reinserted,
it is anybody's game because it does not belong to a specific TSM server. It
is in FF00 status.  So, if you do a checkin command with a range,
search=yes, another TSM Server could get it.  This is why I do checkin
commands with a specific volume id when I checkin each tape.

At Share we have asked for a function to be added in general to setup an
include table for each TSM server.  This include table would limit what
ranges of tapes are allowed to be picked up by that TSM server instance.

Now, if the tapes are already in the library and assigned a scratch or
private category and the tapes can be stolen, that is a major problem that
support needs to know about.  I have never tried to see if I can cause one
TSM to steal tapes from another TSM server this way.

-----Original Message-----
From: Orville L. Lantto [mailto:[EMAIL PROTECTED]]
Sent: Friday, March 15, 2002 2:51 PM
To: [EMAIL PROTECTED]
Subject: 3494 Volume Stealing


I just tested a problem brought to me by one of my clients.  They have one
3494 library shared by four TSM Servers.  Using 4.2.1 TSM, properly
configured with different 3494 Categories, it is possible for one TSM server
to steal a volume that is checked in to another TSM server.  This behavior
is not exhibited by 3.7.3.

Has anyone seem this?


Orville L. Lantto
Datatrend Technologies, Inc.  (http://www.datatrend.com)
121 Cheshire Lane #700
Minnetonka, MN 55305
Email: [EMAIL PROTECTED]






******************* PLEASE NOTE *******************
This message, along with any attachments, may be confidential or legally
privileged.  It is intended only for the named person(s), who is/are the
only authorized recipients. If this message has reached you in error, kindly
destroy it without review and notify the sender immediately. Thank you for
your help.
**********************************************************






******************* PLEASE NOTE *******************
This message, along with any attachments, may be confidential or legally
privileged.  It is intended only for the named person(s), who is/are the
only authorized recipients. If this message has reached you in error, kindly
destroy it without review and notify the sender immediately. Thank you for
your help.
**********************************************************

Reply via email to